Safety requirement based remote proving method and system thereof
A technology of remote certification and security technology, which is applied in the security field of trusted computing platforms, can solve the problems that the interval time cannot be too long, and it is difficult to ensure the credibility of the certification, so as to reduce complexity, avoid invalid certification information, and flexibly configure Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] Below through embodiment, further illustrate the present invention in conjunction with accompanying drawing, but do not limit the scope of the present invention in any way.
[0049] Based on the remote attestation process based on security requirements, combined with trusted guidance of trusted computing platforms, platform component measurement, and trusted network connections, we implement a remote attestation system for trusted network connections based on security requirements. Detailed system structure reference Figure 4 , the application scenario of this remote system is that when the prover tries to access the resource server R in the protected network, the access is allowed only after the integrity verification of the verifier server. The prover of the proof system is a computer with a TPM security chip, which operates as a measurement agent kernel module at the system kernel layer, completes the collection of platform configuration integrity according to the p...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 