Security protection component interconnection structured system and implementation method

A security protection and interconnection structure technology, applied in the field of network security, can solve problems such as easy interception of the communication process, fraudulent use of the main Client and Server, malicious tampering of communication information, etc., and achieve the effect of integrity protection of the communication process and credible identity

Active Publication Date: 2021-08-27
THE THIRD RES INST OF MIN OF PUBLIC SECURITY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] There are two security problems in traditional communication methods: 1. The identities of the main body of the communication, Client and Server, may be fraudulently used; 2. The communication process is easy to be intercepted, eavesdropped, or even maliciously tampered with.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protection component interconnection structured system and implementation method
  • Security protection component interconnection structured system and implementation method
  • Security protection component interconnection structured system and implementation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the technical means, creative features, goals and effects achieved by the present invention easy to understand, the present invention will be further described below in conjunction with specific illustrations.

[0034] According to the "GB / T25070 Information System Hierarchical Protection Security Design Technical Requirements" on the structural description of the interconnection of security protection components, the technical focus is: 1. Mutual verification of each other's credibility through a trusted verification mechanism; 2. Ensure the security protection components trusted connection.

[0035] There are various ways for resource devices to communicate, such as TCP connection, UDP communication, HTTP communication, FTP communication and so on. Regardless of the communication method, the main body of the communication is a program, process or service. In this example, the communication program or process is used as a security protection component,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a structured system for interconnection of security protection components and an implementation method. The scheme is realized through a key distribution module, a trusted measurement module and a trusted transmission module. The key distribution module is used as a trusted authentication base to support host certificate requests and Issue, receive and process the trusted identity verification request; the trusted measurement module is used to receive the trusted measurement request of the security protection component, send the measurement request to the key distribution module, and forward the connection request to the trusted The transmission module terminates the communication after receiving the measurement failure result; the trusted transmission module is used to receive the trusted transmission request from the security protection component, and negotiate keys and exchange keys. The invention guarantees the credibility of communication components through trusted computing technology, and realizes the credibility of component connections through channel integrity protection.

Description

technical field [0001] The invention relates to network security technology, in particular to the interconnection structure technology of security protection components. Background technique [0002] The traditional communication method is to communicate between processes. The connection initiator sends a connection request, and the receiver processes the receiving request. If the connection process is successful, a channel is established for communication. [0003] Taking the three-way handshake connection process of the TCP connection process as an example, the so-called three-way handshake (Three-Way Handshake) is to establish a TCP connection, which means that when establishing a TCP connection, the client and the server need to send a total of 3 packets to confirm the establishment of the connection. In socket programming, this process is triggered by the client executing connect, such as figure 1 As shown, the whole process is as follows: [0004] (1) The first hands...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0819H04L9/083H04L9/0838H04L9/0863H04L9/32
Inventor 陶源李明
Owner THE THIRD RES INST OF MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products