Trusted network communication method and device based on safety chip hardware algorithm module

A hardware algorithm and security chip technology, applied in the field of digital information transmission, can solve the problems of low credibility and security, achieve the effect of improving security and credibility, and reducing the possibility of data theft

Inactive Publication Date: 2018-10-09
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +3
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Therefore, the technical problem to be solved by the present invention is to solve the problem that the network communication method in the prior art only manages and controls the process to be run when the terminal has a program to be run, and has low credibility and security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted network communication method and device based on safety chip hardware algorithm module
  • Trusted network communication method and device based on safety chip hardware algorithm module
  • Trusted network communication method and device based on safety chip hardware algorithm module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] This embodiment provides a trusted network communication method based on the security chip hardware algorithm module, such as figure 1 described, including the following steps:

[0030] Step S100, when the current system starts up, build a trust chain of the current system since it is powered on. In this embodiment, the current system may be a terminal system or a master station system. In a specific embodiment, the terminal system is an embedded terminal system, and the master station system is a power master station system.

[0031] Step S200, when the application program of the current system initiates a service connection to the peer system of the current system, perform a first integrity measurement on the application program based on the whitelist mechanism, and judge whether to allow establishment of a service connection according to the result of the first integrity measurement. In this embodiment, step S200 is used to perform the first state authentication whe...

Embodiment 2

[0056] This embodiment provides a trusted network communication device based on a security chip hardware algorithm module, including: a trust chain building module, a static measurement module and a dynamic measurement module.

[0057] The trust chain building module is used to build the trust chain of the current system since power-on when the current system starts. In this embodiment, the current system may be a terminal system or a master station system. In a specific embodiment, the terminal system is an embedded terminal system, and the master station system is a power master station system.

[0058] The static measurement module is used to perform the first integrity measurement on the application program based on the white list mechanism when the application program of the current system initiates a business connection to the peer system of the current system, and judge whether to allow the establishment of business according to the first integrity measurement result co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a trusted network communication method and device based on a safety chip hardware algorithm module. The method comprises the following steps of when a system is started, constructing the trust chain of a current system from the beginning of power on; when the application program of the current system initiates service connection to the opposite end system of the current system, carrying out first integrity measurement on the application program based on a whitelist mechanism, and according to a first integrity measurement result, determining whether the service connection is allowed to establish; and during a service connection maintenance process, carrying out a second integrity measurement on the application program based on the triggering of a predetermined instruction, and according to a second integrity measurement result, determining whether the service connection is continuously maintained. When the application program initiates the service connection tothe opposite end system, the first integrity measurement is performed, and during the service connection maintenance process, the second integrity measurement is performed so as to reduce a possibility that transmission data between a terminal system and a main station system is stolen, and improve the safety and the credibility of the method.

Description

technical field [0001] The invention relates to the field of digital information transmission technology, in particular to a trusted network communication method and device based on a security chip hardware algorithm module. Background technique [0002] Trusted computing refers to the simultaneous security protection of computer operations, so that the results of operations and process behaviors are always the same as expected under any conditions. The entire calculation process is measurable and controllable without interference. New calculation model for immunity. At present, as a technology to solve the problem of network communication credibility, the trusted computing mechanism proposed by the Trusted Computing Group (TCG) and the network access control technology are commonly used at home and abroad. Trusted Network Connection , TNC), this technology was proposed by the Trusted Network Connection Group (TNC Sub Group, TNCSG) established by TCG in May 2004, aiming to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/08H04L9/32
CPCH04L9/0838H04L9/3263H04L63/0823H04L63/0869H04L63/0876H04L63/12H04L63/123H04L63/1458H04L67/141
Inventor 王志皓王树才赵保华王博龙刘效禹张鹏李小娟
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products