Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Static measurement method of trusted computing platform based on double-system structure

A technology of trusted computing and architecture, applied in the field of network security, can solve problems such as difficult to resist and unable to play, and achieve the effect of improving security performance

Inactive Publication Date: 2019-10-15
沈昌祥
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the TPM is essentially just a passively mounted external device on the computer. It will only function when it is called by the host program. Once the host is controlled by the attacker, the TPM will not be able to play its role, resulting in TCG's trusted computing architecture. It is basically difficult to resist when hackers use the logical flaws of the trusted computing platform to attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Static measurement method of trusted computing platform based on double-system structure
  • Static measurement method of trusted computing platform based on double-system structure
  • Static measurement method of trusted computing platform based on double-system structure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Explanation of terms:

[0039] TCM: Trusted Cryptographic Module, the hardware module of the Trusted Computing Platform, provides cryptographic computing functions for the Trusted Computing Platform, and has a protected storage space.

[0040] TPCM: Trusted Platform Control Module, a hardware core module integrated in a trusted computing platform to establish and guarantee a source of trust, providing integrity measurement, secure storage, trusted reporting, and cryptographic services for trusted computing function, used as a protection subsystem in the present invention.

[0041] TSB: Trusted Software Base, a collection of software elements that provide support for the trustworthiness of trusted computing platforms.

[0042] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0043] An embodiment of the present invention provides a static measurement method for a trusted computing platform based on du...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a static measurement method of a trusted computing platform based on a double-system structure, the trusted computing platform is composed of a protection subsystem and a computing subsystem which operate in parallel, and the protection subsystem is connected with the computing subsystem through a PCIE interface and a preset interface; when the trusted computing platform ispowered on, the trusted platform control module is started before the host CPU; trusted measurement is carried out on startup codes which need to be loaded and executed when the computing subsystem is started one by one; the purpose that the trusted platform control module carries out active security defense on the starting process of the host can be achieved. As the trusted platform control module is relatively independent and has higher control authority, the security defense function of the trusted platform control module does not depend on the security performance of the host system, andthe technical effect of improving the security performance of the host is further achieved.

Description

technical field [0001] The invention relates to the field of network security, in particular to a static measurement method and device, a storage medium and a processor of a trusted computing platform based on a dual architecture. Background technique [0002] The current cyberspace is extremely fragile, and cyberattacks such as Stuxnet, Wannacry, and Mirai that have caused great impacts emerge in endlessly and become increasingly rampant. The root cause is that the problem is not addressed from the root causes of network security risks, and the passive defense methods of "blocking and killing" represented by "firewall", "virus scanning and killing" and "intrusion detection" are blindly adopted, which is hard to prevent , especially in the face of attacks launched against the vulnerabilities of the target system, it is impossible to effectively defend at all. [0003] In order to solve the problems faced by the current cyberspace security, the international TCG organization...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/53
CPCG06F21/53G06F21/575
Inventor 沈昌祥孙瑜王涛洪宇
Owner 沈昌祥
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products