Asset certificate based method for managing trusted terminal device
A technology of terminal equipment and management methods, applied in the field of information security, which can solve problems such as unfavorable effective server management, system security risks, and non-backup, so as to achieve the effect of improving security defense, ensuring complete reliability, and not easy to lose
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.
[0019] figure 1 It is a schematic diagram of the architecture of the present invention. As shown in the figure, the trusted terminal device referred to in the present invention may be network devices such as servers and terminals. The trusted terminal device includes a trusted chip (TPM: Trusted Platform Module), and the trusted chip It has a non-volatile memory, which encrypts the information stored in the chip to ensure the security of the information;
[0020] The asset certificate-based trusted terminal device management method disclosed in the present invention is to store the asset certificate information of the trusted terminal device in the non-volatile memory of the trusted chip, so as to ensure that the asset certificate information of the trusted terminal device is not easily lost or lost. tampered with, specifically,
[0021] The...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com