CN203982390U - A kind of private network computer safety system based on TPM - Google Patents

A kind of private network computer safety system based on TPM Download PDF

Info

Publication number
CN203982390U
CN203982390U CN201420100550.6U CN201420100550U CN203982390U CN 203982390 U CN203982390 U CN 203982390U CN 201420100550 U CN201420100550 U CN 201420100550U CN 203982390 U CN203982390 U CN 203982390U
Authority
CN
China
Prior art keywords
tpm
private network
mainboard
computing machine
chip
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201420100550.6U
Other languages
Chinese (zh)
Inventor
杜宏钢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongchada Heilongjiang Engineering Management Service Group Co ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201420100550.6U priority Critical patent/CN203982390U/en
Application granted granted Critical
Publication of CN203982390U publication Critical patent/CN203982390U/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The utility model relates to a kind of private network computer safety system based on TPM, comprises private network computing machine and outside TPM safety chip; Described private network computing machine comprises mainboard and the internal memory being connected with mainboard, safe hard disk, safe I/O assembly, CPU, BIOS system and BIOS security control chip, described mainboard is provided with security control hardware, and described security control hardware comprises inner TPM safety chip; Described outside TPM safety chip is connected with the mainboard of described computing machine by USB port.The utility model carrys out the operating right of leading subscriber by inside and outside TPM hardware, effectively stoped software attacks to obtain the possibility of computer cryptography, has improved the security that computing machine uses.

Description

A kind of private network computer safety system based on TPM
Technical field
The utility model belongs to field of computer technology, is specifically related to a kind of private network computer safety system based on TPM.
Background technology
Along with computer network application widely in human lives field, network is the immanent various aspects such as social politics, economy, culture, military affairs and social life that affect.Meanwhile, for software attacks, the assault of computing machine,, for the quantity of the intrusion behavior of important information resource and network infrastructure and attempt intrusion behavior, also increase thereupon.Because operator's awareness of safety is thin, lack necessary safety prevention measure, computer network is constantly by illegal invasion, important information, data, data are stolen, not only cause the serious consequence of divulging a secret, even cause computer system paralysis, suchlike event has caused huge economic loss to government and enterprise, even jeopardizes nation's security.Some private network computing machines exist safety practice weakness to a great extent, without access control function, lack the safety issues such as necessary safety trial mechanism.
Utility model content
The utility model, for the pregnable feature of private network computer BIOS, provides a kind of computer safety system based on TCG system, can pass through the user-dependent operating right of BIOS security control hardware management, improves the security that computing machine uses.
The technical solution adopted in the utility model is as follows:
A private network computer safety system based on TPM, comprises private network computing machine and outside TPM safety chip; Described private network computing machine comprises mainboard and the internal memory being connected with mainboard, safe hard disk, safe I/O assembly, CPU, BIOS system and BIOS security control chip, described mainboard is provided with security control hardware, and described security control hardware comprises inner TPM safety chip; Described outside TPM safety chip is connected with the mainboard of described private network computing machine.
Further, described outside TPM safety chip is connected with the mainboard of described computing machine by USB port.
Further, described inner TPM safety chip and outside TPM safety chip connect to form by CPU, TPM storer, safe I/O interface, verification system and tandom number generator.
Further, described security control hardware also comprises trusted storage root (CRTM), Software Protocol Stack.
Further, on described mainboard, be also provided with storage control chip, can control user's data stream.
The utility model comes leading subscriber logon rights, user's operating right and user management authority by inside and outside TPM hardware, has effectively stoped software attacks to obtain the possibility of computer cryptography, has improved the security that computing machine uses; By USB interface, TPM is connected to computing machine, obtain computing machine rights of using, simple in structure, good stability, simple operation.
Accompanying drawing explanation
Fig. 1 is the structural representation of the embedded computer security system based on TPM of the present utility model.
Fig. 2 is the structural representation of TPM safety chip of the present utility model.
Fig. 3 is the workflow diagram of the embedded computer security system based on TPM of the present utility model.
Embodiment
Below by specific embodiments and the drawings, the utility model is described further.
Fig. 1 is the composition schematic diagram of the embedded computer security system based on TPM of the present embodiment.This system made, on the basis of TCG trusted computer platform framework, comprises private network computing machine and outside TPM safety chip.Private network computing machine comprises mainboard and the internal memory being connected with mainboard, safe hard disk, safe I/O assembly, CPU, BIOS system and BIOS security control chip, mainboard is provided with security control hardware, and security control hardware comprises inner TPM safety chip, trusted storage root (CRTM), Software Protocol Stack etc.Outside TPM safety chip is connected with the mainboard of described computing machine by USB port.In computing machine, on mainboard, also storage control chip can be set, be different from traditional storer, can control user's data stream.
As shown in Figure 2, above-mentioned inner TPM safety chip and outside TPM safety chip, connect to form by CPU, TPM storer, safe I/O interface, crypto-operation device and tandom number generator.
The computer safety system of the present embodiment, be based upon on the basis of TCG trusted computer platform framework, the platform safety system that the inside and outside TPM of take builds as core, by TPM safety chip, by CRTM trusted root initialization administration module, be encapsulated on mainboard, by BIOS security control chip, carry out safety management control.
Fig. 3 is the workflow diagram of the computer safety system of the present embodiment.In the time of computer booting, BIOS security control chip can guide by BIOS, now can automatically detect the USB interface whether outside TPM safety chip inserts computing machine, and system automatically guiding enters guide picture.If do not insert outside TPM safety chip, system will be pointed out and enter thrashing, and prompting user checks outside TPM safety chip.Between outside TPM and inner TPM, have authentication mechanism, after moving first by some information registerings in inner TPM, so each startup all can have the process of a checking.After entering login interface, under the control of BIOS security control chip, by the cooperation of outside TPM safety chip and inner TPM safety chip, system is automatically identified and is guided outside TPM safety chip to remove to contrast user's startup password.If can use this computing machine with outside TPM safety chip is consistent, if the continuous input error of password three times, system will be defaulted as illegally and log in, and limit it and log in.
The utility model connects computing machine by USB interface by outside TPM safety chip, obtain computing machine rights of using, by being used in combination of outside TPM safety chip and inner TPM safety chip, can effectively identify lander's identity, verify its load right, access rights, effectively stoped from unauthorized malicious attack, improved the security that computing machine uses, simple operation, simple in structure.
Above-described embodiment is only an example of the present utility model, is not used for limiting enforcement of the present utility model and interest field, and all or technical schemes of being equal to identical with content described in the utility model claim, all should be included in the utility model protection domain.

Claims (4)

1. the private network computer safety system based on TPM, is characterized in that, comprises private network computing machine and outside TPM safety chip; Described private network computing machine comprises mainboard and the internal memory being connected with mainboard, safe hard disk, safe I/O assembly, CPU, BIOS system and BIOS security control chip, described mainboard is provided with security control hardware, and described security control hardware comprises inner TPM safety chip; Described outside TPM safety chip is connected with the mainboard of described private network computing machine by USB port.
2. the private network computer safety system based on TPM as claimed in claim 1, is characterized in that: described inner TPM safety chip and outside TPM safety chip connect to form by CPU, TPM storer, safe I/O interface, verification system and tandom number generator.
3. the private network computer safety system based on TPM as claimed in claim 1, is characterized in that: described security control hardware also comprises CRTM and Software Protocol Stack.
4. the private network computer safety system based on TPM as claimed in claim 1, is characterized in that: on described mainboard, be also provided with storage control chip.
CN201420100550.6U 2014-03-06 2014-03-06 A kind of private network computer safety system based on TPM Expired - Fee Related CN203982390U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201420100550.6U CN203982390U (en) 2014-03-06 2014-03-06 A kind of private network computer safety system based on TPM

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201420100550.6U CN203982390U (en) 2014-03-06 2014-03-06 A kind of private network computer safety system based on TPM

Publications (1)

Publication Number Publication Date
CN203982390U true CN203982390U (en) 2014-12-03

Family

ID=51979818

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201420100550.6U Expired - Fee Related CN203982390U (en) 2014-03-06 2014-03-06 A kind of private network computer safety system based on TPM

Country Status (1)

Country Link
CN (1) CN203982390U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105550602A (en) * 2016-01-29 2016-05-04 深圳市铂盛科技有限公司 Secure computer motherboard encrypted based on State-Cryptography-Administration algorithm and encryption method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105550602A (en) * 2016-01-29 2016-05-04 深圳市铂盛科技有限公司 Secure computer motherboard encrypted based on State-Cryptography-Administration algorithm and encryption method

Similar Documents

Publication Publication Date Title
US20240098097A1 (en) Secure over-the-air updates
US10361998B2 (en) Secure gateway communication systems and methods
CN110233817B (en) Container safety system based on cloud computing
CN101986325A (en) Computer security access control system and method
CN103246849A (en) Safe running method based on ROST under Windows
Yu et al. Protecting the security and privacy of the virtual machine through privilege separation
CN102024115B (en) Computer with user security subsystem
CN102184358A (en) USB (Universal Serial Bus) embedded trustworthiness private information processing device and system
CN103793662A (en) Method for safely operating trusted platform on basis of mandatory access control
CN112199700B (en) Safety management method and system for MES data system
CN106548097A (en) The operation method and device of network device software
WO2020187206A1 (en) Implementation scheme of trusted computing system based on solid-state disk master controller
US20220326863A1 (en) Data storage apparatus with variable computer file system
CN203982390U (en) A kind of private network computer safety system based on TPM
CN104463510A (en) Finance management system
CN102025492B (en) WEB server and data protection method thereof
CN106817385A (en) Cloud terminal network access system based on high speed reliable hardware module
CN201845340U (en) Safety computer provided with user safety subsystem
CN202067261U (en) Universal serial bus (USB) embedding type trustworthy private information processing device and system
Tymchenko et al. Risks of Loss of Personal Data in the Process of Sending and Printing Documents.
CN111104665A (en) Security monitoring method based on license authentication of cluster virtual machine
CN203233445U (en) High security internal network information safety system
Heiser et al. What if you could actually trust your kernel?
Griscioli et al. Securing promiscuous use of untrusted usb thumb drives in industrial control systems
CN202918335U (en) Fusion type identity authentication device based on cloud computing

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220602

Address after: No. h, 23 / F, No. 259, dongdazhi street, Nangang District, Harbin City, Heilongjiang Province, 150001 (residential)

Patentee after: Zhongchada (Heilongjiang) Engineering Management Service (Group) Co.,Ltd.

Address before: 161005 No.99 Hecheng Road, Longsha District, Qiqihar City, Heilongjiang Province

Patentee before: Du Honggang

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20141203