Method of establishing the trustworthiness level of participant in communication connection

A technology of trust level and communication connection, applied in key distribution, can solve the problem of high expected cost and achieve the effect of saving time

Inactive Publication Date: 2005-05-25
TREND MICRO INC
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Unfortunately, mobile devices such as mobile phones are not currently designed to be tamper-resistant, and adding full tamper resistance is not practical for an everyday type of handset due to the high expected cost of doing so

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of establishing the trustworthiness level of participant in communication connection
  • Method of establishing the trustworthiness level of participant in communication connection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Next, typical embodiments of the present invention will be described.

[0039] In Fig. 1, a system is shown, comprising a first communication party in the form of a smart card, a second communication party in the form of a back-end server 3 and a handset connected between the communication parties 1, 3 Form parties 2. The handset 2 includes a memory unit 4, also called a phone trust module, in which a trust certificate 6 is stored.

[0040] When the Smartcard 1 is inserted into the handset 2 to initiate a session via the communication link, the Smartcard 1 requests the transfer of the trust certificate 6 from the handset 2 .

[0041] The latter implementation is based on the principle of using public key cryptography, enabling one entity to generate a digital signature and another entity to verify the signature. However, other authentication methods may also be used.

[0042] Assume that the effective set of trust levels TL is represented by a list of L+1 integers 0,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention proposes a method for determining a trust level of a participant in a communication connection between a first communication party and a second communication party in order to adapt the communication behavior to the determined trust level. The participant is equipped with a trust certificate and a participant private key which is securely stored separately from the trust certificate. The first communicating party receives the trust certificate from the participating party, from which the trust level is derived and determined. The first communicating party uses the private key of the participating party to test whether the trust certificate belongs to the participating party. In case the test confirms that the trust certificate belongs to the participating party, the first communicating party communicates the determined trust level to the second communicating party. Then, at least one parameter of the communication behavior is selected according to the determined trust level.

Description

technical field [0001] The present invention relates to a method of determining the trustworthiness level of a party involved in a communication connection between a first communicating party and a second communicating party, and in particular to determining the trustworthiness level of a party in a trusted environment, such as a hand-held telephone. The method is related to the trust level of handheld devices such as mobile phones. Background technique [0002] Integrated circuit cards, also known as smartcards, are generally considered to be more resistant to tampering than conventional computer systems, so they are often used for authentication and security in large computer systems. As an example, Smart Card is used in the GSM mobile phone system as a Subscriber Identity Module, abbreviated as SIM. Here, a mobile handset, also known as a mobile device or ME, is generally not considered a trusted device, but a trusted smart card is used to securely store and process user...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04Q7/22G09C1/00H04L9/08H04Q7/24H04Q7/26H04Q7/30H04Q7/38
CPCH04L9/3234H04L9/3263H04L2209/56H04L9/32
Inventor 卡尔·宾丁斯蒂芬·G·希尔迈克尔·莫泽露克·J·奥康纳
Owner TREND MICRO INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products