Embedded terminal dependable starting method based on mobile dependable computing module

An embedded terminal, trusted computing technology, applied in computing, computer security devices, program loading/starting, etc., can solve the problems of slow startup, limited embedded terminal resources, poor stability, etc., to ensure safe operation, make up for The effect of limited computing power and faster startup

Active Publication Date: 2014-01-22
SHANDONG SYNTHESIS ELECTRONICS TECH
View PDF2 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, the system backup program is generally stored in an external memory, the system backup program is particularly easy to be tampered with and destroyed, and the availability of trusted boot cannot be guaranteed
Existing trusted systems do not have a trusted computing module and an authentication process for terminal devices, and are no longer suitable for the trusted boot process of embedded terminals with mobile trusted computing modules
In addition, the existing embedded trusted boot design does not protect and manage the system backup. Once the backup is maliciously destroyed, the embedded terminal device will not be able to be used normally, and the stability is poor.
Finally, existing technologies are slow to start due to limited embedded terminal resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embedded terminal dependable starting method based on mobile dependable computing module
  • Embedded terminal dependable starting method based on mobile dependable computing module
  • Embedded terminal dependable starting method based on mobile dependable computing module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The implementation process of the present invention is described below with a specific example, but the present invention is not limited to this example. The content of the present invention covers any modification, equivalent and replacement of the core content of the present invention. The SD trusted computing module in this embodiment is a mobile trusted computing module packaged in the form of an SD card.

[0027] In the process of trusted booting, if the trusted computing module is illegal, then the security of the system becomes nonsense. The solution of the invention has a mobile trusted computing module authentication process, which can ensure the legitimacy of the mobile trusted computing module, thereby ensuring the safety of system startup. In addition, the system backup of the solution of the present invention is managed by a trusted computing module, which prevents the system backup from being maliciously tampered with and ensures the robustness of the emb...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an embedded terminal dependable starting method based on a mobile dependable computing module. Segmentation is carried out on a starting procedure, measurement is carried out on partial content of the starting procedure, although the safety is reduced to some extent, the starting speed is improved greatly, and the defect that the computing capability of embedded type equipment is limited is compensated effectively. After a system is started, measurement of the remaining part is carried out, the computing capability is no longer the pure embedded type equipment, it is ensured that all the verification can be completed in a short time, and safe operation of the embedded terminal is effectively ensured due to the verification of all content as a whole.

Description

technical field [0001] The invention relates to a trusted starting method of an embedded terminal based on a mobile trusted computing module. Background technique [0002] With the development of Internet of Things technology, the intelligentization of embedded terminal devices (hereinafter referred to as terminal devices) has brought great fun and convenience to the lives of the public. Intelligent identification, positioning, tracking, monitoring and management have become the It is a very common function, but the security problems of terminal equipment are also becoming more and more prominent. Hacking attacks and the proliferation of viruses make the security problems of embedded systems particularly serious. [0003] At present, most information security technologies only rely on the combination of strong cryptographic algorithms and keys to ensure the safe operation of the system, but this pure software mechanism is not absolutely safe, and many users' improper operati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06F21/12G06F9/445
CPCG06F9/4401G06F21/575
Inventor 赵志超孙涛赵华太
Owner SHANDONG SYNTHESIS ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products