Check patentability & draft patents in minutes with Patsnap Eureka AI!

Multi-level security trust chain construction method and system

A construction method and trust chain technology, applied in digital data protection, instruments, electrical digital data processing, etc., can solve problems such as multi-level security measurement methods that cannot meet the security level of cryptographic algorithms

Active Publication Date: 2017-06-23
NO 709 RES INST OF CHINA SHIPBUILDING IND CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, in complex multi-level security systems, business systems have different security requirements for security levels, and application systems with different security levels are required to implement trust chain systems with corresponding security levels. However, existing trusted computing platforms can only implement one The trust chain system under the security level cryptographic algorithm cannot satisfy the multi-level security measurement method for different security level cryptographic algorithms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-level security trust chain construction method and system
  • Multi-level security trust chain construction method and system
  • Multi-level security trust chain construction method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] As shown in 1, the embodiment of the present invention provides a method for constructing a multi-level security trust chain, which includes the following steps:

[0024] S1. The measurable root acquires the structure of the measurement event of each measurement module, and sends the structure of the measurement event of the measurement module to the multi-level secure and trusted cryptographic module 2 .

[0025] Among them, various modules that need to be measured in the measurement module system, such as OSloader, OS or various application programs. Under complex multi-level security system requirements, different measurement modules have different security requirements, and the structure of measurement events of each measurement module is also different. The root of trusted measurement can be regarded as the boot program of the BIOS. It is a simple and controllable code module that is considered absolutely reliable. After power-on, the root of trusted measurement wi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method for constructing a multi-level security trust chain, which includes the following steps: S1. The measurable root obtains the structure of the measurement event of each measurement module, and sends the structure of the measurement event of the measurement module to the multi-level security trusted password module; S2, the multi-level security trusted cryptographic module measures the integrity of each measurement module according to the structure of the measurement event; and stores the result of the integrity measurement to complete the multi-level security-oriented trust chain transfer. The invention can realize the multi-level security measurement mode for different levels of encryption algorithms. The invention also provides a multi-level security trust chain construction system.

Description

technical field [0001] The invention relates to the field of computer information security and trusted computing, in particular to a method and system for constructing a multi-level security trust chain. Background technique [0002] At present, trusted computing technology is an effective new technology to enhance the security of information system. Trusted computing technology enhances the security of information system through trusted cryptographic module TCM (Trusted Cryptographic Module). Encapsulates the security service functional unit, which is used to provide basic security services for the platform. Trust chain technology is one of the key technologies of trusted computing technology. The trust chain given by TCG (Trusted Computing Group) is defined as follows: [0003] CRTM→BIOS→OSLoader→OS→Applications; [0004] Among them, CRTM (Core Root of Trust for Measurement) is the root core of trusted measurement, BIOS (Basic Input and Output System) is the basic input...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/64
CPCG06F21/64G06F2221/2113
Inventor 徐明迪杨连嘉沈楚楚
Owner NO 709 RES INST OF CHINA SHIPBUILDING IND CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More