Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A credibility measuring system and method

A technology of credibility and algorithms, applied in the field of information security, can solve the problems of lack of security design in Internet networks and computer security threats at all times, and achieve the effect of ensuring data integrity, highlighting substantive features, and ensuring data security

Pending Publication Date: 2019-04-30
SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because the Internet network lacks sufficient security design, computers in the network environment may be threatened by security at any time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A credibility measuring system and method
  • A credibility measuring system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Specific embodiments of the present invention will be described below in conjunction with the accompanying drawings.

[0039] Such as figure 1 The shown trusted measurement system includes: a computer and a security chip, the security chip is installed on the motherboard of the computer through the PCIE interface, the security chip accesses the BIOS of the computer through the motherboard, and is used to protect the BIOS and the operating system from being modified.

[0040] The security chip includes:

[0041] The management unit is used to manage the internal resources of the security chip;

[0042] The PCIE interface is used for communication between the security chip and the outside world and between physical units inside the security chip. The PCIE interface includes: PCIE X1 signal interface, motherboard reset signal interface and SPI signal interface;

[0043] Verification unit for integrity check and identification;

[0044] The authorization unit is used to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses and provides a credibility measuring system and method, the system is realized based on a domestic platform, the system has an independent hardware environment and a storage function, a security card adopts a PCIE interface, output signals comprise a bus data switching signal and a computer reset signal, and the security card is inserted into a PCIE slot special for a computer mainboard; the security card reads static data and dynamic data of the computer BIOS, checks and calculates the read static data and dynamic data through a certain algorithm and compares the readstatic data and dynamic data with a pre-stored check value, and if the read static data and dynamic data are inconsistent with the pre-stored check value, the computer is forbidden to be started; andif the verification result is passed, outputting an enable signal, setting a reset signal of the computer to be high, and starting the computer to start normally.

Description

technical field [0001] The present invention relates to the technical field of information security, and more specifically relates to a trusted measurement system and method. Background technique [0002] With the rise and development of the information industry, security and reliability have increasingly become the focus of attention. Especially in the computer field, the design of the computer architecture has considered security measures such as memory isolation protection mechanisms and program security protection mechanisms, but in order to enhance versatility, reduce complexity, and improve operating efficiency, the subsequent industrialization development process abandoned Many mature security mechanisms have resulted in the execution of programs in the computer architecture without authentication, and the data in programs and system areas can also be modified at will, so that viruses, Trojan horses, and malicious programs can take advantage of them. [0003] At the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/34
CPCG06F21/34Y02D10/00
Inventor 王圣南柴萍萍路永轲孙动
Owner SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products