Unlock instant, AI-driven research and patent intelligence for your innovation.

Authority principal method based on trusted computing platform

A trusted computing and trusted technology, applied in key distribution, which can solve the problems of complex deployment, high implementation cost and high network requirements

Inactive Publication Date: 2010-08-25
LENOVO (BEIJING) LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of the above-mentioned PMI is that it needs to build a complete PKI (PublicKey Infrastructure, public key infrastructure) and PMI system architecture, resulting in more complicated deployment, large investment, and high requirements on the network
Therefore, PMI is too costly to implement for small and medium-sized applications, especially desktop applications.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authority principal method based on trusted computing platform
  • Authority principal method based on trusted computing platform
  • Authority principal method based on trusted computing platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Specific embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0025] 【Constitution of Trusted Computing Platform】

[0026] FIG. 1 shows the overall composition of a trusted computing platform according to an embodiment of the present invention. As shown in FIG. 1 , a trusted computing platform according to an embodiment of the present invention includes a software platform 100 and trusted hardware 200 . The platform user 300 accepts the services provided by the trusted hardware 200 through the software platform 100 .

[0027] In the trusted hardware 200 , the input-output module 210 is responsible for data exchange and command scheduling with the upper-layer software platform 100 . The authority delegation module 220 can provide basic authority delegation services such as "authority delegation", "delegation revocation", "delegation authentication" and "delegation policy management".

[0028] In addition...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for using key to represent agency, based on confidence calculate platform, wherein said platform comprises confidence hardware and software protocol stacks; the confidence hardware stores evidence data, root key and counter list with at least one counter; the software protocol stack stores key list with at least one key and the agency list with at least one agency. And the method comprises that: inputting at least one agency, relative key agency command and access command of key into confidence hardware; the hardware uses root key to analyze the key, extractskey access command, to check the input access command; when the input access command is right, relating the agency and key; uses root key to encrypt the agency command, inputs it into agency, uses evidence data to calculate integrality and inputs it into agency, to generate authorized agency; feedbacks said agency to software protocol stack, to be input into agency information list.

Description

technical field [0001] The invention relates to authority delegation, in particular to a authority delegation method based on a trusted computing platform, which can improve the security and privacy of delegation. Background technique [0002] At present, in various applications with authorization management, in order to realize authorization delegation, a common system including users, roles, and passwords, or PMI (Privilege Management Infrastructure, authorization management infrastructure) is adopted. The disadvantage of the above-mentioned common system is that it needs to be developed separately for each application and the security is relatively weak. That is, all kinds of authorized data are protected by pure software. The disadvantage of the above-mentioned PMI is that a complete PKI (Public Key Infrastructure, public key infrastructure) and PMI system architecture need to be built, resulting in complicated deployment, large investment, and high requirements on the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
Inventor 冯荣峰王凯郭轶尊李俊
Owner LENOVO (BEIJING) LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More