A trusted computing platform architecture

A platform architecture and trusted computing technology, applied in computing, platform integrity maintenance, computer security devices, etc., can solve problems such as poor defense capabilities, long measurement time, and low efficiency of operating system trusted startup, so as to improve defense capabilities , The effect of application security

Inactive Publication Date: 2019-02-12
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +1
View PDF12 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is to overcome the fact that the trusted computing platform in the prior art needs to measure all the start-up information in the operating system before determining whether to start the operating system, which takes a long time to measure and makes the operating system credible The startup efficiency is low, and there are hidden dangers in the security of the existing trusted computing platform, and its defense ability against abnormal startup methods such as external intrusion is poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A trusted computing platform architecture
  • A trusted computing platform architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0020] In the description of the present invention, it should be noted that the terms "first", "second", "third" and "fourth" are used for description purposes only, and should not be understood as indicating or implying relative importance.

[0021] In the description of the present invention, it should be noted that unless otherwise specified and limited, the terms "installation", "connection" and "connection" should be understood in a broad sense, for example, it can be a fixed connection or a detachable con...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a trusted computing platform architecture, comprising a trusted chip, a processor, a memory chip, and a communication gating circuit. The trusted chip, the processor, and the memory chip are respectively communicatively connected with the communication gating circuit. The trusted chip is communicatively connected with the processor and sends a reset signalto the processor to control the processor to enter a reset state. The trusted chip sends a communication direction control signal to the communication strobe circuit to control the memory chip to communicate with the trusted chip or the processor. The trusted chip calls the data to be measured of the operating system to be started from the memory chip and the processor to carry out the trustworthiness amount, and controls the trusted startup of the operating system to be started according to the measurement result. By implementing the invention, a secure computing platform with self-immunity is constructed, and the state of the processor is directly controlled. The trusted computing platform architecture can also measure the startup process of the operating system, improve the defensive ability of the operating system and provide security for the application.

Description

technical field [0001] The invention relates to the field of trusted computing platforms, in particular to a trusted computing platform architecture. Background technique [0002] Confidentiality, integrity and availability are the goals pursued by computer security. Confidentiality ensures that access to sensitive information is restricted to certain special groups. Integrity ensures that information will not be tampered with arbitrarily, and reflects people's trust in information. Availability refers to the expected ability of people to use information resources. With the rapid development of computer technology, the number of computer attacks is increasing every year, and the number of attacks is becoming more and more frequent. With the research and development of computer viruses, backdoors and Trojan horses, computer security is facing more and more challenges. The customization and bottom layer of malicious programs make the traditional antivirus software based on...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/575G06F21/577G06F2221/034
Inventor 赵保华高昆仑王树才王志皓
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products