Credible data transmission method

A transmission method and data transmission technology, applied in the field of information security, can solve problems such as prolonging the use of expired files, being vulnerable to some attacks, and violating usage policies, etc., to achieve the effect of ensuring security, ensuring privacy, and ensuring security

Active Publication Date: 2019-02-19
STATE GRID ZHEJIANG ELECTRIC POWER +1
View PDF4 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing attempts to use encryption and access control mechanisms to protect corporate data are vulnerable to some attacks
For example, malware could steal file content and even keys used for encryption at the same time, by reading app memory while the app is running, copying display content from video framebuffers, or violating usage policies (such as an attacker Extend the use of expired files by modifying the system time of the machine where the client is located)
In addition, assuming that the above threats have been resolved, more advanced attacks can still crack the application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credible data transmission method
  • Credible data transmission method
  • Credible data transmission method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0040] The invention relates to a trusted data transmission method. The client and server for data transmission are authenticated through SGX, and the client authentication module verifies the legitimacy of the platform and the user to the corresponding server. After the client is authenticated, , a session with the server is established, the client and the server perform a one-time provisioning agreement, and the confidential data of the client application is sealed to the platform where the application is located, among which, a separate security is established between the server and the client Each channel corresponds to a unique client, and the data sent by the server to the client is encrypted during transmission; after the protected file is encrypted in the enclave, it sends a specific file request to the client according to the client's file request. files, which are then distributed to authenticated and authorized app users to view or perform other operations.

[0041]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a credible data transmission method, which comprises the following steps: authenticating, by the SGX (Singapore Exchange Limited), a client and a server which are in data transmission; verifying, by a client authentication module, legalities of a platform where the client is positioned and a user to the corresponding server; after the client is authenticated, establishing asession between the client and the server to enable the client and the server to perform a one-off supply protocol, and sealing confidential data of a client application onto a platform where the application is positioned, wherein an independent secure channel for communication connection is established between the server and the client, and each channel corresponds to a unique client, and the server encrypts data sent by the client in a transmission process; and after a protected file is encrypted in an enclave, sending a specific file to the client according to a file request of the client,and then distributing the file to an authenticated and authorized application user to check or perform other operations. Based on credible hardware, the method effectively solves a security bug.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a new trusted data transmission method, which is based on trusted hardware and involves the transmission of confidential information in smart grids. Background technique [0002] Since the birth of computer technology, the types and numbers of applications running on computers have increased day by day. Today's computer systems need to process more and more important, sensitive and valuable information. This information must be protected from tampering and theft. Unfortunately, an entire industry today is more or less dedicated to information theft [1], such as stealing banking data or corporate intellectual property from systems. There are many applications on computer platforms that must be kept confidential, such as financial items, online banking, and medical record applications. Secret holders or software may not trust each other, so the secrets of each sof...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/32
CPCH04L9/0863H04L9/0869H04L9/3242H04L9/3249H04L63/0442H04L63/083
Inventor 姚一杨陈建戴波王彦波张旭东龚小刚叶志远黄云凡恒山倪鹏程蒲强
Owner STATE GRID ZHEJIANG ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products