GM/T 0058-2018 English PDF
Price & Delivery
US$610.00 · In stock · Download in 9 secondsGM/T 0058-2018: Trusted computing - TCM service module interface specification
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure
Status: Valid
| Standard ID | USD | BUY PDF | Delivery | Standard Title (Description) | Status |
| GM/T 0058-2018 | 610 | Add to Cart | Auto, 9 seconds. | Trusted computing - TCM service module interface specification | Valid |
Click to Preview this PDF
Similar standards
GM/T 0058-2018: Trusted computing - TCM service module interface specification
---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GMT0058-2018CRYPTOGRAPHIC INDUSTRY STANDARD ICS 35.040 L 80 Registration number. 62993-2018 GB/T 0058-2018 Trusted computing - TCM service module interface specification Issued on. MAY 02, 2018 Implemented on. MAY 02, 2018 Issued by. State Cryptography Administration
Table of Contents
Foreword... 3 Introduction... 4 1 Scope... 5 2 Normative references... 5 3 Terms and definitions... 5 4 Abbreviations... 9 5 Software architecture... 10 6 TCM application service... 11 6.1 Definition of class... 11 6.2 Relationship between class and object... 13 6.3 Interface... 15 7 TCM core services... 146 7.1 Management of TCM core service... 146 7.2 Trusted cryptographic module management... 159 7.3 Platform identity and authentication... 191 7.4 Protection of platform data... 200 7.5 Integrity measurements and reports... 227 8 TDDL device driver library... 230 8.1 TDDL architecture... 230 8.2 TDDL memory management... 231 8.3 TDDL error codes and definitions... 231 8.4 TDDL interface... 231 Appendix A (Normative) Interface data structure... 239 A.1 Basic definition... 239 A.2 Data structure... 259 A.3 Processing of authorization data... 265Foreword
This standard was drafted in accordance with the rules given in GB/T 1.1-2009. Please note that some of the contents of this document may involve patents. The issuing organization of this document is not responsible for identifying these patents. This standard was proposed by and shall be under the jurisdiction of the Cryptographic Industry Standardization Technical Committee. Drafting organizations of this standard. National Technology Co., Ltd., Legend Holdings Co., Ltd., Tongfang Co., Ltd., Institute of Software of Chinese Academy of Sciences, Beijing Zhaori Technology Co., Ltd., Ruida Information Security Industry Co., Ltd., Changchun Jida Zhengyuan Information Technology Co., Ltd., Founder Technology Group Co., Ltd., Beijing Information Science and Technology University, China Great Wall Computer Shenzhen Co., Ltd., Chengdu Weishitong Information Industry Co., Ltd., Wuxi Jiangnan Information Security Engineering Technology Center, National Defense Science and Technology University of China, Beijing University of Technology. The main drafters of this standard. Wu Qiuxin, Yang Xianwei, Fan Qin, Zou Hao, Yu Fajiang, Ning Xiaokui, Wang Zi, Zheng Bike, Liu Xin, Lin Yang, Li Weiping, Yin Hongbing, Xu Zhen, Yan Fei, Fu Yuepeng, Ming Ming, Liu Ren, Li Feng, Xu Yong, Jia Bing, Wang Lei, Gu Jian, He Changlong, Qin Yu.1 Scope
This standard specifies the composition and interface standards of the TCM service module, including TSP, TCS, TDDL, which are TCM application layer- faced interface standards. This standard applies to the development of TCM-based application.2 Normative references
The following documents are essential to the application of this document. For the dated documents, only the versions with the dates indicated are applicable to this document; for the undated documents, only the latest version (including all the amendments) are applicable to this standard. GB/T 32905-2016 Information security technology SM3 cryptographic hash algorithm3 Terms and definitions
The following terms and definitions apply to this document. The master key used to protect the platform identity key and user key, which is an implementation of the trusted storage root. A support system built into a computing system for implementing trusted computing functions.4 Abbreviations
The following abbreviations apply to this document.5 Software architecture
The software architecture of the TCM service module is as shown in Figure 1. This standard makes explanation using the C language as an example to compile relevant functions and interfaces.6 TCM application service
Work objects can be subdivided into authorized work objects and unauthorized work objects. Unauthorized work objects include PCR composite objects and hash objects, as shown in Figure 2.Authorized objects include TCM objects, key objects, NV storage objects, migration data objects, encrypted data objects, as shown in Figure 3.7 TCM core services
Obtain event information of the specified PCR in the PCR event manager in the TCS. It returns the specified PCR event information if pNumber has a specific value. If it is NULL, it returns all event information of the specified PCR. Obtain the PCR event information of the specified PCR from the start of the specified event.8 TDDL device driver library
Table 26 lists the error codes that appear in TDDL. In addition, the error code associated with it is listed in each Tddli function definition (specific values can be defined by the manufacturer). This function directly passes the TCM command to the TCM device driver, so that the TCM completes the corresponding operation. It also provides a channel for the TCM parameters. ......Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.