Static measurement method and device for trusted computing platform based on dual-system architecture

A technology of architecture and trusted computing, applied in the field of Internet security, can solve the problems of no solution, no way to play, failure to prevent Wannacry ransomware attack, etc., to achieve the effect of improving computer security

Active Publication Date: 2019-10-15
BEIJING KEXIN HUATAI INFORMATION TECH
View PDF7 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the TPM is essentially just a passively mounted external device on the computer. It will only function when it is called by the host program. Once the host is controlled by the attacker, the TPM will not be able to play its role, resulting in TCG's trusted computing architecture. When hackers exploit computer system logic flaws to attack, it is basically difficult to resist. For example, Windows 10 fully implements TCG's trusted computing architecture, but it fails to prevent the Wannacry ransomware attack
[0005] In addition, the trusted computing platform implemented by TPM is essentially a single system architecture, and TPM has limitations in accessing and controlling computer resources.
Moreover, TPM can only statically measure resources such as computer firmware and executable programs, and cannot dynamically measure application execution and the execution environment it depends on.
[0006] For the trusted computing platform implemented by TPM is essentially a single system architecture, TPM’s firmware and executable programs and other resources are statically measured, and it is impossible to dynamically measure application execution and the execution environment it depends on. , control has limitations, the security capability of TPM is completely dependent on the security of the host system
[0007] For the above problems, no effective solution has been proposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Static measurement method and device for trusted computing platform based on dual-system architecture
  • Static measurement method and device for trusted computing platform based on dual-system architecture
  • Static measurement method and device for trusted computing platform based on dual-system architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make those skilled in the art better understand the solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only Embodiments are part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0031] It should be noted that the terms "first", "second" and the like in the description and claims of the present invention and the above drawings are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used may be interchanged under appropriate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a static measurement method and device for a trusted computing platform based on a dual-system architecture. The method comprises the steps that when a computer is powered on,hardware resources of the computer are divided into protection hardware resources and calculation hardware resources, the calculation hardware resources allow the protected hardware resources to access and cannot access the protection hardware resources, the protection hardware resources are used for operating a protection subsystem, and the calculation hardware resources are used for operating acalculation subsystem; and the protection hardware resources are controlled to be started before the computing hardware resource, and he starting stage of the computing hardware resources is measuredin the process of starting the computing subsystem by the computing hardware resources. According to the invention, the technical problem of relatively low computer security in related technologies issolved.

Description

technical field [0001] The invention relates to the field of Internet security, in particular to a static measurement method and device for a trusted computing platform based on dual architectures. Background technique [0002] The current cyberspace is extremely fragile. Stuxnet, ransomware (such as Wannacry), Mirai virus and other cyber attacks that have caused great impact emerge in endlessly and become increasingly rampant. The problem is that blindly adopting the "blocking and killing" passive defense methods represented by "firewall", "virus scanning and killing", "intrusion detection" and so on is hard to defend against, especially in the face of attacks aimed at the vulnerabilities of the target system. Unable to defend effectively. [0003] The trusted computing chip TPM proposed by the international TCG organization (English full name Trusted Computing Group, Chinese name Trusted Computing Organization) is used as an external device of a computer. Static measurem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F21/57H04L29/06
CPCG06F21/56G06F21/57G06F21/572G06F21/577H04L63/1433H04L63/1441
Inventor 孙瑜王强王涛洪宇
Owner BEIJING KEXIN HUATAI INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products