Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Trusted root management method and device, equipment and storage medium

A management method and technology of root of trust, applied in the field of information security, can solve the problems of application scenarios that are difficult to support a single server, high complexity of virtual root of trust, limited computing power, etc., to improve convenience, enhance security, The effect of improving safety

Pending Publication Date: 2022-05-13
CHINA MOBILE COMM LTD RES INST +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, a single physical root of trust bound to the main board of the server, such as TPM (Trusted Platform Module, Trusted Platform Module) or TPCM (Trusted Platform Control Module, Trusted Platform Control Module), has limited computing power and usually requires Create a virtual root of trust for each virtual machine based on the root, such as building a virtual root of trust server, and the virtual root of trust server will perform CS (Client-Server, client-server) centralized management of the virtual root of trust , when the business server wants to create a new virtual machine, it can send a request to the virtual root of trust server through the virtual root of trust client, so as to apply for a virtual root of trust for the virtual machine. The complexity of use is high, and it is difficult to support many single-server application scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted root management method and device, equipment and storage medium
  • Trusted root management method and device, equipment and storage medium
  • Trusted root management method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0022] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field of the invention. The terms used herein in the description of the present invention are for the purpose of describing specific embodiments only, and are not intended to limit the present invention.

[0023] Due to the establishment of a virtual root of trust server, the use of the virtual root of trust is complicated, the management cost is high, and it is difficult to support many single-server application scenarios. In related technologies, a virtual trusted root manager can also be built on a Hypervisor (virtual machine manager, also known as a VMM (virtual machine monitor)), so as to generate and manage a virtual trusted root manager for a virtual machine running on the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a trusted root management method and device, equipment and a storage medium. The method is applied to a trusted root control device arranged in a unified extensible firmware interface (UEFI), the trusted root control device supports unified mapping management of a physical trusted root and a virtual trusted root, and the method comprises the following steps: based on an application request sent by a trusted root applicant, sending a trusted root application request to the trusted root applicant; sending the encrypted trusted root identifier to the trusted root applicant; the physical trusted root and the virtual trusted root are respectively in one-to-one correspondence with the trusted root identifiers so as to perform unified mapping management. In the embodiment of the invention, the physical trusted root and the virtual trusted root are managed by using the encrypted trusted root identifier, so that the use security of the trusted root is improved, and the use convenience of the trusted root is also improved.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a root of trust management method, device, equipment and storage medium. Background technique [0002] Trusted Computing (Trusted Computing, TC) technology is one of the core technologies of information security. Using trusted computing to establish trust from server hardware to software and virtual systems for the cloud computing environment is one of the solutions to the security problems of the cloud computing environment. an effective way. However, a single physical root of trust bound to the main board of the server, such as TPM (Trusted Platform Module, Trusted Platform Module) or TPCM (Trusted Platform Control Module, Trusted Platform Control Module), has limited computing power and usually requires Create a virtual root of trust for each virtual machine based on the root, such as building a virtual root of trust server, and the virtual root of trust server wil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
CPCH04L9/32H04L63/0876
Inventor 杨新苗顾宁伦谢懿陈敏时高楠黄静
Owner CHINA MOBILE COMM LTD RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products