Trusted computing terminal integrity measuring and proving method and device

A technology of integrity measurement and trusted computing, applied in platform integrity maintenance, internal/peripheral computer component protection, electrical digital data processing, etc., and can solve problems such as application program failure

Active Publication Date: 2016-05-25
成都三零嘉微电子有限公司
View PDF2 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, when performing code measurement, the page table mechanism and all interrupts are disabled, causing other applications to fail to run

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted computing terminal integrity measuring and proving method and device
  • Trusted computing terminal integrity measuring and proving method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] All features disclosed in this specification, or steps in all methods or processes disclosed, may be combined in any manner, except for mutually exclusive features and / or steps.

[0058] Any feature disclosed in this specification, unless specifically stated, can be replaced by other equivalent or similar purpose alternative features. That is, unless expressly stated otherwise, each feature is one example only of a series of equivalent or similar features.

[0059] Relevant description of the present invention:

[0060] The measurement proxy module calls the trusted cryptographic module TCM to measure the application program: the measurement proxy module is a section of OS kernel program, and the programming of this program should refer to the relevant trusted cryptographic module interface specifications of the State Administration of Commercial Secrets.

[0061] The present invention includes: 1) Integrity measurement (refer to steps 1, 2, 3) and proof phase (refer t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of trusted computing, and particularly provides a terminal integrity detecting and proving method and device based on trusted computing for solving problems in the prior art. On the condition of not increasing additional hardware requirements and special instructions, an isolated and safe integrity dynamic measurement environment is built for an application program, and parallel barrier-free operation of other application programs in the measurement process is ensured. In the integrity proving process, the actual measurement value of each component in a computing terminal is concealed, and the problem that a hacker decode the version, configuration, firmware and other information of the terminal through the actual measurement values is effectively prevented; when the trusted computing terminal is subjected to integrity detection, extension integrity measurement values and the total measurement frequency stored in a platform configuration register PCR are sent to a verifier after being signed, and the verifier can detect the integrity of the trusted computing terminal by executing hash operation.

Description

technical field [0001] The invention relates to the field of trusted computing, in particular to a method and device for measuring and proving the integrity of a trusted computing terminal. Background technique [0002] With the rapid development and in-depth application of computer network technologies such as cloud computing, Internet of Things, and mobile Internet, the three most prominent security threats are malicious code attacks, illegal information theft, and illegal destruction of data and systems. Information-targeted malicious code attacks surpass traditional viruses as the biggest security threat. [0003] Traditional network security protection methods such as firewalls, intrusion detection, virus defense, and network isolation all focus on passively protecting the information security of networks and servers. The relatively fragile terminal has increasingly become a weak link in the security of information systems. In response to these system security require...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/71
CPCG06F21/57G06F21/71G06F2221/034
Inventor 李雨励
Owner 成都三零嘉微电子有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products