Supercharge Your Innovation With Domain-Expert AI Agents!

Method and device for realizing credible verification and security module

A security module, a reliable technology, applied in the direction of digital data authentication, generation of response errors, and redundancy in hardware for data error detection, etc. letter effect

Pending Publication Date: 2021-09-21
ALIBABA SINGAPORE HLDG PTE LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the basic requirements of network security graded protection are only a standard, and there is currently no feasible technical solution

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for realizing credible verification and security module
  • Method and device for realizing credible verification and security module
  • Method and device for realizing credible verification and security module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the purpose, technical solution and advantages of the application clearer, the embodiments of the application will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0052] In a typical configuration of the present application, a computing device includes one or more processors (CPUs), input / output interfaces, network interfaces, and memory.

[0053] Memory may include non-permanent storage in computer readable media, in the form of random access memory (RAM) and / or nonvolatile memory such as read only memory (ROM) or flash RAM. Memory is an example of computer readable media.

[0054] Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of infor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for realizing credible verification and a security module. A feasible scheme is provided for really realizing credible verification of system security. The security module is independent of a computing system and uses own security hardware and a security system, all platform security operations are operated in an in-card system, meanwhile, credibility verification and mirror image recovery functions are provided, and whether the platform is credible or not is found by starting credibility verification on the platform; mirror image recovery is carried out on untrusted platform firmware / platform codes through platform mirror image recovery, so that the safety and the credibility of the whole platform are ensured, and credible verification on system safety is really realized; the method for realizing credible verification comprises the following steps: segmenting an application program based on a jump instruction to obtain a plurality of sequential execution code segments; and performing credibility verification on each sequential execution code segment. Based on the trusted module and program security compiling, the application program and the platform system are not changed, and the trusted verification of the system security is truly realized.

Description

technical field [0001] This application relates to but not limited to trusted computing technology, especially a method, device and security module for realizing trusted verification. Background technique [0002] The Basic Requirements for Network Security Level Protection 2.0 (GB / T 22239-2019) was officially released and became the supporting regulations of the Network Security Law; the third-level / fourth-level security requirements clearly stated: the system based on the root of trust for computing devices Credible verification is performed on startup, etc., and dynamic credible verification is performed during the execution of the application. However, the basic requirements for network security graded protection are only a standard, and there is currently no feasible technical solution. Contents of the invention [0003] The present application provides a method and device for realizing credible verification, and a security module, which can truly realize credible ve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/20G06F21/44
CPCG06F11/2056G06F21/44
Inventor 肖鹏
Owner ALIBABA SINGAPORE HLDG PTE LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More