CN103646214A - Method for establishing trusted environment in power distribution terminal - Google Patents

Method for establishing trusted environment in power distribution terminal Download PDF

Info

Publication number
CN103646214A
CN103646214A CN201310700306.3A CN201310700306A CN103646214A CN 103646214 A CN103646214 A CN 103646214A CN 201310700306 A CN201310700306 A CN 201310700306A CN 103646214 A CN103646214 A CN 103646214A
Authority
CN
China
Prior art keywords
distribution terminal
integrity
chip
boot
credible
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310700306.3A
Other languages
Chinese (zh)
Other versions
CN103646214B (en
Inventor
徐震
杨文思
于爱民
汪丹
赵保华
王志皓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Zhejiang Electric Power Co Ltd
China Electric Power Research Institute Co Ltd CEPRI
Global Energy Interconnection Research Institute
State Grid Liaoning Electric Power Co Ltd
Institute of Information Engineering of CAS
Original Assignee
State Grid Corp of China SGCC
China Electric Power Research Institute Co Ltd CEPRI
State Grid Liaoning Electric Power Co Ltd
Institute of Information Engineering of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, China Electric Power Research Institute Co Ltd CEPRI, State Grid Liaoning Electric Power Co Ltd, Institute of Information Engineering of CAS filed Critical State Grid Corp of China SGCC
Priority to CN201310700306.3A priority Critical patent/CN103646214B/en
Publication of CN103646214A publication Critical patent/CN103646214A/en
Priority to PCT/CN2014/094051 priority patent/WO2015090196A1/en
Application granted granted Critical
Publication of CN103646214B publication Critical patent/CN103646214B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)

Abstract

The invention provides a method for establishing a trusted environment in a power distribution terminal. A trusted chip is added in the power distribution terminal to be used as a hardware trust root, pre-configured integrity reference values are stored inside, and then a secure startup module is added in a system to be used as an initial operation module of the system. During startup of the system, integrity measurements are performed on a system state and a critical system image, so that the integrity of the operation system on the power distribution terminal is protected, trust is established, the trusted operation environment can be established finally, the ability of malicious software to destroy the integrity of the system is restrained from the source, and the security level of the system of the power distribution terminal is increased.

Description

A kind of method of setting up trusted context in distribution terminal
Technical field
The invention belongs to distribution terminal safety technique field, be specifically related to a kind of method of setting up trusted context in distribution terminal.
Background technology
Power industry is responsible for producing, is carried and distribute electric energy, comprises the links such as generating, transmission of electricity, power transformation, distribution.Because electric energy is being related to the normal operation of whole country, so being one of important support of whole national economy, is also the leading sector of the national economic development.Current power infrastructures is in the design of 19th-century and twentieth century, along with social development, this gradually aging power infrastructures can not bear the responsibility of following electric power supply.In recent years, along with the fast development of information science technology, global various countries were all realizing striding forward fast to intelligent grid.On May 21st, 2009, China has announced " strong intelligent grid " plan, to building, there is informationization, robotization, interactive feature, the strong rack that the extra-high voltage grid of take is key rack, electric network coordination at different levels development is basis, take communication information platform as support, the generating that comprises electric system, transmission of electricity, power transformation, distribution, electricity consumption and scheduling links, cover all electric pressures, realizes the modern power network of the height integral fusion of " flow of power, information flow, Business Stream ".
And distribution is as being directly connected with user in electric system and to the link of user assignment electric energy, be the important step in electric system, and people living closely related.In intelligent grid, a very important part is exactly power distribution automation, comprise the supervision of system and control, distribution system management function and with user mutual (as load management, measurement and Real-Time Pricing) etc.Power distribution automation is by other ingredient synthetic operations with intelligent grid, both system monitoring, idle and voltage management, reduction network loss and raising assets utilization rate can have been improved, also can assist and optimize personal scheduling and maintenance activity arrangement etc., need complicated control system for this reason, be distribution power automation terminal, be called for short distribution terminal.In recent years, along with the fast development of Embedded Mobile intelligent terminal, the system configuration of distribution terminal is also progressively to intelligent development.At present, most of distribution terminal has all possessed powerful calculation process ability, and system software platform also more adopts embedded real-time multi-task operating system, and all possesses ability of utilizing mobile wireless network accesses network etc.These elements make mobile payment terminal the same with common intelligent terminal, are faced with various security threats.
The measurement data that distribution terminal provides, is the important evidence that decision-making is done by distribution main website, once these data are tampered, large-scale power failure will be initiated, thereby causes catastrophic loss.Again and again the mobile intelligent terminal security incident occurring in recent years is also being reminded us the safety case of distribution terminal system allows of no optimist.Predictably, if do not add any protection, for the appearance of the attack of distribution terminal system problem sooner or later just.Because distribution terminal is compared with common intelligent terminal, unique difference is only that the business of moving is above relatively single, is therefore all faced with same security threat, as steals authority, man-in-the-middle attack, altered data etc.And on current distribution terminal, lack integrity protection mechanism, and software systems are easily under attack and distort, once be found leak by malicious attacker, the loss bringing will be estimated.
Through the development of nearly more than ten years, the trust chain technology of conventional P C is gradually improved, and trust chain effectively this viewpoint of integrality of protection system state is generally approved.Therefore; we can be incorporated into this technical thought of chain that breaks the wall of mistrust on conventional P C on distribution terminal; by adding safety chip in order to root of trust to be provided on distribution terminal, thus the integrality of protection system, finally for system made plays believable running environment.But the software and hardware architecture of distribution terminal and conventional P C and feature are greatly different, it is inappropriate that the credible chip on PC is grafted directly on distribution terminal.So designing a whole set of full-order system for distribution terminal is a significant challenge to set up credible running environment.
Summary of the invention
In order to overcome above-mentioned the deficiencies in the prior art, the invention provides a kind of method of setting up trusted context in distribution terminal, by increasing credible chip as hardware root of trust in distribution terminal, the inside stores preset integrity reference value, then in system, add clean boot module, as the initial launch module of system.In system starting process; by system state and crucial system image are carried out to integrity measurement; thereby the integrality of operational system on protection distribution terminal; build and trust; finally set up credible running environment; the ability of checking Malware destruction system integrity from source, the safe class of raising distribution terminal system.
In order to realize foregoing invention object, the present invention takes following technical scheme:
The invention provides a kind of method of setting up trusted context in distribution terminal, said method comprising the steps of:
Step 1: described distribution terminal is written into clean boot module from nonvolatile external memory;
Step 2: described clean boot module is forbidden all interruptions, initialization register and memory headroom are done integrity measurement to the state of described distribution terminal;
Step 3: described clean boot module judges whether to upgrade to the operating system of described distribution terminal according to zone bit, if need upgrading, enters the upgrading of upgrading flow process complete operation system; If do not need upgrading, perform step 4;
Step 4: clean boot module is calculated the integrity measurement value of boot and operating system nucleus;
Step 5: after integrity verification success, distribution terminal control is handed to boot, enters normal distribution terminal bootup process.
Described step 1 comprises the following steps:
Step 1-1: credible chip initiation, and use the IO interface between described chip and distribution terminal to make distribution terminal enter outside Boot state;
Step 1-2: restart distribution terminal, make it enter the Boot state of specifying;
Step 1-3: distribution terminal, according to specifying Boot state, is written into clean boot module from nonvolatile external memory.
Described step 2 comprises the following steps:
Step 2-1: call the integrality extended instruction ETM_Extend of credible chip, the result after integrity measurement is expanded in credible chip, to guarantee the safety of integrity measurement value;
Step 2-2: call the integrity verification instruction ETM_PCR_Validate of credible chip, judge that whether the state of current distribution terminal is credible;
Step 2-3: credible chip determines whether enter NextState according to the result, if integrity verification failure, credible chip forces distribution terminal to be restarted.
Described step 3 comprises the following steps:
Step 3-1: if need to described distribution terminal be upgraded, receive data by network, the integrity reference value that upgrade server need to upgrade the operating system mirror image after upgrading together with credible chip sends to upgrading submodule simultaneously;
Step 3-2: described upgrading submodule, by resolution data bag, is upgraded to described distribution terminal calls the integrality update instruction ETM_PCRRef_Put of credible chip simultaneously, upgrades the integrity reference value of storing in credible chip.
Described step 4 comprises the following steps:
Step 4-1: be written into boot and operating system nucleus mirror image from nonvolatile external memory;
Step 4-2: call the integrality extended instruction ETM_Extend of credible chip, the result after integrity measurement is expanded in credible chip, to guarantee the safety of integrity measurement value;
Step 4-3: call chip integrity verification instruction ETM_PCR_Validate, judge that whether current boot and operating system state is separately all credible;
Step 4-4: credible chip determines whether enter NextState according to the result, if the failure of the integrity verification of boot or operating system, credible chip forces distribution terminal to be restarted.
Compared with prior art, beneficial effect of the present invention is:
(1) demand for security for distribution terminal customizes credible chip ETM, the various software and hardware architecture of embedded distribution terminal equipment has more been considered in its design, on the basis of assurance module security and function, the dirigibility of its realization of lay special stress on and customizability, be beneficial to widespread use and popularization;
(2) for the distribution terminal of different shape, the feature in conjunction with concrete operation system, has proposed general software and hardware architecture to realize credible startup; protection system integrality; strengthen security of system, it has all formulated complete process step in production and upgrading flow process, and exploitativeness is strong.
Accompanying drawing explanation
Fig. 1 is the method flow diagram of setting up trusted context in distribution terminal;
Fig. 2 is the detail flowchart that in the embodiment of the present invention, trusted context is set up;
Fig. 3 is the operating system update process flow diagram of distribution terminal.
Embodiment
Below in conjunction with accompanying drawing, the present invention is described in further detail.
The mechanism that the present invention utilizes safety chip to build trust chain conventional P C is applied on distribution terminal, designs and Implements credible chip first for distribution terminal, in order to the function of protection integrity measurement value and integrity verification to be provided.With respect to the safety chip of PC, the various software and hardware architecture of embedded distribution terminal equipment has more been considered in the design of ETM, on the basis of assurance module security and function, and the dirigibility of its realization of lay special stress on and customizability.In addition, the present invention provides on the basis of hardware root of trust at safety chip ETM, by adding system integrity to control correlation module, finally set up the foundation that a whole set of complete software and hardware system system realizes credible running environment in system startup and escalation process.
The embodiment that present patent application provides be take without the distribution terminal of operating system as example explanation, first needs to realize safety chip ETM and is responsible for protecting the functions such as integrity measurement value and verification system integrality state.The system resource that the ETM realizing in the present embodiment possesses is described below:
1, adopt 32-bit RISC embedded microprocessor, support 16/32-bit fixed length instruction set, support 5 grades of instruction flow lines, inside have the Instruction Cache of 1KB;
2, adopt AMBA bus architecture, 4 groups of DMA passages;
3, memory resource comprises 12KB ROM, 25KB RAM, and 1024KB Flash storer, by memory management unit MMU allocate memory space;
4, there are 22 interrupt sources, share 6 hardware interrupts entrances, 2 software interruption entrances, 6 grades of interrupt priority levels;
5, peripheral modules in integrated a large amount of sheets, mainly comprise 2 timers, 1 house dog, 1 road SCD interface (7816 from interface) and 1 road SCC interface (7816 main interface), 2 road UART interfaces, 2 road SPI interfaces, 30 GPIO.
The ETM firmware program of realizing in the present embodiment, what externally provide is described below in order to build the command interface definition of trusted context:
■ ETM_Extend:(is increased to a new integrity measurement value in a PCR)
■ input parameter is described:
1, tag: marking command type of message, be worth for ETM_TAG_RQU_AUTH_CMD, representative need to be authorized password
2, paramSize: total byte number of all input parameters (comprising tag and paramSize)
3, ordinal: marking command coding, is worth for 0x0000000f
4, cmdAuth: the digest value of command authority password
5, pcrNum: the PCR index of wish renewal value
6, inDigest: 160 bit integrity values of wish expansion
■ output parameter is described:
1, tag: marking command type of message, is worth for ETM_TAG_RQU_AUTH_CMD
2, paramSize: total byte number of all input parameters (comprising tag and paramSize)
3, returnCod:ETM carries out the rreturn value of this order
4, ordinal: marking command coding, is worth for 0x0000000f
5, outDigest: the value of this PCR after command execution completes
Figure BDA0000440593290000051
whether ETM_PCR_Validate(checking PCR value is consistent with the PCR reference value of storing in ETM)
■ input parameter is described:
1, tag: marking command type of message, is worth for ETM_TAG_RQU_AUTH_CMD
2, paramSize: total byte number of all input parameters (comprising tag and paramSize)
3, ordinal: marking command coding, is worth for 0x00000010
4, cmdAuth: the digest value of command authority password
5, targetPCR: the PCR index of wish checking PCR value
■ output parameter is described:
1, tag: marking command type of message, is worth for ETM_TAG_RQU_AUTH_CMD
2, paramSize: total byte number of all input parameters (comprising tag and paramSize)
3, returnCod:ETM carries out the rreturn value of this order
4, ordinal: marking command coding, is worth for 0x00000010
5, validatedValue: the result of checking
Figure BDA0000440593290000052
eTM_PCRRef_Put(inserts PCR reference value in ETM)
■ input parameter is described:
1, tag: marking command type of message, is worth for ETM_TAG_RQU_AUTH_CMD
2, paramSize: total byte number of all input parameters (comprising tag and paramSize)
3, ordinal: marking command coding, is worth for 0x0000000d
4, cmdAuth: the digest value of command authority password
5, keyHandle: the key handle of checking PCR reference value certificate signature
6, certSize:PCR reference value certificate size
7, pcrRefCert:PCR reference value certificate
■ output parameter is described:
1, tag: marking command type of message, is worth for ETM_TAG_RQU_AUTH_CMD
2, paramSize: total byte number of all input parameters (comprising tag and paramSize)
3, returnCod:ETM carries out the rreturn value of this order
The detailed process that in the present embodiment, trusted context is set up as shown in Figure 2, because systemic-function is fairly simple, does not have typical bootloader and operating system module, and service master is directly carried out in ROM, does not need to be loaded into internal memory; And also because system module is less, omitted and be written into clean boot module and the steps such as completeness check to system state.Owing to need to import command authority password into when calling credible chip, guaranteeing only to obtain the authorization just allows to use chip, therefore, first needs to insert in advance the digest value of authorizing password in the ROM of distribution terminal.The concrete steps that trusted context is set up are as follows:
1, cpu system automatically resets;
2, operation Boot system initialization routine, and read startup sign, master routine entry address, messaging parameter etc.;
3, judgement starts to indicate whether be the sign that XX(starts upgrading), if start upgrading, Boot program is carried out in continuation, waits for reception program upgrade; If without starting upgrading, store version number and the version date of Boot program, call integrity measurement module;
4, integrity measurement module reads master routine entry address and master routine length, and master routine is carried out to integrity measurement, obtains integrity measurement value;
If 5 integrity measurement module successful execution, Boot routine call chip ETM_Extend order, importing successively total byte number paramSize, the marking command coding ordinal of command messages type tag, all input parameters (comprising tag and paramSize), the digest value cmdAuth(of command authority password into is preset in ROM), the PCR index pcrNum(0x2 of wish renewal value, extend in No. 2 PCR), the 160 bit integrity values (the integrity measurement value that the 4th step calculates) of wish expansion, integrity measurement value is expanded in corresponding PCR;
6, call chip ETM_PCR_Validate order, verify the integrity measurement value in No. 2 PCR;
If 7 integrity verifications by (rreturn value is true) after, enter master routine; Otherwise cpu reset.
Because the integrality of protection system is by calling chip instruction ETM_PCR_Validate, the integrity reference value in integrity measurement value and chip to be compared and realized; after system upgrade, integrity measurement value can change; the corresponding integrity reference value of therefore also need to be after system upgrade more storing in new chip; as shown in Figure 3, concrete steps are as follows for detailed upgrading flow process:
1, first manufacturer terminal needs to calculate the integrity reference value of the service master after upgrading;
2, manufacturer terminal XiangCA applies at center the integrity reference value certificate of this service master;
3, integrity reference value certificate is returned at CA center;
4, upgrade server sends to the service master after upgrading and corresponding integrity reference value certificate according to rendezvous protocol the Boot program of distribution terminal;
5, Boot program receives upgrade by communication network, upgrades master routine, and receives reference value certificate; The upgrading submodule of Boot program operation can call chip order ETM_PCRRef_Put, and integrity reference value certificate and the mandate password digest value that is stored in ROM are imported into as parameter, and the integrity reference value completing in chip is upgraded operation.
The security protection of simple dependence enhancing system and application software can not guarantee the high safety grade of system, and owing to all inevitably there is defect in all software systems, the security module of increase may be brought new safety defect.Therefore, the distribution terminal of having relatively high expectations for safe class, the security solution of pure software is not sufficient to build the credible running environment that can trust.Although TCG moves trusted module for the designed MTM(of embedded system) the similar security function with the TPM on PC is provided, also therefore can be used to build the trusted context in embedded system.But distribution terminal is compared with general mobile terminal, has the feature of oneself, as versatile and flexible in the software and hardware architecture of equipment, and form is also of all kinds, and the application moving on distribution terminal is comparatively single.And MTM is more for general embedded platform, although security function is comparatively complete, implement very complicatedly, upper layer software (applications) needs more change to support safe guidance, and is not suitable for distribution terminal and uses.The present invention is directed to the demand for security customization safety chip ETM of distribution terminal, the various software and hardware architecture of embedded distribution terminal equipment has more been considered in its design, on the basis of assurance module security and function, the dirigibility of its realization of lay special stress on and customizability, be beneficial to widespread use and popularization.
Existing embedded credible system starts in design, by TPM chip, directly the key code of system is carried out to integrity measurement and checking, it is large that this star-like chain of trust structure realizes difficulty, to the processing power of TPM and very high to the judgement requirement of upper strata behavior, can improve the production cost of chip, and cause system flexibility lower.The present invention is directed to the distribution terminal of different shape, the feature in conjunction with concrete operation system, has proposed general software and hardware architecture to realize credible startup; protection system integrality; strengthen security of system, it has all formulated complete process step in production and upgrading flow process, and exploitativeness is strong.
Finally should be noted that: above embodiment is only in order to illustrate that technical scheme of the present invention is not intended to limit, although the present invention is had been described in detail with reference to above-described embodiment, those of ordinary skill in the field are to be understood that: still can modify or be equal to replacement the specific embodiment of the present invention, and do not depart from any modification of spirit and scope of the invention or be equal to replacement, it all should be encompassed in the middle of claim scope of the present invention.

Claims (5)

1. in distribution terminal, set up a method for trusted context, it is characterized in that: said method comprising the steps of:
Step 1: described distribution terminal is written into clean boot module from nonvolatile external memory;
Step 2: described clean boot module is forbidden all interruptions, initialization register and memory headroom are done integrity measurement to the state of described distribution terminal;
Step 3: described clean boot module judges whether to upgrade to the operating system of described distribution terminal according to zone bit, if need upgrading, enters the upgrading of upgrading flow process complete operation system; If do not need upgrading, perform step 4;
Step 4: clean boot module is calculated the integrity measurement value of boot and operating system nucleus;
Step 5: after integrity verification success, distribution terminal control is handed to boot, enters normal distribution terminal bootup process.
2. the method for setting up trusted context in distribution terminal according to claim 1, is characterized in that: described step 1 comprises the following steps:
Step 1-1: credible chip initiation, and use the IO interface between described chip and distribution terminal to make distribution terminal enter outside Boot state;
Step 1-2: restart distribution terminal, make it enter the Boot state of specifying;
Step 1-3: distribution terminal, according to specifying Boot state, is written into clean boot module from nonvolatile external memory.
3. the method for setting up trusted context in distribution terminal according to claim 1, is characterized in that: described step 2 comprises the following steps:
Step 2-1: call the integrality extended instruction ETM_Extend of credible chip, the result after integrity measurement is expanded in credible chip, to guarantee the safety of integrity measurement value;
Step 2-2: call the integrity verification instruction ETM_PCR_Validate of credible chip, judge that whether the state of current distribution terminal is credible;
Step 2-3: credible chip determines whether enter NextState according to the result, if integrity verification failure, credible chip forces distribution terminal to be restarted.
4. the method for setting up trusted context in distribution terminal according to claim 1, is characterized in that: described step 3 comprises the following steps:
Step 3-1: if need to described distribution terminal be upgraded, receive data by network, the integrity reference value that upgrade server need to upgrade the operating system mirror image after upgrading together with credible chip sends to upgrading submodule simultaneously;
Step 3-2: described upgrading submodule, by resolution data bag, is upgraded to described distribution terminal calls the integrality update instruction ETM_PCRRef_Put of credible chip simultaneously, upgrades the integrity reference value of storing in credible chip.
5. the method for setting up trusted context in distribution terminal according to claim 1, is characterized in that: described step 4 comprises the following steps:
Step 4-1: be written into boot and operating system nucleus mirror image from nonvolatile external memory;
Step 4-2: call the integrality extended instruction ETM_Extend of credible chip, the result after integrity measurement is expanded in credible chip, to guarantee the safety of integrity measurement value;
Step 4-3: call chip integrity verification instruction ETM_PCR_Validate, judge that whether current boot and operating system state is separately all credible;
Step 4-4: credible chip determines whether enter NextState according to the result, if the failure of the integrity verification of boot or operating system, credible chip forces distribution terminal to be restarted.
CN201310700306.3A 2013-12-18 2013-12-18 A kind of method setting up trusted context in distribution terminal Active CN103646214B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201310700306.3A CN103646214B (en) 2013-12-18 2013-12-18 A kind of method setting up trusted context in distribution terminal
PCT/CN2014/094051 WO2015090196A1 (en) 2013-12-18 2014-12-17 Method for creating dependable environment in power distribution terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310700306.3A CN103646214B (en) 2013-12-18 2013-12-18 A kind of method setting up trusted context in distribution terminal

Publications (2)

Publication Number Publication Date
CN103646214A true CN103646214A (en) 2014-03-19
CN103646214B CN103646214B (en) 2016-08-31

Family

ID=50251427

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310700306.3A Active CN103646214B (en) 2013-12-18 2013-12-18 A kind of method setting up trusted context in distribution terminal

Country Status (2)

Country Link
CN (1) CN103646214B (en)
WO (1) WO2015090196A1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103995479A (en) * 2014-05-13 2014-08-20 珠海博威智能电网有限公司 Medium-voltage on-off controller system based on hardware trust control and use method thereof
WO2015090196A1 (en) * 2013-12-18 2015-06-25 国家电网公司 Method for creating dependable environment in power distribution terminal
WO2015184891A1 (en) * 2014-11-20 2015-12-10 中兴通讯股份有限公司 Security management and control method, apparatus, and system for android system
CN108804927A (en) * 2018-06-15 2018-11-13 郑州信大壹密科技有限公司 Trusted computer platform based on domestic autonomous dual system framework
CN109656606A (en) * 2018-12-15 2019-04-19 深圳市捷诚技术服务有限公司 POS terminal program more new control method, device, storage medium and terminal
CN109992963A (en) * 2019-04-12 2019-07-09 长沙理工大学 The protecting information safety method and system of a kind of electric power terminal and its embedded system
CN110543769A (en) * 2019-08-29 2019-12-06 武汉大学 Trusted starting method based on encrypted TF card
CN112269995A (en) * 2020-08-07 2021-01-26 国网河北省电力有限公司信息通信分公司 Trusted computing platform for parallel computing and protection of smart power grid environment
CN116340956A (en) * 2023-05-25 2023-06-27 国网上海能源互联网研究院有限公司 Trusted protection optimization method and device for electric embedded terminal equipment

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11055105B2 (en) * 2018-08-31 2021-07-06 Micron Technology, Inc. Concurrent image measurement and execution
CN111651769B (en) * 2019-03-04 2023-05-09 阿里巴巴集团控股有限公司 Method and device for acquiring measurement of security initiation
CN112163216B (en) * 2020-08-28 2022-04-01 中国电力科学研究院有限公司 Method and system for establishing safe computing environment of intelligent electric energy meter

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001065366A1 (en) * 2000-03-02 2001-09-07 Alarity Corporation System and method for process protection
CN101122936A (en) * 2007-09-21 2008-02-13 武汉大学 Embed type platform guiding of credible mechanism
CN101877040A (en) * 2009-12-07 2010-11-03 中国航天科工集团第二研究院七○六所 High-reliability computing platform
CN102035838A (en) * 2010-12-07 2011-04-27 中国科学院软件研究所 Trust service connecting method and trust service system based on platform identity
CN102355467A (en) * 2011-10-18 2012-02-15 国网电力科学研究院 Power transmission and transformation equipment state monitoring system security protection method based on trust chain transmission
CN103020531A (en) * 2012-12-06 2013-04-03 中国科学院信息工程研究所 Method and system for trusted control of operating environment of Android intelligent terminal

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100550030C (en) * 2006-02-24 2009-10-14 上海方正信息安全技术有限公司 On portable terminal host, add the method for credible platform
CN101515316B (en) * 2008-02-19 2011-09-28 北京工业大学 Trusted computing terminal and trusted computing method
CN101281577B (en) * 2008-05-16 2010-06-23 北京工业大学 Dependable computing system capable of protecting BIOS and method of use thereof
CN102012979B (en) * 2010-11-15 2012-07-04 深圳市华威世纪科技股份有限公司 Embedded credible computing terminal
CN103646214B (en) * 2013-12-18 2016-08-31 国家电网公司 A kind of method setting up trusted context in distribution terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001065366A1 (en) * 2000-03-02 2001-09-07 Alarity Corporation System and method for process protection
CN101122936A (en) * 2007-09-21 2008-02-13 武汉大学 Embed type platform guiding of credible mechanism
CN101877040A (en) * 2009-12-07 2010-11-03 中国航天科工集团第二研究院七○六所 High-reliability computing platform
CN102035838A (en) * 2010-12-07 2011-04-27 中国科学院软件研究所 Trust service connecting method and trust service system based on platform identity
CN102355467A (en) * 2011-10-18 2012-02-15 国网电力科学研究院 Power transmission and transformation equipment state monitoring system security protection method based on trust chain transmission
CN103020531A (en) * 2012-12-06 2013-04-03 中国科学院信息工程研究所 Method and system for trusted control of operating environment of Android intelligent terminal

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015090196A1 (en) * 2013-12-18 2015-06-25 国家电网公司 Method for creating dependable environment in power distribution terminal
CN103995479A (en) * 2014-05-13 2014-08-20 珠海博威智能电网有限公司 Medium-voltage on-off controller system based on hardware trust control and use method thereof
WO2015184891A1 (en) * 2014-11-20 2015-12-10 中兴通讯股份有限公司 Security management and control method, apparatus, and system for android system
CN105656860A (en) * 2014-11-20 2016-06-08 中兴通讯股份有限公司 Safety management and control method, apparatus and system for Android system
CN108804927B (en) * 2018-06-15 2021-08-10 郑州信大壹密科技有限公司 Trusted computer platform based on domestic autonomous dual-system architecture
CN108804927A (en) * 2018-06-15 2018-11-13 郑州信大壹密科技有限公司 Trusted computer platform based on domestic autonomous dual system framework
CN109656606A (en) * 2018-12-15 2019-04-19 深圳市捷诚技术服务有限公司 POS terminal program more new control method, device, storage medium and terminal
CN109992963A (en) * 2019-04-12 2019-07-09 长沙理工大学 The protecting information safety method and system of a kind of electric power terminal and its embedded system
CN110543769A (en) * 2019-08-29 2019-12-06 武汉大学 Trusted starting method based on encrypted TF card
CN110543769B (en) * 2019-08-29 2023-09-15 武汉大学 Trusted starting method based on encrypted TF card
CN112269995A (en) * 2020-08-07 2021-01-26 国网河北省电力有限公司信息通信分公司 Trusted computing platform for parallel computing and protection of smart power grid environment
CN116340956A (en) * 2023-05-25 2023-06-27 国网上海能源互联网研究院有限公司 Trusted protection optimization method and device for electric embedded terminal equipment
CN116340956B (en) * 2023-05-25 2023-08-08 国网上海能源互联网研究院有限公司 Trusted protection optimization method and device for electric embedded terminal equipment

Also Published As

Publication number Publication date
WO2015090196A1 (en) 2015-06-25
CN103646214B (en) 2016-08-31

Similar Documents

Publication Publication Date Title
CN103646214A (en) Method for establishing trusted environment in power distribution terminal
CN102436566B (en) Dynamic trusted measurement method and safe embedded system
CN108399329B (en) Method for improving security of trusted application program
CN102063591B (en) Methods for updating PCR (Platform Configuration Register) reference values based on trusted platform
KR101867789B1 (en) Secure battery authentication
CN101276389B (en) Separation of logical trusted platform modules within a single physical trusted platform module
CN104160403A (en) Measuring platform components with a single trusted platform module
CN102667802A (en) Provisioning, upgrading, and/or changing of hardware
CN104021104B (en) A kind of cooperative system and its communication means based on dual-bus structure
CN102136043A (en) Computer system and measuring method thereof
CN102004876A (en) Security terminal reinforcing model and reinforcing method of tolerable non-trusted component
CN104008342A (en) Method for achieving safe and trusted authentication through BIOS and kernel
CN104102499A (en) Mobile terminal and mobile terminal software upgrading method
CN103347027A (en) Trusted network connecting method and system
CN104182242A (en) System booting method and system booting device
CN107172100A (en) A kind of local security updates the method and device of BIOS mirror images
CN110851188A (en) Domestic PLC trusted chain implementation device and method based on binary architecture
CN105589699A (en) Serial number information update method, device and terminal
CN111125707A (en) BMC (baseboard management controller) safe starting method, system and equipment based on trusted password module
Dhobi et al. Secure firmware update over the air using trustzone
CN104834874A (en) Establishing physical locality between secure execution environments
CN102238135A (en) Security authentication server
CN104346572A (en) Construction method of universal external intelligent terminal safety operation environment
CN102983969A (en) Security login system and security login method for operating system
CN104243457A (en) Credibility measuring method and system for mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20171016

Address after: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing

Co-patentee after: China Electric Power Research Institute

Patentee after: State Grid Corporation of China

Co-patentee after: Institute of Information Engineering, Gas

Co-patentee after: State Grid Liaoning Electric Power Co., Ltd.

Co-patentee after: GLOBAL ENERGY INTERCONNECTION RESEARCH INSTITUTE

Co-patentee after: State Grid Zhejiang Electric Power Company

Address before: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing

Co-patentee before: China Electric Power Research Institute

Patentee before: State Grid Corporation of China

Co-patentee before: Institute of Information Engineering, Gas

Co-patentee before: State Grid Liaoning Electric Power Co., Ltd.