Cluster system with credible data exchange and credible data exchange method
A technology of data exchange and cluster system, applied in the direction of data exchange network, data exchange details, digital transmission system, etc., can solve problems such as uncontrollable, middleware man attack, no TPM root of trust, etc., and achieve good reliability and reliability And the effect of improved controllability and small delay
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0038] In order to solve the problem of trusted data exchange between nodes in the cluster, refer to figure 1 , the present embodiment provides a trusted cluster system for data exchange, which includes:
[0039] Several nodes communicating with each other, these nodes are distributed in a broadcast domain;
[0040] Trusted root TPM, which is installed on the node and corresponds to the node one by one;
[0041] The trusted measurement agent, which runs independently on each node, is used to regularly broadcast trusted information in the domain and listen to trusted information broadcast by other nodes in the domain.
[0042] In this embodiment, the unique ID of the trusted root TPM is used as the unique ID of the node. Based on TPM, the trustworthiness of BIOS, Bootload and operating system should be guaranteed at least.
[0043] In this embodiment, the trusted measurement agent is a logically independent subsystem whose credibility is guaranteed by the TPM root of trust. ...
Embodiment 2
[0049] refer to figure 2 , a trusted cluster system for data exchange in this embodiment, including:
[0050] Several nodes communicating with each other, these nodes are distributed in at least two broadcast domains;
[0051] Trusted root TPM, which is installed on the node and corresponds to the node one by one;
[0052] The trusted measurement agent, which runs independently on each node, is used to periodically broadcast trusted information in the domain, listen to trusted information broadcast by other nodes in the domain, spread trusted information across domains, and receive and extract trusted information propagated by other domains.
[0053] In this embodiment, the unique ID of the trusted root TPM is used as the unique ID of the node. Based on TPM, the trustworthiness of BIOS, Bootload and operating system should be guaranteed at least.
[0054] In this embodiment, the trusted measurement agent is a logically independent subsystem whose credibility is guaranteed by...
Embodiment 3
[0063] This embodiment provides a trusted data exchange method, which is based on the trusted cluster system for data exchange as described in the first embodiment, and uses a trusted measurement agent running independently on each node to periodically broadcast trusted information in the domain and Listen to trusted information broadcast by other nodes in the domain.
[0064] In this embodiment, based on the root of trust TPM, each node operates a logically independent trusted measurement subsystem-trusted measurement agent, which realizes bypass monitoring; compared with the traditional technology that only relies on PKI, the cluster of this embodiment The reliability and controllability of data exchange in the system are significantly improved; each node regularly publishes its own node information to all nodes in the broadcast domain by means of broadcasting. Broadcasting will be discovered by other nodes in the same domain. If an illegal node accesses the cluster to prete...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

