CN101888623A - Safety service-based mobile network safety protection method - Google Patents

Safety service-based mobile network safety protection method Download PDF

Info

Publication number
CN101888623A
CN101888623A CN2010101732329A CN201010173232A CN101888623A CN 101888623 A CN101888623 A CN 101888623A CN 2010101732329 A CN2010101732329 A CN 2010101732329A CN 201010173232 A CN201010173232 A CN 201010173232A CN 101888623 A CN101888623 A CN 101888623A
Authority
CN
China
Prior art keywords
software
ssp
terminal
mobile
mtm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2010101732329A
Other languages
Chinese (zh)
Other versions
CN101888623B (en
Inventor
李涛
胡爱群
骆伯萍
陈小兰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southeast University
Original Assignee
Southeast University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southeast University filed Critical Southeast University
Priority to CN2010101732329A priority Critical patent/CN101888623B/en
Publication of CN101888623A publication Critical patent/CN101888623A/en
Application granted granted Critical
Publication of CN101888623B publication Critical patent/CN101888623B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a safety service-based mobile network safety protection system, which comprises a mobile terminal (MT), a mobile trusted calculation module (MTM), a mobile network safety server (SSP) and a safety software supplier (SWP). The structure of the system is shown by a figure 9. The mobile trusted calculation module is connected with the mobile terminal through a USB interface, and a terminal safety environment is realized by trusted start-up and access control. The mobile network safety server provides safety services for the whole network, and the behavior of the mobile terminal is controlled through a network safety protocol. The safety software supplier provides applications for the terminals and makes a signature on the software to ensure the safety of the software.

Description

A kind of mobile network's safety protecting method based on security service
Technical field
The present invention is a kind of system and its implementation in the realization security service function that has mobile network basis upper framework now.This system can effectively solve the portable terminal safety problem, for whole mobile network provides security service, can be applicable to mobile radio communication, the technical technical field that belongs to mobile network's safety.
Background technology
Mobile network's safety is a technical field with high content of technology, that attention rate is high.It involves system's operation of portable terminal, the structure of network, a plurality of links such as strick precaution of virus.Along with the development of mobile communication technology, mobile phone terminal loaded service kind is more and more, and mobile network's safety also more and more is subject to people's attention.Existing up to now multiple solution is invented and is come into operation.
Yet the method for present various solution mobile network safety problems mainly is based on mobile phone terminal and makes up the virus killing environment, does not consider from whole mobile network environment.Mobile phone terminal is owing to the restriction of conditions such as storage, computing, power consumption, and single virus killing mode can not well be applied to the mobile network, the very big restriction that is subjected in application.
Herein, portable terminal (MT) is meant user mobile phone terminal; Mobile trusted module (MTM) is meant the module that safety function is provided based on credible calculating; Security service supplier (SSP) is meant and is structured in the core net, the part of security service function is provided; Software supplier (SWP) is meant the company that operating system and application software are provided for the user.
Summary of the invention
Technical problem: at the deficiency of above-mentioned existing solution mobile network safety problem method; the target of the present invention's design is: from whole mobile network environment characteristics; design a kind of mobile network's safety protecting method based on security service; this method is fit to the characteristics at mobile networking; on the basis at existing networking, make up; it is convenient to realize, can effectively protect portable terminal safety, for the user provides security service efficiently.
Technical scheme: a kind of mobile network's safety protecting method based on security service of the present invention has increased mobile trusted module MTM, security service supplier SSP and three roles of software supplier on existing mobile network basis; Mobile trusted module MTM is connected by USB interface with portable terminal MT, makes up the secure and trusted environment with portable terminal; Security service supplier SSP is that terminal security provides support by the break-make and the verification terminal integrality of control mobile terminal network; Software supplier's access system resources when software certificate is provided for running software provides foundation; This means of defence step is specific as follows:
Whole system makes up on existing mobile network basis.Mobile trustable computation module links to each other with portable terminal by USB interface, realizes the terminal security environment by credible startup and access control.Mobile network's security server provides security service for whole network, by the behavior of network security protocol control portable terminal.Fail-safe software provider SWP provide application software for terminal, and software signed guarantee the safety of software.
1) portable terminal starts:
1a. terminal powers on, the credible start-up code from MTM begins to start,
1b. credible start-up code check system initial work and operating system loading program,
1c.MTM search the software certificate that is stored among the MTM according to check results, if normal, then jump to next step, if undesired, then remind user's existing systems to have potential safety hazard, and in ensuing use, provide limited function,
1d. the executive system load module, and operating system nucleus carried out completeness check,
1e. seek and the verification software certificate, if normal, then start the operating system, if undesired, remind the user, and limited function is provided in ensuing use,
1f. the operating system check system starts the back process of operation automatically, searches software certificate, if normal, then allows to carry out, if undesired, reminds the user not allow the execution of this process;
2) connection of mobile terminal into network:
After 2a. portable terminal starts, generate an integrity report and call for access authentication,
2b.MT to SSP the access request is proposed,
2c.SSP according to integrity report verification terminal integrality, as imperfect, refusal inserts and sends and feeds back to terminal, as complete, the request of then will inserting is transmitted to authentication, authorization and accounting server AAA,
2d.AAA authentication MT generates session key, and key packet is dressed up message sends to SSP,
2e.SSP send comprise key and authentication information message to MT, mobile terminal authentication AAA, and check session key uses during for next session;
3) portable terminal is downloaded software:
3a.MT propose to download software asks to SSP,
3b.SSP judge MT whether the download authority is arranged,, then sends the refusal download message to MT if do not have,
3c. if the download authority is arranged, SSP transmits the corresponding SWP that downloads request to of MT,
3d.SWP with own private key signature, and the software that will have a SWP signature sends SSP to downloaded software, and has the software certificate corresponding with software,
3e.SSP check the SWP signature of software, verification software data, and software is signed with oneself private key will have the software that SSP signs and send MT to, the while, SSP upgraded the integrity report of this terminal,
3f.SSP produce charge information to AAA;
4) portable terminal install software:
4a.MT the operation installation procedure,
4b.MT check the SSP signature of installation procedure, as it is illegal to sign, and does not give installation license, as it is legal to sign, then allow to install,
4c.MT the software certificate of software correspondence is stored among the MTM;
5) terminal operating software:
5a. executive utility, system kernel loader code,
5b. the hashed value of computing application program binary code writes the descriptor of process with it,
5c. program process is the calling system resource if desired, first invoke system call visits again resource,
5d. the credible verification service of kernel calls MTM,
5e.MTM whether the software certificate of corresponding stored determines it by the authority of access resources, and the result is returned to operating system,
5f. operating system is according to Control Software process access resources as a result;
The groundwork process of system is: the portable terminal back that powers on starts from trusted root, and chain-of-trust is extended to the whole terminal system, and calls when generating an integrity report for access network; In the time of accessing terminal to network, SSP checks the terminal integrality, carries out access authentication; In the time of terminal downloads software, SSP need check the qualification of download; The terminal install software needs to check relevant SSP and the signing certificate of SWP; Terminal operating software need be to the software control that conducts interviews.
Beneficial effect: (1) security protection system provides unified security service from whole mobile network by operator, most of safety problem is transferred to operator handle, and has alleviated the burden of portable terminal to a certain extent, on the whole maintaining system safety; (2) make up the terminal system platform based on credible calculating, viral propagation has fundamentally been stopped in the transmission of chain-of-trust; (3) trusted root of portable terminal from trusted module starts, and chain-of-trust is passed to operating system, guaranteed the safety of system; (4) in the running of mobile terminal process, thread is carried out access control based on the role, effectively protection system safety the time, the postrun chain-of-trust transmission of the system that realized efficiently; (5) trusted module of USB interface has been realized and communications of Mobile Terminals easily, and the design of trusted module simultaneously meets the needs of whole system; (6) in the existing network framework, add this role of security server,, focus on safe matters for the terminal use provides security service; (7) design of security protocol guarantees the message transfer of safety between each role.
This system makes up on existing mobile network basis, realizes more conveniently, only needs to add security service supplier (SSP) in carrier network, adds mobile trusted module (MTM) in portable terminal.System provides security service for the user on the whole, and access control is combined with credible calculating, for terminal has made up trusted context efficiently, has fundamentally stopped viral propagation.This system is fit to operator and uses very much: operator need not the existing network facility is carried out big transformation; only need to add security server; trusted module is provided; associating software supplier provides security service for the user; both helped controlling the propagation realization terminal security of virus; the interests that also help maintenance software provider, the protection software copyright.
Description of drawings
Fig. 1 is mobile network's security protection system structure abstract graph;
Fig. 2 is the structure chart of credible start-up code;
Fig. 3 is the credible start-up course figure of portable terminal;
Fig. 4 is fine granularity access control figure;
Fig. 5 is role's hierarchical design figure;
Fig. 6 is mobile terminal software implementation structure figure;
Fig. 7 is fine granularity access control software realization flow figure;
Fig. 8 is that the terminal integrality is collected illustraton of model.
Embodiment
Mobile network's security protection system structure:
The abstract structure of mobile network's security protection system as shown in Figure 1.Relevant with security service mainly comprise four parts: 1) portable terminal MT; 2) mobile trusted module MTM; 3) security service supplier SSP; 4) SWP of fail-safe software provider.
Portable terminal MT: the mobile phone that the user uses, be connected by wireless mode with WAP (wireless access point), be connected by USB interface with mobile trusted module MTM.Abilities such as conversation, data access, down loading mounting software are arranged.Behind the mobile terminal-opening, by the integrality of the credible startup check system of trusted module, the checking integrality makes up the secure and trusted environment by the access control that combines with trusted certificates during access network.
Mobile trusted module MTM: realize the nucleus module of credible computing function, be connected with portable terminal by USB interface.In randomizer, public key algorithm RSA engine, SHA SHA-1 engine, credible start-up code section, these several modules of memory are arranged.For system provides credible startup root, produce various keys and generate and the required random number of signing, generate association key, finish the encryption and decryption operation, functions such as storage related credentials.
Security service supplier SSP: for the user in the network provides security service, come the supervisory user behavior, prevent the virus propagation by the Control Network break-make.Guarantee the fail safe of user's download software, for the structure of portable terminal security context provides support service.
The SWP of software supplier: mobile phone terminal software supplier, as Microsoft, Macfee etc. are to provide systems soft ware and application software person for portable terminal.Fail-safe software provider comes the source of certifying software by the signature to software, makes up the secure and trusted environment by providing software certificate to help portable terminal.
At first need to define the legitimacy of user's integrality and software:
User's integrality is defined as: the hardware configuration of portable terminal and operating system are not illegally distorted, and installed software all has the SWP signature in the system.Do not meet the integrality that all is considered as having destroyed the user of afore mentioned rules.The acquisition of terminal software has two approach: the software that the software of the support customized service that is provided by operator when user mobile phone is opened an account and user upgrade voluntarily and obtain by legal procedure.If these softwares are destroyed, user terminal does not just satisfy the integrality requirement so.
The well-formed definition of software is: the software of terminal downloads must be that software must have the signature of SWP and SSP when installing through SSP audit approval.Should there be identity and safety to wait attribute in the legal software.Identity attribute is the digital certificate that SWP signs and issues for this software, and security attribute then is the summary info of these software source codes and the SWP ciphering signature to this summary info, also has the related credentials of softward interview access authorization for resource.
Under above-mentioned definition, the running of whole security protection system is as follows:
(1) MTM of portable terminal checks the integrality of user terminal when handset starting, and the legitimacy of detecting process and thread forms report with imperfect or illegal security incident and sends to SSP in the process of implementation;
(2) SSP deals with by predefined safety regulation.If software imperfection problem illustrates that cell phone software suffers virus attack or artificial deletion, SSP will in time remind terminal to recover original installation; If process or thread illegal operation, illustrate that also the process of software or thread subprogram revised by virus, SSP in time notifies portable terminal, and recovers original installation;
(3) if portable terminal need be downloaded new software, will file an application to SSP, SSP tests to the legitimacy that it is about to downloaded software, after the qualification of inspection SWP, reaches the control portable terminal by the Control Network break-make and downloads the purpose of behavior;
(4) SSP forms charging report with the security service of being done, and charges to portable terminal in authentication, authentication and charging (AAA) center of notice operator.
Portable terminal secure and trusted environment construction:
The structure of terminal trusted context mainly is divided into system start-up and two states of system's operation.
After system powered on, at first the credible start-up code from trusted module began to start.The structure of credible start-up code as shown in Figure 2.System initialization code is that platform is relevant, and its initialize routine of different platforms is different, and generally realizes with the assembler language of particular platform.The code of this part is the least possible, because consider the transplantability of platform, Duan bottom code can reduce the workload when transplanting as far as possible.And the completeness check code of back generally has versatility, generally uses the C language to realize.
The completeness check code will carry out completeness check to following code segment, and in fact this section code is exactly the load module of some sophisticated system initial work and operating system, check results is saved in the platform configuration register of MTM, search relevant certificate then, if and system is normal, the certificate of this code segment should be kept in the memory of MTM, then carries out the checking of certificate, and is correspondingly processed.Equally, also have a checking routine later on, be responsible for the kernel of operating system is carried out completeness check, thereby finish the chain-of-trust transmission in system starting process at this section code.The credible start-up course of portable terminal as shown in Figure 3.
During the code segment of an entity, its can be saved in its hashed value in the specific platform configuration register after previous trusted entity checks, seeks the certificate relevant with verification then, if certificate is not inconsistent, and two kinds of processing modes later at this moment.(1) directly stop to start, virus may be distorted or infected to the present embedded system of prompting user, waits for that customer contact production firm deals with problems; (2) continue to start, but point out the present system of user that potential safety hazard is arranged, and in the follow-up running of system, only provide limited function.
After system's operation, realize the efficient transfer of chain-of-trust by the fine granularity access control.The fine granularity access control comes down to a kind of access control based on the role, and " role " here is " process " of operating system and software.Fine granularity access control principle as shown in Figure 4.In this design, each process all can have one or more certificates, they can be stored in the memory of mobile trustable computation module MTM when installation system software, and need verify when becoming certain role in the functional block of certain process, operating system nucleus will be visited MTM, and provide the hashed value and the Role Information of application software binary file, by the MTM credibility of portion's authentication function piece within it, and then provide the result of checking, return to operating system nucleus, kernel is handled accordingly again then.The benefit of this verification mode is to have guaranteed to the full extent the flexibility of system, and for former application program, the developer only need apply for that corresponding certificate just can move on new portable terminal; On the other hand, the process of whole checking is all finished in MTM inside, and this helps the safety problem centralization, as long as the fail safe of reinforcing module itself just can improve the security performance of whole system.
After the system start-up, chain-of-trust is delivered to operating system, and operating system is the object that can trust, is safe.The safety problem of system is exactly in fact the unauthorized access to resource.The visit main body in the operating system---process is divided into littler part.Be that process is divided into one by one functional block according to its function this cutting apart, and needs accesses network such as process, and this part just can be split so becomes an independently functional block; If process is wanted the access file system, this part also will independently be treated so.If these functions need really be had an effect, so must be by the access control of operating system, just so-called access control based on the role.If the functional block of process can be by credible checking, it just can obtain specific " role " so, and " authority " of acquisition visit particular system resource.Simultaneously, this credible checking is that session is relevant, that is to say, if process also will be visited same system resource next time, and also will be through so credible checking.
Then adopt the mode of hierarchical design for the role, as shown in Figure 5.At first determine five class middle level roles: direct address visitor, file system access person, interprocess communication person, module loading person, web visitor.Then this five classes role is segmented again, just can segment such as file system access person becomes: superblock visitor, index node inode visitor and file access person.Simultaneously, this five classes role can also make up, and become the new role of higher level, and each role has two copies of read and write.
Just be to simplify the distribution of authority for the purpose of role's detailed design, by such hierarchical design, the role of every bottom has the access rights (each role has two copies of read and write) to certain system resource, and the role of a high level then has the access rights to a series of related resources.
Mobile terminal software is realized:
The mobile terminal software implementation structure as shown in Figure 6.The part that needs to realize mainly is kernel service layer and MTM driver.
The MTM driver mainly is responsible for directly communicating with mobile trusted module, is just undertaken alternately by the USB interface of terminal and the processor of MTM, and functions such as its credible verification that provides, encryption and decryption are provided.
The kernel service layer in fact also is a kernel thread, and in fact so-called kernel thread is exactly always in kernel state operation, and memory-resident is finished the Lightweight Process of assigned work.Because can not be to the MTM concurrent access, so mainly being responsible for the credible checking request of application programs functional block or other kernel thread initiation, the kernel service layer unifies scheduling, simultaneously, it encapsulates the service that provides again with many bottom operations that the MTM driver is provided, and has also guaranteed the fail safe of system.
Software flow as shown in Figure 7.At first, if moved an application program in system, kernel can at first be reference program storage allocation space and initialization, then the loader code, at this moment, should call the hashed value of the hash service compute application binaries code of kernel service layer, the hash service then can be called the MTM driver, calls the SHA-1 engine in the chip, calculate hashed value, and it is returned, then this hashed value is write in the descriptor of process, and other parts of initialize process descriptor.Process is normally carried out then, if and process needs the calling system resource, it at first can invoke system call so, prepare access system resources then, at this moment kernel process will be indicated, application binary hashed value and need accessed resources to indicate as parameter, call the credible verification service in the kernel service layer.Credible verification service access MTM driver, MTM can indicate according to process, searches related credentials in self memory, and with the hashed value contrast of binary file, whether comparison has the authority of visit particular system resource then, and the result is returned.According to the structure of verification, kernel can control process continuation access system resources return user's attitude then, or directly returns user's attitude, and reports an error.
Portable terminal integrality gathering method:
Behind the starting up of terminal, the terminal integrality is collected statistics, terminal integrality collection work is finished by MTM.After system powers on,, integrality is added up according to Fig. 8 model along with the transmission of chain-of-trust.
In this model, the hardware integrality is meant the state of start back system hardware; The operating system integrality is meant the state of system kernel; The application software integrality refers to installed software state in the system; Process integrity refers to the state of system's running process.The integrality state in each step of system start-up all can be reported among the MTM.
After system start-up is finished, generate an integrity report, and call when being kept among the MTM for access authentication.
The software certificate structure that SWP provides:
When portable terminal was downloaded software, SWP was except providing software, also have one with the corresponding software certificate of download software.During the terminal install software, software certificate also can store among the MTM.Software needs access system resources at terminal operating, and operating system will be searched the certificate among the MTM, and decision changes the authority whether software process has access resources.
The structure of software certificate is as follows:
● software certificate
■ certificate version information
The ■ certificate serial number
The signature algorithm that the ■ certificate uses
■ certificate issue person title
The ■ validity period of certificate
◆ before so-and-so on date
◆ after so-and-so on date
The sign of the corresponding software of ■ certificate number
The hashed value of the corresponding software binary code of ■ certificate
■ software allows the access system resources parameter
◆ network equipment visit
◆ file system access
◆ internal storage access
◆......
■ certificate issue person SWP identification number
■ certificate issue person SWP signature.
This method has increased mobile trusted module MTM, security service supplier SSP and three roles of software supplier on existing mobile network basis; Mobile trusted module MTM is connected by USB interface with portable terminal MT, makes up the secure and trusted environment with portable terminal; Security service supplier SSP is that terminal security provides support by the break-make and the verification terminal integrality of control mobile terminal network; Software supplier's access system resources when software certificate is provided for running software provides foundation; This means of defence step is specific as follows:
Portable terminal is credible, and the startup flow process is:
A. terminal powers on, and the credible start-up code from MTM begins to start;
B. credible start-up code check system initial work and operating system loading program;
C.MTM searches the software certificate that is stored among the MTM according to check results, if normal, then jumps to next step, if undesired, then remind user's existing systems to have potential safety hazard, and provide limited function in ensuing use;
D. executive system load module, and operating system nucleus carried out completeness check;
E. seek and the verification software certificate,, then start the operating system,, remind the user, and limited function is provided in ensuing use if undesired if normal;
F operating system check system starts the back process of operation automatically, searches software certificate, if normal, then allows to carry out, if undesired, reminds the user not allow the execution of this process.
The connection of mobile terminal into network flow process is:
A. after portable terminal starts, generate an integrity report and call for access authentication;
B.MT proposes the access request to SSP;
C.SSP is according to integrity report verification terminal integrality, and as imperfect, refusal inserts and sends and feeds back to terminal, and as complete, the request of then will inserting is transmitted to authentication, authorization and accounting server AAA;
D.AAA authenticates MT, generates session key, and key packet is dressed up message sends to SSP;
E.SSP send comprise key and authentication information message to MT, mobile terminal authentication AAA, and check session key uses during for next session.
Portable terminal is downloaded software flow:
A.MT proposes to download software asks to SSP;
B.SSP judges whether MT has the download authority, if do not have, then sends the refusal download message to MT;
If c. the download authority is arranged, SSP transmits the corresponding SWP that downloads request to of MT;
With own private key signature, and the software that will have a SWP signature sends SSP to d.SWP with downloaded software, and has the software certificate corresponding with software;
E.SSP checks the SWP signature of software, and verification software data, and software is signed with oneself private key will have the software that SSP signs and send MT to, and the while, SSP upgraded the integrity report of this terminal;
F.SSP produces charge information to AAA.
Portable terminal install software flow process is:
A.MT moves installation procedure;
B.MT checks the SSP signature of installation procedure, as it is illegal to sign, and does not give installation license, as it is legal to sign, and then allows to install;
C.MT stores the software certificate of software correspondence among the MTM into.
The running of mobile terminal software flow is:
A. executive utility, system kernel loader code;
B. the hashed value of computing application program binary code writes the descriptor of process with it;
C. program process calling system resource if desired, first invoke system call visits again resource;
D. the credible verification service of kernel calls MTM;
Whether the software certificate of e.MTM corresponding stored determines it by the authority of access resources, and the result is returned to operating system;
F. operating system is according to Control Software process access resources as a result.

Claims (6)

1. the mobile network's safety protecting method based on security service is characterized in that this method has increased mobile trusted module MTM, security service supplier SSP and three roles of software supplier on existing mobile network basis; Mobile trusted module MTM is connected by USB interface with portable terminal MT, makes up the secure and trusted environment with portable terminal; Security service supplier SSP is that terminal security provides support by the break-make and the verification terminal integrality of control mobile terminal network; Software supplier's access system resources when software certificate is provided for running software provides foundation; This means of defence step is specific as follows:
1) the credible startup of portable terminal;
2) connection of mobile terminal into network;
3) portable terminal is downloaded software;
4) portable terminal install software;
5) running of mobile terminal software.
2. a kind of mobile network's safety protecting method based on security service as claimed in claim 1 is characterized in that the credible startup flow process of described step 1) portable terminal is:
A) terminal powers on, and the credible start-up code from MTM begins to start;
B) credible start-up code check system initial work and operating system loading program;
C) MTM searches the software certificate that is stored among the MTM according to check results, if normal, then jumps to next step, if undesired, then remind user's existing systems to have potential safety hazard, and provide limited function in ensuing use;
D) executive system load module, and operating system nucleus carried out completeness check;
E) seek also verification software certificate,, then start the operating system,, remind the user, and limited function is provided in ensuing use if undesired if normal;
F) the operating system check system starts the back process of operation automatically, searches software certificate, if normal, then allows to carry out, if undesired, reminds the user not allow the execution of this process.
3. a kind of mobile network's safety protecting method based on security service as claimed in claim 1 is characterized in that described step 2) the connection of mobile terminal into network flow process is:
A) after portable terminal starts, generate an integrity report and call for access authentication;
B) MT proposes the access request to SSP;
C) SSP is according to integrity report verification terminal integrality, and as imperfect, refusal inserts and sends and feeds back to terminal, and as complete, the request of then will inserting is transmitted to authentication, authorization and accounting server AAA;
D) aaa authentication MT generates session key, and key packet is dressed up message sends to SSP;
E) SSP send comprise key and authentication information message to MT, mobile terminal authentication AAA, and check session key uses during for next session.
4. a kind of mobile network's safety protecting method based on security service as claimed in claim 1 is characterized in that described step 3) portable terminal downloads software flow and be:
A) MT proposes to download software asks to SSP;
B) SSP judges whether MT has the download authority, if do not have, then sends the refusal download message to MT;
C) if the download authority is arranged, SSP transmits the corresponding SWP that downloads request to of MT;
D) with own private key signature, and the software that will have a SWP signature sends SSP to SWP with downloaded software, and has the software certificate corresponding with software;
E) SSP checks the SWP signature of software, and verification software data, and software is signed with oneself private key will have the software that SSP signs and send MT to, and the while, SSP upgraded the integrity report of this terminal;
F) SSP produces charge information to AAA.
5. a kind of mobile network's safety protecting method based on security service as claimed in claim 1 is characterized in that described step 4) portable terminal install software flow process is:
A) MT operation installation procedure;
B) MT checks the SSP signature of installation procedure, as it is illegal to sign, and does not give installation license, as it is legal to sign, and then allows to install;
C) MT stores the software certificate of software correspondence among the MTM into.
6. a kind of mobile network's safety protecting method based on security service as claimed in claim 1 is characterized in that described step 5) running of mobile terminal software flow is:
A) executive utility, system kernel loader code;
B) hashed value of computing application program binary code writes the descriptor of process with it;
C) program process calling system resource if desired, first invoke system call visits again resource;
D) the credible verification service of kernel calls MTM;
Whether e) the software certificate of MTM corresponding stored determines it by the authority of access resources, and the result is returned to operating system;
F) operating system is according to Control Software process access resources as a result.
CN2010101732329A 2010-05-14 2010-05-14 Safety service-based mobile network safety protection method Expired - Fee Related CN101888623B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010101732329A CN101888623B (en) 2010-05-14 2010-05-14 Safety service-based mobile network safety protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010101732329A CN101888623B (en) 2010-05-14 2010-05-14 Safety service-based mobile network safety protection method

Publications (2)

Publication Number Publication Date
CN101888623A true CN101888623A (en) 2010-11-17
CN101888623B CN101888623B (en) 2012-08-22

Family

ID=43074295

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010101732329A Expired - Fee Related CN101888623B (en) 2010-05-14 2010-05-14 Safety service-based mobile network safety protection method

Country Status (1)

Country Link
CN (1) CN101888623B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103023922A (en) * 2012-12-05 2013-04-03 清华大学 Control flow model behavior based dynamic remote attestation method
CN103530563A (en) * 2012-08-10 2014-01-22 卡巴斯基实验室封闭式股份公司 System and method for updating authorized software
CN107360165A (en) * 2017-07-13 2017-11-17 北京元心科技有限公司 Terminal device, cloud server and method and device for managing and controlling operating system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005013582A2 (en) * 2003-07-29 2005-02-10 Thomson Licensing S.A. Controlling access to a network using redirection
CN1841998A (en) * 2005-03-30 2006-10-04 中兴通讯股份有限公司 Method for terminal user safety access soft handoff network
US20080148402A1 (en) * 2006-12-13 2008-06-19 Cellco Partnership (D/B/A Verizon Wireless) Techniques for managing security in next generation communication networks
CN101355368A (en) * 2007-07-26 2009-01-28 英华达(上海)电子有限公司 Mobile equipment and use method thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005013582A2 (en) * 2003-07-29 2005-02-10 Thomson Licensing S.A. Controlling access to a network using redirection
CN1841998A (en) * 2005-03-30 2006-10-04 中兴通讯股份有限公司 Method for terminal user safety access soft handoff network
US20080148402A1 (en) * 2006-12-13 2008-06-19 Cellco Partnership (D/B/A Verizon Wireless) Techniques for managing security in next generation communication networks
CN101355368A (en) * 2007-07-26 2009-01-28 英华达(上海)电子有限公司 Mobile equipment and use method thereof

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103530563A (en) * 2012-08-10 2014-01-22 卡巴斯基实验室封闭式股份公司 System and method for updating authorized software
CN103530563B (en) * 2012-08-10 2016-08-10 卡巴斯基实验室封闭式股份公司 For updating the system and method for authorized software
CN103023922A (en) * 2012-12-05 2013-04-03 清华大学 Control flow model behavior based dynamic remote attestation method
CN103023922B (en) * 2012-12-05 2014-07-02 清华大学 Control flow model behavior based dynamic remote attestation method
CN107360165A (en) * 2017-07-13 2017-11-17 北京元心科技有限公司 Terminal device, cloud server and method and device for managing and controlling operating system
CN107360165B (en) * 2017-07-13 2021-02-12 北京元心科技有限公司 Terminal device, cloud server and method and device for managing and controlling operating system

Also Published As

Publication number Publication date
CN101888623B (en) 2012-08-22

Similar Documents

Publication Publication Date Title
US8856544B2 (en) System and method for providing secure virtual machines
US8171295B2 (en) Information processing apparatus, a server apparatus, a method of an information processing apparatus, a method of a server apparatus, and an apparatus executable process
CN101300583B (en) Simple scalable and configurable secure boot for trusted mobile phones
US10348488B1 (en) Tiered distributed ledger technology (DLT) in a network function virtualization (NFV) core network
CN103403669B (en) App is made to become safe method and the method preventing app damage equipment
CN102804194B (en) For providing method and the device of application security
US8627086B2 (en) Secure loading and storing of data in a data processing device
US8417964B2 (en) Software module management device and program
CN100440100C (en) Method and system for establishing a trust framework based on smart key devices
CN113168463A (en) System-level function-based access control for intelligent contract execution on blockchains
US20050137889A1 (en) Remotely binding data to a user device
CN111971943B (en) Trusted platform module based prepaid access token for commercial IoT online services
CN104298916A (en) Application management method, application management system and user device
CN107925567A (en) For optimizing the systems, devices and methods of symmetric key cache using the ticket that service provider's issue is checked by certificate status
CN109634619A (en) Credible performing environment implementation method and device, terminal device, readable storage medium storing program for executing
EP1645931A1 (en) Secure loading and storing of data in a data processing device
CN105184167A (en) Trusted platform module (TPM) fine-grained permission-based Android system security enhancement system and method
CN114448648B (en) Sensitive credential management method and system based on RPA
CN113039542A (en) Secure counting in cloud computing networks
WO2023072817A1 (en) Control of access to computing resources implemented in isolated environments
CN101888623B (en) Safety service-based mobile network safety protection method
CN112491545B (en) Credible hybrid cloud management platform, access method and system
RU2408071C2 (en) Protected data loading and storage in data processing device
CN113536361B (en) Method and device for realizing trusted reference library and computing equipment
Park et al. Design and implementation of trusted sensing framework for IoT environment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120822

Termination date: 20160514