Authorization control method and device and trusted computing terminal

An authorization control and credible technology, applied in the field of credible management, can solve the problem of inability to verify authorization and license

Active Publication Date: 2020-01-10
BEIJING KEXIN HUATAI INFORMATION TECH
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide an authorization control method and device, and a trusted computing terminal to at least solve the technical problem in the related art that a valid certificate file cannot be provided for the client to verify the authorization of the client's trusted protection software

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization control method and device and trusted computing terminal
  • Authorization control method and device and trusted computing terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to enable those skilled in the art to better understand the solutions of the present invention, the technical solutions in the embodiments of the present invention will be described clearly and completely with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is a part of the embodiments of the present invention, not all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0024] It should be noted that the terms "first" and "second" in the specification and claims of the present invention and the above-mentioned drawings are used to distinguish similar objects, and not necessarily used to describe a specific sequence or sequence. It should be understood that the data used in this way can be interchanged under ap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authorization control method and device and a trusted computing terminal. The method comprises the steps of obtaining a hardware code file of a target client, and generatingan authorization certificate file based on the hardware code file, wherein the authorization certificate file is used for instructing the target client to run a trusted protection software, and the trusted protection software is used for conducting active safety protection on the target client; and uploading the authorization certificate file to a trusted management center, wherein the trusted management center is used for sending an authorization certificate file to the target client, and the target client is used for carrying out authorization permission verification when trusted protection software is started or operated after receiving the authorization certificate file. According to the present invention, the technical problem that an effective certificate file cannot be provided for the client to perform the authorization permission verification on the trusted protection software of the client in related technologies, is solved.

Description

Technical field [0001] The present invention relates to the technical field of trusted management, in particular to an authorization control method and device, and a trusted computing terminal. Background technique [0002] In related technologies, when the client communicates with the trusted management center, a simple file encryption method is often used to encrypt the files transmitted during the communication. This processing method cannot guarantee that the client can perform real-time security protection; and The client cannot perform authorization processing, that is, the client can always be protected and cannot provide a valid certificate file for verification processing, and on this basis, the trusted protection software running in the client will not be authorized to verify , Resulting in the client’s trusted protection software being in a free-range state and not being effectively managed. [0003] In view of the above-mentioned problems, no effective solutions have y...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/64H04L29/08
CPCG06F21/121G06F21/64H04L67/06
Inventor 孙瑜杨成刚王伟
Owner BEIJING KEXIN HUATAI INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products