A Power platform-based trusted computer design method and control and operation method

A platform control and design method technology, applied in the field of control operation, can solve problems such as considerations and restrictions on the development of information security

Active Publication Date: 2017-07-28
SHANDONG INTELLIGENT OPTICAL COMM DEV
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, there are relatively few application literatures on the trusted platform control module TPCM in computer design. For example, a trusted computing platform disclosed in a Chinese patent with the publication number CN101901319A and a trust chain transfer verification method are only authorized by the trusted platform control module TPCM. The CPU performs chain measurement on the trusted computing platform and can defend against TOUTOC attacks, but does not consider the trusted platform control module TPCM, baseboard management controller module BMC, central processing unit module CPU, baseboard management controller firmware ( BMC firmware) and the central processing unit CPU firmware trust measurement problem, there is a network security problem of passive one-sided defense, which in turn restricts the development of information security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Power platform-based trusted computer design method and control and operation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] Such as figure 1 As shown, as a preferred best implementation mode, it includes the following steps:

[0042] The design method of the trusted computer based on the Power platform, the trusted computer based on the Power platform includes a power supply PowerOn, a trusted platform control module TPCM, a baseboard management controller module BMC, a central processing unit module CPU, and a baseboard management controller firmware (BMC firmware), CPU firmware of the central processing unit, set the TPCM power domain as the first startup power domain of the system, the BMC power domain of the system standby power domain, and the CPU power domain as the system running power domain, the Power platform-based The method for controlling and operating a trusted computer includes the following steps:

[0043] 1) After the trusted computer system based on the Power platform only powers on the power supply of the TPCM power domain 7 P1 through the power supply PowerOn 1, the firs...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a Power platform-based trusted computer design method and control and operation method. A trusted computer comprises a power source (PowerOn), a trusted platform control module (TPCM), a base-board management controller module (BMC), a central processing unit module (CPU), base-board management controller firmware (BMC firmware), and central processing unit firmware. When the system power source (PowerOn) is electrified, the trusted platform control module (TPCM) starts automatically and controls other module power sources of the system. By performing trust measurement on modules, measurement for the base-board management controller module (BMC) and the system PNOR and control to a power source of the base-board management controller module (BMC) and the system power source are achieved, so that problems about computer terminal and network security are solved from the bottom layer, the reliability is improved and workload of software is reduced.

Description

technical field [0001] The invention relates to the technical field of trusted computer design, in particular to a design method and a control operation method for a trusted computer based on a Power platform. Background technique [0002] The 21st century is the era of information and the era of rapid development of information security technology. On the one hand, the rapid development of the information technology industry has brought huge benefits and convenience to people. On the other hand, we are also facing the severe test of various incidents where information security is compromised. The high pile of firewalls and layers of intrusion detection are just passive defenses. People gradually realize that only by solving the hidden dangers of computer terminals can the bottleneck of information security be broken. Therefore, the information security of the source computer must be ensured. And this must take comprehensive measures from the chip, hardware structure and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
Inventor 韩文汉江涛王宾钱天柱
Owner SHANDONG INTELLIGENT OPTICAL COMM DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products