Trusted computing-based dynamic management service system and method

A dynamic management and trusted computing technology, applied in the field of information security, can solve problems such as the lack of practical and perfect solutions, and achieve the effects of improving configurability, preventing system tampering, and preventing data leakage

Inactive Publication Date: 2016-03-23
THE THIRD RES INST OF MIN OF PUBLIC SECURITY
View PDF5 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, there is a lack of practical and perfect solutions for the establishment and transfer of trust chains

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted computing-based dynamic management service system and method
  • Trusted computing-based dynamic management service system and method
  • Trusted computing-based dynamic management service system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to describe the technical content of the present invention more clearly, further description will be given below in conjunction with specific embodiments.

[0046] The present invention provides a dynamic management service system based on trusted computing, the basic structure is as follows figure 1 , including the following parts:

[0047] 1. Trusted password module

[0048] The trusted cryptographic module provides cryptographic calculation functions for the trusted business system to access the client. It has a protected storage space. It is actually a small system-on-chip containing cryptographic calculation components and storage components. processor, independent memory space, permanent storage space and independent bus input and output system. Using cryptographic algorithms that meet the standards, it provides externally with asymmetric key generation operations, asymmetric algorithm encryption and decryption operations, hash function operations, digi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a trusted computing-based dynamic management service system and method. The system comprises a trusted service terminal and a management center; the trusted service terminal comprises a trusted cryptography module for providing a trust measurement root, a trust storage root and a trust report root and realizing a trusted mechanism, and a trusted service module used for providing trusted services; and the management center is used for communicating with the trusted service terminal and verifying the hardware credibility, application credibility and user credibility of the trusted service terminal. With the trusted computing-based dynamic management service system and method adopted, the integrity of hardware and an operating system can be ensured, data leakage and system tampering can be prevented; a trusted identity recognition system is established to identify fake platforms; and a centralized management system is established, so that the configuration performance of clients can be improved.

Description

technical field [0001] The present invention relates to the field of information security, in particular to trusted computing, and specifically refers to a dynamic management business system and method based on trusted computing. Background technique [0002] International Trusted Computing Group (Trusted Computing Group, TCG) referred to as TCG. The basic idea of ​​trusted computing proposed by TCG is to build a root of trust (Root of trust), and start from the root of trust, use the method of hash measurement to establish a verifiable chain of trust, from the hardware platform to the BIOS, operating system, And then to the application, one level of verification, so as to extend this trust to the entire computer system to ensure that the computer system is credible. The chain of trust describes the logical concept of the trust relationship formed by one-way and sequential integrity verification of the starting sequence and time of each component module formed when a truste...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06G06F21/71G06F9/445
CPCH04L63/0876G06F9/44589G06F21/71H04L41/28H04L63/0428
Inventor 张涛吴松洋杨涛李勋李营那陈以山王磐
Owner THE THIRD RES INST OF MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products