Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

TPCM system for building and maintaining trusted operating environment and corresponding method

A credible, operating system technology, applied in the field of information security, can solve problems such as tampering replacement without security verification, non-prevention, malicious tampering, etc., to achieve high system security, reduce consumption, and improve reliability.

Active Publication Date: 2018-02-06
HUADA SEMICON CO LTD
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The Trusted Platform Module in the prior art is a separate module controlled by the motherboard, so it cannot guarantee the integrity of the startup code (such as BIOS code) of the motherboard itself
Today, when the boot code of the mainboard is more and more vulnerable to attack and tampering, the traditional TPM can no longer guarantee the credibility of the computer platform.
Unable to provide the ability to monitor the credibility of dynamic systems and protect the credibility of the computer operating environment in real time
[0004] In addition, because most of the trusted platform modules in the prior art do not have boot code-level security verification such as BIOS codes and Android key codes, they cannot well prevent important components such as USB interfaces, hard drives, and memory tampered replacement of
It cannot prevent the use of tampered hardware devices to build a trusted operating environment or dynamically modify the system memory in real time, which will pose a greater threat to the reliability of the hardware and the security of the system
[0005] In addition, in the prior art, software applications such as anti-virus software are generally used to monitor the security of the operating environment and monitor malicious intrusions, but monitoring at the software level requires a large amount of CPU resources for scanning and comparison. Dependence on memory cannot fundamentally prevent virus injection at the hardware platform level
Even if the above shortcomings are ignored, due to the lack of underlying trusted foundation support, the protection software itself is vulnerable to virus attacks and malicious tampering, so such operating environment monitoring methods still cannot satisfactorily guarantee a safe operating environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • TPCM system for building and maintaining trusted operating environment and corresponding method
  • TPCM system for building and maintaining trusted operating environment and corresponding method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] figure 1 A block diagram of the system environment of the TPCM system 100 according to the present invention is shown. figure 1 The system environment in includes grid 104 , ATX power supply 103 , computer motherboard 106 and TPCM system 100 . Here, it should be pointed out that although the embodiment of the present invention is illustrated with an x86 architecture, that is, a computer including a BIOS flash memory, the present invention is not limited thereto, but can also be applied to computers based on PowerPC architecture, ARM architecture, MIPS, etc. Computers of other architectures. It should also be noted that in this block diagram, other components have been omitted for simplicity.

[0067] The power grid 104 is used to supply power to the power supply 103, the power supply 103 is, for example, an ATX power supply, and the power grid 104 is, for example, a 220V AC power grid. It should be noted that although the system environment includes the grid here, in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a TPCM system for building and maintaining a trusted operating environment. The TPCM system includes a power control unit connected to a power source, a startup code metric module, a platform environment metric module and a dynamic metric module, wherein the power source supplies the power control unit with a standby voltage as an operating voltage of the TPCM system. Thestartup code metric module is connected to a startup code flash memory of a computer main board through a main control bus to control its power supply and is configured that the startup code is read in the startup code flash memory after the TPCM system is powered up, a first hashed value of the startup code is generated and compared with a first reference hashed value, and a power-up signal is sent by the power control unit when the first hashed value and the first reference hashed value are consistent. The invention also relates to a method. The TPCM system for building and maintaining the trusted operating environment can improve the reliability of the trusted platform and reduce the cost while preventing a startup code chip from tampering hardware and preventing the trusted operating environment from being built with the tampered hardware, and can dynamically ensure the trusted operating environment.

Description

technical field [0001] The present invention generally relates to the field of information security, and specifically relates to a TPCM (Trusted Platform Control Module) system and a corresponding method for building and maintaining a trusted operating environment. Background technique [0002] A trusted platform module (Trusted Platform Module, TPM) is a hardware device, which is connected to a computer motherboard, and is used to verify identity and process variables used by the computer in a trusted computing environment. The TPM and the data stored in it are usually separated from all other components of the computer. [0003] The Trusted Platform Module in the prior art is a separate module controlled by the motherboard, so it cannot guarantee the integrity of the startup code (such as BIOS code) of the motherboard itself. Today, when the boot code of the mainboard is more and more vulnerable to attack and tampering, the traditional TPM can no longer guarantee the cred...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57G06F21/82
CPCG06F21/57G06F21/82G06F2221/034
Inventor 黄坚会
Owner HUADA SEMICON CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products