Dependable computing unit based on homemade TCM and operation method thereof

A credible computing and credible technology, applied in computing, computer security devices, instruments, etc., can solve problems such as hardware integrity protection, malicious programs cannot be prevented, and operation security cannot be guaranteed, etc., to achieve wide system application potential, concurrent The effect of large working capacity and perfect functions

Inactive Publication Date: 2017-07-28
SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
View PDF5 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are the following defects in this patent: the patent only describes a trusted computing chip, which can only guarantee the security during the boot process, but cannot guarantee the security during the system operation.
However, there are the following defects in this patent: the patent only measures the BIOS and OS during the boot process and does not protect the integrity of the hardware of the platform; secondly, it only guarantees the data security during the system operation, and cannot prevent malicious programs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dependable computing unit based on homemade TCM and operation method thereof
  • Dependable computing unit based on homemade TCM and operation method thereof
  • Dependable computing unit based on homemade TCM and operation method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] A trusted computing unit based on domestic TCM, including a mechanical structure layer, a platform hardware layer, a firmware layer, an operating system layer, and a trusted software layer;

[0045] The mechanical structure layer includes the chassis, cooling system, and power supply; the firmware layer includes Kunlun firmware; the operating system layer includes the operating system; the platform hardware layer includes the backplane, the computing unit module, and the trusted password module; the trusted software layer includes the trusted application module, Trusted computing support module; such as figure 1 shown;

[0046] The trusted computing support module is a bridge for the trusted application module to access the trusted cryptographic module. The trusted application module uses the security functions provided by the trusted cryptographic module by calling the interface of the trusted software base and the trusted software service. The security functions inclu...

Embodiment 2

[0057] A kind of operation method of the trusted computing unit based on domestic TCM described in embodiment 1, comprises the steps as follows:

[0058] (1) After the system is turned on, measure the integrity of the BIOS of the whole machine;

[0059] (2) Authenticate users;

[0060] (3) Measure the integrity of optical drives, hard disks, graphics card hardware and key kernel files;

[0061] (4) After the integrity measurement is completed, the system loads, enters the login interface, and invokes the USBKey and TCM chip to complete the identity authentication together;

[0062] (5) The access control of files is realized through trusted file encryption and trusted file protection during system operation; illegal program interception and application program tampering are prevented through trusted program control;

[0063] (6) The trusted access control function is mainly to realize the access control of the client. By collecting and judging the software and hardware infor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a dependable computing unit based on a homemade TCM and an operation method thereof. The dependable computing unit comprises a mechanical structure layer, a platform hardware layer, a firmware layer, an operation system layer and a dependable software layer; the mechanical structure layer comprises a case, a heat dissipating system and a power source; the firmware layer comprises firmware; the operation system layer comprises an operation system; the platform hardware layer comprises a backboard, a computing unit module and a dependable code module; the dependable software layer comprises a dependable application module and a dependable computing supporting module. The dependable computing unit is complete in function, high in algorithm computing efficiency and large in concurrence work capacity; serving as the dependable computing unit, the unit can provide high-performance data encryption / decryption service for an information safety transmission system and serve as main code equipment and core member of a host data safety storage system, an identity authentication system and a symmetric and asymmetrical secret key management system, and has wide system application potentiality.

Description

technical field [0001] The invention relates to a trusted computing unit based on a domestic TCM and an operation method thereof, belonging to the technical fields of a domestic Godson computer, data encryption and decryption, identity verification and the like. Background technique [0002] With the outbreak of the "Prism Gate" incident, the country has paid more and more attention to the development of self-controllable domestic computers. In terms of hardware, my country has independently developed Godson 3A, 3B series CPU, Feiteng 1500A series CPU, Shenwei 4A series CPU and many other CPUs, which are close to ordinary intel processors in terms of performance, which can meet the normal office needs, and has developed corresponding CPUs. The core technology and mature technology of the motherboard. In terms of software, there have been self-developed BIOS (such as Kunlun, Baiao) and domestic operating systems represented by the winning Kirin, Galaxy Kirin, and Zhongke Fang...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/55
CPCG06F21/575G06F21/554
Inventor 冯磊李小敏郭猛善
Owner SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products