CN116340953A - Trusted application method of embedded device of multi-CPU board card and embedded device - Google Patents

Trusted application method of embedded device of multi-CPU board card and embedded device Download PDF

Info

Publication number
CN116340953A
CN116340953A CN202310267168.8A CN202310267168A CN116340953A CN 116340953 A CN116340953 A CN 116340953A CN 202310267168 A CN202310267168 A CN 202310267168A CN 116340953 A CN116340953 A CN 116340953A
Authority
CN
China
Prior art keywords
trusted
board card
embedded device
cpu
board
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310267168.8A
Other languages
Chinese (zh)
Inventor
缪海飞
林青
曹翔
唐大圆
陶耕宇
陈宝鼎
胡绍谦
汤震宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NR Electric Co Ltd
NR Engineering Co Ltd
Original Assignee
NR Electric Co Ltd
NR Engineering Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NR Electric Co Ltd, NR Engineering Co Ltd filed Critical NR Electric Co Ltd
Priority to CN202310267168.8A priority Critical patent/CN116340953A/en
Publication of CN116340953A publication Critical patent/CN116340953A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multi Processors (AREA)

Abstract

The invention discloses a trusted application method of an embedded device of a multi-CPU board card and the embedded device, wherein the embedded device of the multi-CPU board card comprises a plurality of CPU board cards connected through a data bus, the CPU board cards are divided into a master trusted board card and a plurality of slave trusted board cards, a trusted platform control module is arranged on the master trusted board card, and the method is executed by the trusted platform control module and comprises the following steps: after the power-on self-test of the trusted platform control module is finished, the operating system of the main trusted board card is guided to start; after the master trusted board card is started, the operating system of the slave trusted board card is guided to start. The invention standardizes the trusted management flow of the embedded device of the multi-CPU board card and improves the safety of the embedded device of the multi-CPU board card.

Description

Trusted application method of embedded device of multi-CPU board card and embedded device
Technical Field
The invention belongs to the technical field of embedded devices, and particularly relates to a trusted application method of an embedded device of a multi-CPU board card and the embedded device.
Background
The existing multi-CPU embedded device mainly adopts safety protection measures of boundary protection, lacks safety protection capability of application management of equipment, and has the following defects: 1) When the device is powered on and started and operated, the device is easy to attack by a malicious program implanted in advance, so that the system operation environment is unsafe; 2) The multi-CPU embedded device is difficult to intensively control respective CPU boards, is more vulnerable to virus programs, and affects the safety of equipment; 3) The prior trusted application technology aims at a single CPU board card, and the application on an embedded device of a plurality of CPU board cards can cause the trusted management confusion.
Disclosure of Invention
In order to solve the defects in the prior art, the invention provides a trusted application method of the embedded device of the multi-CPU board card and the embedded device, which standardizes the trusted management flow of the embedded device of the multi-CPU board card and improves the safety of the embedded device of the multi-CPU board card.
In order to achieve the above purpose, the technical scheme adopted by the invention is as follows:
in a first aspect, a trusted application method of an embedded device is provided, where the embedded device includes a plurality of CPU boards connected by a data bus, the CPU boards are divided into a master trusted board and a plurality of slave trusted boards, and a trusted platform control module is installed on the master trusted board, and the method is executed by the trusted platform control module and includes: after the power-on self-test of the trusted platform control module is finished, the operating system of the main trusted board card is guided to start; after the master trusted board card is started, the operating system of the slave trusted board card is guided to start.
Further, a trusted agent is embedded in the operating system kernel of each CPU board card.
Further, each CPU board card is provided with a trusted software base for managing the application program white list of the CPU board card.
Further, the trusted platform control module is in communication with each slave trusted board card through a data bus and a proprietary protocol.
In a second aspect, an embedded device is provided, including a plurality of CPU boards connected by a data bus, where the CPU boards are divided into a master trusted board and a plurality of slave trusted boards, and a trusted platform control module is installed on the master trusted board.
Compared with the prior art, the invention has the beneficial effects that:
(1) The invention is divided into a main trusted board card and a plurality of slave trusted board cards by a plurality of CPU board cards connected through a data bus, wherein a trusted platform control module is arranged on the main trusted board card, and an operating system of the main trusted board card is guided to start after the power-on self-test of the trusted platform control module is finished; after the master trusted board card is started, the operating system of the slave trusted board card is guided to start; the trusted management flow of the embedded device of the multi-CPU board card is standardized, and the safety of the embedded device of the multi-CPU board card is improved;
(2) The trusted platform control module firstly performs power-on self-test, ensures the credibility of the system operation hardware environment, and avoids implantation attack of malicious programs;
(3) The control function of the trusted software base is supported by the trusted platform control module, and an operating environment is provided for the trusted software base;
(4) The invention supports the control function of the trusted software base through the trusted platform control module and provides an operating environment for the trusted software base. Synchronizing the trusted management function of the trusted platform control module through an internal bus and a private protocol, wherein the trusted platform control module measures all CPU board cards through the bus, and ensures the trusted of all board card hardware environments;
(5) The invention completes the white list management of the application program through the trusted software base on each board card, and prevents the malicious process outside the white list from starting.
Drawings
Fig. 1 is a schematic diagram of a trusted application method of an embedded device of a multi-CPU board card according to an embodiment of the present invention.
Detailed Description
The invention is further described below with reference to the accompanying drawings. The following examples are only for more clearly illustrating the technical aspects of the present invention, and are not intended to limit the scope of the present invention.
As shown in fig. 1, a trusted application method of an embedded device of a multi-CPU board card, the embedded device of the multi-CPU board card includes a plurality of CPU boards connected through a data bus, the CPU boards are divided into a master trusted board and a plurality of slave trusted boards, a Trusted Platform Control Module (TPCM) is installed on the master trusted board, and the method is executed by the trusted platform control module and includes: after the power-on self-test of the trusted platform control module is finished, the operating system of the main trusted board card is guided to start; after the master trusted board card is started, the operating system of the slave trusted board card is guided to start.
After the embedded device of the multi-CPU board card is electrified, a trusted platform control module TPCM integrated on a main trusted board card of the embedded device is electrified to run self-checking, after the state checking is completed, the TPCM guides the main trusted board card uboot to start, and control rights are given to the CPU of the main trusted board card, and the control device becomes a control device and provides trusted service for the calculation process. In the whole process from the system to the normal operation of the device, the TPCM independently works in parallel with and is not influenced by the computing component of the device, and the TPCM module supports the trusted computing function of the whole device and ensures the credibility of the system operation hardware environment. And starting an operating system of the main trusted board card through a trusted platform control module TPCM, and ensuring the credibility of the operating environment after the main trusted board card is powered on.
After the embedded device of the multi-CPU board card is electrified, the slave trusted board card is physically connected with the master trusted board card through the special data bus, after TPCM self-checking is finished, uboot on the slave trusted board card is guided to start through a private protocol, and after trusted measurement is finished, control right is given to the CPU of the slave trusted board card. The master and slave trusted boards are connected through an internal data bus, and the measurement and control functions of the TPCM are synchronized through the bus, so that the operating system of the slave trusted board is actively measured after the TPCM is powered on, and the credibility of the operating environment of the slave trusted board is ensured after the slave trusted board is powered on.
The control function of the trusted software base is supported by the TPCM, the trusted software base provides a trusted software running environment for system software and application programs on respective boards, and the trusted software base realizes active measurement of the system software and the application software under the support of the TPCM.
The trusted software base is installed on the master and slave trusted boards, the trusted management of the application programs required by the device is completed through the measurement function of the trusted software base, the application programs required by the normal operation of the device are added into the white list management catalog, the starting of malicious processes outside the white list is prevented, and the equipment is prevented from being attacked by modes such as the starting of the malicious programs in the operation process. The application program in the invention comprises the following steps: binary executable programs, running scripts and the like, and when detecting that the measurement results of hardware, system software and application programs are inconsistent with the expected results, recording the measurement results and prompting an alarm.
The embedded device of the multi-CPU board card shares the trusted root of the main trusted board card, the unique trust source point ensures the trusted running environment of the device, greatly improves the endogenous security defense capability of the device, simplifies the trusted management flow of the multi-CPU embedded device, and further improves the safety and usability of the device.
The invention also provides an embedded device, which comprises a plurality of CPU boards connected through a data bus, wherein the CPU boards are divided into a master trusted board and a plurality of slave trusted boards, and a trusted platform control module is arranged on the master trusted board. The operating system kernel of each CPU board is embedded with a trusted agent. And each CPU board card is provided with a trusted software base for managing the application program white list of the CPU board card. The trusted platform control module is connected with each slave trusted board card through a data bus and a private protocol.
The foregoing is merely a preferred embodiment of the present invention, and it should be noted that modifications and variations could be made by those skilled in the art without departing from the technical principles of the present invention, and such modifications and variations should also be regarded as being within the scope of the invention.

Claims (8)

1. The trusted application method of the embedded device is characterized in that the embedded device comprises a plurality of CPU boards connected through a data bus, the CPU boards are divided into a master trusted board and a plurality of slave trusted boards, a trusted platform control module is installed on the master trusted board, and the method is executed by the trusted platform control module and comprises the following steps:
after the power-on self-test of the trusted platform control module is finished, the operating system of the main trusted board card is guided to start;
after the master trusted board card is started, the operating system of the slave trusted board card is guided to start.
2. The method of claim 1, wherein a trusted agent is embedded in an operating system kernel of each CPU board.
3. The method of claim 1, wherein each of the CPU boards has a trusted software base installed thereon for managing a white list of applications on the CPU board.
4. The method of claim 1, wherein the trusted platform control module is in communication with each slave trusted board card via a data bus and a proprietary protocol.
5. The embedded device is characterized by comprising a plurality of CPU boards connected through a data bus, wherein the CPU boards are divided into a master trusted board and a plurality of slave trusted boards, and a trusted platform control module is arranged on the master trusted board.
6. The embedded device of claim 5, wherein a trusted agent is embedded in an operating system kernel of each of the CPU boards.
7. The embedded device of claim 5, wherein each of the CPU boards has a trusted software base installed thereon for managing a white list of applications for the CPU board.
8. The embedded appliance of claim 5, wherein the trusted platform control module is in communication with each slave trusted board card via a data bus and a proprietary protocol.
CN202310267168.8A 2023-03-20 2023-03-20 Trusted application method of embedded device of multi-CPU board card and embedded device Pending CN116340953A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310267168.8A CN116340953A (en) 2023-03-20 2023-03-20 Trusted application method of embedded device of multi-CPU board card and embedded device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310267168.8A CN116340953A (en) 2023-03-20 2023-03-20 Trusted application method of embedded device of multi-CPU board card and embedded device

Publications (1)

Publication Number Publication Date
CN116340953A true CN116340953A (en) 2023-06-27

Family

ID=86883326

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310267168.8A Pending CN116340953A (en) 2023-03-20 2023-03-20 Trusted application method of embedded device of multi-CPU board card and embedded device

Country Status (1)

Country Link
CN (1) CN116340953A (en)

Similar Documents

Publication Publication Date Title
US11093258B2 (en) Method for trusted booting of PLC based on measurement mechanism
EP1727625B1 (en) Cooperative embedded agents
KR100524055B1 (en) Computer system having the function of remote waking up and method for remote waking up the computer system
US20190073478A1 (en) Hardware-enforced firmware security
US9990325B2 (en) Universal serial bus (USB) filter hub malicious code prevention system
JP2012198926A (en) Hardware-based anti-virus scan service
CN113468535B (en) Trusted measurement method and related device
CN109670349A (en) The hardware structure of trusted computer and the credible starting method of computer
CN110348223B (en) Static measurement method based on dual-architecture trusted computing platform
US20220405393A1 (en) Perform verification check in response to change in page table base register
TW202044022A (en) Update signals
CN111125707A (en) BMC (baseboard management controller) safe starting method, system and equipment based on trusted password module
US20230222226A1 (en) Memory scan-based process monitoring
US20080148390A1 (en) Secure program launch
CN112883369A (en) Credible virtualization system
CN114077739A (en) Method and device for starting rapid Peripheral Component Interconnect (PCI) equipment and storage medium
CN116340953A (en) Trusted application method of embedded device of multi-CPU board card and embedded device
CN112219186A (en) Method for installing a program code package in a device, device and motor vehicle
US20200244461A1 (en) Data Processing Method and Apparatus
CN115964117A (en) Credibility measuring method and device, computer equipment and readable medium
CN113922988A (en) Host security policy detection method and system based on network
Intel
US20160246637A1 (en) Determining Trustworthiness of a Virtual Machine Operating System Prior To Boot UP
CN114625600B (en) Method for executing by computer system, computer readable storage medium and computer platform
TW202024980A (en) Hardware structure of a trusted computer and trusted booting method for a computer

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination