CN106452753A - Method for constructing terminal credible platform in cloud computing environment - Google Patents

Method for constructing terminal credible platform in cloud computing environment Download PDF

Info

Publication number
CN106452753A
CN106452753A CN201610949171.8A CN201610949171A CN106452753A CN 106452753 A CN106452753 A CN 106452753A CN 201610949171 A CN201610949171 A CN 201610949171A CN 106452753 A CN106452753 A CN 106452753A
Authority
CN
China
Prior art keywords
layer
application
trust
chain
command
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610949171.8A
Other languages
Chinese (zh)
Other versions
CN106452753B (en
Inventor
彭磊
肖延丽
许婷婷
张裕飞
尚玉莲
张峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taishan Medical University
Original Assignee
Taishan Medical University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Taishan Medical University filed Critical Taishan Medical University
Priority to CN201610949171.8A priority Critical patent/CN106452753B/en
Publication of CN106452753A publication Critical patent/CN106452753A/en
Application granted granted Critical
Publication of CN106452753B publication Critical patent/CN106452753B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • H04L2209/127Trusted platform modules [TPM]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)

Abstract

The invention provides a method for constructing a terminal credible platform in a cloud computing environment. The terminal credible platform comprises a bottom hardware layer, a middle operating system layer and a top application layer, and a credible chain is established from the bottom hardware layer to the top application layer. The application layer establishes an external credible chain with a credible network through a credible application program and is connected with a cloud computing server through the credible network. According to the method provided by the invention, a TPM credible computing module is not only transplanted into the bottom hardware layer, but also is transplanted into an Android system, and the credible technology is transplanted and integrated into the entire terminal credible platform system, thereby ensuring that the bottom hardware layer of the system can be started credibly and safely at first, then the credible transfer technology is applied to the transfer of the credible chain, and credible transfer from the bottom hardware layer to the operating system layer and to the application layer, and even to the access of the cloud computing server is achieved.

Description

Trusted end-user platform construction method under cloud computing environment
Technical field
The present invention relates to field of cloud calculation, particularly to trusted end-user platform construction method under a kind of cloud computing environment.
Background technology
Cloud computing is that substantial amounts of Internet resources are united, and provides the user efficient, easily software service.Cloud computing Advocate is desirably:User uses software service just as the same with water using electricity, can be convenient, whenever and wherever possible, desirably make With service.Under cloud computing mode, user can pass through various " end " access " cloud ", and " end " can be any electricity that can surf the Net Sub- equipment, " cloud " is exactly the service providing, " cloud " be probably huge, joining together, no border it is also possible to negligible , isolated, it is ubiquitous in a word, using the teaching of the invention it is possible to provide to the various services required for user.
Cloud computing is made up of three parts in simple terms:Terminal, network, remote server, terminal include mobile phone, net book, The various equipment such as panel computer;Network includes WIFI, 3G etc., for connecting remote server.Using cloud computing service when Wait, terminal unit is only equivalent to the Input/Output Devices such as display, keyboard, mouse.Remote server is the meter cheap by multiple stage Calculation machine composition, according to the imagination of Google, the remote server of cloud computing is made up of the computer on network, a computer Idle computing power may not be very big, but hundreds of millions of on-line computers are gathered around it may be said that having unlimited computing in the whole world Power.Android system is exactly one using " the Internet " as the system of center of gravity, therefore Android from 2008 are born System puts cloud service on critically important position.
The characteristics such as the motility of cloud computing environment, opening and public availability, bring to application safety and much choose War.
How safe and reliable terminal computing system to be set up from " root ", to prevent the leakage of information, to prevent potentially to attack Hit, be current field of cloud calculation problem demanding prompt solution.
Content of the invention
The present invention passes through to introduce TPM (Trusted Platform Module) trust computing in android terminal device Module, in conjunction with protected modes such as chain-of-trust and remote provings, to build a safe and reliable trusted end-user plateform system.
The technical scheme is that and be achieved in that:
Trusted end-user platform construction method under a kind of cloud computing environment, described trusted end-user platform includes:Bottom hardware layer, Intermediate layer operating system layer and top layer application layer, set up chain-of-trust from bottom hardware layer to top layer application layer;
Described hardware layer includes CPU, BIOS and ancillary equipment, provides hardware supported for system, hardware layer also includes TPM can Letter computing module, realizes building with the chain-of-trust of operating system interlayer by TPM creditable calculation modules;
Described operating system layer sets up chain-of-trust by the TPM creditable calculation modules of trusted application and described hardware layer Connect, carry out after trust computing checking through trusted application, start the application of Andriod system, android terminal device is opened Beginning work;Operating system also includes TPM creditable calculation modules, is realized credible with application interlayer by TPM creditable calculation modules Chain is built;
Described application layer sets up chain-of-trust even by the TPM creditable calculation modules of trusted application and described operating system Connect, carry out after trust computing checking through trusted application, start application layer operation;Application layer includes trust computing domain, real The GF global functions index functions of existing trusted end-user plateform system;Application layer also includes chain-of-trust management module, realize from bottom to The chain-of-trust management of top layer, by the setting to chain-of-trust management module, arranges the safe class of chain-of-trust;Application layer also includes The remote proving module of identity-based and Attribute certificate, the remote proving module of identity-based and Attribute certificate includes identity and genus Property the reception of certificate and parsing, first, in the trusted application of application layer, increase command number query function, application layer and operation System layer is set up after connecting, and hardware layer sends local identity and Attribute certificate to operating system layer, and operating system layer feedback owns Command number corresponding to local identity and Attribute certificate arrives application layer, and application layer and hardware layer realize interactive controlling, and application layer is straight Connected command number and realized the functional execution in hardware layer of institute, application layer parsed to command number, enter identity-based with The command analysis device of the remote proving module of Attribute certificate, resolves to command string and the command parameter of character style;
Application layer is passed through trusted application and is set up outside chain-of-trust with trustable network, is taken with cloud computing by trustable network Business device is connected.
Alternatively, the form definition of described command string includes:
The identity of whole trusted end-user plateform system and Attribute certificate order first defined in the file of ASCII fromat Collect, form is:" generic command numbering command string ", wherein generic command numbering is numeral, corresponds in application layer trust computing domain The power function index of this order;Command string is the command string at no space interval, and form adopts reference instrument order language Method specification.
The invention has the beneficial effects as follows:
(1)TPM creditable calculation modules are not only transplanted to bottom hardware layer by the present invention, are also transplanted in android system, The transplanting that whole trusted end-user plateform system is carried out with trusted technology is integrated, no matter being that BIOS starts, or upper application layer Application it is necessary to after trust computing is verified, could use it is ensured that the credibility of transmittance process is it is ensured that terminal unit During application program installation and operation, system reliable and secure, finally ensure that the credible of terminal unit.
(2)The use of the remote proving technology of identity-based of the present invention and attribute is it is ensured that terminal unit is to Cloud Server Secure access, is not subject to external interference and attack, is preferably promoted the communication between terminal unit and server, improves terminal The safety of equipment and confidentiality.
(3)The present invention, according to computer virus outbreak principle and feature, introduces safe class mechanism, the peace of safeguards system Entirely, solve the problems, such as android system data storage security, take precautions against the infringement of android system virus.
Brief description
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing Have technology description in required use accompanying drawing be briefly described it should be apparent that, drawings in the following description be only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, acceptable Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 be according to the method for the present invention build cloud computing environment under trusted end-user platform system block diagram.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation description is it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of not making creative work Embodiment, broadly falls into the scope of protection of the invention.
The characteristics such as the motility of cloud computing environment, opening and public availability, bring to application safety and much choose How war, set up safe and reliable terminal computing system from " root ", to prevent the leakage of information, to prevent potentially to attack, be Field of cloud calculation problem demanding prompt solution at present.
The present invention passes through to introduce TPM (Trusted Platform Module) trust computing in android terminal device Module, in conjunction with protected modes such as chain-of-trust and remote provings, to build a safe and reliable trusted end-user plateform system.
With reference to Figure of description, the present invention is described in detail.
The present invention proposes trusted end-user platform construction method under a kind of cloud computing environment, as shown in figure 1, this trusted end-user Platform includes:Bottom hardware layer, intermediate layer operating system layer and top layer application layer, set up from bottom hardware layer to top layer application layer Chain-of-trust.Application layer is passed through trusted application and is set up outside chain-of-trust with trustable network, is taken with cloud computing by trustable network Business device is connected.
TPM creditable calculation modules are not only transplanted to bottom hardware layer by the present invention, are also transplanted in android system, right The transplanting that whole trusted end-user plateform system carries out trusted technology is integrated, and ensures that system bottom hardware layer can be credible and secure first Startup, then transitive trust technology is applied in the transmission of chain-of-trust, from bottom hardware layer to operating system layer, then to application Layer, or even be all a believable transmission to accessing cloud computing server.
As shown in figure 1, hardware layer includes CPU, BIOS and ancillary equipment, provide hardware supported for system, hardware layer also wraps Include TPM creditable calculation modules, realized by TPM creditable calculation modules and the chain-of-trust of operating system interlayer is built, for can not The BIOS start-up operation of letter, TPM creditable calculation modules are refused, and are not transmitted it is ensured that system bottom to operating system layer Hardware layer can be credible and secure startup.
Operating system layer is set up chain-of-trust by trusted application with the TPM creditable calculation modules of hardware layer and is connected, warp Cross after trusted application carries out trust computing checking, start the application of Andriod system, android terminal device is started working; Operating system also includes TPM creditable calculation modules, realizes building with the chain-of-trust of application interlayer by TPM creditable calculation modules. Insincere operation after opening for operating system layer, TPM creditable calculation modules are refused, and are not transmitted to application layer.
Application layer is set up chain-of-trust by trusted application with the TPM creditable calculation modules of described operating system and is connected, Carry out after trust computing checking through trusted application, start application layer operation;Application layer includes trust computing domain, realizes eventually The GF global functions index functions of end credible platform system;Application layer also includes chain-of-trust management module, realizes from bottom to top layer Chain-of-trust management, the safe class of chain-of-trust by the setting to chain-of-trust management module, is set, is sent out according to computer virus Make principle and feature, introduce safe class mechanism, the safety of safeguards system, solve the problems, such as android system data storage security, Take precautions against the infringement of android system virus;Application layer also includes the remote proving module of identity-based and Attribute certificate, based on body Part and the remote proving module of Attribute certificate include reception and the parsing of identity and Attribute certificate, first, the credible of application layer should With increasing command number query function in program, application layer and operating system layer are set up after being connected, the hardware layer local identity of transmission with , to operating system layer, the command number corresponding to the operating system layer all local identity of feedback and Attribute certificate is to application for Attribute certificate Layer, application layer and hardware layer realize interactive controlling, application layer directly pass through command number realization the functional execution in hardware layer, Application layer parses to command number, enters the command analysis device of the remote proving module of identity-based and Attribute certificate, parsing Command string for character style and command parameter.
The form definition of mentioned order string includes:Whole trusted end-user platform first defined in the file of ASCII fromat The identity of system and Attribute certificate command set, form is:" generic command numbering command string ", wherein generic command numbering is several Word, application layer trust computing domain to should bar order power function index;Command string is the command character at no space interval String, form adopts reference instrument command syntax specification.
TPM creditable calculation modules are not only transplanted to bottom hardware layer by the present invention, are also transplanted in android system, right The transplanting that whole trusted end-user plateform system carries out trusted technology is integrated, no matter being that BIOS starts, or the answering of upper application layer With it is necessary to through trust computing verify after, could use it is ensured that transmittance process credibility it is ensured that terminal unit answer With during program installation and operation, system reliable and secure, finally ensure that the credible of terminal unit.
The remote proving technology of identity-based of the present invention and attribute using it is ensured that the safety to Cloud Server for the terminal unit Access, be not subject to external interference and attack, preferably promoted the communication between terminal unit and server, improve terminal unit Safety and confidentiality.
The present invention, according to computer virus outbreak principle and feature, introduces safe class mechanism, the safety of safeguards system, solution Certainly android system data storage security problem, takes precautions against the infringement of android system virus.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all essences in the present invention Within god and principle, any modification, equivalent substitution and improvement made etc., should be included within the scope of the present invention.

Claims (2)

1. under a kind of cloud computing environment trusted end-user platform construction method it is characterised in that described trusted end-user platform includes:Bottom Layer hardware layer, intermediate layer operating system layer and top layer application layer, set up chain-of-trust from bottom hardware layer to top layer application layer;
Described hardware layer includes CPU, BIOS and ancillary equipment, provides hardware supported for system, and hardware layer also includes the credible meter of TPM Calculate module, realize building with the chain-of-trust of operating system interlayer by TPM creditable calculation modules;
Described operating system layer sets up chain-of-trust even by the TPM creditable calculation modules of trusted application and described hardware layer Connect, carry out after trust computing checking through trusted application, start the application of Andriod system, android terminal device starts Work;Operating system also includes TPM creditable calculation modules, realizes the chain-of-trust with application interlayer by TPM creditable calculation modules Build;
Described application layer is set up chain-of-trust by trusted application with the TPM creditable calculation modules of described operating system and is connected, Carry out after trust computing checking through trusted application, start application layer operation;Application layer includes trust computing domain, realizes eventually The GF global functions index functions of end credible platform system;Application layer also includes chain-of-trust management module, realizes from bottom to top layer Chain-of-trust management, the safe class of chain-of-trust by the setting to chain-of-trust management module, is set;Application layer also includes being based on The remote proving module of identity and Attribute certificate, the remote proving module of identity-based and Attribute certificate includes identity and attribute card The reception of book and parsing, first, increase command number query function, application layer and operating system in the trusted application of application layer Layer is set up after connecting, and hardware layer sends local identity and Attribute certificate to operating system layer, and operating system layer feeds back all local To application layer, application layer and hardware layer realize interactive controlling to command number corresponding to identity and Attribute certificate, and application layer is directly led to Cross command number and realize the functional execution in hardware layer of institute, application layer parses to command number, entrance identity-based and attribute The command analysis device of the remote proving module of certificate, resolves to command string and the command parameter of character style;
Application layer is passed through trusted application and is set up outside chain-of-trust with trustable network, by trustable network and cloud computing server It is connected.
2. as claimed in claim 1 under a kind of cloud computing environment trusted end-user platform construction method it is characterised in that described life The form definition of order string includes:
The identity of whole trusted end-user plateform system and Attribute certificate command set, lattice first defined in the file of ASCII fromat Formula is:" generic command numbering command string ", wherein generic command numbering be numeral, application layer trust computing domain to should bar life The power function index of order;Command string is the command string at no space interval, and form adopts reference instrument command syntax specification.
CN201610949171.8A 2016-10-26 2016-10-26 Method for constructing terminal trusted platform in cloud computing environment Expired - Fee Related CN106452753B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610949171.8A CN106452753B (en) 2016-10-26 2016-10-26 Method for constructing terminal trusted platform in cloud computing environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610949171.8A CN106452753B (en) 2016-10-26 2016-10-26 Method for constructing terminal trusted platform in cloud computing environment

Publications (2)

Publication Number Publication Date
CN106452753A true CN106452753A (en) 2017-02-22
CN106452753B CN106452753B (en) 2020-02-11

Family

ID=58177863

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610949171.8A Expired - Fee Related CN106452753B (en) 2016-10-26 2016-10-26 Method for constructing terminal trusted platform in cloud computing environment

Country Status (1)

Country Link
CN (1) CN106452753B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018119990A1 (en) * 2016-12-30 2018-07-05 刘清华 Cloud data platform key setting method
CN113656229A (en) * 2021-08-17 2021-11-16 中金金融认证中心有限公司 Method and device for detecting computer system password module and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103218553A (en) * 2013-03-08 2013-07-24 深圳数字电视国家工程实验室股份有限公司 Authorizing method and system based on trusted platform module
CN103748594A (en) * 2011-07-29 2014-04-23 微软公司 Firmware-based trusted platform module for arm processor architectures and trustzone security extensions
CN103929422A (en) * 2014-04-08 2014-07-16 北京工业大学 Trusted inter-domain safety certificate protocol based on SDN
CN104239802A (en) * 2014-10-15 2014-12-24 浪潮电子信息产业股份有限公司 Trusted server design method based on cloud data center
US20150033305A1 (en) * 2013-03-15 2015-01-29 Advanced Elemental Technologies, Inc. Methods and systems for secure and reliable identity-based computing

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103748594A (en) * 2011-07-29 2014-04-23 微软公司 Firmware-based trusted platform module for arm processor architectures and trustzone security extensions
CN103218553A (en) * 2013-03-08 2013-07-24 深圳数字电视国家工程实验室股份有限公司 Authorizing method and system based on trusted platform module
US20150033305A1 (en) * 2013-03-15 2015-01-29 Advanced Elemental Technologies, Inc. Methods and systems for secure and reliable identity-based computing
CN103929422A (en) * 2014-04-08 2014-07-16 北京工业大学 Trusted inter-domain safety certificate protocol based on SDN
CN104239802A (en) * 2014-10-15 2014-12-24 浪潮电子信息产业股份有限公司 Trusted server design method based on cloud data center

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘皖等: "基于平台可信链的可信边界扩展模型", 《计算机工程 》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018119990A1 (en) * 2016-12-30 2018-07-05 刘清华 Cloud data platform key setting method
CN113656229A (en) * 2021-08-17 2021-11-16 中金金融认证中心有限公司 Method and device for detecting computer system password module and storage medium
CN113656229B (en) * 2021-08-17 2024-02-20 中金金融认证中心有限公司 Method, device and storage medium for detecting cryptographic module of computer system

Also Published As

Publication number Publication date
CN106452753B (en) 2020-02-11

Similar Documents

Publication Publication Date Title
CN103944890B (en) Virtual interaction system based on customer end/server mode and method
CN103002445A (en) Safe mobile electronic equipment for providing application services
CN104572263B (en) A kind of page data exchange method, relevant apparatus and system
CN103475666B (en) A kind of digital signature authentication method of Internet of Things resource
CN108351937A (en) Computing device
CN107872447A (en) Electronic device, server, communication system and communication method
CN107147647A (en) A kind of webpage authorization method and device
CN106506166A (en) Trusted end-user plateform system under cloud computing environment
CN104580081A (en) Integrated SSO (single sign on) system
CN101763477B (en) Signature method of intelligent secret key device
WO2023053101A1 (en) Systems and methods for malicious code neutralization in execution environments
CN112632605A (en) Method and device for preventing unauthorized access, computer equipment and storage medium
CN106452753A (en) Method for constructing terminal credible platform in cloud computing environment
Wang et al. Survey on key technology development and application in trusted computing
Karpati et al. Visualizing cyber attacks with misuse case maps
CN105930732A (en) Credible starting method suitable for service board in VPX device
CN109190358A (en) Site passwords generation method, system and code management device
CN103955466B (en) A kind of method and device for showing document in a browser
Yin et al. Scanner++: Enhanced Vulnerability Detection of Web Applications with Attack Intent Synchronization
CN104052602A (en) Prevention of password leakage with single sign on in conjunction with command line interfaces
KR20140079694A (en) Automated human interface device operation procedure
RU2552135C2 (en) Device for network systems protection against attacks
Härtig et al. Lateral thinking for trustworthy apps
CN109857491A (en) A kind of cloud desktop platform system based on SPICE open source protocol
Bu et al. Security Checking of Trigger-Action-Programming Smart Home Integrations

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200211

CF01 Termination of patent right due to non-payment of annual fee