CN106156632B - Safety device and method of the security service to host, safety equipment are provided in it - Google Patents

Safety device and method of the security service to host, safety equipment are provided in it Download PDF

Info

Publication number
CN106156632B
CN106156632B CN201610326247.1A CN201610326247A CN106156632B CN 106156632 B CN106156632 B CN 106156632B CN 201610326247 A CN201610326247 A CN 201610326247A CN 106156632 B CN106156632 B CN 106156632B
Authority
CN
China
Prior art keywords
safety
safety device
host
dedicated unit
unit driver
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610326247.1A
Other languages
Chinese (zh)
Other versions
CN106156632A (en
Inventor
Z·赫尔沙曼
丹·摩瑞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Winbond Electronics Corp
Original Assignee
Winbond Electronics Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US14/714,298 external-priority patent/US10303880B2/en
Application filed by Winbond Electronics Corp filed Critical Winbond Electronics Corp
Publication of CN106156632A publication Critical patent/CN106156632A/en
Application granted granted Critical
Publication of CN106156632B publication Critical patent/CN106156632B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of safety device and provides method of the security service to host, safety equipment in it.The method for providing security service to host in safety device includes to receive the safety command from the application program executed on host.Safety command is performed by accessing nonvolatile memory (NVM) device, wherein non-volatile memory device by the external safety device of dedicated unit driver with penetrating to application program, and dedicated unit driver is executed on host and is reconciled between NVM device and safety device.

Description

Safety device and method of the security service to host, safety equipment are provided in it
The interaction reference of related application
The U.S. Provisional Application No.62/028 that this application claims file an application on July 24th, 2014,345 equity, Disclosure is incorporated by reference to herein.
Technical field
The present invention is to generally relate to a kind of secured computing environment, and mention in particular to a kind of safety device and in it For the method for security service to host, safety equipment and computer software product.
Background technique
In computing systems, believable calculating (Trusted Computing) is for for example by believable computation organization The safe practice that (Trusted Computing Group, TCG) is researched and developed and advocated.By believable calculating, by using adding Close and other safe practices realize computer behavior.For example, it is public to be exposed in the United States Patent (USP) that this is incorporated by reference The number of opening 2005/0021968 elaborates a kind of method that offer secure firmware updates.First verifying authority is to utilize security credence Golden key (key) caused by (secure token) is securely stored in platform, such as reliable platform module in an encrypted form (Trusted Platform Module,TPM).The configuration of platform is " coining (imprinted) ", so that same configuration need to lead to Deblocking is crossed to the golden key of platform configuration, to access the golden key for being used in decryption the first verifying authority.In subsequent firmware update mistake During journey, the firmware update image comprising the second verifying authority receives on platform.If platform configuration be it is identical, when golden key quilt When sealing up, golden key can be unsealed and be used in decryption the first verifying authority.Public key (public in the first verifying authority Key it) can then be used in through the second verifying authority to verify firmware update image.
As another example, it is exposed in the U.S. Patent Publication No. 2003/0061494 that this is incorporated by reference and illustrates one The method and system of kind protection computer data.Computer, which provides to have, is preloaded into operating system (pre-operating System, pre-OS) space and to be now loaded into operating system (operating system-present, OS-present) empty Between.Protection reservoir (protected storage) is by reliable platform module (TPM) from pre-OS spatial access.Phase As, protection reservoir is to be accessed by TPM from the space OS-present.Therefore, computer can avoid unwarranted make User is from data stored in access protection reservoir in the space pre-OS and the space OS-present.
Summary of the invention
The embodiment of invention as described herein is to provide a kind of provides security service to the side of host in safety device Method, it includes receive the safety command from the application program executed on host.Safety command is by accessing outside safety device Nonvolatile memory (Non-Volatile Memory, NVM) device and be performed, wherein nonvolatile memory passes through To application program, dedicated unit driver executes on host and in NVM dedicated unit driver penetrating (transparently) It is reconciled between device and safety device.
In some embodiments, safety device, dedicated unit driver and NVM device all meet believable computation organization The respective safety standard of (Trusting Computing Group, TCG).In other embodiments, safety device and dedicated dress Set driver and at least part of NVM device storage space are the regulation enforcement reliable platform modules according to TCG (TPM)。
In embodiment, execution safety command is included in is communicated between application program and dedicated unit driver, And safety device is to be located at host as master control (master) and on interface of the safety device as subordinate (slave).Another In embodiment, executing safety command includes to be communicated between dedicated unit driver and NVM device by interface.Again In another embodiment, execute safety command include by safety device claimed apparatus driver write data into NVM device or from NVM device reads data.
In some embodiments, it is desirable that device driver is included in preparation inside safety device and requires, and is sent out by interface The number of delivering letters is to device driver to obtain requirement.In other embodiments, it is desirable that device driver is included in the temporary of safety device In storage preparation require, and waiting device driver by with device driver come poll buffer and obtain requirement.Another In a little other embodiments, executing safety command includes that the instruction prepared in safety device when completing the execution of safety command is returned It answers, and indicates that application program wherein instructs response to be ready for being read by application program.
In addition, embodiment according to the present invention provides a kind of safety device, it includes host interface and circuits.Host connects Mouth is configured to receive the safety command from the application program executed on host.Circuit is configuration with non-volatile by accessing Property memory (NVM) device to execute safety command, wherein non-volatile memory device passes through dedicated dress outside the safety device Set driver is with penetrating to application program, and dedicated unit driver executes on host and in NVM device and safety device Between reconcile.
In addition, embodiment according to the present invention provides a kind of safety equipment, it includes provide peace of the security service to host Full device and the dedicated unit driver executed on host.Device driver is configuration in safety device and safety dress It sets and is reconciled between outer nonvolatile memory (NVM) device.Safety device is configured to receive from executing on host The safety command of application program, and NVM device is accessed by dedicated unit driver and executes safety to application program with penetrating Instruction.
In addition, embodiment according to the present invention provides a kind of computer software product, it includes wherein store program instruction The computer-readable media of tangible non-transitory (tangible non-transitory computer-readable Medium), indicated when being read by the processor of host, processor is caused to run dedicated unit driver, by dedicated Device driver is mediated between safety device and non-volatile memory device, and wherein safety device is directed in host The application program of upper execution provides security service and nonvolatile memory (NVM) device outside safety device is penetrating to using journey Sequence.
Detailed description of the invention
The present invention more fully understands collocation schema from the detailed description of the following embodiment of the present invention:
Fig. 1 is schematically painted the block diagram of the computing system according to embodiment as described herein;And
Fig. 2 is schematically painted provides the process of the method for security service according to embodiment as described herein in computing system Figure.
Appended drawing reference
20: system
24: host
28: safety device
32,40: interface
36: non-volatile memory device
44:CPU
48: security application
52: device driver
60: microcontroller
62: internal busbar connector
64: host interface
66: system management module
68: random access memory
72: read-only memory
76: disposably can program storage
80: crypto engine
100,104,106,108,112,114,116,120,124,126,128,132: step
Specific embodiment
The embodiment of invention as described herein provides a kind of method and system of safety for improving computing system.At this In embodiment disclosed by text, safety device is as crypto-coprocessor (the cryptographic co- for being used for host processor).The auxiliary of host computer safety device provides the security application of security service to execute, herein Also known as " application program ".Security application transmits safety command to safety device, and receives respectively instruction from safety device It responds.
When providing the service of security application, safety device needs access external non-volatile memory (NVM) sometimes Device.In the context of present disclosure and claim, word " NVM device " refers to and also retains when without power Store up stored multiple programmable storage device (multi-time programmable storage device).It is illustrative NVM device includes that flash device (Flash device) and electronics can erase programmble read only memory PROM (Electrically Erasable Programmable Read-Only Memory, EEPROM) device.
In public technology, host operate in penetrating (transparently) to security application safety device with And the dedicated unit driver being mediated between external NVM device, it is also known as " device driver " herein.Device drives Dynamic device allows safety device by device driver with NVM outside indirect access.
Dedicated unit driver is by interface communication connecting safety device, and wherein host is used as master control and safety device is used As subordinate.As subordinate, safety device can not start exchange (transaction), such as access outside directly on interface NVM.As described herein, several mechanism are that is, although can still to pass through safety device for overcoming this difficulty under slave mode Starting exchange.
In exemplary embodiments, safety device receives the safety command of the security application from host.Work as execution When instruction needs to be written into external NVM device or reads access from external NVM device, correspondingly claimed apparatus drives safety device Device accesses external NVM device.In some embodiments, preparation requires inside safety device, and by generating interrupt signal to lead to Know that device driver is ready for requiring.In other embodiments, device driver is temporary in safety device by poll Device or memory location are to obtain requirement.Device driver by first interface from safety device reading requirement, and according to requiring It writes data into external NVM or reads data from external NVM.Device driver is provided from the data that external NVM is captured to safety Device.
Safety device can require multiple storage cycles to execute safety command external NVM device by device driver. For example, safety device can request one or more reading operations and/or one or more to execute single safety command to be write Enter operation.Following instructions execute, and instruction is back to security application by safety device.It may include that encryption is made that instruction, which is responded, The result of industry, error reporting with and the like.
In some embodiments, external NVM may include the known NVM device for being used in the additional use of computing system.It is logical It crosses using at least part of existing (typically cost the is low) NVM device for being suitable for safe storage, safety device may be designed to Without internal NVM or only with miniature NVM device, using reduces cost.
Since host is communicatively coupled by interface and safety device, wherein host is used as master control and safety device is used As subordinate, interface no longer needs busbar connector master control (bus mastering) and arbitration (arbitration) function, thus Reduce the complexity of interface.In addition to this, the interface that no busbar connector master control is supported can be used as.
System describe
Fig. 1 is schematically painted the block diagram of the computing system 20 according to embodiment as described herein.System 20 includes host 24, safety device 28 is communicated to connect by first interface 32, and nonvolatile memory is communicated to connect by second interface 40 (NVM) device 36.Safety device 28 is as the crypto-coprocessor for being used for host.
Host 24 includes the CPU44 for executing security application 48 and dedicated unit driver 52, is filled with safety It sets 28 and the function of the believable calculating of execution and other security strategies required for host 24 is provided together.48 pairs of security application peaces The common application programming that full device 28 provides operating system (OS) and other applications for executing on host connects Mouth (common application programming interface, API).
In some embodiments, system 20 is executed according to the standard developed by believable computation organization (TCG) Believable computing system.In this embodiment, safety device 28 can be with dedicated unit driver 52 and at least part of NVM The storage space of device 36 jointly comprises reliable platform module (TPM).In addition, security application 48 may include TCG software Stack (TCG Software Stack, TSS).For example, the three parts TPM master ga(u)ge model being herein incorporated by reference is specification TPM, version 1.2, the second level, revision number on March 1st, 116,2011.Three parts of TPM master ga(u)ge model include: " TPM One major part: design principle ", " the second major part of TPM: TPM structure " and " TPM third major part: instruction ".Citing For, TSS be described on March 7th, 2007 distribution " TCG software stacks (TCG Software Stack, TSS) specification version In this 1.2, the first order, errata A, first part: instruction and structure ", as reference citation to herein.
In some embodiments, believable calculating is executed in personal computer (PC) system.Suitable for pc user's TCG standard is described in such as on 2 24th, 2012, version 1.21, errata revision number 1.00 is (for TPM family 1.2; The second level) " suitable for TCG pc user's special implementing specification of known BIOS " and March 21, version 1.3 in 2013 " the dedicated TPM interface specification of TCG pc user (TPM Interface Specification, TIS) " in, as with reference to drawing It states to herein.
For example, security application 48 provides safe storage service, such as control system resource is to store information Access.In some embodiments, safety storage is by defining one or more safe storage areas in certain predetermined conditions Under can access and realize.For example, these conditions may include address space, system mode, access right, object authority and Read/write protection.
In following narrations, it is assumed that security application 48 is designed to draw directly into interface security device 28 Ru above-mentioned The regulation of TCG specification.
In some embodiments, security application 48 is that respective safety command is transmitted by interface 32 to safety device 28, to provide security service (such as OS for host).When receiving safety command, safety device 28 solve code instruction and from And it executes instruction.
The execution of at least some safety commands is related to accessing NVM device, such as storage and acquisition confidential information.In some realities It applies in example, safety device includes inside (usually small-sized) NVM.In other embodiments, replace or in addition to internal NVM with Outside, safety device access, which can be used, is used for the external NVM of additional use, such as NVM device 36 in system.As described above, in addition to Outside security application 48, CPU44 executes dedicated unit driver 52 and adjusts between safety device 28 and NVM device 36 Solution.It is penetrating to security application 48, device driver 52 provides 28 indirect access external NVM device 36 of safety device.
Safety device 28 can require to access NVM device 36 from device driver 52 in various ways.In one embodiment, pacify Inside full device 28, such as in pre-defined buffer, preparation is required, and generates interrupt signal to notify that device driver is logical Cross 32 reading requirement of interface.In another embodiment, buffer of the device driver poll in safety device, to recognize whether There is requirement co-pending.In still another embodiment, device driver 52 is the buffer number conditionally checked in safety device Value, such as the security application in response to transmission safety command to safety device.
When device driver 52, which receives the write-in from safety device, to be required, device driver is stored in by interface 40 Respective data in external NVM.In some embodiments, before publication write-in requires, safety device encryption and/or label Data.When device driver 52 receives the reading requirement from safety device, device driver passes through interface 40 from external NVM Reading requirement data simultaneously transmit acquisition data to safety device by interface 32.When acquisition data is encrypted and is marked, safety Device can verify that and ciphertext data.
Interface 32 and 40 may include any suitable interface.For example, interface 32 may include low pin number busbar connector (Low Pin Count bus, LPC), serial peripheral interface (Serial peripheral Interface, SPI) or internal collection At circuit (Inter-Integrated Circuit, I2C) busbar connector.For example, interface 40 may include serial peripheral interface (SPI).In some embodiments, interface 32 and 40 includes respective (identical or different) interface.In other embodiments, it connects Mouth 32 and 40 may include same-interface, or share one or more interface signals.
The lower half of Fig. 1 is the block diagram for being painted safety device 28.In this example, safety device 28 includes to pass through inside The microcontroller 60 that the multiple element of busbar connector 62 and safety device interconnects.Microcontroller 60 is used as the master of safety device Control unit.Safety device 28 includes the module that the host interface 64 of host is communicated to connect by interface 32.
Microcontroller 60 is received through the 64 received safety command of institute of host interface, and may be used in due course in safety Other elements in device execute these instructions.Various signals needed for system management module 66 provides device element running, example It such as seem power distribution, clock signal and interrupt signal.In some embodiments, system management module 66 includes one or more A timer can for example be used in time stamp (time-stamping) data.
Safety device 28 includes random access memory (Random Access Memory, RAM) 68, stores temporarily number Accordingly and the coded command of possible microcontroller 60.The module of read-only memory (Read Only Memory, ROM) 72 stores Coded command for microcontroller 60.In addition, ROM72 can store various constant values.It disposably can program (One Time Programmable, OTP) memory 76 safe storage device configuration and depends on generating and (at production) and is directed to Each unique key of safety device.In some embodiments, it substitutes or other than otp memory 76, safety device includes The EEPROM and/or entity that can be used with storage internal confidential can not copy function (Physical Unclonable Function, PUF).
Safety device 28 further includes the crypto engine (cryptographic for supporting various encryption functions and algorithm engine)80.In some embodiments, crypto engine 80 supports encryption primitive (crypto primitive) and algorithm, Such as random number production method (Random Number Generation, RNG), encryption/decryption algorithm, such as advanced encryption mark Quasi- (Advanced Encryption Standard, AES)), for the asymmetric password algorithm (Rivest- of public key encryption Shamir-Adleman, RSA) encryption system, error corrected code/decoding (Error Correction Coding/ ) and cryptographic Hash function method (cryptographic hash function), such as Secure Hash Algorithm Decoding (Secure Hash Algorithm)(SHA-256).Crypto engine 80 provide core encryption function, such as encryption/decryption and Label and verifying.
The believable calculating of pc user
In some embodiments, the system 20 of Fig. 1 includes PC system.The following table 1 is the TCG specification according to top reference, is converged Relationship between the various elements of whole system 20 and the element of corresponding pc user.
Table 1
The configuration of system 20 shown in FIG. 1 and safety device 28 is the example to be purely painted to clearly show that concept The property shown configuration.Furthermore, it is possible to use any other suitable computing system and safety device configuration.It is of the invention to understand The unwanted element of principle institute, can delete for clarity and from schema, such as various interfaces, control circuit, addressing circuit, Sequence circuit and debugging circuit.
In illustrative system configuration shown in Fig. 1, CPU44, safety device 28 and NVM device 36 are used as respective collection It is executed at circuit (ICs).However, in alternative embodiments, at least two CPU, safety device and NVM device can be integrated To single multi-chip package (Multi-Chip Package, MCP) or embedded system chip (System on Chip, SoC it on the respective semiconductor grain in), and can be interconnected by internal busbar connector.
Any suitable hardware can be used to execute for the different elements of safety device 28, such as special application integrated circuit (Application-Specific Integrated Circuit, ASIC) or field effect can plan grid array (Field- Programmable Gate Array,FPGA).In some embodiments, some elements of safety device can be used software or make It is executed with the combination of hardware and software element.For example, in the present embodiment, crypto engine 80 and system management module 66 can be used as application specific hardware modules execution.As another example, stamped signature calculates (signature calculation) and adds Close/decryption function can on the hardware being located in crypto engine 80, on the software executed by microcontroller 60 or according to hardware And the group of software closes execution.
In the described and claimed of lower section, the various elements of the safety device comprising host interface 64 are not generally referred For circuit.
Typically, the CPU44 in host 24 includes general processor (general-purpose processor), It is programmed on software and executes function as described herein.Software can be electronically downloaded in processor by network, such as Or alternatively or additionally it can be provided and/or be stored to non-transitory tangible medium (non-transitory tangible ), such as magnetic storage, optical memory or electronic memory media.
The exemplary methods as performed by safety device
Fig. 2 is schematically painted provides the process of the method for security service according to embodiment as described herein in computing systems Figure.For example, method can be executed by the safety device 28 of Fig. 1.In the described method, it is assumed that safety device is part Computing system, such as the system 20 of (or being similar to) Fig. 1.
Method receives safety command by the module of host interface 64 by safety device 28 in receiving step 100 and (leads to Cross interface 32 and connect host) start.Safety command is originated from security application 48, and recognize one provided by safety device or Multiple cryptographic services.In decoding step 104, the instruction of safety device decoding security is used as the stage to be executed.Decoding result is usual Kenel comprising requiring service and possible one or more parameters, is such as the respective encryption primitive of identification, addressing Parameter and dimension information relevant to the data of application service and the like.
In order to execute instruction, safety device must can access external NVM.Safety device parameter can determine access based on instruction External NVM.Alternatively or additionally, this decision may depend on the inside flag (flags) for being stored in external NVM, parameter and its He can also be restored (restored) at data by safety device if necessary.
In write-in checking step 106, safety device inspection executes instruction whether require to access external NVM.When safety fills When setting needs and writing data into external NVM, method gets down to encryption and markers step 108.In this example, order parameter includes Original plaintext data (plaintext data), and safety device is for example using crypto engine 80 to encrypt and/or mark original Beginning clear data, as safety command standardizes.The following steps 108 get out the encryption and reference numerals of NVM to be stored to external According to.
Step 112 is required in write-in, and safety device is required from the data result of 52 storing step 108 of device driver outside Portion NVM.As described above, safety device is the subordinate of interface 32, and storage operation can be required in various ways, such as preceding institute It states, such as by generating interrupt signal to host.In response to requiring, device driver is read by interface 32 from safety device Step 108 is encrypted and the data of label, and stores data in external NVM by interface 40.
When in step 106, when safety device does not need that external NVM is written, method sets about reading checking step 114, wherein Whether safety device inspection, which executes instruction to require to read, accesses external NVM.If so, method sets about reading requirement step 116, wherein Safety device requires to read the data from external NVM from device driver 52.In response to reading requirement, device driver 52 is logical It crosses interface 40 and reads the data required by external NVM device 36, and acquisition data is transmitted to safety device by interface 32. In decryption and verification step 120, data are read in safety device verifying and decryption, such as use crypto engine 80.
In subsequent step 112 or 120, or when the inspection result in step 114 is negative, method gets down to the finger connected It enables and executes step 124.In step 124, safety device executes safety command or part of it, may use from external NVM institute The data of acquisition.Step 126 is terminated in circuit, safety device checks whether that the additional outside NVM that accesses is necessary to complete to hold Row instruction.When needing additional access, method is recycled back to step 106.Conversely, method gets down to respond preliminary step 128.
In step 128, safety device reserved instruction is responded, for example, its may include the result of encryption function, error report and Its analog.In response notification step 132, safety device notice security application is ready for instruction and responds.It is similar to State the method for claimed apparatus driver, safety device can for example can by generating interrupt signal or security application Pre-defined buffer of the poll in safety device, to notify security application.Security application then passes through interface 32, which read the instruction from safety device, responds, and ending method.
The method of Fig. 2 is method that is given by way of example, and can also be used other suitable.For example, some In embodiment, safety command can indicate that external NVM is written original plaintext into or read original plaintext from external NVM.Such In embodiment, it may skip step 108 and 120.
Although above-described embodiment, referring especially to computing systems such as such as PC, similar embodiment also can be performed in other calculating In system, such as mobile device, Internet of Things, intelligent electric meter (smart metering), automobile-used and industrial system/environment.
Disclosed technology can be used in various safe storage applications, such as be clean boot (secured ) or believable starting (trusted booting) booting.For example, believable computation organization (TCG) specified in more detail packet The unification of support clean boot function contained in 8 operating system of Windows may extend away firmware interface (Unified Extensible Firmware Interface,UEFI).As another example, Chromium operating system includes as credible Rely the verifying startup function of starting scheme.These functions can be executed using method described herein and system.
It will be appreciated that being only for example property of above-described embodiment illustrates, and the present invention is not limited to being particularly shown for this paper And explanation.But scope of the invention includes the combination and sub-portfolio and technical field of various features described herein Technical staff can carry out in reading above content and not be exposed in variation and modification in the prior art.It quotes from as a reference The integrated part of present application should be regarded as to the file of the present patent application, unless any defined in and file whole at these Word range has with the definition in this specification explicitly or implicitly when conflicting, then should only consider the definition in the application.

Claims (17)

1. a kind of provide the method for security service to host in safety device, which is characterized in that the method includes:
One security service a to host is provided in a safety device, and receives and applies journey from one executed on the host One safety command of sequence can access the non-voltile memory dress outside the safety device when wherein the safety command executes It sets;And
By a dedicated unit driver and penetrating to the application program, allow the safety device and the non-volatile memory devices it Between linked up so that the safety device represent the application program execute the safety command with access the non-voltile memory dress It sets, wherein the dedicated unit driver executes on the host and in the non-volatile memory devices and the safety It is reconciled between device;
The instruction when completing the execution of the safety command is prepared in the safety device to respond, and indicates the application The described instruction that program is ready for reading to the application program is responded.
2. the method according to claim 1, wherein the safety device, the dedicated unit driver and The non-volatile memory devices all meet the respective safety standard of believable computation organization.
3. the method according to claim 1, wherein the safety device and the dedicated unit driver and Regulation enforcement of at least part of non-volatile memory devices storage space together according to believable computation organization is credible Rely console module.
4. the method according to claim 1, wherein the step of executing the safety command is included in the application Communication connection is established between program and the dedicated unit driver, the safety device is main prosecutor and institute in the host It states on the interface that safety device is slave side.
5. according to the method described in claim 4, it is characterized in that, the step of executing the safety command includes to be connect by described Mouth between the dedicated unit driver and the non-volatile memory devices to establish communication connection.
6. according to the method described in claim 4, it is characterized in that, the step of executing the safety command includes to pass through the peace Full device requires the dedicated unit driver to write data into the non-volatile memory devices, or from it is described it is non-volatile in Cryopreservation device reads data.
7. according to the method described in claim 6, it is characterized in that, it is desirable that institute is included in the step of the dedicated unit driver It states preparation one inside safety device to require, and the dedicated unit driver is sent a signal to by the interface with described in obtaining It is required that.
8. according to the method described in claim 6, it is characterized in that, it is desirable that institute is included in the step of the dedicated unit driver It states preparation one in a buffer of safety device to require, the dedicated unit driver passes through the dedicated unit driver poll The buffer is to obtain the requirement.
9. a kind of safety device, which is characterized in that the safety device includes:
One host interface, the host interface are configured to receive the safety from the application program executed on a host Instruction can access the non-volatile memory devices outside the safety device when wherein the safety command executes;And
One circuit, the circuit configuration is with by one non-volatile memory devices of access, to execute the safety command, this is non-volatile Property memory device by a dedicated unit driver and penetrating to the application program, between the non-volatile memory devices into Row is linked up, and the dedicated unit driver is executed on the host and in the non-volatile memory devices and the peace It is reconciled between full device;
The circuit is that the instruction configured with preparation when completing the execution of the safety command is responded, and indicates the application The described instruction that program is ready for reading to the application program is responded.
10. safety device according to claim 9, which is characterized in that the safety device and the dedicated unit drive Device and at least part of non-volatile memory devices storage space are held according to the specification of believable computation organization together Row reliable platform module.
11. safety device according to claim 9, which is characterized in that the circuit is configuration by the application Communication connection is established between program and the dedicated unit driver to execute the safety command, the safety device is in institute State that host is main prosecutor and the safety device is on an interface of slave side.
12. safety device according to claim 11, which is characterized in that the circuit be configured to by the interface with The communication link established between the dedicated unit driver and the non-volatile memory devices, which fetches, executes the safety command.
13. safety device according to claim 11, which is characterized in that the circuit is configuration to require the dedicated dress Set driver writes data into the non-volatile memory devices or reads data from the non-volatile memory devices.
14. safety device according to claim 13, which is characterized in that the circuit is configuration for the safety dress It sets and is required in inside preparation one, and the dedicated unit driver is sent a signal to obtain the requirement by the interface.
15. a kind of safety equipment, which is characterized in that the safety equipment includes:
One safety device, the safety device provide a security service a to host, and receive to come from and execute on the host An application program a safety command, can be accessed when wherein the safety command executes one non-volatile outside the safety device Property memory device;And
One dedicated unit driver, the dedicated unit driver execute on the host,
Wherein, by the dedicated unit driver and penetrating to the application program, allow the safety device and this it is non-volatile in It is linked up between cryopreservation device, so that the safety device represents the application program, to execute the safety command non-volatile to access this Property memory device, wherein the dedicated unit driver execute on the host and in the non-volatile memory devices and It is reconciled between the safety device.
16. safety equipment according to claim 15, which is characterized in that the safety device, dedicated unit driving Device and the non-volatile memory devices all meet the respective safety standard of believable computation organization.
17. safety equipment according to claim 15, which is characterized in that the application program and the safety device quilt Configuration is communicatively coupled by an interface with the dedicated unit driver, wherein the host is used as master control and the peace Full device is used as subordinate.
CN201610326247.1A 2015-05-17 2016-05-17 Safety device and method of the security service to host, safety equipment are provided in it Active CN106156632B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US14/714,298 2015-05-17
US14/714,298 US10303880B2 (en) 2014-07-24 2015-05-17 Security device having indirect access to external non-volatile memory

Publications (2)

Publication Number Publication Date
CN106156632A CN106156632A (en) 2016-11-23
CN106156632B true CN106156632B (en) 2019-10-29

Family

ID=57354017

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610326247.1A Active CN106156632B (en) 2015-05-17 2016-05-17 Safety device and method of the security service to host, safety equipment are provided in it

Country Status (1)

Country Link
CN (1) CN106156632B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI733399B (en) * 2019-04-07 2021-07-11 新唐科技股份有限公司 Secured device, secured method, secured system, and secured apparatus
TWI731407B (en) * 2019-09-09 2021-06-21 新唐科技股份有限公司 Key management device having bypass channels and processor chip
TWI791138B (en) * 2019-09-12 2023-02-01 新唐科技股份有限公司 Security monitoring of serial peripheral interface flash

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202067280U (en) * 2010-08-25 2011-12-07 深圳中泽明芯科技有限公司 Protective device for embedded software
CN102819699A (en) * 2012-06-04 2012-12-12 珠海欧比特控制工程股份有限公司 Processor system
CN104376277A (en) * 2013-08-13 2015-02-25 华邦电子股份有限公司 Computing device, method and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7774619B2 (en) * 2004-11-17 2010-08-10 Broadcom Corporation Secure code execution using external memory

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202067280U (en) * 2010-08-25 2011-12-07 深圳中泽明芯科技有限公司 Protective device for embedded software
CN102819699A (en) * 2012-06-04 2012-12-12 珠海欧比特控制工程股份有限公司 Processor system
CN104376277A (en) * 2013-08-13 2015-02-25 华邦电子股份有限公司 Computing device, method and system

Also Published As

Publication number Publication date
CN106156632A (en) 2016-11-23

Similar Documents

Publication Publication Date Title
US10303880B2 (en) Security device having indirect access to external non-volatile memory
US11843705B2 (en) Dynamic certificate management as part of a distributed authentication system
US11809544B2 (en) Remote attestation for multi-core processor
CN110084043B (en) Apparatus and method for providing trusted platform module services
JP5411122B2 (en) Information processing device
US10545770B2 (en) Configurable client hardware
US8006100B2 (en) Enhancing trusted platform module performance
CN102298529B (en) Providing silicon integrated code for a system
CN103914658A (en) Safe starting method of terminal equipment, and terminal equipment
US10846438B2 (en) RPMC flash emulation
WO2018086469A1 (en) Data storage method utilized in non-volatile storage space in integrated circuit, and trusted integrated circuit
US20180285600A1 (en) Connected secure iot processor
US11216389B2 (en) Device with multiple roots of trust
CN106156632B (en) Safety device and method of the security service to host, safety equipment are provided in it
US20230273977A1 (en) Managing ownership of an electronic device
JP6769999B2 (en) Secure computing environment
US11657157B2 (en) Secure boot system, method and apparatus
US20230078138A1 (en) Computing systems employing measurement of boot components, such as prior to trusted platform module (tpm) availability, for enhanced boot security, and related methods
US11822668B2 (en) Systems and methods for authenticating configurations of an information handling system
US20230010319A1 (en) Deriving independent symmetric encryption keys based upon a type of secure boot using a security processor
CN111177752B (en) Credible file storage method, device and equipment based on static measurement
KR20230082388A (en) Apparatus for verifying bootloader of ecu and method thereof
US20230015334A1 (en) Deriving dependent symmetric encryption keys based upon a type of secure boot using a security processor
CN116956267A (en) Management controller based verification of platform certificates
CN106919856A (en) Safety mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant