Unlock instant, AI-driven research and patent intelligence for your innovation.

A terminal trusted authentication method and system based on electronic signature

An electronic signature and authentication method technology, applied in electrical components, wireless communications, security devices, etc., can solve the problems of security risks, malicious injection or tampering, difficult to find, and heavy workload of whitelist maintenance, so as to improve security. Effect

Active Publication Date: 2021-10-29
TIANGU INFORMATION SCI TECH HANGZHOU
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] 1. The maintenance workload of the whitelist list is relatively large;
[0011] 2. There is a risk of bypassing the whitelist. Once hackers know the restriction principle of the whitelist, they can bypass the whitelist and start malicious terminal applications;
[0012] 3. After the whitelist terminal application is started, it is difficult to detect malicious injection or tampering
[0015] 1. The accuracy of behavior detection is difficult to guarantee;
[0016] 2. The behavior whitelist is introduced, and the maintenance workload is relatively large;
[0017] 3. Hackers know the whitelist mechanism and bypass the whitelist, which poses a security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A terminal trusted authentication method and system based on electronic signature
  • A terminal trusted authentication method and system based on electronic signature
  • A terminal trusted authentication method and system based on electronic signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0052] It should be noted that, in the case of no conflict, the embodiments of the present invention and the features in the embodiments can be combined with each other.

[0053] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments, but not as a limitation of the present invention.

[0054] The present invention includes an electronic signature-based terminal trusted authentication method, whic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a terminal credible authentication method and system based on an electronic signature. The method includes: sending an application signature request corresponding to a terminal application to a management and control center, and the management and control center authenticates the terminal application, and after the authentication is passed, the management and control center conducts an authentication of the terminal application. The terminal application issues a signature certificate; creates a virtual security domain and divides the network into isolated areas; during the installation process of the terminal application in the virtual security domain, the virtual security domain sends a verification request to the management and control center, and the management and control center verifies the terminal application according to the verification request. Whether the signature certificate is legal; if so, the terminal application is installed and started in the virtual security domain, and the terminal application after startup accesses the isolated area; the firewall monitors the traffic of the terminal application in the virtual security domain. When the traffic of the terminal application is abnormal , the firewall performs abnormal blocking processing on the abnormal terminal application. Avoid the whitelist mechanism, and realize the trusted authentication of terminal applications through electronic signatures.

Description

technical field [0001] The present invention relates to the field of trusted technology, in particular to a terminal trusted authentication method and system based on an electronic signature. Background technique [0002] Trusted Computing (Trusted Computing, referred to as TC) is a technology promoted and developed by TCG (Trusted Computing Group). Trusted computing is a trusted computing platform supported by hardware security modules that is widely used in computing and communication systems to improve the overall security of the system. Trusted computing is born for behavioral security. Among them, one of the core goals of trusted computing is to ensure the integrity of the system and terminal applications, so as to ensure that the system or software is running in the trusted state expected by the design target. Trusted computing is not the same as security, but it is the basis of security, because security solutions and policies can only further ensure security purpose...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/069H04W12/086H04W12/088
Inventor 李程金宏洲程亮
Owner TIANGU INFORMATION SCI TECH HANGZHOU