Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Device and method for implementing credible embedded system on existing embedded equipment

A technology for embedded devices and embedded systems, applied in computer security devices, instruments, computing, etc., can solve problems such as inability to complete trusted computing for embedded devices, lack of embedded system bus interfaces, and increased application complexity. , to achieve the effect of simple application method, simple circuit hardware structure, and easy implementation

Inactive Publication Date: 2012-12-12
CHONGQING UNIV
View PDF9 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it is obvious that this method needs to redesign the hardware system of the embedded device, so it cannot complete the goal of realizing trusted computing on the embedded device without changing the hardware structure of the embedded device.
The TPM (or TCM) chip is designed for general-purpose computer systems and does not have the bus interface that embedded systems usually have. Therefore, it is necessary to use hardware or software to convert the interface of different bus protocols, which increases the complexity of the application.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device and method for implementing credible embedded system on existing embedded equipment
  • Device and method for implementing credible embedded system on existing embedded equipment
  • Device and method for implementing credible embedded system on existing embedded equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings; it should be understood that the preferred embodiments are only for illustrating the present invention, rather than limiting the protection scope of the present invention.

[0063] figure 1 An overall block diagram of the trusted embedded system provided by the embodiment of the present invention, figure 2 The structural block diagram of the safety module FPGA chip system that the embodiment of the present invention provides, image 3 It is a flow chart of interactive verification between an embedded device and a security module provided by an embodiment of the present invention, Figure 4 It is a flow chart of integrity measurement performed by the security module provided by the embodiment of the present invention.

[0064] Such as figure 1 Shown: the device provided by the present invention for realizing a trusted embedded system on ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a credible embedded system on the basis of a safety module and aims to solve the technical problem of improving the safety of the existing embedded equipment. The credible embedded system disclosed by the invention comprises embedded equipment and the safety module. The embedded equipment is physically connected with the safety module by a serial bus, wherein the embedded equipment is an embedded system platform for implementing specific functions; and the safety module uses a FPGA (Field Programmable Gate Array) SOC (System On Chip) as a core and is used for providing functions of encryption and decryption operation of data, integrity measurement and the like for the embedded equipment and improving the safety of the embedded equipment in the process from start to operation. Compared with the prior art, an additional program storage is not added for the embedded equipment; an original hardware structure of the embedded equipment does not need to be changed; the safety module has simple circuit composition; and the credible embedded system has strong flexibility and simple application mode, is easy to implement and has general applicability.

Description

technical field [0001] The invention relates to the field of information security and the field of embedded system application, in particular to a method and device for realizing a trusted embedded system on existing embedded equipment. Background technique [0002] As the processing capability of embedded microprocessors increases day by day, embedded devices are used more and more widely. However, the security issues of embedded devices have not received enough attention and targeted solutions, and the security issues have become more and more prominent. Trusted computing is a new development direction in the field of information security, and its overall goal is to improve the security of computing systems. The basic idea of ​​trusted computing is: first establish a root of trust in the computer system, and then establish a chain of trust, starting from the root of trust to the hardware platform, to the operating system, and then to the upper-level application, first-lev...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00
Inventor 罗钧蒋敬旗闵志盛李成清李义军付丽孙洪旗
Owner CHONGQING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products