An Authorization Protocol for Trusted Platform Control Module

A platform-controlled and trusted technology, applied in the field of information security, can solve problems such as low resource utilization efficiency and inability to reuse, and achieve the effect of ensuring identity legitimacy, protecting integrity and privacy

Active Publication Date: 2019-09-03
BEIJING KEXIN HUATAI INFORMATION TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] The original AP protocol framework is similar to the OSAP protocol, which is related to the entity. Every time a session is created, the authorization data of the entity needs to be used to generate the session temporary key, which cannot be reused between different entities.
This makes resource utilization inefficient in the application scenarios facing the OIAP protocol, which is a disadvantage for chips with scarce resources.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Authorization Protocol for Trusted Platform Control Module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The specific implementation manners of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0056] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0057] When an external entity uses an object inclusion stored outside the TPCM (when the internal object of the TPCM is not in use, it is generally stored outside the TPCM in an encrypted form...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an authorization protocol for a trusted platform control module. A method comprises the steps that an external caller sets a flag ifCreateKey, and an AP session between the external caller and the trusted platform control module is established; the external caller calls the AP session and performs a command TPCM_Example of the trusted platform control module, if the attribute value of the ifCreateKey is FLASE, integrity verification is carried out on interaction data between the external caller and the trusted platform control module by employing authData, and if the attribute value of the ifCreateKey is TRUE, encryption / decryption and integrity verification are carried out on interaction data between the external caller and the trusted platform control module by taking a temporary sessionKey as a key; and the external caller performs a TPCM_AP_TERMINATE command, and the AP session is finished. According to the method provided by the invention, three kinds of different application scenes such as object-independent, object-specific and authorization data inplant can be satisfied. The integrity and confidentiality in the data transmission process can be ensured. Access control can be carried out on an external entity. The external entity is prevented from carrying out unauthorized access and usage on sensitive data in the TPCM.

Description

technical field [0001] The invention relates to the field of information security, in particular to an authorization protocol for a trusted platform control module. Background technique [0002] TPM is a trusted computing chip designed by TCG International Trusted Computing Alliance, and its authentication mechanism is similar to that of my country's TPCM. In order to achieve authorized access to resources, TPM executes a series of well-designed protocols to resist various forms of attacks, namely authorization protocols. The purpose of the authorization agreement is to prove to the TPM that the visitor has the right to access this object through the specified function. Authorization is mainly for TPM commands that may affect security, privacy, or expose platform secrets. The basis for verification comes from a shared secret - authorization data (AuthData). [0003] There are three authorization protocols that securely transfer authorization data from the visitor to the T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 孙瑜孙悦李万兴姜殊佳姜林剑
Owner BEIJING KEXIN HUATAI INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products