CN109583196A - A kind of key generation method - Google Patents

A kind of key generation method Download PDF

Info

Publication number
CN109583196A
CN109583196A CN201811435862.1A CN201811435862A CN109583196A CN 109583196 A CN109583196 A CN 109583196A CN 201811435862 A CN201811435862 A CN 201811435862A CN 109583196 A CN109583196 A CN 109583196A
Authority
CN
China
Prior art keywords
hard disk
credible
tpcm
key
chip
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811435862.1A
Other languages
Chinese (zh)
Other versions
CN109583196B (en
Inventor
孙瑜
杨秩
洪宇
王涛
王强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING HUATECH TRUSTED COMPUTING INFORMATION TECHNOLOGY Co Ltd
Original Assignee
BEIJING HUATECH TRUSTED COMPUTING INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING HUATECH TRUSTED COMPUTING INFORMATION TECHNOLOGY Co Ltd filed Critical BEIJING HUATECH TRUSTED COMPUTING INFORMATION TECHNOLOGY Co Ltd
Priority to CN201811435862.1A priority Critical patent/CN109583196B/en
Publication of CN109583196A publication Critical patent/CN109583196A/en
Application granted granted Critical
Publication of CN109583196B publication Critical patent/CN109583196B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a kind of key generation methods, for the key for that may be used in TPCM safety chip allocating computer system secure launch process, to realize the safety certification of user identity, clear text key is generated in storage region in piece, and it is sent to after being encrypted outside piece and is stored in SDRAM, compared to outside piece SDRAM directly generate clear text key method, the safety in utilization of key can be promoted.

Description

A kind of key generation method
Technical field
The present invention relates to computer safety fields, and in particular to a kind of key generation method.
Background technique
Reliable computing technology development came into for 3.0 epoch, reliable computing technology from Passive Defence technical change at Active immunity, compared to the reliable computing technology of Passive Defence, the credible 3.0 dual system architectures formed can utilize TPCM (Trusted Platform Control Module) carries out actively measurement to system and actively monitors, and avoids Passive Defence TPM (Trusted Platform Module) trusted mechanism by system bypass.Actively monitoring can be by each quasi-controller The access control policy of middle deployment and carry out, and to access control policy carry out any modification then need through credible tolerance mechanism After confirming its credibility, can just it be deployed in controller.In this way, even there are back door, attackers for CPU or operating system Also these loopholes are difficult to be utilized to distort access control policy, is changed into active immunity from by Passive Defence, enhances system Safety.
Active safety metric operations in reliable computing technology are realized by TPCM chip, and TPCM chip is realizing master Often authentication procedures through excessively taking turns during dynamic security measure, however in the prior art for real in TPCM chip There is the risk point that stolen and information is distorted there are many security risks in existing key storage and the method used.
Summary of the invention
The invention proposes a kind of key generation methods, suitable for carrying out active safety metrics process to computer system Key generate and storage, key information can be effectively prevent stolen and distorted.
A kind of key generation method proposed by the present invention characterized by comprising
Step 1:TPCM safety chip is prior to computer system electrifying startup;
Step 2: in TPCM key generation phase, generating clear text key and be sent into storage region in the piece of TPCM;
Step 3: the clear text key is transmitted to outside piece in SDRAM by described interior storage region;
Step 4: restarting the computer system, realize that active safety measurement and user identity are recognized by the TPCM Card.
Preferably, further includes:
The TPCM chip is based on that national secret algorithm chip development is supported to form.
Preferably, storage region includes: in the piece for generating clear text key feeding TPCM
Clear text key is generated by cryptographic algorithm engine, storage region in piece is sent by SDMA.
Preferably, the step 2 further include:
The clear text key being sent in piece in storage region is encrypted.
Preferably, the step 3 further include:
The clear text key after encryption is transmitted to outside piece in SDRAM, the outer NandFlash of piece is finally saved in On.
Preferably, further includes:
The step 1-3 is the preparation configuration step before computer system life's work, the department of computer science after step 4 System enters normal work stage.
The invention also provides a kind of credible control methods based on credible hard disk, which is characterized in that the described method includes:
Step 1. powers on credible hard disk, using the TPCM module being embedded on the hard disk chip in credible hard disk to where it Other hardware are measured in system, if the measurement results of other hardware be it is normal, enter step 2, if it is described other The measurement results of hardware are exception, then alarm;
Step 2. powers on other described hardware, after system where starting the credible hard disk, to the credible hard disk institute Software is measured in systems, if the measurement results of the software be it is normal, 3 are entered step, if the measurement of the software As a result it is exception, then alarms;
System operates normally where credible hard disk described in step 3., and system is to described credible hard where the credible hard disk Disk carries out read/write operation, described credible to being buffered in using the TPCM module being embedded on the hard disk chip in the credible hard disk Hard disk the credible hard disk in systems need the data of read/write to carry out that the credible hard disk is needed read/write after solving/encrypting Data read/write is to the credible hard disk.
Preferably, other hardware include: BMC chip and BIOS chip in systems for the credible hard disk institute;
Software includes: MBR, OS LOADER and OS KERNEL in systems for the credible hard disk institute.
Preferably, the TPCM module being embedded on the hard disk chip using in the credible hard disk to be buffered in it is described can Letter hard disk the credible hard disk in systems need the data of read/write solve/encrypt, comprising:
System where the credible hard disk calls the TCM for the TPCM module being embedded on the hard disk chip in the credible hard disk Module solution/encryption be buffered in the credible hard disk the credible hard disk in systems need the data of read/write.
Preferably, the credible hard disk is IDE hard disk, PIDE hard disk, SCSI hard disk, SATA hard disc, SAS hard disk or SSD Hard disk.
Preferably, the SSD hard disk supports M.2 interface, SAS interface, SATA interface and/or M.P interface.
Preferably, it is described alarm include: light indicator light, the alarm that pipes, printing interface prompt print error message or Shutdown.
The invention proposes a kind of key generation methods, for being the system clean boot of TPCM safety chip allocating computer The key that may be used in the process, to realize the safety certification of user identity, generation is close in plain text in storage region in piece Key, and be sent to outside piece after being encrypted and stored in SDRAM, compared to outside piece SDRAM directly generate clear text key method, The safety in utilization of key can be promoted.
Detailed description of the invention
Present invention will be further explained below with reference to the attached drawings and examples, in attached drawing:
Fig. 1 is a kind of flow chart of key application method in the embodiment of the present invention one;
Fig. 2 is the procedure chart of key transmitting in the embodiment of the present invention one and two;
Fig. 3 is a kind of flow chart of key generation method in the embodiment of the present invention two.
Specific embodiment
Now in conjunction with attached drawing, elaborate to presently preferred embodiments of the present invention.
A kind of key application method of the present invention is applied among computer system, and the computer system has master The function of dynamic security measure, the active safety metric function by increase in the computer system TPCM safety chip come It realizes.
Wherein, to each Main firmware of computer system during the TPCM is used to electrically activate on the computer systems And component part carries out active safety measurement, the Main firmware and component part include BIOS/firmware, BMC firmware and refer to Determine fdisk etc., if active measurement results be it is normal, allow computer system normally to start, otherwise forbid the computer System normally starts.
Embodiment one
Based on above-mentioned computer system, the present embodiment proposes a kind of key application method, and flow chart is as shown in Figure 1, institute The method of stating includes the following steps:
Step 1:TPCM safety chip is prior to computer system electrifying startup.
Specifically, the TPCM chip is based on that national secret algorithm chip development is supported to form, it is internal that there is storage abundant Resource and efficient memory access ability.
Specifically, the TPCM safety chip is in order to the meter prior to the purpose of the computer system electrifying startup The key component of calculation machine system carries out active safety and measures to guarantee safety.
Step 2: will be used by the decryption of the key of TPCM key management mechanism encipherment protection into storage region in piece.
Specifically, the key in the TPCM uses and transmittance process is as shown in Fig. 2, when needing to utilize the TPCM safety When chip carries out the operation such as authentication, key raw information is obtained on NandFlash outside piece, it will be described by DDR-SDRAM The decryption of key raw information is used to storage region in piece (On-Chip-Memory).
Specifically, the clean boot in order to guarantee computer system, can start in BIOS and the stages such as hard disk startup add Enter user's identification step, corresponding config option can be increased on BIOS and hard disk startup interface specifically to realize and use Person's authentication.
Specifically, needing if the startup stage in computer system adds above-mentioned identification step using described TPCM safety chip realizes the identification step, will be described original when checking the authentication information of user's input Key information is used by NandFlash decryption outside piece into storage region in piece, so as to prevent key in the process of verification In be tampered.
Specifically, being carried out data transmission between described interior storage region and crypto-engine by SDMA, wherein described Crypto-engine is connected with described interior storage region.
Step 3: after active safety metric operations and safety certification pass through, the computer system enters normal use shape State.
Specifically, making the number generated in user's use process after the computer system enters normal operating condition It is stored and is verified according to being transmitted in the TPCM safety chip, to guarantee the safety in the computer system use process Property.
The present embodiment proposes a kind of key application method, for increasing peace for the TPCM safety chip in computer system Full key management functions, when needing to realize that user identity authentication operates using the TPCM in computer systems, by key Raw information carries out user identity authentication to storage region in piece by NandFlash decryption outside piece, compared to bright in SRAM outside piece Text uses key, and use will be safer in storage region in piece for clear text key.
Embodiment two
Corresponding with the key application method in embodiment one, the present embodiment proposes that a kind of key generation method, key pass Process is passed as shown in Fig. 2, the flow chart of the key generation method is as shown in Figure 3:
Step 1:TPCM safety chip is prior to computer system electrifying startup.
Specifically, the TPCM chip is based on that national secret algorithm chip development is supported to form, it is internal that there is storage abundant Resource and efficient memory access ability.
Specifically, the TPCM safety chip is in order to the meter prior to the purpose of the computer system electrifying startup The key component of calculation machine system carries out active safety and measures to guarantee safety.
Step 2: in TPCM key generation phase, generating clear text key and be sent into storage region in the piece of TPCM.
Specifically, the process for being used to measure in computer security active safety in the key that the key generation phase generates In to the key components such as BIOS and hard disk carry out active safety measurement, thus guarantee computer system operation safety.
Specifically, storage region includes: to be generated by cryptographic algorithm engine in the piece for generating clear text key feeding TPCM Clear text key is sent into storage region in piece by SDMA (data encrypting and deciphering conversion DMA).
Specifically, the clear text key being sent in piece in storage region is encrypted.
Step 3: the clear text key is transmitted to outside piece in SDRAM by described interior storage region.
Specifically, the clear text key after encryption is transmitted to outside piece in SDRAM, finally it is saved in outside piece On NandFlash.
Step 4: restarting the computer system, realize that active safety measurement and user identity are recognized by the TPCM Card.
Specifically, the step 1-3 is the preparation configuration step before computer system life's work, after step 4 Computer system enters normal work stage.
The present embodiment proposes a kind of key generation method, for opening for TPCM safety chip allocating computer system safety The key that may be used during dynamic generates in plain text in storage region in piece to realize the safety certification of user identity Key, and be sent to outside piece after being encrypted and stored in SDRAM, compared to outside piece SDRAM directly generate clear text key side Method can promote the safety in utilization of key.
Embodiment three
The invention also provides a kind of credible control methods based on credible hard disk, which is characterized in that the described method includes:
Step 1. powers on credible hard disk, using the TPCM module being embedded on the hard disk chip in credible hard disk to where it Other hardware are measured in system, if the measurement results of other hardware be it is normal, enter step 2, if it is described other The measurement results of hardware are exception, then alarm;
Step 2. powers on other described hardware, after system where starting the credible hard disk, to the credible hard disk institute Software is measured in systems, if the measurement results of the software be it is normal, 3 are entered step, if the measurement of the software As a result it is exception, then alarms;
System operates normally where credible hard disk described in step 3., and system is to described credible hard where the credible hard disk Disk carries out read/write operation, described credible to being buffered in using the TPCM module being embedded on the hard disk chip in the credible hard disk Hard disk the credible hard disk in systems need the data of read/write to carry out that the credible hard disk is needed read/write after solving/encrypting Data read/write is to the credible hard disk.
Preferably, other hardware include: BMC chip and BIOS chip in systems for the credible hard disk institute;
Software includes: MBR, OS LOADER and OS KERNEL in systems for the credible hard disk institute.
Preferably, the TPCM module being embedded on the hard disk chip using in the credible hard disk to be buffered in it is described can Letter hard disk the credible hard disk in systems need the data of read/write solve/encrypt, comprising:
System where the credible hard disk calls the TCM for the TPCM module being embedded on the hard disk chip in the credible hard disk Module solution/encryption be buffered in the credible hard disk the credible hard disk in systems need the data of read/write.
Preferably, IDE hard disk, PIDE hard disk, SCSI hard disk, SATA hard disc, SAS hard disk can be selected in the credible hard disk And/or SSD hard disk.
Preferably, the credible hard disk supports M.2 interface, SAS interface, SATA interface and/or M.P interface.
Preferably, it is described alarm include: light indicator light, the alarm that pipes, printing interface prompt print error message or Shutdown.
Technical solution in through this embodiment can use the TPCM module in insertion credible hard disk to other in system Hardware and credible hard disk software in systems measured, and the mistake that the system where credible hard disk operates normally Cheng Zhong can use credible read-write of the TPCM module control data of insertion credible hard disk into credible hard disk.
In several embodiments provided by the present invention, it should be understood that disclosed method and terminal can pass through it Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the module, only Only a kind of logical function partition, there may be another division manner in actual implementation.
In addition, the technical solution in above-mentioned several embodiments can be combined with each other and replace in the case where not conflicting It changes.
The module as illustrated by the separation member may or may not be physically separated, aobvious as module The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.Some or all of the modules therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
It, can also be in addition, each functional module in each embodiment of the present invention can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of hardware adds software function module.
It is obvious to a person skilled in the art that invention is not limited to the details of the above exemplary embodiments, Er Qie In the case where without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims Variation is included in the present invention.Any attached associated diagram label in claim should not be considered as right involved in limitation to want It asks.Furthermore, it is to be understood that one word of " comprising " does not exclude other units or steps, odd number is not excluded for plural number.It is stated in system claims Multiple modules or device can also be implemented through software or hardware by a module or device.The first, the second equal words
It is used to indicate names, and does not indicate any particular order.
Finally it should be noted that the above examples are only used to illustrate the technical scheme of the present invention and are not limiting, although reference Preferred embodiment describes the invention in detail, those skilled in the art should understand that, it can be to of the invention Technical solution is modified or equivalent replacement, without departing from the spirit and scope of the technical solution of the present invention.

Claims (12)

1. a kind of key generation method characterized by comprising
Step 1:TPCM safety chip is prior to computer system electrifying startup;
Step 2: in TPCM key generation phase, generating clear text key and be sent into storage region in the piece of TPCM;
Step 3: the clear text key is transmitted to outside piece in SDRAM by described interior storage region;
Step 4: restarting the computer system, active safety measurement and user identity authentication are realized by the TPCM.
2. a kind of key generation method as described in claim 1, which is characterized in that further include:
The TPCM chip is based on that national secret algorithm chip development is supported to form.
3. a kind of key generation method as described in claim 1, which is characterized in that the generation clear text key is sent into TPCM Piece in storage region include:
Clear text key is generated by cryptographic algorithm engine, storage region in piece is sent by SDMA.
4. a kind of key generation method as described in claim 1, which is characterized in that the step 2 further include:
The clear text key being sent in piece in storage region is encrypted.
5. a kind of key generation method as described in claim 1, which is characterized in that the step 3 further include:
The clear text key after encryption is transmitted to outside piece in SDRAM, is finally saved on the outer NandFlash of piece.
6. a kind of key generation method as described in claim 1, which is characterized in that further include:
The step 1-3 be computer system life's work before preparation configuration step, after step 4 computer system into Enter normal work stage.
7. a kind of credible control method based on credible hard disk, which is characterized in that the described method includes:
Step 1. powers on credible hard disk, using the TPCM module being embedded on the hard disk chip in credible hard disk to system where it In other hardware measured, if the measurement results of other hardware be it is normal, 2 are entered step, if other described hardware Measurement results be it is abnormal, then alarm;
Step 2. powers on other described hardware, after system where starting the credible hard disk, to system where the credible hard disk Software is measured in system, if the measurement results of the software be it is normal, 3 are entered step, if the measurement results of the software For exception, then alarm;
System where credible hard disk described in step 3. operates normally, where the credible hard disk system to the credible hard disk into Row read/write operation, using the TPCM module being embedded on the hard disk chip in the credible hard disk to being buffered in the credible hard disk The credible hard disk in systems need the data of read/write to carry out the data that the credible hard disk is needed to read/write after solving/encrypting Read/write is to the credible hard disk.
8. the method for claim 7, which is characterized in that other hardware include: BMC in systems for the credible hard disk institute Chip and BIOS chip;
Software includes: MBR, OS LOADER and OS KERNEL in systems for the credible hard disk institute.
9. the method for claim 7, which is characterized in that be embedded on the hard disk chip using in the credible hard disk TPCM module to be buffered in the credible hard disk the credible hard disk in systems need the data of read/write solve/add It is close, comprising:
System where the credible hard disk calls the TCM module for the TPCM module being embedded on the hard disk chip in the credible hard disk Solution/encryption be buffered in the credible hard disk the credible hard disk in systems need the data of read/write.
10. the method for claim 7, which is characterized in that the credible hard disk is IDE hard disk, PIDE hard disk, SCSI hard Disk, SATA hard disc, SAS hard disk or SSD hard disk.
11. method as claimed in claim 10, which is characterized in that the credible hard disk supports M.2 interface, SAS interface, SATA Interface and/or M.P interface.
12. the method for claim 7, which is characterized in that the alarm includes: to light indicator light, the alarm that pipes, beat Print interface prompt print error message or shutdown.
CN201811435862.1A 2018-11-28 2018-11-28 Key generation method Active CN109583196B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811435862.1A CN109583196B (en) 2018-11-28 2018-11-28 Key generation method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811435862.1A CN109583196B (en) 2018-11-28 2018-11-28 Key generation method

Publications (2)

Publication Number Publication Date
CN109583196A true CN109583196A (en) 2019-04-05
CN109583196B CN109583196B (en) 2021-01-08

Family

ID=65925253

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811435862.1A Active CN109583196B (en) 2018-11-28 2018-11-28 Key generation method

Country Status (1)

Country Link
CN (1) CN109583196B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116028958A (en) * 2023-02-21 2023-04-28 广州万协通信息技术有限公司 Key encryption and decryption method and device, security machine and medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101515316A (en) * 2008-02-19 2009-08-26 北京工业大学 Trusted computing terminal and trusted computing method
CN201408535Y (en) * 2009-05-11 2010-02-17 方正科技集团苏州制造有限公司 Trusted hard disk facing to trusted computation cryptograph supporting platform
CN102279914A (en) * 2011-07-13 2011-12-14 中国人民解放军海军计算技术研究所 Unified extensible firmware interface (UEFI) trusted supporting system and method for controlling same
CN103534976A (en) * 2013-06-05 2014-01-22 华为技术有限公司 Data security protection method, server, host, and system
CN106295352A (en) * 2016-07-29 2017-01-04 北京三未信安科技发展有限公司 The method of credible tolerance, main frame and system under basic input output system environment
JP2017157018A (en) * 2016-03-02 2017-09-07 株式会社リコー Information processing device, information processing method, information processing program, and trusted platform module
CN107733590A (en) * 2017-11-28 2018-02-23 成都蓉威电子技术有限公司 The data transmission device and method of a kind of high-speed bus

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101515316A (en) * 2008-02-19 2009-08-26 北京工业大学 Trusted computing terminal and trusted computing method
CN201408535Y (en) * 2009-05-11 2010-02-17 方正科技集团苏州制造有限公司 Trusted hard disk facing to trusted computation cryptograph supporting platform
CN102279914A (en) * 2011-07-13 2011-12-14 中国人民解放军海军计算技术研究所 Unified extensible firmware interface (UEFI) trusted supporting system and method for controlling same
CN103534976A (en) * 2013-06-05 2014-01-22 华为技术有限公司 Data security protection method, server, host, and system
JP2017157018A (en) * 2016-03-02 2017-09-07 株式会社リコー Information processing device, information processing method, information processing program, and trusted platform module
CN106295352A (en) * 2016-07-29 2017-01-04 北京三未信安科技发展有限公司 The method of credible tolerance, main frame and system under basic input output system environment
CN107733590A (en) * 2017-11-28 2018-02-23 成都蓉威电子技术有限公司 The data transmission device and method of a kind of high-speed bus

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116028958A (en) * 2023-02-21 2023-04-28 广州万协通信息技术有限公司 Key encryption and decryption method and device, security machine and medium
CN116028958B (en) * 2023-02-21 2024-04-12 广州万协通信息技术有限公司 Key encryption and decryption method and device, security machine and medium

Also Published As

Publication number Publication date
CN109583196B (en) 2021-01-08

Similar Documents

Publication Publication Date Title
US10516533B2 (en) Password triggered trusted encryption key deletion
EP3582129B1 (en) Technologies for secure hardware and software attestation for trusted i/o
EP1754126B1 (en) Enhancing trusted platform module performance
JP5551130B2 (en) Encapsulation of reliable platform module functions by TCPA inside server management coprocessor subsystem
CN109614799B (en) Information authentication method
EP3125149A1 (en) Systems and methods for securely booting a computer with a trusted processing module
US20150317495A1 (en) Protecting Critical Data Structures in an Embedded Hypervisor System
CN102270288A (en) Method for performing trusted boot on operation system based on reverse integrity verification
CN109614154A (en) A kind of computer safety start method
CN112930659A (en) Method and apparatus for secure key generation
CN109583214A (en) A kind of method of controlling security
CN109753804A (en) A kind of trusted system
CN109583196A (en) A kind of key generation method
US8429423B1 (en) Trusted platform modules
CN109583169B (en) Security authentication method
CN109583197B (en) Trusted overlay file encryption and decryption method
US11853464B2 (en) Storage device and data tampering detection method
CN109598150A (en) A kind of key application method
CN109598125B (en) Safe starting method
CN108228219B (en) Method and device for verifying BIOS validity during in-band refreshing of BIOS
CN108345803B (en) Data access method and device of trusted storage equipment
CN110020562A (en) The full encryption method of hard disk and device based on UEFI
CN110909357B (en) Electronic book and control method thereof
CN109598154B (en) Credible full-disk encryption and decryption method
Zhao Authentication and Data Protection under Strong Adversarial Model

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant