Method for safely accessing mobile credible terminal

A technology of terminal security and access method, applied in the field of trusted access, to prevent leakage

Inactive Publication Date: 2010-10-13
STATE GRID ELECTRIC POWER RES INST
View PDF7 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The traditional trusted terminal access method only verifies the access terminal through identity authentication methods such as certificates, such as the "Method and Access System for Terminal Access to Trusted PDA" disclosed in Patent No. 200810046854, which uses identity authentication certificates and platform status identification Terminal, this method can improve the security of terminal access to a certain extent, but it does not provide all-round scanning terminal information and status for the terminal from the underlying hardware to the upper application, so as to achieve safe and credible terminal access

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for safely accessing mobile credible terminal
  • Method for safely accessing mobile credible terminal
  • Method for safely accessing mobile credible terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] combine here figure 1 and figure 2 Describe the startup process and access server process of the mobile trusted terminal:

[0025] The user activates the mobile terminal through means such as password or fingerprint authentication.

[0026] The terminal loads the operating system and checks whether the operating system image has been changed to ensure safe startup.

[0027] The process monitoring module solidified in ROM starts and loads to monitor other processes and module loading, and then checks the security of TF to decide whether to continue to start or stop.

[0028] After the terminal is started, before preparing to establish a secure connection with the server, start the terminal health check module, check the hardware information of the terminal, and perform a security scan, and prepare to submit the extracted information and security scan results to the server for further analysis.

[0029] The terminal checks the digital certificate in the secure TF memo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for safely accessing a mobile credible terminal, which comprises the following steps that: a user starts the mobile terminal by means of password or fingerprint authentication and the like; the terminal loads an operating system and verifies that the operating system is changed or not so as to ensure safe start; a process monitoring module cured in a read only memory (ROM) is started and loaded to monitor other process and module loading, the safety of a TF memory card is checked, and whether to continuously start or stop starting the terminal is determined; after the terminal is started and before the terminal establishes safe connection with a server, a terminal health examination module is started to check hardware information of the terminal, safely scan the terminal, and submit the extracted information and safe scanning result to the server for further analysis; the terminal checks a digital certificate in the safe TF memory card and determines that the certificate is in a safe state; and safe connection between the terminal and the server is started. The method can ensure that the terminal can credibly communicate with the server.

Description

technical field [0001] The invention relates to the trusted access technology of the mobile terminal, including the development of the trusted technology from the hardware layer to the application software layer of the terminal, and the security control technology in the process of starting the mobile terminal and accessing the server. Background technique [0002] The traditional trusted terminal access method only verifies the access terminal through identity authentication methods such as certificates, such as the "Method and Access System for Terminal Access to Trusted PDA" disclosed in Patent No. 200810046854, which uses identity authentication certificates and platform status identification Terminal, this method can improve the security of terminal access to a certain extent, but it does not provide all-round scanning terminal information and status for the terminal from the underlying hardware to the upper application, so as to achieve safe and reliable terminal access...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00G06F21/00G06F21/50
Inventor 林为民张涛秦超楚杰陈亚东时坚
Owner STATE GRID ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products