Method for pushing remote declaration based on behaviors in trusted network

A behavioral and credible technology, applied in electrical components, transmission systems, etc., can solve the problems of misjudgment of normal behavior, inaccurate and comprehensive behavior measurement, etc., to achieve the effect of complete safety mechanism, improved ease of use and scalability

Inactive Publication Date: 2010-12-01
BEIJING UNIV OF TECH
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The purpose of the present invention is to solve the problem that the behavior measurement is not accurate and comprehensive enough to misjudgment the user's normal behavior by providing a behavior-based push remote declaration method in a trusted network, and also provides a behavior The remote declaration mechanism can more accurately measure and discover threat behavior

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for pushing remote declaration based on behaviors in trusted network
  • Method for pushing remote declaration based on behaviors in trusted network
  • Method for pushing remote declaration based on behaviors in trusted network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be further described below in conjunction with accompanying drawing of description:

[0029] 1. Definition of trusted channel:

[0030] Based on the cryptographic function provided by the Trusted Platform Control Module (TPCM), the Trusted Pipeline realizes the trusted root of the system Trusted Computing Base (TCB), establishes an interaction channel between the user and the trusted root for users, and protects users Login information, protect sensitive information entered by users through the application, protect sensitive files of the user's master key, and protect the integrity and confidentiality of information protected by the pipeline through the cryptographic mechanism of the pipeline protocol. A trusted channel is a secure link established on demand. The establishment of a trusted channel can be actively requested by a network visitor or pushed by a network server.

[0031] 2. Trusted pipeline security goals:

[0032] A trusted chan...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for pushing a remote declaration based on behaviors in a trusted network. The method comprises an identification protocol which comprises the following steps that: a network visitor and a network service provider mutually prove that the identity of the other side can be trusted, and a safe connection is set up; when the network visitor declares a next step or a next group of behaviors, the network visitor needs to sign a behavior declaration with a trusted platform module (TPM), and a sending time is necessarily added when the network visitor sends the behavior declaration to the network service provider; a trusted network server is responsible for authenticating the identity of the network visitor who applies for joining, and then a session key is generated; and the network service provider transmits a public key of the network service provider to the network visitor. The safety mechanism is more complete, so that the error judgment to normal behaviors of a user, which is caused by inaccurate and incomplete behavior measurement, is prevented; and the feasibility and the extensibility of the trusted network are effectively improved.

Description

technical field [0001] The invention relates to a push method based on a trusted network behavior statement, which belongs to the field of trusted security. Background technique [0002] In recent years, with the continuous popularization of computer networks, intrusion and stealing behaviors represented by Trojan horses have occurred from time to time, such as using the back door or loopholes in the operating system itself to steal computer user information. In production-oriented important information systems, terminals are usually strictly managed in order to ensure the overall security of the office network. The office computer network needs to be physically isolated from the Internet. At the same time, the office computer needs to uninstall the wireless network card and shield the USB peripheral port. Although the security of the terminal is guaranteed to a certain extent, due to the impact of the sharp decline in the ease of use of the entire system, the cross-use of U...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 刘贤刚公备庄俊玺李健张兴
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products