Dynamic integrity protection method based on credible chip

An integrity measurement and chip technology, applied in the field of information security, which can solve problems such as service failure and security mechanism failure.

Inactive Publication Date: 2013-05-08
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF3 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If an attacker illegally modifies the system configuration or security policy file, it may cause the service in the system to hang up or the security mechanism to fail

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic integrity protection method based on credible chip
  • Dynamic integrity protection method based on credible chip
  • Dynamic integrity protection method based on credible chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] The present invention will be further described below with reference to the accompanying drawings and the specific implementation on the system with the TCM chip, but the scope of the present invention is not limited in any way.

[0013] The present invention mainly comprises following several parts, as figure 1 As shown, the benchmark update program is in the user state, and the data in the NV storage area can be read and written through the TCM driver. After the user updates the file, the benchmark of the NV storage area can be updated through this program. The measurement module is in the kernel state, calculates the hash value of the file when the file is loaded into the memory, and sends the calculated result to the verification module. The verification module can read the corresponding benchmark of the file in the NV storage area in the TCM through the TCM driver, then compare it with the measurement result, and send the comparison result to the measurement modul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a dynamic integrity protection method based on a credible chip. The method comprises: 1) setting a standard updating program in a user mode, wherein the standard updating program is used for storing a measurement standard of dynamic changing file; initializing an NV storage area of a terminal-to-computer-multiplexer (TCM) chip by the standard updating program; and defining indexing, a size and an operation password of the NV storage area; 2) updating a standard of the file in the NV storage area by means of the standard updating program and the operation password after the file is updated by a user every time; and 3) setting a measurement module and a verification module in a kernel mode; calculating measurement results of the file by the measurement module when loading the dynamic changing file into an internal storage, and sending the measurement results to the verification module; and reading the standard of the file in the NV storage area by the verification module and comparing the standard, if being the same, judging that the integrity of the file is good by the measurement module, otherwise, judging that the file is illegally modified. The dynamic integrity protection method based on the credible chip effectively solves the problem that an inventory management assistant (IMA) can not measure and verify the dynamic changing file.

Description

technical field [0001] The invention relates to the field of information security, in particular to a dynamic integrity protection method based on a trusted chip. Background technique [0002] With the development of computer technology, the security of computer system has always been the focus of people. In particular, the code or data of a computer system may be illegally modified by a remote attacker. Traditional firewall methods, anti-virus software and password methods cannot fundamentally protect the integrity of computer systems. Internationally, the Trusted Computing Group (TCG) embeds a Trusted Platform Module (TPM) on the motherboard, and uses the chip to measure the system layer by layer to ensure that the system that starts up is safe and reliable. The domestic trusted computing standard "Trusted Computing Cryptographic Support Platform Function and Interface Specification" has also been formulated. By embedding a trusted cryptographic module TCM with its own c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
Inventor 丁保增贺也平周启明武延军关贝翟翔兰书俊
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products