CN1702592A - Method for establishing credible input-output channels - Google Patents

Method for establishing credible input-output channels Download PDF

Info

Publication number
CN1702592A
CN1702592A CN 200510056167 CN200510056167A CN1702592A CN 1702592 A CN1702592 A CN 1702592A CN 200510056167 CN200510056167 CN 200510056167 CN 200510056167 A CN200510056167 A CN 200510056167A CN 1702592 A CN1702592 A CN 1702592A
Authority
CN
China
Prior art keywords
safety chip
encryption
decryption key
data
safety
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200510056167
Other languages
Chinese (zh)
Other versions
CN100334519C (en
Inventor
谢巍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CNB2005100561670A priority Critical patent/CN100334519C/en
Publication of CN1702592A publication Critical patent/CN1702592A/en
Application granted granted Critical
Publication of CN100334519C publication Critical patent/CN100334519C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

This invention discloses a method for building authentic input channel, which comprises following keys: a) encrypting the data which is to export by safety chip located in input device; b) transmitting the said data to safety chips located in mainboard; c) applying after decrypting by said safety chips located in mainboard. The invention also provides a method for building authentic output channel, which comprises following keys: a) encrypting the data which is to export to output device by safety chip located in mainboard; b) transmitting the said data to safety chips located in output device; c) exporting the corresponding data after decrypting by said safety chips located in output device.

Description

Set up the method for credible input-output channels
Technical field
The present invention relates to the computer security technique field, particularly relate to the method for setting up credible input-output channels.
Background technology
In the middle of reality, messaging device is widely used in the daily life.Messaging device mainly is meant PC (PC), notebook computer, palm PC, equipment such as mobile phone.
(the TCPA of trusted computer alliance that initiated by Intel, IBM, HP, Microsoft, Compaq in 1999, Trusted Computing Platform Alliance) is organized in promotion and makes up a reliable computing environment, this tissue has defined the framework of a platform device authentication, and is embedded in safety chip (TPM:Trusted Platform Module) on the mainboard and the standard of upper layer software (applications) middleware TSS (TrustedSoftware Stack); TCPA was reassembled as Trusted Computing unit (TCG, TrustedComputing Group) in 2003, improved additional to TPM and TSS.
Figure 1 shows that the safety chip architectural schematic that TCG requires.Comprise the processor module 101 that is used to control in the safety chip, as microcontroller (MCU) processor, encryption and decryption module 102, the memory module 103 that is used to store the encryption and decryption key, input and output (I/O) interface module 104 and the power supply detection module 105 that is used to detect the safety chip power supply.Described all modules interconnect by the bus of safety chip inside, wherein, described processor module 101, it is controlled encryption and decryption module 102 according to the instruction of receiving from I/O interface module 104, or sends instruction execution result to I/O interface module 104 according to receiving instruction; Perhaps, directly from memory module 103, take out secret information,, send I/O interface module 104 to as key etc.; Encryption and decryption module 102 is under the control of processor module 101, in memory module 103, obtain the encryption and decryption key of storage in advance, use the encryption and decryption key data that receive are carried out encryption and decryption, data transmission after the encryption and decryption is transferred to external unit by I/O interface module 104, and described I/O interface module 104 is used for data and/or the instruction between transmission security chip and the external unit.
Usually, encryption and decryption module 102 is made of SHA/HMAC engine modules, randomizer, RSA processor module and key production module, described SHA/HMAC engine modules, under the control of processor module 101, be used for the data that receive are carried out the SHA/HMAC computing, send result of calculation to I/O interface module 104; Described RSA processor module under the control of processor module 101, is used for the data that receive are carried out the RSA computing, sends result of calculation to I/O interface module 104; Described randomizer under the control of processor module 101, is used to generate random number so that produce random key; Described key production module, the random number of utilizing randomizer to produce generates RSA, the required key of SHA/HMAC algorithm.Memory module 103 is made of the volatile memory that is used to preserve the nonvolatile memory of key data, user data and program and is used to preserve ephemeral data and transient program.
Other selectable unit (SU)s that can also comprise the state that is used to manage the current safety chip in the safety chip.
Figure 2 shows that the safety chip of prior art and the synoptic diagram between the mainboard.The CPU 201 of messaging device links to each other with north bridge 202 on the mainboard, north bridge 202 directly links to each other respectively with static memory (SRAM) 204 with south bridge 203, and south bridge 203 directly links to each other by LPC (Low Pin Count Bus) bus with safety chip 206 with super IO interface (SuperIO) 205 respectively.The safety chip major function of TCG organization prescribed is included in the computer starting process BIOS is carried out integrity verification at present, and hardware device is carried out integrity verification, and operating system is carried out integrity verification; Behind operating system, safety chip also is responsible for the integrity monitoring checking to shielded application software; Have, safety chip also is responsible for various keys in generation and the management system again; And can provide digital signature.
Though above-mentioned safety chip can the guarantee information treatment facility has the running environment of a safety, but existing input is not within the monitoring of safety chip, this be because, safety chip is only verified already present data in the messaging device and operation such as supervision, the data of input and output are not carried out operations such as any checking supervision, and current data, the position of mouse on screen and the output data that is sent to video card that has many trojan horse programs can monitor the keyboard input, thereby obtain user-dependent confidential information.This shows that use existing IO channel and carry out the transmission of data and dangerous, current urgent need solves the problem of credible input and output.
Summary of the invention
In view of this, an object of the present invention is to provide a kind of method of setting up credible input channel, another object of the present invention provides a kind of method of setting up credible output channel, is monitored to avoid input/output information, makes the information of input and output safer.
For achieving the above object, technical scheme of the present invention is achieved in that
A kind of method of setting up credible input channel, in the input media of messaging device, set in advance first safety chip that is used to guarantee input message safety, set in advance the 3rd safety chip that is used to ensure information security in the mainboard of messaging device, this method may further comprise the steps:
The 3rd safety chip carries out the credibility checking to first safety chip, after being proved to be successful, is identified for the encryption and decryption key and the preservation of encryption and decryption data between the 3rd safety chip and first safety chip;
First safety chip is gathered input media data to be exported, and uses described encryption and decryption key and sends to the 3rd safety chip after to the data encryption that collects;
The 3rd safety chip obtains the encryption and decryption key identical with first safety chip, using the key that is obtained is decrypted the ciphered data that receives, send the data after the deciphering to be used to receive input media output information in the messaging device device, proceed subsequent treatment by this device.
Preferably, described the 3rd safety chip may further comprise the steps the method that first safety chip carries out credible checking: the 3rd safety chip obtains the unique identification of first safety chip, judge whether self obtains this sign for the first time, if, then calculate and preserve the cryptographic hash of this sign, and this sign and the corresponding relation of using the HASH value that this sign calculated, and confirm to be proved to be successful; If the 3rd safety chip obtains the unique identification of first safety chip non-first time, then calculate the HASH value of this sign, whether this that judge that this HASH value that calculates and self preserve in advance identifies pairing HASH value consistent, as unanimity, then be proved to be successful, otherwise authentication failed.
Preferably, the process that is identified for the encryption and decryption key of encryption and decryption data between described the 3rd safety chip and first safety chip and preserves may further comprise the steps: the 3rd safety chip sends to first safety chip with the public signature key of self, first safety chip self generates and preserves the encryption and decryption key, afterwards, using the public signature key of the 3rd safety chip encrypts the encryption and decryption key that self generates, and the encryption and decryption key after will encrypting sends to the 3rd safety chip, the 3rd safety chip is used the decrypts information of signature private key to receiving of self, obtains and preserve the encryption and decryption key identical with first safety chip.
Preferably, the process that is identified for the encryption and decryption key of encryption and decryption data between described the 3rd safety chip and first safety chip and preserves may further comprise the steps: the 3rd safety chip self generates and preserves the encryption and decryption key, afterwards, using the public signature key of first safety chip encrypts the encryption and decryption key that self generates, encryption and decryption key after encrypting is sent to the first peace chip, the private key that first safety chip is used self is decrypted the encryption key that receives, and obtains and preserve the encryption and decryption key.
Preferably, described encryption and decryption key is symmetric key or public private key pair.
Preferably, the method that described the 3rd safety chip obtains the encryption and decryption key identical with first safety chip is: preserve the encryption and decryption key of sharing with first safety chip in the 3rd safety chip in advance, and use the interface identifier of this encryption and decryption key time institute corresponding interface and the corresponding relation of this encryption and decryption key; After the 3rd safety chip receives ciphered data, according to the interface that receives data, and the corresponding relation of this interface identifier encryption and decryption key pairing with it of having preserved, from self obtaining the encryption and decryption key identical with first safety chip.
Preferably, described input media includes but not limited to mouse-keyboard.
Preferably, this method further comprises: after the 3rd safety chip carried out credible authentication failed to first safety chip, first safety chip was gathered input media data to be exported, and the data that collected are directly sent to the 3rd safety chip; Whether the 3rd safety chip handles the data that this receives according to configuration determination in advance, if, then directly send the data that receive to be used to receive input media output information device, proceed subsequent treatment by this device, otherwise refusal is handled, and there is potential safety hazard in the employed input media of prompting user.
Preferably, this method further comprises: second safety chip that is provided for guaranteeing output information safety in the output unit of messaging device; The 3rd safety chip carries out the credibility checking to second safety chip, after being proved to be successful, is identified for the encryption and decryption key and the preservation of encryption and decryption data between the 3rd safety chip and second safety chip; The 3rd safety chip is gathered data of giving output unit to be transmitted, obtains and uses described encryption and decryption key and send to second safety chip after to the data encryption that collects; Second safety chip adopts the encryption and decryption key identical with the 3rd safety chip, and the ciphered data that receives is decrypted, and sends the data after the deciphering to output unit and exports.
Preferably, this method further comprises: the 3rd safety chip carries out the credibility checking to second safety chip, after the authentication failed, whether the 3rd safety chip gives second safety chip with this data transmission that collects according to configuration determination in advance, if, then directly send the data that collect to second safety chip, send the information that receives to output unit by this second safety chip, otherwise refusal sends the data that collect to second safety chip, and there is potential safety hazard in the employed output unit of prompting user.
A kind of method of setting up credible output channel, in the output unit of messaging device, set in advance second safety chip that is used to guarantee output information safety, set in advance the 3rd safety chip that is used to ensure information security in the mainboard of messaging device, this method may further comprise the steps:
The 3rd safety chip carries out the credibility checking to second safety chip, after being proved to be successful, is identified for the encryption and decryption key and the preservation of encryption and decryption data between the 3rd safety chip and second safety chip;
The 3rd safety chip is gathered data of giving output unit to be transmitted, obtains and uses described encryption and decryption key and send to second safety chip after to the data encryption that collects;
Second safety chip adopts the encryption and decryption key identical with the 3rd safety chip, and the ciphered data that receives is decrypted, and sends the data after the deciphering to output unit and exports.
Preferably, described the 3rd safety chip may further comprise the steps the method that second safety chip carries out credible checking: the 3rd safety chip obtains the unique identification of second safety chip, judge whether self obtains this sign for the first time, if, then calculate and preserve the cryptographic hash of this sign, and this sign and the corresponding relation of using the HASH value that this sign calculated, and confirm to be proved to be successful; If the 3rd safety chip obtains the unique identification of second safety chip non-first time, then calculate the HASH value of this sign, whether this that judge that this HASH value that calculates preserved with self identifies pairing HASH value consistent, as unanimity, then be proved to be successful, otherwise authentication failed.
Preferably, the process that is identified for the encryption and decryption key of encryption and decryption data between described the 3rd safety chip and second safety chip and preserves may further comprise the steps: the 3rd safety chip sends to second safety chip with the public signature key of self, second safety chip self generates and preserves the encryption and decryption key, afterwards, using the public signature key of the 3rd safety chip encrypts the encryption and decryption key that self generates, and the encryption and decryption key after will encrypting sends to the 3rd safety chip, the 3rd safety chip is used the decrypts information of signature private key to receiving of self, obtains and preserve the encryption and decryption key identical with second safety chip.
Preferably, the process that is identified for the encryption and decryption key of encryption and decryption data between described the 3rd safety chip and second safety chip and preserves may further comprise the steps: the 3rd safety chip self generates and preserves the encryption and decryption key, afterwards, using the public signature key of second safety chip encrypts the encryption and decryption key that self generates, encryption and decryption key after encrypting is sent to the second peace chip, the private key that second safety chip is used self is decrypted the information that receives, and obtains and preserve the encryption and decryption key.
Preferably, described encryption and decryption key is symmetric key or public private key pair.
Preferably, the method that described the 3rd safety chip obtains the encryption and decryption key identical with second safety chip is: preserve the encryption and decryption key of sharing with second safety chip in the 3rd safety chip in advance, and use the interface identifier of this encryption and decryption key time institute corresponding interface and the corresponding relation of this encryption and decryption key; The 3rd safety chip according to the corresponding relation of preserving this interface identifier encryption and decryption key pairing with it, obtains described encryption and decryption key after gathering the data and the employed interface of definite these data of transmission to output unit to be transmitted.
Preferably, described output unit includes but not limited to the video card sound card.
Preferably, this method further comprises: after the 3rd safety chip carries out credible authentication failed to second safety chip, whether the 3rd safety chip gives second safety chip with this data transmission that collects according to configuration determination in advance, if, then directly send the data that collect to second safety chip, send the information that receives to output unit by this second safety chip, otherwise refusal sends the data that collect to second safety chip, and there is potential safety hazard in the employed output unit of prompting user.
The invention provides a kind of method of setting up credible input channel, its key is to be transferred to the safety chip in the mainboard after the data encryption that the safety chip in the input media will be to be exported again, application again after the safety chip in the mainboard is deciphered it.The present invention also provides a kind of method of setting up credible output channel, its key is, safety chip in the mainboard will wait to send to the safety chip that sends to again after the data encryption of output unit in the output unit, the corresponding data of output again after the safety chip deciphering in the output unit.Use method of the present invention, avoided input and/or output information to be monitored, guaranteed the safety of IO channel, make the data of input and output safer, thereby guaranteed the safety of user profile.
Description of drawings
Figure 1 shows that the safety chip architectural schematic that TCG requires;
Figure 2 shows that the safety chip of prior art and the synoptic diagram between the mainboard;
Figure 3 shows that the schematic flow sheet of setting up input channel of using one embodiment of the invention;
Figure 4 shows that the schematic flow sheet of setting up output channel of using one embodiment of the invention;
Figure 5 shows that the structural representation of first and second safety chips of the present invention;
Figure 6 shows that the structural representation of the 3rd safety chip of the present invention;
Figure 7 shows that the synoptic diagram between Fig. 6 safety chip and the mainboard.
Embodiment
Below in conjunction with accompanying drawing the present invention is done detailed description further again.
Messaging device of the present invention includes but not limited to PC (PC), notebook computer, palm PC, mobile phone etc.Be that example specifies the method that messaging device is set up credible input-output channels below with the computing machine.
Figure 3 shows that the schematic flow sheet of setting up credible input channel of an embodiment.In the present embodiment, set in advance in the mouse of computing machine and be useful on first safety chip that guarantees input message safety, in the mainboard of computing machine, set in advance and be useful on the 3rd safety chip that guarantees input/output information safety and computing machine overall operation Environmental security.
Step 301, the 3rd safety chip carries out the credibility checking to first safety chip, if be proved to be successful, then execution in step 302, if checking is unsuccessful, then execution in step 306.
The 3rd safety chip to the method that first safety chip carries out credible checking is:
The 3rd safety chip obtains the unique identification of first safety chip, judge whether self obtains this sign for the first time, if, then calculate and preserve Hash (HASH) value of this sign, and this sign and the corresponding relation of using the HASH value that this sign calculated, and think that this first safety chip is believable;
If the 3rd safety chip obtains the unique identification of first safety chip non-first time, then calculate the HASH value of this sign, judge then the HASH value that this calculates and self preserved this whether identify pairing HASH value in full accord, as unanimity, then be proved to be successful, otherwise authentication failed.
Step 302 is identified for the encryption and decryption key and the preservation of encryption and decryption data between the 3rd safety chip and first safety chip.
The process of determining the encryption and decryption key between the 3rd safety chip and first safety chip has multiple implementation method, below is that example describes with two kinds of implementation methods only:
A kind ofly be, the 3rd safety chip sends to first safety chip with the public signature key of self, first safety chip self generates and preserves the encryption and decryption key, afterwards, using the public signature key of the 3rd safety chip encrypts the encryption and decryption key that self generates, and the encryption and decryption key after will encrypting sends to the 3rd safety chip, and the 3rd safety chip is used the decrypts information of signature private key to receiving of self, obtains and preserve the encryption and decryption key identical with first safety chip.
Another kind is, the 3rd safety chip self generates and preserves the encryption and decryption key, afterwards, using the public signature key of first safety chip encrypts the encryption and decryption key that self generates, encryption and decryption key after encrypting is sent to the first peace chip, the private key that first safety chip is used self is decrypted the encryption key that receives, and obtains and preserve the encryption and decryption key.
Above-mentioned encryption and decryption key can be a symmetric key, also can be public private key pair.
Certainly, the method of determining the encryption and decryption key between the 3rd safety chip and first safety chip is not limited to above two kinds, as long as guarantee can obtain shared encryption and decryption key between the 3rd safety chip and first safety chip, the present invention does not limit concrete acquisition methods.
First safety chip is directly preserved the encryption and decryption key that is obtained and is got final product, the 3rd safety chip not only needs to preserve the encryption and decryption key that this and first safety chip are shared, also to preserve the interface identifier that obtains this encryption and decryption key time institute application interface and the corresponding relation of this encryption and decryption key, like this, as long as after the 3rd safety chip obtains data from this interface, according to the corresponding relation of being preserved, can directly obtain the encryption and decryption key of sharing with first safety chip.
So far, the 3rd safety chip in the mainboard has been finished the foundation of input channel trust chain.
Step 303, first safety chip are gathered mouse data to be exported, and use described encryption and decryption key and send to the 3rd safety chip after to the data encryption that collects.
Step 304, the 3rd safety chip is according to the interface that receives data, and the corresponding relation of having preserved this interface identifier encryption and decryption key pairing with it, from self obtaining the encryption and decryption key identical with first safety chip, use this encryption and decryption key, the ciphered data that receives is decrypted, sends the data after the deciphering in the computing machine South Bridge chip, carry out subsequent treatment by South Bridge chip.
Step 305, the 3rd safety chip judges whether to receive the pass machine information, if, then finish, otherwise, repeated execution of steps 303.
Step 306, first safety chip is gathered mouse data to be exported, and the data that collected are directly sent to the 3rd safety chip.
Step 307, whether the 3rd safety chip handles the unencrypted data that this receives according to configuration determination in advance, if then execution in step 308, otherwise execution in step 309.
Step 308 directly sends the data that receive in the computing machine South Bridge chip, carries out subsequent treatment by South Bridge chip, and execution in step 310 then.
Step 309, refusal is handled the data that receive, and there is potential safety hazard in the employed mouse of prompting user, end.
Step 310, the 3rd safety chip judges whether to receive the pass machine information, if, then finish, otherwise, repeated execution of steps 306.
The above only is an embodiment, and input media includes but not limited to mouse, keyboard etc. in actual applications.
Figure 4 shows that the schematic flow sheet of setting up credible output channel of an embodiment.In the present embodiment, set in advance in the video card of computing machine and be useful on second safety chip that guarantees input message safety, in the mainboard of computing machine, set in advance and be useful on the 3rd safety chip that guarantees input/output information safety and computing machine overall operation Environmental security.
Step 401, the 3rd safety chip carries out the credibility checking to second safety chip, if be proved to be successful, then execution in step 402, if authentication failed, then execution in step 406.
The 3rd safety chip to the method that second safety chip carries out credible checking is:
The 3rd safety chip obtains the unique identification of second safety chip, judge whether self obtains this sign for the first time, if, then calculate and preserve Hash (HASH) value of this sign, and this sign and the corresponding relation of using the HASH value that this sign calculated, and think that this second safety chip is believable;
If the 3rd safety chip obtains the unique identification of second safety chip non-first time, then calculate the HASH value of this sign, judge then the HASH value that this calculates and self preserved this whether identify pairing HASH value in full accord, as unanimity, then be proved to be successful, otherwise authentication failed.
Step 402 is identified for the encryption and decryption key and the preservation of encryption and decryption data between the 3rd safety chip and second safety chip.
The process of determining the encryption and decryption key between the 3rd safety chip and second safety chip has multiple implementation method, below is that example describes with two kinds of implementation methods only:
A kind ofly be, the 3rd safety chip sends to second safety chip with the public signature key of self, second safety chip self generates and preserves the encryption and decryption key, afterwards, using the public signature key of the 3rd safety chip encrypts the encryption and decryption key that self generates, and the encryption and decryption key after will encrypting sends to the 3rd safety chip, and the 3rd safety chip is used the decrypts information of signature private key to receiving of self, obtains and preserve the encryption and decryption key identical with second safety chip.
Another kind is, the 3rd safety chip self generates and preserves the encryption and decryption key, afterwards, using the public signature key of second safety chip encrypts the encryption and decryption key that self generates, encryption and decryption key after encrypting is sent to the second peace chip, the private key that second safety chip is used self is decrypted the encryption key that receives, and obtains and preserve the encryption and decryption key.
Above-mentioned encryption and decryption key can be a symmetric key, also can be public private key pair.
Certainly, the method of determining the encryption and decryption key between the 3rd safety chip and second safety chip is not limited to above two kinds, as long as guarantee can obtain shared encryption and decryption key between the 3rd safety chip and second safety chip, the present invention does not limit concrete acquisition methods.
Second safety chip is directly preserved the encryption and decryption key that is obtained and is got final product, the 3rd safety chip not only needs to preserve the encryption and decryption key of sharing with second safety chip, also to preserve the interface identifier of using the interface that data transmit after this secret key encryption and the corresponding relation of this encryption and decryption key, like this, as long as the 3rd safety chip determines which interface is the data that receive will send to, according to the interface identifier of this interface and the corresponding relation of described preservation, can directly obtain the encryption and decryption key of sharing with second safety chip.
So far, the 3rd safety chip in the mainboard has been finished the foundation of output channel trust chain.
Step 403, after the 3rd safety chip is gathered the data and the employed interface of definite these data of transmission to video card to be transmitted, according to the corresponding relation of preserving this interface identifier encryption and decryption key pairing with it, obtain the encryption and decryption key identical, use described encryption and decryption key and send to second safety chip after to the data encryption that collects with second safety chip.
Step 404, second safety chip adopts the encryption and decryption key identical with the 3rd safety chip, and the ciphered data that receives is decrypted, and sends the data after the deciphering to video card and exports.
Step 405, the 3rd safety chip judges whether to receive the pass machine information, if, then finish, otherwise, repeated execution of steps 403.
Step 406, the 3rd safety chip are gathered data of giving output unit to be transmitted.
Step 407, whether the 3rd safety chip gives video card with this data transmission that collects according to self configuration determination in advance, if then execution in step 408, otherwise execution in step 409.
Step 408 directly sends the data that receive to video card, continues subsequent treatment by video card, and execution in step 410 then.
Step 409, refusal is given video card with the data transmission that is collected, and there is potential safety hazard in the employed video card of prompting user, end.
Step 410, the 3rd safety chip judges whether to receive the pass machine information, if, then finish, otherwise, repeated execution of steps 406.
The above only is an embodiment, and output unit includes but not limited to video card, sound card etc. in actual applications.
The above-mentioned method of setting up credible input-output channels can be used separately, also can use together.If only use a kind ofly, can guarantee to input or output the safety of passage, if two kinds of methods are used simultaneously, can not only guarantee the safety of input channel but also guarantee the safety of output channel.
Figure 5 shows that of the present invention first or the structural representation of second safety chip.Comprise processor module 101, encryption and decryption module 102 in this safety chip, memory module 103, power supply detection module 105 and safe input/output module 506, and the bus of described all modules by safety chip inside interconnects.Wherein, described processor module 101, as MCU, control safe input/output module 506 and send the data that receive to encryption and decryption module 102, perhaps, control encryption and decryption module 102 is carried out the encryption and decryption computing, and control encryption and decryption module 102 is transferred to safe input/output module 506 with operation result, perhaps, control store module 103 is preserved the encryption and decryption key that encryption and decryption module 102 is generated; Described safe input/output module 506 is used to receive the input data of external device (ED), under processor module 101 controls, sends the data that receive to encryption and decryption module 102, perhaps, will give external device (ED) from the data transmission of encryption and decryption module 102; Described memory module 103 is used to store the encryption and decryption key; Described encryption and decryption module 102, under the control of processor module 101, in memory module 102, obtain the encryption and decryption key of storage in advance, use the encryption and decryption key data that receive are carried out encryption and decryption, give safe input/output module 506 data transmission after the encryption and decryption; Described power supply detection module 105 is used to detect the power supply to the safety chip power supply.
Encryption and decryption module 102 is made of the SHA/HMAC engine modules that is used to carry out the SHA/HMAC computing, the randomizer that produces random number, RSA processor module and the key production module that is used to carry out the RSA computing.Memory module 103 is made of the volatile memory that is used to preserve the nonvolatile memory of key data, user data and program and is used to preserve ephemeral data and program.
If above-mentioned safety chip is positioned at the input media of messaging device then is first safety chip, if be positioned at the output unit of messaging device then be second safety chip, because first and second safety chip only is used for encryption and decryption data, no longer carry out other operational orders, thereby it is compared with existing safety chip shown in Figure 1, do not have the I/O interface module, all the other are all identical with safety chip shown in Figure 1.
Figure 6 shows that the structural representation of the 3rd safety chip of the present invention.This safety chip comprises processor module 101, encryption and decryption module 102, memory module 103, power supply detection module 105 and I/O interface module 104, this safety chip also comprise safe I/O module 606, and described all modules interconnect by the bus of safety chip inside.Wherein, described I/O interface module 104 links to each other with external unit, and I/O interface module 104 is controlled the instruction that receives external units by processor module 101, and the operation result of external demand is returned to external unit; Described processor module 101, as MCU, it is controlled the encryption and decryption module according to the instruction of receiving from I/O interface module 104, or sends instruction execution result to I/O interface module 104 according to the instruction that receives; Perhaps, directly from memory module 103, take out secret information,, send I/O interface module 104 to as key etc.; Described memory module 103 is used to store the encryption and decryption key, described encryption and decryption module 102 is under processor module 101 controls, in memory module 103, obtain the encryption and decryption key of storage in advance, use the encryption and decryption key data that receive are carried out encryption and decryption, give safe I/O module 606 data transmission after the encryption and decryption; Described safe I/O module 606 directly links to each other with the bus of safety chip inside, receives data from external device (ED), under the control of processor module 101, sends the data that receive to encryption and decryption module 102; Perhaps, will send device or the output unit that is used to receive input media output information from the data of encryption and decryption module 102 to.
Above-mentioned safe I/O module 606 is made of safety load module 606a, safe output module 606b and south bridge interface module 606c.Described safe load module 606a receives ciphered data from input media, under the control of processor module 101, sends the ciphered data that receives to encryption and decryption module 102; Described safe output module 606b will be transferred to output unit from the data encrypted of encryption and decryption module 102; Described south bridge interface module 606c receives the unencrypted data from external device (ED), under the control of processor module 101, sends the data that receive to encryption and decryption module 102; Perhaps, will send the device that is used to receive input media output information to from the data decryption of encryption and decryption module 102.
Usually, encryption and decryption module 102 is made of SHA/HMAC engine modules, randomizer, RSA processor module and key production module, described SHA/HMAC engine modules, under the control of processor module 101, be used for the data that receive are carried out the SHA/HMAC computing, send result of calculation to safe output module 606b or south bridge interface module 606c; Described RSA processor module under the control of processor module 101, is used for the data that receive are carried out the RSA computing, sends result of calculation to safe output module 606b or south bridge interface module 606c; Described randomizer under the control of processor module 101, is used to generate random number so that produce random key; Described key production module, the random number of utilizing randomizer to produce generates RSA, the required key of SHA/HMAC algorithm.Memory module 103 is made of the volatile memory that is used to preserve the nonvolatile memory of key data, user data and program and is used to preserve ephemeral data and transient program.
The 3rd safety chip is usually located in the mainboard of messaging device, not only carry out the data encrypting and deciphering operation, also carry out other instruction manipulations relevant with safety chip, thereby it is compared with existing safety chip shown in Figure 1, the all functions that not only have safety chip shown in Figure 1, also increase safe I/O module 606, promptly increased safe load module 606a, safe output module 606b and south bridge interface module 606c.
Figure 7 shows that the synoptic diagram between Fig. 6 safety chip and the mainboard.The CPU 701 of messaging device links to each other with north bridge 702 on the mainboard, north bridge 702 directly links to each other respectively with static memory (SRAM) 704 with south bridge 703, south bridge 703 transmits data with safety chip 706 by special-purpose south bridge interface, can make transfer rate accelerate like this.706 of safety chips directly link to each other with input medias such as mouse-keyboards.In addition, safety chip shown in Figure 7 also can pass through lpc bus, pci bus, usb bus, 1394 buses or GPIO bus and link to each other with main board system, is used for transfer instruction.
The above only is preferred embodiment of the present invention, and is in order to restriction the present invention, within the spirit and principles in the present invention not all, any modification of being done, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (18)

1, a kind of method of setting up credible input channel, in the input media of messaging device, set in advance first safety chip that is used to guarantee input message safety, in the mainboard of messaging device, set in advance the 3rd safety chip that is used to ensure information security, it is characterized in that this method may further comprise the steps:
The 3rd safety chip carries out the credibility checking to first safety chip, after being proved to be successful, is identified for the encryption and decryption key and the preservation of encryption and decryption data between the 3rd safety chip and first safety chip;
First safety chip is gathered input media data to be exported, and uses described encryption and decryption key and sends to the 3rd safety chip after to the data encryption that collects;
The 3rd safety chip obtains the encryption and decryption key identical with first safety chip, using the key that is obtained is decrypted the ciphered data that receives, send the data after the deciphering to be used to receive input media output information in the messaging device device, proceed subsequent treatment by this device.
2, method according to claim 1 is characterized in that, described the 3rd safety chip may further comprise the steps the method that first safety chip carries out credible checking:
The 3rd safety chip obtains the unique identification of first safety chip, judge and self whether for the first time obtain this sign, if then calculate and preserve the cryptographic hash of this sign, and this sign and the corresponding relation of using the HASH value that this sign calculated, and confirm to be proved to be successful;
If the 3rd safety chip obtains the unique identification of first safety chip non-first time, then calculate the HASH value of this sign, whether this that judge that this HASH value that calculates and self preserve in advance identifies pairing HASH value consistent, as unanimity, then be proved to be successful, otherwise authentication failed.
3, method according to claim 1 is characterized in that, is identified for the encryption and decryption key of encryption and decryption data and the process of preservation between described the 3rd safety chip and first safety chip and may further comprise the steps:
The 3rd safety chip sends to first safety chip with the public signature key of self, first safety chip self generates and preserves the encryption and decryption key, afterwards, using the public signature key of the 3rd safety chip encrypts the encryption and decryption key that self generates, and the encryption and decryption key after will encrypting sends to the 3rd safety chip, the 3rd safety chip is used the decrypts information of signature private key to receiving of self, obtains and preserve the encryption and decryption key identical with first safety chip.
4, method according to claim 1 is characterized in that, is identified for the encryption and decryption key of encryption and decryption data and the process of preservation between described the 3rd safety chip and first safety chip and may further comprise the steps:
The 3rd safety chip self generates and preserves the encryption and decryption key, afterwards, using the public signature key of first safety chip encrypts the encryption and decryption key that self generates, encryption and decryption key after encrypting is sent to the first peace chip, the private key that first safety chip is used self is decrypted the encryption key that receives, and obtains and preserve the encryption and decryption key.
According to claim 3 or 4 described methods, it is characterized in that 5, described encryption and decryption key is symmetric key or public private key pair.
6, method according to claim 1 is characterized in that, the method that described the 3rd safety chip obtains the encryption and decryption key identical with first safety chip is:
Preserve the encryption and decryption key of sharing with first safety chip in the 3rd safety chip in advance, and use the interface identifier of this encryption and decryption key time institute corresponding interface and the corresponding relation of this encryption and decryption key;
After the 3rd safety chip receives ciphered data, according to the interface that receives data, and the corresponding relation of this interface identifier encryption and decryption key pairing with it of having preserved, from self obtaining the encryption and decryption key identical with first safety chip.
7, method according to claim 1 is characterized in that, described input media includes but not limited to mouse-keyboard.
8, method according to claim 1, it is characterized in that, this method further comprises: after the 3rd safety chip carries out credible authentication failed to first safety chip, first safety chip is gathered input media data to be exported, and the data that collected are directly sent to the 3rd safety chip;
Whether the 3rd safety chip handles the data that this receives according to configuration determination in advance, if, then directly send the data that receive to be used to receive input media output information device, proceed subsequent treatment by this device, otherwise refusal is handled, and there is potential safety hazard in the employed input media of prompting user.
9, according to claim 1 or 8 described methods, it is characterized in that this method further comprises: in the output unit of messaging device, be provided for guaranteeing second safety chip of output information safety,
The 3rd safety chip carries out the credibility checking to second safety chip, after being proved to be successful, is identified for the encryption and decryption key and the preservation of encryption and decryption data between the 3rd safety chip and second safety chip;
The 3rd safety chip is gathered data of giving output unit to be transmitted, obtains and uses described encryption and decryption key and send to second safety chip after to the data encryption that collects;
Second safety chip adopts the encryption and decryption key identical with the 3rd safety chip, and the ciphered data that receives is decrypted, and sends the data after the deciphering to output unit and exports.
10, method according to claim 9, it is characterized in that, this method further comprises: the 3rd safety chip carries out the credibility checking to second safety chip, after the authentication failed, whether the 3rd safety chip gives second safety chip with this data transmission that collects according to configuration determination in advance, if, then directly send the data that collect to second safety chip, send the information that receives to output unit by this second safety chip, otherwise refusal sends the data that collect to second safety chip, and there is potential safety hazard in the employed output unit of prompting user.
11, a kind of method of setting up credible output channel, in the output unit of messaging device, set in advance second safety chip that is used to guarantee output information safety, in the mainboard of messaging device, set in advance the 3rd safety chip that is used to ensure information security, it is characterized in that this method may further comprise the steps:
The 3rd safety chip carries out the credibility checking to second safety chip, after being proved to be successful, is identified for the encryption and decryption key and the preservation of encryption and decryption data between the 3rd safety chip and second safety chip;
The 3rd safety chip is gathered data of giving output unit to be transmitted, obtains and uses described encryption and decryption key and send to second safety chip after to the data encryption that collects;
Second safety chip adopts the encryption and decryption key identical with the 3rd safety chip, and the ciphered data that receives is decrypted, and sends the data after the deciphering to output unit and exports.
12, method according to claim 11 is characterized in that, described the 3rd safety chip may further comprise the steps the method that second safety chip carries out credible checking:
The 3rd safety chip obtains the unique identification of second safety chip, judge and self whether for the first time obtain this sign, if then calculate and preserve the cryptographic hash of this sign, and this sign and the corresponding relation of using the HASH value that this sign calculated, and confirm to be proved to be successful;
If the 3rd safety chip obtains the unique identification of second safety chip non-first time, then calculate the HASH value of this sign, whether this that judge that this HASH value that calculates preserved with self identifies pairing HASH value consistent, as unanimity, then be proved to be successful, otherwise authentication failed.
13, method according to claim 11 is characterized in that, is identified for the encryption and decryption key of encryption and decryption data and the process of preservation between described the 3rd safety chip and second safety chip and may further comprise the steps:
The 3rd safety chip sends to second safety chip with the public signature key of self, second safety chip self generates and preserves the encryption and decryption key, afterwards, using the public signature key of the 3rd safety chip encrypts the encryption and decryption key that self generates, and the encryption and decryption key after will encrypting sends to the 3rd safety chip, the 3rd safety chip is used the decrypts information of signature private key to receiving of self, obtains and preserve the encryption and decryption key identical with second safety chip.
14, method according to claim 11 is characterized in that, is identified for the encryption and decryption key of encryption and decryption data and the process of preservation between described the 3rd safety chip and second safety chip and may further comprise the steps:
The 3rd safety chip self generates and preserves the encryption and decryption key, afterwards, using the public signature key of second safety chip encrypts the encryption and decryption key that self generates, encryption and decryption key after encrypting is sent to the second peace chip, the private key that second safety chip is used self is decrypted the information that receives, and obtains and preserve the encryption and decryption key.
According to claim 13 or 14 described methods, it is characterized in that 15, described encryption and decryption key is symmetric key or public private key pair.
16, method according to claim 11 is characterized in that, the method that described the 3rd safety chip obtains the encryption and decryption key identical with second safety chip is:
Preserve the encryption and decryption key of sharing with second safety chip in the 3rd safety chip in advance, and use the interface identifier of this encryption and decryption key time institute corresponding interface and the corresponding relation of this encryption and decryption key;
The 3rd safety chip according to the corresponding relation of preserving this interface identifier encryption and decryption key pairing with it, obtains described encryption and decryption key after gathering the data and the employed interface of definite these data of transmission to output unit to be transmitted.
17, method according to claim 11 is characterized in that, described output unit includes but not limited to the video card sound card.
18, method according to claim 11, it is characterized in that, this method further comprises: after the 3rd safety chip carries out credible authentication failed to second safety chip, whether the 3rd safety chip gives second safety chip with this data transmission that collects according to configuration determination in advance, if, then directly send the data that collect to second safety chip, send the information that receives to output unit by this second safety chip, otherwise refusal sends the data that collect to second safety chip, and there is potential safety hazard in the employed output unit of prompting user.
CNB2005100561670A 2005-03-23 2005-03-23 Method for establishing credible input-output channels Active CN100334519C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100561670A CN100334519C (en) 2005-03-23 2005-03-23 Method for establishing credible input-output channels

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100561670A CN100334519C (en) 2005-03-23 2005-03-23 Method for establishing credible input-output channels

Publications (2)

Publication Number Publication Date
CN1702592A true CN1702592A (en) 2005-11-30
CN100334519C CN100334519C (en) 2007-08-29

Family

ID=35632367

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100561670A Active CN100334519C (en) 2005-03-23 2005-03-23 Method for establishing credible input-output channels

Country Status (1)

Country Link
CN (1) CN100334519C (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100464337C (en) * 2006-09-05 2009-02-25 北京飞天诚信科技有限公司 Method and equipment for carrying out safety communication between USB device and host
CN101924741A (en) * 2009-06-16 2010-12-22 王莉 Reliable information input method and electronic device
CN101980235A (en) * 2010-10-27 2011-02-23 中国航天科工集团第二研究院七○六所 Safe computing platform
CN101523401B (en) * 2006-07-28 2013-03-06 惠普开发有限公司 Secure use of user secrets on a computing platform
CN101996285B (en) * 2009-08-26 2013-10-02 联想(北京)有限公司 Electronic equipment
CN103971057A (en) * 2014-04-17 2014-08-06 兴唐通信科技有限公司 Implement method and system of trusted path of mobile communication intelligent terminal
CN105095736A (en) * 2014-05-09 2015-11-25 联想(新加坡)私人有限公司 Data transfer based on input device identifying information
CN106155563A (en) * 2015-03-30 2016-11-23 浙江大华技术股份有限公司 A kind of disk access control method and device

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AUPM350794A0 (en) * 1994-01-25 1994-02-17 Dynamic Data Systems Pty Ltd Funds transaction device
JP4097718B2 (en) * 1995-11-24 2008-06-11 松下電器産業株式会社 Information capture device
US6986052B1 (en) * 2000-06-30 2006-01-10 Intel Corporation Method and apparatus for secure execution using a secure memory partition
JP2003244128A (en) * 2002-02-21 2003-08-29 Hitachi Ltd Semiconductor for encryption decoding communication and recording/reproducing apparatus
JP2005051558A (en) * 2003-07-29 2005-02-24 Matsushita Electric Ind Co Ltd Transmission device, reception device, and transmission/reception system
GB2404486A (en) * 2003-07-31 2005-02-02 Sony Uk Ltd Access control for digital storage medium content

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101523401B (en) * 2006-07-28 2013-03-06 惠普开发有限公司 Secure use of user secrets on a computing platform
CN100464337C (en) * 2006-09-05 2009-02-25 北京飞天诚信科技有限公司 Method and equipment for carrying out safety communication between USB device and host
CN101924741A (en) * 2009-06-16 2010-12-22 王莉 Reliable information input method and electronic device
CN101996285B (en) * 2009-08-26 2013-10-02 联想(北京)有限公司 Electronic equipment
CN101980235A (en) * 2010-10-27 2011-02-23 中国航天科工集团第二研究院七○六所 Safe computing platform
CN101980235B (en) * 2010-10-27 2012-04-18 中国航天科工集团第二研究院七○六所 Safe computing platform
CN103971057A (en) * 2014-04-17 2014-08-06 兴唐通信科技有限公司 Implement method and system of trusted path of mobile communication intelligent terminal
CN103971057B (en) * 2014-04-17 2017-12-19 兴唐通信科技有限公司 A kind of trusted path realization method and system of mobile communication intelligent terminal
CN105095736A (en) * 2014-05-09 2015-11-25 联想(新加坡)私人有限公司 Data transfer based on input device identifying information
CN105095736B (en) * 2014-05-09 2018-03-02 联想(新加坡)私人有限公司 Data transmission based on input unit identification information
US10339342B2 (en) 2014-05-09 2019-07-02 Lenovo (Singapore) Pte. Ltd. Data transfer based on input device identifying information
CN106155563A (en) * 2015-03-30 2016-11-23 浙江大华技术股份有限公司 A kind of disk access control method and device

Also Published As

Publication number Publication date
CN100334519C (en) 2007-08-29

Similar Documents

Publication Publication Date Title
CN1331017C (en) Safety chip
CN1553349A (en) Safety chip and information safety processor and processing method
CN1288527C (en) Computer security control module and safeguard control method thereof
CN1702592A (en) Method for establishing credible input-output channels
CN1949765A (en) Method and system for obtaining SSH host computer public key of device being managed
CN101039186A (en) Method for auditing safely system log
CN1897006A (en) Method, apparatus for establishing virtual endorsement
CN103051455B (en) The implementation method of the credible password module cryptographic function devolution under a kind of cloud computing environment
CN1703004A (en) Method for implementing network access authentication
CN101064595A (en) Computer network safe input authentication system and method
CN1918556A (en) Computer security apparatus and method using security input device driver
CN1677922A (en) System and method for securing executable code
CN101064604A (en) Remote access process, system and equipment
CN1689268A (en) Encrypted data reception device and decryption key updating method
CN101593254A (en) A kind of notebook computer secured inputting method and system
CN104866784B (en) A kind of safe hard disk, data encryption and decryption method based on BIOS encryptions
CN101034991A (en) Secure guiding system, method, code signature construction method and authentication method
US20120324238A1 (en) Information processing apparatus, verification method, and storage medium storing verification program
CN1703014A (en) A method for monitoring apparatus being managed
CN101043326A (en) Dynamic information encrypting system and method
CN101075876A (en) Physical certifying method and device
CN1949235A (en) Tax controlling equipment software edition intelligent upgrade encryption identification method
CN1991800A (en) Fingerprint identification storage device and fingerprint identification method
CN101034986A (en) Method and system for securely using the intelligent secrete key device
CN1916925A (en) Method and equipment for carrying out safety communication between USB device and host

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant