CN110321713A - The dynamic measurement method and device of credible calculating platform based on binary system structure - Google Patents

The dynamic measurement method and device of credible calculating platform based on binary system structure Download PDF

Info

Publication number
CN110321713A
CN110321713A CN201910611569.4A CN201910611569A CN110321713A CN 110321713 A CN110321713 A CN 110321713A CN 201910611569 A CN201910611569 A CN 201910611569A CN 110321713 A CN110321713 A CN 110321713A
Authority
CN
China
Prior art keywords
hardware resource
computing
operation object
subsystem
reference value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910611569.4A
Other languages
Chinese (zh)
Other versions
CN110321713B (en
Inventor
孙瑜
王大海
王涛
王强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING HUATECH TRUSTED COMPUTING INFORMATION TECHNOLOGY Co Ltd
Original Assignee
BEIJING HUATECH TRUSTED COMPUTING INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING HUATECH TRUSTED COMPUTING INFORMATION TECHNOLOGY Co Ltd filed Critical BEIJING HUATECH TRUSTED COMPUTING INFORMATION TECHNOLOGY Co Ltd
Priority to CN201910611569.4A priority Critical patent/CN110321713B/en
Publication of CN110321713A publication Critical patent/CN110321713A/en
Application granted granted Critical
Publication of CN110321713B publication Critical patent/CN110321713B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses the dynamic measurement methods and device of a kind of credible calculating platform based on binary system structure.Wherein, this method comprises: when electric on computers, the hardware resource of computer is divided into protection hardware resource and computing hardware resource, the permission of computing hardware resource is accessed by protection hardware resource and cannot access protection hardware resource, protect hardware resource for running protection subsystem, computing hardware resource is for running computing subsystem;During computing hardware resource runs computing subsystem, the operation object in computing subsystem run using protection subsystem to computing hardware resource is measured.The present invention solves the lower technical problem of computer security in the related technology.

Description

The dynamic measurement method and device of credible calculating platform based on binary system structure
Technical field
The present invention relates to internet security fields, flat in particular to a kind of trust computing based on binary system structure The dynamic measurement method and device of platform.
Background technique
Current cyberspace is extremely fragile, shake net, extort viral (such as Wannacry), Mirai virus cause it is larger The assault of influence emerges one after another, and is becoming increasingly rampant, and traces sth. to its source, and is that there is no the essence from network security risk Reason, which is started with, to be solved the problems, such as, uses " blocking killing " with " firewall ", " checking and killing virus ", " intrusion detection " etc. for representative simply Passive Defence means, it is impossible to guard against, especially in the attack initiated in face of the loophole for goal systems, can not effectively it prevent at all It is imperial.
International TCG tissue (full name in English Trusted Computing Group, the entitled Trusted Computing Group of Chinese) proposes Trusted computing chip TPM be that external equipment as computer is sent out in a manner of passively mounting by host software calling The effect of waving is only capable of carrying out staticametric to resources such as the firmware of computer and executable programs.That is realized in a manner of TPM is credible Computing platform is substantially single system framework, and TPM has limitation in resource access, control, and security capabilities places one's entire reliance upon The safety of host system, it is difficult to which the attack for defending hacker to carry out using host system loophole can not substantially promote calculating The Initiative Defense ability of machine system.
To solve current network space safety problems faced, international TCG tissue proposes the method for trust computing, proposes Using TPM and BIOS initial code as root of trust, level metric level-one, and then build the trust chain of computer, protection calculates Machine valuable source is not illegally distorted and is destroyed, and preferable effect is played.But TPM is substantially one on computer The external equipment passively mounted only can just be played a role by mainframe program calling, once host is controlled by attacker, TPM's Effect will have no way of playing, and the trust computing framework of TCG is caused to attack in face of hacker using computer system logic flaw It when hitting, is difficult to resist substantially, such as Windows 10 fully achieves the trust computing framework of TCG, but fails to prevent Wannacry extorts the attack of virus.
In addition, the credible calculating platform realized in a manner of TPM is substantially single system framework, TPM is in the money to computer There is limitation in source access, control.And TPM is only capable of carrying out static state degree to resources such as the firmware of computer and executable programs Amount can not carry out dynamic measurement to application execution and its performing environment relied on.
It is substantially single system framework, the firmware of TPM and executable journey for the credible calculating platform realized in a manner of TPM The resources such as sequence carry out staticametric, can not carry out dynamic measurement to application execution and its performing environment relied on, and TPM is being provided Source access has limitation in control, and the security capabilities of TPM places one's entire reliance upon the safety of host system.
For above-mentioned problem, currently no effective solution has been proposed.
Summary of the invention
The embodiment of the invention provides the dynamic measurement methods and dress of a kind of credible calculating platform based on binary system structure It sets, at least to solve the lower technical problem of computer security in the related technology.
According to an aspect of an embodiment of the present invention, a kind of moving for credible calculating platform based on binary system structure is provided State measure, comprising: when electric on computers, the hardware resource of computer is divided into protection hardware resource and computing hardware Resource, computing hardware resource allow to be accessed and cannot be accessed by protection hardware resource protection hardware resource, and protection hardware resource is used Subsystem is protected in operation, computing hardware resource is for running computing subsystem;Computing subsystem is run in computing hardware resource During, the operation object in computing subsystem run using protection subsystem to computing hardware resource is measured.
According to another aspect of an embodiment of the present invention, a kind of credible calculating platform based on binary system structure is additionally provided Dynamic measurement device, comprising: when for electricity on computers, it is hard to be divided into protection by division unit for the hardware resource of computer Part resource and computing hardware resource, wherein computing hardware resource allows to be accessed and cannot be accessed by protection hardware resource protection hard Part resource, protection hardware resource is for running protection subsystem, and computing hardware resource is for running computing subsystem;Measurement is single Member, for being run using protection subsystem to computing hardware resource during computing hardware resource runs computing subsystem Computing subsystem in operation object measured.
According to another aspect of an embodiment of the present invention, a kind of storage medium is additionally provided, which includes storage Program, program execute above-mentioned method when running.
According to another aspect of an embodiment of the present invention, it additionally provides a kind of electronic device, including memory, processor and deposits The computer program that can be run on a memory and on a processor is stored up, processor executes above-mentioned side by computer program Method.
In embodiments of the present invention, in the calculating unit (i.e. computing subsystem) of processor CPU internal build security isolation With binary system structure protecting component (i.e. protection subsystem) and deposited, calculating unit can not access the resource of protecting component, protect Component may have access to all resources of calculating unit, and both sides can be interacted by the designated lane of safety, and protecting component can Believe that platform control module TPCM is core and trusts source point, can start prior to calculating unit processor, to calculating unit resource Initial configuration is carried out with bus, and all resources of host are accessed by direct internal bus shared mechanism, carries out static and dynamic Trust authentication measurement can be started or be continued to execute by verifying, otherwise be alarmed and controlled, actively resist intrusion behavior, And the credible report of host can be generated in real time, it reports to credible and secure management platform and carries out further association analysis, can solve The lower technical problem of computer security in the related technology, and then reach the technical effect for improving computer security.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes part of this application, this hair Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is a kind of Dynamic Degree of credible calculating platform optionally based on binary system structure according to an embodiment of the present invention The flow chart of amount method;
Fig. 2 is a kind of schematic diagram of optional binary system structure according to an embodiment of the present invention;
Fig. 3 is a kind of schematic diagram of optional CPU internal resource according to an embodiment of the present invention;
Fig. 4 is a kind of flow chart of optional computer starting process according to an embodiment of the present invention;
Fig. 5 is a kind of schematic diagram of optional dynamic measurement frame according to an embodiment of the present invention;
Fig. 6 is a kind of schematic diagram of optional dynamic measurement scheme according to an embodiment of the present invention;
Fig. 7 is a kind of schematic diagram of optional dynamic measurement functional module according to an embodiment of the present invention;
Fig. 8 is a kind of flow chart of optional kernel key data structure measurement according to an embodiment of the present invention;
Fig. 9 is a kind of flow chart of optional system process measurement according to an embodiment of the present invention;
Figure 10 is a kind of flow chart of optional kernel-driven measurement according to an embodiment of the present invention;
Figure 11 is a kind of flow chart of optional system core memory block measurement according to an embodiment of the present invention;
Figure 12 is a kind of flow chart of optional command interaction according to an embodiment of the present invention;
Figure 13 is a kind of optional flow chart for sending notice according to an embodiment of the present invention;
Figure 14 is a kind of dynamic of credible calculating platform optionally based on binary system structure according to an embodiment of the present invention The schematic diagram of measurement apparatus;And
Figure 15 is a kind of structural block diagram of terminal according to an embodiment of the present invention.
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only The embodiment of a part of the invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people The model that the present invention protects all should belong in member's every other embodiment obtained without making creative work It encloses.
It should be noted that description and claims of this specification and term " first " in above-mentioned attached drawing, " Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way Data be interchangeable under appropriate circumstances, so as to the embodiment of the present invention described herein can in addition to illustrating herein or Sequence other than those of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that cover Cover it is non-exclusive include, for example, the process, method, system, product or equipment for containing a series of steps or units are not necessarily limited to Step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, product Or other step or units that equipment is intrinsic.
Firstly, the part noun or term that occur during the embodiment of the present invention is described are suitable for as follows It explains:
TCM: credible password module, the hardware module of credible calculating platform provide crypto-operation function for credible calculating platform Can, there is shielded memory space.
TPCM: credible platform control module, one kind are integrated in credible calculating platform, for establishing and ensureing trust source point Hardware core module, provide integrity measurement, secure storage, credible report and the functions such as cryptographic service for trust computing.
TSB: trusted software base, for credible calculating platform credibility provide support software element set.
" basic input that BIOS: being the initialism of English " Basic Input Output System ", and Chinese is exactly Output system ", it is a kind of firmware interface of industrywide standard in PC compatible system.
One side according to an embodiment of the present invention provides a kind of dynamic of credible calculating platform based on binary system structure The embodiment of the method for measure.
This application provides a kind of trust computing binary system structures constructed based on CPU isomorphism mode, are based on multi-core CPU frame CPU core, memory and I/O are divided into mutually isolated trusted component and protecting component two parts by structure, the application, and protecting component is used In carrying out active measurement and active control, and the accessible calculating unit of protecting component to calculating unit, but calculating unit can not To access protecting component.
It can control Booting sequence by TPCM elder generation using the basic firmware of multi-core CPU based on trust computing binary system structure Start in calculating unit, so that TPCM first can carry out measurement protection to calculating unit.TPCM can be to the starting of calculating unit Process is measured step by step, establishes static trust chain.
Based on trust computing binary system structure, in the operational process of calculating unit, TSB can also be right according to credible strategy Calculating unit carries out dynamic measurement, and carries out corresponding control processing to calculating unit according to measurement results.
Based on trust computing binary system structure, protecting component can be carried out with calculating unit by Special safety interaction channel Communication interaction, three main classes can be divided by interacting mode between the two: order, notice and resource access.
Fig. 1 is a kind of Dynamic Degree of credible calculating platform optionally based on binary system structure according to an embodiment of the present invention The flow chart of amount method, as shown in Figure 1, this method may comprise steps of:
The hardware resource of computer when electric on computers, be divided into protection hardware resource and calculated hard by step S102 Part resource, computing hardware resource allow to be accessed and cannot be accessed protection hardware resource by protection hardware resource, protect hardware resource Subsystem is protected for running, computing hardware resource is for running computing subsystem.
Step S104 is hard to calculating using protection subsystem during computing hardware resource runs computing subsystem Operation object in the computing subsystem of part resource operation is measured.
Optionally, the operation object degree of progress in the computing subsystem for protecting subsystem to run computing hardware resource is utilized Amount includes at least one of: in the case where receiving the metric request of trusted software base agency, utilizing protection subsystem pair The requested operation object of metric request is measured, wherein trusted software base agency is arranged in computing subsystem;It is transporting In the case that row object meets measurement periodic condition, the operation object for meeting measurement periodic condition is carried out using protection subsystem Measurement;It is measured using operation object of the protection subsystem to measurement engine instruction.
Optionally, the operation object degree of progress in the computing subsystem for protecting subsystem to run computing hardware resource is utilized Amount includes at least one of: being measured using protection subsystem to the kernel key data structure in computing subsystem;Benefit The system process in computing subsystem is measured with protection subsystem;Using protection subsystem in computing subsystem Core driving is measured;The system core memory block in computing subsystem is measured using protection subsystem.
Optionally, the operation object degree of progress in the computing subsystem for protecting subsystem to run computing hardware resource is utilized Amount includes: to obtain the current a reference value of operation object;The operation saved in the current a reference value of object and a reference value library will be run The a reference value of object is compared, and obtains the measurement results of operation object.
In above-described embodiment, obtaining the current a reference value of operation object includes: that trusted software base searches credible platform control In module with operation object matching measurement engine;By the measurement engine with operation object matching in credible platform control module The metric operations of middle calling and operation object matching determine the current a reference value of operation object.
In above-described embodiment, a reference value of the operation object saved in the current a reference value of object and a reference value library will be run It is compared, the measurement results for obtaining operation object include: that guarantor is searched in a reference value library according to the object identity of operation object The a reference value for the operation object deposited;The current a reference value of object will be run and run a reference value that saves in a reference value library of object It is compared, obtains the measurement results of operation object, and the measurement results for running object are returned into credible password module.
In above-described embodiment, the benchmark of the operation object saved in the current a reference value of object and a reference value library will run Value is compared, and after obtaining the measurement results of operation object, a reference value of the operation object saved in a reference value library is updated For the current a reference value of operation object.
Above-mentioned protection subsystem may include hardware components (protection hardware resource) and software section (trusted operating system with TSB), computing subsystem include also include hardware components (computing hardware resource) and software section (computer operating system and respectively Kind application program, such as office);Computer is measured using credible platform control module TPCM, can refer to TPCM Subsystem is exactly protected, TPCM includes hardware components (protection hardware resource) and software section (trusted operating system and TSB).
The main body for executing metrics process substantially can be TSB, and TSB needs the support of TPCM in metrics process, utilizes tune Encryption and decryption calculating etc. is carried out with TCM.TSB agency is to protect subsystem convenient for obtaining the relevant information of computer and right Computer is accordingly controlled and the Hook Function that is arranged.
Through the above steps, in the calculating unit (including computing hardware resource) of processor CPU internal build security isolation With binary system structure protecting component (including protecting hardware resource) and deposited, calculating unit can not access the resource of protecting component, Protecting component may have access to all resources of calculating unit, and both sides can be interacted by the designated lane of safety, and protecting component can As core and source point is trusted using credible platform control module TPCM, can be started prior to calculating unit processor, to calculating unit Resource and bus carry out initial configuration, and access all resources of host by direct internal bus shared mechanism, carry out it is static with Dynamic credible verifying measurement, can be started or be continued to execute by verifying, otherwise be alarmed and controlled, and actively resist invasion row For, and the credible report of host can be generated in real time, it reports to credible and secure management platform and carries out further association analysis, can solve The lower technical problem of the computer security determined in the related technology, and then reach the technology effect for improving computer security Fruit.
As a kind of optional embodiment, the technical side of the application is described in further detail below with reference to specific embodiment Case, protecting component specifically may include credible password module TCM, credible platform control module TPCM, credible embedded operating system Basic components such as (i.e. trusted operating systems), for credible password module as password gene, TPCM is the specific of active immunity mechanism Executing agency, credible embedded operating system management TPCM local physical resource and access and dispatching host machine resource and TCM are provided Source.To sum up, trust computing binary system structure is that the basis of active immunity defence and trust computing 3.0 are different from other safety The core feature of preventing mechanism, TPCM and TCM constitute trusted root, and trusted root possesses the software and hardware resources independently of host, And the implementation of all resource support trust authentication mechanism of host can be actively accessed, it is the source of entire active immunity defense system Point.
The resource isolation and interaction mechanism that are there is provided based on CPU multicore architecture are constructed trust computing Dual system frame by the present invention Structure.Binary system structure is that a protecting component is run parallel with calculating unit, realizes the counting system structure of active immunity;It is counted It calculates component and is responsible for finishing service calculating task, protecting component is responsible for that calculating unit is monitored and is protected, it is ensured that business meter The execution of calculation task meets expection.Protecting component is according to credible and secure strategy, using password as gene, passes through identification, state A series of means such as measurement, state analysis, dynamic sensing, response control, kept secure and security control can for calculating unit It escorts by operation.
The computer hardware resources such as CPU core, memory headroom and I/O peripheral hardware can be divided into two groups of moneys by multiple nuclear CPU framework Source collection is merged into row isolation control, and provides security protection and the ability being in communication with each other.The present invention utilizes the characteristic of CPU, by CPU Core (CPU has multiple cores, 4 common cores, 8 cores, 16 cores and 64 cores), memory headroom (memory headroom in piece, outside piece) and I/O peripheral hardware is divided into two groups of hardware resources of calculating unit and protecting component.And by corresponding configuration, it can flexibly change protection department The resource allocation of part and calculating unit, while the calculating of protecting component and external complex being made to be environmentally isolated out, become a phase To closed environment, i.e. protecting component resource is not accessible externally to, the resource of calculating unit also inaccessible protecting component, from And the resource of protecting component is made to be effectively protected, security level is higher.By corresponding configuration, it can also make protecting component can be with The resource of calculating unit is accessed, to be monitored and to protect to it;Calculating unit and protecting component pass through dedicated interactive machine System and special interface are communicated, and while providing interaction capabilities, protect protecting component not by calculating unit to the greatest extent Interference and destruction.
It is illustrated in figure 2 trust computing Dual system configuration diagram, in trust computing binary system structure, original computer System becomes calculating unit, and it is protecting component that credible platform, which controls mould (TPCM),.Protecting component is run parallel with calculating unit, is prevented Component is protected independently of calculating unit, resource is protected (such as expansion bus, controller, administrative unit etc.) by hardware mechanisms, no By calculating unit and external interference and destruction.In turn, TPCM actively initiates the degree to calculating unit according to itself strategy Amount and security protection (setting highest for the security level of protecting component and priority in the design of CPU).In addition, credible peace Full management platform is responsible for managing credible strategy and a reference value etc..
In above-mentioned trust computing binary system structure:
1) CPU provide resource isolation, resource access, resources control, the communication mechanism between protecting component and calculating unit, The hardware support of security protection etc..
2) CPU basic firmware is configured resource isolation protection, and control Booting sequence is opened by TPCM prior to calculating unit It is dynamic, so that TPCM carries out measurement protection to calculating unit.CPU basic firmware is also responsible for establishing between calculating unit and protecting component Communication mechanism.
3) protecting component hardware resource include credible dedicated cpu core (one or more CPU cores, configurable number), it is close in piece Persistent storage, dedicated region of memory, real random number generator, clock, counter etc., onboard persistent storage, I/ in code engine, piece O device, onboard special network adapter and expansible credible password module (TCM) etc..
4) TPCM OS is the operating system of trusted component, is operation system of the continuous service on credible dedicated CPU core System works at the same time with the operating system (i.e. computer operating system) calculated on core, provides necessary ring for trusted service function Border.Including the general task schedule of operating system, driving and basic service.It also include the distinctive credible password module of trust computing (TCM) internal to realize that (if there is the cipher engine of hardware inside CPU, TCM is drawn by the software and hardware password of TPCM operating system Hold up composition, TCM can be completed by the software of TPCM operating system if not having cipher engine in CPU), resource access driving, it is credible Communication driving, credible control etc..The trust computing service logic of TPCM needs to access host side resources, needs to manage and use Storage resource and cryptographic calculations resource inside TPCM.These business that operating system and its internal drive module are TPCM calculate Necessary support is provided.
5) TSB realizes the main business logic of trust computing, carries out when being included in startup stage and operation to calculating unit Measurement and control, and record measurement results, assessment trusted status, generation reliable journal, authority and report.TSB is using strategy Its function of language definition executes, and provides maximum flexibility and adaptability.Policy language degree of defining when measure is assorted , how to judge, how be controlled and protected, TSB policy execution engine parse implementation strategy language.Due to policy language Flexibility, we can by many business of calculating unit with it is credible measurement combine, such as log in, open some file, It executes some program, connect some network, using some equipment etc., can neatly combine with credible measurement.TSB The foundation judged when using pattern library as measurement.Strategy and pattern library are issued to TPCM by credible and secure management platform.Measurement Log and report are generated by TSB and are uploaded to credible and secure management platform, and authority transmits the requestor for needing authority.The degree of TSB Amount includes static starting measurement and dynamic measurement.Static state starting is since calculating unit starting, and measurement starts the mould in each stage Block establishes a complete trust chain such as BIOS, BootLoader.Dynamic measurement real-time monitoring system, it is ensured that calculating unit fortune Row order section is credible.
6) TSB agency is located among calculating unit, but logically belongs to TPCM, and TSB Agent on behalf TSB executes some and meter Calculate the task of component environment tight association.These tasks due to going deep into calculating unit software inhouse, TPCM can not or it is inconvenient It is directly executed from external.For example obtain OS behavior relevant information, intercept the tasks such as behavior, kill process, it is difficult to outside computer Portion executes, these tasks will be executed by TSB Agent on behalf TSB.Since TSB agency is measured and is protected by TPCM in itself, by It is also that can trust that TSB agency, which executes these tasks,.The main task of TSB agency is to obtain and control system behavior, acquisition System action and context related data assist to execute control, credible connection negotiation and control.It is wherein credible that be connected to node credible On the basis of establish trustable network environment.
7) credible and secure management platform is responsible for managing credible strategy and a reference value etc..TPCM is credible immune binary system structure Core component, be responsible for carrying out credible measurement and protection to calculating unit, and generate reliable journal and data reporting.TPCM includes Reliable hardware resource, trusted operating system, built-in TCM and trusted software base.
Trusted operating system provides necessary underlying services and running environment for trusted function, and TPCM operating system is by basic Layer and functional layer are constituted.Primary layer includes that the normal operating systems such as task schedule, local resource and system service access are due Basic function.Functional layer includes the driving of host resource access control, main-machine communication driving, password resource access driving, state note The trust computings service-specific such as record, credible authority and report, strategy and benchmarking.
TSB is the kernel software layer for realizing trusted service function, is responsible for measurement, security protection and correlation log, report It generates.TSB have basic trust base, active monitoring mechanism (including controlling mechanism, tolerance mechanism, judgment mechanism), credible pattern library, Supporting mechanism and coordination mechanism and synergistic mechanism composition.Basic trust base is realized in TSB start-up course and is tested other mechanism Card and load.The system that active monitoring mechanism intercepts application is called, realized under TPCM support to system call relevant main body, Object, operation and the active of environment measurement and control.TSB realizes the access to TPCM resource by supporting mechanism;TSB passes through association Make mechanism realization to interact with the strategy of credible and secure management platform and audit information, and between other computing platform TSB Trusted collaboration.Controlling mechanism is the entrance that active monitoring mechanism plays a role, and the system of application is actively intercepted and captured according to control strategy Behavior, and control is implemented according to judgement result.Control strategy include the range at system control point, system control point obtain information and Controlling mechanism response determines the processing mode etc. of result.Control process includes hooking system service call behavior, and it is relevant to obtain behavior The information such as main body, object, operation, environment send information to tolerance mechanism according to control strategy and are measured, and receive judgement The judgement of mechanism is as a result, carry out relevant control.Tolerance mechanism measures measure object according to Metric policy.Metric policy It is made of measure object, measure etc..Measure object includes procedure, data and behavior etc..Measure includes measure object The setting of middle metric point, the opportunity of measurement, algorithm of measurement etc..Metrics process includes transmitting according to Metric policy to controlling mechanism Relevant main body, object, operation, the information such as environment are measured, and measurement results are sent to decision mechanism.Decision mechanism Measurement results are determined according to decision plan.Decision plan includes the manner of comparison, not unison of measurement results and a reference value Measure weighted value, the comprehensive calculation method etc. of result.Decision process includes utilizing credible pattern library and measurement knot according to decision plan Fruit carries out comprehensive judgement, and will determine that result sends controlling mechanism.TSB interactive interface includes internal interactive interface and outside interaction Interface.Interaction between the internal interactive interface support each mechanism of TSB;External interactive interface supports TSB and TPCM, host basis Interaction between software and credible and secure management platform.
TCM provides the password support of trust computing.TPCM hardware resource includes a set of dedicated CPU, storage, password list Member and may pass through the TCM module of external extension at I/O device.Isolation, protection and interaction mechanism are provided by CPU, it can be right The hardware resource of TPCM is isolated and is protected, and realizes the ability that calculating unit and trusted node are in communication with each other.
CPU internal resource schematic diagram according to an embodiment of the present invention shown in Fig. 3, CPU support based on insulation blocking can Believe framework, all software and hardware resources are divided into trusted resource or computing resource inside CPU by the embodiment of the present invention.In CPU Portion's resource is as shown in figure 3, it is credible that in system starting, CPU, which carries out this core of load operating CPU basic firmware by a core, Core (i.e. first processor core), CPU basic firmware can set credible core for part core by the value being stored in register, Credible core is in higher level of privilege, can access all address spaces, calculates core (i.e. second processor core) and is in lower spy Power level can only access the address space for calculating environment.Credible core only runs trusted code, constructs trusted context, calculates core operation Code (program code of service application, non-safety-related) except trusted code.CPU can be increased by bus extension mode Add credible bit identification, credible bit identification indicates corresponding access request and belongs to credible core or calculate core.In conjunction with each resource Internal resouce controller realizes resource isolation and access control.
Memory source controller is provided in memory source, which can incite somebody to action according to CPU basic firmware Memory is divided into credible memory and calculates memory.When memory source controller is when receiving access request, if trusted bit mark Know the access request that instruction is credible core, then memory source controller allows the access request to execute, if credible bit identification refers to Showing it is the access request for calculating core, then memory source controller can check whether access address space is calculating in memory headroom, If allow if the access request execute, if do not forbid if the access request execute.Credible memory can also be divided into Multiple inter-trust domain, each inter-trust domain have independent read and write access permission.In system starting, CPU basic firmware can be by portion Point memory is divided into credible memory, this partial memory be to the OS of calculating unit it is sightless, the OS of calculating unit will not divide again With using these memory headrooms, while credible memory source controller will filter calculating unit and access the request of credible memory.
Similarly, I/O can also be divided into credible I/O according to CPU basic firmware and calculate I/O by I/O resouce controller, when I/O resouce controller is when receiving access request, if the instruction of credible bit identification is the access request of credible core, I/O money Source controller allows the access request to execute, if the instruction of credible bit identification is to calculate the access request of core, I/O resources control Device can check whether access address space is calculating in input/output space, if allowing the access request to execute if, if not if The access request is forbidden to execute.It should be noted that if there is no memory source controller and I/O resouce controller inside CPU, The division of memory and I/O and the filtering of access request can be realized by configuring corresponding bridge device.
The credible of I/O is guaranteed by the credible control register in the controller of some Bridges or peripheral hardware.On piece Bus control unit (controller, filter or bridge device can judge whether resource request has permission according to the extension bits in bus, To realize credible perception) it is credible perception, it can recognize trusted request and computation requests.The peripheral hardwares such as PCIE, network it is credible Attribute is configurable, and dynamically can set it into credible state by credible caryogamy.(I/O controller filter turns I/O interface Send out bridge, NOC) access request will be checked according to corresponding credible attribute, credible I/O peripheral hardware is protected in filtering unauthorized access request Safety.
The comparison that the present invention passes through increase trusted identities position, it can be ensured that trusted resource cannot be obtained by calculating core, and guarantee can Believe the safety of resource.Dma device is when carrying out DMA request simultaneously, it is also necessary to credible access characteristics is specified, if it is meter The DMA in environment is calculated, then cannot access believable address space.
Protecting component inherently safe performance in the application is preferable, is mainly reflected in following four aspect:
1, itself is environmentally isolated, and processor completely supports the trusted infrastructure based on domain separation, can provide all software and hardwares Source is divided into trusted resource or computing resource, and protecting component and calculating unit is returned to use respectively.When system starts, protecting component (TPCM) starting operation first, completes division to physical resource, and to calculating unit associated firmware or software verification after, meter Calculating component host CPU can just bring into operation, and realize the isolation of start-up course.When system is run, protecting component and calculating unit energy Enough parallel operations, support both sides' running environment based on CPU core and bus realize completely isolated when operation, the resource packet of isolation CPU core, memory, I/O equipment etc. are included, resource used in protecting component cannot be accessed by calculating unit, and protecting component can The access to all resources of calculating unit is initiated with active.Calculating unit can only be carried out by dedicated interaction channel and protecting component Communication.In short, protecting component is all run in completely isolated environment when system starts and when operation, and actively to calculation part Part carries out trust authentication, is greatly reduced system attack face, even if the operating system of host computer side is captured, hacker is also difficult to seep Saturating protecting component, it is ensured that TPCM is measurable and controllable to host whole process, lays foundation for the building of integral protection system.
2, interaction channel safety, is communicated between calculating unit and TPCM by dedicated internuclear interaction channel, is used Interrupt notification and shared drive parameter transfer mode, TPCM do not provide external service interface, eliminate attacker and connect to service The direct attack of mouth.Meanwhile TPCM carries out stringent format checking and filtering to the parameter of input, because of the logical process ratio of TPCM Penetration attack relatively fixed, that such maximizing prevents hacker from carrying out using parameter transmitting.
3, data safety, the data of protecting component (TPCM) mainly include three aspects, and first is stored in Local data, such as policy data, code data etc., second is the network data interacted with credible management platform, and third is The data loaded in TPCM running space.Local datastore in FLASH outside piece, all data be based in piece OTP key into Row encryption guarantees that the data in FLASH are always ciphertext, and is decrypted automatically when data are loaded into memory.Network data It is that generation, including the upload of policy distribution, audit log, credible report upload etc. are interacted by protecting component and credible management platform, Data transmission is whole to be encrypted using SSL/TLS, it is ensured that the safety of data network transport-layer.TPCM should be able to be by important number when operation It is bound according to metric, realizes data packaging protection.Protected data can only be in the platform of binding TPCM and specific complete It can be just unsealed under character state.TPCM should have the function of secure data migration, backup and restore that migration, backup and recovery are grasped Make to carry out under the premise of guaranteeing the confidentiality and integrity of data.
4, the O&M operation of O&M safe operation, protecting component includes local software or firmware upgrade, trouble shooting etc., Double factor authentication is carried out when O&M, i.e., after only operation management person carries out authentication with Ukey, can just log into Enter system and carry out upgrading or trouble shooting, operation management person's audits into carefully controlled and operation is whole.Meanwhile for rise The software or firmware of grade first have to carry out signature verification, determine that source or version no problem can just execute updating operation, maximize Prevent O&M and operates introduced security risk.
Based on above-mentioned trust computing binary system structure, the process that protecting component carries out staticametric to calculating unit can be retouched It states are as follows:
When computer starting, system resource is divided in advance by configuring, is divided into trusted resource and computing resource.It can Letter resource includes a part of CPU core (credible core), credible memory and credible I/O equipment, constitutes trusted context for realizing TPCM; Computing resource includes another part CPU core (calculating core), calculates memory and calculate I/O equipment, constitutes and calculates environment for completing Calculating task.The resource for calculating the calculating inaccessible trusted context of core of environment is run on, the credible core of trusted context is run on, It may have access to trusted context and calculate all resources of environment.Start-up course further includes the measurement step by step of entire starting chain, is constituted One complete trust chain ensures that starting enters a believable calculating environment later.
Be illustrated in figure 4 computer starting process flow diagram flow chart, Booting sequence the following steps are included:
Step S401, after system power-up, ROM Code is credible, and core measures CPU basic firmware, and system is powered on ChipRom first Measurement verifying is carried out to CPU basic firmware using ROM Code, then branches to CPU basic firmware entry code.In view of CPU Basic firmware may upgrade, and carry out signature verification based on start-up portion mirror image of the public key in piece to CPU basic firmware.Verification process It is completed by credible core (TPCM core), calculates core waiting and be waken up.
Trusted resource (memory and I/O device) is arranged in step S402, credible core.
Step S403, CPU basic firmware measures credible OS mirror image, and credible core executes CPU underlying firmware code and measures TPCM OS mirror image, then load and execution TPCM OS.
Step S404 starts credible OS and TSB, and TPCM OS completes TPCM itself initialization, then TPCM metric calculation ring Border OS starts mirror image.
Step S405, TSB metric calculation environment Bootloader.
Step S406, TSB, which wakes up, calculates core, calculates core load and execution and calculates environment Bootloader, calls out after the completion of measurement It wakes up and calculates core, calculate core load and execution and calculate environment OS starting mirror image.
Step S407, TSB measure starting mirror image step by step and execute next stage according to measurement results, until calculating OS and TSB Agency completes starting, calculates environment starting mirror image and is generally multistage starting mirror image (such as BIOS- > GRUB- > OS or UBOOT- > OS), After the completion of previous starting mirror image executes, under load when level-one starting mirror image, notice measurement TPCM measurement next stage is opened Index glass picture.Environment is calculated after the completion of measurement and executes next stage starting mirror image, until operating system and TSB agency complete starting.
TPCM is after previous step receives and calculates the measurement notice that environment Booting sequence is sent, to each link degree of progress of starting Amount.TPCM records measurement results, starts believable foundation as environment is calculated.Also it can be used as the foundation of clean boot control.
Step S408, TSB agency sends calculating environment essential information and gives TPCM (code, data distribution), calculates ring TSB agency in the OS of border, which sends, calculates environmental metrics object-related information and status data to TPCM.
Step S409, TSB metric record calculates environment essential information.
Step S410 according to strategy and calculates environmental information dynamic measurement, after TPCM receives the data information for calculating environment In conjunction with credible strategy, start active dynamic measurement, is monitored in real time and protected to environment is calculated.Environment is calculated later to start to hold Row business processing.
Based on above-mentioned trust computing binary system structure, trusted software base TSB can be with to the dynamic measurement process of calculating unit Description are as follows: dynamic measurement is the important component of trusted software base and the important content of credible security.
It is credible that trusted software base can guarantee that system runs object initial state by staticametric function.On this basis, it moves State metric function will be directed to different measure objects, suitable measurement opportunity be selected, using reasonable measure, in system The operation conditions of measure object is measured, and the characteristic according to strategy and different measure objects, to changed measurement pair It is sent to controlling mechanism as being reported, and by measurement results, while taking update measurement desired value or trusted recovery measure, from And ensure the credible of system running state, support is provided for access control mechanisms and credible proof mechanism.
All critical processes, module, execution code, data structure, important jump in dynamic measurement module real-time monitoring system Turn table etc., real-time metrics and control carried out to the access behavior of the resource of process, be safeguards system safe operation, security mechanism not by The core component for bypassing and distorting.Dynamic measurement module is directed to different measure objects, and using reasonable measure, selection is closed Suitable measurement opportunity carries out overall measure to the operation of system, it is ensured that system is secure and trusted.Dynamic measurement is that the core of system is protected Barrier is the key that supervisory control system running state, measurement process behavior, analysis system credibility.
The operating mechanism of dynamic measurement, which realizes, is monitored the important node of system, effectively blocks malicious code to being System invasion.
It is illustrated in figure 5 the dynamic measurement block schematic illustration of the embodiment of the present invention, is illustrated in figure 6 the embodiment of the present invention The measurement overall plan of dynamic measurement.
Firstly, Editing Strategy language, configuration control point information (intercept and capture concrete operations behavior: opening, reading including file/ It writes, the execution of program, the load of dynamic base, drive load etc.).Generation dynamic measurement regulative strategy (including the choosing of Dynamic Degree engine It selects, the selection etc. of specific measure object);
Secondly, TSB agency (TSB agency be mainly original TSB in controlling mechanism) interception system call behavior, obtain master/ Object information, operation behavior configure according to strategy and call corresponding dynamic measurement engine and specific metric operations (such as: system Process metric, kernel module measurement, syscall_table subsystem call table measurement, idt interrupt descriptors metric table, internet pricing Amount, file system measurement, kernel code section measurement), dynamic measurement engine calling TPCM carries out hash operation and calculates specific measurement The digest value of object is simultaneously compared with pattern library;
Finally, measurement results are returned to TSB controlling mechanism, controlling mechanism comprehensive measurement result generates final control knot Fruit.
It is illustrated in figure 7 dynamic measurement the functional block diagram according to an embodiment of the present invention, dynamic measurement module is main Including dynamic measurement control submodule, dynamic measurement engine submodule, dynamic measurement report submodule and dynamic measurement pattern library Submodule etc..
Measurement control submodule includes engine control, period measurement, triggering measurement.Engine control is responsible for measuring the note of engine Volume, according to the corresponding measurement engine of the demand registration of product emphasis difference and client;Periodicity measurement is according to safe plan Whether the time interval radix set in slightly, the condition metric for then periodically detecting dynamic measurement meet, once detection is full Sufficient metric requirements then carry out characteristic value inspection to it.If detecting exception, measurement report is generated, credible report is sent to Mechanism;Triggering measurement triggers corresponding measurement engine by strategy by TSB controlling mechanism and is measured.
Measurement engine submodule is the nucleus module to dynamic measurement module.It will complete to dynamic measurement list object into Row trigger-type or periodically measurement.Be divided into two parts in measurement engine submodule: a part is dynamically that it will start one A kernel process, it will periodically detect the measurement period of modules, once measurement the period arrive, then will to the module into Row measurement;Another part be it is static, it will passively wait TSB controlling mechanism triggering.Once TSB controlling mechanism sends finger Enable, then trigger measurement engine will according to strategy call not homometric(al) engine measure.These metric datas can be one it is right As or a group objects, be also possible to whole measure objects.
Dynamic measurement is divided into four classes, including kernel key data structure measurement for the difference of measure object, metric form, System process measurement, kernel-driven measurement, system core memory block measurement.It is illustrated in figure 8 kernel key data structure measurement Flow chart.
Wherein, measure object such as idt interrupt-descriptor table, syscall_table subsystem call table;File system key behaviour Make function fs- > mount, fs- > kill_sb, superblock key operation function sb- > s_op;Network address race pf- > family, Pf- > create, protocol suite proto;Measurement opportunity: controlling mechanism triggering measurement, policy control period measurement.
As shown in figure 8, measurement process can include:
Step S801, the starting of dynamic measurement system-critical data structure tolerance mechanism;
Step S802 records system-critical data structure content, key operation function address;
Step S803 calls TPCM to calculate its a reference value;
Step S804, storage reference value to a reference value library;
Step S805, starts and loading system key structure measures engine;
Step S806, TSB controlling mechanism intercepts and captures application program system and calls behavior;
Step S807, TSB controlling mechanism calls corresponding measurement engine according to master/object information of intercepting and capturing;
Step S808 measures the specific metric operations of engine calling;
Step S809 calls TPCM calculating benchmark value;
Step S810 is compared with a reference value in pattern library;
Step S811 returns to measurement results and gives TSB controlling mechanism.
It is illustrated in figure 9 process metric flow chart according to the system in the embodiment of the present invention.Measure object: system process code Section, read-only data section, the relevant shared library of process.Measurement opportunity: controlling mechanism triggering measurement, policy control period measurement.
As shown in figure 9, measurement process includes:
Step S901, the starting of dynamic measurement process metric mechanism;
Step S902, the process chained list that scanning system has been turned on;
Step S903 calls TPCM to calculate its a reference value;
Step S904, storage reference value to a reference value library;
Step S905 starts and loads process metric engine;
Step S906, TSB controlling mechanism intercepts and captures application program system and calls behavior;
Step S907, starting monitoring dynamic base load/unload service;
Step S908 calls TPCM calculating benchmark value;
Step S909 updates a reference value to a reference value library;
Step S910, TSB controlling mechanism calls corresponding measurement engine according to master/object information of intercepting and capturing;
Step S911 measures the specific metric operations of engine calling;
Step S912 calls TPCM calculating benchmark value;
Step S913 is compared with a reference value in pattern library;
Step S914 returns to measurement results and gives TSB controlling mechanism.
As shown in Figure 10 for according to the kernel-driven of embodiment of the present invention measurement flow chart.Measure object: kernel module Code segment.Measurement opportunity: controlling mechanism triggering measurement, policy control period measurement;
As shown in Figure 10, measurement process includes:
Step S1001, the starting of dynamic measurement module tolerance mechanism;
Step S1002, the module chained list that scanning system has loaded;
Step S1003 calls TPCM to calculate its a reference value;
Step S1004, storage reference value to a reference value library;
Step S1005, starting monitoring kernel module load/unload service, calls TPCM calculating benchmark value;
Step S1006 updates a reference value to a reference value library;
Step S1007, starting kernel measure engine;
Step S1008, TSB controlling mechanism intercepts and captures application program system and calls behavior;
Step S1009, TSB controlling mechanism calls corresponding measurement engine according to master/object information of intercepting and capturing;
Step S1010 measures the specific metric operations of engine calling;
Step S1011 calls TPCM calculating benchmark value;
Step S1012 is compared with a reference value in pattern library;
Step S1013 returns to measurement results and gives TSB controlling mechanism;
As shown in figure 11 for according to the system core memory block of embodiment of the present invention measurement flow chart.
Measure object: kernel code section kernel_section.Measurement opportunity: controlling mechanism triggering measurement, policy control Period measurement.
As shown in figure 11, measurement process includes:
Step S1101, the starting of dynamic measurement system core memory block tolerance mechanism;
Step S1102 records system core RAM card first and last address;
Step S1103 calls TPCM to calculate its a reference value;
Step S1104, storage reference value to a reference value library;
Step S1105, activation system key memory block measure engine;
Step S1106, TSB controlling mechanism intercepts and captures application program system and calls behavior;
Step S1107, TSB controlling mechanism calls corresponding measurement engine according to master/object information of intercepting and capturing;
Step S1108 measures the specific metric operations of engine calling;
Step S1109 calls TPCM calculating benchmark value;
Step S1110 is compared with a reference value in pattern library;
Step S1111 returns to measurement results and gives TSB controlling mechanism.
Dynamic measurement reports that submodule, measurement report submodule include measurement report and two parts of measurement results.Its Middle measurement function of reporting is the period metric data that will measure engine generation, generates measurement report, and be sent to the credible report of TSB Function is analyzed;Measurement results are will to measure after the triggering measurement results that engine generates arrange to be sent to controlling mechanism, are controlled Making mechanism is controlled according to measurement results.
Dynamic measurement pattern library submodule, measuring standard library submodule are stored as static state according to the difference of measure object respectively A reference value and dynamic benchmark value.Static base value: a reference value, interrupt descriptors a reference value, network protocol base are called including system Quasi- value, file system a reference value, kernel code section a reference value etc..Dynamic benchmark value: the benchmark of subsequent launching process measure object The a reference value of the kernel-driven object of value and subsequent load.
Based on above-mentioned trust computing binary system structure, the interactive process between protecting component and calculating unit can be described Are as follows: the interactive mode for calculating environment and TPCM is divided into three classes by the present invention: order, notice and resource directly access.
Order is the interactive mode (really being initiated by the TSB agency that insertion calculates environment) initiated by calculating environment. Including being acted on behalf of from TSB to TPCM sends host essential information, notice, distributing policy and a reference value are measured in transmission, obtain credible number According to (state, authority, report, log etc.).Notice is the interactive mode initiated by TPCM, is sent from TPCM to calculating environment logical Know and (is actually sent to TSB agency).The notice of the notice, auxiliary control completed including command process.Resource directly accesses, The resource for calculating environment is directly accessed by TPCM, direct resource access is not related to interacting with calculating environment software layer.(this is main It is functional mechanism realized by CPU interior design and that multi-core CPU itself has, is staticametric and dynamic measurement Core support)
It as shown in figure 12, is that command interaction flow diagram is sent to TPCM according to the calculating environment of the embodiment of the present invention.
The mode for sending order is divided into synchronous transmission and asynchronous transmission.It is synchronous to send order, sender CPU send order with Enter wait state afterwards, until command process is completed.Synchronous transmission order is generally used for sending some simple commands, this kind of order Time very short order is handled, can be completed in interrupting context.Since command processing time is shorter, it is likely less than CPU tune The dynamic time cycle needed, such case does not dispatch sender CPU, and it is more suitable to allow sender CPU to do short wait.It is asynchronous It sends and orders, after sender CPU transmission order and command process completion (only Wait Orders being waited to be successfully transmitted) is not to wait for, at order During reason, sender CPU can execute other tasks.This mode is generally used for sending processing time longer order, in this way The computing capability of CPU can be made full use of.
As shown in figure 12, CPU0 indicates to calculate core, and CPU1 indicates credible core, and process is as follows:
Step S1201, TSB proxy requests send order
Shared drive is written in order by step S1202, host computer side driving.
Step S1203, host computer side drive and send traps to credible CPU.
Step S1204, host side drive wheel askes return value label, until return value non-empty.
Step S1205, while TPCM communication driving, save original execution context, into interrupt processing function.
Step S1206, TPCM driving handle function, command processing function meeting from shared drive reading order, call instruction Brief order is handled in interrupting context, for handling the longer asynchronous command of event, order is only discharged into team by driving Column just return immediately.
Shared drive is written in return value after command process or after being queued up by step S1207, TPCM driving, and is arranged Return value label.
Step S1208, TPCM driving restores the original task of TPCMCPU, i.e. recovery context, continues to execute.Due to possible New task is inserted in queue, TPCM may will start to execute new task.
Step S1209, step S1207 will lead to host computer side CPU end of polling(EOP), and host computer side CPU is returned from shared drive reading Value is returned, and empties return value label.
Processing result is returned to TSB agency by step S1210, host computer side communication driving.
Step S1211, TSB agency continues to execute.
Flow diagram to send notice to calculating environment according to the TPCM of the embodiment of the present invention as shown in figure 13.Notice The notice of the notice and auxiliary control completed including command process.Process is as follows:
Step S1301 passes through when TSB needs TSB agency to assist to be controlled or when TSB has handled asynchronous command TPCM communication driving sends notice to environment is calculated.
Step S1302, TPCM communication driving poll notification indicia, until notification indicia is sky, the previous notice of expression is It is received by host computer side.Notification indicia is arranged in TPCM.
Shared drive region is written in content of announcement by step S1303, TPCM communication driving.
Step S1304, TPCM communication driving is interrupted to environment CPU transmission is calculated.
Step S1305, TPCMCPU continue to execute TSB subsequent tasks.
Step S1306, meanwhile, calculation side CPU is interrupted, and saves context, is driven into calculation side and is executed notifier processes Function, i.e. calling interrupt processing function.
Step S1307, the notifier processes function of calculation side communication driving is read from shared drive to be notified, and removes notice mark Subsequent notice can be transmitted in note, the hereafter side TPCM driving.
Step S1308, calculation side communication driving notice TSB act on behalf of processing notification.If it is asynchronous command completion notice, TSB acts on behalf of the process of wake-up waiting.Otherwise TSB proxy call notifier processes function.
Step S1309, host computer side CPU restore to continue to execute original task up and down.Original task may under certain conditions It is preempted.
It is communicated between calculating unit and TPCM by dedicated internuclear interaction channel, using interrupt notification and is shared interior Parameter transfer mode is deposited, TPCM does not provide external service interface, eliminates direct attack of the attacker to service interface.Together When, TPCM carries out stringent format checking and filtering to the parameter of input, in this way can be most because the logical process of TPCM is relatively more fixed Big chemoprevention stops the penetration attack that hacker is carried out using parameter transmitting.
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of Combination of actions, but those skilled in the art should understand that, the present invention is not limited by the sequence of acts described because According to the present invention, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know It knows, the embodiments described in the specification are all preferred embodiments, and related actions and modules is not necessarily of the invention It is necessary.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation The method of example can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but it is very much In the case of the former be more preferably embodiment.Based on this understanding, technical solution of the present invention is substantially in other words to existing The part that technology contributes can be embodied in the form of software products, which is stored in a storage In medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, calculate Machine, server or network equipment etc.) execute method described in each embodiment of the present invention.
Other side according to an embodiment of the present invention additionally provides a kind of above-mentioned based on binary system structure for implementing The dynamic measurement device of the credible calculating platform based on binary system structure of the dynamic measurement method of credible calculating platform.Figure 14 is A kind of signal of the dynamic measurement device of credible calculating platform optionally based on binary system structure according to an embodiment of the present invention Figure, as shown in figure 14, the apparatus may include:
The hardware resource of the computer is divided into protection hardware when for electricity on computers by division unit 1401 Resource and computing hardware resource, wherein the computing hardware resource allows to be accessed and cannot be accessed by the protection hardware resource The protection hardware resource, the protection hardware resource is for running protection subsystem, and the computing hardware resource is for running Computing subsystem;
Metric element 1403, for utilizing institute during the computing hardware resource runs the computing subsystem The operation object stated in the computing subsystem that protection subsystem runs the computing hardware resource is measured.
It should be noted that the division unit 1401 in the embodiment can be used for executing the step in the embodiment of the present application S102, the metric element 1403 in the embodiment can be used for executing the step S104 in the embodiment of the present application.
Herein it should be noted that above-mentioned module is identical as example and application scenarios that corresponding step is realized, but not It is limited to above-described embodiment disclosure of that.It should be noted that above-mentioned module can pass through software as a part of of device It realizes, hardware realization can also be passed through.
By above-mentioned module, in the calculating unit (including computing hardware resource) of processor CPU internal build security isolation With binary system structure protecting component (including protecting hardware resource) and deposited, calculating unit can not access the resource of protecting component, Protecting component may have access to all resources of calculating unit, and both sides can be interacted by the designated lane of safety, and protecting component can As core and source point is trusted using credible platform control module TPCM, can be started prior to calculating unit processor, to calculating unit Resource and bus carry out initial configuration, and access all resources of host by direct internal bus shared mechanism, carry out it is static with Dynamic credible verifying measurement, can be started or be continued to execute by verifying, otherwise be alarmed and controlled, and actively resist invasion row For, and the credible report of host can be generated in real time, it reports to credible and secure management platform and carries out further association analysis, can solve The lower technical problem of the computer security determined in the related technology, and then reach the technology effect for improving computer security Fruit.
Optionally, the metric element is also used to execute at least one of: in the degree for receiving trusted software base agency In the case where amount request, measured using protection subsystem operation object requested to the metric request, wherein The trusted software base agency is arranged in the computing subsystem;Running the case where object meets measurement periodic condition Under, the operation object for meeting measurement periodic condition is measured using the protection subsystem;Utilize the protection subsystem The operation object of measurement engine instruction is measured.
Optionally, the metric element is also used to execute at least one of: using the protection subsystem to the meter Kernel key data structure in Operator Systems is measured;It is in the computing subsystem using the protection subsystem System process is measured;The kernel-driven in the computing subsystem is measured using the protection subsystem;Using institute Protection subsystem is stated to measure the system core memory block in the computing subsystem.
Optionally, the metric element is also used to obtain the current a reference value of the operation object;By the operation object The a reference value of the operation object saved in current a reference value and a reference value library is compared, and obtains the operation object Measurement results.
Optionally, the metric element is in the current a reference value of the acquisition operation object: using trusted software base Search the measurement engine in credible platform control module with the operation object matching;Pass through the degree with the operation object matching Amount engine calls the metric operations with the operation object matching in the credible platform control module, determines the operation pair As current a reference value.
Optionally, the metric element will be described in will save in the current a reference value of the operation object and a reference value library The a reference value of operation object is compared, can be according to pair of the operation object when obtaining the measurement results of the operation object The a reference value of the operation object of preservation is searched in a reference value library as identifying;By the current benchmark of the operation object Value is compared with a reference value that the operation object saves in a reference value library, obtains the measurement knot of the operation object Fruit, and the measurement results of the operation object are returned into the credible password module.
Optionally, the metric element will be described in will save in the current a reference value of the operation object and a reference value library The a reference value of operation object is compared, and after obtaining the measurement results of the operation object, will be saved in a reference value library The a reference value of the operation object be updated to the current a reference value of the operation object.
Herein it should be noted that above-mentioned module is identical as example and application scenarios that corresponding step is realized, but not It is limited to above-described embodiment disclosure of that.It should be noted that above-mentioned module can pass through software as a part of of device It realizes, hardware realization can also be passed through, wherein hardware environment includes network environment.
Other side according to an embodiment of the present invention additionally provides a kind of above-mentioned based on binary system structure for implementing The server or terminal of the dynamic measurement method of credible calculating platform.
Figure 15 is a kind of structural block diagram of terminal according to an embodiment of the present invention, and as shown in figure 15, which may include: One or more (one is only shown in figure) processors 1501, memory 1503 and transmitting device 1505, as shown in figure 15, The terminal can also include input-output equipment 1507.
Wherein, memory 1503 can be used for storing software program and module, as in the embodiment of the present invention based on binary Corresponding program instruction/the module of the dynamic measurement method and device of the credible calculating platform of system structure, processor 1501 pass through fortune The software program and module that row is stored in memory 1503, thereby executing various function application and data processing, i.e., in fact The dynamic measurement method of the existing above-mentioned credible calculating platform based on binary system structure.Memory 1503 may include that high speed is deposited at random Reservoir, can also include nonvolatile memory, such as one or more magnetic storage device, flash memory or other are non-volatile Property solid-state memory.In some instances, memory 1503 can further comprise depositing relative to processor 1501 is remotely located Reservoir, these remote memories can pass through network connection to terminal.The example of above-mentioned network includes but is not limited to internet, enterprise Industry intranet, local area network, mobile radio communication and combinations thereof.
Above-mentioned transmitting device 1505 is used to that data to be received or sent via network, can be also used for processor with Data transmission between memory.Above-mentioned network specific example may include cable network and wireless network.In an example, Transmitting device 1505 includes a network adapter (Network Interface Controller, NIC), can pass through cable It is connected with other network equipments with router so as to be communicated with internet or local area network.In an example, transmission dress 1505 are set as radio frequency (Radio Frequency, RF) module, is used to wirelessly be communicated with internet.
Wherein, specifically, memory 1503 is for storing application program.
The application program that processor 1501 can call memory 1503 to store by transmitting device 1505, it is following to execute Step:
When electric on computers, the hardware resource of the computer is divided into protection hardware resource and computing hardware provides Source, wherein the computing hardware resource allows to access and cannot access the protection hardware resource by the protection hardware resource, The protection hardware resource is for running protection subsystem, and the computing hardware resource is for running computing subsystem;
During the computing hardware resource runs the computing subsystem, using the protection subsystem to described Operation object in the computing subsystem of computing hardware resource operation is measured.
Optionally, the specific example in the present embodiment can be with reference to example described in above-described embodiment, the present embodiment Details are not described herein.
It will appreciated by the skilled person that structure shown in figure 15 is only to illustrate, terminal can be smart phone (such as Android phone, iOS mobile phone), tablet computer, palm PC and mobile internet device (Mobile Internet Devices, MID), the terminal devices such as PAD.Figure 15 it does not cause to limit to the structure of above-mentioned electronic device.For example, terminal is also May include than shown in Figure 15 more perhaps less component (such as network interface, display device) or have and Figure 15 institute Show different configurations.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can It is completed with instructing the relevant hardware of terminal device by program, which can store in a computer readable storage medium In, storage medium may include: flash disk, read-only memory (Read-Only Memory, ROM), random access device (Random Access Memory, RAM), disk or CD etc..
The embodiments of the present invention also provide a kind of storage mediums.Optionally, in the present embodiment, above-mentioned storage medium can With the program code of the dynamic measurement method for executing the credible calculating platform based on binary system structure.
Optionally, in the present embodiment, above-mentioned storage medium can be located at multiple in network shown in above-described embodiment On at least one network equipment in the network equipment.
Optionally, in the present embodiment, storage medium is arranged to store the program code for executing following steps:
When electric on computers, the hardware resource of the computer is divided into protection hardware resource and computing hardware provides Source, wherein the computing hardware resource allows to access and cannot access the protection hardware resource by the protection hardware resource, The protection hardware resource is for running protection subsystem, and the computing hardware resource is for running computing subsystem;
During the computing hardware resource runs the computing subsystem, using the protection subsystem to described Operation object in the computing subsystem of computing hardware resource operation is measured.
Optionally, the specific example in the present embodiment can be with reference to example described in above-described embodiment, the present embodiment Details are not described herein.
Optionally, in the present embodiment, above-mentioned storage medium can include but is not limited to: USB flash disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, magnetic disk or The various media that can store program code such as CD.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
If the integrated unit in above-described embodiment is realized in the form of SFU software functional unit and as independent product When selling or using, it can store in above-mentioned computer-readable storage medium.Based on this understanding, skill of the invention Substantially all or part of the part that contributes to existing technology or the technical solution can be with soft in other words for art scheme The form of part product embodies, which is stored in a storage medium, including some instructions are used so that one Platform or multiple stage computers equipment (can be personal computer, server or network equipment etc.) execute each embodiment institute of the present invention State all or part of the steps of method.
In the above embodiment of the invention, it all emphasizes particularly on different fields to the description of each embodiment, does not have in some embodiment The part of detailed description, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed client, it can be by others side Formula is realized.Wherein, the apparatus embodiments described above are merely exemplary, such as the division of the unit, and only one Kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or It is desirably integrated into another system, or some features can be ignored or not executed.Another point, it is shown or discussed it is mutual it Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of unit or module It connects, can be electrical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered It is considered as protection scope of the present invention.

Claims (10)

1. a kind of dynamic measurement method of the credible calculating platform based on binary system structure characterized by comprising
When electric on computers, the hardware resource of the computer is divided into protection hardware resource and computing hardware resource, In, the computing hardware resource allows to be accessed by the protection hardware resource and cannot access the protection hardware resource, described Protect hardware resource for running protection subsystem, the computing hardware resource is for running computing subsystem;
During the computing hardware resource runs the computing subsystem, using the protection subsystem to the calculating Operation object in the computing subsystem of hardware resource operation is measured.
2. the method according to claim 1, wherein using the protection subsystem to the computing hardware resource It includes at least one of that operation object in the computing subsystem of operation, which carries out measurement:
In the case where receiving the metric request of trusted software base agency, using the protection subsystem to the metric request Requested operation object is measured, wherein the trusted software base agency is arranged in the computing subsystem;
In the case where running object satisfaction measurement periodic condition, using the protection subsystem to satisfaction measurement periodic condition Operation object is measured;
It is measured using operation object of the protection subsystem to measurement engine instruction.
3. the method according to claim 1, wherein using the protection subsystem to the computing hardware resource It includes at least one of that operation object in the computing subsystem of operation, which carries out measurement:
The kernel key data structure in the computing subsystem is measured using the protection subsystem;
The system process in the computing subsystem is measured using the protection subsystem;
The kernel-driven in the computing subsystem is measured using the protection subsystem;
The system core memory block in the computing subsystem is measured using the protection subsystem.
4. the method according to claim 1, which is characterized in that using the protection subsystem to institute It states the operation object in the computing subsystem of computing hardware resource operation and measure and include:
Obtain the current a reference value of the operation object;
The a reference value of the operation object saved in the operation object current a reference value and a reference value library is compared, Obtain the measurement results of the operation object.
5. according to the method described in claim 4, it is characterized in that, the acquisition current a reference value of object that runs includes:
Trusted software base searches the measurement engine in credible platform control module with the operation object matching;
By being called in the credible platform control module and the operation pair with the measurement engine of the operation object matching As matched metric operations, the current a reference value of the operation object is determined.
6. according to the method described in claim 4, it is characterized in that, a reference value and a reference value library that the operation object is current The a reference value of the operation object of middle preservation is compared, and the measurement results for obtaining the operation object include:
The a reference value of the operation object of preservation is searched in a reference value library according to the object identity of the operation object;
The a reference value that the current a reference value of the operation object and the operation object save in a reference value library is carried out Compare, obtains the measurement results of the operation object, and the measurement results of the operation object are returned into credible password module.
7. according to the method described in claim 4, it is characterized in that, in a reference value and a reference value that the operation object is current The a reference value of the operation object saved in library is compared, after obtaining the measurement results of the operation object, the side Method further include:
The a reference value of the operation object saved in a reference value library is updated to the current a reference value of the operation object.
8. a kind of dynamic measurement device of the credible calculating platform based on binary system structure characterized by comprising
The hardware resource of the computer is divided into protection hardware resource and meter when for electricity on computers by division unit Calculate hardware resource, wherein the computing hardware resource allows to be accessed by the protection hardware resource and cannot access the protection Hardware resource, the protection hardware resource calculate subsystem for running for running protection subsystem, the computing hardware resource System;
Metric element, for utilizing protection during the computing hardware resource runs the computing subsystem The operation object in computing subsystem that system runs the computing hardware resource is measured.
9. a kind of storage medium, which is characterized in that the storage medium includes the program of storage, wherein when described program is run Execute method described in 1 to 7 any one of the claims.
10. a kind of electronic device, including memory, processor and it is stored on the memory and can transports on the processor Capable computer program, which is characterized in that the processor executes the claims 1 to 7 by the computer program Method described in one.
CN201910611569.4A 2019-07-08 2019-07-08 Dynamic measurement method and device of trusted computing platform based on dual-system architecture Active CN110321713B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910611569.4A CN110321713B (en) 2019-07-08 2019-07-08 Dynamic measurement method and device of trusted computing platform based on dual-system architecture

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910611569.4A CN110321713B (en) 2019-07-08 2019-07-08 Dynamic measurement method and device of trusted computing platform based on dual-system architecture

Publications (2)

Publication Number Publication Date
CN110321713A true CN110321713A (en) 2019-10-11
CN110321713B CN110321713B (en) 2021-04-20

Family

ID=68121625

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910611569.4A Active CN110321713B (en) 2019-07-08 2019-07-08 Dynamic measurement method and device of trusted computing platform based on dual-system architecture

Country Status (1)

Country Link
CN (1) CN110321713B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111581646A (en) * 2020-05-08 2020-08-25 北京可信华泰信息技术有限公司 Data processing method, device, storage medium and processor
CN112118167A (en) * 2020-08-17 2020-12-22 深圳市风云实业有限公司 Method for quickly transmitting cross-network tunnel data
CN112257071A (en) * 2020-10-23 2021-01-22 江西畅然科技发展有限公司 Credibility measurement control method based on state and behavior of sensing layer of Internet of things
CN112347472A (en) * 2020-10-27 2021-02-09 中国南方电网有限责任公司 Behavior measurement method and device of power system
CN113221117A (en) * 2021-04-29 2021-08-06 麒麟软件有限公司 Dynamic measurement method of trusted computing platform based on dual-system architecture
CN113821821A (en) * 2021-11-24 2021-12-21 飞腾信息技术有限公司 Security architecture system, cryptographic operation method of security architecture system and computing device
CN114462041A (en) * 2021-12-24 2022-05-10 麒麟软件有限公司 Dynamic trusted access control method and system based on dual-system architecture
CN118041691A (en) * 2024-04-10 2024-05-14 河北省气象服务中心(河北省气象影视中心) Meteorological data acquisition and transmission system
CN118051917A (en) * 2024-04-11 2024-05-17 南京汇荣信息技术有限公司 Verification method and system based on trusted computing platform measurement report

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080216096A1 (en) * 2005-07-15 2008-09-04 Lenovo (Beijing) Limited Virtual Computer System Supporting Trusted Computing and Method for Implementing Trusted Computation Thereon
CN103577748A (en) * 2013-11-20 2014-02-12 北京可信华泰信息技术有限公司 Dynamic measuring method based on dependable computing and management system
CN109871695A (en) * 2019-03-14 2019-06-11 沈昌祥 A kind of credible calculating platform of calculating and the parallel dual Architecture of protection
CN109918915A (en) * 2019-03-14 2019-06-21 沈昌祥 A kind of dynamic measurement method based on dual Architecture credible calculating platform
CN109948344A (en) * 2019-03-14 2019-06-28 沈昌祥 A kind of system interaction method based on dual Architecture credible calculating platform

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080216096A1 (en) * 2005-07-15 2008-09-04 Lenovo (Beijing) Limited Virtual Computer System Supporting Trusted Computing and Method for Implementing Trusted Computation Thereon
CN103577748A (en) * 2013-11-20 2014-02-12 北京可信华泰信息技术有限公司 Dynamic measuring method based on dependable computing and management system
CN109871695A (en) * 2019-03-14 2019-06-11 沈昌祥 A kind of credible calculating platform of calculating and the parallel dual Architecture of protection
CN109918915A (en) * 2019-03-14 2019-06-21 沈昌祥 A kind of dynamic measurement method based on dual Architecture credible calculating platform
CN109948344A (en) * 2019-03-14 2019-06-28 沈昌祥 A kind of system interaction method based on dual Architecture credible calculating platform

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111581646A (en) * 2020-05-08 2020-08-25 北京可信华泰信息技术有限公司 Data processing method, device, storage medium and processor
CN111581646B (en) * 2020-05-08 2023-11-24 北京可信华泰信息技术有限公司 Data processing method, device, storage medium and processor
CN112118167B (en) * 2020-08-17 2022-04-12 深圳市风云实业有限公司 Method for quickly transmitting cross-network tunnel data
CN112118167A (en) * 2020-08-17 2020-12-22 深圳市风云实业有限公司 Method for quickly transmitting cross-network tunnel data
CN112257071A (en) * 2020-10-23 2021-01-22 江西畅然科技发展有限公司 Credibility measurement control method based on state and behavior of sensing layer of Internet of things
CN112347472A (en) * 2020-10-27 2021-02-09 中国南方电网有限责任公司 Behavior measurement method and device of power system
CN112347472B (en) * 2020-10-27 2022-05-06 中国南方电网有限责任公司 Behavior credibility measuring method and device based on power edge calculation
CN113221117A (en) * 2021-04-29 2021-08-06 麒麟软件有限公司 Dynamic measurement method of trusted computing platform based on dual-system architecture
CN113821821A (en) * 2021-11-24 2021-12-21 飞腾信息技术有限公司 Security architecture system, cryptographic operation method of security architecture system and computing device
CN114462041A (en) * 2021-12-24 2022-05-10 麒麟软件有限公司 Dynamic trusted access control method and system based on dual-system architecture
CN118041691A (en) * 2024-04-10 2024-05-14 河北省气象服务中心(河北省气象影视中心) Meteorological data acquisition and transmission system
CN118051917A (en) * 2024-04-11 2024-05-17 南京汇荣信息技术有限公司 Verification method and system based on trusted computing platform measurement report
CN118051917B (en) * 2024-04-11 2024-06-18 南京汇荣信息技术有限公司 Verification method and system based on trusted computing platform measurement report

Also Published As

Publication number Publication date
CN110321713B (en) 2021-04-20

Similar Documents

Publication Publication Date Title
CN110321235A (en) The system interaction method and apparatus of credible calculating platform based on binary system structure
CN110321713A (en) The dynamic measurement method and device of credible calculating platform based on binary system structure
CN110334512A (en) The staticametric method and apparatus of credible calculating platform based on binary system structure
US11687645B2 (en) Security control method and computer system
KR20190090037A (en) Systems and methods for cloud-based operating system event and data access monitoring
CN110334521B (en) Trusted computing system construction method and device, trusted computing system and processor
US10997289B2 (en) Identifying malicious executing code of an enclave
CN109766699A (en) Hold-up interception method and device, storage medium, the electronic device of operation behavior
Zunnurhain et al. Security attacks and solutions in clouds
CN109948344A (en) A kind of system interaction method based on dual Architecture credible calculating platform
CN106341381A (en) Method and system of key management for rack server system
CN104871174B (en) User's portable equipment and the system and method for " carrying " evaluation work environment
US9268492B2 (en) Network based management of protected data sets
CN110334509A (en) The construction method and device of the credible calculating platform of binary system structure
CN109479013A (en) The log recording of business in computer network
Garay et al. Software integrity protection using timed executable agents
KR20230156129A (en) Blockchain-based responsible distributed computing system
von der Assen et al. GuardFS: A file system for integrated detection and mitigation of linux-based ransomware
CN110198300B (en) Honeypot operating system fingerprint hiding method and device
Rajendran et al. Security threats of embedded systems in iot environment
CN109165509A (en) The software method of credible measurement, equipment, system and storage medium in real time
CN116566629A (en) Security testing method and device, computer equipment and storage medium
Zhang et al. Design and implementation of trustzone-based blockchain chip wallet
US12079378B2 (en) Gathering universal serial bus threat intelligence
US20240193564A1 (en) Forensics Module and Embedded System

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant