A kind of method for designing of the secure and trusted computing machine based on FPGA
Technical field
The present invention relates to field of computer technology, specifically a kind of method for designing of the secure and trusted computing machine based on FPGA.
Background technology
In the common computer framework of prior art, when starting, normally move and read and write data, there is larger potential safety hazard in computer system, and its information encryption is that the Encryption Design cost of a very complicated process, especially ASIC hardware is higher.
Along with the development of production technology, FPGA(field programmable gate array) cost is more and more lower, and because of himself configurable feature, makes, in a lot of application, to replace gradually ASIC, based on this, the invention provides a kind of method for designing of secure and trusted computing machine.
Summary of the invention
Technical assignment of the present invention is to solve the deficiencies in the prior art, and a kind of method for designing of the secure and trusted computing machine based on FPGA is provided.
Technical scheme of the present invention realizes in the following manner, the method for designing of this kind of secure and trusted computing machine based on FPGA, and its specific design step is:
One, common computer framework is installed;
Two, between CPU, bridge sheet, BIOS, hard disk, Ethernet, secure and trusted module is installed, this secure and trusted module comprises FPGA, CPLD and storer, wherein FPGA is connected with above-mentioned CPU, bridge sheet, BIOS, hard disk, Ethernet, CPLD connects this FPGA, and storer connects this CPLD; Wherein CPLD completes the control to FPGA configuration: i.e. the selection to the safety encipher of configuration data and configuration data; The configuration information and the encryption key that in storer, comprise FPGA;
Three, for system powers on, the information configuration FPGA in CPLD read memory, this FPGA completes the control to the tolerance of BIOS and system electrifying timing sequence, startup system;
Four, after system starts, the data that FPGA reads in or exports computing machine are carried out safety encipher.
Described FPGA is provided with two, and wherein one is connected with CPU, BIOS, and another piece is connected with bridge sheet, Ethernet and hard disk.
The detailed process of described step 3 is: after system powers on, and by the configuration information configuration FPGA mono-in CPLD storer, this FPGA mono-tolerance BIOS, after success, by cpu reset, system starts; By configuration information configuration FPGA bis-in CPLD read memory, system is by bridge sheet and FPGA bis-, the peripherals such as initialization network and hard disk; Last computing machine normally starts.
The detailed process of described step 4 is: during system operation, the reading and writing data of network and hard disc apparatus, all, by the tolerance logic metric of FPGA bis-, guarantees data security.
The beneficial effect that the present invention compared with prior art produced is:
The method for designing of a kind of secure and trusted computing machine based on FPGA of the present invention is in common computer framework, add the secure and trusted module based on FPGA, make computer system when starting, normally move and read and write data, all pass through the tolerance of secure and trusted module, thereby reach safe and reliable object, safe, practical, monitoring management cost is low, is easy to promote.
Accompanying drawing explanation
Accompanying drawing 1 is structural representation of the present invention.
Mark in accompanying drawing represents respectively:
1, CPU, 2, bridge sheet, 3, BIOS, 4, secure and trusted module, 4.1, storer, 4.2, CPLD, 4.3, FPGA mono-, 4.4, FPGA bis-, 5, hard disk, 6, network.
Embodiment
Below in conjunction with accompanying drawing, the method for designing of a kind of secure and trusted computing machine based on FPGA of the present invention is described in detail below.
As shown in Figure 1, the method for designing of this kind of secure and trusted computing machine based on FPGA, its specific design step is:
One, common computer framework is installed;
Two, between the core components such as CPU1, bridge sheet 2, BIOS3, hard disk 5, Ethernet 6 and peripherals, secure and trusted module 4 is installed, the Ethernet 6 here refers to network interface card hardware device, this secure and trusted module 4 comprises FPGA, CPLD4.2 and storer 4.1, wherein FPGA is connected with above-mentioned CPU1, bridge sheet 2, BIOS3, hard disk 5, Ethernet 6, CPLD4.2 connects this FPGA, and storer 4.1 connects this CPLD4.2; Wherein CPLD4.2 completes the control to FPGA configuration: i.e. the selection to the safety encipher of configuration data and configuration data; The configuration information and the encryption key that in storer 4.1, comprise FPGA;
Three, for system powers on, the information configuration FPGA in CPLD4.2 read memory 4.1, this FPGA completes the control to the tolerance of BIOS3 and system electrifying timing sequence, startup system;
Four, after system starts, the data that FPGA reads in or exports computing machine are carried out safety encipher.
Described FPGA is provided with two, and wherein one is connected with CPU1, BIOS3, and another piece is connected with bridge sheet 2, Ethernet 6 and hard disk 5.
The detailed process of described step 3 is: after system powers on, by the configuration information configuration FPGA 1 in CPLD4.2 storer 4.1, these FPGA mono-4.3 tolerance BIOS3, after success reset CPU1, and system starts; By configuration information configuration FPGA 2 4.4 in CPLD4.2 read memory 4.1, system is by bridge sheet 2 and FPGA 2 4.4, the peripherals such as initialization network 6 and hard disk 5; Last computing machine normally starts.
The detailed process of described step 4 is: during system operation, the reading and writing data of network 6 and hard disk 5 equipment, all, by the tolerance logic metric of FPGA 2 4.4, guarantees data security.
Computer system, when starting, normally move and read and write data, is all passed through the tolerance of secure and trusted module 4, thereby is reached safe and reliable object like this.
Except technical characterictic described in instructions, be the known technology of those skilled in the art.