In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-29 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
Source: https://max.book118.com/html/2015/0709/20725727.shtm
Author: Wang Guan / Beijing University of Technology
1. About the trusted standard family:
The trusted standard family is a "1-4-4" pattern, in which "1" refers to the trusted password, and the previous "4" refers to the four principal standards, including trusted platform control module (TPCM), trusted platform motherboard, trusted platform infrastructure supporting software and trusted network connections. The latter "4" refers to the four supporting standards, including trusted computing specification architecture, trusted server, trusted storage and trusted computer credibility evaluation.
two。 Trusted platform module
Trusted platform module provides three roots: trusted metric root (RTM), trusted report root (RTR), and trusted storage root (RTS).
3. Trusted startup
The trusted root is used as the trusted source point. After the system starts, the trusted root measures the system firmware, then the Block of BIOS measures the rest of the BIOS, BIOS measures the OS loader, and OS loade measures the operating system after the measurement, so as to establish a trustworthy chain at the upper level.
The workflow of 4.TPCM
(1) Home appliances on the computing platform ensure that TOCM is powered on first, and self-check is performed after TPCM is powered on, and status check is completed.
(2) TPCM reads the BIOS code, measures the BIOS, and the measurement results are stored in TPCM.
(3) TPCM transfers control to CPU,TPCM to become a control device to provide cryptographic services or trusted services for the computing process.
5. Feasibility Analysis of trusted Metrics
(1) the realization of TPCM active measurement, TPCM supports two communication modes: master and slave. The master mode is to complete the active measurement, and the slave mode is a slave device, which accepts commands from external entities. The firmware of TPCM realizes the function of active measurement of BIOS, completes the measurement of BIOS code, and ensures that TPCM is executed first through the design of the main peripheral circuit.
(2) Port control based on hardware circuit. TPCM internally implements the user rights management table, controls the rights of different users to the hardware devices on the platform, authorizes the user identity ten times, and outputs the peripheral control physical signal through the TPCM to realize the peripheral hardware level control.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.