CN114124506A - Method for realizing trusted security protocol based on trusted computing - Google Patents
Method for realizing trusted security protocol based on trusted computing Download PDFInfo
- Publication number
- CN114124506A CN114124506A CN202111356571.5A CN202111356571A CN114124506A CN 114124506 A CN114124506 A CN 114124506A CN 202111356571 A CN202111356571 A CN 202111356571A CN 114124506 A CN114124506 A CN 114124506A
- Authority
- CN
- China
- Prior art keywords
- verification
- trusted
- mobile terminal
- decryption
- terminal device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 29
- 238000012795 verification Methods 0.000 claims abstract description 86
- 238000004891 communication Methods 0.000 claims abstract description 13
- 238000005336 cracking Methods 0.000 claims description 15
- 238000002955 isolation Methods 0.000 claims description 5
- 238000006243 chemical reaction Methods 0.000 claims description 3
- 238000004519 manufacturing process Methods 0.000 abstract description 3
- 230000010365 information processing Effects 0.000 abstract description 2
- 238000005516 engineering process Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 3
- 230000003993 interaction Effects 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000003860 storage Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
- H04L2209/127—Trusted platform modules [TPM]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention belongs to the technical field of information processing, and particularly relates to a method for realizing a trusted security protocol based on trusted computing, which comprises the steps of firstly constructing a trusted access authentication model through a trusted computing module to obtain the trusted access security protocol in a cloud environment; then, the mobile terminal equipment which is accessed in a trusted way is determined according to the requirement of a trusted access security protocol, and an access request is sent out through the mobile terminal equipment to obtain the verification offer of the platform; manufacturing corresponding verification materials according to the verification offer of the platform, encrypting the verification materials through the encryption module to obtain encrypted verification materials, and finally performing matching verification and decryption on the encrypted verification materials through the trusted computing module in sequence, wherein a communication safety channel between the mobile terminal device and the platform can be opened after the decryption is successful; the double authentication is carried out by matching verification and decryption, so that the safety of the safety protocol is improved, and the requirement of platform privacy protection under the cloud environment can be met to a certain extent.
Description
Technical Field
The invention belongs to the technical field of information processing, and particularly relates to a method for realizing a trusted security protocol based on trusted computing.
Background
With the development and wide application of information technology, information security is more and more concerned by people. Trusted computing technology aiming at improving the security of computer systems becomes a research hotspot in the international information security field, and remote certification is a difficult point and key in the research of trusted computing. How to enable two nodes in a network to quickly and effectively judge the trusted state of the platform of the other party before interaction under the condition of ensuring that the platform configuration information is not leaked is the key of the remote attestation technology. In addition, the openness of the wireless network makes the network more vulnerable, and the confidentiality of communication and authentication technology are the primary problems to be solved urgently for the security of the wireless network. How to increase the platform identity and platform integrity verification of the mobile terminal under the condition of ensuring the user identity anonymity of the mobile terminal and improve the security of a wireless network access authentication protocol is a new problem to be solved for wireless network access authentication.
However, in the prior art, when a trusted security protocol is implemented by using a trusted computing technology, it is usually impossible to perform double authentication between the identity of a user and a server and a platform, which results in a reduction in security of the security protocol and fails to meet a requirement for platform privacy protection in a cloud environment.
Disclosure of Invention
The invention aims to provide a method for realizing a trusted security protocol based on trusted computing, which comprises the steps of establishing a trusted access authentication model through a trusted computing module, determining a mobile terminal device which is accessed in a trusted mode according to the requirements of the trusted access security protocol, manufacturing corresponding verification materials by the mobile terminal device according to contents which are required to be verified, and finally transmitting the encrypted verification materials to the trusted computing module through gateway equipment for matching verification so as to solve the problems in the background technology.
In order to achieve the purpose, the invention adopts the following technical scheme:
a method for realizing a trusted security protocol based on trusted computing comprises the following steps:
s1, establishing a trusted access authentication model through the trusted computing module to obtain a trusted access security protocol in the cloud environment;
s2, determining the mobile terminal equipment which is accessed in a trusted way according to the requirement of the trusted access security protocol, and sending an access request through the mobile terminal equipment to obtain the verification offer of the platform;
s3, the mobile terminal device makes corresponding verification materials according to the contents of the verification offer, and the verification materials are encrypted through the encryption module to obtain encrypted verification materials;
s4, transmitting the encrypted verification material to a trusted computing module through gateway equipment for matching verification to obtain a verification result;
and S5, when the verification result is matched, the gateway equipment sends a decryption key to the trusted computing module, decryption and decryption are carried out through the trusted computing module, and a communication safety channel between the mobile terminal equipment and the platform can be opened after the decryption is successful.
Preferably, in step 1, the trusted computing module includes a TPM chip and an application interface, the application interface includes a TSS device driver interface and a TSS core service interface, and the TPM chip is electrically connected to the TSS device driver interface and the TSS core service interface, respectively.
Preferably, the trusted access authentication model includes a device to be accessed, a network access policy enforcement device, and an isolated network server, and the device to be accessed sends a network access request through the device to be accessed, performs network access through the network access policy enforcement device, and performs trusted verification through the isolated network server, the device to be accessed is set as a mobile terminal device, the network access policy enforcement device is set as a gateway device, the isolated network server is set as a trusted authentication server, the mobile terminal device is electrically connected with the gateway device, and the gateway device is electrically connected with the trusted authentication server.
Preferably, the requirements of the trusted access security protocol in step 2 include the type of the mobile terminal device to be accessed, the application program category, and whether the mobile terminal device to be accessed is in the white list column, and if the mobile terminal device to be accessed is in the white list column, the platform sends out the verification offer according to the corresponding mobile terminal device after sending out the access request through the mobile terminal device.
Preferably, the verification offer in step 2 and step 3 is an offer content containing main characteristics of the mobile terminal device, which is formulated according to different mobile terminal devices, the offer content specifically includes professional questions related to the performance of the mobile terminal device, which are proposed according to different mobile terminal devices, and the professional questions are gathered and stored to form a question database, and when the verification offer is issued, the offer content composed of questions related to the mobile terminal device to be accessed is randomly selected from the question database.
Preferably, the encryption module in step 3 includes a digital system and two MCUs, the digital system is connected with one of the MCUs through an IIC bus and used for transmitting a ciphertext request, the other of the MCUs generates a ciphertext through encryption algorithm operation, the ciphertext is sent to the digital system, the downloaded key passes through the encryption algorithm and generates the ciphertext, the digital system translates the ciphertext into the key through a decryption algorithm, then the key and the key are compared and verified, the digital system sends a success signal to the MCUs through the IIC bus after verifying the ciphertext, and the MCU changes the address into the address of the network terminal device to be accessed.
Preferably, the gateway device in step 4 is configured as a network switch having a three-layer switching function, where the network switch is a connector between different networks, and provides a data conversion function between multiple networks using different protocols and data formats.
Preferably, during matching verification, when the verification results are not matched, the trusted computing module automatically enters secondary matching verification, when the secondary matching verification results are matched, the gateway device sends a decryption key to the trusted computing module, when the secondary verification results are not matched, the trusted computing module automatically enters tertiary matching verification, when the tertiary verification results are not matched, the gateway device transmits the encrypted verification material to the blacklist, and the gateway device does not send the decryption key.
Preferably, when the decryption and cracking are performed by the trusted computing module in step 5, if the cracking is unsuccessful, the trusted computing module performs secondary decryption and cracking according to the decryption key, if the secondary decryption and cracking is successful, a secure channel for communication between the mobile terminal device and the platform is opened, and if the secondary decryption and cracking is unsuccessful, the secure channel for communication between the mobile terminal device and the platform cannot be opened.
Compared with the prior art, the method for realizing the trusted security protocol based on the trusted computing has the following advantages that:
the method mainly comprises the steps of firstly establishing a trusted access authentication model through a trusted computing module, then determining mobile terminal equipment which is accessed in a trusted mode according to requirements of a trusted access security protocol, sending an access request through the mobile terminal equipment, manufacturing corresponding verification materials according to verification requirements of a platform, then encrypting the verification materials through an encryption module, finally sequentially carrying out matching verification and decryption on the encrypted verification materials through the trusted computing module, opening a security channel for communication between the mobile terminal equipment and the platform after the decryption is successful, and carrying out double authentication through a matching verification and decryption mode, so that the security of the security protocol is improved, and the requirements of platform privacy protection in a cloud environment can be met to a certain extent.
Drawings
FIG. 1 is a block flow diagram of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. The specific embodiments described herein are merely illustrative of the invention and do not delimit the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention provides a method for realizing a trusted security protocol based on trusted computing, which is shown in figure 1 and comprises the following steps:
s1, establishing a trusted access authentication model through the trusted computing module to obtain a trusted access security protocol in the cloud environment;
the trusted computing module comprises a TPM chip and an application interface, the application interface comprises a TSS device driver interface and a TSS core service interface, the TPM chip is electrically connected with the TSS device driver interface and the TSS core service interface respectively, and the TPM chip is a trust root (a trusted storage root and a trusted report root) of the trusted computing platform, stores a metric value on one hand and provides a security report to an upper layer on the other hand; the TPM chip has high processing speed and can improve efficiency, software has bugs and is possible to bypass or utilize, hardware can better guarantee safety, an IO component completes coding and decoding of a bus protocol and realizes information exchange between the TPM and the outside, and the password coprocessor is used for realizing hardware acceleration of encryption, decryption, signature and signature verification.
The TSS device driver interface is represented by TDDI, and the TSS core service interface is represented by TCSI, where TDDI is an API library interacting with the TPM device driver to facilitate interaction with the TPM, for example, sending data to or receiving data from the TPM, querying the state of the TPM, etc.; the main functions of the TSS core service are to manage TPM resources, such as context management, key and certificate management, event management, TPM parameter block generation, etc., the core software of the user program layer is the TSS service provider, and the TSP provides the highest level API function for the application to call by the application in a way of shared objects and dynamically linked libraries, so that the application can use TPM conveniently.
When the application program is used, the application program sends data and commands to the TSS service provider through an interface provided by the TSS service, the TSS service provider processes the data and commands and then sends the data and commands to the TSS device driving interface through the TSS core service interface, the TSS device driving interface processes the data and then sends the data and commands to the TPM device driving program, the TPM device driving program processes and drives the TPM, and the response given by the TPM is reversely sent to the application through the TPM device driving program, the TSS device driving program interface, the TSS core service interface and the TSS service provider.
The trusted access authentication model comprises a device to be accessed, a network access strategy execution device and an isolation network server, wherein a network access request is sent out through the network device to be accessed, network access is carried out through the network access strategy execution device, and finally trusted verification is carried out through the isolation network server.
S2, determining the mobile terminal equipment which is accessed in a trusted way according to the requirement of the trusted access security protocol, and sending an access request through the mobile terminal equipment to obtain the verification offer of the platform;
the requirements of the trusted access security protocol comprise the type of the mobile terminal device to be accessed, the application program type and whether the mobile terminal device to be accessed is in the white list, and if the mobile terminal device to be accessed is in the white list, the platform sends out a verification offer according to the corresponding mobile terminal device after sending out an access request through the mobile terminal device;
the verification offer is an offer content which is made according to different mobile terminal devices and contains main characteristics of the mobile terminal devices, the offer content specifically comprises professional problems which are proposed according to the different mobile terminal devices and related to the performance of the mobile terminal devices, the professional problems are gathered and stored to form a problem database, and when the verification offer is sent out, the offer content which is composed of problems related to the mobile terminal devices to be accessed is randomly selected from the problem database.
S3, the mobile terminal device makes corresponding verification materials according to the contents of the verification offer, and the verification materials are encrypted through the encryption module to obtain encrypted verification materials;
the encryption module comprises a digital system and two MCUs, wherein the digital system is connected with one of the MCUs through an IIC bus and used for transmitting a ciphertext request, the inside of the other MCU generates a ciphertext through encryption algorithm operation, the ciphertext is sent to the digital system, a downloaded key passes through the encryption algorithm and generates the ciphertext, the digital system translates the ciphertext into the key through a decryption algorithm, the key and the key are compared and verified, a success signal is sent to the MCU through the IIC bus after the digital system verifies the ciphertext, and the MCU changes an address into an address of a network terminal device to be accessed.
S4, transmitting the encrypted verification material to a trusted computing module through gateway equipment for matching verification to obtain a verification result;
the gateway equipment is set as a network switch with three-layer switching function, the network switch provides data conversion function among a plurality of networks using different protocols and data formats, and the network switch is a connector among different networks;
when the verification results are not matched, the trusted computing module automatically enters secondary matching verification, when the secondary matching verification results are matched, the gateway device sends decryption keys to the trusted computing module, when the secondary verification results are not matched, the trusted computing module automatically enters tertiary matching verification, when the tertiary verification results are not matched, the gateway device transmits the encryption verification materials to the blacklist, and the gateway device does not send the decryption keys.
S5, when the verification result is matched, the gateway equipment sends a decryption key to the trusted computing module, decryption and decryption are carried out through the trusted computing module, and a communication safety channel between the mobile terminal equipment and the platform can be opened after the decryption is successful;
when the trusted computing module performs decryption and cracking, if cracking is unsuccessful, the trusted computing module performs secondary decryption and cracking according to the decryption key, if secondary decryption and cracking are successful, a safety channel for communication between the mobile terminal device and the platform is opened, and if secondary decryption and cracking are unsuccessful, the safety channel for communication between the mobile terminal device and the platform cannot be opened.
When in use, a trusted access authentication model is established through a trusted computing module, a mobile terminal device which is accessed in a trusted way is determined through the requirement of a trusted access security protocol, an access request is sent out through the mobile terminal device, corresponding verification materials are manufactured according to the verification offer of a platform, the verification materials enter encryption through an encryption module, finally the encrypted verification materials are matched and verified through the trusted computing module, after the matching and verification are successful, a gateway device sends a decryption key to the trusted computing module, decryption and decryption are carried out through the trusted computing module, a security channel for communication between the mobile terminal device and the platform can be opened after the decryption is successful, when the trusted computing technology is used for realizing the trusted security protocol, the identities of a user and a server are subjected to double authentication through the modes of matching, verification, decryption and decryption, so that the security of the security protocol is improved, the platform privacy protection requirement under the cloud environment can be met to a certain extent.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments or portions thereof without departing from the spirit and scope of the invention.
Claims (9)
1. A method for realizing a trusted security protocol based on trusted computing is characterized in that: the method comprises the following steps:
s1, establishing a trusted access authentication model through the trusted computing module to obtain a trusted access security protocol in the cloud environment;
s2, determining the mobile terminal equipment which is accessed in a trusted way according to the requirement of the trusted access security protocol, and sending an access request through the mobile terminal equipment to obtain the verification offer of the platform;
s3, the mobile terminal device makes corresponding verification materials according to the contents of the verification offer, and the verification materials are encrypted through the encryption module to obtain encrypted verification materials;
s4, transmitting the encrypted verification material to a trusted computing module through gateway equipment for matching verification to obtain a verification result;
and S5, when the verification result is matched, the gateway equipment sends a decryption key to the trusted computing module, decryption and decryption are carried out through the trusted computing module, and a communication safety channel between the mobile terminal equipment and the platform can be opened after the decryption is successful.
2. The method of claim 1, wherein the method comprises: in the step 1, the trusted computing module comprises a TPM chip and an application interface, wherein the application interface comprises a TSS device driver interface and a TSS core service interface, and the TPM chip is electrically connected with the TSS device driver interface and the TSS core service interface respectively.
3. The method of claim 2, wherein the method comprises: the trusted access authentication model comprises a device to be accessed, a network access strategy execution device and an isolation network server, wherein a network access request is sent out through the device to be accessed, network access is carried out through the network access strategy execution device, and finally trusted verification is carried out through the isolation network server, the device to be accessed is set as a mobile terminal device, the network access strategy execution device is set as a gateway device, the isolation network server is set as a trusted authentication server, the mobile terminal device is electrically connected with the gateway device, and the gateway device is electrically connected with the trusted authentication server.
4. The method of claim 1, wherein the method comprises: and 2, the requirements of the trusted access security protocol in the step 2 comprise the type of the mobile terminal device to be accessed, the application program type and whether the mobile terminal device to be accessed is in the white list, and if the mobile terminal device to be accessed is in the white list, the platform sends out a verification offer according to the corresponding mobile terminal device after sending out an access request through the mobile terminal device.
5. The method of claim 1, wherein the method comprises: the verification offers in step 2 and step 3 are the offer contents containing the main characteristics of the mobile terminal device and formulated according to different mobile terminal devices, the offer contents specifically comprise professional problems related to the performance of the mobile terminal device and proposed according to different mobile terminal devices, and a problem database formed by summarizing and storing the professional problems is formed, and when the verification offers are issued, the offer contents consisting of the problems related to the mobile terminal device to be accessed are randomly selected from the problem database.
6. The method of claim 5, wherein the method comprises: and 3, the encryption module comprises a digital system and two MCUs, the digital system is connected with one of the MCUs through an IIC bus and used for transmitting a ciphertext request, the other MCU generates a ciphertext through encryption algorithm operation inside, the ciphertext is sent to the digital system, the downloaded key passes through the encryption algorithm and generates the ciphertext, the digital system translates the ciphertext into the key through a decryption algorithm, the key and the key are compared and checked, the digital system sends a success signal to the MCU through the IIC bus after the ciphertext is verified successfully, and the MCU changes the address into the address of the network terminal equipment to be accessed.
7. The method of claim 1, wherein the method comprises: the gateway device in step 4 is set as a network switch with three-layer switching function, and the network switch provides data conversion function among a plurality of networks using different protocols and data formats and is a connector among different networks.
8. The method of claim 1, wherein the method comprises: when the verification results are not matched, the trusted computing module automatically enters secondary matching verification, when the secondary matching verification results are matched, the gateway device sends decryption keys to the trusted computing module, when the secondary verification results are not matched, the trusted computing module automatically enters tertiary matching verification, when the tertiary verification results are not matched, the gateway device transmits the encryption verification materials to the blacklist, and the gateway device does not send the decryption keys.
9. The method of claim 1, wherein the method comprises: and 5, when the trusted computing module performs decryption and cracking, if cracking is unsuccessful, the trusted computing module performs secondary decryption and cracking according to the decryption key, if the secondary decryption and cracking is successful, a safety channel for communication between the mobile terminal device and the platform is opened, and if the secondary decryption and cracking is unsuccessful, the safety channel for communication between the mobile terminal device and the platform cannot be opened.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111356571.5A CN114124506A (en) | 2021-11-16 | 2021-11-16 | Method for realizing trusted security protocol based on trusted computing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111356571.5A CN114124506A (en) | 2021-11-16 | 2021-11-16 | Method for realizing trusted security protocol based on trusted computing |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114124506A true CN114124506A (en) | 2022-03-01 |
Family
ID=80395958
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111356571.5A Pending CN114124506A (en) | 2021-11-16 | 2021-11-16 | Method for realizing trusted security protocol based on trusted computing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114124506A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1897006A (en) * | 2005-07-12 | 2007-01-17 | 国际商业机器公司 | Method, apparatus for establishing virtual endorsement |
CN202587013U (en) * | 2011-07-13 | 2012-12-05 | 深圳市银河风云网络系统股份有限公司 | Router capable of controlling whether to be controlled by remote management |
CN107766724A (en) * | 2017-10-17 | 2018-03-06 | 华北电力大学 | A kind of construction method of trusted computer platform software stack function structure |
-
2021
- 2021-11-16 CN CN202111356571.5A patent/CN114124506A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1897006A (en) * | 2005-07-12 | 2007-01-17 | 国际商业机器公司 | Method, apparatus for establishing virtual endorsement |
CN202587013U (en) * | 2011-07-13 | 2012-12-05 | 深圳市银河风云网络系统股份有限公司 | Router capable of controlling whether to be controlled by remote management |
CN107766724A (en) * | 2017-10-17 | 2018-03-06 | 华北电力大学 | A kind of construction method of trusted computer platform software stack function structure |
Non-Patent Citations (2)
Title |
---|
常方舒: "《基于TPM联盟的可信云平台管理模型》", 万方学位论文, pages 9 - 15 * |
常方舒: "基于TPM联盟的可信云平台管理模型", 万方学位论文, pages 15 - 19 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101345766A (en) | Trusted network management method based on ternary peer-to-peer identification trusted network connections | |
CN114584306B (en) | Data processing method and related device | |
WO2024212512A1 (en) | Remote attestation method, apparatus and device, and readable storage medium | |
CN113901432A (en) | Block chain identity authentication method, equipment, storage medium and computer program product | |
CN100550030C (en) | On portable terminal host, add the method for credible platform | |
CN108881486A (en) | Intelligent network connection vehicle remote communication means and system based on trusted technology | |
CN110401640B (en) | Trusted connection method based on trusted computing dual-system architecture | |
CN113572765B (en) | Lightweight identity authentication key negotiation method for resource-limited terminal | |
CN110519052A (en) | Data interactive method and device based on Internet of Things operating system | |
KR20110039393A (en) | Access method suitable for wireless personal area network | |
Luo et al. | Formal security evaluation and improvement of wireless hart protocol in industrial wireless network | |
CN115473655B (en) | Terminal authentication method, device and storage medium for access network | |
CN115065469B (en) | Data interaction method and device for power internet of things and storage medium | |
US11240661B2 (en) | Secure simultaneous authentication of equals anti-clogging mechanism | |
CN112653664A (en) | High-safety and reliable data exchange system and method between networks | |
CN111641651A (en) | Access verification method and device based on Hash chain | |
CN110572392A (en) | Identity authentication method based on HyperLegger network | |
CN114244568A (en) | Security access control method, device and equipment based on terminal access behavior | |
CN113794563A (en) | Communication network security control method and system | |
CN114124506A (en) | Method for realizing trusted security protocol based on trusted computing | |
CN111971677A (en) | Tamper-resistant data encoding for mobile devices | |
CN102647273B (en) | Generation methods and devices of user root key and user key for trusted computing platform | |
CN113965342A (en) | Trusted network connection system and method based on domestic platform | |
CN116389032B (en) | SDN architecture-based power information transmission link identity verification method | |
CN117786757B (en) | Privacy calculation management system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20220301 |
|
RJ01 | Rejection of invention patent application after publication |