[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN114124506A - Method for realizing trusted security protocol based on trusted computing - Google Patents

Method for realizing trusted security protocol based on trusted computing Download PDF

Info

Publication number
CN114124506A
CN114124506A CN202111356571.5A CN202111356571A CN114124506A CN 114124506 A CN114124506 A CN 114124506A CN 202111356571 A CN202111356571 A CN 202111356571A CN 114124506 A CN114124506 A CN 114124506A
Authority
CN
China
Prior art keywords
verification
trusted
mobile terminal
decryption
terminal device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111356571.5A
Other languages
Chinese (zh)
Inventor
魏明
阮安邦
王佳帅
邵革建
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Octa Innovations Information Technology Co Ltd
Original Assignee
Beijing Octa Innovations Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Octa Innovations Information Technology Co Ltd filed Critical Beijing Octa Innovations Information Technology Co Ltd
Priority to CN202111356571.5A priority Critical patent/CN114124506A/en
Publication of CN114124506A publication Critical patent/CN114124506A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • H04L2209/127Trusted platform modules [TPM]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention belongs to the technical field of information processing, and particularly relates to a method for realizing a trusted security protocol based on trusted computing, which comprises the steps of firstly constructing a trusted access authentication model through a trusted computing module to obtain the trusted access security protocol in a cloud environment; then, the mobile terminal equipment which is accessed in a trusted way is determined according to the requirement of a trusted access security protocol, and an access request is sent out through the mobile terminal equipment to obtain the verification offer of the platform; manufacturing corresponding verification materials according to the verification offer of the platform, encrypting the verification materials through the encryption module to obtain encrypted verification materials, and finally performing matching verification and decryption on the encrypted verification materials through the trusted computing module in sequence, wherein a communication safety channel between the mobile terminal device and the platform can be opened after the decryption is successful; the double authentication is carried out by matching verification and decryption, so that the safety of the safety protocol is improved, and the requirement of platform privacy protection under the cloud environment can be met to a certain extent.

Description

Method for realizing trusted security protocol based on trusted computing
Technical Field
The invention belongs to the technical field of information processing, and particularly relates to a method for realizing a trusted security protocol based on trusted computing.
Background
With the development and wide application of information technology, information security is more and more concerned by people. Trusted computing technology aiming at improving the security of computer systems becomes a research hotspot in the international information security field, and remote certification is a difficult point and key in the research of trusted computing. How to enable two nodes in a network to quickly and effectively judge the trusted state of the platform of the other party before interaction under the condition of ensuring that the platform configuration information is not leaked is the key of the remote attestation technology. In addition, the openness of the wireless network makes the network more vulnerable, and the confidentiality of communication and authentication technology are the primary problems to be solved urgently for the security of the wireless network. How to increase the platform identity and platform integrity verification of the mobile terminal under the condition of ensuring the user identity anonymity of the mobile terminal and improve the security of a wireless network access authentication protocol is a new problem to be solved for wireless network access authentication.
However, in the prior art, when a trusted security protocol is implemented by using a trusted computing technology, it is usually impossible to perform double authentication between the identity of a user and a server and a platform, which results in a reduction in security of the security protocol and fails to meet a requirement for platform privacy protection in a cloud environment.
Disclosure of Invention
The invention aims to provide a method for realizing a trusted security protocol based on trusted computing, which comprises the steps of establishing a trusted access authentication model through a trusted computing module, determining a mobile terminal device which is accessed in a trusted mode according to the requirements of the trusted access security protocol, manufacturing corresponding verification materials by the mobile terminal device according to contents which are required to be verified, and finally transmitting the encrypted verification materials to the trusted computing module through gateway equipment for matching verification so as to solve the problems in the background technology.
In order to achieve the purpose, the invention adopts the following technical scheme:
a method for realizing a trusted security protocol based on trusted computing comprises the following steps:
s1, establishing a trusted access authentication model through the trusted computing module to obtain a trusted access security protocol in the cloud environment;
s2, determining the mobile terminal equipment which is accessed in a trusted way according to the requirement of the trusted access security protocol, and sending an access request through the mobile terminal equipment to obtain the verification offer of the platform;
s3, the mobile terminal device makes corresponding verification materials according to the contents of the verification offer, and the verification materials are encrypted through the encryption module to obtain encrypted verification materials;
s4, transmitting the encrypted verification material to a trusted computing module through gateway equipment for matching verification to obtain a verification result;
and S5, when the verification result is matched, the gateway equipment sends a decryption key to the trusted computing module, decryption and decryption are carried out through the trusted computing module, and a communication safety channel between the mobile terminal equipment and the platform can be opened after the decryption is successful.
Preferably, in step 1, the trusted computing module includes a TPM chip and an application interface, the application interface includes a TSS device driver interface and a TSS core service interface, and the TPM chip is electrically connected to the TSS device driver interface and the TSS core service interface, respectively.
Preferably, the trusted access authentication model includes a device to be accessed, a network access policy enforcement device, and an isolated network server, and the device to be accessed sends a network access request through the device to be accessed, performs network access through the network access policy enforcement device, and performs trusted verification through the isolated network server, the device to be accessed is set as a mobile terminal device, the network access policy enforcement device is set as a gateway device, the isolated network server is set as a trusted authentication server, the mobile terminal device is electrically connected with the gateway device, and the gateway device is electrically connected with the trusted authentication server.
Preferably, the requirements of the trusted access security protocol in step 2 include the type of the mobile terminal device to be accessed, the application program category, and whether the mobile terminal device to be accessed is in the white list column, and if the mobile terminal device to be accessed is in the white list column, the platform sends out the verification offer according to the corresponding mobile terminal device after sending out the access request through the mobile terminal device.
Preferably, the verification offer in step 2 and step 3 is an offer content containing main characteristics of the mobile terminal device, which is formulated according to different mobile terminal devices, the offer content specifically includes professional questions related to the performance of the mobile terminal device, which are proposed according to different mobile terminal devices, and the professional questions are gathered and stored to form a question database, and when the verification offer is issued, the offer content composed of questions related to the mobile terminal device to be accessed is randomly selected from the question database.
Preferably, the encryption module in step 3 includes a digital system and two MCUs, the digital system is connected with one of the MCUs through an IIC bus and used for transmitting a ciphertext request, the other of the MCUs generates a ciphertext through encryption algorithm operation, the ciphertext is sent to the digital system, the downloaded key passes through the encryption algorithm and generates the ciphertext, the digital system translates the ciphertext into the key through a decryption algorithm, then the key and the key are compared and verified, the digital system sends a success signal to the MCUs through the IIC bus after verifying the ciphertext, and the MCU changes the address into the address of the network terminal device to be accessed.
Preferably, the gateway device in step 4 is configured as a network switch having a three-layer switching function, where the network switch is a connector between different networks, and provides a data conversion function between multiple networks using different protocols and data formats.
Preferably, during matching verification, when the verification results are not matched, the trusted computing module automatically enters secondary matching verification, when the secondary matching verification results are matched, the gateway device sends a decryption key to the trusted computing module, when the secondary verification results are not matched, the trusted computing module automatically enters tertiary matching verification, when the tertiary verification results are not matched, the gateway device transmits the encrypted verification material to the blacklist, and the gateway device does not send the decryption key.
Preferably, when the decryption and cracking are performed by the trusted computing module in step 5, if the cracking is unsuccessful, the trusted computing module performs secondary decryption and cracking according to the decryption key, if the secondary decryption and cracking is successful, a secure channel for communication between the mobile terminal device and the platform is opened, and if the secondary decryption and cracking is unsuccessful, the secure channel for communication between the mobile terminal device and the platform cannot be opened.
Compared with the prior art, the method for realizing the trusted security protocol based on the trusted computing has the following advantages that:
the method mainly comprises the steps of firstly establishing a trusted access authentication model through a trusted computing module, then determining mobile terminal equipment which is accessed in a trusted mode according to requirements of a trusted access security protocol, sending an access request through the mobile terminal equipment, manufacturing corresponding verification materials according to verification requirements of a platform, then encrypting the verification materials through an encryption module, finally sequentially carrying out matching verification and decryption on the encrypted verification materials through the trusted computing module, opening a security channel for communication between the mobile terminal equipment and the platform after the decryption is successful, and carrying out double authentication through a matching verification and decryption mode, so that the security of the security protocol is improved, and the requirements of platform privacy protection in a cloud environment can be met to a certain extent.
Drawings
FIG. 1 is a block flow diagram of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. The specific embodiments described herein are merely illustrative of the invention and do not delimit the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention provides a method for realizing a trusted security protocol based on trusted computing, which is shown in figure 1 and comprises the following steps:
s1, establishing a trusted access authentication model through the trusted computing module to obtain a trusted access security protocol in the cloud environment;
the trusted computing module comprises a TPM chip and an application interface, the application interface comprises a TSS device driver interface and a TSS core service interface, the TPM chip is electrically connected with the TSS device driver interface and the TSS core service interface respectively, and the TPM chip is a trust root (a trusted storage root and a trusted report root) of the trusted computing platform, stores a metric value on one hand and provides a security report to an upper layer on the other hand; the TPM chip has high processing speed and can improve efficiency, software has bugs and is possible to bypass or utilize, hardware can better guarantee safety, an IO component completes coding and decoding of a bus protocol and realizes information exchange between the TPM and the outside, and the password coprocessor is used for realizing hardware acceleration of encryption, decryption, signature and signature verification.
The TSS device driver interface is represented by TDDI, and the TSS core service interface is represented by TCSI, where TDDI is an API library interacting with the TPM device driver to facilitate interaction with the TPM, for example, sending data to or receiving data from the TPM, querying the state of the TPM, etc.; the main functions of the TSS core service are to manage TPM resources, such as context management, key and certificate management, event management, TPM parameter block generation, etc., the core software of the user program layer is the TSS service provider, and the TSP provides the highest level API function for the application to call by the application in a way of shared objects and dynamically linked libraries, so that the application can use TPM conveniently.
When the application program is used, the application program sends data and commands to the TSS service provider through an interface provided by the TSS service, the TSS service provider processes the data and commands and then sends the data and commands to the TSS device driving interface through the TSS core service interface, the TSS device driving interface processes the data and then sends the data and commands to the TPM device driving program, the TPM device driving program processes and drives the TPM, and the response given by the TPM is reversely sent to the application through the TPM device driving program, the TSS device driving program interface, the TSS core service interface and the TSS service provider.
The trusted access authentication model comprises a device to be accessed, a network access strategy execution device and an isolation network server, wherein a network access request is sent out through the network device to be accessed, network access is carried out through the network access strategy execution device, and finally trusted verification is carried out through the isolation network server.
S2, determining the mobile terminal equipment which is accessed in a trusted way according to the requirement of the trusted access security protocol, and sending an access request through the mobile terminal equipment to obtain the verification offer of the platform;
the requirements of the trusted access security protocol comprise the type of the mobile terminal device to be accessed, the application program type and whether the mobile terminal device to be accessed is in the white list, and if the mobile terminal device to be accessed is in the white list, the platform sends out a verification offer according to the corresponding mobile terminal device after sending out an access request through the mobile terminal device;
the verification offer is an offer content which is made according to different mobile terminal devices and contains main characteristics of the mobile terminal devices, the offer content specifically comprises professional problems which are proposed according to the different mobile terminal devices and related to the performance of the mobile terminal devices, the professional problems are gathered and stored to form a problem database, and when the verification offer is sent out, the offer content which is composed of problems related to the mobile terminal devices to be accessed is randomly selected from the problem database.
S3, the mobile terminal device makes corresponding verification materials according to the contents of the verification offer, and the verification materials are encrypted through the encryption module to obtain encrypted verification materials;
the encryption module comprises a digital system and two MCUs, wherein the digital system is connected with one of the MCUs through an IIC bus and used for transmitting a ciphertext request, the inside of the other MCU generates a ciphertext through encryption algorithm operation, the ciphertext is sent to the digital system, a downloaded key passes through the encryption algorithm and generates the ciphertext, the digital system translates the ciphertext into the key through a decryption algorithm, the key and the key are compared and verified, a success signal is sent to the MCU through the IIC bus after the digital system verifies the ciphertext, and the MCU changes an address into an address of a network terminal device to be accessed.
S4, transmitting the encrypted verification material to a trusted computing module through gateway equipment for matching verification to obtain a verification result;
the gateway equipment is set as a network switch with three-layer switching function, the network switch provides data conversion function among a plurality of networks using different protocols and data formats, and the network switch is a connector among different networks;
when the verification results are not matched, the trusted computing module automatically enters secondary matching verification, when the secondary matching verification results are matched, the gateway device sends decryption keys to the trusted computing module, when the secondary verification results are not matched, the trusted computing module automatically enters tertiary matching verification, when the tertiary verification results are not matched, the gateway device transmits the encryption verification materials to the blacklist, and the gateway device does not send the decryption keys.
S5, when the verification result is matched, the gateway equipment sends a decryption key to the trusted computing module, decryption and decryption are carried out through the trusted computing module, and a communication safety channel between the mobile terminal equipment and the platform can be opened after the decryption is successful;
when the trusted computing module performs decryption and cracking, if cracking is unsuccessful, the trusted computing module performs secondary decryption and cracking according to the decryption key, if secondary decryption and cracking are successful, a safety channel for communication between the mobile terminal device and the platform is opened, and if secondary decryption and cracking are unsuccessful, the safety channel for communication between the mobile terminal device and the platform cannot be opened.
When in use, a trusted access authentication model is established through a trusted computing module, a mobile terminal device which is accessed in a trusted way is determined through the requirement of a trusted access security protocol, an access request is sent out through the mobile terminal device, corresponding verification materials are manufactured according to the verification offer of a platform, the verification materials enter encryption through an encryption module, finally the encrypted verification materials are matched and verified through the trusted computing module, after the matching and verification are successful, a gateway device sends a decryption key to the trusted computing module, decryption and decryption are carried out through the trusted computing module, a security channel for communication between the mobile terminal device and the platform can be opened after the decryption is successful, when the trusted computing technology is used for realizing the trusted security protocol, the identities of a user and a server are subjected to double authentication through the modes of matching, verification, decryption and decryption, so that the security of the security protocol is improved, the platform privacy protection requirement under the cloud environment can be met to a certain extent.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments or portions thereof without departing from the spirit and scope of the invention.

Claims (9)

1. A method for realizing a trusted security protocol based on trusted computing is characterized in that: the method comprises the following steps:
s1, establishing a trusted access authentication model through the trusted computing module to obtain a trusted access security protocol in the cloud environment;
s2, determining the mobile terminal equipment which is accessed in a trusted way according to the requirement of the trusted access security protocol, and sending an access request through the mobile terminal equipment to obtain the verification offer of the platform;
s3, the mobile terminal device makes corresponding verification materials according to the contents of the verification offer, and the verification materials are encrypted through the encryption module to obtain encrypted verification materials;
s4, transmitting the encrypted verification material to a trusted computing module through gateway equipment for matching verification to obtain a verification result;
and S5, when the verification result is matched, the gateway equipment sends a decryption key to the trusted computing module, decryption and decryption are carried out through the trusted computing module, and a communication safety channel between the mobile terminal equipment and the platform can be opened after the decryption is successful.
2. The method of claim 1, wherein the method comprises: in the step 1, the trusted computing module comprises a TPM chip and an application interface, wherein the application interface comprises a TSS device driver interface and a TSS core service interface, and the TPM chip is electrically connected with the TSS device driver interface and the TSS core service interface respectively.
3. The method of claim 2, wherein the method comprises: the trusted access authentication model comprises a device to be accessed, a network access strategy execution device and an isolation network server, wherein a network access request is sent out through the device to be accessed, network access is carried out through the network access strategy execution device, and finally trusted verification is carried out through the isolation network server, the device to be accessed is set as a mobile terminal device, the network access strategy execution device is set as a gateway device, the isolation network server is set as a trusted authentication server, the mobile terminal device is electrically connected with the gateway device, and the gateway device is electrically connected with the trusted authentication server.
4. The method of claim 1, wherein the method comprises: and 2, the requirements of the trusted access security protocol in the step 2 comprise the type of the mobile terminal device to be accessed, the application program type and whether the mobile terminal device to be accessed is in the white list, and if the mobile terminal device to be accessed is in the white list, the platform sends out a verification offer according to the corresponding mobile terminal device after sending out an access request through the mobile terminal device.
5. The method of claim 1, wherein the method comprises: the verification offers in step 2 and step 3 are the offer contents containing the main characteristics of the mobile terminal device and formulated according to different mobile terminal devices, the offer contents specifically comprise professional problems related to the performance of the mobile terminal device and proposed according to different mobile terminal devices, and a problem database formed by summarizing and storing the professional problems is formed, and when the verification offers are issued, the offer contents consisting of the problems related to the mobile terminal device to be accessed are randomly selected from the problem database.
6. The method of claim 5, wherein the method comprises: and 3, the encryption module comprises a digital system and two MCUs, the digital system is connected with one of the MCUs through an IIC bus and used for transmitting a ciphertext request, the other MCU generates a ciphertext through encryption algorithm operation inside, the ciphertext is sent to the digital system, the downloaded key passes through the encryption algorithm and generates the ciphertext, the digital system translates the ciphertext into the key through a decryption algorithm, the key and the key are compared and checked, the digital system sends a success signal to the MCU through the IIC bus after the ciphertext is verified successfully, and the MCU changes the address into the address of the network terminal equipment to be accessed.
7. The method of claim 1, wherein the method comprises: the gateway device in step 4 is set as a network switch with three-layer switching function, and the network switch provides data conversion function among a plurality of networks using different protocols and data formats and is a connector among different networks.
8. The method of claim 1, wherein the method comprises: when the verification results are not matched, the trusted computing module automatically enters secondary matching verification, when the secondary matching verification results are matched, the gateway device sends decryption keys to the trusted computing module, when the secondary verification results are not matched, the trusted computing module automatically enters tertiary matching verification, when the tertiary verification results are not matched, the gateway device transmits the encryption verification materials to the blacklist, and the gateway device does not send the decryption keys.
9. The method of claim 1, wherein the method comprises: and 5, when the trusted computing module performs decryption and cracking, if cracking is unsuccessful, the trusted computing module performs secondary decryption and cracking according to the decryption key, if the secondary decryption and cracking is successful, a safety channel for communication between the mobile terminal device and the platform is opened, and if the secondary decryption and cracking is unsuccessful, the safety channel for communication between the mobile terminal device and the platform cannot be opened.
CN202111356571.5A 2021-11-16 2021-11-16 Method for realizing trusted security protocol based on trusted computing Pending CN114124506A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111356571.5A CN114124506A (en) 2021-11-16 2021-11-16 Method for realizing trusted security protocol based on trusted computing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111356571.5A CN114124506A (en) 2021-11-16 2021-11-16 Method for realizing trusted security protocol based on trusted computing

Publications (1)

Publication Number Publication Date
CN114124506A true CN114124506A (en) 2022-03-01

Family

ID=80395958

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111356571.5A Pending CN114124506A (en) 2021-11-16 2021-11-16 Method for realizing trusted security protocol based on trusted computing

Country Status (1)

Country Link
CN (1) CN114124506A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1897006A (en) * 2005-07-12 2007-01-17 国际商业机器公司 Method, apparatus for establishing virtual endorsement
CN202587013U (en) * 2011-07-13 2012-12-05 深圳市银河风云网络系统股份有限公司 Router capable of controlling whether to be controlled by remote management
CN107766724A (en) * 2017-10-17 2018-03-06 华北电力大学 A kind of construction method of trusted computer platform software stack function structure

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1897006A (en) * 2005-07-12 2007-01-17 国际商业机器公司 Method, apparatus for establishing virtual endorsement
CN202587013U (en) * 2011-07-13 2012-12-05 深圳市银河风云网络系统股份有限公司 Router capable of controlling whether to be controlled by remote management
CN107766724A (en) * 2017-10-17 2018-03-06 华北电力大学 A kind of construction method of trusted computer platform software stack function structure

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
常方舒: "《基于TPM联盟的可信云平台管理模型》", 万方学位论文, pages 9 - 15 *
常方舒: "基于TPM联盟的可信云平台管理模型", 万方学位论文, pages 15 - 19 *

Similar Documents

Publication Publication Date Title
CN101345766A (en) Trusted network management method based on ternary peer-to-peer identification trusted network connections
CN114584306B (en) Data processing method and related device
WO2024212512A1 (en) Remote attestation method, apparatus and device, and readable storage medium
CN113901432A (en) Block chain identity authentication method, equipment, storage medium and computer program product
CN100550030C (en) On portable terminal host, add the method for credible platform
CN108881486A (en) Intelligent network connection vehicle remote communication means and system based on trusted technology
CN110401640B (en) Trusted connection method based on trusted computing dual-system architecture
CN113572765B (en) Lightweight identity authentication key negotiation method for resource-limited terminal
CN110519052A (en) Data interactive method and device based on Internet of Things operating system
KR20110039393A (en) Access method suitable for wireless personal area network
Luo et al. Formal security evaluation and improvement of wireless hart protocol in industrial wireless network
CN115473655B (en) Terminal authentication method, device and storage medium for access network
CN115065469B (en) Data interaction method and device for power internet of things and storage medium
US11240661B2 (en) Secure simultaneous authentication of equals anti-clogging mechanism
CN112653664A (en) High-safety and reliable data exchange system and method between networks
CN111641651A (en) Access verification method and device based on Hash chain
CN110572392A (en) Identity authentication method based on HyperLegger network
CN114244568A (en) Security access control method, device and equipment based on terminal access behavior
CN113794563A (en) Communication network security control method and system
CN114124506A (en) Method for realizing trusted security protocol based on trusted computing
CN111971677A (en) Tamper-resistant data encoding for mobile devices
CN102647273B (en) Generation methods and devices of user root key and user key for trusted computing platform
CN113965342A (en) Trusted network connection system and method based on domestic platform
CN116389032B (en) SDN architecture-based power information transmission link identity verification method
CN117786757B (en) Privacy calculation management system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20220301

RJ01 Rejection of invention patent application after publication