Terminal credible security system and method based on credible computing

A credible and terminal technology, applied in computing, computer security devices, digital data protection, etc., can solve problems such as unguaranteed, unguaranteed implementation of user behavior expectations, failure to form a credible system, etc., to eliminate operation and Effects of dissemination, ensuring confidentiality and integrity, and ensuring system security

Active Publication Date: 2010-03-10
BEIJING KEXIN HUATAI INFORMATION TECH
View PDF10 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the above-mentioned WO2006/045644 international patent application and WO2006/011943 international patent application only provide methods for building trusted devices and trusted platforms, but fail to form a trusted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal credible security system and method based on credible computing
  • Terminal credible security system and method based on credible computing
  • Terminal credible security system and method based on credible computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] [32] figure 1 It is a structural diagram of the background technology of this application, which includes a multi-level trusted activity layer composed of trusted identity authentication, trusted authority control, and trusted data transmission. It can be known that this Chinese patent application only adds security management to identity authentication, authority control and data transmission, but it cannot guarantee that any process in the system is the process expected by the user, let alone that the user's behavior will be executed in the expected way.

[0033] [33] figure 2 is the schematic diagram of this application, which is dedicated to obtaining a trusted environment for terminals interacting with network operation services, mobile devices, and other users. In the trusted environment of the terminal, the white list of files is obtained through a trusted program.

[0034] [34] image 3 It is a block diagram of the application. The terminal trust guarantee ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a terminal credible security system which comprises a user identity credible security module, a terminal device credible security module, a platform credible security module.The user identity credible security module is used for setting lists for storing important documents of users and utilizing a kernel protection mode to ensure that the lists of the important documentscan not be revised by non-authorized users; the terminal device credible security module is used for controlling the writing function of mobile devices of U disks, and the like; and the platform credible security module is used for preventing malicious programs from operating. The invention also relates to a terminal credible security method which comprises a user identity credible security step,a terminal device credible security step and a platform credible security step, wherein the user identity credible security step is used for setting the lists for storing the important documents andensuring that the lists of the important documents can not be revised; the terminal device credible security step is used for controlling the writing function of the mobile devices of U disks, and thelike; and the platform credible security step is used for preventing the malicious programs from operating.

Description

technical field [0001] [01] This application relates to a trusted computing method and system for ensuring the security of the terminal environment, which can realize active defense against viruses, and belongs to the field of computer information security. Background technique [0002] [02] In 2003, the Trusted Computing Group (Trusted Computing Group) composed of Intel, Hewlett-Packard, Microsoft, IBM and other companies proposed the "Trusted Computing" technology. "Trusted" means that users can fully trust that the computer's behavior will fully follow the design. The Trusted Computing Organization's description of technical trust is: "If an entity's behavior is always in accordance with the expected way and goal, Then it's believable." The user's expectation of the terminal must be "not to be damaged by viruses, Trojan horses and other malicious programs". If the terminal is protected by trusted computing technology, the terminal is trustworthy to the user, that is, saf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/22G06F21/60
Inventor 沈军赵勇韩岳李瑜陈亚莎
Owner BEIJING KEXIN HUATAI INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products