Method and system for protecting integrity of host based on self-checking mechanism

An integrity and self-verification technology, applied in the field of server security, can solve the problems of relying on remote challenger and privacy PCA, and achieve the effect of protecting integrity, convenience and security, and protecting security

Inactive Publication Date: 2019-09-03
SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a method and system for protecting the integrity of the host based on a self-verification mechanism, aiming at solving the problem of relying on the remote challenger and privacy PCA when using the remote certifica

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for protecting integrity of host based on self-checking mechanism
  • Method and system for protecting integrity of host based on self-checking mechanism
  • Method and system for protecting integrity of host based on self-checking mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] In order to clearly illustrate the technical features of the present solution, the present invention will be described in detail below through specific implementation methods and in conjunction with the accompanying drawings. The following disclosure provides many different embodiments or examples for implementing different structures of the present invention. To simplify the disclosure of the present invention, components and arrangements of specific examples are described below. Furthermore, the present invention may repeat reference numerals and / or letters in different instances. This repetition is for the purpose of simplicity and clarity and does not in itself indicate a relationship between the various embodiments and / or arrangements discussed. It should be noted that components illustrated in the figures are not necessarily drawn to scale. Descriptions of well-known components and processing techniques and processes are omitted herein to avoid unnecessarily lim...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a system for protecting the integrity of a host based on a self-checking mechanism. Based on an integrity measurement technology in trusted computing, the measurement reference value of the protected object is stored into an NV space in a TPM chip of a host; hardware and software of a host in the starting process of the host are measured in real time through trusted guidance, the real-time measurement value of a protected object is obtained, the integrity state of the host is judged by comparing a measurement reference value with the real-time measurement value, an incomplete object list is found based on an integrity report, and safe visual management is provided. According to the self-checking mechanism, the integrity of the host can be protected basedon an integrity measurement technology in a trusted computing system without a remote challenge party and a privacy PCA, the security of the host is improved, and the security of hardware and software of the host can be conveniently protected.

Description

technical field [0001] The invention relates to the technical field of server security, in particular to a method and system for protecting the integrity of a host based on a self-verification mechanism. Background technique [0002] Based on trusted computing technology, the Trusted Computing Group uses remote attestation to protect the security of hosts. Remote attestation schemes usually contain a remote challenger, private PCA, and challenged nodes. As the host of the challenged node, its security is usually judged by the remote challenger. [0003] Because it involves remote communication, in order to avoid identity masquerading and forgery between networks, the scheme must introduce privacy PCA to issue identity certificates, and use TPM (Trusted Platform Module, Trusted Platform Module) identity certificates to represent identities. When this remote attestation scheme protects the security of the host, PCA and the remote challenger must be introduced. When deployed ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57
CPCG06F21/57
Inventor 刘海伟
Owner SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products