Encryption module and process trusted measurement method

An encryption module and process technology, which is applied in the direction of instruments, electronic digital data processing, platform integrity maintenance, etc., can solve the problems of time-consuming measurement process, inability to provide runtime guarantee, increase trust expansion uncertainty, etc.

Inactive Publication Date: 2017-04-19
深圳耀东安全科技有限公司
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] In order to ensure the credibility of the program, the system will frequently update the trust root and trust chain, which not only affects the processing efficiency of the system, but also increases the uncertainty in the process of trust expansion
[0012] Second, the measurement process is very time-consuming and has become a technical bottleneck for the widespread application of trusted computing
For example: based on a 10MB process, it takes about 40 minutes to transmit using a 1Mbps UART. From the perspective of use, this method is unacceptable
[0015] Third, simply static measurement of software files cannot solve the trust chain damage caused by software upgrades
However, software must be upgraded and updated inevitably, and this will inevitably cause the trust chain of the software to be destroyed. It can only provide guarantees at loading time, but cannot provide guarantees at runtime

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption module and process trusted measurement method
  • Encryption module and process trusted measurement method
  • Encryption module and process trusted measurement method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0037] figure 1 A structural diagram of an encryption module provided by an embodiment of the present invention is shown.

[0038] In one of the examples, the module is mainly installed on the terminal motherboard of the host machine, such as a PC or a mobile terminal, and mainly performs trustworthiness measurement on the application process, by measuring the user measurement value of the process, the process image measurement value, and the process feature measurement value Checksum comparison to monitor the integrity of the application process. Processes that pass the credible measurement will...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a trusted computing technology, in particular to an encryption module and a process trusted measurement method. The encryption module includes interfaces, an algorithm module, a protocol verification module, a process verification module, and a storage module. The encryption module is mainly arranged on a terminal main board of a host machine such as a PC terminal or a mobile terminal, and is used for performing trusted measurement on an application process of a host system, and monitoring the integrity of the application process by verification and comparison of the a process user measurement value, a process image measurement value, and a process feature measurement value. The host machine uses the verification and comparison result of the process measurement value as a basis so as to determine whether a process is loaded or operated, virus processes and virus infection processes cannot pass trusted measurement and will not be loaded, processes which are infected by a virus will be stopped, and virus spread and attacks can be avoided.

Description

technical field [0001] The patent of the present invention relates to the field of trusted computing, in particular, the present invention relates to an encryption module and a method for measuring process trustworthiness. Background technique [0002] The Trusted Computing Group TCG proposed the process of computer trusted startup and the method of credibility measurement. The basic idea is: first build a trust root, and then build a trust chain, starting from the trust root to the hardware platform, to the operating system, and then to To the application, one level of authentication, one level of trust, so as to extend this trust to the entire computer system. [0003] In the actual establishment and dissemination of the chain of trust, the root of trust first measures the integrity of the hardware boot system BIOS, saves the measurement results, and then passes the control right to the BIOS; the BIOS performs initialization operations, measures the integrity of the master...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/575
Inventor 陈德元高振铁
Owner 深圳耀东安全科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products