Whole-process control method for secure access of application program based on trusted computing
An application program and trusted computing technology, applied in the direction of digital data authentication, platform integrity maintenance, etc., can solve problems such as inability to use application program security control, and achieve the effect of precise security control
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] Implementation thinking of the present invention is as follows:
[0030] 1. Using the sample comparison method, the results are credible, and it is convenient to expand the number of samples with the increase of implementation, and the reliability is also improved accordingly.
[0031] 2. On the basis of trusted computing: the combination of the subject's natural person identity and social person identity is realized, the access authority is included in the subject's natural person category, and the work unit and work permit number are included in the subject's social person category. The combination of the two The identity characteristics of the subject are formed, and the safety factor of subject identification is improved.
[0032] In the object identification, the characteristic information of the application program as the object is distinguished from the identification of the data file during the access operation process as the sub-object, that is, the data integr...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

