Method for realizing trusted security protocol based on trusted computing

A trusted computing and security protocol technology, applied in the field of information processing, can solve the problems of reduced security protocol security, failure to meet platform privacy protection requirements, user and server identity and platform cannot perform double authentication, and achieve the goal of improving security Effect

Pending Publication Date: 2022-03-01
北京八分量信息科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the prior art, when using trusted computing technology to implement a trusted security protocol, it is usually impossible to prevent double authentication between the identity of the user and the server and the platform, resulting in a decrease in the security of the security protocol, and it cannot meet the requirements of the cloud environment. Therefore, we need to propose a method for implementing trusted security protocols based on trusted computing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing trusted security protocol based on trusted computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The specific embodiments described here are only used to explain the present invention, not to limit the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0024] The present invention provides such figure 1 A method for implementing a trusted security protocol based on trusted computing includes the following steps:

[0025] S1. Construct a trusted access authentication model through the trusted computing module, and obtain a trusted access security protocol in the cloud environment;

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of information processing, and particularly relates to a method for realizing a trusted security protocol based on trusted computing, which comprises the following steps of: constructing a trusted access authentication model through a trusted computing module to obtain a trusted access security protocol in a cloud environment; determining a mobile terminal device which is accessed trustingly according to the requirement of a trustworthy access security protocol, and sending an access request through the mobile terminal device to obtain a verification offer of the platform; a corresponding verification material is manufactured according to a verification offer of a platform, then the verification material is encrypted through an encryption module to obtain an encrypted verification material, finally, the encrypted verification material is sequentially subjected to matching verification and decryption cracking through a trusted computing module, and a security channel for communication between the mobile terminal equipment and the platform can be opened after cracking succeeds. Dual authentication is carried out in a matching verification and decryption mode, so that the security of a security protocol is improved, and the platform privacy protection requirement in a cloud environment can be met to a certain extent.

Description

technical field [0001] The invention belongs to the technical field of information processing, and in particular relates to a method for realizing a trusted security protocol based on trusted computing. Background technique [0002] With the development and wide application of information technology, people pay more and more attention to information security. The trusted computing technology aimed at improving the security of computer systems has become a research hotspot in the field of international information security, and remote attestation is a difficult and key point in the research of trusted computing. How to enable two nodes in the network to quickly and effectively judge the trusted status of the other platform before interacting with each other under the condition that the platform configuration information is not leaked is the key to the remote attestation technology. In addition, the openness of the wireless network makes the network more vulnerable to attack,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/0853H04L63/10H04L63/12H04L2209/127
Inventor 魏明阮安邦王佳帅邵革建
Owner 北京八分量信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products