Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

178 results about "Integrity measurement" patented technology

Integrity is a concept of consistency of actions, values, methods, measures, principles, expectations, and outcomes. In ethics, integrity is regarded as the honesty and truthfulness or accuracy of one’s actions.

Method and apparatus to authenticate base and subscriber stations and secure sessions for broadband wireless networks

Methods and apparatus to authenticate base and subscriber stations and secure sessions for broadband wireless networks, such as IEEE P802.16-based networks. The apparatus employs a trusted platform module (TPM) to generate security keys, including attestation identity keys (AIKs). A subscriber station (SS) generates an AIK key pair for a specific authentication server (AS) operated by a broadband wireless network, and sends the public AIK key to the AS during a one-time service signup process. In response to an access request, the SS sends authentication information including a manifest signed with the SS's private AIK key. The SS may then be authenticated by the AS via use of the SS's public AIK key. The AS may be authenticated by the SS using a similar process, thus supporting mutual authentication via AIK keys. The TPM may also be used to verify a current configuration of a subscriber station platform is an authorized configuration. Integrity measurements are made via the TPM, and corresponding configuration identifiers are sealed to the TPM and sent to the authentication server during the signup process. During a subsequent access request, an attempt is made to unseal a configuration identifier, which can only proceed if a corresponding configuration has not changed.
Owner:INTEL CORP

Security terminal reinforcing model and reinforcing method of tolerable non-trusted component

The invention relates to a security terminal reinforcing model and reinforcing method of a tolerable non-trusted component, which can ensure the security of the computing environment of the terminal equipment in an access network. A universal serial bus (USB) integrated embedded trusted system is used as a trusted root of a terminal; the behavior control of the non-trusted component is realized based on a virtual machine; the trusted computing software supporting a white list mechanism ensures that services and applications listed in the white list mechanism can be started without integrity measurement to tolerate the loading and the running of the non-trusted component; and especially, under the condition that the component running on the terminal is not trusted, the predictability and the controllability of the final result are ensured, the confidentiality of the related information when the access terminal accesses the network is ensured, and the confidentiality and the integrity of the local information of the terminal are ensured. The invention is matched with the existing trusted computing and other information security technologies to construct a terminal computing environment with a predictable security result.
Owner:ZHENGZHOU XINDA JIEAN INFORMATION TECH

Space information network roaming and trusted security access method

The invention discloses a space information network roaming and trusted security access method. The space information network roaming and trusted security access method includes a node registration stage, a request access stage, an identity authentication stage, an integrity verification stage and a key generation stage. Session key negotiation among terminal access nodes MN and a non-local security domain authentication server FA is completed, procedures of the integral space information network roaming and trusted security access method are completely completed at the moment, mutual identity authentication and integrity measurement among the terminal access nodes MN and the non-local security domain authentication server FA are implemented, and the terminal access nodes MN, the non-local security domain authentication server FA and a local security domain authentication server HA participate in the session key negotiation among the terminal access nodes MN and the non-local security domain authentication server FA. The space information network roaming and trusted security access method has the advantages that the interaction round number is low, session keys are high in security, a trusted computing related technology is utilized, the integrity of the terminal access nodes can be measured, and the problem of easy network attack due to poor integrity and trustworthiness of terminals can be solved.
Owner:BEIHANG UNIV

Star trust chain supporting embedded platform application program integrality verification method

InactiveCN101504704AIntegrity Metric ImplementationConvenience and Credibility MetricsPlatform integrity maintainanceOperational systemValidation methods
The invention discloses an application program integrity verification method for an embedded platform supported by a star trust chain. The embedded platform is provided with a TPM realized by an independent hardware which is taken as a trusted measurement of the whole platform, and the TPM uses a hardwire to control the operation of the embedded platform; the inside of the TPM is integrated with a trusted computing root, a trusted storage root and a trusted report root by adopting a physical mode so as to have physical protection on the TPM and a connecting circuit; and the TPM forms star trust relationship with the embedded platform Bootloader, an operating system kernel and a root file system. The method is characterized in that an integral application program which needs trust expansion in the root file system is subjected to trusted measurement by the trusted computing root of the TPM, and an obtained trusted measurement value is saved in the trusted storage root of the TPM; and the application program is subjected to integrity measurement during the starting of an operating system, then an obtained measurement value is compared with the trusted measurement value, and the integrity verification of the application program passes if the obtained measurement value is consisted with the trusted measurement value, otherwise, the integrity verification fails.
Owner:WUHAN UNIV

Trusted network access method and system for mobile terminal

The invention discloses a trusted network access method and a trusted network access system for a mobile terminal, and belongs to the technical field of trusted network access. The method comprises the following steps that: 1) the mobile terminal loads an integrity measurement collector and detects the integrity of the integrity measurement collector, and a policy decision point loads an integrity measurement verifier and detects the integrity of the integrity measurement verifier; 2) the mobile terminal transmits a network access request to a policy enforcement point; 3) after receiving the network access request, the policy enforcement point transmits a network access judgment request to the policy decision point, and authenticates the user identity of the mobile terminal; 4) after the user identity passes authentication, platform identity authentication is performed between the policy decision point and the mobile terminal, the policy decision point and the mobile terminal mutually authenticate system integrity, and a platform trust relationship between the policy decision point and the mobile terminal is established; and 7) the policy decision point transmits a suggestion indicating whether to access the policy enforcement point according to the platform trust relationship, and the policy enforcement point authorizes network access permission to the mobile terminal according to the suggestion. By the method and the system, network resources can be well protected.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI

Method for measuring completeness of credible virtual field start-up files supporting non-delaying machine

The invention relates to a method for supporting the integrity measurement of boot files in trusted virtual domain of a zero-downtime machine. Management tool and boot manager of the virtual domain in privilege domain are modified to realize that the integrity measurement of the system boot files in the trusted virtual domain is just carried out when the system boot files are loaded, therefore, the safety and extensible problems for carrying out the integrity measurement of the system boot files in the trusted virtual domain when booting computer are overcome and the system flexibility are improved, and the arrangement of the trusted virtual domain including re-customizing or updating kernel system of virtual domain can be carried out dynamically during running process of computer, and data service of other virtual domain in the same hardware platform is not interrupted when booting trusted virtual domain. The measurable boot files comprise configuration files of virtual domain, boot configuration files of virtual domain and the files that are needed to be measured are designated by the boot configuration files of virtual domain. The method can cooperate with other trusted computing technology in virtual environment to build a complete virtual domain boot trusted chain.
Owner:BEIJING JIAOTONG UNIV

Dynamic link library integrity measuring method under perlink mechanism

ActiveCN104751048ADoes not affect startup speedPerformance is not affectedComputer security arrangementsPrelinkCode segment
The invention discloses a dynamic link library integrity measuring method under a perlink mechanism. The method comprises the steps that firstly, a Linux integrity measuring enabling switch is turned off, an integrity maintaining mode is achieved, and a file to be measured is extracted; secondly, whether the measured file belongs to a dynamic link library file or not is detected, and if yes, the displacement position and length of a code segment in the dynamic link library file in the file are extracted and sent to a measurement function, and the reference measurement value is calculated and stored; thirdly, an integrity verification mode is achieved, when a file loaded by the system is the file to be measured, whether the file belongs to the dynamic link library file or not is detected, if yes, the displacement position and length of a code segment in the dynamic link library file in the file are extracted and sent to the measurement function, the measurement value is calculated and compared with the reference measurement value, if the measurement value is matched with the reference measurement value, loading executing is allowed, and if the measurement value is not matched with the reference measurement value, loading executing is refused. The integrity measurement can be carried out on the dynamic link library file without closing a prelink tool.
Owner:INST OF INFORMATION ENG CHINESE ACAD OF SCI

Power transmission and transformation equipment state monitoring system security protection method based on trust chain transmission

The invention relates to a power transmission and transformation equipment state monitoring system security protection method based on trust chain transmission, which carries out credible transformation to a power transmission and transformation equipment state monitoring system through identity authentication, platform authentication, integrity measurement, trust chain transmission and other methods. A credible authentication service, an access actuation server and a centralized regulation server are deployed in a main station, and a monitoring terminal, a state information access controller, a state information access gateway machine and a state monitoring proxy are transformed into a credible monitoring terminal, a credible state information access controller, a credible state information access gateway machine and a credible state monitoring proxy, so that the whole monitoring system is constructed into a credible system. The system can effectively prevent malicious program attack, malicious code injection attack, physical data theft, network tapping, sniffing attack and the like, and protect the security of the monitoring system and an internal power grid system; and the invention also provides a trust chain transmission model which is used for proving that under trust chain transmission, as long as each level of a trust chain is credible, the whole system is credible.
Owner:STATE GRID ELECTRIC POWER RES INST

System and method for dynamic cross-domain access control based on trusted network connection

ActiveCN104618395AGuaranteed secure and trusted accessRealize dynamic controlTransmissionNetwork connectionTrust level
The invention discloses a system for dynamic cross-domain access control based on trusted network connection. The system comprises a trusted network access requester, a network access decision-maker and a network access controller, wherein the network access decision-maker moves the requester into different safety trusted domains according to the state of the network access requester, so as to achieve dynamic cross-domain access control. The invention further discloses a method for dynamic cross-domain access control based on trusted network connection, and according to the method, platform identity authentication and integrity measurement are carried out by using a domestic TCM chip to rank the network according to safety trusted levels, and the access of the network by a terminal is limited according to the terminal identity authentication and integrity measurement results. According to the invention, dynamic cross-domain access control is set up on the basis of trusted network connection, and the terminal is put in the network domains of different safety levels in a dynamic manner according to the safety trusted status of the terminal in time, so that the safe and trusted access of the network is guaranteed.
Owner:SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products