Unlock instant, AI-driven research and patent intelligence for your innovation.

A key usage method

A key and user technology, applied in the field of computer security, can solve problems such as security risks, theft and information tampering

Active Publication Date: 2021-01-08
BEIJING KEXIN HUATAI INFORMATION TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The active security measurement operation in the trusted computing technology is realized through the TPCM chip, and the TPCM chip often goes through multiple rounds of identity authentication processes in the process of realizing the active security measurement. However, in the prior art, the TPCM chip is used to implement key There are many security risks in the method of storage and use, and there are risks of theft and information tampering

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A key usage method
  • A key usage method
  • A key usage method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] Based on the above computer system, this embodiment proposes a method for using a key, the flow chart of which is as follows figure 1 As shown, the method includes the following steps:

[0043] Step 1: The TPCM security chip starts up before the computer system is powered on.

[0044] Specifically, the TPCM chip is developed based on a chip that supports national secret algorithms, and has abundant storage resources and efficient memory access capabilities inside.

[0045] Specifically, the purpose of starting the TPCM security chip prior to power-on of the computer system is to perform active security measures on key parts of the computer system to ensure security.

[0046] Step 2: Decrypt the key encrypted and protected by the TPCM key management mechanism into the on-chip storage area for use.

[0047] Specifically, the key usage and delivery process in the TPCM is as follows figure 2 As shown, when it is necessary to use the TPCM security chip to carry out opera...

Embodiment 2

[0055] Corresponding to the key usage method in Embodiment 1, this embodiment proposes a key generation method, the key transfer process is as follows figure 2 As shown, the flow chart of the key generation method is as follows image 3 Shown:

[0056] Step 1: The TPCM security chip starts up before the computer system is powered on.

[0057] Specifically, the TPCM chip is developed based on a chip that supports national secret algorithms, and has abundant storage resources and efficient memory access capabilities inside.

[0058] Specifically, the purpose of starting the TPCM security chip prior to power-on of the computer system is to perform active security measures on key parts of the computer system to ensure security.

[0059] Step 2: In the TPCM key generation stage, generate a plaintext key and send it to the on-chip storage area of ​​TPCM.

[0060] Specifically, the key generated in the key generation stage is used to perform active security measurement on key par...

Embodiment 3

[0069] The present invention also proposes a trusted control method based on a trusted hard disk, characterized in that the method includes:

[0070] Step 1. Power on the trusted hard disk, use the TPCM module embedded in the hard disk chip in the trusted hard disk to measure other hardware in its system, if the measurement result of the other hardware is normal, then enter step 2, if If the measurement result of the other hardware is abnormal, then alarm;

[0071] Step 2. Power on the other hardware, start the system where the trusted hard disk is located, measure the software in the system where the trusted hard disk is located, if the measurement result of the software is normal, then enter step 3, if If the measurement result of the software is abnormal, then report to the police;

[0072] Step 3. The system where the trusted hard disk is located runs normally. When the system where the trusted hard disk is located performs read / write operations on the trusted hard disk, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a secret key using method. The method is used for adding a security key management function to a TPCM security chip in a computer system. When the TPCM needs to be used in a computer system to realize user identity authentication operation, the original information of the secret key is decrypted from the off-chip NandFlash to the on-chip storage area for user identity authentication, and compared with the use of the secret key in the plaintext in the off-chip SRAM, the use of the plaintext secret key in the on-chip storage area is safer.

Description

technical field [0001] The invention relates to the field of computer security, in particular to a method for using a key. Background technique [0002] The purpose of trusted computing technology is to determine identity, use keys for storage protection, and secure measurement operations for authentication. The basic idea is to first establish a root of trust in the computer system, and then establish a chain of trust, one level of measurement and certification, one level of trust, one level of trust, and extend the trust relationship to the entire computer system, thereby ensuring the credibility of the computer system. Specifically, the chip first measures the integrity of the current underlying firmware, and if correct, completes normal system initialization. Then the underlying firmware measures the integrity of the basic input and output system. If it is correct, the BIOS will continue to measure the integrity of the operating system. If it is correct, the operating s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/72G06F21/60
CPCG06F21/602G06F21/72
Inventor 孙瑜杨秩洪宇王强
Owner BEIJING KEXIN HUATAI INFORMATION TECH