CN106557700A - A kind of gauging system and method for trusted computer - Google Patents

A kind of gauging system and method for trusted computer Download PDF

Info

Publication number
CN106557700A
CN106557700A CN201611058840.9A CN201611058840A CN106557700A CN 106557700 A CN106557700 A CN 106557700A CN 201611058840 A CN201611058840 A CN 201611058840A CN 106557700 A CN106557700 A CN 106557700A
Authority
CN
China
Prior art keywords
oprom
trusted computer
check
informations
reading
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611058840.9A
Other languages
Chinese (zh)
Other versions
CN106557700B (en
Inventor
肖佐楠
郑茳
匡启和
王廷平
秦赟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CCore Technology Suzhou Co Ltd
Original Assignee
CCore Technology Suzhou Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CCore Technology Suzhou Co Ltd filed Critical CCore Technology Suzhou Co Ltd
Priority to CN201611058840.9A priority Critical patent/CN106557700B/en
Publication of CN106557700A publication Critical patent/CN106557700A/en
Application granted granted Critical
Publication of CN106557700B publication Critical patent/CN106557700B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of gauging system and method for trusted computer, the system includes:Credible tolerance portion and the OPROM calibration equipments being connected with trusted computer in trusted computer, OPROM calibration equipments are used for storage carries out the OPROM check informations of Hash verifications, and corresponding check results to the data in the mainboard SPI Flash of trusted computer;Credible tolerance portion is used to reading and replicating OPROM check informations, carries out Hash verifications according to the data in mainboard SPI Flash of the OPROM check informations to trusted computer, and corresponding check results are stored to OPROM calibration equipments.Using external OPROM calibration equipments storage OPROM check informations, to verify to the data in the SPI Flash in trust computing mainboard, and store corresponding check results, after trusted computer enters operating system, user can be directly viewable the check results of record, and without the need for modifying to mainboard BIOS without modifying to hardware during this, it is convenient to realize, reduces extra hardware cost.

Description

A kind of gauging system and method for trusted computer
Technical field
The present invention relates to reliable computing technology field, more particularly to a kind of gauging system and side for trusted computer Method.
Background technology
With the development of information technology, for the safety for ensureing to calculate and communication system is overall, in calculating and communication system Trust computing is introduced in system, trust computing is being calculated and widely used in communication system based under hardware security module support Credible calculating platform.
Since 20 century 70s, many trust computings have been proposed from application program, operating system and hardware view Platform, but it is wherein most practical be credible calculating platform based on hardware platform.Trust computing purpose is to ensure row For safety, and propose that one kind can surmount preset security rule, perform the run entity of special behavior.Due to computer network Using continuous development, computer information safe problem emerges in an endless stream, and takes other technologies means all be difficult to make up due to meter The hidden danger that the safety defect and insincere factor that calculation machine itself is present is brought to information security.Therefore, development is gone from hardware view Trusted computer is really to realize the developing direction of trust computing at present.In existing trusted computer platform, in order to protect The secure and trusted of card credible calculating platform, needs the BIOS to hardware system mainboard etc. to measure.But, in existing tolerance In scheme, generally involve the modification of the BIOS to hardware system mainboard or be related to the modification to hardware to complete tolerance, This improves the hardware cost of tolerance.
Thus, when how the hardware system in calculating and communication system carries out credible and secure tolerance, it is to avoid it is right to be related to The BIOS or hardware of mainboard modifies, and to reduce extra hardware cost, is that those skilled in the art need to solve at present Technical problem.
The content of the invention
It is an object of the invention to provide a kind of gauging system and method for trusted computer, can be to calculating and leading to When hardware system in letter system carries out credible and secure tolerance, it is to avoid be related to the BIOS to mainboard or hardware is modified, with Reduce extra hardware cost.
To solve above-mentioned technical problem, the invention provides following technical scheme:
A kind of gauging system for trusted computer, including:Credible tolerance portion in trusted computer and with institute The OPROM calibration equipments of trusted computer connection are stated,
Wherein, the OPROM calibration equipments are used to store to enter the data in the mainboard SPI Flash of the trusted computer The OPROM check informations of row Hash verifications, and corresponding check results;
The credible tolerance portion is used to reading and replicating the OPROM check informations, according to the OPROM check informations pair Data in the mainboard SPI Flash of the trusted computer carry out Hash verifications, and corresponding check results are stored to described OPROM calibration equipments.
Preferably, the OPROM calibration equipments are PCIe card, and the PCIe card is by PCIE buses and the trust computing Machine connects.
Preferably, the credible tolerance portion includes:
BIOS module, for booting up self-inspection during electricity in the trusted computer, and scans the PCIE buses, reads Take and replicate the OPROM check informations;
Internal memory portion, for storing the OPROM check informations that the BIOS module is replicated;
Performing module, for according to the OPROM check informations stored in the internal memory portion to the trusted computer Mainboard SPI Flash in data carry out Hash verifications, and corresponding check results are stored into the PCIe card.
Preferably, the BIOS module includes:
Self-test unit, for booting up self-inspection during electricity in the trusted computer;
Whether detector unit, for scanning the PCIE buses, believe comprising OPROM verifications in detecting the PCIe card Breath, when including the OPROM check informations in the PCIe card, writes to the OPROM base address registers of the PCIe card Free address in the system address space of one trusted computer;
Reading unit, for reading the content at OPROM base address, judges that whether two bytes of reading value are 0x55AA;
Copied cells, during for two bytes of the reading value are judged in the reading unit as 0x55AA, replicates OPROM check informations in the PCIe card are to the internal memory portion.
A kind of measure for trusted computer, including:
Reading be arranged in the OPROM calibration equipments in trusted computer for the mainboard to the trusted computer Data in SPI Flash carry out the OPROM check informations of Hash verifications;
Replicate in the internal memory of the OPROM check informations to the trusted computer;
Hash schools are carried out according to the data in mainboard SPI Flash of the OPROM check informations to the trusted computer Test;
The Hash is verified corresponding check results to store into the OPROM calibration equipments.
Preferably, read be arranged in the OPROM calibration equipments in trusted computer for the trusted computer Mainboard SPI Flash in data carry out the OPROM check informations of Hash verifications, including:
Obtain the power on signal of the trusted computer;
The PCIE buses in the trusted computer are scanned, the OPROM calibration equipments in the PCIE buses are detected;
Whether the OPROM check informations are included in judging the OPROM calibration equipments;
If so, a trusted computer is write to the OPROM base address registers of the OPROM calibration equipments then Free address in system address space;
Content at the OPROM base address of the base address register for reading the OPROM calibration equipments;
Whether the byte for judging the predeterminated position of reading value is preset value;
If so, the OPROM check informations are then extracted;
If it is not, then send to the operating system of the trusted computer starting triggering command.
Preferably, whether the byte of the predeterminated position for judging reading value is preset value, is:
Whether two bytes for judging the reading value are 0x55AA.
Compared with prior art, above-mentioned technical proposal has advantages below:
The gauging system for trusted computer provided by the embodiment of the present invention, including:In trusted computer Credible tolerance portion and the OPROM calibration equipments being connected with trusted computer, OPROM calibration equipments are used for storage to trusted computer Mainboard SPI Flash in data carry out the OPROM check informations of Hash verifications, and corresponding check results;Credible tolerance Portion is used to reading and replicating OPROM check informations, according in mainboard SPI Flash of the OPROM check informations to trusted computer Data carry out Hash verifications, and corresponding check results are stored to OPROM calibration equipments.Employ trusted computer external OPROM calibration equipments store OPROM check informations, for carrying out to the data in the SPI Flash in trust computing mainboard Verification, and corresponding check results are stored, so after trusted computer enters operating system, user can be directly viewable The check results recorded in OPROM calibration equipments, complete the purpose of OPROM metric computers, and without the need for mainboard during this BIOS modifies without modifying to hardware, and it is convenient to realize, reduces extra hardware cost.
Description of the drawings
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing Accompanying drawing to be used needed for having technology description is briefly described, it should be apparent that, drawings in the following description are the present invention Some embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, can be with basis These accompanying drawings obtain other accompanying drawings.
The gauging system structural representation for trusted computer that Fig. 1 is provided by a kind of specific embodiment of the invention Figure;
The measure flow chart for trusted computer that Fig. 2 is provided by a kind of specific embodiment of the invention.
Specific embodiment
The core of the present invention is to provide a kind of gauging system and method for trusted computer, can be to calculating and leading to When hardware system in letter system carries out credible and secure tolerance, it is to avoid be related to the BIOS to mainboard or hardware is modified, with Reduce extra hardware cost.
In order that the above objects, features and advantages of the present invention can become apparent from it is understandable, below in conjunction with the accompanying drawings to this Bright specific embodiment is described in detail.
Elaborate detail in order to fully understand the present invention in the following description.But the present invention can with it is various not It is same as alternate manner described here to implement, those skilled in the art can do class in the case of without prejudice to intension of the present invention Like popularization.Therefore the present invention is not limited by following public specific embodiment.
Refer to Fig. 1, the gauging system for trusted computer that Fig. 1 is provided by a kind of specific embodiment of the invention Structural representation.
A kind of specific embodiment of the present invention provides a kind of gauging system for trusted computer, including:It is located at Credible tolerance portion 1 and the OPROM calibration equipments 2 being connected with trusted computer in trusted computer, wherein, OPROM verifications set Standby 2 are used for storage carries out the OPROM check informations of Hash verifications to the data in the mainboard SPI Flash of trusted computer, and Corresponding check results;Credible tolerance portion 1 is used to reading and replicating OPROM check informations, according to OPROM check informations to credible Data in the mainboard SPI Flash of computer carry out Hash verifications, and corresponding check results are stored to OPROM calibration equipments 2.In the present embodiment, OPROM calibration equipments 2 are preferably PCIe card, and PCIe card passes through PCIE buses and trusted computer connects Connect.
In the present embodiment, using OPROM calibration equipments being loaded in the SPI internal memories of the mainboard to trusted computer The check information verified by data, the space that can break away from trusted computer ROM are limited.It is credible when carrying out to trusted computer During tolerance, it is only necessary to read and replicate OPROM verifications by the credible tolerance portion in trusted computer from OPROM calibration equipments Information, and Hash verifications are carried out according to the data in mainboard SPI Flash of the OPROM check informations to trusted computer, in school Corresponding check results are stored to OPROM calibration equipments after the completion of testing.So, when the os starting of trusted computer Afterwards, only trusted computer need to be operated to view the check results by checking OPROM calibration equipment internal memories.This programme passes through OPROM is measured to computer, and it is convenient to realize, and without the need for modify to mainboard BIOS without modifying to hardware, Reduce extra hardware cost.
It should be noted that so-called OPROM refers to expansion ROM, i.e., one group being stored in PCIE device card internal memory Firmware program, this group of program can be called during startup self-detection by the system bios of main frame.
On the basis of above-mentioned embodiment, in one embodiment of the invention, credible tolerance portion includes:
BIOS module, for booting up self-inspection during electricity in trusted computer, and scans PCIE buses, reads and replicates OPROM check informations;
Internal memory portion, for storing the OPROM check informations of BIOS module duplication;
Performing module, for the mainboard SPI Flash according to the OPROM check informations stored in internal memory portion to trusted computer In data carry out Hash verifications, and corresponding check results are stored into PCIe card.
Wherein, BIOS module includes:
Self-test unit, for booting up self-inspection during electricity in trusted computer;
Whether detector unit, for scanning PCIE buses, include OPROM check informations in detection PCIe card, in PCIe card In comprising OPROM check informations when, the system address of a trusted computer is write to the OPROM base address registers of PCIe card Free address in space;
Reading unit, for reading the content at OPROM base address, judges that whether two bytes of reading value are 0x55AA;
Copied cells, during for two bytes of reading value are judged in reading unit as 0x55AA, replicates in PCIe card OPROM check informations to internal memory portion.
In the present embodiment, BIOS module is the basic input output system in computer, and which is one group and is cured to meter The program on a rom chip of mainboard is calculated, this group of program includes the program of the most important basic input and output of computer, opens Machine self-check program and system self-triggered program.The major function of BIOS is to provide the bottom, most direct hardware for computer It is set and controlled.
The electricity when starting in trusted computer, the self-test unit in BIOS module starts startup self-detection;Then detect single Unit scans PCIE buses to check the PCIe card in bus;Whether OPROM check informations are included in detection PCIe card, in this enforcement In mode, OPROM check informations include OPROM programs and Hash checking algorithms, and configuration address to the OPROM bases of PCIe card Location depositor;Then reading unit reads the content at OPROM base address, judges that whether two bytes of reading value are 0x55AA;If two bytes of reading value are not 0x55AA, the inspection to OPROM is skipped, and then continue to start credible meter The operating system of calculation machine;If two bytes of reading value are 0x55AA, copied cells replicates the OPROM verifications in PCIe card Information to internal memory portion, will OPROM check informations copy in the free memory inside trusted computer, then in trust computing OPROM programs are performed in the internal memory of machine, OPROM programs are according to default Hash checking algorithms in computer motherboard SPI Flash Data carry out Hash verifications, and corresponding check results are stored in the internal memory of PCIe card, now, BIOS module will be credible The control of computer gives the operating system of computer, and the operating system of computer starts to start, enters in computer and operate After system, the operation for responding user can check the internal memory of PCIe card, so as to obtain check results.
Refer to Fig. 2, the measure for trusted computer that Fig. 2 is provided by a kind of specific embodiment of the invention Flow chart.
Correspondingly, one embodiment of the present invention additionally provides a kind of measure for trusted computer, including:
S11:Reading be arranged in the OPROM calibration equipments in trusted computer for the mainboard to trusted computer Data in SPI Flash carry out the OPROM check informations of Hash verifications.
Wherein, read be arranged in the OPROM calibration equipments in trusted computer for the mainboard to trusted computer Data in SPI Flash carry out the OPROM check informations of Hash verifications, including:
The power on signal of trusted computer is obtained, and self-inspection is booted up to control trusted computer;
PCIE buses in scanning trusted computer, detect the OPROM calibration equipments in PCIE buses;
Whether OPROM check informations are included in judging OPROM calibration equipments;
If so, the system address of a trusted computer is write to the OPROM base address registers of OPROM calibration equipments then Free address in space;
Content at the OPROM base address of the base address register for reading OPROM calibration equipments;
Whether the byte for judging the predeterminated position of reading value is preset value, and preferably the preset value is 0x55AA;
If so, OPROM check informations are then extracted;
If it is not, then send to the operating system of trusted computer starting triggering command.
S12:Replicate in the internal memory of OPROM check informations to trusted computer.
S13:Hash verifications are carried out according to the data in mainboard SPI Flash of the OPROM check informations to trusted computer.
S14:Hash is verified corresponding check results to store into OPROM calibration equipments.
In the present embodiment, in the computer booting self-inspection stage, by the OPROM verification letters in OPROM calibration equipments Breath is verified to the data in SPI Flash on computer motherboard, and check results are stored on OPROM calibration equipments, The record that computer can be checked in OPROM calibration equipments into after operating system completes OPROM tolerance obtaining check results The purpose of computer, is measured to computer by OPROM, and it is convenient to realize, and without the need for mainboard BIOS is modified also without Hardware need to be modified, reduce extra hardware cost.
In sum, the gauging system and method for trusted computer provided by the present invention, is set by OPROM verifications OPROM check informations in standby are verified to the data in SPI Flash on computer motherboard, and check results are stored in On OPROM calibration equipments, the record in computer can check OPROM calibration equipments into after operating system is being verified As a result, computer is measured by OPROM, it is convenient to realize, and without the need for modifying mainboard BIOS without to hardware Modify, reduce extra hardware cost.
Above a kind of gauging system and method for trusted computer provided by the present invention is described in detail.This Apply specific case to be set forth the principle and embodiment of the present invention in text, the explanation of above example is only intended to Help understands the present invention and its core concept.It should be pointed out that for those skilled in the art, without departing from On the premise of the principle of the invention, some improvement and modification can also be carried out to the present invention, these improve and modification also falls into this In bright scope of the claims.

Claims (7)

1. a kind of gauging system for trusted computer, it is characterised in that include:Credible tolerance in trusted computer Portion and the OPROM calibration equipments being connected with the trusted computer,
Wherein, the OPROM calibration equipments are used for storage is carried out to the data in the mainboard SPI Flash of the trusted computer The OPROM check informations of Hash verifications, and corresponding check results;
The credible tolerance portion is used to reading and replicating the OPROM check informations, according to the OPROM check informations to described Data in the mainboard SPI Flash of trusted computer carry out Hash verifications, and corresponding check results are stored to the OPROM Calibration equipment.
2. system according to claim 1, it is characterised in that the OPROM calibration equipments are PCIe card, the PCIe card Connected by PCIE buses and the trusted computer.
3. system according to claim 2, it is characterised in that the credible tolerance portion includes:
BIOS module, for booting up self-inspection during electricity in the trusted computer, and scans the PCIE buses, read and Replicate the OPROM check informations;
Internal memory portion, for storing the OPROM check informations that the BIOS module is replicated;
Performing module, for the master according to the OPROM check informations stored in the internal memory portion to the trusted computer Data in plate SPI Flash carry out Hash verifications, and corresponding check results are stored into the PCIe card.
4. system according to claim 3, it is characterised in that the BIOS module includes:
Self-test unit, for booting up self-inspection during electricity in the trusted computer;
Whether detector unit, for scanning the PCIE buses, include the OPROM check informations in detecting the PCIe card, When the OPROM check informations are included in the PCIe card, one is write to the OPROM base address registers of the PCIe card Free address in the system address space of the trusted computer;
Reading unit, for reading the content at OPROM base address, judges whether two bytes of reading value are 0x55AA;
Copied cells, during for two bytes of the reading value are judged in the reading unit as 0x55AA, replicates described OPROM check informations in PCIe card are to the internal memory portion.
5. a kind of measure for trusted computer, it is characterised in that include:
Reading is arranged on dodging for the mainboard SPI to the trusted computer in the OPROM calibration equipments in trusted computer Data in depositing carry out the OPROM check informations of Hash verifications;
Replicate in the internal memory of the OPROM check informations to the trusted computer;
Hash verifications are carried out according to the data in mainboard SPI Flash of the OPROM check informations to the trusted computer;
The Hash is verified corresponding check results to store into the OPROM calibration equipments.
6. method according to claim 5, it is characterised in that the OPROM verifications that reading is arranged in trusted computer set The OPROM check informations that Hash verifications are carried out for the data in the mainboard SPI Flash to the trusted computer in standby, bag Include:
Obtain the power on signal of the trusted computer;
The PCIE buses in the trusted computer are scanned, the OPROM calibration equipments in the PCIE buses are detected;
Whether the OPROM check informations are included in judging the OPROM calibration equipments;
If so, the system for a trusted computer being write to the OPROM base address registers of the OPROM calibration equipments then Free address in address space;
Content at the OPROM base address of the base address register for reading the OPROM calibration equipments;
Whether the byte for judging the predeterminated position of reading value is preset value;
If so, the OPROM check informations are then extracted;
If it is not, then send to the operating system of the trusted computer starting triggering command.
7. method according to claim 6, it is characterised in that whether the byte of the predeterminated position for judging reading value be Preset value, be:
Whether two bytes for judging the reading value are 0x55AA.
CN201611058840.9A 2016-11-24 2016-11-24 A kind of gauging system and method for trusted computer Active CN106557700B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611058840.9A CN106557700B (en) 2016-11-24 2016-11-24 A kind of gauging system and method for trusted computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611058840.9A CN106557700B (en) 2016-11-24 2016-11-24 A kind of gauging system and method for trusted computer

Publications (2)

Publication Number Publication Date
CN106557700A true CN106557700A (en) 2017-04-05
CN106557700B CN106557700B (en) 2019-11-26

Family

ID=58445065

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611058840.9A Active CN106557700B (en) 2016-11-24 2016-11-24 A kind of gauging system and method for trusted computer

Country Status (1)

Country Link
CN (1) CN106557700B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107729354A (en) * 2017-08-30 2018-02-23 晶晨半导体(上海)股份有限公司 A kind of picture sort method and system
CN110245495A (en) * 2018-03-09 2019-09-17 阿里巴巴集团控股有限公司 BIOS method of calibration, configuration method, equipment and system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101515316A (en) * 2008-02-19 2009-08-26 北京工业大学 Trusted computing terminal and trusted computing method
CN102063591A (en) * 2011-01-07 2011-05-18 北京工业大学 Methods for updating PCR (Platform Configuration Register) reference values based on trusted platform
CN202362788U (en) * 2011-11-21 2012-08-01 国民技术股份有限公司 Dependable computing device with USB (Universal Serial Bus) interfaces
CN102693385A (en) * 2012-05-28 2012-09-26 山东神思电子技术股份有限公司 Embedded terminal based on SD (secure digital) trusted computing module and implementation method thereof
CN104331666A (en) * 2014-11-10 2015-02-04 成都卫士通信息产业股份有限公司 Trusted measurement method for computer systems
CN105160255A (en) * 2015-08-06 2015-12-16 浪潮电子信息产业股份有限公司 Trustworthy measurement apparatus and method
CN105303094A (en) * 2015-05-07 2016-02-03 同方计算机有限公司 Safety self-verification system of USB main control chip and safety self-verification method of USB main control chip
CN106127057A (en) * 2016-06-23 2016-11-16 浪潮电子信息产业股份有限公司 Method for constructing trusted boot control based on TPM

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101515316A (en) * 2008-02-19 2009-08-26 北京工业大学 Trusted computing terminal and trusted computing method
CN102063591A (en) * 2011-01-07 2011-05-18 北京工业大学 Methods for updating PCR (Platform Configuration Register) reference values based on trusted platform
CN202362788U (en) * 2011-11-21 2012-08-01 国民技术股份有限公司 Dependable computing device with USB (Universal Serial Bus) interfaces
CN102693385A (en) * 2012-05-28 2012-09-26 山东神思电子技术股份有限公司 Embedded terminal based on SD (secure digital) trusted computing module and implementation method thereof
CN104331666A (en) * 2014-11-10 2015-02-04 成都卫士通信息产业股份有限公司 Trusted measurement method for computer systems
CN105303094A (en) * 2015-05-07 2016-02-03 同方计算机有限公司 Safety self-verification system of USB main control chip and safety self-verification method of USB main control chip
CN105160255A (en) * 2015-08-06 2015-12-16 浪潮电子信息产业股份有限公司 Trustworthy measurement apparatus and method
CN106127057A (en) * 2016-06-23 2016-11-16 浪潮电子信息产业股份有限公司 Method for constructing trusted boot control based on TPM

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107729354A (en) * 2017-08-30 2018-02-23 晶晨半导体(上海)股份有限公司 A kind of picture sort method and system
CN107729354B (en) * 2017-08-30 2021-08-10 晶晨半导体(上海)股份有限公司 Picture ordering method and system
CN110245495A (en) * 2018-03-09 2019-09-17 阿里巴巴集团控股有限公司 BIOS method of calibration, configuration method, equipment and system

Also Published As

Publication number Publication date
CN106557700B (en) 2019-11-26

Similar Documents

Publication Publication Date Title
US8099718B2 (en) Method and system for whitelisting software components
EP1754126B1 (en) Enhancing trusted platform module performance
US10204698B2 (en) Method to dynamically inject errors in a repairable memory on silicon and a method to validate built-in-self-repair logic
EP2754085B1 (en) Verifying firmware integrity of a device
CN111638936B (en) Virtual machine static measurement method and device based on built-in security architecture
US7293204B2 (en) Computer peripheral connecting interface system configuration debugging method and system
US20090328022A1 (en) Systems and methods for maintaining crtm code
CN108280351A (en) A kind of credible startup method of the electricity consumption acquisition terminal based on TPM
CN102012979A (en) Embedded credible computing terminal
US20130173899A1 (en) Method for Secure Self-Booting of an Electronic Device
CN106557700B (en) A kind of gauging system and method for trusted computer
CN112925524A (en) Method and device for detecting unsafe direct memory access in driver
US11347582B2 (en) Method and apparatus for self-diagnosis of ram error detection logic of powertrain controller
JP2005149501A (en) System and method for testing memory with expansion card using dma
CN115599618A (en) Register dynamic relocation verification method and device, storage medium and processor
JP3171325B2 (en) Memory test apparatus and method and recording medium
JP2013257711A (en) Information processing device and information processing method
WO2012008319A1 (en) Emulator verification system, emulator verification method
CN112765021A (en) Debugging and checking method, device, equipment and storage medium of boot program
JP2003271694A (en) Simulation method and device for verifying logic circuit including processor and error detecting program for verifying logic circuit
CN112486747A (en) Memory abnormity detection method and device, electronic equipment and readable storage medium
CN112069009A (en) Method and device for pressure test in Recovery mode and terminal equipment
EP3387535B1 (en) Apparatus and method for software self test
CN110399726A (en) TPM phy chip detection method, device, equipment and readable storage medium storing program for executing
US20230155840A1 (en) Information processing apparatus and control method for information processing apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 215011 23rd Floor, Building 3, Suzhou Pioneer Park, 209 Zhuyuan Road, Suzhou High-tech Zone, Jiangsu Province

Applicant after: Suzhou Guoxin Technology Co., Ltd.

Address before: 215011 23rd Floor, Building 3, Suzhou Pioneer Park, 209 Zhuyuan Road, Suzhou High-tech Zone, Jiangsu Province

Applicant before: C*Core Technology (Suzhou) Co., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant