Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Trustiness measuring method for installing and upgrading software

A software installation and software upgrade technology, applied in the computer field, can solve problems such as judgment without considering the credibility of the application, loss of trust value, and large loss of trust.

Active Publication Date: 2011-11-09
AEROSPACE INFORMATION
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing credibility mechanism is not concise and perfect enough, and there are still the following shortcomings:
[0003] 1) Since the trusted measurement value adopts an iterative calculation method, if a component is added or deleted after the trust chain is formed, or the software version is upgraded, all trust values ​​must be recalculated, which increases the difficulty of maintenance and management ;
[0004] 2) According to the trust theory, the trust value will be lost during the transmission process, the longer the transmission path, the greater the loss
However, the existing technology 2 has the following disadvantages: it only measures the credibility of the original application layer program, but does not consider the trustworthiness judgment of the upgraded application program, and the trust loss is relatively large during the measurement process of installing and deleting software. Big
[0013] To sum up, there are many deficiencies in the existing chain trust structure of TCG: 1) Since the trusted measurement value adopts an iterative calculation method, if a component or software is added or deleted after the trust chain is formed For version upgrades, all trust values ​​must be recalculated, which increases the difficulty of maintenance and management; 2) According to the trust theory, the trust value will be lost during the transmission process, and the longer the transmission path, the greater the loss
Due to the long trust transmission path of the chain trust structure, it is easy to cause loss of trust

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trustiness measuring method for installing and upgrading software
  • Trustiness measuring method for installing and upgrading software
  • Trustiness measuring method for installing and upgrading software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The above and other technical features and advantages of the present invention will be described in more detail below in conjunction with the accompanying drawings.

[0060] Such as figure 1 As shown, the present invention provides a trusted measurement method for software installation and upgrade. The present invention first introduces an upgrade control module (Updata Control Module). If the computer used by the user is a trusted computer, that is, a TCM (Trust Cryptography Module) computer (There is a trusted UCM software supplier associated with the issuing TCM computer, which provides absolutely safe UCM software matched with TCM to complete the precise measurement of software installation and upgrade parts), then if you want to install the application , you must pass the verification of the UCM software to obtain the right to install. When the software needs to be upgraded, the UCM software also needs to control it to guide the installation and perform security a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a trustiness measuring method for installing and upgrading software. The method comprises the following steps of: 1, in the case that a computer of a user is a trusted computer, prompting to download UCM (Unified Change Management) software from a trusted UCM provider by a system after the trusted computer is started; 2, determining whether to download and install the UCM software, if agreeing to install the UCM software, executing a step 3, otherwise, failing in downloading and updating of any software; and 3, executing subsequent various application software to finish installing or upgrading work. According to the method, the installed or upgraded software can be effectively measured, so that the installed or upgraded software is safe and trusted.

Description

technical field [0001] The invention relates to the technical field of computers, in particular to a method for measuring the credibility of software installation and upgrading, which can effectively measure the installed or upgraded software and make the installed or upgraded software safe and credible. Background technique [0002] At present, in order to meet the requirements of trusted computer users for installation and continuous update and upgrade of various application software, many methods and suggestions have been proposed to measure installed or upgraded software. However, the existing credibility mechanism is not concise and perfect enough, and there are still the following shortcomings: [0003] 1) Since the trusted measurement value adopts an iterative calculation method, if a component is added or deleted after the trust chain is formed, or the software version is upgraded, all trust values ​​must be recalculated, which increases the difficulty of maintenance...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F9/445G06F21/51
Inventor 郭宝安徐树民李子臣杨亚涛杜彦哲王绍麟曹路林闫世斗
Owner AEROSPACE INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products