Security chip-based trusted startup method

A security chip and secure boot technology, applied in computer security devices, instruments, platform integrity maintenance, etc. problems, to achieve the effect of simplifying the difficulty of hardware design, reducing the difficulty of development, and reducing overhead

Active Publication Date: 2018-08-14
广东为辰信息科技有限公司
View PDF4 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method requires one-time programming of the loaded entities, and cannot achieve normal system updates
At the same time, this method does not take into account the possibility of physical attacks such as scanning phys

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security chip-based trusted startup method
  • Security chip-based trusted startup method
  • Security chip-based trusted startup method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0034] Example

[0035] figure 1 It is a flowchart of a specific implementation manner of a trusted boot method based on a secure chip of the present invention. Such as figure 1 As shown, the specific steps of the secure chip-based trusted boot method of the present invention include:

[0036] S101: BootLoader division:

[0037] Boot Loader is a program that runs before the operating system kernel runs. Through this program, hardware devices can be initialized and a map of memory space can be established to bring the system's software and hardware environment to a proper state for the final call operation The system kernel prepares the correct environment. In the present invention, according to the different functions of each part in the safe boot process, the BootLoader is divided into 6 parts, namely BL1 program, BL2 program, BL30 program, BL31 program, BL32 program, BL33 program, and BL1 program is used for setting Exception vector table, initialize cpu, set mmu, set control re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security chip-based trusted startup method. The method comprises the steps of dividing a BootLoader into 6 parts; based on digital signatures, making mirror images of the 6 parts; storing the key mirror images in a security chip; loading the mirror images of the 6 parts in sequence; performing completeness verification after the mirror images are loaded; and after the completeness verification is passed, starting a boot process of Linux. Key data is stored by using the security chip on the basis of ensuring the credibility of trusted chain startup by adopting the digital signature and the completeness verification, so that the startup credibility can be effectively improved.

Description

technical field [0001] The invention belongs to the technical field of mobile intelligent terminal security, and more specifically, relates to a trusted startup method based on a security chip. Background technique [0002] The security of hardware structure and operating system is the basis of information system security. At present, for embedded system security problems, the existing solution is to introduce trusted computing technology, the main idea is to establish a root of trust and a chain of trust to ensure the integrity and security of the system. In the embedded system, the existing implementation methods of trusted computing technology are divided into two categories: one is to use the trusted platform module (trusted platform module, referred to as TPM) proposed by the trusted computing organization (trusted computing program, referred to as TCG) Communicate with the embedded CPU. The TPM is used as the root of trust, and the initial expected measurement value ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57G06F21/71
CPCG06F21/575G06F21/71
Inventor 肖堃罗蕾李允罗建超陈丽蓉陈虹桂盛霖
Owner 广东为辰信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products