Measuring method, equipment and system based on trusted high-speed encryption card

An encryption card and equipment technology, applied in the transmission system, digital transmission system, secure communication device, etc., can solve the problem of not being able to ensure the active measurement of the platform system at the same time

Active Publication Date: 2020-02-14
ALIBABA GRP HLDG LTD
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The embodiment of the present application provides a measurement method, device and system based on a trusted high-speed encryption card, to at least solve the problem that the trusted se

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Measuring method, equipment and system based on trusted high-speed encryption card
  • Measuring method, equipment and system based on trusted high-speed encryption card
  • Measuring method, equipment and system based on trusted high-speed encryption card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] According to the embodiment of the present application, an embodiment of a measurement method based on a trusted high-speed encryption card is provided. It should be noted that the steps shown in the flow chart of the accompanying drawing can be implemented in a computer system such as a set of computer-executable instructions and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0051] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. figure 2 It shows a hardware structure block diagram of a computer terminal (or mobile device) for realizing the measurement method based on the trusted high-speed encryption card. Such as figure 2 As shown, the computer terminal 20 (or mobile device 20) may include one or more (202a, 202b, . or a pr...

Embodiment 2

[0123] According to the embodiment of the present application, an embodiment of a measurement method based on a trusted high-speed encryption card is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawing can be implemented in a computer such as a set of computer-executable instructions system, and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0124] Under the above operating environment, this application provides such Figure 6 Metrics based on trusted high-speed encryption cards shown.

[0125] Specifically, the above-mentioned trusted high-speed encryption card may be the same as the trusted high-speed encryption card in Embodiment 1, and details are not described here.

[0126] Figure 6 It is a flowchart of a measurement method based on a trusted high-speed encryption card according to Embodiment 2...

Embodiment 3

[0191] According to an embodiment of the present application, a measurement device based on a trusted high-speed encryption card for implementing the above-mentioned measurement method based on a trusted high-speed encryption card is also provided, such as Figure 9 As shown, the device 900 includes: a first measurement module 902 , a loading module 904 and a control module 906 .

[0192] Among them, the measurement module 902 is used to actively measure at least one firmware in the device by the BIOS when the integrity measurement result of the trusted security chip on the BIOS is that the integrity is not damaged; the loading module 904 is used to actively measure the firmware in the device by the BIOS. When the integrity of one or more firmwares is not damaged, load one or more firmwares; the control module 906 is used to prohibit starting the device when the integrity of one or more firmwares in the BIOS active measurement device is damaged The system or control system ent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a measurement method, equipment and system based on a trusted high-speed encryption card. The method comprises the steps: under the condition that the integrity measurement result of a trusted security chip on a BIOS is that the integrity is not damaged, enabling the BIOS actively to measure at least one piece of firmware in equipment; loading the one or more pieces of firmware under the condition that the integrity of the one or more pieces of firmware which is in the equipment and is actively measured by the BIOS is not damaged; in the event that the integrity of oneor more pieces of firmware which is in the equipment and is actively measured by the BIOS is broken, prohibiting the system of a boot device or the control system from entering a non-secure mode. The technical problem that in the integrity measurement process of a trusted security chip in the prior art, active measurement of a platform system and loading measurement of cryptographic operation cannot be guaranteed at the same time when equipment is started is solved.

Description

technical field [0001] This application relates to the field of trusted computing, in particular, to a measurement method, device and system based on a trusted high-speed encryption card. Background technique [0002] Measurement is a technical means used to protect the integrity of the platform and system: at certain specific moments, the target is measured to obtain some information of the target (such as the hash value of the file), and the value of this information is compared with the prior Compared with the recorded standard value, it can be judged whether the integrity of the target is damaged. [0003] At present, there are two types of trusted computing, the Trusted Platform Control Module (TPCM) in China and the Trusted Platform Module (TPM) of the international TCG (Trusted Computing Group, full name Trusted Computing Group) standard organization. The technical route and the corresponding trust chain construction method are as follows: [0004] For the construct...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/72
CPCG06F21/72H04L9/0897H04L9/0643G06F21/575G06F21/572G06F21/64G06F2221/033G06F9/4401H04L9/3234
Inventor 付颖芳肖鹏
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products