CN101122936A - Embed type platform guiding of credible mechanism - Google Patents

Embed type platform guiding of credible mechanism Download PDF

Info

Publication number
CN101122936A
CN101122936A CN 200710053330 CN200710053330A CN101122936A CN 101122936 A CN101122936 A CN 101122936A CN 200710053330 CN200710053330 CN 200710053330 CN 200710053330 A CN200710053330 A CN 200710053330A CN 101122936 A CN101122936 A CN 101122936A
Authority
CN
China
Prior art keywords
tpm
bootloader
external unit
platform
embedded platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200710053330
Other languages
Chinese (zh)
Other versions
CN100454324C (en
Inventor
赵波
张焕国
郑鹏
黄玮
宋伟
熊泉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan University WHU
Original Assignee
Wuhan University WHU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan University WHU filed Critical Wuhan University WHU
Priority to CNB2007100533307A priority Critical patent/CN100454324C/en
Publication of CN101122936A publication Critical patent/CN101122936A/en
Application granted granted Critical
Publication of CN100454324C publication Critical patent/CN100454324C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses an embedded platform guide on a creditable mechanism, i. e.: placing the embedded platform and a TPM together, and using the TPM to support safety and creditability of the embedded platform; In accordance with the creditability completeness measuring roots and prior to running of the CPU of the embedded platform, the TPM carries out completeness verification for the Bootloader and the operation system which are stored in the embedded platform to ensure that the software executable codes in the platform startup chain is not modified, and then permits the CPU of the embedded platform to read the Bootloader for startup; and the TPM controls the startup process and measures completeness and reliability of the appointed external devices as well as initializes the external devices. The invention is used for completeness measuring of the Bootloader executed at the platform in accordance with the creditability chain structure, ensuring good completeness of the Bootloader, and realizing a reporting mechanism in a creditable environment with a TPM monitoring.

Description

Embedded platform guiding on a kind of trusted mechanism
Technical field
The present invention relates to a kind of embedded device the unloading phase to external unit, particularly the storage-type external unit carries out the architecture of safety detection.
Background technology
There is the following potential safety hazard in conventional computer system: computing machine is soft, hardware configuration is simple, causes computer resource to be free to use, especially run time version can revise, implantable rogue program; Virus utilizes computer operating system to the weakness that run time version does not carry out consistency check, and viral code is embedded into the run time version program, realizes virus disseminating or the like.Therefore, must consider soft, the hardware configuration of traditional computing machine are transformed.
TCG (Trust Computing Group, Trusted Computing tissue) has proposed the notion of " chain-of-trust " and " credible tolerance ", comprise system platform trust metrics, storage, report the trusted mechanism that these are a series of.TCG thinks: if computer system is by received initial " trusted root " beginning, when the conversion of control each time of system platform, by integrity measurement, this trust can be passed to next control module, so the platform computing environment is believable all the time.TCG has defined credible platform module (the Trust Platform Module with security function in the standard [1] of its issue, TPM), by in computer system, embedding a trusted root that can resist the independent computing engines distorted as plateform system, by trust chain mechanism, trust is expanded to whole platform again.
The platform start-up course is the important transition from the hardware domain to the software domain, realizes that therefore the platform of safety starts significant to the safety of total system.
After embedded platform started, the first's guidance code that is moved was called Bootloader (platform boot program).Bootloader is serious the dependence and hardware, at different embedded platforms different Bootloader is arranged, but its basic function all is: platform powers on, is provided with the CPU frequency of operation, interruption is set, initialization kernal hardware equipment, set up memory headroom mapping, the required external unit of initialization section, from the Flash memory device, operating system nucleus is copied to the predetermined memory headroom then, user configured start-up parameter is transmitted linux system, jump to the start address operation system of operating system nucleus subsequently.
Because embedded platform does not generally have configuration ROM (ROM (read-only memory)), Bootloader is stored in this read-write storage medium of Flash usually, is subjected to the malicious attack from the outside easily.Malicious attacker can attempt Bootloader is distorted and destroys, with the purpose of scheming to reach control or destroying total system.
Present some architecture improvement projects that adopt, as rely on USB key, smart card to carry out authentication and integrity measurement, the problem that all exists is: the root of trust of embedded system depends on start-up routine Bootloader, if Bootloader is maliciously tampered, then can cross authentication mode start-up systems such as USB key.So this class scheme remains by means of the software mode chain that breaks the wall of mistrust.Given this threaten, can consider to introduce hardware protection mechanism--TPM, be used to protect the integrality of Bootloader.
Existing Bootloader does not detect external unit in initialization external unit process, but but the supposition external unit all is an operate as normal, safe and reliable.Yet the assailant might insert illegal external unit by adding, change, replace means such as external unit, to scheme when embedded platform is worked the important information of collecting platform, destruction platform operate as normal.
If will get rid of above-mentioned potential danger,, physical equipment is mapped to file manages because (SuSE) Linux OS adopts Virtual File System mechanism at operating system layer.Must by a relatively large margin modification be arranged to Linux Drive Layer source code, difficulty is big, and the predictability of revising the result is poor.Therefore, in the Bootloader vectoring phase external unit being detected is a strategy preferably.
Summary of the invention
Technical matters to be solved by this invention is: expand thought in conjunction with credible measurement, credible report, chain-of-trust, design the embedded platform guidance mode on a kind of trusted mechanism, this mode utilizes TPM to provide independence, hardware mode to realize the credible startup of embedded platform based on the current conditions of built-in Linux operating system start-up course on embedded platform.
The technical scheme that the present invention solves its technical matters employing is: embedded platform and TPM are combined, support the security and the credibility of embedded platform with TPM; TPM at first will be according to credible integrity measurement root, before embedded platform CPU starts working, carry out integrity verification to being stored on the embedded platform part that comprises Bootloader, operating system among the Flash, to guarantee that the software executable code that platform starts in the chain is not distorted, allow embedded platform CPU to read Bootloader thereafter again and start; Because Bootloader opens source code, TPM can control the trend of each step in the start-up course according to step-by-step system, and in the initialization external unit, the external unit of appointment is carried out integrality, reliability measurement, realize credible measurement and report mechanism; TPM is a credible platform module, and Bootloader is the embedded platform boot.
Method provided by the invention compared with prior art has following major advantage:
One. adopt the hardware root of trust of separate hardware unit TPM, so TPM just started working before the embedded platform initialization as whole embedded system; Under supporting, TPM can make the Bootloader of operation guarantee good integrality according to chain of trust structure to carrying out integrity measurement in the Bootloader boot that embedded platform is carried out.
They are two years old. owing to used, guarantee under the trusted context that has the TPM monitoring, to carry out that embedded main platform initialization, external unit detect, operating system is written into, work such as the operating system parameter is imported into, operating system by trust chain mechanism through the Bootloader after credibleization.
They are three years old. and a complete credible startup system from hardware to software be can form, credible measurement and report mechanism realized.
Description of drawings
Fig. 1 is the structural relation figure of embedded platform and TPM.
Fig. 2 is for revising back Bootloader overall flow synoptic diagram.
Fig. 3 is the star trust chain synoptic diagram that has TPM.
Fig. 4 is an external unit function process flow diagram.
Embodiment
The invention discloses a kind of embedded platform that is based upon on the trusted mechanism and start guidance mode, specifically: according to the architecture characteristics of trusted system, with embedded platform and TPM hardware module (wherein, the TPM hardware module comprises credible measurement root, credible report root, three parts of trusted storage root) combine, the initialization of embedded platform use have chain of trust structure, on the basis of vivi (a kind of Bootloader) improved Bootloader, this Bootloader is cured in the Flash storer of platform.TPM at first according to the startup of credible integrity measurement root from system, carries out integrity verification to Bootloader, operating system etc., guarantees that the software that platform starts in the chain is not distorted, and allows CPU to read Bootloader again and starts.Because Bootloader opens source code, support that through the Bootloader after credibleization TPM controls by step-by-step system: each step all is under the believable monitoring of TPM in the embedded platform start-up course, and in the initialization external unit, external unit to appointment under TPM supports carries out integrality, reliability measurement, and realizes credible measurement and report mechanism.Above-mentioned route meets credible platform and starts suggestion.
Above-mentioned embedded platform provided by the invention starts guidance mode, specifically is the method that adopts following steps:
(1) the embedded platform system by a hardware independently TPM at first start as the control platform; By TPM the Bootloader of embedded platform is carried out integrity measurement;
(2) if the Bootloader integrity measurement by TPM not, TPM then by the hardware mechanisms of self, sends " No starting " signal, forbids that embedded platform starts;
(3) if Bootloader passes through integrity detection, then TPM authorizes the power that the Bootloader program is carried out at embedded platform;
(4) core board of use Bootloader initialization embedded platform comprises the setting of platform frequency of operation, interrupt vector table configuration, internal memory planning;
(5) the Bootloader master routine calls the external unit related function of appointment, and external unit is carried out initialization, and maintenance and TPM's is mutual in this process;
(6) Bootloader detect external unit whether can operate as normal, Bootloader keeps in this testing result;
(7) Bootloader judges whether external unit is previous access, used equipment, Bootloader reads external unit identifier, and with TPM in the previous identifier of preserving compare: if identical, think that then the integrality of this external unit is not damaged; If different, think that then this external unit integrality has been subjected to destruction; Bootloader keeps in this testing result;
(8) the Bootloader master routine passes to TPM with above external unit testing result, and TPM will differentiate according to the security strategy that sets in advance, and external unit is divided into credible and insincere two classes, and TPM carries out the management of external unit according to this thereafter;
(9) in the process of system works after this, when operating system will be used certain external unit, need send request to TPM, TPM will according to the unloading phase testing result, allow use request, and ban use of incredible external unit credible external unit; The situation that detected external unit can not use in system can join in the record of TPM and go, but disabled external unit is reactivated.
The invention will be further described below in conjunction with accompanying drawing, but be not limited to the present invention.
1. trust chain theoretical foundation (referring to Fig. 3)
Credible platform module (TPM) but be the entity that the software and hardware combining of telecommunications services can be provided, security system, reliability, availability, information and behavior can be provided.TPM forms initial trust boundary as the trusted root of whole computer system platform by trusted root.Platform and user carry out authentication by certificate, and the certificate of platform is stored among the TPM, with the platform hardware binding, thereby make platform that unique identity be arranged.Here suppose that TPM hardware is can not be ruined.
It is from trusted root (CTRM) that platform starts, and at first by trusted root first platform component that will carry out (being Bootloader) is carried out credible tolerance, after detection is passed through, includes these parts in trust boundary, allows its execution.Basic credible platform thinking is a chain type: at first make up a root of trust, the chain that breaks the wall of mistrust again begins to hardware platform, to Bootloader, again to OS and application from root of trust, authentication step by step, thus trust chain is expanded to total system.
Hypothetical model is divided into three layers: the TPM platform; Bootloader; OS.And with T (TPM), the trust domain set of formal respectively expression TPM of T (Bootloader) and Bootloader.
Had by the chain type trust model, rule is T (TPM) → Bootloader 1.; Rule is T (Bootloader) → OS 2.; 1. and recurrence relation 2. then, infer 3. T (TPM) → OS of rule by.
At first, after repeatedly transmitting step by step, the intensity of trust chain can constantly weaken, thereby may have influence on the security of whole trusting relationship system.Secondly, any one link in the trust chain is broken the safety that all can destroy total system.Once more, multi-level excessively call can the reduction system work efficiency.
Another kind of trust model one hub-and-spoke configuration is the expansion of chain type model.After root of trust begins from hardware platform, not only can directly measure the integrality of Bootloader, and can extend to the OS layer to the direct tolerance of this TPM, even go (specifically extend to that stage can determine according to actual conditions) in the application layer, thereby the trusting relationship of total system is radial hub-and-spoke configuration.
1. T (TPM) → Bootloader is promptly arranged; Rule is T (TPM) → OS 2..2. rule wherein also is prerequisite, rather than releases rule, and whole trust chain does not have transitivity, has avoided trust strength weakening in transmittance process.Secondly, because the security of TPM, TPM directly can not destroy this link that Bootloader and operating system are measured.
Star-like chain of trust structure realizes that difficulty is big, to the processing power of TPM with the judgement of upper strata behavior is required very high, but adopts the star trust chain structure, makes that the trusted sources of total system is unique, can guarantee the intensity of whole chain of trust relationship.
To above two kinds of chain of trust structure, can choose according to the needs of specific implementation.
2. storage
Bootloader and operating system all leave in the limited Flash storage space of write operation, partly store as ROM in logic, and by TPM control, the user side does not allow this storage area is carried out write operation.
3. external unit testing process
Enter the detailed process following (referring to Fig. 2, Fig. 4) behind certain external device processes function:
1) device power;
Whether can operate as normal, if not all right then to 6 if 2) detecting the external unit register);
3) the external unit register is set, makes external unit enter normal mode of operation;
Whether 4) differentiate it is the equipment that inserts before, if not, jump to 6);
5) integrality of detection of stored type external unit is if integrality is good, then to 7);
6) be labeled as insincere equipment, jump to 9);
7) mark can operate as normal, believable external unit, and passes to TPM as parameter;
8) withdraw from the processing function of such external unit.
4. at the explanation of a few class external units:
Here external unit is divided into two types: communication type external unit and storage-type external unit.The communication type external unit has only control information and status information, does not have data message.The storage-type external unit then comprises control information, status information and data message.
Belong to having of communication type external unit: serial line interface (UART), I2C interface, USB interface.Belong to having of storage-type external unit: the SD storage card.
List of references:
[1]TCG?Specification?Architecture?Overview(Version1.2);
[2]ZHAO?Bo,ZHANG?Huanguo,HUANG?Rui,A?New?Approach?of?TPM?ConstructionBased,Wuhan?University?Journal?of?Natural?Sciences,Vol.12?No.12007;
[3] Zheng Jun, Liu Anhui, Zhang Hongqi is based on the chain-of-trust model investigation of TPM, microcomputer information, Control﹠amp; Automation, 2006 33 phases.

Claims (2)

1. embedded platform guiding is characterized in that a kind of embedded system that is based upon on the trusted mechanism starts bootstrap technique, and this method is that embedded platform and TPM are combined, and supports the security and the credibility of embedded platform with TPM; TPM at first will be according to credible integrity measurement root, before embedded platform CPU starts working, carry out integrity verification to being stored on the embedded platform part that comprises Bootloader, operating system among the Flash, to guarantee that the software executable code that platform starts in the chain is not distorted, allow embedded platform CPU to read Bootloader thereafter again and start; Because Bootloader opens source code, TPM can control the trend of each step in the start-up course according to step-by-step system, and in the initialization external unit, the external unit of appointment is carried out integrality, reliability measurement, realize credible measurement and report mechanism; TPM is a credible platform module, and Bootloader is the embedded platform boot.
2. embedded platform guiding according to claim 1 is characterized in that having step:
(1) the embedded platform system by a hardware independently TPM by TPM the Bootloader of embedded platform is carried out integrity measurement as the control platform;
(2) if the start-up routine integrity measurement by TPM not, TPM then by the hardware mechanisms of self, sends " No starting " signal, forbids that embedded platform starts;
(3) if Bootloader passes through integrity detection, then TPM authorizes the power that the Bootloader program is carried out at embedded platform;
(4) core board of use Bootloader initialization embedded platform comprises the setting of platform frequency of operation, interrupt vector table configuration, internal memory planning;
(5) the Bootloader master routine calls the external unit related function of appointment, and external unit is carried out initialization;
(6) Bootloader detect external unit whether can operate as normal, Bootloader keeps in this testing result;
(7) Bootloader judges whether external unit is previous access, used equipment, and Bootloader keeps in this testing result;
(8) the Bootloader master routine passes to TPM with above external unit testing result, and TPM will be divided into credible and insincere two classes with external unit according to the security strategy that sets in advance, and TPM carries out the management of external unit according to this thereafter;
(9) in the process of system works after this, when operating system will be used certain external unit, need send request to TPM, TPM will according to the unloading phase testing result, allow use request, and ban use of incredible external unit credible external unit; The situation that detected external unit can not use in system can join in the record of TPM and go, but disabled external unit is reactivated.
CNB2007100533307A 2007-09-21 2007-09-21 Embed type platform guiding of credible mechanism Expired - Fee Related CN100454324C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2007100533307A CN100454324C (en) 2007-09-21 2007-09-21 Embed type platform guiding of credible mechanism

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2007100533307A CN100454324C (en) 2007-09-21 2007-09-21 Embed type platform guiding of credible mechanism

Publications (2)

Publication Number Publication Date
CN101122936A true CN101122936A (en) 2008-02-13
CN100454324C CN100454324C (en) 2009-01-21

Family

ID=39085269

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2007100533307A Expired - Fee Related CN100454324C (en) 2007-09-21 2007-09-21 Embed type platform guiding of credible mechanism

Country Status (1)

Country Link
CN (1) CN100454324C (en)

Cited By (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101888442A (en) * 2010-04-16 2010-11-17 中兴通讯股份有限公司 Security management method for mobile terminal and mobile terminal
CN102012979A (en) * 2010-11-15 2011-04-13 深圳市华威世纪科技股份有限公司 Embedded credible computing terminal
CN101515316B (en) * 2008-02-19 2011-09-28 北京工业大学 Trusted computing terminal and trusted computing method
CN102223232A (en) * 2011-05-12 2011-10-19 郑州信大捷安信息技术股份有限公司 Trusted system building method and system based on USB safety memory encryption card
CN102314354A (en) * 2010-06-30 2012-01-11 无锡中星微电子有限公司 Embedded system starting method and embedded device
CN102355467A (en) * 2011-10-18 2012-02-15 国网电力科学研究院 Power transmission and transformation equipment state monitoring system security protection method based on trust chain transmission
CN102396251A (en) * 2009-04-15 2012-03-28 交互数字专利控股公司 Validation and/or authentication of device for communication with network
CN102880828A (en) * 2012-09-07 2013-01-16 普华基础软件股份有限公司 Intrusion detection and recovery system aiming at virtualization support environment
US20130061056A1 (en) * 2010-05-21 2013-03-07 Graeme John Proudler Extending an integrity measurement
CN103139221A (en) * 2013-03-07 2013-06-05 中国科学院软件研究所 Dependable virtual platform and construction method thereof, data migration method among platforms
CN103455750A (en) * 2013-08-26 2013-12-18 北京视博数字电视科技有限公司 High-security verification method and high-security verification system for embedded devices
CN103646214A (en) * 2013-12-18 2014-03-19 国家电网公司 Method for establishing trusted environment in power distribution terminal
CN103760892A (en) * 2014-01-23 2014-04-30 国家电网公司 Embedded dependable computing platform and detection method thereof
CN103795905A (en) * 2013-11-03 2014-05-14 北京工业大学 Trusted starting method of web camera
CN104217141A (en) * 2014-09-04 2014-12-17 东莞理工学院 Reinforced virtual instrument measuring software metrology support method and device
CN104598841A (en) * 2014-12-29 2015-05-06 东软集团股份有限公司 Double-system guide method and device facing terminal security
CN104794393A (en) * 2015-04-24 2015-07-22 杭州字节信息技术有限公司 Embedded type partition image security certification and kernel trusted boot method and equipment thereof
CN104834845A (en) * 2015-05-12 2015-08-12 武汉上博科技有限公司 Implementation method for credible industrial camera
WO2015143989A1 (en) * 2014-03-25 2015-10-01 华为技术有限公司 Credible kernel starting method and device
CN105653269A (en) * 2015-12-28 2016-06-08 北京星地恒通信息科技有限公司 Boot starting device and method
CN106156635A (en) * 2016-07-29 2016-11-23 深圳兆日科技股份有限公司 Method for starting terminal and device
CN106484477A (en) * 2016-10-11 2017-03-08 上海华虹集成电路有限责任公司 The software download of safety and startup method
CN107315960A (en) * 2017-06-23 2017-11-03 联想(北京)有限公司 The control method and system of credible platform module
CN107992372A (en) * 2017-12-13 2018-05-04 郑州云海信息技术有限公司 A kind of chassis information exchange method, system, equipment and computer-readable storage medium
CN109245899A (en) * 2018-09-06 2019-01-18 成都三零嘉微电子有限公司 One kind being based on the novel trust chain design method of SM9 cryptographic algorithm
CN109325352A (en) * 2018-08-28 2019-02-12 全球能源互联网研究院有限公司 A kind of credible calculating platform framework
CN110263545A (en) * 2019-05-22 2019-09-20 西安理工大学 A kind of start-up course integrity measurement detection method based on android system
CN111597560A (en) * 2020-05-18 2020-08-28 国网电力科学研究院有限公司 Secure trusted module starting method and system
CN112445537A (en) * 2020-12-11 2021-03-05 中国科学院信息工程研究所 Trusted starting method and device of operating system, mobile terminal and storage medium
CN112769800A (en) * 2020-12-31 2021-05-07 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) Switch integrity verification method and device and computer storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6711675B1 (en) * 2000-02-11 2004-03-23 Intel Corporation Protected boot flow
US6931545B1 (en) * 2000-08-28 2005-08-16 Contentguard Holdings, Inc. Systems and methods for integrity certification and verification of content consumption environments
US20030037237A1 (en) * 2001-04-09 2003-02-20 Jean-Paul Abgrall Systems and methods for computer device authentication
CN100489728C (en) * 2004-12-02 2009-05-20 联想(北京)有限公司 Method for establishing trustable operational environment in a computer

Cited By (52)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101515316B (en) * 2008-02-19 2011-09-28 北京工业大学 Trusted computing terminal and trusted computing method
CN102396251A (en) * 2009-04-15 2012-03-28 交互数字专利控股公司 Validation and/or authentication of device for communication with network
CN101888442A (en) * 2010-04-16 2010-11-17 中兴通讯股份有限公司 Security management method for mobile terminal and mobile terminal
US8850212B2 (en) * 2010-05-21 2014-09-30 Hewlett-Packard Development Company, L.P. Extending an integrity measurement
CN103038745B (en) * 2010-05-21 2016-08-24 惠普发展公司,有限责任合伙企业 Extension integrity measurement
US20130061056A1 (en) * 2010-05-21 2013-03-07 Graeme John Proudler Extending an integrity measurement
CN103038745A (en) * 2010-05-21 2013-04-10 惠普发展公司,有限责任合伙企业 Extending an integrity measurement
CN102314354A (en) * 2010-06-30 2012-01-11 无锡中星微电子有限公司 Embedded system starting method and embedded device
CN102012979A (en) * 2010-11-15 2011-04-13 深圳市华威世纪科技股份有限公司 Embedded credible computing terminal
CN102012979B (en) * 2010-11-15 2012-07-04 深圳市华威世纪科技股份有限公司 Embedded credible computing terminal
CN102223232A (en) * 2011-05-12 2011-10-19 郑州信大捷安信息技术股份有限公司 Trusted system building method and system based on USB safety memory encryption card
CN102355467A (en) * 2011-10-18 2012-02-15 国网电力科学研究院 Power transmission and transformation equipment state monitoring system security protection method based on trust chain transmission
CN102355467B (en) * 2011-10-18 2015-07-08 国网电力科学研究院 Power transmission and transformation equipment state monitoring system security protection method based on trust chain transmission
CN102880828A (en) * 2012-09-07 2013-01-16 普华基础软件股份有限公司 Intrusion detection and recovery system aiming at virtualization support environment
CN102880828B (en) * 2012-09-07 2015-02-04 普华基础软件股份有限公司 Intrusion detection and recovery system aiming at virtualization support environment
CN103139221A (en) * 2013-03-07 2013-06-05 中国科学院软件研究所 Dependable virtual platform and construction method thereof, data migration method among platforms
CN103139221B (en) * 2013-03-07 2016-07-06 中国科学院软件研究所 Data migration method between a kind of dependable virtual platform and construction method, platform
CN103455750A (en) * 2013-08-26 2013-12-18 北京视博数字电视科技有限公司 High-security verification method and high-security verification system for embedded devices
CN103455750B (en) * 2013-08-26 2016-08-10 北京视博数字电视科技有限公司 The high peace verification method of a kind of embedded device and device
CN103795905A (en) * 2013-11-03 2014-05-14 北京工业大学 Trusted starting method of web camera
CN103646214A (en) * 2013-12-18 2014-03-19 国家电网公司 Method for establishing trusted environment in power distribution terminal
CN103646214B (en) * 2013-12-18 2016-08-31 国家电网公司 A kind of method setting up trusted context in distribution terminal
CN103760892B (en) * 2014-01-23 2017-06-06 国家电网公司 A kind of embedded credible calculating platform and its detection method
CN103760892A (en) * 2014-01-23 2014-04-30 国家电网公司 Embedded dependable computing platform and detection method thereof
KR101894926B1 (en) * 2014-03-25 2018-09-04 후아웨이 테크놀러지 컴퍼니 리미티드 Trusted kernel starting method and apparatus
WO2015143989A1 (en) * 2014-03-25 2015-10-01 华为技术有限公司 Credible kernel starting method and device
US10032030B2 (en) 2014-03-25 2018-07-24 Huawei Technologies Co., Ltd. Trusted kernel starting method and apparatus
KR20160130790A (en) * 2014-03-25 2016-11-14 후아웨이 테크놀러지 컴퍼니 리미티드 Credible kernel starting method and device
CN104217141A (en) * 2014-09-04 2014-12-17 东莞理工学院 Reinforced virtual instrument measuring software metrology support method and device
CN104217141B (en) * 2014-09-04 2017-02-15 东莞理工学院 Reinforced virtual instrument measuring software metrology support method and device
CN104598841A (en) * 2014-12-29 2015-05-06 东软集团股份有限公司 Double-system guide method and device facing terminal security
CN104598841B (en) * 2014-12-29 2017-11-28 东软集团股份有限公司 A kind of the dual system bootstrap technique and device of terminaloriented safety
CN104794393B (en) * 2015-04-24 2017-11-10 杭州字节信息技术有限公司 A kind of embedded partitions image safety certification and kernel trusted bootstrap method and its equipment
CN104794393A (en) * 2015-04-24 2015-07-22 杭州字节信息技术有限公司 Embedded type partition image security certification and kernel trusted boot method and equipment thereof
CN104834845A (en) * 2015-05-12 2015-08-12 武汉上博科技有限公司 Implementation method for credible industrial camera
CN105653269A (en) * 2015-12-28 2016-06-08 北京星地恒通信息科技有限公司 Boot starting device and method
CN106156635A (en) * 2016-07-29 2016-11-23 深圳兆日科技股份有限公司 Method for starting terminal and device
CN106484477B (en) * 2016-10-11 2019-11-12 上海华虹集成电路有限责任公司 The software download and starting method of safety
CN106484477A (en) * 2016-10-11 2017-03-08 上海华虹集成电路有限责任公司 The software download of safety and startup method
CN107315960A (en) * 2017-06-23 2017-11-03 联想(北京)有限公司 The control method and system of credible platform module
CN107315960B (en) * 2017-06-23 2020-08-25 联想(北京)有限公司 Control method and system of trusted platform module
CN107992372A (en) * 2017-12-13 2018-05-04 郑州云海信息技术有限公司 A kind of chassis information exchange method, system, equipment and computer-readable storage medium
CN109325352A (en) * 2018-08-28 2019-02-12 全球能源互联网研究院有限公司 A kind of credible calculating platform framework
CN109245899A (en) * 2018-09-06 2019-01-18 成都三零嘉微电子有限公司 One kind being based on the novel trust chain design method of SM9 cryptographic algorithm
CN109245899B (en) * 2018-09-06 2021-03-16 成都三零嘉微电子有限公司 Trust chain design method based on SM9 cryptographic algorithm
CN110263545A (en) * 2019-05-22 2019-09-20 西安理工大学 A kind of start-up course integrity measurement detection method based on android system
CN110263545B (en) * 2019-05-22 2022-11-04 西安理工大学 Starting process integrity measurement detection method based on Android system
CN111597560A (en) * 2020-05-18 2020-08-28 国网电力科学研究院有限公司 Secure trusted module starting method and system
CN111597560B (en) * 2020-05-18 2023-05-09 国网电力科学研究院有限公司 Safe and reliable module starting method and system
CN112445537A (en) * 2020-12-11 2021-03-05 中国科学院信息工程研究所 Trusted starting method and device of operating system, mobile terminal and storage medium
CN112769800A (en) * 2020-12-31 2021-05-07 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) Switch integrity verification method and device and computer storage medium
CN112769800B (en) * 2020-12-31 2022-10-04 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) Switch integrity verification method and device and computer storage medium

Also Published As

Publication number Publication date
CN100454324C (en) 2009-01-21

Similar Documents

Publication Publication Date Title
CN100454324C (en) Embed type platform guiding of credible mechanism
CN105205401B (en) Trusted computer system and its trusted bootstrap method based on security password chip
US11093258B2 (en) Method for trusted booting of PLC based on measurement mechanism
EP3582129B1 (en) Technologies for secure hardware and software attestation for trusted i/o
US9230116B2 (en) Technique for providing secure firmware
CN100568254C (en) A kind of credible platform module and active measure thereof
CN102004876B (en) Security terminal reinforcing model and reinforcing method of tolerable non-trusted component
US7849315B2 (en) Method for managing operability of on-chip debug capability
CN107665308B (en) TPCM system for building and maintaining trusted operating environment and corresponding method
CN103186434A (en) Method and system for recovering basic input/output system
CN104794393A (en) Embedded type partition image security certification and kernel trusted boot method and equipment thereof
CN111399919A (en) Starting method and system of server, electronic equipment and storage medium
CN103080904A (en) Providing a multi-phase lockstep integrity reporting mechanism
CN101221509B (en) Bus arbitration starting method of reliable embedded system
CN112800429B (en) Method for protecting driver in UEFI BIOS firmware system based on basicity
CN105122261A (en) Recovering from compromised system boot code
WO2011146305A2 (en) Extending an integrity measurement
CN105718806A (en) Method for realizing credible active measurement based on domestic BMC and TPM2.0
CN104850792A (en) Establishment method and apparatus of trust chain of server
CN103049293B (en) A kind of startup method of embedded credible system
US10181956B2 (en) Key revocation
CN101645127A (en) Method for establishing trusted booting system based on EFI
CN102880828A (en) Intrusion detection and recovery system aiming at virtualization support environment
CN100504897C (en) Method for starting protected partition
TWI468973B (en) Clearing secure system resources in a computing device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090121

Termination date: 20200921