Method for realizing trusted computing platform in embedded device

An embedded device and trusted computing technology, applied in the field of information security, to achieve the effect of reliable security guarantee

Inactive Publication Date: 2011-10-19
BEIJING TONGFANG MICROELECTRONICS
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the trusted computing platform technology for embedded devices is still blank, and it is urgent to establish and improve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing trusted computing platform in embedded device
  • Method for realizing trusted computing platform in embedded device
  • Method for realizing trusted computing platform in embedded device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] see figure 1 and figure 2 , the present invention realizes the method step of trustworthy computing platform in embedded device as:

[0039] 1) Connect the embedded device containing the real-time operating system to the trusted computing module through the serial interface;

[0040] 2) Store the summary value of boot key feature data and application program key feature data in the trusted computing module.

[0041] 3) The embedded device establishes a chain of trust during the boot phase, and the method for establishing the chain of trust is:

[0042] a) Start the trusted computing module and initialize it;

[0043] b) Send the security-related sensitive data to the trusted computing module for summary calculation;

[0044] c) store the result of the digest calculation in the platform configuration register of the trusted computing module;

[0045] d) Compare the summary calculation result with the summary value stored in the non-volatile storage area inside the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for realizing a trusted computing platform in an embedded device, which relates to the technical field of information security. The method disclosed by the invention comprises the steps of: connecting an embedded device with a trusted computing module; storing digest values in the trusted computing module for guiding key characteristic data and the key characteristic data of an application program; building a trust chain by the embedded device, and transferring the key characteristic data to the trusted computing module; returning a digest value 1 to the embedded device by the trusted computing module; verifying the correctness of the digest value 1 by the embedded device; transferring the key characteristic data of the application program to be started to the trusted computing module by a real-time operating system; returning a digest value 2 to the embedded device by the trusted computing module; and verifying the correctness of the digest value 2 by the embedded device. According to the method disclosed by the invention, all functions of the trusted computing platform can be realized in the embedded device by connecting the embedded device with the trusted computing module, a reliable security assurance is provided for the embedded device.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for realizing a trusted computing platform in an embedded device. Background technique [0002] In recent years, trusted computing has become a hot spot in the field of information security. China's trusted computing has now received more and more attention from the national encryption management department, and has risen to the national standard. Many companies with relatively high security requirements Venues are increasingly demanding trusted computing. [0003] However, the existing trusted computing standards are mainly aimed at PC users, and usually connect the trusted computing module TMC through the low-pin-number LPC interface on the PC motherboard, so as to complete the trusted computing function. For a larger number of embedded devices, such as firewall products, tax control machine products, and various other handheld devices, such as mobile pho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F15/16G06F21/57
Inventor 王庆林丁义民黄金煌
Owner BEIJING TONGFANG MICROELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products