CN106452753A - Method for constructing terminal credible platform in cloud computing environment - Google Patents
Method for constructing terminal credible platform in cloud computing environment Download PDFInfo
- Publication number
- CN106452753A CN106452753A CN201610949171.8A CN201610949171A CN106452753A CN 106452753 A CN106452753 A CN 106452753A CN 201610949171 A CN201610949171 A CN 201610949171A CN 106452753 A CN106452753 A CN 106452753A
- Authority
- CN
- China
- Prior art keywords
- layer
- application
- trust
- chain
- command
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title abstract description 7
- 239000010410 layer Substances 0.000 claims description 110
- 238000004364 calculation method Methods 0.000 claims description 25
- 230000006870 function Effects 0.000 claims description 12
- 238000007726 management method Methods 0.000 claims description 9
- 238000010276 construction Methods 0.000 claims description 6
- 239000011229 interlayer Substances 0.000 claims description 6
- 238000004458 analytical method Methods 0.000 claims description 3
- 230000002452 interceptive effect Effects 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 abstract description 10
- 241000700605 Viruses Species 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 3
- 238000013500 data storage Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 230000004899 motility Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000002834 transmittance Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 239000000686 essence Substances 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0877—Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
- H04L2209/127—Trusted platform modules [TPM]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Stored Programmes (AREA)
Abstract
The invention provides a method for constructing a terminal credible platform in a cloud computing environment. The terminal credible platform comprises a bottom hardware layer, a middle operating system layer and a top application layer, and a credible chain is established from the bottom hardware layer to the top application layer. The application layer establishes an external credible chain with a credible network through a credible application program and is connected with a cloud computing server through the credible network. According to the method provided by the invention, a TPM credible computing module is not only transplanted into the bottom hardware layer, but also is transplanted into an Android system, and the credible technology is transplanted and integrated into the entire terminal credible platform system, thereby ensuring that the bottom hardware layer of the system can be started credibly and safely at first, then the credible transfer technology is applied to the transfer of the credible chain, and credible transfer from the bottom hardware layer to the operating system layer and to the application layer, and even to the access of the cloud computing server is achieved.
Description
Technical field
The present invention relates to field of cloud calculation, particularly to trusted end-user platform construction method under a kind of cloud computing environment.
Background technology
Cloud computing is that substantial amounts of Internet resources are united, and provides the user efficient, easily software service.Cloud computing
Advocate is desirably:User uses software service just as the same with water using electricity, can be convenient, whenever and wherever possible, desirably make
With service.Under cloud computing mode, user can pass through various " end " access " cloud ", and " end " can be any electricity that can surf the Net
Sub- equipment, " cloud " is exactly the service providing, " cloud " be probably huge, joining together, no border it is also possible to negligible
, isolated, it is ubiquitous in a word, using the teaching of the invention it is possible to provide to the various services required for user.
Cloud computing is made up of three parts in simple terms:Terminal, network, remote server, terminal include mobile phone, net book,
The various equipment such as panel computer;Network includes WIFI, 3G etc., for connecting remote server.Using cloud computing service when
Wait, terminal unit is only equivalent to the Input/Output Devices such as display, keyboard, mouse.Remote server is the meter cheap by multiple stage
Calculation machine composition, according to the imagination of Google, the remote server of cloud computing is made up of the computer on network, a computer
Idle computing power may not be very big, but hundreds of millions of on-line computers are gathered around it may be said that having unlimited computing in the whole world
Power.Android system is exactly one using " the Internet " as the system of center of gravity, therefore Android from 2008 are born
System puts cloud service on critically important position.
The characteristics such as the motility of cloud computing environment, opening and public availability, bring to application safety and much choose
War.
How safe and reliable terminal computing system to be set up from " root ", to prevent the leakage of information, to prevent potentially to attack
Hit, be current field of cloud calculation problem demanding prompt solution.
Content of the invention
The present invention passes through to introduce TPM (Trusted Platform Module) trust computing in android terminal device
Module, in conjunction with protected modes such as chain-of-trust and remote provings, to build a safe and reliable trusted end-user plateform system.
The technical scheme is that and be achieved in that:
Trusted end-user platform construction method under a kind of cloud computing environment, described trusted end-user platform includes:Bottom hardware layer,
Intermediate layer operating system layer and top layer application layer, set up chain-of-trust from bottom hardware layer to top layer application layer;
Described hardware layer includes CPU, BIOS and ancillary equipment, provides hardware supported for system, hardware layer also includes TPM can
Letter computing module, realizes building with the chain-of-trust of operating system interlayer by TPM creditable calculation modules;
Described operating system layer sets up chain-of-trust by the TPM creditable calculation modules of trusted application and described hardware layer
Connect, carry out after trust computing checking through trusted application, start the application of Andriod system, android terminal device is opened
Beginning work;Operating system also includes TPM creditable calculation modules, is realized credible with application interlayer by TPM creditable calculation modules
Chain is built;
Described application layer sets up chain-of-trust even by the TPM creditable calculation modules of trusted application and described operating system
Connect, carry out after trust computing checking through trusted application, start application layer operation;Application layer includes trust computing domain, real
The GF global functions index functions of existing trusted end-user plateform system;Application layer also includes chain-of-trust management module, realize from bottom to
The chain-of-trust management of top layer, by the setting to chain-of-trust management module, arranges the safe class of chain-of-trust;Application layer also includes
The remote proving module of identity-based and Attribute certificate, the remote proving module of identity-based and Attribute certificate includes identity and genus
Property the reception of certificate and parsing, first, in the trusted application of application layer, increase command number query function, application layer and operation
System layer is set up after connecting, and hardware layer sends local identity and Attribute certificate to operating system layer, and operating system layer feedback owns
Command number corresponding to local identity and Attribute certificate arrives application layer, and application layer and hardware layer realize interactive controlling, and application layer is straight
Connected command number and realized the functional execution in hardware layer of institute, application layer parsed to command number, enter identity-based with
The command analysis device of the remote proving module of Attribute certificate, resolves to command string and the command parameter of character style;
Application layer is passed through trusted application and is set up outside chain-of-trust with trustable network, is taken with cloud computing by trustable network
Business device is connected.
Alternatively, the form definition of described command string includes:
The identity of whole trusted end-user plateform system and Attribute certificate order first defined in the file of ASCII fromat
Collect, form is:" generic command numbering command string ", wherein generic command numbering is numeral, corresponds in application layer trust computing domain
The power function index of this order;Command string is the command string at no space interval, and form adopts reference instrument order language
Method specification.
The invention has the beneficial effects as follows:
(1)TPM creditable calculation modules are not only transplanted to bottom hardware layer by the present invention, are also transplanted in android system,
The transplanting that whole trusted end-user plateform system is carried out with trusted technology is integrated, no matter being that BIOS starts, or upper application layer
Application it is necessary to after trust computing is verified, could use it is ensured that the credibility of transmittance process is it is ensured that terminal unit
During application program installation and operation, system reliable and secure, finally ensure that the credible of terminal unit.
(2)The use of the remote proving technology of identity-based of the present invention and attribute is it is ensured that terminal unit is to Cloud Server
Secure access, is not subject to external interference and attack, is preferably promoted the communication between terminal unit and server, improves terminal
The safety of equipment and confidentiality.
(3)The present invention, according to computer virus outbreak principle and feature, introduces safe class mechanism, the peace of safeguards system
Entirely, solve the problems, such as android system data storage security, take precautions against the infringement of android system virus.
Brief description
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
Have technology description in required use accompanying drawing be briefly described it should be apparent that, drawings in the following description be only this
Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, acceptable
Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 be according to the method for the present invention build cloud computing environment under trusted end-user platform system block diagram.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation description is it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments.It is based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of not making creative work
Embodiment, broadly falls into the scope of protection of the invention.
The characteristics such as the motility of cloud computing environment, opening and public availability, bring to application safety and much choose
How war, set up safe and reliable terminal computing system from " root ", to prevent the leakage of information, to prevent potentially to attack, be
Field of cloud calculation problem demanding prompt solution at present.
The present invention passes through to introduce TPM (Trusted Platform Module) trust computing in android terminal device
Module, in conjunction with protected modes such as chain-of-trust and remote provings, to build a safe and reliable trusted end-user plateform system.
With reference to Figure of description, the present invention is described in detail.
The present invention proposes trusted end-user platform construction method under a kind of cloud computing environment, as shown in figure 1, this trusted end-user
Platform includes:Bottom hardware layer, intermediate layer operating system layer and top layer application layer, set up from bottom hardware layer to top layer application layer
Chain-of-trust.Application layer is passed through trusted application and is set up outside chain-of-trust with trustable network, is taken with cloud computing by trustable network
Business device is connected.
TPM creditable calculation modules are not only transplanted to bottom hardware layer by the present invention, are also transplanted in android system, right
The transplanting that whole trusted end-user plateform system carries out trusted technology is integrated, and ensures that system bottom hardware layer can be credible and secure first
Startup, then transitive trust technology is applied in the transmission of chain-of-trust, from bottom hardware layer to operating system layer, then to application
Layer, or even be all a believable transmission to accessing cloud computing server.
As shown in figure 1, hardware layer includes CPU, BIOS and ancillary equipment, provide hardware supported for system, hardware layer also wraps
Include TPM creditable calculation modules, realized by TPM creditable calculation modules and the chain-of-trust of operating system interlayer is built, for can not
The BIOS start-up operation of letter, TPM creditable calculation modules are refused, and are not transmitted it is ensured that system bottom to operating system layer
Hardware layer can be credible and secure startup.
Operating system layer is set up chain-of-trust by trusted application with the TPM creditable calculation modules of hardware layer and is connected, warp
Cross after trusted application carries out trust computing checking, start the application of Andriod system, android terminal device is started working;
Operating system also includes TPM creditable calculation modules, realizes building with the chain-of-trust of application interlayer by TPM creditable calculation modules.
Insincere operation after opening for operating system layer, TPM creditable calculation modules are refused, and are not transmitted to application layer.
Application layer is set up chain-of-trust by trusted application with the TPM creditable calculation modules of described operating system and is connected,
Carry out after trust computing checking through trusted application, start application layer operation;Application layer includes trust computing domain, realizes eventually
The GF global functions index functions of end credible platform system;Application layer also includes chain-of-trust management module, realizes from bottom to top layer
Chain-of-trust management, the safe class of chain-of-trust by the setting to chain-of-trust management module, is set, is sent out according to computer virus
Make principle and feature, introduce safe class mechanism, the safety of safeguards system, solve the problems, such as android system data storage security,
Take precautions against the infringement of android system virus;Application layer also includes the remote proving module of identity-based and Attribute certificate, based on body
Part and the remote proving module of Attribute certificate include reception and the parsing of identity and Attribute certificate, first, the credible of application layer should
With increasing command number query function in program, application layer and operating system layer are set up after being connected, the hardware layer local identity of transmission with
, to operating system layer, the command number corresponding to the operating system layer all local identity of feedback and Attribute certificate is to application for Attribute certificate
Layer, application layer and hardware layer realize interactive controlling, application layer directly pass through command number realization the functional execution in hardware layer,
Application layer parses to command number, enters the command analysis device of the remote proving module of identity-based and Attribute certificate, parsing
Command string for character style and command parameter.
The form definition of mentioned order string includes:Whole trusted end-user platform first defined in the file of ASCII fromat
The identity of system and Attribute certificate command set, form is:" generic command numbering command string ", wherein generic command numbering is several
Word, application layer trust computing domain to should bar order power function index;Command string is the command character at no space interval
String, form adopts reference instrument command syntax specification.
TPM creditable calculation modules are not only transplanted to bottom hardware layer by the present invention, are also transplanted in android system, right
The transplanting that whole trusted end-user plateform system carries out trusted technology is integrated, no matter being that BIOS starts, or the answering of upper application layer
With it is necessary to through trust computing verify after, could use it is ensured that transmittance process credibility it is ensured that terminal unit answer
With during program installation and operation, system reliable and secure, finally ensure that the credible of terminal unit.
The remote proving technology of identity-based of the present invention and attribute using it is ensured that the safety to Cloud Server for the terminal unit
Access, be not subject to external interference and attack, preferably promoted the communication between terminal unit and server, improve terminal unit
Safety and confidentiality.
The present invention, according to computer virus outbreak principle and feature, introduces safe class mechanism, the safety of safeguards system, solution
Certainly android system data storage security problem, takes precautions against the infringement of android system virus.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all essences in the present invention
Within god and principle, any modification, equivalent substitution and improvement made etc., should be included within the scope of the present invention.
Claims (2)
1. under a kind of cloud computing environment trusted end-user platform construction method it is characterised in that described trusted end-user platform includes:Bottom
Layer hardware layer, intermediate layer operating system layer and top layer application layer, set up chain-of-trust from bottom hardware layer to top layer application layer;
Described hardware layer includes CPU, BIOS and ancillary equipment, provides hardware supported for system, and hardware layer also includes the credible meter of TPM
Calculate module, realize building with the chain-of-trust of operating system interlayer by TPM creditable calculation modules;
Described operating system layer sets up chain-of-trust even by the TPM creditable calculation modules of trusted application and described hardware layer
Connect, carry out after trust computing checking through trusted application, start the application of Andriod system, android terminal device starts
Work;Operating system also includes TPM creditable calculation modules, realizes the chain-of-trust with application interlayer by TPM creditable calculation modules
Build;
Described application layer is set up chain-of-trust by trusted application with the TPM creditable calculation modules of described operating system and is connected,
Carry out after trust computing checking through trusted application, start application layer operation;Application layer includes trust computing domain, realizes eventually
The GF global functions index functions of end credible platform system;Application layer also includes chain-of-trust management module, realizes from bottom to top layer
Chain-of-trust management, the safe class of chain-of-trust by the setting to chain-of-trust management module, is set;Application layer also includes being based on
The remote proving module of identity and Attribute certificate, the remote proving module of identity-based and Attribute certificate includes identity and attribute card
The reception of book and parsing, first, increase command number query function, application layer and operating system in the trusted application of application layer
Layer is set up after connecting, and hardware layer sends local identity and Attribute certificate to operating system layer, and operating system layer feeds back all local
To application layer, application layer and hardware layer realize interactive controlling to command number corresponding to identity and Attribute certificate, and application layer is directly led to
Cross command number and realize the functional execution in hardware layer of institute, application layer parses to command number, entrance identity-based and attribute
The command analysis device of the remote proving module of certificate, resolves to command string and the command parameter of character style;
Application layer is passed through trusted application and is set up outside chain-of-trust with trustable network, by trustable network and cloud computing server
It is connected.
2. as claimed in claim 1 under a kind of cloud computing environment trusted end-user platform construction method it is characterised in that described life
The form definition of order string includes:
The identity of whole trusted end-user plateform system and Attribute certificate command set, lattice first defined in the file of ASCII fromat
Formula is:" generic command numbering command string ", wherein generic command numbering be numeral, application layer trust computing domain to should bar life
The power function index of order;Command string is the command string at no space interval, and form adopts reference instrument command syntax specification.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610949171.8A CN106452753B (en) | 2016-10-26 | 2016-10-26 | Method for constructing terminal trusted platform in cloud computing environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610949171.8A CN106452753B (en) | 2016-10-26 | 2016-10-26 | Method for constructing terminal trusted platform in cloud computing environment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106452753A true CN106452753A (en) | 2017-02-22 |
CN106452753B CN106452753B (en) | 2020-02-11 |
Family
ID=58177863
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610949171.8A Expired - Fee Related CN106452753B (en) | 2016-10-26 | 2016-10-26 | Method for constructing terminal trusted platform in cloud computing environment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106452753B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018119990A1 (en) * | 2016-12-30 | 2018-07-05 | 刘清华 | Cloud data platform key setting method |
CN113656229A (en) * | 2021-08-17 | 2021-11-16 | 中金金融认证中心有限公司 | Method and device for detecting computer system password module and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103218553A (en) * | 2013-03-08 | 2013-07-24 | 深圳数字电视国家工程实验室股份有限公司 | Authorizing method and system based on trusted platform module |
CN103748594A (en) * | 2011-07-29 | 2014-04-23 | 微软公司 | Firmware-based trusted platform module for arm processor architectures and trustzone security extensions |
CN103929422A (en) * | 2014-04-08 | 2014-07-16 | 北京工业大学 | Trusted inter-domain safety certificate protocol based on SDN |
CN104239802A (en) * | 2014-10-15 | 2014-12-24 | 浪潮电子信息产业股份有限公司 | Trusted server design method based on cloud data center |
US20150033305A1 (en) * | 2013-03-15 | 2015-01-29 | Advanced Elemental Technologies, Inc. | Methods and systems for secure and reliable identity-based computing |
-
2016
- 2016-10-26 CN CN201610949171.8A patent/CN106452753B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103748594A (en) * | 2011-07-29 | 2014-04-23 | 微软公司 | Firmware-based trusted platform module for arm processor architectures and trustzone security extensions |
CN103218553A (en) * | 2013-03-08 | 2013-07-24 | 深圳数字电视国家工程实验室股份有限公司 | Authorizing method and system based on trusted platform module |
US20150033305A1 (en) * | 2013-03-15 | 2015-01-29 | Advanced Elemental Technologies, Inc. | Methods and systems for secure and reliable identity-based computing |
CN103929422A (en) * | 2014-04-08 | 2014-07-16 | 北京工业大学 | Trusted inter-domain safety certificate protocol based on SDN |
CN104239802A (en) * | 2014-10-15 | 2014-12-24 | 浪潮电子信息产业股份有限公司 | Trusted server design method based on cloud data center |
Non-Patent Citations (1)
Title |
---|
刘皖等: "基于平台可信链的可信边界扩展模型", 《计算机工程 》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018119990A1 (en) * | 2016-12-30 | 2018-07-05 | 刘清华 | Cloud data platform key setting method |
CN113656229A (en) * | 2021-08-17 | 2021-11-16 | 中金金融认证中心有限公司 | Method and device for detecting computer system password module and storage medium |
CN113656229B (en) * | 2021-08-17 | 2024-02-20 | 中金金融认证中心有限公司 | Method, device and storage medium for detecting cryptographic module of computer system |
Also Published As
Publication number | Publication date |
---|---|
CN106452753B (en) | 2020-02-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103944890B (en) | Virtual interaction system based on customer end/server mode and method | |
CN103002445A (en) | Safe mobile electronic equipment for providing application services | |
CN104572263B (en) | A kind of page data exchange method, relevant apparatus and system | |
CN103475666B (en) | A kind of digital signature authentication method of Internet of Things resource | |
CN108351937A (en) | Computing device | |
CN107872447A (en) | Electronic device, server, communication system and communication method | |
CN107147647A (en) | A kind of webpage authorization method and device | |
CN106506166A (en) | Trusted end-user plateform system under cloud computing environment | |
CN104580081A (en) | Integrated SSO (single sign on) system | |
CN101763477B (en) | Signature method of intelligent secret key device | |
WO2023053101A1 (en) | Systems and methods for malicious code neutralization in execution environments | |
CN112632605A (en) | Method and device for preventing unauthorized access, computer equipment and storage medium | |
CN106452753A (en) | Method for constructing terminal credible platform in cloud computing environment | |
Wang et al. | Survey on key technology development and application in trusted computing | |
Karpati et al. | Visualizing cyber attacks with misuse case maps | |
CN105930732A (en) | Credible starting method suitable for service board in VPX device | |
CN109190358A (en) | Site passwords generation method, system and code management device | |
CN103955466B (en) | A kind of method and device for showing document in a browser | |
Yin et al. | Scanner++: Enhanced Vulnerability Detection of Web Applications with Attack Intent Synchronization | |
CN104052602A (en) | Prevention of password leakage with single sign on in conjunction with command line interfaces | |
KR20140079694A (en) | Automated human interface device operation procedure | |
RU2552135C2 (en) | Device for network systems protection against attacks | |
Härtig et al. | Lateral thinking for trustworthy apps | |
CN109857491A (en) | A kind of cloud desktop platform system based on SPICE open source protocol | |
Bu et al. | Security Checking of Trigger-Action-Programming Smart Home Integrations |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20200211 |
|
CF01 | Termination of patent right due to non-payment of annual fee |