Method for implementing reliable network system based on reliable computation

A technology of trusted computing and network systems, applied in the field of computer networks and trusted computing, can solve problems such as not using network systems, achieve the effects of reducing costs, protecting existing software properties, and enhancing security and credibility

Active Publication Date: 2008-08-20
CHINA STANDARD SOFTWARE
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, an operating system that can fully support the TCM specification has not yet appeared.
[0014]Current trusted computing specifications and implementations are mainly aimed at stand-alone systems, and have not yet been applied to network systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing reliable network system based on reliable computation
  • Method for implementing reliable network system based on reliable computation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the features and advantages of the present invention more clearly understood, below in conjunction with accompanying drawing, describe in detail as follows:

[0032] like figure 1 As shown, it describes the architecture of the trusted network system of the present invention. Several client computers and one server computer are connected to form a local area network through network devices such as hubs, routers, and switches. The server is equipped with a trusted computing chip, installed with a trusted multi-tasking operating system, running monitoring and measurement programs, and a diskless workstation program; the client is also equipped with a trusted computing chip, using a diskless workstation, that is, it does not have local storage capabilities ( including mobile storage).

[0033] The trusted multitasking operating system can meet the overall requirements of TCG and TCM specifications, support TPM and TCM chips, realize the integrity measureme...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention describes method for implementing believable network system by using believable computational technique. Believable network system described by the method is made up of server and several customer terminal computers. Server is equipped with believable compute chip, mounting believable multitask operating system; customer terminal is equipped with believable compute chip adopting diskless workstation modus. In the process of customer terminal starting, first, proceeding coming from server terminal executes reliability measurement by using believable compute chip to customer terminal hardware etc for assuring whole reliability of customer terminal hardware; in operation process of customer terminal system, all storing resource required visiting (accessing) are monitoring and measurement by server terminal software for assuring whole reliability of customer terminal software and resource. The method can be used for establishing system inner net of business or government etc, for improving safety and reliability of entire network effectively.

Description

technical field [0001] The invention relates to a computer network and a trusted computing method, in particular to a method for realizing a trusted network system based on a trusted computing trusted multi-task operating system. Background technique [0002] In 1983, in the "Trusted Computer System Evaluation Criteria" (DOD5200.28-Std, Trusted Computer System Evaluation Criteria, referred to as TCSEC) launched by the US Department of Defense, the "Trusted Computing Base" (Trusted Computing Base, referred to as TCB) was proposed. )the concept of. The so-called "trusted computing base" refers to the realization of system security by maintaining the minimum set of trusted components and controlling the access rights of data, so as to achieve the purpose of system credibility. China's national standard GB 17859-1999 "Computer Information System Security Protection Classification Criteria" continues to use the concept of "trusted computing base". [0003] In January 1999, the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24G06F21/00G06F21/57
Inventor 韩乃平刘文清兰雨晴张东李红娟
Owner CHINA STANDARD SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products