CN202362788U - Dependable computing device with USB (Universal Serial Bus) interfaces - Google Patents

Dependable computing device with USB (Universal Serial Bus) interfaces Download PDF

Info

Publication number
CN202362788U
CN202362788U CN2011204640634U CN201120464063U CN202362788U CN 202362788 U CN202362788 U CN 202362788U CN 2011204640634 U CN2011204640634 U CN 2011204640634U CN 201120464063 U CN201120464063 U CN 201120464063U CN 202362788 U CN202362788 U CN 202362788U
Authority
CN
China
Prior art keywords
module
trusted computing
fingerprint
microprocessor
computing device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CN2011204640634U
Other languages
Chinese (zh)
Inventor
王正鹏
艾俊
付月朋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nationz Technologies Inc
Original Assignee
Nationz Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nationz Technologies Inc filed Critical Nationz Technologies Inc
Priority to CN2011204640634U priority Critical patent/CN202362788U/en
Application granted granted Critical
Publication of CN202362788U publication Critical patent/CN202362788U/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Abstract

The utility model relates to a dependable computing device with USB (Universal Serial Bus) interfaces, which comprises USB interfaces, an interface conversion circuit connected with the USB interfaces, a fingerprint module, a microprocessor, a dependable computing module and a 2.4G wireless network communication module, wherein the fingerprint module, the microprocessor, the dependable computing module and the 2.4G wireless network communication module are connected with the interface conversion circuit; the interface conversion circuit module is used for converting an interface of the dependable computing module and an interface of the fingerprint module into USB interfaces; the fingerprint module is used for inputting fingerprints and transmitting the fingerprints to the dependable computing module to be stored; the dependable computing module comprises a plurality of dependable computing chips and is used for providing the dependable quantity, dependable storage and dependable report required by dependable computing; the microprocessor is used for verifying the correctness of the fingerprints input through the fingerprint module; the storage module is connected with the microprocessor and is used for storing the encrypted data of the dependable computing module when a storage space of the dependable computing module is insufficient; and the 2.4G wireless network communication module is used for carrying out wireless communication with the outside equipment under the control of the microprocessor.

Description

A kind of Trusted Computing device with USB interface
Technical field
The utility model relates to computer security and Trusted Computing field, particularly, relates in particular to a kind of Trusted Computing device with USB interface.
Background technology
Developed member 190 families at present by Compaq, HP, IBM, Intel and the Microsoft TCPA (Trusted Computing Platform Alliance) that takes the lead in 1999, each continent leading vendor spreads all over the world.TCPA is absorbed in from its security of computing platform architecture enhancing, and has issued the credible calculating platform standard criterion January calendar year 2001.In March, 2003, TCPA was reorganized as TCG (Trusted Computing Group), its objective is in calculating and communication system, to be widely used based on the credible calculating platform under the hardware security module support, to improve whole security.The TCG tissue has been issued the standard of TPM (Trusted Platform Moude), and has produced the TPM chip.
Also there are unique research and achievement in China aspect Trusted Computing, issued the credible password module scheme, and produced the TCM chip that is used for Trusted Computing according to this scheme.Each PC manufacturer and embedded device manufacturer are all using or are promoting the Trusted Computing chip energetically at present.Particularly along with the popularization of cloud computing, how to let the safety of the resource of oneself on the users to trust cloud and credible, promoted the development of Trusted Computing more.
But need increase corresponding production cost owing to increase the Trusted Computing chip on computers, be not that all computing machines all have the Trusted Computing chip at present on the market.The computing machine of existing Trusted Computing framework because safety chip will be set, generally will adopt the mainboard of particular architectures, integrated security chip above that, or safety chip is installed through special interface is set, thus form computing machine with Trusted Computing function.And common computing machine is not provided with safety chip owing on the mainboard, or does not have the interface that safety chip is installed, thereby causes realizing Trusted Computing, thereby causes common computing machine can't utilize reliable computing technology to improve the security in the use.
The utility model content
The utility model is to solve the problems of the technologies described above a kind of Trusted Computing device with USB interface is provided.
The technical scheme that the utility model solves the problems of the technologies described above is following: a kind of Trusted Computing device with USB interface; Comprise USB interface; The interface conversion circuit that is connected with said USB interface; And the fingerprint module that is connected with said interface conversion circuit respectively, microprocessor, creditable calculation modules and 2.4G wireless network communication module
Said interface conversion circuit module is used for all converting the interface of creditable calculation modules and the interface of fingerprint module into USB interface;
Said fingerprint module is used to import fingerprint, and transmits it to said creditable calculation modules preservation;
Said creditable calculation modules comprises the Trusted Computing chip, is used to the credible tolerance, trusted storage and the credible report that provide Trusted Computing required;
Said microprocessor is used to verify the correctness through the fingerprint of said fingerprint module input;
Said 2.4G wireless network communication module is used under the control of said microprocessor, carrying out wireless telecommunications with external device.
Further, also comprise the memory module that is connected with said microprocessor, when said creditable calculation modules memory space inadequate, be used to store said creditable calculation modules data encrypted.
Further, said Trusted Computing chip comprises TCM, TPM and/or TPCM.
Further, also comprise and be used to the chargeable battery that said 2.4G wireless network communication module provides power supply.
Further, said microprocessor adopts asic chip, CPLD chip or fpga chip
Further, said memory module adopts nonvolatile memory.
The beneficial effect of the utility model is: through the hardware designs of the utility model; Can Trusted Computing be applied on the computing machine that is not equipped with the Trusted Computing chip on those mainboards easily; As Windows Vista BitLocker function once needs Trusted Computing chip TPM and supports to realize real BitLocker; For there not being TPM then can only simulate realization on the mainboard,, can directly call real Trusted Computing chip through the Trusted Computing device of the utility model; And related data stored in the Trusted Computing chip, solve the ease of use issues of Trusted Computing chip;
The utility model adopts USB interface, modular design, thereby than being easier to general use on current computer market; Fingerprint authentication has increased the security of Trusted Computing; Can also carry out communication through 2.4G wireless network communication module and external unit, easy to use.
Description of drawings
Fig. 1 is the utility model structured flowchart.
Embodiment
Below in conjunction with accompanying drawing the principle and the characteristic of the utility model are described, institute gives an actual example and only is used to explain the utility model, is not the scope that is used to limit the utility model.
As shown in Figure 1; A kind of Trusted Computing device with USB interface comprises USB interface, the interface conversion circuit that is connected with said USB interface; And the fingerprint module that is connected with said interface conversion circuit, microprocessor, creditable calculation modules and 2.4G wireless network communication module
Said interface conversion circuit module is used for all converting the interface of creditable calculation modules and the interface of fingerprint module into USB interface;
Said fingerprint module is used to import fingerprint, and transmits it to said creditable calculation modules preservation;
Fingerprint module is combined with creditable calculation modules, and creditable calculation modules stored fingerprint template when the user uses this USB module, needs the checking fingerprint, could use creditable calculation modules then, increases the security that Trusted Computing is used.
Said creditable calculation modules; Comprise multiple Trusted Computing chip; Said Trusted Computing chip comprises TCM (Trusted Cryptography Module; Credible password module), (the TPM safety chip is meant the safety chip that meets TPM (Trusted Platform Module, reliable platform module) standard to TPM; It can be protected PC effectively, prevent that the disabled user from visiting) and/or TPCM (creditable calculation modules), be used to the credible tolerance, trusted storage and the credible report that provide Trusted Computing required;
Said microprocessor is used to verify the correctness through the fingerprint of said fingerprint module input; Said microprocessor adopts ASIC (Application Specific Integrated Circuit; Application-specific IC) chip, CPLD (Complex Programmable Logic Device; CPLD) chip or FPGA (Field-Programmable Gate Array; Field programmable gate array) chip, microprocessor is responsible for driving whole Trusted Computing device after the USB power supply, and whether the input of checking fingerprint module is consistent with expected result.
Said memory module adopts nonvolatile memory, is connected with said microprocessor, when said creditable calculation modules memory space inadequate, is used to store said creditable calculation modules data encrypted; Memory module has also been stored USB driving, creditable calculation modules driving, fingerprint module driving and other drivings and application program.
Said 2.4G wireless network communication module is used under the control of said microprocessor, carrying out wireless telecommunications with external device.
When this Trusted Computing device during near computing machine, computing machine can detect the Trusted Computing device automatically according to the 2.4G communication module, and reads the data in the creditable calculation modules for easy to use.2.4G the wireless network frequency range belongs to ISM band, it is the ultralow radiation environmental protection frequency range that is widely used in the global range; 2.4GHz the wireless signal transmitting-receiving is not blocked by foreign object, does not receive the restriction of orientation or angle, it is quick, accurate, reliable that signal receives.
Also comprise being used to the chargeable battery that said 2.4G wireless network communication module provides power supply, when USB links, charge the battery automatically.
When using the utility model Trusted Computing device, the fingerprint that needs checking user input whether with the creditable calculation modules safety zone in fingerprint whether consistent, thereby reach the purpose of identity verification.
In the trusted storage of creditable calculation modules, this fingerprint is as the sign of identification user identity with the fingerprint of recording user for this Trusted Computing device when first the use.Subsequent user need be imported user's fingerprint when using this Trusted Computing device; The checking of this fingerprint is undertaken by the microprocessor that carries on the USB, need not the intervention of main frame; That is to say can be in the early stage checking of promptly accomplishing identity of computer starting.
It is higher that the user identity fingerprint storage is stored in the security of generic storage zone in creditable calculation modules trusted storage zone than other.
For simple data or information transmission; Adopt built-in 2.4G wireless network communication module in the Trusted Computing device; When this Trusted Computing device during near computing machine; Computing machine can detect the Trusted Computing device automatically according to 2.4G wireless network communication module, and according to different application, reads data in the TCM.
For example the user uses the encryption and decryption functions that TCM provides if desired, and the user can be with the key of sensitivity, and data such as password are saved in the Trusted Computing device, with anti-lost;
A kind of application that can expect is; The user edits various passwords; Encryption is stored in (storage chip can be done greatlyyer) in the storage chip, and be arranged on the particular machines the specific App password of cooperation and could decipher, and (is storing the user sensitive information (account number of having encrypted in the USB flash disk; Password); This USB flash disk is only in particular machine (machine driven corresponding with this USB flash disk like band TCM), and cooperates specific decryption application (App), could realize that the USB flash disk sensitive data deciphers) we just do not worry forgetting and losing password miscellaneous like this.Because the Trusted Computing device needs fingerprint and could use, even so the Trusted Computing device lose also and can not divulge a secret because there is not fingerprint; Even fingerprint is also revealed, also need cooperate the certain applications program to decipher with particular machines.
The process of fingerprint initialization and checking is following:
Initialization procedure
1, insert computer system through USB interface, module initialization, the microprocessor self-operating also loads various drivings
2, the user is through fingerprint reader (being fingerprint module) input user fingerprints
3, with the NV zone (trusted storage zone) of fingerprint recording at the Trusted Computing chip
Proof procedure
1, insert computer system through USB interface, module initialization, the microprocessor self-operating also loads various drivings
2, the user can be needed the input fingerprint through abnormal prompt (as interrupting) prompting by the microprocessor refusal when not importing fingerprint giving access the utility model Trusted Computing device
3, the user is through fingerprint reader (fingerprint module) input user fingerprints
4, microprocessor reads the fingerprint of storing in the Trusted Computing chip through interface conversion circuit, and comparison
5, if the fingerprint of input reaches 3 times with the number of times that the fingerprint of Trusted Computing chip-stored does not conform to, refusal provides any service
6, if the fingerprint of input conforms to the fingerprint of Trusted Computing chip-stored, computing machine is communicated with the interface of creditable calculation modules and fingerprint module etc. through USB interface, makes the Trusted Computing chip to be accessed to.
The simple data that is stored in the creditable calculation modules can be sent through the 2.4G module.Like built-in personal information, be used on and off dutyly checking card automatically, gate inhibitions etc. only need carry this Trusted Computing device, near getting final product with the corresponding 2.4G card reader of 2.4G wireless network communication module.
The above is merely the preferred embodiment of the utility model, and is in order to restriction the utility model, not all within the spirit and principle of the utility model, any modification of being done, is equal to replacement, improvement etc., all should be included within the protection domain of the utility model.

Claims (6)

1. Trusted Computing device with USB interface; It is characterized in that: comprise USB interface; The interface conversion circuit that is connected with said USB interface, and the fingerprint module that is connected with said interface conversion circuit respectively, microprocessor, creditable calculation modules and 2.4G wireless network communication module
Said interface conversion circuit module is used for all converting the interface of creditable calculation modules and the interface of fingerprint module into USB interface;
Said fingerprint module is used to import fingerprint, and transmits it to said creditable calculation modules preservation;
Said creditable calculation modules comprises the Trusted Computing chip, is used to the trusted storage that provides Trusted Computing required;
Said microprocessor is used to verify the correctness through the fingerprint of said fingerprint module input;
Said 2.4G wireless network communication module is used under the control of said microprocessor, carrying out wireless telecommunications with external device.
2. a kind of Trusted Computing device according to claim 1 with USB interface; It is characterized in that: also comprise the memory module that is connected with said microprocessor; When said creditable calculation modules memory space inadequate, be used to store said creditable calculation modules data encrypted.
3. a kind of Trusted Computing device with USB interface according to claim 1, it is characterized in that: said Trusted Computing chip comprises TCM, TPM and/or TPCM.
4. a kind of Trusted Computing device with USB interface according to claim 1 is characterized in that: also comprise being used to the chargeable battery that said 2.4G wireless network communication module provides power supply.
5. a kind of Trusted Computing device with USB interface according to claim 1 is characterized in that: said microprocessor adopts asic chip, CPLD chip or fpga chip.
6. a kind of Trusted Computing device with USB interface according to claim 1 is characterized in that: said memory module adopts nonvolatile memory.
CN2011204640634U 2011-11-21 2011-11-21 Dependable computing device with USB (Universal Serial Bus) interfaces Expired - Lifetime CN202362788U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011204640634U CN202362788U (en) 2011-11-21 2011-11-21 Dependable computing device with USB (Universal Serial Bus) interfaces

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011204640634U CN202362788U (en) 2011-11-21 2011-11-21 Dependable computing device with USB (Universal Serial Bus) interfaces

Publications (1)

Publication Number Publication Date
CN202362788U true CN202362788U (en) 2012-08-01

Family

ID=46573959

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011204640634U Expired - Lifetime CN202362788U (en) 2011-11-21 2011-11-21 Dependable computing device with USB (Universal Serial Bus) interfaces

Country Status (1)

Country Link
CN (1) CN202362788U (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103279166A (en) * 2012-10-11 2013-09-04 杭州晟元芯片技术有限公司 Contact type CPU card easy to expand and with USB interface
CN103577741A (en) * 2013-03-13 2014-02-12 深圳市振华微电子有限公司 USB (Universal Serial Bus) peripheral
CN106557700A (en) * 2016-11-24 2017-04-05 苏州国芯科技有限公司 A kind of gauging system and method for trusted computer
CN107483188A (en) * 2017-08-07 2017-12-15 浪潮(北京)电子信息产业有限公司 A kind of key method for secure storing and system
CN110175040A (en) * 2019-05-13 2019-08-27 上海思立微电子科技有限公司 Data processing method, OTA client, electronic equipment and storage medium
CN110309681A (en) * 2019-08-07 2019-10-08 广东电网有限责任公司 A kind of metering automation terminal maintenance device and maintenance system
CN111694782A (en) * 2020-05-23 2020-09-22 苏州浪潮智能科技有限公司 Framework and method for realizing automatic switching of trusted platform module
CN112464291A (en) * 2020-12-17 2021-03-09 杭州电子科技大学 Android intelligent terminal-oriented FPGA-based data decryption and desensitization equipment
CN113783846A (en) * 2021-08-16 2021-12-10 可信计算科技(无锡)有限公司 Trusted data transmission system and method

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103279166A (en) * 2012-10-11 2013-09-04 杭州晟元芯片技术有限公司 Contact type CPU card easy to expand and with USB interface
CN103577741A (en) * 2013-03-13 2014-02-12 深圳市振华微电子有限公司 USB (Universal Serial Bus) peripheral
CN106557700A (en) * 2016-11-24 2017-04-05 苏州国芯科技有限公司 A kind of gauging system and method for trusted computer
CN107483188A (en) * 2017-08-07 2017-12-15 浪潮(北京)电子信息产业有限公司 A kind of key method for secure storing and system
CN110175040A (en) * 2019-05-13 2019-08-27 上海思立微电子科技有限公司 Data processing method, OTA client, electronic equipment and storage medium
CN110309681A (en) * 2019-08-07 2019-10-08 广东电网有限责任公司 A kind of metering automation terminal maintenance device and maintenance system
CN110309681B (en) * 2019-08-07 2023-09-15 广东电网有限责任公司 Metering automation terminal maintenance device and maintenance system
CN111694782A (en) * 2020-05-23 2020-09-22 苏州浪潮智能科技有限公司 Framework and method for realizing automatic switching of trusted platform module
CN111694782B (en) * 2020-05-23 2022-03-04 苏州浪潮智能科技有限公司 Device and method for realizing automatic switching of trusted platform module
CN112464291A (en) * 2020-12-17 2021-03-09 杭州电子科技大学 Android intelligent terminal-oriented FPGA-based data decryption and desensitization equipment
CN113783846A (en) * 2021-08-16 2021-12-10 可信计算科技(无锡)有限公司 Trusted data transmission system and method
CN113783846B (en) * 2021-08-16 2023-09-19 德威可信(北京)科技有限公司 Trusted data transmission system and method

Similar Documents

Publication Publication Date Title
CN202362788U (en) Dependable computing device with USB (Universal Serial Bus) interfaces
CN102946484B (en) A kind of method and system utilizing near-field communication to unlock mobile terminal
CN103150514B (en) A kind of trusted module based on mobile device and trusted service method thereof
CN101881997B (en) Trusted safe mobile storage device
CN101794362A (en) Trusted computation trust root device for computer and computer
CN102567235B (en) Intelligent active anti-virus U disk based on partition authentication and anti-virus method of U disk
CN201054140Y (en) Information security control chip
CN109075815A (en) A kind of system on chip and processing equipment
CN101986597A (en) Identity authentication system with biological characteristic recognition function and authentication method thereof
EP2696307A1 (en) System and method for controlling user's access to protected resources using multi-level authentication
CN105684009A (en) Using biometric authentication for NFC-based payments
CN201820230U (en) Computer and trusted-computing trusted root equipment for same
CN101276384A (en) Security control chip and implementing method thereof
CN201716733U (en) USB safe storage crypto card
CN102013981B (en) E-bank data authentication device and method applied to mobile communication terminal
CN201936334U (en) Mobile payment data secure digital card
CN201654768U (en) Active type intelligent security USB (Universal Serial Bus) removable storage equipment
CN104112199A (en) Multi-communication-port IC card safety terminal, access system and financial transaction payment method
CN102831081A (en) Transparent encryption and decryption secure digital memory card (SD card) and implementation method thereof
CN103596175A (en) Mobile intelligent terminal certification system and method based on near field communication technology
CN201549223U (en) Trusted secure portable storage device
CN105303093A (en) Token verification method for cryptographic smart token
CN201860345U (en) Fingerprint USBKEY (universal serial bus key) encryption device
CN103593596A (en) USB KEY for collecting external biological characteristics
KR20120100342A (en) Security token device and rf module and method of authentication usable in smartphone and pc

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CX01 Expiry of patent term
CX01 Expiry of patent term

Granted publication date: 20120801