Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for upgrading function of creditable calculation modules

A technology of trusted computing and function upgrade, applied in the field of communication, can solve the problems of non-compliance, complicated use of commercial operations, and the fourth scheme does not have the conditions for implementation, and achieves the effect of realizing the upgrade and the method is simple and easy to implement.

Active Publication Date: 2007-02-21
SHENZHEN SINOSUN TECH
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 2. The upgrade process can only change the protection function
[0006] 3. The upgrade process can only access the data in the shielded area inside the TPM. The data in it is necessary for the TPM owner, which can make the TPME effective and control the data block
[0007] Judging from the current existing technologies, there are four upgrade schemes: fixed upgrade key strategy; temporarily generated key upgrade strategy; use certificate certificate (Endorsment Key Credential, referred to as EK certificate) upgrade strategy; and use identity verification certificate (Attestation IdentityKey Credential (referred to as AIK certificate) upgrade strategy, etc. Among them, the first three obviously do not meet the requirements of TCG specifications. As for the fourth solution (AIK certificate upgrade strategy), although this solution is allowed by TCG, it is also relatively safe. However, data protection still needs another solution. The most important thing is that there are no channels and conditions for issuing AIK certificates, and the use of certificates involves operations such as certificate issuance, replacement, and revocation, both in terms of use and commercial operations. Both are very complicated, therefore, the fourth option is not yet ready for implementation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for upgrading function of creditable calculation modules

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Below according to accompanying drawing and embodiment the present invention will be described in further detail:

[0046] The main idea of ​​the present invention is: under the conditions of issuing AIK certificates have not been established at present, or do not rely on the establishment of conditions for issuing AIK certificates, the code of the trusted computing module is used as the common knowledge of the upgraded server and the trusted computing module secret information. The code of the trusted computing module is divided into the code before upgrading and the code to be upgraded, and both codes contain manufacturer information and version information (manufacture and version). The way to send commands to get this information. Generally, the manufacturer information of the code before the upgrade of the trusted computing module and the code after the upgrade of the protection function are the same, and the version information of the latter is greater than that ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method comprises: a server side for providing data update, a client side comprising a dependable computing module and a dependable computing module are provided; using the code of the dependable computing module as the secret information shared by the update provider and the dependable computing, by which the mutual authentication mechanism and encryption communication are established between the server side and client side in order to download the update data to client side; the secret communication also be set between the client side and TPM, and when the TPM conforms the correction of update data from the client side, it make update.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method for online upgrading of the protection function of a Trusted Computing Module (TPM) formulated by the International Trusted Computing Group (TCG). Background technique [0002] The trusted computing module formulated by the TCG specification is an information security module presented in the form of a hardware chip used on the motherboard of a personal computer, etc., and realizes various protection functions stipulated in the TCG specification by interacting with communication commands such as a personal computer platform. According to the requirements of the trusted computing module formulated by the TCG specification, once the TPM is used in the field, the TPM needs a mechanism to allow the update of the protection function (command). For a given TPM with different upgrade implementations, there are various execution protection function upgrades The method, thi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/14H04L9/30G06F9/445
Inventor 李志刚
Owner SHENZHEN SINOSUN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products