Embedded safety ship of real-time clock and method for correcting real-time clock thereof

A security chip, real-time clock technology, applied in the field of computer security, can solve the problems of counter overflow, inability to distinguish the time difference between two digital signatures, etc., to achieve the effect of complete functions

Inactive Publication Date: 2005-12-14
LENOVO (BEIJING) CO LTD
View PDF0 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, due to the characteristics of the counter itself, the method of using the counter has the following defects: 1) The counter has an overflow problem. When the counter is full and the overflow reset occurs, the value will inevitably be provided repeatedly, so that it is impossible to distinguish between two digital signatures. Time difference, so two identical documents appear; 2) During the period when the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embedded safety ship of real-time clock and method for correcting real-time clock thereof
  • Embedded safety ship of real-time clock and method for correcting real-time clock thereof
  • Embedded safety ship of real-time clock and method for correcting real-time clock thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Embodiments of the present invention will be described in detail below with reference to the accompanying drawings, and unnecessary details and functions for the present invention will be omitted during the description to prevent confusion in the understanding of the present invention.

[0023] figure 2 An embodiment of the security chip with embedded real-time clock according to the present invention is shown. Such as figure 2 Shown, according to the security chip of embedded real-time clock of the present invention comprises real-time clock module 21, external frequency generator 22, clock calibration module 23, encryption module 24, power supply detection module 25; Central processing unit (CPU) core 26 (ie , MCU), storage unit 27, and external interface module 28. The real time clock module 21 provides an accurate current time value for the digital signature. The external frequency generator 22 provides the reference clock frequency for the real-time clock modu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention reveals one kind of safety chip with built-in real-time clock. The safety chip includes: a real-time clock unit to provide data file with current time of the safety chip as the timestamp mark; an outer frequency generator to provide the clock unit with reference clock frequency; a clock calibrator to correct the error of the real-time clock unit for clock sync; an enciphering unit to generate cipher key based on enciphering algorithm for the safety protection and confirmation of the safety chip read/write; and an MCU to provide the chip operation system with operation back-up and management. In addition, the present invention reveals also method of correcting the real-time clock of the safety chip. The safety chip provides data signature with non-repudiation timestamp, and can use time information in various kinds of safety service and perfect the function of safety chip.

Description

technical field [0001] The invention relates to the technical field of computer security, and belongs to the security technology for extending the security chip system structure. In particular, it relates to a method for embedding a real-time clock in a security chip and calibrating the security clock. Background technique [0002] In 1999, under the impetus of the TCPA (Trusted Computing Platform Alliance) organization initiated by Intel, IBM, HP, Microsoft, and Compaq, a trusted computing environment was built. This organization defines a framework for platform device authentication, as well as specifications for a security chip (TPM: Trusted Platform Module) embedded on the motherboard and upper-layer software middleware TSS (TrustedSoftware Stack). In 2003, the TCPA organization was reorganized into TCG (Trusted Computing Group) to perfect and supplement TPM and TSS. [0003] figure 1 is a block diagram representing the architecture of a prior art TCG security chip. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F15/76
Inventor 谢巍
Owner LENOVO (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products