CN106156632A - Safety device and within it provide security service to the method for main frame, safety equipment - Google Patents

Safety device and within it provide security service to the method for main frame, safety equipment Download PDF

Info

Publication number
CN106156632A
CN106156632A CN201610326247.1A CN201610326247A CN106156632A CN 106156632 A CN106156632 A CN 106156632A CN 201610326247 A CN201610326247 A CN 201610326247A CN 106156632 A CN106156632 A CN 106156632A
Authority
CN
China
Prior art keywords
safety
special purpose
safety device
device driver
driver
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610326247.1A
Other languages
Chinese (zh)
Other versions
CN106156632B (en
Inventor
Z·赫尔沙曼
丹·摩瑞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Winbond Electronics Corp
Nuvoton Technology Corp
Original Assignee
Winbond Electronics Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US14/714,298 external-priority patent/US10303880B2/en
Application filed by Winbond Electronics Corp filed Critical Winbond Electronics Corp
Publication of CN106156632A publication Critical patent/CN106156632A/en
Application granted granted Critical
Publication of CN106156632B publication Critical patent/CN106156632B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of safety device and within it provides security service to the method for main frame, safety equipment.Security service is provided to comprise the safety command of the application program of execution on the next comfortable main frame of reception to the method for main frame in safety device.Safety command is performed by access nonvolatile memory (NVM) device, wherein non-volatile memory device by the external safety device of special purpose device driver with penetrating to application program, and special purpose device driver performs on main frame and in the catch cropping conciliation of NVM device and safety device.

Description

Safety device and within it provide security service to the method for main frame, safety equipment
The mutual reference of related application
The application advocates in the U.S. Provisional Application No.62/028 that on July 24th, 2014 files an application, the rights and interests of 345, The disclosure of which is incorporated by reference to herein.
Technical field
The present invention is to generally relate to a kind of secured computing environment, and in particular to a kind of safety device and within it carries Method, safety equipment and computer software product for security service to main frame.
Background technology
In computing systems, believable calculating (Trusted Computing) is for such as by believable computation organization The safe practice that (Trusted Computing Group, TCG) researched and developed and advocated.By believable calculating, by adopting Computer behavior is realized with encryption and other safe practices.For example, it is exposed in this U.S. being incorporated by reference State's patent publication No. 2005/0021968 elaborates a kind of method providing secure firmware to update.First checking authority is Utilize key (key) produced by security credence (secure token) to be securely stored in platform in an encrypted form, such as may be used Trusted platform module (Trusted Platform Module, TPM).The configuration of platform is " impressing (imprinted) ", makes Must similarly configure and need to be used in the key of deciphering the first checking authority with access by the deblocking key to platform configuration. During firmware renewal process subsequently, the firmware comprising the second checking authority updates image and receives on platform.If it is flat Platform is configured to identical, when key is sealed up, can unseal key and is used in deciphering the first checking authority.? PKI (public key) in first checking authority can be then used by being updated with checking firmware by the second checking authority Image.
As another example, it is exposed in this U.S. Patent Publication No. 2003/0061494 being incorporated by reference and illustrates A kind of method and system protecting computer data.Computer provides to have and is preloaded into operating system (pre-operating System, pre-OS) space and be now loaded into operating system (operating system-present, OS-present) space. Protection bin (protected storage) is from pre-OS spatial access by reliable platform module (TPM).Similar Ground, protection bin is to be accessed from OS-present space by TPM.Therefore, computer can be avoided without awarding The data that the user of power is stored in access protection bin in pre-OS space and OS-present space.
Summary of the invention
The embodiment of invention as described herein is to provide and a kind of provides security service to the side of main frame in safety device Method, it comprises the safety command receiving the application program performed on comfortable main frame.Safety command is by access safety dress Put outer nonvolatile memory (Non-Volatile Memory, NVM) device and be performed, the most non-volatile deposit Reservoir is held to application program, special purpose device driver by special purpose device driver penetrating (transparently) on main frame Row is also reconciled between NVM device and safety device.
In certain embodiments, safety device, special purpose device driver and NVM device all meet believable calculating The respective safety criterion of tissue (Trusting Computing Group, TCG).In other embodiments, safety device with Special purpose device driver and at least one of NVM device storage area are that the regulation enforcement according to TCG is credible Rely console module (TPM).
In an embodiment, execution safety command is included between application program and special purpose device driver and communicates, And safety device is in main frame as master control (master) on the safety device interface as subordinate (slave).At another In embodiment, execution safety command is comprised and is led between special purpose device driver and NVM device by interface Letter.In still another embodiment, perform safety command and comprise and write data into by safety device claimed apparatus driver NVM device or from NVM device read data.
In certain embodiments, it is desirable to device driver is included in safety device internal preparation requirement, and is sent out by interface The number of delivering letters to device driver to obtain requirement.In other embodiments, it is desirable to device driver is included in safety device Buffer in preparation requirement, and waiting device driver is by obtaining requirement so that device driver carrys out poll buffer. In other embodiments other, perform preparation in safety command is included in safety device and complete the execution of safety command Time instruction respond, and indicate application program wherein to instruct response to be ready for being employed program and read.
Additionally, provide a kind of safety device according to embodiments of the invention, it comprises HPI and circuit.Main frame Interface is to configure to receive the safety command of the application program performed on comfortable main frame.Circuit is to configure with by access Nonvolatile memory (NVM) device is to perform safety command, and wherein non-volatile memory device is outside safety device By special purpose device driver with penetrating to application program, and special purpose device driver performs and at NVM on main frame Reconcile between device and safety device.
Additionally, provide a kind of safety equipment according to embodiments of the invention, it comprises the peace providing security service to main frame Full device and the special purpose device driver performed on main frame.Device driver is that configuration is with in safety device and peace Reconcile between nonvolatile memory (NVM) device outside full device.Safety device is to configure to receive comfortable main frame The safety command of the application program of upper execution, and by special purpose device driver access NVM device with penetrating extremely application Program and perform safety command.
Additionally, provide a kind of computer software product according to embodiments of the invention, it comprises and wherein stores programmed instruction Tangible non-transitory embodied on computer readable media (tangible non-transitory computer-readable medium), The instruction when being read by the processor of main frame, causes processor to run special purpose device driver, to pass through special purpose device Driver is mediated between safety device and non-volatile memory device, and wherein safety device is at main frame The application program of upper execution provides security service and nonvolatile memory (NVM) device outside safety device is penetrating extremely Application program.
Accompanying drawing explanation
The present invention understands in the detailed description of the following embodiment of the present invention more fully by graphic for collocation:
Fig. 1 schematically illustrates the block chart of the calculating system according to embodiment as herein described;And
Fig. 2 schematically illustrates the stream of the method providing security service according to embodiment as herein described in calculating system Cheng Tu.
Reference
20: system
24: main frame
28: safety device
32,40: interface
36: non-volatile memory device
44:CPU
48: security application
52: device driver
60: microcontroller
62: internal bus-bar
64: HPI
66: system management module
68: random access memory
72: read only memory
76: disposably can program storage
80: crypto engine
100,104,106,108,112,114,116,120,124,126,128,132: step
Detailed description of the invention
The embodiment of invention as described herein provides the method and system of a kind of safety improving calculating system.At this In embodiment disclosed by literary composition, safety device is as the crypto-coprocessor (cryptographic for main frame co-processor).The auxiliary of host computer safety device perform provide security service security application, its Also referred to herein as " application program ".Security application transmits safety command to safety device, and from safety device Receive and each instruct response.
When providing the service of security application, safety device needs to access external non-volatile memory (NVM) sometimes Device.In the context and claim of present disclosure, word " NVM device " is even if referring to do not have merit Also storage stored repeatedly programmable storage device (multi-time programmable storage is retained during rate device).Exemplary NVM device comprises flash device (Flash device) and electronics can be erased, and programmable is read-only Memorizer (Electrically Erasable Programmable Read-Only Memory, EEPROM) device.
In public technology, main frame operates in penetrating (transparently) to the safety device of security application and outer The special purpose device driver mediated between portion's NVM device, it is also known as " device driver " in this article. Device driver allows safety device by device driver with the outside NVM of indirect access.
Special purpose device driver passes through interface communication connecting safety device, and wherein main frame is used as master control and safety device is used As subordinate.As subordinate, safety device directly cannot start exchange (transaction), such as outside access on interface Portion NVM.As described herein, several mechanism are for overcoming this difficulty, although that is be under slave mode, still may be used Exchange is started by safety device.
In exemplary embodiments, safety device receives the safety command of the security application from main frame.Work as execution Instruction needs to be written into external NVM device or when external NVM device reads access, safety device is correspondingly wanted Device driver is asked to access external NVM device.In certain embodiments, safety device internal preparation requirement, and lead to Cross generation interrupt signal and be ready for requirement with notice device driver.In other embodiments, device driver passes through Poll buffer in safety device or memory location are to obtain requirement.Device driver passes through first interface from peace Full device reading requirement, and write data into outside NVM as requested or read data from outside NVM.Device Driver provides from the data of outside NVM acquisition to safety device.
To external NVM device, safety device can require that multiple storage cycles are to perform safety command by device driver. Such as, safety device can ask to perform one or more reading operations of single safety command and/or one or many Individual write operation.Following instructions performs, and instruction response is back to security application by safety device.Instruction response can Comprise encryption the result of operation, error reporting with and the like.
In certain embodiments, outside NVM can comprise the known NVM dress of the additional use being used in calculating system Put.At least one of existing (typically cost is low) NVM device of safe storage, safety it is applicable to by utilization Device could be designed without to be had internal NVM or only has miniature NVM device, uses reduction cost.
Owing to main frame is communicatively coupled with safety device by interface, wherein main frame is used as master control and safety device is used As subordinate, interface is no longer necessary to bus-bar master control (bus mastering) and arbitration (arbitration) function, thus drops The low complexity of interface.In addition, the interface not having bus-bar master control support can be used as.
System description
Fig. 1 schematically illustrates the block chart of the calculating system 20 according to embodiment as herein described.System 20 comprises master Machine 24, it communicates to connect safety device 28 by first interface 32, and by the second interface 40 communicate to connect non-easily The property lost memorizer (NVM) device 36.Safety device 28 is as the crypto-coprocessor for main frame.
Main frame 24 comprises execution security application 48 and the CPU44 of special purpose device driver 52, and it is and peace Full device 28 provides the main frame 24 believable calculating of required execution and the function of other security strategies together.Safety applications Program 48 is used for the operating system (OS) of execution on main frame and the common of other application programs to safety device 28 offer Application programming interface (common application programming interface, API).
In certain embodiments, system 20 is to hold according to the standard developed by believable computation organization (TCG) The believable calculating system of row.In this embodiment, safety device 28 can be with special purpose device driver 52 and at least The storage area of the NVM device 36 of part jointly comprises reliable platform module (TPM).Additionally, safety applications journey Sequence 48 can comprise TCG software and stack (TCG Software Stack, TSS).For example, it is incorporated to as ginseng at this The three part TPM master ga(u)ge models the examined TPM that has been specification, version 1.2, the second level, revision number 116,2011 3 The moon 1.Three parts of TPM master ga(u)ge model comprise: " TPM the first major part: design principle ", " TPM Two major parts: TPM structure " and " TPM the 3rd major part: instruction ".For example, TSS is described In on March 7th, 2007 distribution " TCG software stack (TCG Software Stack, TSS) specification version 1.2, The first order, errata A, Part I: instruction and structure " in, it is as with reference to citation to this paper.
In certain embodiments, believable calculating is carried out in personal computer (PC) system.It is applicable to pc user TCG standard be described on February 24th, 1, version 1.21, errata revision number 1.00 (for TPM family 1.2;The second level) " be applicable to TCG pc user's special implementing specification of known BIOS ", with And on March 21st, 2013, " TCG pc user special TPM interface specification (the TPM Interface of version 1.3 Specification, TIS) " in, it is as with reference to citation to this paper.
For example, security application 48 provides safe storage service, and such as control system resource is in order to store letter The access of breath.In certain embodiments, safety stores is pre-at some by defining one or more safe storage districts Can access and realize under fixed condition.For example, these conditions can comprise address space, system mode, access right, Object authority and read/write protection.
In following narration, it is assumed that security application 48 is designed to directly into interface security device 28, as above-mentioned The regulation of the TCG specification quoted.
In certain embodiments, security application 48 is to transmit respective safety command to safety device by interface 32 28, to provide security service (such as the OS of main frame).When receiving safety command, safety device 28 decodes Instruction also thus performs instruction.
The execution of at least some safety command relates to accessing NVM device, such as, store and capture confidential information.One In a little embodiments, safety device comprises inside (the most small-sized) NVM.In other embodiments, replace or except Beyond internal NVM, safety device access can be used in the system outside NVM for additional use, such as NVM Device 36.As it has been described above, in addition to security application 48, CPU44 performs special purpose device driver 52 in peace The catch cropping of full device 28 and NVM device 36 is reconciled.Penetrating to security application 48, device driver 52 Safety device 28 indirect access external NVM device 36 is provided.
Safety device 28 can require to access NVM device 36 from device driver 52 in every way.In an embodiment In, safety device 28 is internal, such as, in pre-defined buffer, prepare requirement, and produce interrupt signal with logical Know that device driver passes through interface 32 reading requirement.In another embodiment, device driver poll is at safety device Interior buffer, to have recognized whether requirement co-pending.In still another embodiment, device driver 52 is to have ready conditions Ground checks the buffer numerical value in safety device, such as in response to transmitting the safety command safety applications to safety device Program.
When device driver 52 receive the write from safety device require time, device driver is stored by interface 40 Respective data in outside NVM.In certain embodiments, before issuing write requirement, safety device adds Close and/or flag data.When device driver 52 receives the reading requirement from safety device, device driver leads to Cross interface 40 and from outside NVM reading requirement data and transmit acquisition data to safety device by interface 32.When picking Fetch data encrypted and labelling time, safety device can verify that and solve ciphertext data.
Interface 32 and 40 can comprise the interface being arbitrarily suitable for.For example, interface 32 can comprise low pin number and confluxes Arrange (Low Pin Count bus, LPC), serial peripheral interface (Serial peripheral Interface, SPI) or be internally integrated Circuit (Inter-Integrated Circuit, I2C) bus-bar.For example, interface 40 can comprise serial peripheral interface (SPI). In certain embodiments, interface 32 and 40 comprises respective (identical or different) interface.In other embodiments, Interface 32 and 40 can comprise same-interface, or shares one or more interface signals.
The lower half of Fig. 1 is the block chart illustrating safety device 28.In this example, safety device 28 comprises and passes through The microcontroller 60 of multiple element interconnections of internal bus-bar 62 and safety device.Microcontroller 60 is used as The main control unit of safety device.Safety device 28 comprises the HPI 64 being communicated to connect main frame by interface 32 Module.
Microcontroller 60 receives the safety command received by HPI 64, and may use in due course in peace Other elements in full device perform these instructions.System management module 66 provide device element running needed for various Signal, such as, seem power distribution, clock signal and interrupt signal.In certain embodiments, system management module 66 comprise one or more timer, and it can such as be used in time stamp (time-stamping) data.
Safety device 28 comprises random access memory (Random Access Memory, RAM) 68, and it stores temporarily Data and the coded command of possible microcontroller 60.Read only memory (Read Only Memory, ROM) 72 Module store for the coded command of microcontroller 60.Additionally, ROM72 can store various constant value.Disposably Can configure and depend on generating (at by program (One Time Programmable, OTP) memorizer 76 safe storage device Production) and for the unique key of each safety device.In certain embodiments, substitute or except OTP store Beyond device 76, safety device comprises the EEPROM that can be used with storing internal confidential and/or entity is the most reproducible Function (Physical Unclonable Function, PUF).
Safety device 28 further includes the various encryption functions of support and the crypto engine (cryptographic of algorithm engine)80.In certain embodiments, crypto engine 80 supports encryption primitive (crypto primitive) and algorithm, Such as random number production method (Random Number Generation, RNG), encryption/deciphering algorithm, such as advanced Encryption standard (Advanced Encryption Standard, AES)), for the asymmetric password algorithm of public key encryption (Rivest-Shamir-Adleman, RSA) encryption system, error corrected code/decoding (Error Correction Coding/Decoding) and cryptographic Hash function method (cryptographic hash function), such as secure hash is drilled Algorithm (Secure Hash Algorithm) (SHA-256).Crypto engine 80 provides core encryption function, such as encrypt/ Deciphering and labelling and checking.
The believable calculating of pc user
In certain embodiments, the system 20 of Fig. 1 comprises PC system.Table 1 below is the TCG quoted according to top Specification, converges the relation between various elements and the element of corresponding pc user of whole system 20.
Table 1
The configuration of the system 20 shown in Fig. 1 and safety device 28 is for purely illustrating to clearly show that concept Exemplary arrangement.Additionally, be used as other calculating systems being arbitrarily suitable for and safety device configuration.In order to understand The unwanted element of principle of the present invention, can be for clarity and from graphic deletion, the most various interfaces, control Circuit, addressing circuit, sequence circuit and debugging circuit.
In the illustrative system shown in Fig. 1 configures, CPU44, safety device 28 and NVM device 36 conduct Respective integrated circuit (ICs) performs.But, in alternative embodiments, the CPU of at least two, safety device with And NVM device can be integrated in single multi-chip package (Multi-Chip Package, MCP) or embedded system On respective semiconductor grain in chip (System on Chip, SoC), and can be interconnected by internal bus-bar.
The different elements of safety device 28 can use the hardware being arbitrarily suitable for perform, such as ASIC (Application-Specific Integrated Circuit, ASIC) or field effect can plan grid array (Field-Programmable Gate Array,FPGA).In certain embodiments, some elements of safety device can make Perform with the combination of software or use hardware and software element.For example, in the present embodiment, crypto engine 80 and system management module 66 can perform as application specific hardware modules.As another example, stamped signature calculates (signature And encryption/decryption function can be on the hardware being positioned at crypto engine 80, by microcontroller 60 calculation) Perform on the software performed or according in the combination of hardware and software.
In the described and claimed of lower section, the various elements of the safety device not comprising HPI 64 are led to It is referred to as circuit.
Typically, the CPU44 in main frame 24 comprises general processor (general-purpose processor), its Software is programmed execution function as herein described.Software Electronically can be downloaded in processor by network, Such as or can be provided alternatively or additionally and/or store to non-transitory tangible medium (non-transitory tangible Media), such as magnetic storage, optical memory or electronic memory.
By the exemplary methods performed by safety device
Fig. 2 schematically illustrates the stream of the method providing security service according to embodiment as herein described in computing systems Cheng Tu.For example, method can be performed by the safety device 28 of Fig. 1.In the described method, it is assumed that peace Full device is the calculating system of part, such as the system 20 of (or similar in appearance to) Fig. 1.
It is (logical that method receives safety command by safety device 28 by the module of HPI 64 in receiving step 100 Cross interface 32 and connect main frame) start.Safety command is derived from security application 48, and identification is provided by safety device One or more cryptographic services.In decoding step 104, the instruction of safety device decoding security is as the stage to be performed. Decoded result generally comprises and requires service and the kenel of possible one or more parameters, such as, seem that identification is respective Encryption primitive, the parameter of addressing and the dimension information relevant to the data of application service and the like.
In order to perform instruction, safety device must can access outside NVM.Safety device can determine based on order parameter The outside NVM of access.Alternatively or additionally, this determines to can be depending on the inside flag being saved in outside NVM (flags), parameter and other data, if necessary, also can be reduced by safety device (restored).
In write checks step 106, safety device inspection performs whether instruction requires to access outside NVM.Work as peace When full device needs to write data into outside NVM, method gets down to encryption and markers step 108.In this example, Order parameter comprises original plaintext data (plaintext data), and safety device such as uses crypto engine 80 to add Close and/or labelling original plaintext data, such as safety command institute specification.The following step 108, is ready to be stored to outside The encryption of NVM and flag data.
Requiring step 112 in write, safety device requires the data result from device driver 52 storing step 108 At outside NVM.As it has been described above, the subordinate that safety device is interface 32, it is possible to various methods require to store Operation, as it was previously stated, such as by producing interrupt signal to main frame.In response to requiring, device driver passes through interface 32 read and the data of labelling encrypted in step 108 from safety device, and store data in outside by interface 40 In NVM.
When in step 106, when safety device need not write outside NVM, method sets about reading inspection step 114, Wherein safety device inspection performs whether instruction requires to read the outside NVM of access.If so, method sets about reading requirement Step 116, wherein safety device requires to read the data from outside NVM from device driver 52.In response to reading Taking requirement, device driver 52 is read from the data required by external NVM device 36 by interface 40, and Acquisition data is transmitted to safety device by interface 32.In deciphering and verification step 120, safety device checking and solution Close reading data, such as, use crypto engine 80.
At subsequent step 112 or 120, or when when the inspection result of step 114 is for negative, method gets down to continue Instruction perform step 124.In step 124, safety device performs safety command or one part, and it may use The data captured from outside NVM.Terminate step 126 in loop, safety device checks whether and additionally accesses outside NVM is necessary to complete to perform instruction.When needs additionally access, method loops back step 106.Otherwise, Method gets down to respond preliminary step 128.
In step 128, safety device reserved instruction is responded, and such as it can comprise the result of encryption function, error report And the like.In response notification step 132, safety device notice security application is ready for instruction and responds. Similar in appearance to the above-mentioned method for claimed apparatus driver, safety device such as by producing interrupt signal, or can be pacified Full application program can the poll pre-defined buffer in safety device, to notify security application.Safety applications Program then passes through interface 32 and reads the instruction response from safety device, and ending method.
The method of Fig. 2 is to give by way of example, and is used as other methods being suitable for.For example, one In a little embodiments, safety command may indicate that outside for original plaintext write NVM or reads original bright from outside NVM Literary composition.In such embodiments, may skip step 108 and 120.
Although above-described embodiment calculates system referring especially to such as PC etc., but similar embodiment also can perform to count at other In calculation system, such as mobile device, Internet of Things, intelligent electric meter (smart metering), automobile-used and industrial system/environment.
Disclosed technology can be used in the application of various safe storage, such as, seem clean boot (secured booting) Or believable startup (trusted booting).For example, believable computation organization (TCG) specified in more detail is contained in Unification extensible firmware interface (the Unified Extensible of the support clean boot function of Windows 8 operating system Firmware Interface,UEFI).As another example, Chromium operating system comprises as believable startup The checking of scheme starts function.These functions may utilize method described herein and system performs.
It will be appreciated that being only for example property of above-described embodiment illustrates, and the present invention is not limited to being particularly shown of this paper And explanation.But, scope of the invention comprises combination and sub-portfolio and the affiliated skill of various features described herein Art skilled person can carry out at reading foregoing and not be exposed in change of the prior art and amendment.As ginseng Examine document citation and should regard as the integrated part of subject application to the file of the present patent application, unless whole and file at these Defined in any word scope have when conflicting with definition explicitly or implicitly in this specification, then should only consider this Shen Definition in please.

Claims (19)

1. one kind provides security service to the method for main frame in safety device, it is characterised in that described side Method comprises:
One security service a to main frame is provided in a safety device, and receives from performing on the host One safety command of one application program;And
By accessing a non-volatile memory device to perform described safety command, described nonvolatile memory Device by an external described safety device of special purpose device driver with penetrating to described application program, described special Device driver performs and on the host at described non-volatile memory device and described safety device Catch cropping reconcile.
Method the most according to claim 1, it is characterised in that described safety device, described special dress Set driver and described non-volatile memory device all meet the respective safety post of believable computation organization Accurate.
Method the most according to claim 1, it is characterised in that described safety device and described special dress Set driver and at least one of described non-volatile memory device storage area are together according to believable The regulation enforcement reliable platform module of computation organization.
Method the most according to claim 1, it is characterised in that perform the step bag of described safety command It is contained between described application program and described special purpose device driver foundation communication connection, and described safety device The most described main frame is used as master control and described safety device is used as on an interface of subordinate.
Method the most according to claim 4, it is characterised in that perform the step bag of described safety command Containing logical to set up between described special purpose device driver and described non-volatile memory device by described interface Letter connects.
Method the most according to claim 4, it is characterised in that perform the step bag of described safety command Require that described special purpose device driver writes data into described nonvolatile memory containing by described safety device Device, or read data from described non-volatile memory device.
Method the most according to claim 6, it is characterised in that require described special purpose device driver Step is included in internal preparation one requirement of described safety device, and is sent a signal to described special by described interface Device driver is to obtain described requirement.
Method the most according to claim 6, it is characterised in that require described special purpose device driver Step is included in preparation one requirement in a buffer of described safety device, and waits described special purpose device driver By with buffer described in described special purpose device driver poll to obtain described requirement.
Method the most according to claim 1, it is characterised in that perform the step bag of described safety command In being contained in described safety device, a preparation instruction when completing the execution of described safety command is responded, and indicates institute State application program to be ready to treat that the described instruction that described application program reads is responded.
10. a safety device, it is characterised in that described safety device comprises:
One HPI, described HPI is to configure to receive the application program performed on a comfortable main frame A safety command;And
One circuit, described circuit is that configuration is with by accessing a non-volatile memory device to perform described safety Instruction, described non-volatile memory device is with logical by an external described safety device of special purpose device driver Thoroughly to described application program, described special purpose device driver is to perform on the host and described non-volatile The catch cropping of storage arrangement and described safety device is reconciled.
11. safety devices according to claim 10, it is characterised in that described safety device is with described Special purpose device driver and at least one of described non-volatile memory device storage area basis together The regulation enforcement reliable platform module of believable computation organization.
12. safety devices according to claim 10, it is characterised in that described circuit is to configure with logical Cross and between described application program and described special purpose device driver, set up communication connection to perform described safety Instruction, and the most described main frame of described safety device is used as master control and described safety device is used as subordinate On one interface.
13. safety devices according to claim 12, it is characterised in that described circuit is to configure with logical Cross by described interface logical to set up between described special purpose device driver and described non-volatile memory device Letter connection performs described safety command.
14. safety devices according to claim 12, it is characterised in that described circuit is to configure to want Described special purpose device driver is asked to write data into described non-volatile memory device or from described non-volatile Storage arrangement reads data.
15. safety devices according to claim 14, it is characterised in that described circuit is that configuration is with pin Described safety device is prepared in inside a requirement, and sends a signal to described special purpose device by described interface and drive Dynamic device is to obtain described requirement.
16. safety devices according to claim 10, it is characterised in that described circuit is that configuration is with in advance A standby instruction when completing the execution of described safety command is responded, and indicates described application program to be ready to treat institute State the described instruction response that application program reads.
17. 1 kinds of safety equipment, it is characterised in that described safety equipment comprise:
One safety device, described safety device provides a security service to a main frame;And
One special purpose device driver, described special purpose device driver performs on the host,
Wherein said special purpose device driver is that configuration is with at described safety device and external described safety device A non-volatile memory device catch cropping reconcile, and wherein said safety device be configure with receive come comfortable One safety command of the application program performed on described main frame, and access institute by described special purpose device driver State penetrating to the described application program of non-volatile memory device to perform described safety command.
18. safety equipment according to claim 17, it is characterised in that described safety device, described Special purpose device driver and described non-volatile memory device all meet the respective of believable computation organization Safety criterion.
19. safety equipment according to claim 17, it is characterised in that described application program and institute Stating safety device is to configure to be communicatively coupled with described special purpose device driver by an interface, wherein said Main frame is used as master control and described safety device is used as subordinate.
CN201610326247.1A 2015-05-17 2016-05-17 Safety device and method of the security service to host, safety equipment are provided in it Active CN106156632B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US14/714,298 2015-05-17
US14/714,298 US10303880B2 (en) 2014-07-24 2015-05-17 Security device having indirect access to external non-volatile memory

Publications (2)

Publication Number Publication Date
CN106156632A true CN106156632A (en) 2016-11-23
CN106156632B CN106156632B (en) 2019-10-29

Family

ID=57354017

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610326247.1A Active CN106156632B (en) 2015-05-17 2016-05-17 Safety device and method of the security service to host, safety equipment are provided in it

Country Status (1)

Country Link
CN (1) CN106156632B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111797440A (en) * 2019-04-07 2020-10-20 新唐科技股份有限公司 Security device, method and system thereof
CN112468300A (en) * 2019-09-09 2021-03-09 新唐科技股份有限公司 Key management device with bypass channel and processor chip
CN112487509A (en) * 2019-09-12 2021-03-12 新唐科技股份有限公司 Security device and security method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060107032A1 (en) * 2004-11-17 2006-05-18 Paaske Timothy R Secure code execution using external memory
CN202067280U (en) * 2010-08-25 2011-12-07 深圳中泽明芯科技有限公司 Protective device for embedded software
CN102819699A (en) * 2012-06-04 2012-12-12 珠海欧比特控制工程股份有限公司 Processor system
CN104376277A (en) * 2013-08-13 2015-02-25 华邦电子股份有限公司 Computing device, method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060107032A1 (en) * 2004-11-17 2006-05-18 Paaske Timothy R Secure code execution using external memory
CN202067280U (en) * 2010-08-25 2011-12-07 深圳中泽明芯科技有限公司 Protective device for embedded software
CN102819699A (en) * 2012-06-04 2012-12-12 珠海欧比特控制工程股份有限公司 Processor system
CN104376277A (en) * 2013-08-13 2015-02-25 华邦电子股份有限公司 Computing device, method and system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111797440A (en) * 2019-04-07 2020-10-20 新唐科技股份有限公司 Security device, method and system thereof
CN111797440B (en) * 2019-04-07 2023-05-19 新唐科技股份有限公司 Security device, method and system
CN112468300A (en) * 2019-09-09 2021-03-09 新唐科技股份有限公司 Key management device with bypass channel and processor chip
CN112468300B (en) * 2019-09-09 2023-07-04 新唐科技股份有限公司 Key management device with bypass channel and processor chip
CN112487509A (en) * 2019-09-12 2021-03-12 新唐科技股份有限公司 Security device and security method
CN112487509B (en) * 2019-09-12 2024-04-09 新唐科技股份有限公司 Safety device and safety method

Also Published As

Publication number Publication date
CN106156632B (en) 2019-10-29

Similar Documents

Publication Publication Date Title
US10303880B2 (en) Security device having indirect access to external non-volatile memory
US11843705B2 (en) Dynamic certificate management as part of a distributed authentication system
US10503892B2 (en) Remote attestation for multi-core processor
US8572410B1 (en) Virtualized protected storage
EP3582129B1 (en) Technologies for secure hardware and software attestation for trusted i/o
US10536274B2 (en) Cryptographic protection for trusted operating systems
US10402567B2 (en) Secure boot for multi-core processor
JP2022528070A (en) Verification of the ID of an emergency vehicle while driving
CN106682518A (en) Method for guaranteeing firmware security of management controller and computer apparatus
US20180285600A1 (en) Connected secure iot processor
US10708061B2 (en) Secure key storage for multi-core processor
US9152576B2 (en) Mode-based secure microcontroller
CN106716435B (en) Interface between a device and a secure processing environment
Buhren et al. Fault attacks on encrypted general purpose compute platforms
CN106156632A (en) Safety device and within it provide security service to the method for main frame, safety equipment
CN103427989A (en) Data encryption and identity authentication method oriented in environment of internet of things
CN113343245B (en) Chip secure starting method, secure chip and receiver thereof
CN109684126A (en) For the Memory Checkout method of ARM equipment and the ARM equipment of execution Memory Checkout
US10169616B1 (en) Cryptographic processing of data and instructions stored off-chip
US8429423B1 (en) Trusted platform modules
US20230078138A1 (en) Computing systems employing measurement of boot components, such as prior to trusted platform module (tpm) availability, for enhanced boot security, and related methods
JP6318868B2 (en) Authentication system and portable communication terminal
CN109753453A (en) A kind of trusted system of storage isolation
CN105844147A (en) Application attestation method and apparatus
US20230015334A1 (en) Deriving dependent symmetric encryption keys based upon a type of secure boot using a security processor

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant