An integrity check method for remote network service

A technology of integrity check and network service, which is applied in the direction of data exchange network, digital transmission system, electrical components, etc., can solve the problems of poor versatility, scalability and application compatibility, infeasibility, and difficulty in modifying network application protocols. Achieve the effect of preventing malicious programs from stealing or power abuse

Inactive Publication Date: 2009-11-11
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The universality, scalability and application compatibility of this remote trusted path scheme, which relies on the implementation of the network service program, are poor
In order to support a new network service, the network application protocol and server program must be modified, and sometimes it is difficult or even impossible to modify the network application protocol; for trusted access to each network service, in addition to the dedicated server-side program, it must also With specially supported client programs, this requires re-providing a complete set of server-side and client-side programs without reusing existing programs
The more important problem is that this scheme actually requires complete trust in the service routines of network services, and cannot deal with the security loopholes in the service program itself, and the situation that it is invaded or replaced by malicious programs.
However, since network service programs usually run in the application layer process context like ordinary applications, there is also the possibility of being infected by malicious programs, and cannot be fully trusted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An integrity check method for remote network service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The process of a remote network service inspection is shown in the attached figure, wherein the steps in the dashed box are unnecessary steps. The whole process includes: the client sends a network service inspection request message to the remote server, and then waits for the server to reply; the server first authenticates the client's identity after receiving the inspection request, then processes the legal request to check the integrity of the specified network service, and tries to restore the service that failed the inspection , and finally reply the test result of the network service to the customer; the customer confirms whether the remote network service is currently complete and reliable by the server’s reply notification, and initiates service access if there is no problem.

[0024]The client program of the remote network service integrity inspection described in the present invention is easy to realize, and can be implemented as a common inspection client soft...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for checking the integrity of remote network services, which includes a network service checking protocol and an integrity checking mechanism on the server side: the protocol stipulates that the client sends a message request of a specific format to a specific network port of the remote server to check the status of the specified network service. Integrity, the listening port used by the network service to be tested is specified in the message; after receiving the test request, the remote server checks the integrity of the corresponding service process, service program image file and other related files based on the network service policy to determine the integrity of the network service The current security status, and the inspection results will be returned to the client, thereby establishing a trusted path for remote clients to access network services. The method is generally applicable to different network services and is transparent to applications, and can be compatible with common server-side and client-side programs. Moreover, the method can be implemented by a trusted module or trusted process at the server side, and its reliability does not depend on specific network service programs and is free from malicious application programs.

Description

technical field [0001] The invention relates to the field of information security, in particular to the security guarantee technology of remote network services. Background technique [0002] A security system must provide a mechanism to ensure that the user's path to the system is safe and credible, free from malicious program intrusion or forgery. For accessing the system through a local terminal, the existing operating system generally provides a trusted path mechanism. There are two common implementation methods: one is to reserve an uncoverable warning area on the display output interface of the system for Indicates the current security state of the system, and provides a mechanism for the user to call to switch the system to a secure state; the second is the Secure Attention Key (SAK) mechanism. The SAK key settings used by different systems may be different, and the title and specific processing may also be different, but the basic principle is the same, that is, the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26H04L29/06H04L29/10
CPCH04L63/0876
Inventor 沈建军卿斯汉
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products