Unlock instant, AI-driven research and patent intelligence for your innovation.

Generation methods and devices of user root key and user key for trusted computing platform

A user key and trusted computing technology, applied in the field of information security, can solve problems such as threats, authorization protocols without security or security, etc.

Active Publication Date: 2015-06-24
SHENZHEN TISMART TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The security of the authorization protocol depends on the confidentiality of the authorization data. If the attacker knows or guesses the authorization data, the authorization protocol will have no security or the security will be greatly threatened.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Generation methods and devices of user root key and user key for trusted computing platform
  • Generation methods and devices of user root key and user key for trusted computing platform
  • Generation methods and devices of user root key and user key for trusted computing platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031]The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention belong to the protection scope of the present invention.

[0032] Please refer to the attached figure 1 , is a schematic flowchart of a method for generating a user root key of a trusted computing platform provided by an embodiment of the present invention, mainly including steps S101, S102, and S103:

[0033] S101. The trusted platform module owner receives a user root key generation request from a user.

[0034] Trusted Platform Module (Trusted Platform Module, TPM) has only one storage root key (Storage Root Key, SRK), SRK is the root node of the key tree, it...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a generation method and a device of a user root key and a user key for a trusted computing platform, which can enhance the security of a trusted computing group authorization protocol. The method comprises the following steps that: an owner of a trusted platform module receives a user root key generation request made by a trusted platform module user; the trusted platform module is interacted with the owner of the trusted platform module to generate a user root key of the trusted platform module user and authorization data of the user root key; and the owner of the trusted platform module sends the user root key of the trusted platform module user and the authorization data of the user root key to the trusted platform module user. The method provided by the embedment of the invention ensures the particularity, privacy and independence of the user root key, even if the user (including an attacker) knows the authorization data of a storage root key, the user cannot create a user root key without the authorization of the owner of the trusted platform module, and thus the resources of the trusted platform module cannot be illegally occupied.

Description

technical field [0001] The invention relates to the field of information security, in particular to a trusted computing platform user root key and user key generation method and device. Background technique [0002] Trusted Computing Group (Trusted Computing Group, TCG) defined trusted computing technical specifications mainly include object-independent authorization protocol (Object-Independent Authorization Protocol, OIAP) and object-specific authorization protocol (Object-Specific Authorization Protocol, OSAP) and other authentication / license agreement. The authorization protocols in the trusted computing specification can guarantee the integrity of the session, and protect some key data based on the authorization password, such as the confidentiality of the authorization data of the newly created key and the protection data of the encapsulated data. The security of the authorization protocol depends on the confidentiality of the authorization data. If the attacker know...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
Inventor 李新国黄诗勇李茹宫俊赵宝龙
Owner SHENZHEN TISMART TECH CO LTD