Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Trusted server policy deployment method, device, system and computing system

A technology for deploying systems and servers, applied in the field of policy deployment methods for trusted servers, systems and computing systems, and devices, can solve problems such as poor independence and flexibility, and achieve the effect of saving time and energy

Active Publication Date: 2022-03-04
ALIBABA GRP HLDG LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a trusted server policy deployment method, device, system, and computing system to at least solve the problem of independence and Technical issues with poor flexibility

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted server policy deployment method, device, system and computing system
  • Trusted server policy deployment method, device, system and computing system
  • Trusted server policy deployment method, device, system and computing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] According to an embodiment of the present application, an embodiment of a trusted server policy deployment system is provided, which is used to deploy, update or delete related policies of trusted computing. It should be noted that this embodiment can be applied to the measurement of trusted servers in any network application or service system.

[0049] As an optional embodiment, figure 1 is a schematic diagram of an optional trusted server deployment system according to an embodiment of this application, such as figure 1 As shown, the system includes: a terminal device 101 and a trusted server 103, and a user can deploy relevant policies of the trusted server 103 by logging in locally or remotely to a single computer through the terminal device 101. figure 2 is an optional trusted server deployment flowchart according to the embodiment of this application, such as figure 2 As shown, the deployment process of the measurement strategy may include the following steps:...

Embodiment 2

[0058] According to the embodiment of the present application, a system embodiment of trusted server detection is also provided to overcome the problem of non-independence and flexibility caused by the strict hierarchical relationship in the deployment, update and deletion of trusted related policies in embodiment 1, It should be noted that this embodiment can be applied to the measurement of trusted servers in any network application or service system.

[0059] The inventor found through research that in order to realize the centralized management of trusted servers, a trusted server policy management platform based on cloud platform can be provided, its functions include but not limited to the initial deployment of trusted servers in various business environments, intelligent management and control and operation and maintenance etc. The trusted server policy management platform based on the cloud platform can not only simplify the trusted software and hardware environment co...

Embodiment 3

[0079] According to the embodiment of this application, an embodiment of a trusted server policy deployment method is also provided. This embodiment can be applied to the trusted server in the trusted server policy deployment system in Embodiment 2, including but not limited to implementing Scenario in Example 2. It should be noted that the steps shown in the flowcharts of the accompanying drawings may be performed in a computer system, such as a set of computer-executable instructions, and that although a logical order is shown in the flowcharts, in some cases, The steps shown or described may be performed in an order different than here.

[0080] At present, in the existing trusted server strategy deployment scheme, the measurement algorithm and measurement object of the measurement strategy determine the measurement algorithm and measurement object of the verification strategy, and when the measurement algorithm of the verification strategy is inconsistent with the measurem...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a trusted server policy deployment method, device, system and computing system. Wherein, the method includes: in the process of deploying the strategy by the trusted server, sending the measurement strategy of at least one measurement object and the verification strategy of at least one verification object to the service center; the trusted server receives the reminder information returned by the service center, wherein , the reminder information is used to indicate that if it is detected that the measurement algorithm of the measurement object is inconsistent with the verification algorithm of the corresponding verification object, the trusted server is reminded to re-deploy the measurement algorithm and the verification algorithm to be consistent. The present application solves the technical problem that the existing trusted server policy management scheme adopts the same measurement algorithm for all measurement objects, resulting in poor independence and flexibility.

Description

technical field [0001] The present application relates to the field of information system security, and in particular, relates to a trusted server policy deployment method, device, system and computing system. Background technique [0002] The network security problems of computer-based information systems are becoming more and more prominent. Traditional firewalls, intrusion detection, anti-virus and other technologies are all passive protection technologies and cannot fundamentally solve security problems. Trusted computing can establish a trusted information system by strengthening the computer system architecture to actively defend against information security threats. The principle of trusted computing is to first add a trusted module (TPM) to the hardware platform, and use the trusted module to build a root of trust. The combination of hardware technology and software technology takes comprehensive measures to improve the security of computer systems. [0003] Truste...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L41/08H04L41/0866H04L9/40
CPCG06F21/577G06F2221/2135H04L63/20H04L63/0823H04L63/0428H04L9/3268H04L9/30H04L9/321H04L41/0893
Inventor 付颖芳肖鹏
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products