Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anonymous digital certificate system and verification method of trustable computing environment

A digital certificate and trusted computing technology, which is applied in the field of communication security, can solve performance problems, platform user privacy violations, complexity and other problems, and achieve the effects of enhanced scalability, good cross-platform characteristics, and privacy protection

Inactive Publication Date: 2014-08-06
NORTHEASTERN UNIV LIAONING
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In a trusted computing environment, in order to verify whether a platform is credible, the platform needs to show its identity certificate. If the traditional authentication method is used, the platform must submit its real identity information of the platform, which will destroy the privacy of platform users, and further It leads to statistical attacks on user identity information, and at the same time, it is no longer feasible for some applications with fairness and commercial confidentiality, such as electronic cash, electronic voting, electronic elections, anonymous communication, etc.
To this end, TCG proposed two methods to solve the privacy problem. One is the direct anonymous authentication method, but this method is based on a variety of cryptographic prototypes and is relatively complex and difficult to implement; the other is the authentication based on privacy CA (Privacy Certification Authority). Although the privacy problem can be well solved, there is still no commercial model available and the overall architecture has performance problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous digital certificate system and verification method of trustable computing environment
  • Anonymous digital certificate system and verification method of trustable computing environment
  • Anonymous digital certificate system and verification method of trustable computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments.

[0049] The anonymous digital certificate system of the trusted computing environment of this embodiment, such as figure 1 As shown, it includes: including a trusted platform client, a remote verification server and a privacy CA server. In this embodiment, the trusted platform client host model is Lenovo ThinkCentre M55p Tower, and the TPM model equipped with a trusted platform module is Infineon1.2. The models of the remote authentication server and the privacy CA server are both Dell OptiPlex360Mini Tower, and the network environment is a campus-level network environment.

[0050] The trusted platform client, the remote verification server and the privacy CA server are connected to each other through the campus LAN network;

[0051] The communication between the trusted platform client and the remote verification server, and the communicatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an anonymous digital certificate system and a verification method of a trustable computing environment, and the system and the method belong to the technical field of communication security. The invention provides the anonymous digital certificate system for the trustable computing environment; a public key infrastructure (PKI) system architecture is adopted in the system; an entity comprises a private certificate authority (CA) server, a remote verification server and a trustable platform client terminal; in the anonymous digital certificate system, the format of a certificate attestation identity key (AIK) meets an X509.V3 standard and is anonymous, so that the expandability of the system is enhanced on the one hand, and the privacy of the trustable platform client terminal is ensured on the other hand; and simultaneously, the system also has a good cross-platform characteristic.

Description

technical field [0001] The invention belongs to the technical field of communication security, and in particular relates to an anonymous digital certificate system and a verification method in a trusted computing environment. Background technique [0002] With the continuous development of electronic technology and network technology, people are more and more dependent on the network, especially communication technology has become an indispensable part of people's life, and network and information security are also increasingly affected by the development of technology. Widely concerned, in order to ensure the security of computing terminals, the Trusted Computing Group (Trusted Computing Group, TCG) proposed the concept of trusted computing, and formulated related standards to ensure the security of computing platforms. In a trusted computing environment, in order to verify whether a platform is credible, the platform needs to show its identity certificate. If the tradition...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 周福才徐剑岳笑含
Owner NORTHEASTERN UNIV LIAONING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products