Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A control method and system for trusted security services

A technology for security services and control systems, applied in the field of trusted computing, can solve the problems affecting APP business security, cost a lot, lack of TSS encapsulation, etc., and achieve the effect of enhancing security services and service control methods

Active Publication Date: 2017-08-29
SHENZHEN NAT ENG LAB OF DIGITAL TELEVISION
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the ensuing problem is: if the password is stolen, it may affect the business security of the APP and the risk of TPM / MTM being abused, so the password owner needs to spend a lot of resources to store and keep the password secret.
[0006] On the other hand, TSS lacks higher-level encapsulation, which affects the use of developers on smart terminals, and requires a higher-level encapsulation of trusted service control methods, so that application developers can use TPM / MTM in friendly applications.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A control method and system for trusted security services
  • A control method and system for trusted security services
  • A control method and system for trusted security services

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0065] Such as figure 1 As shown, the present invention provides a control system for trusted security services, including:

[0066] Application APP100, enhanced security service module 200 and trusted software stack TSS300, said TSS300 includes TSS service provider TSP layer 301, TSS core service TCS layer 302 and TSS device driver library TDDL303, the security features of said TDDL and TPM / MTM Relatedly, the TCS layer 302 includes a permission control modul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a trusted security service control method and system. If an APP (application) has corresponding permissions, the APP is allowed to access to TCS (TSS (trusted software stack) core service) layer and further access to security feature of a TPM (trusted platform module) / MTM (mobile trusted module). The APP with the corresponding permissions can assess to the TCS layer, the permissions of the APP is maintained by a permission control layer defined and expanded by the trusted security service control method and system, and the permissions are managed and distributed through independent permission management service. Compared with the prior art, the trusted security service control method and system has the advantages that the problem about maintenance difficulty in protected resource objects using the TPM / MTM and local TPM user passwords is solved; the APP do not need to be a direct user of the TPM, TPM user passwords do not need to be maintained, and the TCS layer can be accessed after the APP has the corresponding permissions. Meanwhile, through enhanced security services of the TPM / MTM, and the APP can use the TPM / MTM friendly.

Description

technical field [0001] The invention relates to the field of trusted computing in communication technology, in particular to a method and system for controlling trusted security services. Background technique [0002] TCG (Trusted Computing Group, Trusted Computing Group) is an industry standard organization for trusted computing implementation. TCG released TPM (Trusted Platform Module, Trusted Platform Module), MTM (Mobile Trusted Module, Mobile Trusted Module), TSS (Trusted Software Stack, Trusted Software Stack), TNC (Trusted Network Connect, Trusted Network Connection) and other related A series of versions of standards documents. [0003] Among them, TPM and MTM are the core contents of TCG. TPM / MTM is a terminal security enhancement technology that can significantly enhance the security of terminal services, such as content copyright protection, payment, and hard disk encryption. When these services are deployed on terminals on TPM / MTM, the security will be improved...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 余小龙孙卓肖文涛王兴李新国宫俊赵宝龙黄华松
Owner SHENZHEN NAT ENG LAB OF DIGITAL TELEVISION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products