Security protection component interconnection structuralization system and implementation method

A technology of security protection and interconnection structure, which is applied in the field of network security, can solve problems such as fraudulent use of the main Client and Server, malicious tampering of communication information, and easy interception of the communication process, so as to achieve the effect of ensuring credibility

Active Publication Date: 2018-03-27
THE THIRD RES INST OF MIN OF PUBLIC SECURITY
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] There are two security problems in traditional communication methods: 1. The identities of the main body of the communication, Client

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protection component interconnection structuralization system and implementation method
  • Security protection component interconnection structuralization system and implementation method
  • Security protection component interconnection structuralization system and implementation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the technical means, creative features, goals and effects achieved by the present invention easy to understand, the present invention will be further described below in conjunction with specific illustrations.

[0034] According to the "GB / T25070 Information System Hierarchical Protection Security Design Technical Requirements" on the structural description of the interconnection of security protection components, the technical focus is: 1. Mutual verification of each other's credibility through a trusted verification mechanism; 2. Ensure the security protection components trusted connection.

[0035] There are various ways for resource devices to communicate, such as TCP connection, UDP communication, HTTP communication, FTP communication and so on. Regardless of the communication method, the main body of the communication is a program, process or service. In this example, the communication program or process is used as a security protection component,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security protection component interconnection structuralization system and implementation method. The scheme is implemented by a key distribution module, a trusted measurement module and a trusted transmission module, and the key distribution module serves as a trusted authentication base, supports host certificate request and issuing, and receives and processes a trustedidentity verification request; the trusted measurement module is used for receiving a trusted measurement request of a security protection component, sending the measurement request to the key distribution module, forwarding a connection request to the trusted transmission module if receiving a measurement success result, and terminating the communication if receiving a measurement failure result; and the trusted transmission module is used for receiving a trusted transmission request of the security protection component, and performing key negotiation and key exchange. According to the security protection component interconnection structuralization system and implementation method disclosed by the invention, the credibility of communication components is guaranteed by the trusted computing technology, and the credibility of component connection is achieved through channel integrity protection.

Description

technical field [0001] The invention relates to network security technology, in particular to the interconnection structure technology of security protection components. Background technique [0002] The traditional communication method is to communicate between processes. The connection initiator sends a connection request, and the receiver processes the receiving request. If the connection process is successful, a channel is established for communication. [0003] Taking the three-way handshake connection process of the TCP connection process as an example, the so-called three-way handshake (Three-Way Handshake) is to establish a TCP connection, which means that when establishing a TCP connection, the client and the server need to send a total of 3 packets to confirm the establishment of the connection. In socket programming, this process is triggered by the client executing connect, such as figure 1 As shown, the whole process is as follows: [0004] (1) The first hands...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0819H04L9/083H04L9/0838H04L9/0863H04L9/32
Inventor 陶源李明
Owner THE THIRD RES INST OF MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products