Credible Agent based MT (Mobile Terminal) credible state monitoring method

A mobile terminal and credible technology, applied in the field of information security, can solve problems such as the powerlessness of measurement, failure to describe application program integrity measurement, and inability to reflect changes in the status of mobile terminals, so as to ensure efficiency and accuracy, and ensure security and credibility Effect

Active Publication Date: 2012-10-31
CHINA ELECTRIC POWER RES INST +3
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, there are still some deficiencies in improving the security protection capabilities of mobile terminals through the use of trusted computing: 1) Currently, the relevant specifications of trusted computing only define the integrity measurement in the process of trusted transfer from platform power-up to operating system loading, It does not describe how to measure the integrity of the application program after the system is booted, and cannot guarantee the security and credibility of the application program of the user's behavior on the mobile terminal; 2) the current trusted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credible Agent based MT (Mobile Terminal) credible state monitoring method
  • Credible Agent based MT (Mobile Terminal) credible state monitoring method
  • Credible Agent based MT (Mobile Terminal) credible state monitoring method

Examples

Experimental program
Comparison scheme
Effect test
No Example Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a credible Agent based MT (Mobile Terminal) credible state monitoring method. The method comprises the steps of: (1) starting the MT mobile terminal credibly; (2) judging identity of a user at the MT; if the user is in a manager mode, turning to the step 3; and if the user is in a normal user mode, turning to step 4; (3) in the manager mode, extracting characteristics of the credible state of the MT; and (4) in the normal user mode, monitoring the credible state of the MT. The credible Agent based MT credible state monitoring method, disclosed by the invention, has the advantages of solving credible state monitoring problem of the MT during the running time, being capable of extracting characteristics of the credible state of user and software behaviors comprehensively and exactly during the running time of the MT, thereby efficiently judging the credible state of the MT, simplifying monitoring complexity of the credible state through introduction of the Agent technology and improving monitoring accuracy and monitoring efficiency of the credible state.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a method for monitoring a trusted state of a mobile terminal based on a trusted Agent. Background technique [0002] With the development of information networks, various mobile terminals such as mobile personal digital assistants (PDAs) and mobile smart phones have been widely used. and other problems, resulting in a large number of potential safety hazards in mobile terminals. Malicious codes such as viruses, worms, and Trojan horses attack the information network through the vulnerabilities of mobile terminals, making the network in an unsafe state. Whether the terminal has the password or key of the authentication protocol is used to determine whether it is connected to the network, ignoring whether the terminal system itself is safe and credible. This requires ensuring the information security of mobile terminals from the source. By using Trusted Computing (T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00
Inventor 张涛林为民费稼轩陈亚东曾荣邓松邵志鹏楚杰陈牧徐敏
Owner CHINA ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products