Novel trust chain design method based on SM9 cryptographic algorithm
A design method and technology of cryptographic algorithm, applied in key distribution, can solve the problems of configuration register reset, single definition of trust chain model, increase the complexity of application process, etc., to improve efficiency, ensure security and credibility, protect integrity and The effect of authenticity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings, but the protection scope of the present invention is not limited to the following description.
[0030] A new trust chain design method based on the SM9 cryptographic algorithm, the design process is as follows:
[0031] 1) Initialization
[0032] TPM chip factory initialization settings, according to the algorithm process of SM9, set the public parameters of SM9 key generation, signature algorithm, and verification signature algorithm;
[0033] 2) Create a key mapping table
[0034] TPM is used as the trusted center key generation center KGC, and the identity of a single component on the trust chain is marked as ID i , record the ordered node sequence of the trusted path from the trusted root to the module whose signature is currently being verified as IDT=(ID 1 , ID 2 ,...ID n ), before loading each component, the verifier first...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com