期刊文献+

移动协同办公平台的安全网络连接机制研究 被引量:1

Research on Security Network Connection Mechanism of Mobile Cooperative Office Platform
下载PDF
导出
摘要 移动电子设备的普及为协同办公平台扩展提供了有效支撑,但开放的通信环境也对办公数据和内网资源保护策略提出更高要求,研究移动设备的安全网络连接机制是保障交互信息安全的基础。文章针对移动办公网络接入缺乏移动终端可信环境认证的问题,引入移动可信模块,在可信网络连接架构下设计了安全接入协议模型,通过验证移动办公平台与中间网关设备的身份有效性和平台完整性,实现移动办公网络接入的访问控制。 The popularity of mobile electronic devices provides effective support for the expansion of collaborative office platform.However, the open communication environment also puts forward higher requirements for the protection of office data and Intranet resources.Studying the secure network connection mechanism of mobile devices is the basis of ensuring the communication information security. This paper introduces mobile trusted module and designs a secure access protocol model under the trusted network connection architecture. By verifying the identity validity and platform integrity of mobile office platform and intermediate gateway equipment, this model achieves access control of mobile office network access.
作者 李昀 陈诚 吴华瑞 韩笑 杨宝祝 李庆学 LI Yun;CHEN Cheng;WU Hua-rui;HAN Xiao;YANG Bao-zhu;LI Qing-xue(Beijing Academy of Agriculture and Forestry Sciences,Beijing 100097,China;National Engineering Research Center for Information Technology in Agriculture,Beijing 100097,China;Beijing Research Center for Information Technology in Agriculture,Beijing 100097,China;Agriculture Key Laboratory of Agricultural Information Software and Hardware Product Quality Testing,Ministry of Agriculture and RuralAffairs of the People's Republic of China,Beijing 100097,China)
出处 《价值工程》 2019年第31期231-234,共4页 Value Engineering
基金 北京市科技计划项目,平谷农业科创区农业人工智能创新服务平台建设及示范应用(Z191100004019007) 2019年度农业农村部农业信息软硬件产品质量检测重点实验室建设项目(PT2019-28)
关键词 移动协同办公平台 移动可信模块 可信网络架构 平台完整性 mobile collaborative office platform mobile trusted module trusted connection architecture platform integrity
  • 相关文献

参考文献8

二级参考文献75

  • 1张焕国,罗捷,金刚,朱智强.可信计算机技术与应用综述[J].计算机安全,2006(6):8-12. 被引量:20
  • 2郑宇,何大可,何明星.基于可信计算的移动终端用户认证方案[J].计算机学报,2006,29(8):1255-1264. 被引量:40
  • 3System Management Bus Specification [EB/OL]. http://www. smbus. org/specs/smb10. pdf
  • 4.... http://www.infineon.com/,,..
  • 5NITGEN FIM10 Datasheet [EB/OL]. http..//classes, engr. oregonstate, edu/eecs/fall2004 / ece441/groups/g13/fire10 _ DataSheetvl. 0. pdf
  • 6Chen Ching-Han, Dai Jia-Hong. An embedded fingerprint authentication system with reduced hardware resources requirement. In: Proceedings of the International Symposium on Consumer Electronics. Hong Kong, China, 2005, 145-150
  • 7Gupta P. , Ravi S. , Raghunathan A. , Jha N. K.. Efficient fingerprint-based user authentication for embedded systems. In:Proceedings of International Conference on Design Automation,San Diego, USA, 2005, 244-247
  • 8Bertoni G. J. , Guajardo, Paar C.. Architecture for advanced cryptographic system. In: Proceedings of the International Conference on Policies and Actions in Modern Integrated Systems, in Information Security, Hershey(PA), USA, 2004
  • 9McIvor C. , McLoone M. , McCanny J. , Daly A.. Fast Montgomery modular multiplication and RSA cryptographic processor architectures. In: Proceedings of the Asilomar Conference on Signals, Systems, and Computers, Monterey, USA,2003,379-384
  • 10Gupta V. , Gupta S. , Chang S.. Performance analysis of elliptic curve cryptography for SSL. In: Proceedings of the ACM Workshop on Wireless Security, Atlanta, USA, 2002, 87-94

共引文献62

同被引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部