Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Trusted Computing Platform with Parallel Dual Architecture of Computing and Protection

A technology of trusted computing and architecture, applied in the field of trusted computing, can solve the problems of failure to prevent Wannacry ransomware virus attack, failure to realize computer dynamic measurement, and inability to play, so as to achieve the effect of active defense

Active Publication Date: 2020-03-20
北京自主可信科技有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, TPM is essentially just a passively mounted external device on the computer. It will only function when it is called by the host program. Static measurement does not implement policy-based dynamic measurement when the computer is running, so the trusted computing architecture of TCG is basically difficult to resist when hackers use computer system logic flaws to attack. For example, Windows 10 fully realizes the trusted computing architecture of TCG. Computing architecture, but failed to prevent Wannacry ransomware attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Trusted Computing Platform with Parallel Dual Architecture of Computing and Protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0035] At present, the trusted computing chip TPM proposed by the international TCG organization is used as an external device of the computer. There are limitations in access and control, and its security capabilities are completely dependent on the security of the host system. It is difficult to defend against attacks by hackers who exploit the vulnerabilities of the host system, and it cannot substantially improve the active defense capabilities of the computer system.

[0036] The invention proposes a trusted computing platform with parallel dual architecture of computing and protection. The trusted computing platform includes parallel computing subsystems and protection subsystems. The protection subsystem and the computing subsystem are running in parallel, and their safety and reliability do not depend on the computing subsyste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a trusted computing platform of a computing and protection parallel double-system structure. wherein the trusted computing platform comprises a computing subsystem and a protection subsystem which are parallel, the computing subsystem is used for completing a computing task, and the protection subsystem is used for carrying out active measurement and active control on the computing subsystem according to a trusted strategy through a trusted platform control module; And the protection subsystem is specifically used for respectively carrying out static measurement and dynamic measurement on the computing subsystem through the trusted software base. According to the trusted computing platform provided by the invention, active safety protection is realized while computing is realized through the computing subsystem and the protection subsystem which are parallel to each other. In addition to establishing a static trust chain which takes a trusted platform control module as a trust root for step-by-step measurement, a dynamic measurement mechanism based on a security trusted strategy is also designed, and active defense on the whole computer system in the starting and operating processes of the computer is realized.

Description

technical field [0001] The invention relates to the technical field of trusted computing, in particular to a trusted computing platform with parallel dual architecture of computing and protection. Background technique [0002] The current cyberspace is extremely fragile, and cyberattacks such as Stuxnet, Wannacry, and Mirai that have caused great impacts emerge in endlessly and become increasingly rampant. The root cause is that the problem is not addressed from the root causes of network security risks, and the passive defense methods of "blocking and killing" represented by "firewall", "virus scanning and killing" and "intrusion detection" are blindly adopted, which is hard to prevent , especially in the face of attacks launched against the vulnerabilities of the target system, it is impossible to effectively defend at all. [0003] In order to solve the problems faced by the current cyberspace security, the international TCG organization has proposed a method of trusted ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
Inventor 沈昌祥孙瑜洪宇王涛
Owner 北京自主可信科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products