Method for implementing function test by safety chip under DOS

A security chip and function detection technology, which is applied in the field of computer information security, can solve the problems that there is no convenient detection method for security chips, and there is no method and device for rapid detection of production lines, so as to reduce workload and improve production efficiency.

Active Publication Date: 2006-02-01
SHENZHEN SINOSUN TECH
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] For the development and production of this brand new security chip, there is currently no convenient detection method to verify the various fu

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing function test by safety chip under DOS

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0029] The method for realizing the function detection of the security chip under DOS of the present invention, its test program first establishes a DOS test environment, which is established according to the TCG specification and belongs to the 32-bit protection mode; under this mode, the test program calls the security chip manufacturer Released MP (Memory Present) driver for testing. This driver is directly provided to the BIOS manufacturer, and is used for the BIOS to perform various settings and information interaction interfaces for the security chip during the power-on self-check process.

[0030] The test idea of ​​the method of the present invention is to simulate the system BIOS environment of the motherboard manufacturer, that is, to communicate with the security chip under the 32-bit protection mode environment defined by the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for detecting safety chip function under DOS includes setting up test environment and interface, testing various state setting of safety chip and setting up chip owner if test is passed, setting up cipher key and carrying out test that owner information is cleared off or not if setting up is successful, testing each command combination and function of internal module in safety chip, obtaining system completeness information stored in safety chip register and then carrying out verification on completeness information mechanism .

Description

technical field [0001] The invention relates to the technical field of computer information security, in particular to a method for realizing function detection of a security chip under DOS. Background technique [0002] In the existing technology, with the increasing popularity of computers and the continuous strengthening and wide application of their functions, the security of computer systems is becoming more and more important. In October 1999, Intel, Microsoft, Compaq, HP and IBM were established A TCPA (Trusted Computing Platform Alliance, Trusted Computer Platform Alliance) organization defines a unified standard for TCPA and its products, and its purpose is to contribute to a new generation of trusted hardware platforms. The trusted computing platform module TPM (Trusted Platform Module, hereinafter referred to as TPM) security chip based on this standard has the function of encryption and safe storage, and can monitor the software and hardware information changes o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/26
Inventor 陈强张璐朱广志张玮刘鑫
Owner SHENZHEN SINOSUN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products