Unlock instant, AI-driven research and patent intelligence for your innovation.

Terminal credible authentication method and system based on electronic signature

An electronic signature and authentication method technology, applied in electrical components, wireless communication, security devices, etc., can solve the problems of security risks, heavy maintenance workload, and white list maintenance workload, and achieve the effect of improving security.

Active Publication Date: 2021-08-13
TIANGU INFORMATION SCI TECH HANGZHOU
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] 1. The maintenance workload of the whitelist list is relatively large;
[0011] 2. There is a risk of bypassing the whitelist. Once hackers know the restriction principle of the whitelist, they can bypass the whitelist and start malicious terminal applications;
[0012] 3. After the whitelist terminal application is started, it is difficult to detect malicious injection or tampering
[0015] 1. The accuracy of behavior detection is difficult to guarantee;
[0016] 2. The behavior whitelist is introduced, and the maintenance workload is relatively large;
[0017] 3. Hackers know the whitelist mechanism and bypass the whitelist, which poses a security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal credible authentication method and system based on electronic signature
  • Terminal credible authentication method and system based on electronic signature
  • Terminal credible authentication method and system based on electronic signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work fall within the protection scope of the present invention.

[0052] It should be noted that the embodiments of the present invention and the features of the embodiments may be combined with each other under the condition of no conflict.

[0053] The present invention will be further described below with reference to the accompanying drawings and specific embodiments, but it is not intended to limit the present invention.

[0054] The present invention includes an electronic signature-based terminal trus...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a terminal credible authentication method and system based on an electronic signature, and the method comprises the steps: transmitting an application signature request corresponding to a terminal application to a management and control center, enabling the management and control center to authenticate the terminal application, and signing and issuing a signature certificate to the terminal application after the authentication is passed; creating a virtual security domain, and dividing the network into an isolation region; in the installation process of the terminal application in the virtual security domain, enabling the virtual security domain to send a verification request to the management and control center, and enabling the management and control center to verify whether the signature certificate of the terminal application is legal or not according to the verification request; if yes, installing and starting the terminal application in the virtual security domain, and enabling the started terminal application to access the isolation area; enabling the firewall to monitor the traffic of the terminal application in the virtual security domain, and when the traffic of the terminal application is abnormal, enabling the firewall to block the abnormal terminal application. A white list mechanism is avoided, and credible authentication of the terminal application is realized through the electronic signature.

Description

technical field [0001] The present invention relates to the field of trusted technology, in particular to a terminal trusted authentication method and system based on an electronic signature. Background technique [0002] Trusted Computing (Trusted Computing, referred to as TC) is a technology promoted and developed by TCG (Trusted Computing Group). Trusted computing is a trusted computing platform supported by hardware security modules that is widely used in computing and communication systems to improve the overall security of the system. Trusted computing is born for behavioral security. Among them, one of the core goals of trusted computing is to ensure the integrity of the system and terminal applications, so as to ensure that the system or software is running in the trusted state expected by the design target. Trusted computing is not the same as security, but it is the basis of security, because security solutions and policies can only further ensure security purpose...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/069H04W12/086H04W12/088
Inventor 李程金宏洲程亮
Owner TIANGU INFORMATION SCI TECH HANGZHOU