Embedded trusted computing development device

A trusted computing and embedded technology, applied in the protection of internal/peripheral computer components, etc., can solve the problems of inconvenient measurement of signals, difficult trusted computing security chip and its platform simulation, affecting R&D efficiency, etc. The effect of debugging

Active Publication Date: 2015-12-23
ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, in the process of developing trusted products, most people use software simulation for development. It is difficult to fully simulate the trusted computing security chip and its platform, and the existing development boards for research and development often use trusted chips.
Rather than discrete components, it is not convenient to measure the signals transmitted by each component on the development board, which affects the efficiency of research and development

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embedded trusted computing development device
  • Embedded trusted computing development device
  • Embedded trusted computing development device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0035] see figure 1 , figure 1 It is a structural diagram of an embodiment of the embedded trusted computing development device provided by the present invention. Such as figure 1 As shown, the trusted computing development device includes: a USB interface module 101 and a central processing unit 102 .

[0036] Wherein, the USB interface module 101 is communicatively connected with an external computer, and is used for receiving control data sent by the computer...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an embedded trusted computing development device. The embedded trusted computing development device comprises a USB interface module and a central processing unit; the USB interface module is in communication connection with an outer computer, is used for receiving control data sent by the computer according to a communication protocol and supplies electricity for the device; the central processing unit is connected with the USB interface module and used for analyzing the control data, obtaining user commands and sequentially conducting judgment operations on the user commands, after corresponding file operations are conducted according to judgment results, corresponding response data are returned to the USB interface module, and the USB interface module sends the response data to the computer. According to the embedded trusted computing development device, guidance of development and debugging of a trusted computing security module and firmware are facilitated.

Description

technical field [0001] The invention relates to the technical fields of information security and trusted computing, in particular to an embedded trusted computing development device. Background technique [0002] The rapid development of computer and communication technology makes the status of information security increasingly important. The current information security technology mainly relies on the combination of strong cryptographic algorithms and keys to ensure the confidentiality and integrity of information, the uniqueness of entity identity and the non-repudiation of operations and processes. However, various password algorithms are not absolutely safe, and many users do not know how to set up these password protection mechanisms. More importantly, although these technologies can block hackers and virus attacks to a certain extent, they cannot prevent insiders from attacking Leakage, theft, tampering and destruction of key information. [0003] In order to improve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/71G06F21/85
Inventor 杨祎巍林伟斌赵云赖宇阳钱斌
Owner ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products