A key usage method
A key and user technology, applied in the field of computer security, can solve problems such as security risks, theft and information tampering
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0042] Based on the above computer system, this embodiment proposes a method for using a key, the flow chart of which is as follows figure 1 As shown, the method includes the following steps:
[0043] Step 1: The TPCM security chip starts up before the computer system is powered on.
[0044] Specifically, the TPCM chip is developed based on a chip that supports national secret algorithms, and has abundant storage resources and efficient memory access capabilities inside.
[0045] Specifically, the purpose of starting the TPCM security chip prior to power-on of the computer system is to perform active security measures on key parts of the computer system to ensure security.
[0046] Step 2: Decrypt the key encrypted and protected by the TPCM key management mechanism into the on-chip storage area for use.
[0047] Specifically, the key usage and delivery process in the TPCM is as follows figure 2 As shown, when it is necessary to use the TPCM security chip to carry out opera...
Embodiment 2
[0055] Corresponding to the key usage method in Embodiment 1, this embodiment proposes a key generation method, the key transfer process is as follows figure 2 As shown, the flow chart of the key generation method is as follows image 3 Shown:
[0056] Step 1: The TPCM security chip starts up before the computer system is powered on.
[0057] Specifically, the TPCM chip is developed based on a chip that supports national secret algorithms, and has abundant storage resources and efficient memory access capabilities inside.
[0058] Specifically, the purpose of starting the TPCM security chip prior to power-on of the computer system is to perform active security measures on key parts of the computer system to ensure security.
[0059] Step 2: In the TPCM key generation stage, generate a plaintext key and send it to the on-chip storage area of TPCM.
[0060] Specifically, the key generated in the key generation stage is used to perform active security measurement on key par...
Embodiment 3
[0069] The present invention also proposes a trusted control method based on a trusted hard disk, characterized in that the method includes:
[0070] Step 1. Power on the trusted hard disk, use the TPCM module embedded in the hard disk chip in the trusted hard disk to measure other hardware in its system, if the measurement result of the other hardware is normal, then enter step 2, if If the measurement result of the other hardware is abnormal, then alarm;
[0071] Step 2. Power on the other hardware, start the system where the trusted hard disk is located, measure the software in the system where the trusted hard disk is located, if the measurement result of the software is normal, then enter step 3, if If the measurement result of the software is abnormal, then report to the police;
[0072] Step 3. The system where the trusted hard disk is located runs normally. When the system where the trusted hard disk is located performs read / write operations on the trusted hard disk, ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


