Terminal trusting method, trusting server and terminal

A server and terminal technology, applied in the field of communication, can solve the problems of high hardware dependence and lack of flexibility in the way of trust transfer, and achieve the effect of improving flexibility

Active Publication Date: 2012-06-27
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although TPM can realize the trustworthiness of the terminal, this implementation method needs to change the hardware structure of the terminal, so it is highly dependent on the hardware, the trust source is fixed, and the trust transfer method lacks flexibility.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal trusting method, trusting server and terminal
  • Terminal trusting method, trusting server and terminal
  • Terminal trusting method, trusting server and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] figure 1 It is a flow chart of a terminal credit authorization method provided by an embodiment of the present invention. Such as figure 1 As shown, the terminal trust granting method provided in this embodiment can be specifically applied to a terminal trust granting process, and the terminal can specifically be a mobile phone, a tablet computer, a personal computer, and the like. The terminal crediting method provided in this embodiment specifically includes:

[0030] Step U10, sending a credit service request carrying terminal characteristic information to the credit server;

[0031] Specifically, the terminal may request a trusted service from a service provider, and the service provider must determine that the terminal is a trusted terminal before providing trusted services for the terminal. The trusted server may be a server configured by the service provider to perform trusted for the terminal. The terminal sends a credit service request to the credit server,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a terminal trusting method, a trusting server and a terminal. The terminal trusting method comprises the following steps: sending a trusting service request carrying the characteristic information of the terminal to the trusting server; receiving an initial trusting service corresponding to the trusting service request sent by the trusting server, and according to the initial trusting service, dividing a storage region; receiving service integration information sent by the trusting server, and loading the service integration information to the storage region, then taking the storage region as a trusted source; according to the service integration information, establishing a trusted chain, and verifying the trusted chain, if the verification is successful, sending a trusted service acquisition request to the trusting server; and receiving a trusted service corresponding to the trusted service acquisition request sent by the trusting server. According to the terminal trusting method, the trusting server and the terminal provided by the invention, the trust of the terminal can be realized without change of the hardware structure of the terminal, and the flexibility of the terminal trusting is improved.

Description

technical field [0001] The invention relates to communication technology, in particular to a terminal crediting method, a crediting server and a terminal. Background technique [0002] With the continuous development of information technology, information has become a vital asset, and information security is becoming more and more important. The international non-profit organization Trusted Computing Group (Trusted Computing Group, referred to as TCG) has formulated the Trusted Platform Module (Trusted Platform Module, referred to as TPM), trusted storage and trusted platform for different terminal types and platform forms. A series of complete specifications such as network connections, terminals such as personal computers, servers, mobile phones, communication networks, etc., the TPM defined by these specifications is usually embedded in various computing terminals in the form of hardware to provide more reliable base of operations. Although TPM can realize the trustwort...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 贾佳
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products