Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Credible platform and method for controlling hardware equipment by using same

A hardware device and platform control technology, applied in the field of information security, can solve problems such as not giving a chip credibility evaluation

Inactive Publication Date: 2011-05-18
BEIJING UNIV OF TECH
View PDF4 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

So far, TCG has not provided specifications related to chip credibility evaluation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credible platform and method for controlling hardware equipment by using same
  • Credible platform and method for controlling hardware equipment by using same
  • Credible platform and method for controlling hardware equipment by using same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0135] The invention provides a trusted platform control module and a method for controlling trusted hardware devices. The following is the specific implementation method.

[0136] 1. Implementation of the trusted platform control module:

[0137] A trusted platform control module is divided into two parts: functional composition and hardware structure. The hardware includes input and output bus interfaces, execution engines, volatile storage units, non-volatile storage units, trusted password modules, control and ruling engines, working mode configuration information customization engines, control strategy configuration information customization engines, and active inspection engines and state switching controls the engine. Functions include trusted cryptographic module management function, trusted measurement function, trusted storage function, trusted reporting function, trusted device control function, trusted hardware device control policy generation function, trusted h...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a credible platform and a method for controlling hardware equipment by using the same, belonging to the field of a computer. The credible platform comprises the hardware equipment and a credible platform control module with the function of active control, wherein hardware units, such as an active measure engine, a control ruling engine, a working mode custom engine, a credible control strategy configuration engine, and on the like, are arranged in the credible platform control module so as to realize the control functions of actively checking working mode configuration information, control strategy configuration information, firmware codes and circuit working states, and on the like for the hardware equipment. Through the identity legitimacy authentication and theactive control of the credible hardware equipment, which are realized by the credible pipeline technology, the active control and active check function, the security control system of credible hardware equipment which can not be bypassed by the upper layer can be stilled provided for the accessor of credible platform in incredible or lower-credibility computing environment without modifying the computing platform system structure and obviously reducing the system working performance.

Description

technical field [0001] The invention relates to the field of information security, in particular to a trusted platform and its method for hardware equipment. Background technique [0002] With the continuous deepening of research on trusted computing technology, the functional requirements of trusted computing specifications for trusted chips are also increasing. From the earliest TCG1.1 version to the current 1.2 version, from the application of computer terminals to servers, embedded devices, virtual machines, networks, etc., it can be said that the trusted chip (the trusted chip defined by TCG is called, can Trust platform module.) The functional requirements are constantly improving, and the design complexity is constantly increasing, which in turn also causes the hardware scale and internal firmware scale of the trusted chip to continuously increase. [0003] In the field of computer terminals, the existing trusted computing specifications do not define the reliability...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06F21/57
Inventor 胡俊沈昌祥毛军捷王昱波刘毅方娟
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products