Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Trusted safety network system

A secure network and credible technology, applied in the field of information security, can solve problems such as software code loopholes and hidden safety hazards, and achieve the effects of avoiding security threats, improving security reliability, and ensuring credible integrity

Inactive Publication Date: 2017-12-19
DATANG GAOHONG XINAN ZHEJIANG INFORMATION TECH CO LTD
View PDF6 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current network system mainly implements security management such as authentication and key management through software means, but the software code itself has loopholes, and key sensitive data can be obtained by reading and analyzing, posing security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted safety network system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0029] Such as figure 1 As shown, the present invention discloses a trusted and secure network system, which is implemented based on a client-server architecture, and each network node is a trusted host installed with a trusted chip, wherein at least one server is configured as a remote authentication server, and the configured At least one server serves as the application management server, and the remote authentication server and the application management server may also be the same server.

[0030] 1. Integrity of network nodes

[0031] Verify the integrity of the underlying structure of network nodes through trusted boot. During the startup process of the network node, the CPU, storage module, power supply module, disk and other hardware structures, BIOS (Basic Input Output System, Basic Input Output System), Bootloader (bootloader), sy...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a trusted safety network system which is implemented on the basis of a client-server architecture, wherein each network node is a trusted host provided with a trusted chip, and each network node carries out a trusted starting process on the basis of the trusted chip; a white list is stored in the trusted chip of each network chip, the white list comprises application software allowed to be executed and a measured value of a key code of the application software, and when the application software is operated, the integrity of the application software is verified by the white list; a remote authentication server is configured, and datum authentication information for carrying out identity authentication and integrity verification is stored in a trusted chip of the remote authentication server; and an application management server is configured and used for carrying out deployment and management of application on each network node. The invention constructs the trusted safety network system implemented on the basis of the trusted chip, and safety reliability of the network system can be improved.

Description

technical field [0001] The invention provides a trusted and secure network system, which belongs to the technical field of information security. Background technique [0002] With the rapid development of computer and network technology, computer-based cloud computing, Internet of Things, big data and other network systems have become relatively mature technologies. Network system security is an important technical guarantee of the network system, which should ensure the security of the system from various aspects such as hardware, software, and data. The current network system mainly implements security management such as authentication and key management through software means, but the software code itself has loopholes, and key sensitive data can be obtained through reading and analysis, which poses security risks. Contents of the invention [0003] In view of the above reasons, the purpose of the present invention is to provide a trusted and secure network system, whi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0869H04L9/321H04L9/3247H04L63/083H04L63/0853H04L63/123
Inventor 郑驰梁思谦
Owner DATANG GAOHONG XINAN ZHEJIANG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products