CN102236752B - Trustiness measuring method for installing and upgrading software - Google Patents

Trustiness measuring method for installing and upgrading software Download PDF

Info

Publication number
CN102236752B
CN102236752B CN201010168527.7A CN201010168527A CN102236752B CN 102236752 B CN102236752 B CN 102236752B CN 201010168527 A CN201010168527 A CN 201010168527A CN 102236752 B CN102236752 B CN 102236752B
Authority
CN
China
Prior art keywords
software
ucm
upgrading
upgraded
business
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201010168527.7A
Other languages
Chinese (zh)
Other versions
CN102236752A (en
Inventor
郭宝安
徐树民
李子臣
杨亚涛
杜彦哲
王绍麟
曹路林
闫世斗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CN201010168527.7A priority Critical patent/CN102236752B/en
Publication of CN102236752A publication Critical patent/CN102236752A/en
Application granted granted Critical
Publication of CN102236752B publication Critical patent/CN102236752B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Stored Programmes (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a trustiness measuring method for installing and upgrading software. The method comprises the following steps of: 1, in the case that a computer of a user is a trusted computer, prompting to download UCM (Unified Change Management) software from a trusted UCM provider by a system after the trusted computer is started; 2, determining whether to download and install the UCM software, if agreeing to install the UCM software, executing a step 3, otherwise, failing in downloading and updating of any software; and 3, executing subsequent various application software to finish installing or upgrading work. According to the method, the installed or upgraded software can be effectively measured, so that the installed or upgraded software is safe and trusted.

Description

The confidence level metering method of software installation and upgrade
Technical field
The present invention relates to a kind of field of computer technology, particularly a kind of confidence level metering method of software installation and upgrade, it can be measured the software of installing or upgrade effectively, makes the software security of installation or upgrading credible.
Background technology
At present, in order to meet the installation of trusted computer user to various application software and the requirement of constantly upgrading and upgrading, proposed a lot of methods and suggestion and gone the software of installing or upgrade to measure.But existing confidence level mechanism is succinct and perfect not enough, still has following shortcoming:
1) adopt the computing method of iteration due to believable measured value, if therefore increase after trust chain forms or delete certain parts, or the edition upgrading of software, all must recalculate all trust values, increase the difficulty of maintenance and management;
2) theoretical according to trusting, trust value can be lossy in transmittance process, and the path of transmission is longer, and loss is larger.Because the trust bang path of chain type trust structure is long, so easily produce the loss of trusting.
As prior art one, China Patent Publication No. is a kind of method that the patent of CN 1917424A discloses creditable calculation modules upgrading, the method that this patent adopts is mainly that TPM module is carried out to discriminatory analysis, judges that whether it meets the requirement of upgrading, upgrades if meet.The computing machine that setting has data to be upgraded is server end, and the computing machine with TPM is client, and server end is connected by network with client, and concrete implementation method is as follows:
1) under, client is obtained the information of attacking from TPM in code, and this information is carried out to the first encryption, obtains sending to server end after ciphertext communication bag;
2) described server end carries out the first deciphering and checking by thin the described ciphertext communication receiving, and allows the notice of upgrading when sending to client according to the result;
3) server end arranges data to be upgraded and the data to be upgraded after arranging is done to the second encryption, forms encrypt data and sends to client;
4) client is carried out the second deciphering and checking to the described encrypt data of receiving, obtains correct encryption data to be upgraded;
5) between client and TPM, adopt the communication modes of rolling random number exchanging mechanism, transmit and contain the messaging parameter of encrypting data to be upgraded to TPM, after TPM checking messaging parameter is correct, be decrypted encrypting data to be upgraded, obtain upgrading after data to be upgraded.
But the upgrading to TPM of one of prior art considers, but ignored that application layer software is installed or upgrading after the judgement of software trust tolerance.
Also has a prior art two, China Patent Publication No. is that the patent of CN 101515316A discloses is a kind of credible computing terminal and trusted computing method, this patent is the TPCM that puts into that CRTM can not be distorted, ensure that it is for can not distort trusted root, to ensure providing guarantee to the credibility of other trust chain tolerance.Operating system and application program more than operating system are improved, and it is improved one's methods is will to be assigned metric module and monitoring modular so that OS and application program more than OS are measured and to be monitored by operating system nucleus.But but there is following shortcoming in prior art two: only have the credible tolerance to original application layer program, and believable judgement when but not considering the application program after upgrading, and also it is larger in installing and deleting the metrics process of software, to trust loss ratio.
To sum up, the chain type trust structure of existing TCG exists a lot of weak points: the computing method that 1) adopt iteration due to believable measured value, if therefore increase after trust chain forms or delete certain parts, or the edition upgrading of software, all must recalculate all trust values, increase the difficulty of maintenance and management; 2) theoretical according to trusting, trust value can be lossy in transmittance process, and the path of transmission is longer, and loss is larger.Because the trust bang path of chain type trust structure is long, so easily produce the loss of trusting.
Therefore, how to realize after a software installation or the rear installation of upgrading or upgrading and whether can safe and reliablely use, be the direction place of those skilled in the art institute wish research.
Summary of the invention
Fundamental purpose of the present invention is to provide the confidence level metering method that a kind of software is installed and upgraded, its be a kind of for realize software install or upgrading after can safe and reliable use method, can obtain safe software upgrade package and judge the method that software after mounting software AKU whether can safe and reliable use by associated server.
Of the present invention time an object is to provide the confidence level metering method that a kind of software is installed and upgraded, it is considered mainly for software installation and upgrade, for also safe and reliablely being used and make to trust loss, the application software that makes to install or upgrade further reduces, in hard disk areas, open up a part of invariant region and store the digest value that is extracted calculating mounting software by UCM, the tolerance root of redaction after making it as upgrading, trusting loss further reduces, thereby solve at present some also remaining not too perfect secure and trusted measures, make user in trusted computer, use real believable software, this method has very strong practicality.
A further object of the present invention is to provide the confidence level metering method that a kind of software is installed and upgraded, the Bind tool UCM that it is is TPM by proposition, whether the software that judges installation by UCM is credible, and obtain the software upgrade package that needs upgrade software by UCM, and it is also carried out to secure and trusted tolerance, use the demand of secure and trusted software to meet user.
In order to achieve the above object, the invention provides the confidence level metering method that a kind of software is installed and upgraded, it comprises the following steps:
Step S1: in the time that user's computing machine is believable computing machine, after this trusted computer starts, system alert is downloaded UCM software from credible UCM suppliers;
Step S2: whether download and install UCM software, if agree to install UCM software, execution step S3, otherwise can not download and upgrade any software;
Step S3: carry out the follow-up work that various application software are installed or upgrading is upgraded.
Wherein, in step S3, in the time that needs are installed application software, the information intercepting wherein at UCM software is carried out message authentication, continues this application software is installed if unanimously allow, and it is come into operation, if inconsistent, refusal continues to install, and exits.
Wherein, in step S3, in the time that application software need to be upgraded upgrading, send application for upgrading, this Application Software Provider obtains the accreditation of UCM software vendor by certain certification, and notice UCM software vendor sends a same transmission mark STF, sign software AKU is issued described trusted computer by described application software, after UCM receives, by its decrypted authentication, and obtain software upgrade package, it is installed to upgrading.
Wherein, UCM software being installed comprises the following steps:
Step S21: user asks to download the UCM software supporting with described trusted computer;
Step S22: the trusted computer of sending application issued by described UCM software by credible UCM software vendor;
Step S23: trusted computer authenticates the UCM software that will install;
Step S24: if authenticate unsuccessfully, abandon the installation to described UCM software, continue to apply for using safe UCM software to UCM supplier;
Step S25: if authentication success is installed UCM software, and can guarantee the credibility of trusted computer.
Wherein, described application software is business software.
Wherein, when this business software is installed, comprise the following steps:
Step S31: in the time that beginning is installed, UCM software obtains the feature of this business software: message value ‖ HV1;
Step S32: to the first half content in the software features obtaining, the origination message value part of this business software feature is carried out hash function H algorithm and obtained digest value HV2;
Step S33: relatively whether HV2 is consistent with HV1;
Step S34: if consistent, perform step S35, if inconsistent, refuse the installation to this software;
Step S35: complete the installation of this business software.
Wherein, in step S34, if the installation of refusal to this software, wanting needs user and this business software supplier to contact when this software is installed.
Wherein, also comprise a step S36, by UCM software, the registry information of this business software is formed to HOV by hash function H algorithm, be stored in the corresponding form of corresponding software cryptographic hash in the immutable region in hard disk, to set it as fixing tolerance root when upgrading later, make new metric compare the credibility that judges it with it.
Wherein, the installation license measure of business software to be upgraded comprises the following steps:
Step S31 ': mounting software needs upgrading, sends upgrade request;
Step S32 ': this business software supplier learnt after upgrade requirement, allows transmission to indicate obtaining from the request of credible UCM suppliers to one of this UCM;
Step S33 ': confirm license through UCM supplier, inform that UCM sends one and allows transmission to indicate STF to business software supplier;
Step S34 ': sign software AKU is sent to this trusted computer by software vendor;
Step S35 ': UCM is carried out message authentication;
Step S36 ': the value of information obtaining is carried out to hash function H algorithm and obtain HV2, compare and check with the previous HV1 sending in the lump;
Step S37 ': if consistent, execution step S38 ', if inconsistent, does not install it, and notify this software upgrade package of user unavailable, deletes voluntarily the software upgrade package of sending;
Step S38 ': software upgrade package is fit into main frame;
Software registration table information after step S39 ': TPM upgrades to it is measured, and obtains digest value HNV;
Step S40 ': corresponding HOV in motionless district table in value HNV and hard disk is compared;
Step S41 ': result is consistent, execution step S42 ', result is inconsistent, notifies this upgrade software of user to have insincere property, by user's reference software supplier;
Step S42 ': notify this software security of user credible, can relievedly use.
Compared with prior art, beneficial effect of the present invention is:
The binding that the present invention has carried out software UCM to TCM computing machine could operate, make UCM there is authority, make whether the software that tolerance oneself that trusted computer user can be more simple and efficient in the process of mounting software and software upgrading upgrading is used is safe and reliable.
The present invention must obtain installation passage through the STF of this UCM and more improve reliable credible tolerance in the time that upgrading is installed.And software upgrading is upgraded the passage that must use and is made UCM further guarantee its indispensable property.
Brief description of the drawings
Fig. 1 is the confidence level metering method concrete steps that software of the present invention is installed and upgraded;
Fig. 2 is the step that the confidence level metering method of software installation of the present invention and upgrading is installed UCM software;
Fig. 3 is the confidence level metering method of the licensed installation of business software of the present invention;
Fig. 4 is the installation license measure of the present invention's business software to be upgraded.
Embodiment
Below in conjunction with accompanying drawing, technical characterictic and the advantage with other above-mentioned to the present invention are described in more detail.
As shown in Figure 1, the invention provides the confidence level metering method that a kind of software is installed and upgraded, first the present invention introduces a upgrading control module (Updata Control Module), if the computing machine that user uses is trusted computer, be that TCM (Trust Cryptography Module) computing machine (has a credible UCM software vendor of combining with distribution TCM computing machine, this supplier provide be perfectly safe with the supporting UCM software of TCM, complete the precisive of the part to software installation and upgrade), if think set up applications, must just can obtain by the checking of UCM software the right of installation.In the time that software need to be upgraded, also need UCM software to guide and install and carry out confidence in security amount its control, if UCM software is not installed on TCM computing machine, the installation and upgrade of any software is all impossible.The confidence level metering method concrete steps of software installation of the present invention and upgrading are as follows:
Step S1: in the time that user's computing machine is believable computing machine, after this trusted computer starts, system alert is downloaded UCM software from credible UCM suppliers;
Step S2: whether download and install UCM software, if agree to install UCM software, execution step S3, otherwise can not download and upgrade any software;
Step S3: carry out the follow-up work that various application software are installed or upgrading is upgraded.
In above-mentioned steps S3, in the time that needs are installed application software, the information that UCM software intercepts is wherein carried out message authentication, if unanimously allow, application software is installed, and it is come into operation, if inconsistent, refusal continues to install, and exits.Wherein, above-mentioned UCM software intercepts information wherein, and to carry out message authentication be UCM while starting is installed obtains the feature of this business software: message value ‖ HV1, wherein, first half is the message value about this business software feature, HV1 is that message value carries out the summary cryptographic hash obtaining after hash function H algorithm, for the ease of comparing, the original message value that does not carry out hash function H algorithm is placed on to first half, the HV1 obtaining is placed on to latter half sends in the lump after origination message value hash function H algorithm.After being obtained by UCM software, by hash function H algorithm, can obtain HV2 to the origination message value of first half, then can compare with HV1, whether unanimously see, if consistent, illustrate that this business software is credible, can install, if inconsistent, this business software is not installed.
In above-mentioned steps S3, in the time that application software need to be upgraded upgrading, send application for upgrading, this Application Software Provider by certain certification (also with above-mentioned message authentication process, allow UCM software check the consistance of HV2 and HV1 to obtain the accreditation of UCM software vendor) obtain the accreditation of UCM software vendor, notice UCM software vendor sends one and agrees to transmission mark STF (Signal Transmition Flag), sign software AKU is issued described trusted computer by described application software, UCM software receive after by its decrypted authentication, and obtain software upgrade package, it is installed to upgrading, install rear by corresponding credible tolerance, by the credible tolerance result feedback obtaining to user, make this application software of use that user can be relieved.Wherein, TCM computing machine carries out credible tolerance to UCM software and is: the UCM software that TCM computing machine will the be installed decrypted authentication of signing, if authentication success, UCM software can successfully use.The credible source of UCM is: the credible UCM software vendor of combining due to the supplier of production trusted computer provides, and ensures its security, in the time that it is arranged in trusted computer, also need to be measured it by TCM.
As shown in Figure 2, be the step that the confidence level metering method of software installation of the present invention and upgrading is installed UCM software, the installation of this UCM software is to carry out under trusted computer condition at computing machine, the step that UCM software is specifically installed is as follows:
Step S21: user asks to download the UCM software supporting with described trusted computer;
Step S22: the trusted computer of sending application issued by described UCM software by credible UCM software vendor;
Step S23: trusted computer authenticates the UCM software that will install;
Step S24: if authenticate unsuccessfully, abandon the installation to described UCM software, continue to apply for using safe UCM software to UCM supplier;
Step S25: if authentication success is installed UCM software, and can guarantee the credibility of trusted computer.
Above-mentioned step is the installation method of the indispensable UCM software of trusted computer, install after UCM software, just can carry out the follow-up work that various application software are installed or upgrading is upgraded, wherein said application software can be business software, as shown in Figure 3, for the confidence level metering method of the licensed installation of business software of the present invention, it is realized by following steps:
Step S31: in the time that beginning is installed, UCM software obtains the feature of this business software: message value ‖ HV1;
Step S32: to the first half content in the software features obtaining, the origination message value part of this business software feature is carried out hash function H algorithm and obtained digest value HV2 (Hash Value 2);
Step S33: relatively whether HV2 is consistent with HV1;
Step S34: if consistent, perform step S35, if inconsistent, refuse the installation to this software;
Step S35: complete the installation of this business software;
Step S36: the registry information of this business software is formed to HOV (Hash Old Value) by hash function H algorithm by UCM software, be stored in the corresponding form of corresponding software cryptographic hash in the immutable region in hard disk, to set it as fixing tolerance root when upgrading later, make new metric compare the credibility that judges it with it.
Wherein, in step S34, if the installation of refusal to this software, wanting needs user and this business software supplier to contact when this software is installed.
The above-mentioned confidence level metering method that is the licensed installation of business software, wherein as shown in Figure 4, it comprises the following steps the installation license measure of business software to be upgraded:
Step S31 ': mounting software needs upgrading, sends upgrade request;
Step S32 ': this business software supplier learnt after upgrade requirement, allows transmission to indicate obtaining from the request of credible UCM suppliers to one of this UCM;
Step S33 ': confirm license through UCM supplier, inform that UCM sends one and allows transmission to indicate STF to business software supplier;
Step S34 ': sign software AKU is sent to this trusted computer by software vendor;
Step S35 ': UCM is carried out message authentication;
Step S36 ': the value of information obtaining is carried out to hash function H algorithm and obtain HV2, compare and check with the previous HV1 sending in the lump;
Step S37 ': if consistent, execution step S38 ', if inconsistent, does not install it, and notify this software upgrade package of user unavailable, deletes voluntarily the software upgrade package of sending;
Step S38 ': software upgrade package is fit into main frame;
Software registration table information after step S39 ': TPM upgrades to it is measured, and obtains digest value HNV;
Step S40 ': corresponding HOV in motionless district table in value HNV and hard disk is compared;
Step S41 ': result is consistent, execution step S42 ', result is inconsistent, notifies this upgrade software of user to have insincere property, by user's reference software supplier;
Step S42 ': notify this software security of user credible, can relievedly use.
It should be noted that UCM and suggestion TCM supplier's of business software supplier relation:
UCM combines credible UCM software vendor by TCM supplier and sells, and points out user installation to in TCM system for computer; Judge by UCM whether this business software can licensedly install and between UCM and business software supplier be one, and be install after business software whether can upgrade renewal passage.
Of the present invention is mainly that trusted computer is introduced a upgrading control module UCM, UCM software is provided by UCM supplier of trusted third party, set it as the Bind tool, complete a series of requisite instruments to the judgement of application software installation and upgrade software trust, it has following function:
1) UCM module has the function of certifying signature.
2) UCM module has the function of the charge controlled, and makes regular supplier's the software package just can be used by secure and trusted computing machine.
3) UCM module has the computing function of hash function H algorithm.
4) to business software, upgrading provides necessary security measure passage to UCM module.
In a word, by the proposition of UCM, make software metrics method more quick, trust loss is little.Can make TCM computing machine can obtain popularization and application widely.
In sum, the invention has the advantages that:
The installation of the various application programs of the present invention to trusted computer and renewal upgrading have brought more safe and reliable measure.The Bind tool using UCM as TCM computing machine, is produced by credible UCM software vendor, and is fit in TCM computing machine through license, thereby more convenient when mounting software and metric software security.The various believable software of use that trusted computer user is felt more relieved.The present invention not only relates to the security credibility of set up applications, also can be applied to the secure and trusted tolerance of upgrade software.The proposition of this kind of UCM will have very large realistic meaning, to the universal impetus that risen of trusted computer.
More than explanation is just illustrative for the purpose of the present invention, and nonrestrictive, those of ordinary skill in the art understand; in the case of not departing from the spirit and scope that following claims limit, can make many amendments, change; or equivalence, but all will fall within the scope of protection of the present invention.

Claims (6)

1. the confidence level metering method that software is installed and upgraded, is characterized in that, it comprises the following steps:
Step S1: in the time that user's computing machine is believable computing machine, after this trusted computer starts, system alert is downloaded UCM software from UCM suppliers;
Step S2: whether download and install UCM software, if agree to install UCM software, execution step S3, otherwise can not download and upgrade any software;
Step S3: carry out the follow-up work that various application software are installed or upgrading is upgraded, in hard disk areas, open up a part of invariant region and store the digest value that is extracted calculating mounting software by UCM, the tolerance root of redaction after making it as upgrading, in the time that application software need to be upgraded upgrading, send application for upgrading, this Application Software Provider obtains UCM supplier's accreditation by certain certification, notice UCM supplier sends one and agrees to transmission mark STF, sign software AKU is issued described trusted computer by described application software, UCM receive after by its decrypted authentication, and obtain software upgrade package, it is installed to upgrading,
Wherein, described application software is business software; By UCM software, the registry information of this business software is formed to HOV by hash function H algorithm, be stored in the corresponding form of corresponding software cryptographic hash of the invariant region in hard disk, to set it as fixing tolerance root when upgrading later, make the tolerance root of redaction compare the credibility that judges it with it.
2. the confidence level metering method that software according to claim 1 is installed and upgraded, it is characterized in that, in step S3, in the time that needs are installed application software, the information intercepting wherein in UCM software is carried out message authentication, if unanimously allow to continue to install this application software, it is come into operation, if inconsistent, refusal continues to install, and exits.
3. the confidence level metering method of installing and upgrading according to the software described in the arbitrary claim of claim 1 to 2, is characterized in that, UCM software is installed and is comprised the following steps:
Step S21: user asks to download the UCM software supporting with described trusted computer;
The trusted computer of sending application issued by described UCM software by step S22:UCM supplier;
Step S23: trusted computer authenticates the UCM software that will install;
Step S24: if authenticate unsuccessfully, abandon the installation to described UCM software, continue to apply for using safe UCM software to UCM supplier;
Step S25: if authentication success is installed UCM software, and can guarantee the credibility of trusted computer.
4. the confidence level metering method that a kind of software according to claim 1 is installed and upgraded, is characterized in that, this business software comprises the following steps while installation:
Step S31: in the time that beginning is installed, UCM software obtains the feature of this business software: message value ‖ HV1, wherein, first half is the message value about this business software feature, HV1 is that message value carries out the summary cryptographic hash obtaining after hash function H algorithm;
Step S32: to the first half content in the software features obtaining, the message value part of this business software feature is carried out hash function H algorithm and obtained digest value HV2;
Step S33: relatively whether HV2 is consistent with HV1;
Step S34: if consistent, perform step S35, if inconsistent, refuse the installation to this software;
Step S35: complete the installation of this business software.
5. the confidence level metering method that a kind of software according to claim 4 is installed and upgraded, is characterized in that, in step S34, if the installation of refusal to this software, wanting needs user and this business software supplier to contact when this software is installed.
6. the confidence level metering method that a kind of software according to claim 4 is installed and upgraded, is characterized in that, the installation license measure of business software to be upgraded comprises the following steps:
Step S31 ': mounting software needs upgrading, sends upgrade request;
Step S32 ': this business software supplier learnt after upgrade requirement, agrees to obtain from the request of UCM suppliers with transmission mark STF to one of this UCM;
Step S33 ': confirm license through UCM supplier, inform that UCM sends one and agrees to that transmission mark STF is to business software supplier;
Step S34 ': sign software AKU is sent to this trusted computer by software vendor;
Step S35 ': UCM is carried out message authentication;
Step S36 ': the message value obtaining is carried out to hash function H algorithm and obtain HV2, compare and check with the previous HV1 sending in the lump;
Step S37 ': if consistent, execution step S38 ', if inconsistent, does not install it, and notify this software upgrade package of user unavailable, deletes voluntarily the software upgrade package of sending;
Step S38 ': software upgrade package is fit into main frame;
Software registration table information after step S39 ': TPM upgrades to it is measured, and obtains digest value HNV;
Step S40 ': corresponding HOV in invariant region in value HNV and hard disk is compared;
Step S41 ': result is consistent, execution step S42 ', result is inconsistent, notifies this upgrade software of user to have insincere property, by user's reference software supplier;
Step S42 ': notify this software security of user credible, can relievedly use.
CN201010168527.7A 2010-05-04 2010-05-04 Trustiness measuring method for installing and upgrading software Active CN102236752B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010168527.7A CN102236752B (en) 2010-05-04 2010-05-04 Trustiness measuring method for installing and upgrading software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010168527.7A CN102236752B (en) 2010-05-04 2010-05-04 Trustiness measuring method for installing and upgrading software

Publications (2)

Publication Number Publication Date
CN102236752A CN102236752A (en) 2011-11-09
CN102236752B true CN102236752B (en) 2014-10-22

Family

ID=44887395

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010168527.7A Active CN102236752B (en) 2010-05-04 2010-05-04 Trustiness measuring method for installing and upgrading software

Country Status (1)

Country Link
CN (1) CN102236752B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102750491B (en) * 2012-06-05 2016-03-09 宇龙计算机通信科技(深圳)有限公司 The method and system of a kind of limiting terminal installation or upgrading third party application
CN103368953B (en) * 2013-06-28 2017-03-08 中标软件有限公司 A kind of Mongolian installation method based on (SuSE) Linux OS
JP5949732B2 (en) * 2013-11-27 2016-07-13 株式会社オートネットワーク技術研究所 Program update system and program update method
CN104866351B (en) * 2015-05-27 2018-03-09 百富计算机技术(深圳)有限公司 A kind of data transmission method, service end and client
CN109284601B (en) * 2018-10-23 2020-12-01 大唐高鸿信安(浙江)信息科技有限公司 Software authorization method and device
CN109815706A (en) * 2018-12-29 2019-05-28 百度在线网络技术(北京)有限公司 Data processing method, device, equipment and storage medium
CN112527358A (en) * 2020-12-16 2021-03-19 中安可信(青岛)网络科技有限公司 Self-measurement-based credible application credibility measurement method, device and system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1900941A (en) * 2006-04-28 2007-01-24 傅玉生 Computer safety protective method based on software identity identifying technology

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1900941A (en) * 2006-04-28 2007-01-24 傅玉生 Computer safety protective method based on software identity identifying technology

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
EFI下基于便携式TPM 的可信计算平台研究;张颖等;《计算机技术与发展》;20100131;第20卷(第1期);第167页至第171页 *
可信移动平台软件安全载入策略模型研究;李建等;《计算机工程》;20090131;第35卷(第2期);149页左栏第3段至150页右栏第4段,图2 *
张颖等.EFI下基于便携式TPM 的可信计算平台研究.《计算机技术与发展》.2010,第20卷(第1期),
李建等.可信移动平台软件安全载入策略模型研究.《计算机工程》.2009,第35卷(第2期),
蔡培茂.基于密码信息技术的网上招投标安全解决方案.《电脑知识与技术(技术论坛)》.2005,(第12期), *

Also Published As

Publication number Publication date
CN102236752A (en) 2011-11-09

Similar Documents

Publication Publication Date Title
CN102236752B (en) Trustiness measuring method for installing and upgrading software
US8479000B2 (en) Information processing device, authentication system, authentication device, information processing method, information processing program, recording medium, and integrated circuit
Anati et al. Innovative technology for CPU based attestation and sealing
US8219827B2 (en) Secure boot with optional components
CN101145906B (en) Method and system for authenticating legality of receiving terminal in unidirectional network
US7600123B2 (en) Certificate registration after issuance for secure communication
CN103001936B (en) A kind of third party's application interface authorization method and system
JP5136012B2 (en) Data sending method
CN101969440B (en) Software certificate generating method
WO2005112340A1 (en) Management of signing privileges for a cryptographic signing service
US20150134942A1 (en) Hardware rooted attestation
CN111526159B (en) Method and device for establishing data connection, terminal equipment and storage medium
CN101340278A (en) License management system and method
CN103677891A (en) Method for selective software rollback
CN103677892A (en) Authorization scheme to enable special privilege mode in secure electronic control unit
CN103679005A (en) Method to enable development mode of a secure electronic control unit
CN109586920A (en) A kind of trust authentication method and device
CN1992714B (en) Authority principal method based on trusted computing platform
CN112583594B (en) Data processing method, acquisition device, gateway, trusted platform and storage medium
CN1808974A (en) Communication device, digital signature verification method and digital signature generation method
CN112615723A (en) Source machine code comparison method based on RSA digital signature
Klingsheim et al. Challenges in securing networked J2ME applications
CN115801281A (en) Authorization method, electronic device, and computer-readable storage medium
Magnanini et al. Scalable, confidential and survivable software updates
CN101888623B (en) Safety service-based mobile network safety protection method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant