Unlock instant, AI-driven research and patent intelligence for your innovation.

Multilevel security trust chain construction method and structure

A construction method and trust chain technology, applied in digital data protection, instruments, electronic digital data processing, etc., can solve the problem of multi-level security measurement methods that cannot meet the security level of cryptographic algorithms

Active Publication Date: 2015-01-07
NO 709 RES INST OF CHINA SHIPBUILDING IND CORP
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, in complex multi-level security systems, business systems have different security requirements for security levels, and application systems with different security levels are required to implement trust chain systems with corresponding security levels. However, existing trusted computing platforms can only implement one The trust chain system under the security level cryptographic algorithm cannot satisfy the multi-level security measurement method for different security level cryptographic algorithms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multilevel security trust chain construction method and structure
  • Multilevel security trust chain construction method and structure
  • Multilevel security trust chain construction method and structure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] As shown in 1, the embodiment of the present invention provides a method for constructing a multi-level security trust chain, which includes the following steps:

[0024] S1. The measurable root acquires the structure of the measurement event of each measurement module, and sends the structure of the measurement event of the measurement module to the multi-level secure and trusted cryptographic module 2 .

[0025] Among them, various modules that need to be measured in the measurement module system, such as OSloader, OS or various application programs. Under complex multi-level security system requirements, different measurement modules have different security requirements, and the structure of measurement events of each measurement module is also different. The root of trusted measurement can be regarded as the boot program of the BIOS. It is a simple and controllable code module that is considered absolutely reliable. After power-on, the root of trusted measurement wi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a multilevel security trust chain construction method. The multilevel security trust chain construction method comprises the following steps of step 1, obtaining a structure of a measurement event of every measurement module through a measurable root and sensing the structure of the measurement event of every measurement module to a multilevel security trusted password module and step 2, performing integrity measurement on every measurement module through the multilevel security trusted password module according to the structure of every measurement event and storing a result of the integrity measurement to achieve the multilevel security trust chain transfer. According to the multilevel security trust chain construction method, the multilevel security measurement mode for different levels of password algorithms can be implemented. The invention also provides a multilevel security trust chain construction structure.

Description

technical field [0001] The invention relates to the field of computer information security and trusted computing, in particular to a method and system for constructing a multi-level security trust chain. Background technique [0002] At present, trusted computing technology is an effective new technology to enhance the security of information system. Trusted computing technology enhances the security of information system through trusted cryptographic module TCM (Trusted Cryptographic Module). Encapsulates the security service functional unit, which is used to provide basic security services for the platform. Trust chain technology is one of the key technologies of trusted computing technology. The trust chain given by TCG (Trusted Computing Group) is defined as follows: [0003] CRTM→BIOS→OSLoader→OS→Applications; [0004] Among them, CRTM (Core Root of Trust for Measurement) is the root core of trusted measurement, BIOS (Basic Input and Output System) is the basic input...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/64
CPCG06F21/64G06F2221/2113
Inventor 徐明迪杨连嘉沈楚楚
Owner NO 709 RES INST OF CHINA SHIPBUILDING IND CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More