Computer security starting method based on heterogeneous multi-core chip

A computer security and heterogeneous multi-core technology, which is applied in the field of computer security boot based on heterogeneous multi-core chips, can solve the problems of hidden dangers of sensitive information, inability to fully grasp, and no security of the platform at all, so as to achieve the effect of guaranteeing safe boot

Inactive Publication Date: 2018-08-28
PEKING UNIV
View PDF7 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Second, after the computer is powered on, the first part of the code executed as the trust root of the trust chain is unconditionally trusted, so if the trust root is attacked, the entire platform is still insecure
Third, the current most popular processors are basically x86 architecture, and its core technology is controlled by Intel Corporation. We cannot fully grasp the behavior of this processor, which is also a hidden danger to our sensitive information.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer security starting method based on heterogeneous multi-core chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The technical solutions of the present invention will be described in further detail below with reference to the accompanying drawings and preferred embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, and are not used to limit the technical solutions of the present invention.

[0021] like figure 1 shown is an architecture diagram of an embodiment of a computer security boot method based on heterogeneous multi-core chips of the present invention, wherein:

[0022] The trusted core is the Unicore processor with independent intellectual property rights of the Microprocessor R&D Center of Peking University as an example.

[0023] The untrusted core is an x86 architecture processor.

[0024] In terms of hardware division, the TPM must be exclusively owned by the trusted core, and the division of other sensitive resources can be different according to the specific implementation. The GPIO is s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer security starting method based on a heterogeneous multi-core chip. The method includes: using at least one trusted core on the basis of a heterogeneous multi-core platform to ensure security of an untrusted core. The trusted core is used as a monitoring core, and the untrusted core is used as a computing core; the trusted core and the untrusted core are heterogeneous, and a CPU core with independent intellectual property is a first choice of the trusted core. The trusted core and the untrusted core are isolated by hardware, and sensitive hardware resources are collected to the trusted core. The trusted core is communicated with the untrusted core through cooperation of shared memory and inter-core interruption. The trusted core is guided by adopting a self-developed system, and provides security services outwards, and the untrusted core is guided by adopting a UEFI (Unified Extensible Firmware Interface) system. A core of the method is to ensure the security of the untrusted core on the basis of the heterogeneous multi-core platform through the trusted core. Realization of the method is not limited by specific platforms and starting manners, and the method can be applied simply with the need for satisfying basic requirements.

Description

technical field [0001] The invention relates to the technical field of modern computer safe booting, in particular to a computer safe booting method based on heterogeneous multi-core chips. Background technique [0002] With the development of information technology, computers have become an indispensable part of our daily life, but it brings information services to people and also brings threats to information security, especially in the defense industry, aerospace, etc. important areas, this is even more prominent. At present, various computer viruses emerge in an endless stream, and trusted computing has also become a research hotspot of computers. However, most of the current research on trusted computing focuses on the operating system level, that is, how to kill viruses and resist attacks after the computer starts the operating system. There is little research on the process, which leads to the lack of effective solutions for BIOS (Basic Input Output System) attacks. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/575
Inventor 程旭张国威管雪涛陆俊林
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products