Dynamic trusted measurement method and safe embedded system

An embedded system and reliability technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve problems such as lack of perfect solutions, achieve physical isolation and get rid of dependence

Inactive Publication Date: 2012-05-02
AUTOMATION RES & DESIGN INST OF METALLURGICAL IND
View PDF3 Cites 72 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These real-time attacks make information systems face great threats, especially industrial control system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic trusted measurement method and safe embedded system
  • Dynamic trusted measurement method and safe embedded system
  • Dynamic trusted measurement method and safe embedded system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] Embodiments of the present invention: a credibility measurement method utilizing the aforementioned system, comprising the following steps:

[0048] S1, the hardware layer redesigns the trusted BIOS through the TPM chip and traditional hardware, and the trust chain is passed from the TPM security chip, trusted BIOS, trusted OS kernel, and embedded software stack to the application program to realize the reliability of the dynamic trusted measurement module DTM It is also possible to integrate CRTM (CRTM is the execution code for the platform to execute RTM, and there are three roots of trust in a trusted platform: measurement root of trust RTM, storage root of trust RTS, and report root of trust RTR) into TPM In this way, the CRTM does not directly interact with the main processor of the embedded device, avoiding the impact of platform heterogeneity on the CRTM;

[0049] S2, the application layer measurement request module generates measurement request information...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a dynamic trusted measurement method and a safe embedded system. The method comprises the following steps that: S1. a hardware layer redesigns a trusted BIOS (Basic Input Output System) by a TPM (Trusted Platform Module) chip and traditional hardware, a trust chain is transferred to an application program from the TPM security chip, trusted BISO, a trusted OS (Operating System) kernel and an embedded software stack to realize the trusted starting of a dynamic trusted measurement module (DTM); S2. an application layer measurement request module generates measurement request information according to a suspicious event from safety equipment and a local security strategy requirement, the measurement request information is formatted, and the measurement request is sent to the DTM of a kernel layer to activate the DTM; and S3. the DTM carries out trusted measurement to a system progress or module and responds. According to the dynamic trusted measurement method, the complex real-time attack can be effectively detected and defended, the attack on an internal physical layer can be actively detected and defended, and a safe embedded system platform can be realized.

Description

technical field [0001] The invention relates to a dynamic credibility measurement method and a safety embedded system, belonging to the technical field of industrial control safety. Background technique [0002] For a long time, the main technology of information security is firewall, intrusion detection and antivirus software. These three traditional information security technologies focus on "foreign defense", which is not compatible with the current situation that information security problems mainly originate from the inside (user behavior, etc.), especially industrial control systems, whose more serious attacks Attacks from the internal physical layer, traditional information security methods are powerless to prevent such attacks; in addition, people's attention to information security issues is mainly focused on the protection of servers and network equipment, which are passively blocked This method ignores the active protection of the terminal, which causes the exec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/71
Inventor 赵永丽张云贵王丽娜于立业潘秋娟
Owner AUTOMATION RES & DESIGN INST OF METALLURGICAL IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products