Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication system and method based on dependable computing

A technology of trusted computing and authentication system, which is applied in the field of authentication system based on trusted computing, can solve the problems that the authentication server cannot be guaranteed to be trusted, the certificate server cannot be guaranteed to be trusted, and the application server cannot be guaranteed to be trusted. Reliability, safety improvement, and safety effect

Inactive Publication Date: 2012-09-26
NATIONZ TECH INC
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] There is no guarantee that the terminal is trustworthy;
[0010] The authenticity of the authentication server itself cannot be guaranteed;
[0011] The trustworthiness of the certificate server itself cannot be guaranteed;
[0012] Cannot guarantee the trustworthiness of the application server itself

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication system and method based on dependable computing
  • Authentication system and method based on dependable computing
  • Authentication system and method based on dependable computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The main idea of ​​the present invention is: using trusted computing technology, install a trusted computing module in the entity implementing authentication, to ensure the security of the computer network and server, and to ensure the credibility of the terminal, which can not only improve the security of the entity implementing authentication It can also improve the security of the entire computer network, thereby enhancing the credibility and security of authentication on the computer network.

[0030] In the present invention, the trusted computing module refers to a trusted computing security chip, which is a security chip on a computer motherboard. The chip performs a self-test on the local hardware platform when the computer is turned on, and compares the measurement value stored in the trusted computing security chip with the measurement value re-detected on the hardware when the computer is turned on. If the local hardware changes, the platform can Whether to c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to an authentication system and a method based on dependable computing. The authentication system based on dependable computing comprises a dependable terminal, a dependable certificate server, and a dependable authentication server. Each of the dependable terminal, the dependable certificate server and the dependable authentication server has a dependable computing module. According to the authentication system and the method based on dependable computing provided by the invention, PKI digital certificate technology and a dependable computing platform are combined, the security of a network and a server terminal is ensured, at the same time, terminal can be ensured to be dependable, the security of a whole network is raised greatly, and creditability and security of computer network certification are raised.

Description

technical field [0001] The invention relates to the technical field of computer network security, in particular to an authentication system and method based on trusted computing. Background technique [0002] With the development of computer network technology, there are more and more network applications in the campus network. Most systems provide login windows, requiring users to input user names and passwords. Only authorized users can access controlled resources. Each application system has an independent identity authentication mechanism. When entering a different application system, it must resubmit its own identity to pass the system authentication, which will lead to the following consequences: [0003] Users need to set a large number of user names and passwords, which is easy to cause confusion; [0004] Frequent input of user name and password will increase the probability of the corresponding user password being cracked; [0005] For convenience, users often ch...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 付月朋
Owner NATIONZ TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products