Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Platform integrity verification method

A platform integrity and integrity technology, applied in the field of computer security, can solve the problems of not guaranteeing platform identity privacy, unable to prove platform integrity, etc., and achieve the effect of good platform identity privacy performance, proof of platform integrity, and strong practicability

Inactive Publication Date: 2015-01-07
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Trusted Computing Group TCG's Privacy CA authentication method only reduces the leakage of platform identity privacy information with the assistance of a trusted third party, but this method does not guarantee platform identity privacy, so it cannot prove the integrity of the platform

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Platform integrity verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0046] The trusted cryptographic chip uses the SSX44 security chip of National Technology. Under the authorization of the platform owner, a national secret algorithm SM2 key pair is generated inside the SSX44 chip as the platform identity key PIK, which is used to digitally sign the information inside the SSX44 , to realize platform identity authentication and platform integrity report, so as to prove the credibility of the internal data of the platform to the outside.

[0047] The cryptographic module key EK is unique and stored inside the SSX44 chip. It is only used when obtaining platform owner operations and applying for platform identity certificates, and cannot be exported outside the SSX44 chip.

[0048] The SSX44 chip certificate conforms to the X.509 V3 standard and is signed by a trusted third party before the platform is used to ensure its feasibility. It is used to establish a one-to-one correspondence between the cryptographic module key EK and the SSX44 chip.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a platform integrity verification method. The method includes the specific steps that the integrity of a dependable computing platform is reported by the dependable computing platform, and a verifier finishes the verification process after a verifier platform receives the relevant information. Compared with the prior art, according to the platform integrity verification method, a safe dependable encryption chip is adopted, the platform can provide an integrity report for an external entity, a receiver judges the credibility of the platform according to the reported metric, the practicability is high, and the safety, integrity and effectiveness of the platform are guaranteed effectively.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a method for proving the integrity of a platform based on a trusted encryption chip with strong practicability. Background technique [0002] Platform integrity certification is the process of proving the true identity of a trusted computing platform through identity credentials. Generally, the identity of a trusted computing platform is identified by a security chip, and platform integrity certification essentially authenticates the identity of the TPM / TCM security chip. Trusted Computing Group TCG's Privacy CA authentication method only reduces the leakage of platform identity privacy information with the assistance of a trusted third party, but this method does not guarantee platform identity privacy, so it cannot prove the integrity of the platform. [0003] Based on this, a method for proving the integrity of the platform is now provided. In the present invention, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0823H04L63/083
Inventor 苏振宇
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products