File tamper-proofing method and system, terminal and trusted cloud platform

A tamper-proof, trusted cloud technology, applied in transmission systems, electrical components, instruments, etc., can solve the problems of tampering with original documents, document tamper-proof technology failure, etc., to achieve the effect of ensuring document security

Active Publication Date: 2018-05-04
CHINA TELECOM CORP LTD
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Regardless of local and remote, the key file is searched and cracked by malware to obtain the original key file, and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File tamper-proofing method and system, terminal and trusted cloud platform
  • File tamper-proofing method and system, terminal and trusted cloud platform
  • File tamper-proofing method and system, terminal and trusted cloud platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that the relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.

[0035] At the same time, it should be understood that, for the convenience of description, the sizes of the various parts shown in the drawings are not drawn according to the actual proportional relationship.

[0036] The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses.

[0037] Techniques, methods and devices known to those of ordinary skill in the relevant art may not be discussed in detail, but where appropriate, such techniques, methods and devices should be considered part of the Authoriz...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a file tamper-proofing method and system, a terminal and a trusted cloud platform, and relates to the field of mobile terminal security. The method comprises the following steps: checking key files of an operating system to obtain check values of the key files; encrypting the key files and the check values based on trusted information of the terminal; transmitting the encrypted key files and check values to the trusted cloud platform; and if the terminal determines the exception of the key files or the exception of the key files in response to the trusted cloud platform, giving an alarm prompt to a user to realize tamper proofing of the key files. Through adoption of the file tamper-proofing method and system, trusted information of an operator on the terminal and the trusted cloud platform of the operator are fully utilized to ensure the file security of a terminal user from the underlying layer.

Description

technical field [0001] The invention relates to the field of mobile terminal security, in particular to a file tamper-proof method, system, terminal and trusted cloud platform. Background technique [0002] With the rapid development of the mobile Internet and the powerful functions of smart mobile terminals, more and more users use mobile terminals to process and transmit data, and the security issues of mobile terminals are becoming more and more prominent. The Android operating system is facing severe challenges due to its openness and high market share. [0003] Traditional PC-side and server-side file anti-tampering technologies mainly rely on storing original key files on independent physical storage media and performing regular manual comparisons. [0004] The file anti-tampering technology of the Android terminal is also based on the traditional PC-side and server-side file anti-tampering technology. According to the storage location of the encrypted original key fi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F21/60
CPCH04L63/0428G06F21/602
Inventor 殷志越陈晓东朱易翔
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products