Movatterモバイル変換


[0]ホーム

URL:


CN109361668A - A method of reliable data transmission - Google Patents

A method of reliable data transmission
Download PDF

Info

Publication number
CN109361668A
CN109361668ACN201811213187.8ACN201811213187ACN109361668ACN 109361668 ACN109361668 ACN 109361668ACN 201811213187 ACN201811213187 ACN 201811213187ACN 109361668 ACN109361668 ACN 109361668A
Authority
CN
China
Prior art keywords
client
enclave
server
key
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811213187.8A
Other languages
Chinese (zh)
Other versions
CN109361668B (en
Inventor
姚杨
姚一杨
陈建
戴波
王彦波
张旭东
龚小刚
叶志远
黄云
凡恒山
倪鹏程
蒲强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Zhejiang Electric Power Co Ltd
Anhui Jiyuan Software Co Ltd
Information and Telecommunication Branch of State Grid Zhejiang Electric Power Co Ltd
Original Assignee
State Grid Zhejiang Electric Power Co Ltd
Anhui Jiyuan Software Co Ltd
Information and Telecommunication Branch of State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Zhejiang Electric Power Co Ltd, Anhui Jiyuan Software Co Ltd, Information and Telecommunication Branch of State Grid Zhejiang Electric Power Co LtdfiledCriticalState Grid Zhejiang Electric Power Co Ltd
Priority to CN201811213187.8ApriorityCriticalpatent/CN109361668B/en
Publication of CN109361668ApublicationCriticalpatent/CN109361668A/en
Application grantedgrantedCritical
Publication of CN109361668BpublicationCriticalpatent/CN109361668B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

Translated fromChinese

本发明公开了一种数据可信传输方法,进行数据传输的客户端与服务器端通过SGX进行认证,客户端认证模块向对应的服务器端证实其所在的平台与用户的合法性,客户端经过认证之后,建立了与服务器之间的会话,客户端与服务器端进行一次性的供应协议,客户端应用的机密数据被密封到应用所在的平台上,其中,在服务器与客户端之间建立单独的安全通道进行通信连接,每个通道与唯一的客户端对应,服务器向客户端发送的数据在传输过程中进行加密;受保护的文件在enclave中加密之后,根据客户端的文件请求,向客户端发送特定的文件,随后分发给已获得认证并授权的应用使用者来查看或者执行其他操作。该方法基于可信硬件,有效地解决安全漏洞。

The invention discloses a data trusted transmission method. The client and the server for data transmission are authenticated through SGX, the client authentication module verifies the legitimacy of the platform where it is located and the user to the corresponding server, and the client is authenticated After that, a session with the server is established, a one-time provisioning agreement is performed between the client and the server, and the confidential data of the client application is sealed on the platform where the application is located, wherein a separate server is established between the client and the client. Secure channel for communication connection, each channel corresponds to a unique client, the data sent by the server to the client is encrypted during transmission; after the protected file is encrypted in the enclave, it is sent to the client according to the file request of the client Specific files are then distributed to authenticated and authorized users of the application to view or perform other operations. The method is based on trusted hardware and effectively addresses security vulnerabilities.

Description

A kind of data trusted transmission method
Technical field
The invention belongs to information security fields, more particularly to a kind of new data trusted transmission method, and this method is based on canBelieve hardware, is related to the transmission of confidential information in smart grid.
Background technique
Since computer technology is born, the type of the application run on computers increasingly increases with quantity.Of todayComputer system needs to handle more and more important, sensitive and valuable information.These information must be prevented from distortingWith steal.Unfortunately, entire industry is all more or less dedicated to steal information [1] now, for example silver is stolen from systemRow business datum or Intellectual Property Right of Enterprises.There are many applications that must maintain secrecy on computer platform, such as monetary items,Web bank and medical records application etc..Secret holder may not trust each other between software in other words, so oftenThe secret of a software all should be independently protected.Therefore, protect computer platform on software and data safety also atFor the task of for many years important and complicated.
Current Implementation of File Transfer is to have secure access to key element and distribution sensitive document using main function,In include guaranteeing that the confidentiality of file, access control and user use constraint, activation record etc..Nowadays enterprise is for dataSafety increasingly pay attention to, and while most of Secure Implementation all focuses on the protection of business data, execute authorizationUsing and distribution such as picture, video personal content needs become to be more and more obvious.Prior art can also be used forReach this purpose.
Existing typical Implementation of File Transfer application operates on ready-made customer platform and operating system, this just bringsA series of safety problems.For example, Malware, including virus and Hacker Program, can threaten such application protection secret andExecute the ability of its process, it is more likely that the transparent loss of numerical data or even this steal that will lead to enterprise keep very long by oneThe section time is without being found.Similar case such as network attack " aurora action " (Operation Aurora), affects perhapsMuch companies.It is existing to attempt encryption and access control mechanisms to protect the scheme of enterprise's data, it is easy to be attacked by someIt hits.For example, Malware may steal files content even steal key for encryption simultaneously, stealing method mayIt is to read application memory in application operation, display content is replicated from video frame buffers or violate Distursement (such as to attackThe person of hitting extends the use of scratch file using the system time of the machine where modification client).In addition, it is assumed that above-mentioned prestigeSolution has been obtained in the side of body, however more advanced attack pattern still can crack application.If the available application of attackerThe hardware of the platform of operation, then he can be stolen with hardware mode such as " memory snooping " (Memory Snooping) or" cold bootstrap attack " (Cold Boot Style Attack) obtains key material, although your application be used for it is certainCryptographic means carry out safeguard file safety.In this way consequence be exactly attacker can create Malware and using steal it is closeKey effectively pretends to be real security application client.Finally, a normal business data consumer, in extreme situationUnder, a large amount of secret number information of fraudulent copying and the safety prevention measure of application can be modified directly to avoid being remembered by logRecord or the monitoring of other forms.
Summary of the invention
Present invention purpose to be achieved is just to provide a kind of new data trusted transmission method, and this method is based on credible hardPart, is related to the transmission of confidential information in smart grid, and the Implementation of File Transfer system of SGX technology equally focuses on file pointHair and is checked at access control, and security breaches are efficiently solved.
In order to achieve the above object, the present invention adopts the following technical scheme: a kind of data trusted transmission method, carries out dataThe client and server of transmission is authenticated by SGX, and client certificate module confirms its institute to corresponding server endPlatform and user legitimacy, client establishes the session between server after certification, client and clothesBeing engaged in, the progress of device end is disposable to supply agreement, and the confidential data of client application is sealed on the platform where application, whereinIt establishes individual exit passageway between server and client to be communicatively coupled, each channel and unique client pairIt answers, server is encrypted in transmission process to the data that client is sent;
After shielded file encrypts in enclave, according to the file request of client, sent to client specificFile, be then distributed to obtained certification and authorize check or execute other operations using person.
Further, the file that encryption is had received by the user of certification uses the enclave for operating in client platformIn secure file read component and carry out checking for file;Meanwhile whether the scope check component inspection user of client hasFile is checked or modified to permission, once file permission inspection fails, file decryption component is not necessarily to work.
Further, the SGX certification is that local authentication and remote authentication combine.
Further, the local authentication includes two enclave entities, and the two entities need verifying mutually,Two entities verifier and authenticatee each other, specific verification step are as follows:
1., after entity A establishes communication path with entity B, entity A obtains the value of the MRENCLAVE of entity B to step;
Step is 2.: entity A calls the EREPORT instruction of encapsulation, and label are generated using the value of the MRENCLAVE of entity BThe REPORT of name, to send back entity B;
Step is 3.: after entity B receives the REPORT of entity A transmission, calling EGETKEY instruction to obtain its ReportKey for recalculating the MAC of REPORT, and calculated result is compared with the MAC in REPORT;
If the two is consistent, entity B affirms the enclave that entity A is strictly and oneself operates in identical platform, when TCB'sFirmware and hardware component be examined it is errorless after, entity B can check the REPORT of entity A to verify the component software of TCB, includingReflection operates in the MRENCLAVE of the Software Mirroring content in enclave and reflects the MRSIGNER of encipherer's identity.
Further, the remote authentication includes: one citation Enclave of creation on the platform of client, is carried outLocal authentication between Quoting Enclave and client Enclave;After local authentication executes, it is cited EnclaveMAC in REPORT is replaced with a signature, the signature is completed using the unsymmetrical key specific to equipment, citationEnclave is preserved for the private cipher key of signature, and the signature is completed using RSA.
Further, the remote authentication the following steps are included:
Step is 1.: after server receives request, sending to client and queries statement, indicates that client needs to provide evidenceIt proves that oneself is operated in really to meet in the environment of safety standard, that is, in enclave, while client is also needed and proved certainlyOneself legitimacy.
Step is 2.: after client receives statement, being handed over to the target Enclave of oneself to handle, target Enclave rootCorresponding feedback operation is carried out according to the query statement received, while carrying out local authentication process with the citation Enclave of same platform.
Step is 3.: target Enclave sends the signing messages of the whole code texts of itself application to citation Enclave, drawsIt demonstrate,proves Enclave and generates the ciphertext of QUOTE and signing messages, and RSA public key is sent to target Enclave, targetEnclave is receiving QUOTE, and after the ciphertext and RSA public key of signing messages, they can be transmitted to server, serverOn the challenger REPORT that decrypts QUOTE according to public key both to obtain, with similar local authentication result treatmentMode completes the inspection of REPORT, at the same check application signature information whether in advance put on record sign it is consistent.
Further, the data that server is sent to client carry out encryption in transmission process
Client generates RSA key pair at random, and RSA key extracts inner public key, by socket by public keyIt is sent to server end;
After received server-side to public key, the key for being used for file encryption that random cipher generator is distributed is addedIt is close, and it is sent to client;
After client receives encrypted data, data are decrypted with the private key of RSA key centering, to be usedIn the key of encryption file.
Further, random cipher generator distribution for encryption key the following steps are included:
A. fixed character is stored in immutable sequence;
B. request NTP service, and using the time of acquisition as the seed of random number;
C. it is instructed using RRAND, according to above-mentioned seed, generates an integer index every time, and read from fixed sequence programIt removes and is marked on corresponding character in step a;
D. by character combination at the random cipher of 16 bytes.
Further, sending file in a manner of shunting from server end to client must pass from corresponding exit passagewayDefeated, communication is unidirectional and is all dominated by the enclave for sending request.
Further, encryption storage includes: that the application operated in Enclave requests key by instruction EGETKEY,After success obtains key, the data of caching are read out, for the 1024 caching bytes read, according to similar sliding windowThe method of mouth, and according to the encryption principle of AES, encryption is grouped to these bytes, every group is still 16 bytes, is utilizedThe Encryption Algorithm of AES is to each group of byte encryption.
After adopting the above technical scheme, the present invention has the advantage that the credible delivery system based on SGX covers hardwareWith the safety guarantee of software, so as to be transferred to classified papers in client from long-range server security, and realizeSafe handling and storage access.This system is about the safety of client, file permission control, document transmission process and fileThe design and realization for storing access, have generally reached the set goal, have realized the credibility of this Transmission system.Ensure clientThe integrality at end and the safety of place system, it is ensured that the running memory of the key code and data of client and server programPrivate ownership;Ensure the confidentiality of file transmission and the safety of file storage and encryption key uniqueness and independence.
Detailed description of the invention
The present invention will be further explained below with reference to the attached drawings:
Fig. 1 is overall system architecture schematic diagram in the present invention;
Fig. 2 is local authentication method schematic diagram in the present invention;
Fig. 3 is medium-long range authentication method schematic diagram of the present invention;
Fig. 4 is exit passageway schematic diagram in the present invention;
Fig. 5 is communications schematic diagram in the present invention;
Fig. 6 is encryption storage schematic diagram in the present invention.
Specific embodiment
Embodiment:
The present invention relates to a kind of data trusted transmission method, the client and server carried out data transmission passes through SGXAuthenticated, client certificate module confirm it to corresponding server end where platform and user legitimacy, clientAfter certification, the session between server is established, client and server carries out disposable supply agreement, visitorThe confidential data of family end application is sealed on the platform where application, wherein is established between server and client independentExit passageway be communicatively coupled, each channel is corresponding with unique client, and server exists to the data that client is sentIt is encrypted in transmission process;After shielded file encrypts in enclave, according to the file request of client, to visitorFamily end sends specific file, is then distributed to and has obtained certification and what is authorized check or execute other behaviour using personMake.
Specific be system framework schematic diagram as shown in Figure 1, and the believable part of client is that is, in trust to the protected of SGXEnclave in part, execute the file operation of need for confidentiality.Next this framework will be described in detail and whole system isHow to run to reach the demand for security under various file management scenes.
Firstly, client certificate module confirm it to corresponding server-side where platform and user legitimacy.It utilizesThe authentication function of SGX, this module generate a verifiable report about clients entities, that is, with where clientThe identity information of platform binding, this identity information is bound by CPU.Server-side survey report come determine at this time with oneselfThe machine of communication supports that the identity of SGX function and client is legal.Client is disposably supplied with server-sideAgreement can thus make the confidential data of application be sealed on the platform at application place.And this encrypted secret numberAccording to can only be used to decryption and operation.
In the framework of this system, the access right and encryption key of file are saved in the database of server.Database administrator can modify corresponding access right and be grouped to realize the management of permission for the user of client.Client establishes the session between server after certification, and server confirms client and its place at this timePlatform safety.And file if simply from server transport to client, then greatly reduce this systemSafety, while but also the encryption storage of client loses meaning.For this reason, it may be necessary to be built between server and clientIndividual exit passageway is found, each channel is corresponding with unique client.After shielded file encrypts in enclave,According to the file request of client, specific file is sent to client, is then distributed to the application for having obtained certification and having authorizedUser checks or executes other operations.
Once the user by certification has received the file of encryption, he, which can be used, operates in client platformSecure file in enclave reads component to carry out checking for file.And while this process, the permission of client is examinedIt looks into component and needs to check whether user has permission to check or modify file, once file permission inspection fails, fileDecryption component is also just not necessarily to work.
Server include it is several under several modules: certification and session management module, file transmission key generation module andStore the database composition of user's data associated with the file.Content of Communication between all servers and client is all encryption, and the safety guarantee such as integrality end to end and playback protection are provided in various scenes.Protect system not by withUnder several attacks threaten: file content or the key from stealing for encryption;Platform and application identity deception, that is, pretend to beThe rogue program or platform of valid application;It is tampered using constraint and activity log.
In the present embodiment, specific authentication function design, SGX hardware security support to be mainly that upper level applications provideThe running environment of safety can be application encryption to make incredible underlying operating system and hardware that can not steal using machineIt is close.Traditional SGX authentication mode is primarily upon verifying SGX running environment, that is, whether verifying application is safely operated in SGX ringIn border, the safety verification of itself is applied without paying close attention to.That is traditional SGX research is relied primarily on using inherently safeIt is assumed that and in true credible delivery application scenarios, the client application for the user that disguises oneself as equally be threaten one of.For thisProblem, is different from conventional operation, and this system uses the local and remote authentication mode for authenticating and combining.
The process of local authentication is as shown in Fig. 2, in the present system, local authentication includes two enclave entities, verifierWith authenticatee, and the two entities need verifying mutually, and the remote authentication after being prepares.For ease of description, withLower to represent authenticatee with A, B represents verifier.Firstly, 1. such as step, entity A is established socket with entity B and is connect.It is establishingAfter communication path, A obtains the value of the MRENCLAVE of B.It should be noted is that there is no encryption, reasons for the communication of this partIt is that this step is not related to the transmission of file, and the value transmitted can all cause to authenticate by any change or lossFailure.A calls the EREPORT instruction of encapsulation later, and the REPORT of signature is generated using the value of the MRENCLAVE of B, usesTo send back B, 2. such as step.REPORT is sent to B still through this incredible communication path by A.REPORT hereinStructure include the identity of the two described above enclave, attribute relevant to enclave, hardware TCB confidence level andOne MAC (Message Authentication Code, Message Authentication Code) label.
After entity B receives the REPORT of A transmission, EGETKEY instruction is called to obtain its Report Key, is used to againThe MAC of REPORT is calculated, and calculated result is compared with the MAC in REPORT.If the two is consistent, then BAffirm the enclave that A is strictly and oneself operates in identical platform.After the firmware and hardware component of TCB are examined errorless, BThe REPORT of A can be checked to verify the component software of TCB, including reflecting the Software Mirroring content operated in enclaveThe MRENCLAVE and MRSIGNER for reflecting encipherer's identity.So far B completes the verifying to A.What B was received before then usingThe value of MRENCLAVE in REPORT generates the REPORT of oneself in the same way, is then transferred to A, 3. such as step.FinallyA verifies B in the same way to ensure that A is believable.
The method that authentication mechanism for authenticating in platform has used symmetric key encryption, in this method onlyEnclave checking R EPORT structure and for generating REPORT EREPORT instruction have access authentication secret permission.HoweverIt is distributed on two different platforms due to the enclave of server from the enclave of client in remote authentication,We need to create a special enclave, referred to as Quoting Enclave (citation on the platform of clientEnclave) server is helped to complete verifying to client, and feedback validation information.Due to citation Enclave and clientThe performed Enclave in end is in identical platform, therefore utilizes above-described realization, we can complete QuotingLocal authentication between Enclave and client Enclave.After local authentication executes, Enclave is cited by REPORTIn MAC replaced with a signature, this signature completed using the unsymmetrical key specific to equipment, citation EnclaveIt is preserved for the private cipher key of signature.REPORT after replacement MAC is referred to as a QUOTE (citation).Above-mentioned signature usesRSA is completed.
For the process of server authenticating client as shown in figure 3, when starting, client wants will obtain the file of server,Therefore the communication between server is first established.1. step indicates that server receives request after, query is sent to clientIt is bright, indicate that client needs to provide evidence to prove oneself to operate in really in the environment for meeting safety standard, that is,In enclave, while client also needs and proves the legitimacy of oneself.After client receives statement, it is handed over to the mesh of oneselfEnclave (executing the Enclave of identifying procedure) is marked to handle.At this time target Enclave according to the query received state intoThe corresponding feedback operation of row, while local authentication process above is carried out with the citation Enclave of same platform, 2. such as step.After two enclave finish verifying, that is, indicate both in the enclave for meeting safety standard.Target at this timeEnclave sends the signing messages of the whole code texts of itself application to citation Enclave.Citation Enclave can generate QUOTEAnd the ciphertext of signing messages, and RSA public key is sent to target Enclave.Target Enclave is receiving QUOTE, labelAfter the ciphertext and RSA public key of name information, they can be transmitted to server, 3. such as step.Finally, on serverChallenger decrypts QUOTE according to public key to obtain the REPORT of the two, in a manner of similar local authentication result treatmentComplete the inspection of REPORT, at the same check application signature information whether in advance put on record sign it is consistent.If inspection passes through, wholeA remote authentication is announced successfully, otherwise fails and server can refuse other requests from client.
In the method announced in patent document CN201810190643, using the auth method of dynamic " two steps ", i.e.,It joined a SGX module (using Intel SGX technology) between user and certificate server, user is carrying out authenticationWhen first the identity information of oneself is sent in SGX module, SGX module uses the key pair identity information that is stored thereinThe information of encryption is transmitted to certificate server again later and carries out second step certification by encryption.User terminal in the authentication mode is realOn border in untrusted environment, i.e. the not protection of SGX.Therefore there are risks such as man-in-the-middle attacks, malicious attacker can be held under the armUser is held, user is obtained by means such as packet capturings and is sent to the verifying summary info of SGX to reset and obtain certification.
In the method that patent document CN201710621204 is announced, using the traditional auth method of SGX, the authenticationMethod lacks the verifying to application itself, and there are the risks of client's spoof attack.
Specifically, in the present embodiment, design and realization for exit passageway are as follows:
Exit passageway is established in communication connection of the present invention between each client and server, so that server is to visitorThe data that family end is sent all are encryption in transmission process.Therefore, even if attacker has stolen the data of transmission, also to itIt has no way of doing it, needless to say manufactures certain attacks using data.
The realization of this module needs to be implemented two important processes, first is that server generates random cipher, second is that with secretThe secure transfer process of code.In order to cooperate file encryption and meanwhile enhance encryption file safety, password generator use IntelThe RRAND instruction that framework provides is used for the generation of true random number.
A. fixed character is stored in immutable sequence;
B. request NTP (Network Time Protocol, Network Time Protocol) service, and using the time of acquisition asThe seed of random number;
C. it is instructed using RRAND, according to above-mentioned seed, generates an integer index every time, and read from fixed sequence programRemove mark corresponding character in step 1;
D. by character combination at the random cipher of 16 bytes.
Above step is performed, it is close that random cipher generator can distribute disposable file encryption for each password requestKey.
Although, even if having grabbed key, due to the continuity of data packet, being difficult to learn that for attackerDivide the key being only for encrypting file.However in view of the possibility of Key Exposure in extreme circumstances, this system is by keyEncryption has been done in transmission.The basic principle of this part is that key above is encrypted and decrypted using RSA.It utilizesRsa encryption may insure that key can only transmit between server and client, and decryption person can only be client.SpecificallyIt is as shown in Figure 4 to transmit implementation process:
Client generates RSA key pair at random, then extracts RSA key to inner public key, will by socketPublic key is sent to server end.After received server-side to public key, file encryption is used for by what random cipher generator distributedKey is encrypted, and is sent to client.After client receives encrypted data, with the private key pair of RSA key centeringData are decrypted, to obtain the key for encrypting file.One is just established when there are data to send from server endThe channel of safety, can be encrypted using the data of this channel transfer, to guarantee the safety of file transmission.
Specifically, in the present embodiment, for the design and realization of file security transmission are as follows:
File transmission is mainly server according to the file request received, from server end to client in a manner of shuntingFile is sent, the data in whole process must be transmitted from corresponding exit passageway.
Since data send and receive from enclave, it can make attacker is organic can using traditional Socket communication modeMultiply, it is possible to leak the interface of enclave outside cruelly.Although it is total that enclave can legally access the host outside enclaveMemory is enjoyed, this mode still there are some problems, because the host of malice or operating system may be modified in non-enclaveIt deposits.Therefore, in order to avoid such case, present system provides a stringenter communication protocol form, i.e. utilization is sharedCode and data field, are divided into Trampoline and Stub.This region defines the stringent interface interacted with enclave, thusKeep relevant security attribute easily controllable.
Communication is unidirectional and is all dominated by the enclave for sending request.As shown in figure 5, this system needs firstTwo region of memory are reserved in host common memory, and both ends memory address is registered in enclave, madeThe region Stub and Trampoline.When Enclave will request the socket example for network, setting is corresponding first in StubParameter (fcode is such as assigned a value of FSCOKET), then call predefined processing routine, that is, Trampoline, in order toTrampoline code is called, system needs to run EEXIT instruction and exits enclave mode.When mainframe program or operation systemAfter system has handled enclave request and Trampoline code, result or return value can be stored in Stub region of memory,Trampoline code instructs finally, ERESUME can be re-executed to restore the operation of enclave.By the control of programAfter being restored to the position executed before enclave, enclave can read the value in Stub, pass through the in_arg0 in StubObtain socket example.Enclave can carry out believable transmission using this channel socket.
At this time according to upper section code key part the step of, after client obtains unique file encryption key, asThe creator in channel, server need to be encrypted using file transmitted by this key pair.Here with Encryption Algorithm beAes algorithm.
Specifically in the present embodiment, design and realization for document sealing module are as follows:
Encryption, which stores, to be a reading process cache contents and is output to the process in file new on hard disk by byte, such asShown in Fig. 6.The application operated in Enclave first requests key by instruction EGETKEY, right after successfully obtaining keyThe data of caching are read out.For the 1024 caching bytes read, according to the method for similar sliding window, and according toThe encryption principle of AES is grouped encryption to these bytes, and every group is still 16 bytes.The Encryption Algorithm of AES is utilized laterTo each group of byte encryption.Since encrypted byte is difficult to meet the coding of system, one may be brought in decryptionFixed obstacle.It would therefore be desirable to certain processing be done to encrypted character, here with circulation each byte conversionAt the form of 16 systems, and it is output in specified file.After the completion of all data encryptions, sealed storage module is just completedTask.
Credible delivery system based on SGX covers the safety guarantee of hardware and software, so as to make classified papers fromLong-range server security is transferred in client, and realizes safe handling and storage access.This system is about clientSafety, file permission control, document transmission process and file storage access design and realization, generally reached expectionTarget, realize the credibility of this Transmission system.Ensure the integrality of client and the safety of place system, it is ensured that clientWith the private ownership of the running memory of the key code and data of server program;The confidentiality and file for ensuring file transmission are depositedThe safety of storage and encryption key uniqueness and independence.
In addition to above preferred embodiment, there are other embodiments of the invention, and those skilled in the art can be according to thisInvention makes various changes and modifications, and as long as it does not depart from the spirit of the invention, should belong to appended claims of the present invention and determinesThe range of justice.

Claims (10)

CN201811213187.8A2018-10-182018-10-18Trusted data transmission methodActiveCN109361668B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201811213187.8ACN109361668B (en)2018-10-182018-10-18Trusted data transmission method

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201811213187.8ACN109361668B (en)2018-10-182018-10-18Trusted data transmission method

Publications (2)

Publication NumberPublication Date
CN109361668Atrue CN109361668A (en)2019-02-19
CN109361668B CN109361668B (en)2021-06-11

Family

ID=65345712

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201811213187.8AActiveCN109361668B (en)2018-10-182018-10-18Trusted data transmission method

Country Status (1)

CountryLink
CN (1)CN109361668B (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN109995776A (en)*2019-03-262019-07-09西安纸贵互联网科技有限公司A kind of internet data verification method and system
CN110069241A (en)*2019-03-272019-07-30阿里巴巴集团控股有限公司Acquisition methods, device, client device and the server of pseudo random number
CN110519054A (en)*2019-08-292019-11-29四川普思科创信息技术有限公司A method of internet of things data safeguard protection is carried out based on reliable computing technology
CN110717149A (en)*2019-10-092020-01-21湖南国科微电子股份有限公司Security architecture, operation method and device thereof, and readable storage medium
CN111865568A (en)*2019-04-292020-10-30华控清交信息科技(北京)有限公司Data transmission oriented certificate storing method, transmission method and system
CN112231652A (en)*2020-10-282021-01-15百度在线网络技术(北京)有限公司Trusted environment remote verification method, device, equipment, system and medium
CN112395631A (en)*2020-11-272021-02-23上海交通大学Secure database system, method and medium based on SGX technology
CN112651018A (en)*2020-12-182021-04-13卓尔智联(武汉)研究院有限公司SGX-based trusted input and output control method, device, equipment and storage medium
CN113158153A (en)*2021-05-192021-07-23杭州市电力设计院有限公司余杭分公司Reading authentication management system based on intelligent power grid database
CN113329012A (en)*2021-05-282021-08-31交叉信息核心技术研究院(西安)有限公司Rapid authentication method and system for trusted execution environment
CN113676494A (en)*2021-10-212021-11-19深圳致星科技有限公司Centralized data processing method and device
CN113721919A (en)*2021-08-092021-11-30上海交通大学Intel SGX trusted execution environment-based online compiling and obfuscating implementation method
CN113810382A (en)*2021-08-242021-12-17东北大学秦皇岛分校 A Ciphertext Loading Method for Resisting SGX Side-Channel Attacks
CN114189706A (en)*2021-12-092022-03-15北京航星永志科技有限公司Media playing method, system, device and computer equipment
CN114338201A (en)*2021-12-302022-04-12北京可信华泰信息技术有限公司Data processing method and device, electronic device and storage medium
CN114422215A (en)*2021-12-312022-04-29国网安徽省电力有限公司合肥供电公司 A cross-platform and trusted energy data sharing system and method based on blockchain
CN114553590A (en)*2022-03-172022-05-27北京字节跳动网络技术有限公司Data transmission method and related equipment
WO2022168083A1 (en)2021-02-042022-08-11KAZUAR Advanced Technologies Ltd.System and method enabling networked systems to safely use digital content e.g. code
CN115334073A (en)*2022-10-132022-11-11中国电子科技集团公司第十五研究所Method and system for deeply pulling remote file
CN115567311A (en)*2022-10-122023-01-03贵州电网有限责任公司Encryption system and encryption method based on data information encryption
CN115801446A (en)*2022-12-292023-03-14浙江大学Encryption database system based on trusted hardware
WO2023103697A1 (en)*2021-12-102023-06-15华为技术有限公司Communication method in computer system, and related product

Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101989984A (en)*2010-08-242011-03-23北京易恒信认证科技有限公司Electronic document safe sharing system and method thereof
CN107743133A (en)*2017-11-302018-02-27中国石油大学(北京) Mobile terminal and its access control method and system based on trusted security environment
CN108418691A (en)*2018-03-082018-08-17湖南大学 SGX-based dynamic network identity authentication method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101989984A (en)*2010-08-242011-03-23北京易恒信认证科技有限公司Electronic document safe sharing system and method thereof
CN107743133A (en)*2017-11-302018-02-27中国石油大学(北京) Mobile terminal and its access control method and system based on trusted security environment
CN108418691A (en)*2018-03-082018-08-17湖南大学 SGX-based dynamic network identity authentication method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
于永哲: "基于动态密码技术的M2M身份认证协议研究", 《中国优秀硕士论文全文数据库信息科技辑》*

Cited By (35)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN109995776B (en)*2019-03-262021-10-26西安纸贵互联网科技有限公司Internet data verification method and system
CN109995776A (en)*2019-03-262019-07-09西安纸贵互联网科技有限公司A kind of internet data verification method and system
CN110069241A (en)*2019-03-272019-07-30阿里巴巴集团控股有限公司Acquisition methods, device, client device and the server of pseudo random number
CN110069241B (en)*2019-03-272023-03-03创新先进技术有限公司Pseudo-random number acquisition method and device, client device and server
CN111865568A (en)*2019-04-292020-10-30华控清交信息科技(北京)有限公司Data transmission oriented certificate storing method, transmission method and system
CN110519054A (en)*2019-08-292019-11-29四川普思科创信息技术有限公司A method of internet of things data safeguard protection is carried out based on reliable computing technology
CN110717149A (en)*2019-10-092020-01-21湖南国科微电子股份有限公司Security architecture, operation method and device thereof, and readable storage medium
CN112231652A (en)*2020-10-282021-01-15百度在线网络技术(北京)有限公司Trusted environment remote verification method, device, equipment, system and medium
CN112231652B (en)*2020-10-282022-02-22百度在线网络技术(北京)有限公司Trusted environment remote verification method, device, equipment, system and medium
CN112395631B (en)*2020-11-272022-09-20上海交通大学Secure database system, method and medium based on SGX technology
CN112395631A (en)*2020-11-272021-02-23上海交通大学Secure database system, method and medium based on SGX technology
CN112651018A (en)*2020-12-182021-04-13卓尔智联(武汉)研究院有限公司SGX-based trusted input and output control method, device, equipment and storage medium
CN112651018B (en)*2020-12-182022-08-02卓尔智联(武汉)研究院有限公司SGX-based trusted input and output control method, device, equipment and storage medium
WO2022168083A1 (en)2021-02-042022-08-11KAZUAR Advanced Technologies Ltd.System and method enabling networked systems to safely use digital content e.g. code
CN113158153A (en)*2021-05-192021-07-23杭州市电力设计院有限公司余杭分公司Reading authentication management system based on intelligent power grid database
CN113329012A (en)*2021-05-282021-08-31交叉信息核心技术研究院(西安)有限公司Rapid authentication method and system for trusted execution environment
CN113329012B (en)*2021-05-282022-07-26交叉信息核心技术研究院(西安)有限公司Rapid authentication method and system for trusted execution environment
CN113721919A (en)*2021-08-092021-11-30上海交通大学Intel SGX trusted execution environment-based online compiling and obfuscating implementation method
CN113721919B (en)*2021-08-092024-03-12上海交通大学Online compiling confusion implementation method based on Intel SGX trusted execution environment
CN113810382A (en)*2021-08-242021-12-17东北大学秦皇岛分校 A Ciphertext Loading Method for Resisting SGX Side-Channel Attacks
CN113810382B (en)*2021-08-242023-07-11东北大学秦皇岛分校 A ciphertext loading method for defending against SGX side channel attacks
CN113676494A (en)*2021-10-212021-11-19深圳致星科技有限公司Centralized data processing method and device
CN113676494B (en)*2021-10-212022-01-07深圳致星科技有限公司Centralized data processing method and device
CN114189706A (en)*2021-12-092022-03-15北京航星永志科技有限公司Media playing method, system, device and computer equipment
WO2023103697A1 (en)*2021-12-102023-06-15华为技术有限公司Communication method in computer system, and related product
CN114338201A (en)*2021-12-302022-04-12北京可信华泰信息技术有限公司Data processing method and device, electronic device and storage medium
CN114338201B (en)*2021-12-302024-04-02北京可信华泰信息技术有限公司Data processing method and device, electronic equipment and storage medium
CN114422215A (en)*2021-12-312022-04-29国网安徽省电力有限公司合肥供电公司 A cross-platform and trusted energy data sharing system and method based on blockchain
CN114422215B (en)*2021-12-312024-06-25国网安徽省电力有限公司合肥供电公司 A cross-platform and trusted energy data sharing system and method based on blockchain
CN114553590A (en)*2022-03-172022-05-27北京字节跳动网络技术有限公司Data transmission method and related equipment
CN114553590B (en)*2022-03-172023-08-22抖音视界有限公司Data transmission method and related equipment
CN115567311A (en)*2022-10-122023-01-03贵州电网有限责任公司Encryption system and encryption method based on data information encryption
CN115567311B (en)*2022-10-122023-05-05贵州电网有限责任公司Encryption system and encryption method based on data information encryption
CN115334073A (en)*2022-10-132022-11-11中国电子科技集团公司第十五研究所Method and system for deeply pulling remote file
CN115801446A (en)*2022-12-292023-03-14浙江大学Encryption database system based on trusted hardware

Also Published As

Publication numberPublication date
CN109361668B (en)2021-06-11

Similar Documents

PublicationPublication DateTitle
CN109361668B (en)Trusted data transmission method
Bhatia et al.Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues
JP6370722B2 (en) Inclusive verification of platform to data center
CN101350723B (en)USB Key equipment and method for implementing verification thereof
JP5860815B2 (en) System and method for enforcing computer policy
Dwoskin et al.Hardware-rooted trust for secure key management and transient trust
CN106888084B (en)Quantum fort machine system and authentication method thereof
CN104756127A (en)Secure data handling by a virtual machine
JPH10247905A (en)Access qualification authentication device and its method
JP2011515961A (en) Authentication storage method and authentication storage system for client side certificate authentication information
WO2008053279A1 (en)Logging on a user device to a server
CN109525583A (en)A kind of false voucher detection method and system of the service system that Identity Management is provided for third party
CN105024813B (en)A kind of exchange method of server, user equipment and user equipment and server
CN108737376A (en)A kind of double factor authentication method and system based on fingerprint and digital certificate
CN110837634B (en)Electronic signature method based on hardware encryption machine
CN109309645A (en)A kind of software distribution security guard method
Junghanns et al.Engineering of secure multi-cloud storage
Sung et al.Security analysis of mobile authentication using QR-codes
CN120017386A (en) A cloud computing data secure transmission system and method
CN110572392A (en)Identity authentication method based on HyperLegger network
Okafor et al.Diverify: Diversifying identity verification in next-generation software signing
Jang-Jaccard et al.Portable key management service for cloud storage
Sudha et al.A survey on different authentication schemes in cloud computing environment
CN113676468A (en)Three-party enhanced authentication system design method based on message verification technology
Nosouhi et al.Towards Availability of Strong Authentication in Remote and Disruption-Prone Operational Technology Environments

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp