Security terminal reinforcing model and reinforcing method of tolerable non-trusted component

A secure terminal and untrusted technology, which is applied in the security terminal reinforcement model and reinforcement field that can tolerate untrusted components, can solve the problems of trusted platform application loading restrictions, lengthy, complicated process, etc., to achieve tolerant loading and operation, and guarantee confidentiality security, confidentiality and integrity

Active Publication Date: 2011-04-06
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF3 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

And this requires TPM manufacturers to provide corresponding processing mechanisms, but unfortunately, this pr

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security terminal reinforcing model and reinforcing method of tolerable non-trusted component
  • Security terminal reinforcing model and reinforcing method of tolerable non-trusted component
  • Security terminal reinforcing model and reinforcing method of tolerable non-trusted component

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Such as figure 1 As shown in , the figure is a logical composition diagram of a secure terminal model that can tolerate untrusted components. This secure terminal hardening method is embodied as a secure terminal hardening model that can tolerate untrusted components. In this model, effective technical means are adopted in the links of information transmission channels (such as network, bluetooth, infrared and other communication means) and storage media (U disk, hard disk, readable and writable CD), and the existing trusted computing and other information security technologies to effectively prevent the occurrence of Trojan horses, viruses, system backdoors, hidden channels or malicious leaks, and construct a terminal trusted computing environment with predictable security results. The model includes hardware layer, virtualization layer, operating system layer and application layer.

[0036] In addition to the basic computer hardware facilities, the terminal hardware...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a security terminal reinforcing model and reinforcing method of a tolerable non-trusted component, which can ensure the security of the computing environment of the terminal equipment in an access network. A universal serial bus (USB) integrated embedded trusted system is used as a trusted root of a terminal; the behavior control of the non-trusted component is realized based on a virtual machine; the trusted computing software supporting a white list mechanism ensures that services and applications listed in the white list mechanism can be started without integrity measurement to tolerate the loading and the running of the non-trusted component; and especially, under the condition that the component running on the terminal is not trusted, the predictability and the controllability of the final result are ensured, the confidentiality of the related information when the access terminal accesses the network is ensured, and the confidentiality and the integrity of the local information of the terminal are ensured. The invention is matched with the existing trusted computing and other information security technologies to construct a terminal computing environment with a predictable security result.

Description

Technical field: [0001] The present invention relates to a model and method for ensuring the security of a computing platform of a terminal device connected to a network, in particular to a secure terminal reinforcement of a terminal computing platform with predictable security results that can tolerate untrusted components using trusted computing technology Models and reinforcement methods. Background technique: [0002] Trusted computing is a terminal security protection idea based on source trustworthiness. TCG (Trusted Computing Group) regards the predictability of entity behavior as the basis of trustworthiness. It believes that if the behavior of an entity always develops in the expected way and towards the expected goal, it is considered that an entity is trustworthy. Faithful. The basic idea of ​​trusted computing is to establish a chain of trust based on the root of trust, based on level-by-level measurement certification, level-by-level trust transfer, and extend...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F9/445G06F21/50G06F21/60
Inventor 董建强常朝稳司志刚秦晰赵国磊梁松涛廖正赟王一宁刘熙胖
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products