CN105528239B - The key management method of virtual credible platform module based on credible root server - Google Patents

The key management method of virtual credible platform module based on credible root server Download PDF

Info

Publication number
CN105528239B
CN105528239B CN201610028806.0A CN201610028806A CN105528239B CN 105528239 B CN105528239 B CN 105528239B CN 201610028806 A CN201610028806 A CN 201610028806A CN 105528239 B CN105528239 B CN 105528239B
Authority
CN
China
Prior art keywords
key
vtpm
tpm
credible
platform module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201610028806.0A
Other languages
Chinese (zh)
Other versions
CN105528239A (en
Inventor
王冠
袁华浩
王子祎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Technology
Original Assignee
Beijing University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Technology filed Critical Beijing University of Technology
Priority to CN201610028806.0A priority Critical patent/CN105528239B/en
Publication of CN105528239A publication Critical patent/CN105528239A/en
Application granted granted Critical
Publication of CN105528239B publication Critical patent/CN105528239B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45587Isolation or security of virtual machine instances

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention proposes the key management methods of the virtual credible platform module based on credible root server, this method is based on the frame of credible root server, combine the function and key management mechanism of physical trusted platform module, this method had both met the demand of VTPM, in turn ensured the safety of key.In the method, all keys are generated by physics TPM, ensure that normalization and legitimacy that key generates;Key is stored by physics TPM, is managed by key cache mechanism, guarantees the safety of key;Unique subscriber of the virtual credible platform module manager as physics TPM is concentrated and carries out standardized administration to the key of VTPM, and provide cryptographic service to VTPM.

Description

The key management method of virtual credible platform module based on credible root server
Technical field
The present invention is a kind of key management method of virtual credible platform module based on root server credible in cloud environment, Belong to information security field.
Background technique
In recent years, cloud computing technology develops rapidly, but the safety problem faced is also increasingly severe.Credible root server Scheme is a kind of technology that cloud environment safety is ensured using reliable computing technology.The program is by virtual credible root module VTPM from cloud It separates, is focused on a credible root server in server.Credible root server includes a physics trust computing mould Block TPM chip generates multiple virtual credible module VTPM then by virtualization technology, externally to provide trusted service.It is each A VTPM must can provide key management, identity, data protection, complete with physics TPM function having the same for outside The functions such as whole property storage and report.
Credible root server manages VTPM concentratedly, easy to maintain, easily expands.But at present for trusted root service The correlative study of device is not also that very much, key management functions are to realize the premise and basis of the various functions of trusted servers, is Primary solves the problems, such as.
Summary of the invention
The key that the present invention proposes a kind of virtual credible platform module in the environment of credible root server is generated, is stored It with the method for load, can not only meet the requirement of virtual credible platform module manager, but also can guarantee the safety of key.
To achieve the above object, the technical solution adopted by the present invention is the virtual credible platform mould based on credible root server The key management method of block, this method based on following steps realize,
1. key generates
1.1 endorsement key EK and Attestation Identity Key AIK
VTPM manager is the unique subscriber of physics TPM in credible root server, be responsible for the monitoring of VTPM order with Main function to the calling of TPM function, and endorsement key EK is to generate Attestation Identity Key AIK and establish TPM platform The owner is seldom used in other cases.This method using VTPM manager as the owner of physics TPM platform, by VTPM manager generates multiple AIK as the VAIK of each VTPM example by calling the function of TPM to use EK.Physics TPM EK directly as each VTPM example VEK.
1.2 storage key SKs and storage root key SRK
In the method, the storage root key that physics TPM is generated is permanently present inside TPM, for protecting other keys, Then multiple storage key SKs are generated as the storage root key VSRK of each VTPM example using physics TPM.VSRK by SRK is encrypted, to guarantee its safety.
1.3 other users class keys
Other User class keys can be generated by TPM, then give VTPM example by the distribution of VTPM manager, can also To be to import TPM after some VTPM is generated in outside, it is managed by TPM.
2. key storage
In the design of credible root server, unique subscriber of the VTPM manager as credible platform module, have be VTPM application and the responsibility for distributing key.Since credible platform module TPM ensures the safety of key with cache management mechanism Storage.Original mechanism that credible platform module is utilized in this method redesigns the structure of key storage tree to save VTPM's Key.Endorsement key EK and credible root key SRK are stored in inside credible platform module.Credible platform module TPM is each VTPM generates storage of the storage key SK as the VTPM with key VSRK.Each VSRK is encrypted and is protected by SRK. The sub-key of VSRK is exactly the key used in each VTPM, including Attestation Identity Key AIK, Binding key Binding Keys, signature key Signing Keys, derivative key Legacy Keys and authentication key Authentication Keys.
3. key load authorization
In credible root server according to key difference, its load and using when TPM have different authorizations.Physics is credible The owner of console module is VTPM manager.The load use process of VTPM application key includes the following steps,
(1) VTPM is issued to VTPM manager and is requested.
(2) VTPM manager receives request, the legitimacy of checking request.
(3) VTPM forwards a request to physics TPM and carries out authentication.
(4) it if VTPM manager authentication success, TPM do further operating according to different key requests, returns Key gives VTPM manager.
(5) if VTPM manager authentication fails, mistake is returned.
(6) VTPM manager returns result to VTPM.
All keys provide protection by physics TPM, and each virtual memory root key VSRK is by being permanently stored in physics TPM Storage root key encrypt, the key of each VTPM is encrypted by VSRK.
It needs to authorize load when key uses:
(1) owner of physical trusted platform module is VTPM manager, is owned when VTPM is using public key Person's authorization.
(2) virtual memory master key is used, it is necessary to which the storage master of the authorization, physical trusted platform module of verifying the owner is close The authorization of key authorization and virtual memory master key.
(3) the storage master key authorization, virtual of physical trusted platform module must be verified using virtual platform identity key Store authorization and the platform identity key authorization of master key.
(4) using virtual platform encryption key must verify storage master key authorization, the authorization of virtual memory master key and Platform encryption key authorization.
(5) user key authorization must be verified using Virtual User key.
The present invention is directed to the specific environment of credible root server, has the advantage that compared with prior art
1, the key of each VTPM in the present invention is generated by physical trusted platform module TPM, ensure that key generates Normalization.
2, key cache administrative mechanism is utilized in the present invention, carries out the storage management of key, each key is by hardware package Shield, ensure that the safety of key.
3, VTPM needs to verify by VTPM manager when application is licensed in the present invention and physics TPM is authenticated, and keeps away The unauthorized use of illegal request and key is exempted from.
Detailed description of the invention
Fig. 1 VTPM key derivation diagram;
Fig. 2 VTPM key storage tree structure;
Specific embodiment
1. key generting machanism
As shown in Figure 1, there are two key is more special in entire key derivation diagram:
(1) endorsement key EK.Endorsement key in VTPM directlys adopt the endorsement key in physics TPM, generation method There is similitude with the endorsement key generation method of physics TPM, there are two types of production methods: first is that using TPM command TPM_ CreateEndorsementKeyPair is generated, second is that by key " injection " technology, under the premise of trusting manufacturer, by making Quotient's generation is made, is then injected into TPM.
(2) storage root key SRK.Unique subscriber of the VTPM manager as physics TPM, storage root key are created in user Shi Shengcheng manages all key datas of user, only services for physics TPM.
Other keys:
(1) virtual platform body authentication key VAIK.The practical AIK for being physics TPM of VAIK, generation need trusted third party The support of PCA.PCA requests to generate AIK certificate according to TPM, and returns to TPM.
(2) virtual memory root key VSRK.Physics TPM generate a storage key, as virtual VTPM storage with close Key VSRK.
(3) other user keys after carrying out legitimacy certification by physics TPM, are generated by TPM and are used for VTPM.
2. cipher key storage mechanism
Key storage management in credible root server uses tree structure, main using key cache administrative mechanism KCM The resource being limited in TPM is managed, and these mechanism are hidden to application call.Application program can be by being added using KCM Key is carried into TPM.If all TPM resources are occupied, KCM needs to discharge resource for the key being not frequently used from TPM core It takes out in piece, often to pass in and out the key vacating space of TPM for those, the key of needs is put into TPM.
As shown in Fig. 2, the structure of storage tree is three layers, the depth of tree is moderate, when being not only convenient for management, but also can reduce load Between improve key service efficiency.Endorsement key EK and storage root key SRK are stored in inside physical trusted platform module TPM, tool There is very high safety.The storage root key VSRK that each VTPM is encrypted using the public key of storage root key is stored in outside TPM Portion, then by the storage root key VSRK of each VTPM to platform identity key VAIK, the signature key Singing in VTPM Keys, Binding key Binding Keys etc. carry out encryption storage.
3. key load mechanism
In credible root server there are multiple virtual credible platform module VTPM in the case where key load and authorization more Add complexity:
(1) owner of physical trusted platform module is VTPM manager, is owned when VTPM is using public key Person's authorization.
(2) virtual memory master key is used, it is necessary to which the storage master of the authorization, physical trusted platform module of verifying the owner is close The authorization of key authorization and virtual memory master key.
(3) the storage master key authorization, virtual of physical trusted platform module must be verified using virtual platform identity key Store authorization and the platform identity key authorization of master key.
(4) using virtual platform encryption key must verify storage master key authorization, the authorization of virtual memory master key and Platform encryption key authorization.
(5) user key authorization must be verified using Virtual User key.
Finally, it should be noted that above example is only to illustrate the present invention and not limits technical side described in the invention Case;Therefore, although this specification is referring to above-mentioned example, the present invention has been described in detail, this field it is general It is logical it will be appreciated by the skilled person that still can modify to the present invention or equivalent replacement;And all do not depart from the spirit of invention With the technical solution and its improvement of range, it is intended to be within the scope of the claims of the invention.

Claims (3)

1. the key management method of the virtual credible platform module based on credible root server, it is characterised in that: this method is based on Following steps realization,
1. key generates
1.1 endorsement key EK and Attestation Identity Key AIK
Virtual credible platform module VTPM manager is unique use of physical trusted platform module TPM in credible root server The monitoring to VTPM order and the calling to TPM function are responsible in family, and the main function of endorsement key EK is to generate identity card Bright key A IK and the owner for establishing TPM platform, are seldom used in other cases;This method using VTPM manager as The owner of physics TPM platform is used the function of physics TPM by VTPM manager, multiple bodies is generated using endorsement key EK Part proves that key A IK, the AIK of generation prove key VAIK as the virtual identity of each VTPM example;The endorsement of physics TPM is close Virtual endorsement key VEK of the key EK directly as each VTPM example;
1.2 storage key SKs and storage root key SRK
In the method, the storage root key SRK that physics TPM is generated is permanently present inside TPM, for protecting other keys, Then multiple storage key SKs are generated as the virtual memory root key VSRK of each VTPM example using physics TPM;It is empty Quasi- storage root key VSRK is encrypted by storage root key SRK;
1.3 other users class keys
Other User class keys can be generated by TPM, then give VTPM example by the distribution of VTPM manager, can also be Outside is to import TPM after some VTPM is generated, and is managed by TPM;
2. key storage
In the design of credible root server, unique subscriber of the VTPM manager as credible platform module, having is the Shen VTPM Please with distribution key responsibility;The original cache management mechanism of credible platform module is utilized in this method, is redesigned key and is deposited The structure of Chu Shu saves the key of VTPM;Endorsement key EK and credible root key SRK are stored in inside credible platform module;It can Believe that console module TPM is that each VTPM generates virtual memory root key VSRK of the storage key SK as the VTPM;Each VSRK is encrypted and is protected by SRK;The sub-key of VSRK is exactly the key used in each VTPM, including proof of identification is close Key AIK, Binding key Binding Keys, signature key Signing Keys, derivative key Legacy Keys and authentication key Authentication Keys;
3. key load authorization
According to the difference of key in credible root server, in its load and in use, TPM has different authorizations;Physics is credible The owner of console module TPM is VTPM manager;The load use process of VTPM application key includes the following steps,
(1) VTPM is issued to VTPM manager and is requested;
(2) VTPM manager receives request, the legitimacy of checking request;
(3) VTPM forwards a request to physics TPM and carries out authentication;
(4) if VTPM manager authentication success, TPM do further operating, " return " key" according to different key requests Give VTPM manager;
(5) if VTPM manager authentication fails, mistake is returned;
(6) VTPM manager returns result to VTPM.
2. the key management method of the virtual credible platform module according to claim 1 based on credible root server, Be characterized in that: all keys provide protection by physics TPM, and each virtual memory root key VSRK is by being permanently stored in physics TPM In storage root key encrypt, the key of each VTPM is encrypted by VSRK.
3. the key management method of the virtual credible platform module according to claim 1 based on credible root server, It is characterized in that: needing to authorize load when key uses:
The owner of physical trusted platform module is VTPM manager, needs to carry out owner's authorization when VTPM is using public key.
CN201610028806.0A 2016-01-15 2016-01-15 The key management method of virtual credible platform module based on credible root server Expired - Fee Related CN105528239B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610028806.0A CN105528239B (en) 2016-01-15 2016-01-15 The key management method of virtual credible platform module based on credible root server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610028806.0A CN105528239B (en) 2016-01-15 2016-01-15 The key management method of virtual credible platform module based on credible root server

Publications (2)

Publication Number Publication Date
CN105528239A CN105528239A (en) 2016-04-27
CN105528239B true CN105528239B (en) 2018-12-07

Family

ID=55770485

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610028806.0A Expired - Fee Related CN105528239B (en) 2016-01-15 2016-01-15 The key management method of virtual credible platform module based on credible root server

Country Status (1)

Country Link
CN (1) CN105528239B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10218696B2 (en) * 2016-06-30 2019-02-26 Microsoft Technology Licensing, Llc Targeted secure software deployment
CN106354550A (en) * 2016-11-01 2017-01-25 广东浪潮大数据研究有限公司 Method, device and system for protecting security of virtual machine
US11438155B2 (en) * 2017-01-24 2022-09-06 Microsoft Technology Licensing, Llc Key vault enclave
CN107465689B (en) * 2017-09-08 2020-08-04 大唐高鸿信安(浙江)信息科技有限公司 Key management system and method of virtual trusted platform module in cloud environment
US10757082B2 (en) 2018-02-22 2020-08-25 International Business Machines Corporation Transforming a wrapped key into a protected key
CN108572861A (en) * 2018-04-26 2018-09-25 浪潮(北京)电子信息产业有限公司 A kind of guard method, system, equipment and the storage medium of virtual credible root
CN109165079B (en) * 2018-08-07 2021-07-27 郑州云海信息技术有限公司 Cloud data center trusted platform based on virtualization and method for building trust chain
CN109167785B (en) * 2018-09-03 2022-04-29 郑州云海信息技术有限公司 Calling method of virtual trusted root and service server
CN113282910B (en) * 2021-04-22 2023-07-18 中国科学院软件研究所 Root key protection method for trusted computing trust root
CN115250189B (en) * 2021-04-27 2023-06-02 西门子(中国)有限公司 Key management method and device for intelligent household equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102427449A (en) * 2011-11-04 2012-04-25 北京工业大学 Trusted mobile storage method based on security chips
CN103888251A (en) * 2014-04-11 2014-06-25 北京工业大学 Virtual machine credibility guaranteeing method in cloud environment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102427449A (en) * 2011-11-04 2012-04-25 北京工业大学 Trusted mobile storage method based on security chips
CN103888251A (en) * 2014-04-11 2014-06-25 北京工业大学 Virtual machine credibility guaranteeing method in cloud environment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
可信存储的密钥迁移模型及封装方案;王冠 等;《信息网络安全》;20120510(第05期);第17-26页 *
基于TPM的可信存储的双向认证的研究;王冠 等;《2009全国计算机网络与通信学术会议论文集》;20090501;第228-233页 *

Also Published As

Publication number Publication date
CN105528239A (en) 2016-04-27

Similar Documents

Publication Publication Date Title
CN105528239B (en) The key management method of virtual credible platform module based on credible root server
US8468361B2 (en) System and method for securely provisioning and generating one-time-passwords in a remote device
US8140843B2 (en) Content control method using certificate chains
KR101214497B1 (en) Memory System with versatile content control
US8266711B2 (en) Method for controlling information supplied from memory device
US20140270179A1 (en) Method and system for key generation, backup, and migration based on trusted computing
US20080034440A1 (en) Content Control System Using Versatile Control Structure
US20080010685A1 (en) Content Control Method Using Versatile Control Structure
US20070168292A1 (en) Memory system with versatile content control
US20080010449A1 (en) Content Control System Using Certificate Chains
US20100138652A1 (en) Content control method using certificate revocation lists
US20080010451A1 (en) Content Control Method Using Certificate Revocation Lists
EP2284758A2 (en) Versatile content control with partitioning
CN104618096B (en) Protect method, equipment and the TPM key administrative center of key authorization data
US20080022395A1 (en) System for Controlling Information Supplied From Memory Device
KR20070091349A (en) System for creating control structure for versatile content control
CN104021335B (en) Password service method based on extensible password service framework
WO2008008244A2 (en) Content control system and method using versatile control structure
CN107911221B (en) Key management method for secure storage of solid-state disk data
WO2006069311A2 (en) Control structure for versatile content control and method using structure
CN105262590A (en) Method and system for safely insulating keys in virtual environment
TWI476629B (en) Data security and security systems and methods
CN106992978B (en) Network security management method and server
WO2008013656A2 (en) Content control system and method using certificate chains
WO2008013655A2 (en) Content control system and method using certificate revocation lists

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20181207

CF01 Termination of patent right due to non-payment of annual fee