CN109740350A - A kind of credible platform control device - Google Patents

A kind of credible platform control device Download PDF

Info

Publication number
CN109740350A
CN109740350A CN201811603679.8A CN201811603679A CN109740350A CN 109740350 A CN109740350 A CN 109740350A CN 201811603679 A CN201811603679 A CN 201811603679A CN 109740350 A CN109740350 A CN 109740350A
Authority
CN
China
Prior art keywords
credible platform
platform control
control device
credible
firmware
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811603679.8A
Other languages
Chinese (zh)
Inventor
孙瑜
杨秩
王涛
王强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Believable Huatai Technology Co Ltd
BEIJING HUATECH TRUSTED COMPUTING INFORMATION TECHNOLOGY Co Ltd
Original Assignee
Beijing Believable Huatai Technology Co Ltd
BEIJING HUATECH TRUSTED COMPUTING INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Believable Huatai Technology Co Ltd, BEIJING HUATECH TRUSTED COMPUTING INFORMATION TECHNOLOGY Co Ltd filed Critical Beijing Believable Huatai Technology Co Ltd
Priority to CN201811603679.8A priority Critical patent/CN109740350A/en
Publication of CN109740350A publication Critical patent/CN109740350A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention relates to a kind of credible platform control device, described device includes: credible platform control chip, credible platform control firmware, credible platform control support programs, auxiliary tool;The credible platform control device accesses the bus on general processor system mainboard by PCIE bus.The present invention can be accessed by bus existing computing system it is each in, compatibility is strong;Realize that credible platform controls firmware by way of solid state hard disk, scalability is strong, is easy to carry out safe encryption;Using extremely wide: can be used in has in the credible performing environment of particular/special requirement safety.

Description

A kind of credible platform control device
[technical field]
The invention belongs to information security field more particularly to a kind of credible platform control devices.
[background technique]
With the lasting in-depth of informatization, information security issue has been increasingly becoming the main of constraint informationization development One of obstacle.With the development of computer technology, network attack becomes more complicated and automation, conventional security risk prevention instruments The inherent shortcoming of passivity and system itself is not enough to deal with increasing computer security threat, and cannot adequately protect calculating The safety of machine system.The major reason for causing such case is conventional security risk prevention instruments such as firewall, antivirus software and invasion Detection mainly using passively defense mechanism, can not active initiatively security protection is carried out to system, thus also just do not have Immune characteristic.
[summary of the invention]
In order to solve the problems, such as that in the prior art passively defense mechanism is in safety, need now a kind of new credible Platform controller, the present invention can be accessed by bus existing computing system it is each in, compatibility is strong;Pass through the side of solid state hard disk Formula realizes that credible platform controls firmware, and scalability is strong, is easy to carry out safe encryption;Using extremely wide: can be used in pair Safety has in the credible performing environment of particular/special requirement, is based on this, the invention proposes a kind of credible platform control device, the devices It include: credible platform control chip, credible platform control firmware, credible platform control support programs, auxiliary tool;It is described credible Platform controller accesses the bus on general processor system mainboard by PCIE bus.
Further, the credible platform control chip is computing chip, including interior processing unit, SRAM.
Further, the credible platform control chip further includes SPI, GPIO, for accessing credible platform mainboard.
Further, the credible platform control firmware being implemented on credible platform control chip is embedded/on piece operation System, for the tasks such as active measurement control to be scheduled and executed, to realize the credible of whole system.
Further, the credible platform control support programs run on embedded/Chip Operating System inner nuclear layer, provide The interactive interface of software view.
Further, credible platform control firmware controls support programs and central processing unit operating system by credible platform Interior trusted software base carries out data interaction.
Further, the auxiliary tool include commissioning device, firmware write with a brush dipped in Chinese ink, firmware signature.
Further, the credible platform control firmware includes command process module, initialization module, input and output driving Module, trusted function module, active metric module.
The beneficial effect comprise that can be accessed by bus existing computing system it is each in, compatibility is strong;By solid The mode of state hard disk realizes that credible platform controls firmware, and scalability is strong, is easy to carry out safe encryption;Using extremely wide: can Have in the credible performing environment of particular/special requirement to be used in safety.
[Detailed description of the invention]
Described herein the drawings are intended to provide a further understanding of the invention, constitutes part of this application, but It does not constitute improper limitations of the present invention, in the accompanying drawings:
Fig. 1 is the configuration diagram of trusted infrastructure of the invention.
Fig. 2 is the connection schematic diagram of TPCM access trusted infrastructure of the invention.
Fig. 3 is the hardware structural diagram of trusted infrastructure of the invention.
Fig. 4 is the hierarchical structure schematic diagram of credible platform control device of the invention.
[specific embodiment]
Come that the present invention will be described in detail below in conjunction with attached drawing and specific embodiment, illustrative examples therein and says It is bright to be only used to explain the present invention but not as a limitation of the invention.
As shown in figs. 1 and 4, trusted infrastructure applied by credible platform control device of the present invention is carried out specifically It is bright, the trusted infrastructure include: central processing unit, credible platform control device (TPCM), extension metric module EMM (EMM1, EMM2, EMM3), starting memory, controller, credible platform mainboard;The component of the trusted infrastructure is all set in described credible In platform motherboard;Central processing unit and credible platform control device are connected to controller by system bus;
The trusted infrastructure further include: random access memory, sequential control circuit, input/output interface;
Preferred: controller controls so that before central processing unit executes starting memory code, and credible platform controls Device first starts, and credible platform control device is reliably read the initial guide module of starting memory code, credible platform control Measurement root module RTM in device processed carries out integrity measurement to the initial guide module in starting memory code, and by degree Amount result is stored in the memory space of credible platform control device;
The extension metric module EMM is used for and measures root module RTM cooperation to carry out integrity measurement, to realize letter Appoint chain transmitting;
The central processing unit is used to complete the calculating task of trusted infrastructure;Preferred: the central processing unit is multicore Processor;
Credible platform control device TPCM includes credible platform control chip, credible platform control firmware, credible platform control Support programs processed, auxiliary tool etc.;The credible platform control chip is computing chip, including interior processing unit, SRAM, is gone back For accessing credible platform mainboard including SPI, GPIO etc.;The credible platform control firmware being implemented on credible platform control chip For embedded/Chip Operating System, it is scheduled and executes for measuring the tasks such as control to active, to realize whole system It is credible;The credible platform control support programs run on embedded/Chip Operating System inner nuclear layer, provide software view Interactive interface, credible platform control firmware pass through credible in credible platform control support programs and central processing unit operating system Software base carries out data interaction;The auxiliary tool include commissioning device, firmware write with a brush dipped in Chinese ink, firmware signature etc.;
Preferred: the credible platform control firmware includes command process module, initialization module, input and output driving mould Block, trusted function module, active metric module;Wherein: the instruction that command process module is responsible for sending external entity solves Analysis and execution;Initialization module is responsible for module initialization, module self-test, platform status initialization etc.;Input and output drive module The Driver function library of input and output mainly in module;Active metric module is responsible for the active to BootRom and is measured;Trusted function Module mainly provides basic credible support;
Preferred: the credible platform control device is minimum but is not limited to control unlatching or the pass of following input/output interface It closes: USB, PS/2, PCIE, PCI, SATA, serial ports, network interface;
The controller is for controlling the component on credible platform mainboard;Including central processing unit and credible platform Boot sequence, the permission height of control device are low;
The starting memory is for storing code needed for central processing unit starts and saving part divergence amount module Code;Preferred: code needed for the starting is MBR, BOOTLOADER etc.;
Preferred: the extension metric module is realized in the form of ROM, saves static degree in the extension metric module Measurement code involved in amount;
Preferred: the extension metric module includes 2 independent physical parts;A part is located in starting memory, The independent access controller of another part;Wherein: the boot sequence of described a part is earlier than described another part;
As shown in Fig. 2, credible platform control device accesses the mainboard of trusted infrastructure by PCIE bus, and total by PCIE Line and the trusted software base TSB being set in the operating system on central processing unit carry out order and data interaction;Pass through multichannel The mode that multiplexer is multiplexed GPIO/SPI/I2C, realize to the measurement of controller and/or BIOS and and controller into Row connection;
Preferred: credible platform control device TPCM accesses the mainboard of trusted infrastructure in a manner of pluggable card;It is being based on During the dynamic measurement of credible platform control device, credible platform control device passes through the monitoring that trusted software base TSB is obtained Carry out dynamic measurement of the data to central processing unit and its operating system, application program successively;
It is preferred: the memory space inside credible platform control device be credible platform control device itself it is visible, in Memory space inside central processor is that central processing unit itself is visible;Credible platform control device and central processing unit pass through Bus shares read-only, the readable and writable memory on credible platform mainboard;
It is preferred: read-only, readable and writable memory company of being mapped to by way of address of cache on credible platform mainboard In continuous address space;The continuous address space in part is visible to central processing unit, and another part is continuously Location space is sightless to central processing unit;Make in this way central processing unit and credible platform control device it Between store isolation;
Preferred: the credible platform control device has the access authority higher than central processing unit, the credible platform Control device can be read-only access central processing unit memory space;Preferred: controller on mainboard is in described The read write command that central processor and credible platform control device are sent is arbitrated;
Preferred: the credible platform control device is realized in the form of solid state hard disk;
Credible platform control device is obtained by the memory space of read-only access central processing unit needed for actively measurement Data, credible platform control device is based on Metric policy and measures to the data, and measurement results is stored in described In the memory space of credible platform control device;Central processing unit cannot access the system storage of the credible platform control device Area;In this way, it ensure that the independence of credible platform control device, and then ensure that its safety;
Preferred: the data needed for actively measuring are stored in the user data memory block of credible platform control device, The central processing unit and credible platform control device are carried out based on the user data memory block of the credible platform control device Data interaction, to carry out the intermodule communication based on mainboard;
It is preferred: the shared memory space progress data that central processing unit and credible platform control device pass through address of cache Interaction;The shared memory space is mapped as visible to central processing unit and credible platform control device;
The memory space of central processing unit and credible platform control device includes system memory block and user data storage Area, system memory block are invisible to hard disk user (using the user of standard disk store function), and use a variety of secure storages Wherein content realizes piecemeal protection to key pair;
The user data saved in user data memory block is the data that hard disk user behavior generates, and (is used using with region Family) corresponding media key M-Key carries out data encrypting and deciphering;Preferred: user storage area includes one or more regions, often A region corresponds to one or more user;There is its corresponding media key in each region;It realizes in this way solid State hard disk is independent for the physics of user, to ensure that the safety of user storage space;
It is described that using a variety of secure storage key pairs, wherein content realizes piecemeal protection, specifically: credible platform control dress In the system memory block set comprising credible platform control firmware storage areas, solid state hard disk firmware storage areas, sensitive data memory block, Policies store, the memory block NV, log memory block, TSB program storage area, the memory block OPROM;
Credible platform control firmware storage areas is encrypted using R-key;
The solid state hard disk firmware is encrypted using S-KEY, and S-KEY must successfully add in trusted firmware and security information After load, use just can be carried out;
Sensitive data storage section mainly saves the critical datas such as endorsement key (EK) and storage root key (SMK), And by the encipherment protection of R-key key;
The policies store be can not tampered region, issued for storing credible platform control device side trusted software base Configuration strategy;The configuration strategy is for configuring credible platform control device;
The memory block NV is nonvolatile storage, can be used to store certificate for being measured and being encrypted and Key;
The log memory block is for storing integrity measurement log and command operation record information;
The memory block OPROM is used to store expansion ROM program;
As shown in figure 3, including in the hardware configuration of trusted infrastructure: central processing unit, host interface HIF, on-chip memory, Memory etc. is connected by bus;Credible platform control device TPCM accesses bus by host interface HIF;
Preferred: the host interface HIF is PCIE host interface;
Preferred: the trusted infrastructure further includes that SPI is responsible for TCM offer low speed data access interface, is mainly used for passing Defeated metric, core data etc.;SMx is responsible for providing national secret algorithm computing capability, mainly includes that SM2/SM3/SM4 three classes are calculated Method;OTP is responsible for storage hardware configuration information and the unique root key of chip and the part public key data for sign test;CPU is negative The execution of duty operation service logic control;GPIO is responsible for issuing control signal and status signal to outside;LDPC is responsible for providing number According to error correction recovery capability, lifting system reliability;The external SDRAM of DDR connection, expands the RAM capacity of platform;TIMER timing Device is to piece internal clock step-by-step counting;On Chip Memory on piece memory, being mainly used for caching interim data and internal firmware makes With;DMA is connected memory and the peripheral hardware with DMA ability by dedicated bus;RAID is responsible for the data on flash Higher level protection, lifting system reliability are provided;After the function of sign test for the first time and volume production when ROM mainly includes volume production The safe guiding function of system;TRNG real random number generator, for generating a random number at random.It is mainly used for key generation to answer With;I2C is responsible for TPCM and provides low speed data access interface, is mainly used for custom command interaction;
Preferred: media key M-Key is protected by encryption key En-Key;Encryption key En-Key must be in user PIN Code and security information could be obtained correctly after all matching is correct;Security information is encrypted by root key R-KEY.It is logical Such a set of mechanism is crossed, guarantees that each user has independent encryption key En-Key and media key M-Key, while again Protection by a whole set of key management system and encryption system;
Preferred: credible platform control device accesses the bus on processor system mainboard by PCIE bus, after, it is setting It synchronizes and powers on for the equipment in PCIE bus when powering on, CPU starting is limited by BMC CPLD circuit control mode before And it realizes TPCM and preferentially starts;
In several embodiments provided by the present invention, it should be understood that disclosed method and terminal can pass through it Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the module, only Only a kind of logical function partition, there may be another division manner in actual implementation.
In addition, the technical solution in above-mentioned several embodiments can be combined with each other and replace in the case where not conflicting It changes.
The module as illustrated by the separation member may or may not be physically separated, aobvious as module The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.Some or all of the modules therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
It, can also be in addition, each functional module in each embodiment of the present invention can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of hardware adds software function module.
It is obvious to a person skilled in the art that invention is not limited to the details of the above exemplary embodiments, Er Qie In the case where without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims Variation is included in the present invention.Any attached associated diagram label in claim should not be considered as right involved in limitation to want It asks.Furthermore, it is to be understood that one word of " comprising " does not exclude other units or steps, odd number is not excluded for plural number.It is stated in system claims Multiple modules or device can also be implemented through software or hardware by a module or device.The first, the second equal words It is used to indicate names, and does not indicate any particular order.
Finally it should be noted that the above examples are only used to illustrate the technical scheme of the present invention and are not limiting, although reference Preferred embodiment describes the invention in detail, those skilled in the art should understand that, it can be to of the invention Technical solution is modified or equivalent replacement, without departing from the spirit and scope of the technical solution of the present invention.

Claims (8)

1. a kind of credible platform control device, which is characterized in that the device includes: credible platform control chip, credible platform control Firmware processed, credible platform control support programs, auxiliary tool;The credible platform control device is handled by the access of PCIE bus Bus on device system board.
2. credible platform control device according to claim 1, which is characterized in that the credible platform control chip is meter Calculate chip, including interior processing unit, SRAM.
3. credible platform control device according to claim 2, which is characterized in that the credible platform control chip also wraps SPI, GPIO are included, for accessing credible platform mainboard.
4. credible platform control device according to claim 3, which is characterized in that be implemented on credible platform control chip Credible platform control firmware be embedded/Chip Operating System, for active measurement control etc. tasks be scheduled and hold Row, to realize the credible of whole system.
5. credible platform control device according to claim 4, which is characterized in that the credible platform controls support programs It runs on embedded/Chip Operating System inner nuclear layer, the interactive interface of software view is provided.
6. credible platform control device according to claim 5, which is characterized in that credible platform control firmware passes through credible Trusted software base in platform courses support programs and central processing unit operating system carries out data interaction.
7. credible platform control device according to claim 6, which is characterized in that the auxiliary tool includes that debugging is set Standby, firmware writes with a brush dipped in Chinese ink, firmware signature.
8. credible platform control device according to claim 7, which is characterized in that the credible platform controls firmware and includes Command process module, initialization module, input and output drive module, trusted function module, active metric module.
CN201811603679.8A 2018-12-26 2018-12-26 A kind of credible platform control device Pending CN109740350A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811603679.8A CN109740350A (en) 2018-12-26 2018-12-26 A kind of credible platform control device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811603679.8A CN109740350A (en) 2018-12-26 2018-12-26 A kind of credible platform control device

Publications (1)

Publication Number Publication Date
CN109740350A true CN109740350A (en) 2019-05-10

Family

ID=66360014

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811603679.8A Pending CN109740350A (en) 2018-12-26 2018-12-26 A kind of credible platform control device

Country Status (1)

Country Link
CN (1) CN109740350A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101295340A (en) * 2008-06-20 2008-10-29 北京工业大学 Credible platform module and active measurement method thereof
CN108595964A (en) * 2018-04-27 2018-09-28 北京可信华泰信息技术有限公司 A kind of credible platform control module implementation method based on firmware

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101295340A (en) * 2008-06-20 2008-10-29 北京工业大学 Credible platform module and active measurement method thereof
CN108595964A (en) * 2018-04-27 2018-09-28 北京可信华泰信息技术有限公司 A kind of credible platform control module implementation method based on firmware

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
周振柳 等: "太行安全BIOS可信体系结构与实现研究", 《计算机工程与应用》 *
张兴: "无干扰可信模型及可信平台体系结构实现研究", 《中国博士学位论文全文数据库 信息科技辑》 *
曹慧渊 等: "基于Openrisc的TPCM架构设计", 《信息工程大学学报》 *

Similar Documents

Publication Publication Date Title
US10516533B2 (en) Password triggered trusted encryption key deletion
EP3582129B1 (en) Technologies for secure hardware and software attestation for trusted i/o
US11843705B2 (en) Dynamic certificate management as part of a distributed authentication system
CN107025406B (en) Motherboard, computer-readable storage device, and firmware verification method
US11256797B2 (en) Remote attestation for multi-core processor
US10353831B2 (en) Trusted launch of secure enclaves in virtualized environments
CN109784070A (en) A kind of reliable hardware structure
CN107092495B (en) Platform firmware armoring technology
EP1754126B1 (en) Enhancing trusted platform module performance
CN111052118A (en) Hardware-implemented firmware security
CN105122261A (en) Recovering from compromised system boot code
CN101454751A (en) Execution of a secured environment initialization instruction on a point-to-point interconnect system
CN105718277B (en) Protection method, device and system for BIOS update
EP3646224B1 (en) Secure key storage for multi-core processor
US20180285600A1 (en) Connected secure iot processor
CN109753804A (en) A kind of trusted system
CN109614154A (en) A kind of computer safety start method
CN113568799A (en) Simulation of physical security devices
Buhren et al. Fault attacks on encrypted general purpose compute platforms
JP2006514770A (en) NODMA cache
CN112558884B (en) Data protection method and NVMe-based storage device
CN109583214A (en) A kind of method of controlling security
CN109753453A (en) A kind of trusted system of storage isolation
CN106971110A (en) A kind of computer motherboard framework and operation method based on domestic safe processor
CN109583197B (en) Trusted overlay file encryption and decryption method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190510