Asset certificate based method for managing trusted terminal device

A technology of terminal equipment and management methods, applied in the field of information security, which can solve problems such as unfavorable effective server management, system security risks, and non-backup, so as to achieve the effect of improving security defense, ensuring complete reliability, and not easy to lose

Inactive Publication Date: 2015-12-23
GOHIGH DATA NETWORKS TECH CO LTD +1
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although the above-mentioned terminal device management method is convenient to operate and easy to manage, there are hidden dangers in system security. This is because: the attribute information of the terminal device is only stored in the database of the management computer. Attacks, etc., the information in the database is very likely to be stolen or tampered with, resulting in the loss or modification of the attribute information of the terminal device; at the same time, the terminal device has not backed up its own attribute information. Once the terminal device reinstalls the system, the The important information is erased and the attribute information is lost. Especially for the server equipment in the cloud computing platform, it is managed according to the existing terminal equipment management method, which is not conducive to the effective management of the server, and the reliability of the server information cannot be guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asset certificate based method for managing trusted terminal device
  • Asset certificate based method for managing trusted terminal device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0019] figure 1 It is a schematic diagram of the architecture of the present invention. As shown in the figure, the trusted terminal device referred to in the present invention may be network devices such as servers and terminals. The trusted terminal device includes a trusted chip (TPM: Trusted Platform Module), and the trusted chip It has a non-volatile memory, which encrypts the information stored in the chip to ensure the security of the information;

[0020] The asset certificate-based trusted terminal device management method disclosed in the present invention is to store the asset certificate information of the trusted terminal device in the non-volatile memory of the trusted chip, so as to ensure that the asset certificate information of the trusted terminal device is not easily lost or lost. tampered with, specifically,

[0021] The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides an asset certificate based method for managing a trusted terminal device. The trusted terminal device is a terminal device comprising a trusted chip; the trusted chip is provided with a nonvolatile memory, and asset certificate information of the trusted terminal device is stored in the nonvolatile memory of the trusted chip of the trusted terminal device; the asset certificate information is attribute information of the trusted terminal device or encrypted attribute information after the attribute information is subjected to encryption; and the attribute information of the trusted terminal device comprises a unique device identification number, owner information, a start use time, user information, a use period, configuration information and the like. According to the asset certificate based method for managing the trusted terminal device provided by the present invention, the asset certificate information of the trusted terminal device is stored in the nonvolatile memory of the trusted chip, so that the asset certificate information is not liable to be lost; and even if an operating system of the terminal is reinstalled, a write operation can be performed on the asset certificate information only by inputting a correct operation password, so that completeness and reliability of the asset certificate information can be ensured.

Description

technical field [0001] The invention relates to an asset certificate-based trusted terminal device management method, which belongs to the technical field of information security. Background technique [0002] At present, the management method of terminal equipment is generally to set up a management computer in the local area network. The management platform software for recording and managing all terminal equipment information in the local area network is installed in the management computer. By operating the management platform software, you can query, add, Modify and delete the attribute information of all terminal equipment in the database, such as equipment unique identification number, equipment owner and other information; [0003] Although the above-mentioned terminal device management method is convenient to operate and easy to manage, there are hidden dangers in system security. This is because: the attribute information of the terminal device is only stored in th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64
CPCG06F21/64
Inventor 郑驰梁思谦
Owner GOHIGH DATA NETWORKS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products