Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Bidirectional authentication trusted starting system and method based on TPCM chip

A two-way authentication and start-up system technology, applied in the field of computer security, can solve problems such as system dishonesty, TPCM chip verification, and inability to guarantee the security of the computing environment, and achieve the effect of realizing security verification and ensuring security

Pending Publication Date: 2022-02-22
NARI TECH CO LTD +2
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of the current trusted startup methods do not verify the security of the TPCM chip itself. Once the TPCM chip is tampered with, it will cause the entire system to lose trust and cannot guarantee the security of the computing environment.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bidirectional authentication trusted starting system and method based on TPCM chip
  • Bidirectional authentication trusted starting system and method based on TPCM chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] The invention performs reverse identity authentication on the TPCM chip after the boot program is started, supervises the trust root, and ensures the authenticity and credibility of the TPCM chip. Using the memory chip FLASH ID as a third-party trusted factor removes the public factor in identity authentication and prevents the public factor from being stolen or tampered with during the interaction. Realize the credible verification of the source of the trusted chain to ensure the security of the device operating environment.

[0048] Those skilled in the art should understand that the embodiments of the present application may be provided as methods, systems, or computer program products. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a bidirectional authentication trusted starting system and method based on a TPCM chip. A main SPI interface of a TPCM chip is connected with a slave SPI interface of a FLASH storage chip, a slave SPI interface of the TPCM chip is connected with a main SPI interface of a CPU chip, and the main SPI interface of the CPU chip is connected with the slave SPI interface of the FLASH storage chip; a GPIO output pin of the TPCM chip is connected with a RESET reset pin of the CPU chip and is used for realizing starting control on the CPU chip; a STATE pin of the TPCM chip is connected with a GPIO pin of the CPU chip and is used for informing the CPU of whether the measurement process is finished or not and informing whether the TPCM is in an SPI master mode or an SPI slave mode. According to the invention, all authentication information is prevented from being held by the same party in the identity authentication process, so that the security verification of a TPCM chip is realized, and the security of an equipment operation environment is ensured from sources.

Description

technical field [0001] The invention relates to a two-way authentication trusted startup system and method based on a TPCM chip, belonging to the technical field of computer security. Background technique [0002] The trusted computing architecture builds an actual and effective hardware root of trust in the system, and establishes a chain of trust starting from the root of trust through layer-by-layer trust expansion, and finally realizes the trust of the system operating environment. The root of trust is assumed to be unconditionally trusted, and the system does not detect the behavior of the root of trust. Therefore, whether the root of trust is really trustworthy and whether the root of trust will be tampered with by attackers is the key to confirming the credibility of the system. [0003] Trusted Platform Control Module (hereinafter referred to as TPCM) is the root of trust of the active immune trust system, the source of trust of the system, and the basis for the est...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57G06F21/34G06F21/44
CPCG06F21/575G06F21/445G06F21/34
Inventor 沈志浩周华良李友军赵翔夏建伟
Owner NARI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products