A trusted computer system and its application method

A technology of computer system and application method, which is applied in the direction of computer security devices, calculations, instruments, etc., to achieve the effects of reducing production costs, solving mismatching access speeds, and increasing security

Active Publication Date: 2017-08-25
SHANGHAI XINCHU INTEGRATED CIRCUIT
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above technical solution still separates the trusted platform module from the BIOS system, which cannot solve the problems existing in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A trusted computer system and its application method
  • A trusted computer system and its application method
  • A trusted computer system and its application method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments, but not as a limitation of the present invention.

[0064] like figure 1 As shown, in a preferred embodiment of the present invention, a trusted computer system usually includes a motherboard A, on which:

[0065] The processor chip 1, as the core of the trusted computer system for processing data and instructions, supports the normal operation of the trusted computer system. In a preferred embodiment of the present invention, the processor chip 1 may be a high-performance processor chip.

[0066] North bridge chip 2 is connected to processor chip 1. Northbridge chip 2 is the most important part of the mainboard chipset, also known as the main bridge. Internal transmission, providing support for the type and main frequency of the processor chip, the frequency of the front side bus of the system, the type and maximum capacity of the memory, AGP...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a trusted computer system and an application method thereof, which belong to the technical field of trusted security chips. The trusted computer system comprises a basic information management unit, wherein the basic information management unit comprises a first memory module, a microprocessing module, a first standardized security module, a second standardized security module, a first communication interface and a selection module. The method comprises the following steps: starting the basic information management unit and performing bottom-layer system operation on the trusted computer system according to basic system information; starting a processor chip; obtaining a selection instruction inputted from external; analyzing the selection instruction: if the standard selection instruction includes a first standard, starting the first standardized security module, and if the standard selection instruction includes a second standard, starting the second standardized security module. The technical scheme has the beneficial effects that the problems of mismatching with the access speed of a BIOS (Basic Input / Output System) chip and needing of address chip selection are solved, the area of a mainboard is saved and the improvement cost is low.

Description

technical field [0001] The invention relates to the technical field of trusted security chips, in particular to a trusted computer system and an application method thereof. Background technique [0002] A trusted platform module (Trusted Platform Module, TPM) security chip refers to a security chip conforming to the TPM standard, which can effectively protect a personal computer and prevent unauthorized users from accessing it. In October 1999, a number of IT giants jointly initiated the establishment of the Trusted Computing Platform Alliance (TCPA), which is committed to promoting a new generation of secure and reliable hardware computing platforms. In March 2003, TCPA was reorganized into the Trusted Computing Group (TCG), hoping to formulate standards and specifications related to trusted computers in terms of hardware and software across platforms and operating environments, and proposed TPM security standards. A chip that meets the TPM security standard must first hav...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
CPCG06F21/575
Inventor 景蔚亮封松林陈邦明
Owner SHANGHAI XINCHU INTEGRATED CIRCUIT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products