Trusted computing cryptogram platform suitable for general computation platform of electric system

A technology of trusted computing and general computing, applied in the field of trusted computing, can solve problems such as inability to actively defend, actively defend, and insecure information systems, so as to reduce the risk of being destroyed and tampered, and ensure safe and stable operation.

Active Publication Date: 2016-04-06
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +5
View PDF4 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The root cause of the insecurity of the information system is due to the simplification of the PC structure and the lack of verification of the processes and programs in the system, resulting in the arbitrary execution of executable programs and processes without authorization and the implementation of malicious behaviors, while traditional firewalls, anti-viruses, IDS are mainly based on peripheral blocking and post-upgrade virus code base, and cannot actively defend and actively defend

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted computing cryptogram platform suitable for general computation platform of electric system
  • Trusted computing cryptogram platform suitable for general computation platform of electric system
  • Trusted computing cryptogram platform suitable for general computation platform of electric system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The specific embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0045] When the system starts, the trusted chip first measures the integrity of the BIOS, and compares the measurement result with the expected value collected during the initial operation of the system and stored in the trusted chip. If the results are consistent, it shows that the BIOS has not been tampered with and is credible. The measurement code in the BIOS will measure the OSLoader (including the master boot sector MBR, the operating system boot sector, etc.), when it is determined that the OSLoader is credible Next, execute the loader of the operating system. Before loading the operating system, OSLoader first measures the operating system and trusted computing cryptographic platform, and when it is judged to be credible, loads and executes the operating system and trusted computing cryptographic platform. After the operat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a trusted computing cryptogram platform suitable for a general computation platform of an electric system. The cryptogram platform comprises a trusted computing cryptogram module and a trusted software system, wherein the trusted computing cryptogram module comprises a trusted measurement root, a trusted storage root and a trusted report root and is a transferring starting point of a platform trust chain; and the trusted software system comprises a trusted computing cryptogram driving module, a measurement module and an auditing module and provides an interface which uses the trusted computing cryptogram platform for an operating system and application software. The trusted computing cryptogram module is the trusted root which provides trusted environment for the operation of the trusted computing cryptogram platform, and the trusted software system is a core for realizing the functions and the service of the trusted computing cryptogram platform and provides guarantee for the management of the trusted computing cryptogram platform. The trusted computing cryptogram platform can provide functions including static measurement, dynamic measurement, white lists, access control and the like for a business system, and manages the sources and the operation of the system software to guarantee that the software is trusted, recognizable and controllable.

Description

technical field [0001] The invention relates to the technical field of trusted computing, in particular to a trusted computing cryptographic platform suitable for a general computing platform of an electric power system. Background technique [0002] The root cause of the insecurity of the information system is due to the simplification of the PC structure and the lack of verification of the processes and programs in the system, resulting in the arbitrary execution of executable programs and processes without authorization and the implementation of malicious behaviors, while traditional firewalls, anti-viruses, IDS are all based on peripheral blocking and post-event upgrade of the virus code base, and cannot actively defend and actively defend. [0003] Trusted computing structurally solves the vulnerability problem brought about by the simplification of the personal computer architecture by introducing a trusted chip on the hardware. Based on the hardware chip, a complete c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/57
Inventor 李钊高翔苏大威霍雪松李云鹏郭子明张昊徐晓轶王东升张浩曹良晶王志皓
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products