Unlock instant, AI-driven research and patent intelligence for your innovation.

Safety requirement based remote proving method and system thereof

A technology of remote certification and security technology, which is applied in the security field of trusted computing platforms, can solve the problems that the interval time cannot be too long, and it is difficult to ensure the credibility of the certification, so as to reduce complexity, avoid invalid certification information, and flexibly configure Effect

Inactive Publication Date: 2010-01-20
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since there is a time interval between proof and verification in offline TTP-based proofs, it is required that the time between proof and verification should not be too long, otherwise it is difficult to guarantee the credibility of the proof
Delegated proof requires the verifier to fully trust TTP, entrusting TTP to verify the proof of the prover, TTP will become a communication bottleneck

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety requirement based remote proving method and system thereof
  • Safety requirement based remote proving method and system thereof
  • Safety requirement based remote proving method and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] Below through embodiment, further illustrate the present invention in conjunction with accompanying drawing, but do not limit the scope of the present invention in any way.

[0049] Based on the remote attestation process based on security requirements, combined with trusted guidance of trusted computing platforms, platform component measurement, and trusted network connections, we implement a remote attestation system for trusted network connections based on security requirements. Detailed system structure reference Figure 4 , the application scenario of this remote system is that when the prover tries to access the resource server R in the protected network, the access is allowed only after the integrity verification of the verifier server. The prover of the proof system is a computer with a TPM security chip, which operates as a measurement agent kernel module at the system kernel layer, completes the collection of platform configuration integrity according to the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a long-distance proof method and system based on the safety request, and the long-distance proof method is based on the believed computer platform and makes a strict definition, and the measurement and proof are finished jointly between the proof party, checking party and the proof authority institution: the proof party starts the proof request according to the safety requirement, and the checking party measures the allocation of platform, and the proof authority institution verifies the measurement result, and at last the checking party decides relying on the platform of proof party or not. Comparing with other long-distance proof methods, the invention separates the measurement with the proof, and the proof course just needs match with the measurement proof, and it has the characteristics of safety request measurement proof, platform privacy protection and smart system allocation, and it can be used in the one-way long-distance proof, and it can be used in the two-way long-distance proof by simple expansion.

Description

technical field [0001] The invention belongs to the technical field of trusted computing platform security, and in particular relates to a remote certification method and system thereof. Background technique [0002] With the rapid development of network technology, the data stored in the computer may be remotely embezzled or accessed without authorization. It is difficult to resist hackers and viruses only by relying on external protection mechanisms such as firewalls and anti-virus software, and relying on simple passwords and other authentication methods. , Invasion of internal stealers. In response to these problems, in order to enhance the internal immunity of the computer platform, the trusted computing platform technology with the trusted platform module (Trusted Platform Module, TPM) as the core has developed rapidly in recent years. The certification of the integrity and correctness of the software and hardware configuration of the computer platform establishes mut...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L12/24
Inventor 冯登国秦宇徐震
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI