An integrity check method for remote network service

A technology for integrity verification and network services, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve the problems of poor versatility, scalability and application compatibility, difficult and infeasible modification of network application protocols, etc. Achieve the effect of preventing malicious programs from stealing or power abuse

Inactive Publication Date: 2008-02-20
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF1 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The universality, scalability and application compatibility of this remote trusted path scheme, which relies on the implementation of the network service program, are poor
In order to support a new network service, the network application protocol and server program must be modified, and sometimes it is difficult or even impossible to modify the network application protocol; for trusted access to each network service, in addition to the dedicated server-side program, it must also With specially supported client programs, this requires re-providing a complete set of server-side and client-side programs without reusing existing programs
The more important problem is that this scheme actually requires complete trust in the service routines of network services, and cannot deal with the security loopholes in the service program itself, and the situation that it is invaded or replaced by malicious programs.
However, since network service programs usually run in the application layer process context like ordinary applications, there is also the possibility of being infected by malicious programs, and cannot be fully trusted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An integrity check method for remote network service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The process of a remote network service inspection is shown in the attached figure, wherein the steps in the dashed box are unnecessary steps. The entire process includes: the client sends a network service inspection request message to the remote server, and then waits for the server to reply; the server first authenticates the client's identity after receiving the inspection request, then processes the legal request to check the integrity of the specified network service, and tries to restore the service that failed the inspection , and finally reply the test result of the network service to the customer; the customer confirms whether the remote network service is currently complete and reliable by the server’s reply notification, and initiates service access if there is no problem.

[0024]The client program of the remote network service integrity inspection described in the present invention is easy to realize, and can be implemented as a common inspection client sof...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The utility model provides an integrity detecting method for the remote network service, which comprises a network service test protocol and a test system for the integrity at the server end; wherein, the protocol stipulates that the customer requests testing the integrity of the specific network by sending a message in a specific format to the specific network port of the remote server, and the message is expected to specify the interception port used in the network service to be tested. After receiving the request for testing, the remote server judges the current safety status of the specific network service by inspecting the integrity of the corresponding service progress, the corresponding service program image file and other relevant files based on the network service strategy, and feed back the test results to the customer, thus establishing a reliable path for the remote users to access network service. The method can be widely applied to various network service and is admirably accessible, moreover, the method is compatible with common server terminals and client terminals; the method can be implemented by a reliable module or process of the server terminal, therefore, the reliability does not depend on a specific network service program and is insusceptible to the intrusion of any malicious programs.

Description

technical field [0001] The invention relates to the field of information security, in particular to the security guarantee technology of remote network services. Background technique [0002] A security system must provide a mechanism to ensure that the user's path to the system is safe and credible, free from malicious program intrusion or forgery. For accessing the system through a local terminal, the existing operating system generally provides a trusted path mechanism. There are two common implementation methods: one is to reserve an uncoverable warning area on the display output interface of the system for Indicates the current security state of the system, and provides a mechanism for the user to call to switch the system to a secure state; the second is the Secure Attention Key (SAK) mechanism. The SAK key settings used by different systems may be different, and the title and specific processing may also be different, but the basic principle is the same, that is, the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L29/06H04L29/10
CPCH04L63/0876
Inventor 沈建军卿斯汉
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products