Security management system and method of dependable computing platform

A technology of security management and trusted computing, applied in the field of information security, it can solve the problems of tampering with security policies, destroying security management centers, attacks, etc., so as to ensure authenticity and integrity, prevent leakage, and ensure confidentiality and integrity. Effect

Inactive Publication Date: 2012-02-01
中国人民解放军海军计算技术研究所
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The usual protection method is to install a firewall in front of the security management center or to enhance the security of the host computer. However, since the current security management center and firewall are all application systems running on the PC, due to the simplified structure of the PC software and hardware, malicious Attackers can directly bypass the protection of the security protection system from the system level, attack and destroy the security management center, and directly tamper with the security policy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security management system and method of dependable computing platform
  • Security management system and method of dependable computing platform
  • Security management system and method of dependable computing platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Below in conjunction with accompanying drawing of description, specific embodiment of the present invention is described:

[0038] see figure 1 Shown is a schematic structural diagram of the security policy management system of the present invention. It can be seen from the figure that the structure of the security policy management system consists of a security management center, a first trusted cryptographic module, a second trusted cryptographic module, and a security management agent.

[0039] The first trusted cryptographic module provides signature and signature verification, symmetric encryption and decryption and hash operation services for the security management center.

[0040] The security management center calls the first trusted cryptographic module service to realize the generation, storage and deletion of the security policy; calls the first trusted cryptographic module service to realize the assembly of the security policy management protocol data, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security management system and method of a dependable computing platform. The security management system comprises a dependable code module, a security management center module, a security management agent module and a security strategy management protocol module; the security strategy management protocol module between the security management center module and the dependable code module is realized on basis of the dependable code module so that the security of the transmission of a security management strategy is ensured; the security protection of a security strategy at a security management center is realized on basis of the dependable code module; and a security strategy at the dependable computing platform is stored in the dependable code module, and the security of the security strategy is protected by the dependable code module so that the security of the storage of the security management strategy is ensured. The security management method based on the dependable computing platform comprises a step of generating a security strategy management protocol and steps of producing, extracting and deleting a new security strategy by the security management center and has the advantages of fulfilling the protection of encryption and integrity verification of security strategy data and preventing data leakage and unauthorized tampering of the security strategy data from an attacker.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for providing centralized management of security policies for a trusted computing platform, and the method ensures the security of the process of storing and distributing the security policies. technical background [0002] The PC implementation specification proposed by the Trusted Computing Group (TCG) stipulates that the integrity hash value of each piece of executable code is stored in the platform configuration register (PCR) during the chain of trust transfer process during the system boot phase, and the measurement log Stored in ACPI. PCR and metrics logs are used to report the integrity status of the system to third parties. TCG does not involve the management of the trusted computing platform's own security policy. [0003] Usually, the security policy management modes of information systems are mainly divided into autonomous management, centralized managem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 郑志蓉沈昌祥金刚蔡谊刘毅傅子奇涂航黄强汪晓睿
Owner 中国人民解放军海军计算技术研究所
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products