Supercharge Your Innovation With Domain-Expert AI Agents!

Construction method of terminal trusted platform in cloud computing environment

A credible and terminal technology, applied in the field of cloud computing, to solve security problems, improve security and confidentiality, and promote communication

Active Publication Date: 2020-02-11
TAISHAN MEDICAL UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The flexibility, openness, and public availability of the cloud computing environment have brought many challenges to application security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Construction method of terminal trusted platform in cloud computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0020] The flexibility, openness, and public availability of the cloud computing environment have brought many challenges to application security. How to establish a secure and credible terminal computing system from the "root" to prevent information leakage and eliminate potential attacks is the key At present, there are urgent problems to be solved in the field of cloud computing.

[0021] The present invention constructs a safe and reliable terminal trusted...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for constructing a terminal credible platform in a cloud computing environment. The terminal credible platform comprises a bottom hardware layer, a middle operating system layer and a top application layer, and a credible chain is established from the bottom hardware layer to the top application layer. The application layer establishes an external credible chain with a credible network through a credible application program and is connected with a cloud computing server through the credible network. According to the method provided by the invention, a TPM credible computing module is not only transplanted into the bottom hardware layer, but also is transplanted into an Android system, and the credible technology is transplanted and integrated into the entire terminal credible platform system, thereby ensuring that the bottom hardware layer of the system can be started credibly and safely at first, then the credible transfer technology is applied to the transfer of the credible chain, and credible transfer from the bottom hardware layer to the operating system layer and to the application layer, and even to the access of the cloud computing server is achieved.

Description

technical field [0001] The invention relates to the field of cloud computing, in particular to a method for constructing a terminal trusted platform in a cloud computing environment. Background technique [0002] Cloud computing unifies a large number of network resources to provide users with efficient and convenient software services. What cloud computing advocates hope is that users can use software services just like using electricity and water, and can use services conveniently, anytime, anywhere, and on demand. In the cloud computing mode, users can access the "cloud" through various "terminals". The "terminal" can be any electronic device that can access the Internet, and the "cloud" is the service provided. It may be small and isolated, but it is ubiquitous and can provide various services that users need. [0003] Cloud computing is simply composed of three parts: terminal, network, and remote server. Terminals include various devices such as mobile phones, netboo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06H04L29/08
CPCH04L9/0877H04L63/0823H04L63/10H04L63/1441H04L63/16H04L67/025H04L67/1097H04L2209/127
Inventor 彭磊肖延丽许婷婷张裕飞尚玉莲张峰
Owner TAISHAN MEDICAL UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More