Supercharge Your Innovation With Domain-Expert AI Agents!

Control flow model behavior based dynamic remote attestation method

A remote attestation and control flow technology, applied in the field of dynamic remote attestation based on the behavior of the control flow model BPCF model, can solve problems such as failure to meet security policy control requirements, lack of behavior constraints, and lack of operating system subjects

Active Publication Date: 2013-04-03
TSINGHUA UNIV
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the traditional access control model has problems such as "lack of operating system subject" and "lack of behavior constraints", which cannot meet the control requirements of more complex security policies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control flow model behavior based dynamic remote attestation method
  • Control flow model behavior based dynamic remote attestation method
  • Control flow model behavior based dynamic remote attestation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0037] The present invention proposes a dynamic remote proof method based on the behavior of the control flow model BPCF model, such as figure 1 The following steps are shown:

[0038] S1. The service provider formulates rules for the dynamic conditions during the task operation according to the user's security requirements, and generates a policy certificate;

[0039] S2. The mobile terminal obtains a policy certificate, and executes policy control; the policy control is that the mobile terminal performs system access control in the operating system based on the control flow model and the policy certificate;

[0040] S3. If the operating system finds that the control changes in the control flow model are caused by changes in monitoring point conditions, the mobile terminal initiates remote certification;

[0041] Among them, the se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a control flow model behavior based dynamic remote attestation method. The method includes: S1, a service provider performs rule formulation for dynamic change conditions during task running according to user safety requirements so as to generate a policy certificate; S2, a mobile terminal obtains the policy certificate and executes policy control, wherein policy control refers to that the mobile terminal performs system access control in an operation system based on a control flow model and the policy certificate; and S3, if the operation system discovers that control change is caused by change of monitoring point conditions in the control flow model, the mobile terminal initiatively initiates remote attestation, or the service provider initiatively initiates remote attestation according to requirements of the terminal. By the aid of the control flow model behavior based dynamic remote attestation method, computing environment safety credibility of the mobile terminal can be better verified.

Description

technical field [0001] The present invention relates to the field of computer and electronic information technology, in particular to a dynamic remote proof method based on the behavior of the control flow model BPCF model. Background technique [0002] Verifying that the computing environment is secure and trustworthy is an important goal of trusted computing. With the development of technology, security threats on mobile terminals are also increasing. Research shows that 800,000 people were infected with malware every month in 2011 on the Android platform alone. Traditional anti-virus, intrusion detection and other security mechanisms also rely on the security support of the underlying operating system. Trusted computing technology achieves the purpose of ensuring computer security and reliability by enhancing the overall security of the entire computing system from the root of trust to trusted hardware, to trusted operating systems, and to trusted applications. "Truste...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
Inventor 胡事民江凌波钱诚马超
Owner TSINGHUA UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More