Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Terminal access trusted PDA method and access system

A terminal access and access system technology, applied in the direction of instruments, calculations, electrical digital data processing, etc., can solve the problems of PDA private information and key data leakage, unreliable terminal operating environment, PDA privacy data leakage, etc., to prevent Effects of identity forgery, theft prevention, and tamper prevention

Inactive Publication Date: 2008-08-13
WUHAN UNIV
View PDF0 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The trusted PDA itself can guarantee that the hardware and software of the PDA are not attacked. However, when the trusted PDA is connected to an external computing terminal, the operating environment of the external terminal is often unreliable, for example, the terminal is implanted with viruses, Trojan horses, malicious codes, etc., leading to the leakage of private information and key data on the PDA
Since the PDA generally needs to share and synchronize data with the terminal, even if the operating environment of the trusted PDA itself is safe and reliable, the private data of the PDA is often leaked when the PDA is sharing data due to the insecurity of the terminal connected to it.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal access trusted PDA method and access system
  • Terminal access trusted PDA method and access system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The method for a terminal accessing a trusted PDA provided by the present invention is specifically: before the terminal accesses the trusted PDA, at first the identity of the terminal is authenticated to ensure that only a specific terminal can be connected to the trusted PDA; After passing, the terminal is required to report its current platform status to the trusted PDA. The trusted PDA compares and verifies the platform status of the terminal with the pre-saved platform trusted status value of the terminal. If it conforms to the trusted PDA platform status access If required, the terminal is allowed to establish a connection with the trusted PDA. The access and connection here refer to the protocol connection based on the physical connection between the terminal and the trusted PDA.

[0020] The present invention provides an access system capable of realizing the above-mentioned method for a terminal to access a trusted PDA, which enables a terminal to access a trust...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method of terminal accessing credible PDA and accessing system. The accessing method is authenticating identity of the terminal before accessing credible PDA, comparing the present platform state of the credible PDA with the credible state value of the pre-stored terminal platform, if passing the comparison, the terminal and the credible PDA are linked. The access system includes a credible PDA, a terminal having credible platform module, an interface server of the credible PDA running, an interface client running on the terminal, a certificate server, an integrity reference server. The invention avoids the data damage caused by the safety problem of the terminal self, effectively prevents information being stolen, and also effectively prevents identity counterfeit, platform state counterfeit, greatly improves security of the data sharing.

Description

technical field [0001] The invention relates to the technical field of computer information security, and mainly relates to an access method and an access system for realizing the credibility evaluation of the terminal when the terminal accesses the trusted PDA and ensuring the security of data and content on the trusted PDA. Background technique [0002] Currently PDA (Personal Digital Assistant) has become a personal digital terminal, which contains a large amount of private information and key data. The trusted PDA itself can guarantee that the hardware and software of the PDA are not attacked. However, when the trusted PDA is connected to an external computing terminal, the operating environment of the external terminal is often unreliable, for example, the terminal is implanted with viruses, Trojan horses, malicious codes, etc., lead to the leakage of private information and key data on the PDA. Since the PDA generally needs to share and synchronize data with the termi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06F21/85
Inventor 张焕国赵波郑鹏张立强陈璐乔锐
Owner WUHAN UNIV
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More