Trusted computing system and method based on trusted computing environment

A technology of trusted computing and environment, applied in the field of trusted computing systems based on trusted computing environment, can solve problems such as increased manufacturing costs, performance bottlenecks, limited communication interface speed, etc., to save manufacturing costs, repair defects, Simple physical structure

Pending Publication Date: 2022-05-10
中电云数智科技有限公司
View PDF12 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] 1) In terms of cost: the computing system requires an additional TPM/TCM physical security chip, which increases the manufacturing cost;
[0010] 2) In terms of structure: TPM/TCM physical security chip needs to modify the motherboard of the host, which increases the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted computing system and method based on trusted computing environment
  • Trusted computing system and method based on trusted computing environment
  • Trusted computing system and method based on trusted computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0053] It should be noted that, in the case of no conflict, the following embodiments and the features in the embodiments can be combined with each other; and, based on the embodiments in the present disclosure, those of ordinary skill in the art obtained without creative work All other embodiments belong to the protection scope of the present disclosure.

[0054] It is noted that the following describes various aspects of the embodiments that are within the scope of the appended claims. It should be apparent that the aspects described herein may be embodied in a wide variety of forms and that any specific structure and / or function described herein is illustrative only. Based on the present disclosure one skilled in the art should appreciate that an aspect described herein may be implemented independently of any other aspects and that two or more of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a trusted computing system and method based on a trusted computing environment, and the system comprises a trusted hardware layer which comprises a CPU and an RPMB secure storage area; the TEE environment comprises a Trusted OS layer and a trusted root TA layer; the secure communication layer is used for realizing state switching and data exchange between the REE environment and the TEE environment through a secure message instruction provided by the CPU; the REE environment comprises a trusted firmware UEFI-BIOS module, a trusted bootstrap program Trusted Grub module, a trusted kernel Trusted Kernel module and a trusted client module from bottom to top; each module in the REE comprises a trusted base; and the application layer comprises various business applications. According to the trusted computing system and method based on the trusted computing environment, the production and manufacturing cost of a host can be saved, the physical structure of the system is simplified, the operational capability and the communication rate are improved, and maintenance and upgrading are facilitated.

Description

technical field [0001] The invention relates to the technical field of trusted computing, in particular to a trusted computing system and method based on a trusted computing environment. Background technique [0002] Information security has four levels: equipment security, data security, content security, and behavioral security. Behavioral security includes: behavioral confidentiality, behavioral integrity, and behavioral authenticity. Trusted computing is an important component of behavioral security. The early research on trusted computing was mainly organized by TCG (International Trusted Computing Working Group). The domestic research on trusted computing basically follows the pace of TCG. [0003] The core of trusted computing research is the TPM hardware chip. The chips of most manufacturers use the classic TPM 1.2 specification as the standard. This specification has been upgraded to TPM 2.0, also known as "Trusted Platform Module Library Specification", which curre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57G06F21/60
CPCG06F21/577G06F21/602
Inventor 牛登平
Owner 中电云数智科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products