US 12,235,996 B2
Security architecture system, security management method, and computing device
Qiang Dou, Tianjin (CN); Yufeng Guo, Tianjin (CN); Yanzhao Feng, Tianjin (CN); Ming Zhang, Tianjin (CN); and Zhuo Ma, Tianjin (CN)
Assigned to PHYTIUM TECHNOLOGY CO., LTD., Tianjin (CN)
Filed by Phytium Technology Co., Ltd., Tianjin (CN)
Filed on Nov. 23, 2022, as Appl. No. 17/993,428.
Claims priority of application No. 202111398273.2 (CN), filed on Nov. 24, 2021.
Prior Publication US 2023/0161911 A1, May 25, 2023
Int. Cl. G06F 21/57 (2013.01); G06F 11/36 (2006.01); G06F 21/53 (2013.01); G06F 21/62 (2013.01); G06F 21/71 (2013.01)
CPC G06F 21/6281 (2013.01) [G06F 21/53 (2013.01); G06F 21/71 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A security architecture system comprising:
a plurality of subsystems, the plurality of subsystems including a secure element (SE) subsystem, a first subsystem of the plurality of subsystems being constructed with a trusted computing platform, the trusted computing platform including a trusted platform control module, wherein:
the first subsystem is configured to, for a running object in one or more subsystems other than the first subsystem in the plurality of subsystems, use the trusted platform control module to perform security measurement on the running object based on a measurement strategy and a measurement benchmark value to obtain a measurement result, the measurement result being used to control a running state of the running object in the one or more subsystems other than the first subsystem in the plurality of subsystems.