Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Trusted computing system and security protection system

A technology of trusted computing and security protection, applied in computer security devices, computing, platform integrity maintenance, etc., can solve problems such as incomplete logic

Inactive Publication Date: 2021-05-11
国网宁夏电力有限公司信息通信公司
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Due to the limitations of people's cognitive logic of IT, all logical combinations cannot be exhausted, and they can only be limited to completing computing tasks to design IT systems. There must be defects of incomplete logic, thus forming a network security problem that is difficult to deal with attacks by humans using defects.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted computing system and security protection system
  • Trusted computing system and security protection system
  • Trusted computing system and security protection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments are only It is a part of the embodiments of this application, not all of them. The components of the embodiments of the application generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the application provided in the accompanying drawings is not intended to limit the scope of the claimed application, but merely represents selected embodiments of the application. Based on the embodiments of the present application, every other embodiment obtained by those skilled in the art withou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a trusted computing system and a security protection system. A trusted cryptographic module in the trusted computing system provides cryptographic operation support for a trusted computing platform; the trusted platform control module adds a trust root on the basis of the trusted password module and combines a password with control. The trusted computing platform performs trusted measurement on each node of the trusted computing system; the trusted BIOS platform provides support for trust chain transmission of the trusted computing platform; the trusted software module performs trusted verification on each node of the trusted computing system and monitors the trusted computing system. The trusted application software is used as a system call between the trusted computing platform and the trusted cryptographic module; and the network layer performs strategy verification on the trusted application software, the trusted computing platform and the trusted cryptographic module. Through the trusted computing system with coexistence of operation and protection under the control of the security trusted strategy, security protection can be effectively provided for the network space in the big data environment.

Description

technical field [0001] The present application relates to the technical field of trusted computing, in particular, to a trusted computing system and a security protection system. Background technique [0002] Most of the current network security systems are mainly composed of firewalls, intrusion detection, and virus detection and killing, which are called the "old three". First of all, the old third sample is compared and killed based on the content of the signature database that has occurred. Faced with the endless new vulnerabilities and attack methods, this passive response is hard to guard against; It violates the basic security principles; third, the old third can be controlled by attackers and become a platform for network attacks, so the network security risk is extremely high. [0003] Due to the limitations of people's cognitive logic of IT, all logical combinations cannot be exhausted, and they can only be limited to completing computing tasks to design IT system...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/50G06F21/55G06F21/57
CPCG06F21/50G06F21/55G06F21/572G06F21/577
Inventor 刘思尧于烨郭安乐张立中赵中英吴宗后周怡常冠青彭嘉润赵世燕
Owner 国网宁夏电力有限公司信息通信公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products