1. A mobile office method of a mobile software white list mechanism based on credibility measurement is characterized in that the method is sequentially realized in a network system based on a static software white list mechanism, called a system for short, according to the following steps, wherein static refers to a minimum attribute set before software runs:
step (1), system construction:
the system comprises: the system comprises an online service software white list database, a to-be-built trusted software white list database, a department and personnel code management database, a local server and a client, wherein the online service software white list database, the to-be-built trusted software white list database, the department and personnel code management database are collectively called an online database group, the local server is called a server for short, and the server is characterized in that:
the white list database of the online service software is a trusted software database of the online service, which is called an executable software module database for short, provides a minimum original attribute set PM for industry software used for the online service and transformed into trusted software, and is at least expressed as: the software comprises a program package and/or an executable program, the software type comprises software, a static link module, a dynamic link module and a kernel driving module, the software input data sequence is a constraint condition of software operation, the software output data sequence is an operation result of the software, the software abstract value is obtained by calculating data formed by different combination modes of common splicing of the software input data sequence and the software output data sequence by a quotient according to a cryptographic algorithm SM3,
the white list database of the trusted software to be built is a database of the trusted measurement software to be built, and the minimum original attribute set of the trusted measurement software is as follows: WC ═ provider name, department, post, computer software copyright number, software type, software version, software keyword >,
the minimum original attribute set of the department and personnel code management database is as follows: < department type, personnel name, post, white list software usage rights and corresponding access priority >,
the original attribute refers to original parameter information applicable to binary number expression,
the local server is provided with: storage module, customer end wireless communication module, local server wireless communication module and server CPU, wherein:
a storage module provided with:
mapping table of a client minimal retrieval information set RM to a minimal original property set PM of software of an online service, wherein: the minimum retrieval information set RM of the client at least comprises the name of the client user, the type of department, the post, the software use permission of a white list and the corresponding access priority, the type of software and the keywords of the software,
a mapping table of a minimum raw attribute set (PM) of online server software to a minimum attribute set (PMS) of a mobile APP of a trusted metric stored in a cloud, the PMS comprising: < software digest value, resource module, software input data sequence, software output data sequence, occupied memory range >,
the server CPU is respectively interconnected with the client wireless communication module and the local server wireless communication module,
high in the clouds server is equipped with: cloud CPU, the removal APP database and the high in clouds wireless communication module of the credible measurement in high in the clouds, wherein:
the cloud CPU inputs PM, outputs a software abstract value in the PM to a mobile APP database of cloud credibility measurement, searches corresponding software input data sequences and software output data sequences from the mobile APP database of cloud credibility measurement, forms leaf nodes by the software input data sequences and the software output data sequences, further generates a software white list tree, returns the software white list tree to a cloud wireless communication module, further returns the software white list tree to a local server,
the mobile APP database of the cloud credibility measurement stores white list software obtained through credibility calculation, the minimum attribute set of the white list software is PMS, and a cloud CPU works according to the following sequence: (1) obtaining input PM from a cloud wireless communication module, (2) searching the same software abstract value from a mobile APP database of cloud credibility measurement according to the software abstract value in the PM to obtain a corresponding software input data sequence and a corresponding software output data sequence, forming a minimum attribute set of white list software into the PMS and returning the PMS to a cloud CPU,
the client side is provided with: a cache module, a client minimum retrieval information set, a minimum original attribute set of a to-be-built/under-built trusted software white list, a client CPU and a USB controller, wherein the client CPU is respectively interconnected with the rest components,
and (2) the system sequentially realizes the mobile office method of the mobile software white list mechanism based on the credibility measurement according to the following steps:
step (2.1), the client network requests to initiate personal identification,
step (2.1.1), the local server loads the 128-bit identification code in the USB controller from the filter starting program, recognizes 64-bit role code and 64-bit user code,
step (2.1.2), the local server adopts the digital envelope technology as the security technology when the connection is established, and the steps are as follows:
step (2.1.2.1), the client splices the identification code stored in the USB controller and the timestamp of the current time to form plaintext data which is sent for the first time; the plaintext data is digitally signed through a signature certificate stored by a USB controller, so that the authenticity of the data is ensured; encrypting the data through an encryption certificate stored by the USB controller to form ciphertext data sent for the first time, and ensuring the confidentiality of the data; the ciphertext data is transmitted to a local server,
step (2.1.2.2), after receiving the ciphertext data sent in step (2.1.2.1), the local server processes the ciphertext data through a public/private key corresponding to the USB controller of the sending end to generate plaintext data sent by the client for the first time,
step (2.1.2.3), the local server judges whether the time stamp of the plaintext data is too long, if the time is longer than the specified time, the received ciphertext data is judged as replay data, and the subsequent judging process is terminated; if the specified time is not exceeded, the data is determined to be an actual client request, the process of step (2.1.2.4) is executed,
step (2.1.2.4), after the role code and the user code are separated by the local server, if corresponding information is not found from the client request, the identity authentication of the initiator of the client network request fails, and the operation is terminated; if the corresponding information is found, the identity authentication of the client network request initiator is completed, step (2.1.3) is executed,
step (2.1.3), the server and the client negotiate a session key based on SM4 symmetric cryptographic algorithm through digital envelope technology, until the subsequent communication between the local server and the client uses the session key and no longer uses the digital envelope technology,
step (2.2), identifying the client requirement:
step (2.2.1), the local server sets the following three types of demand marks according to different requirements proposed by the client in the network initiation request:
the first category is the search innovation request flag for white list software, represented by the binary number "00",
the second type is a new evaluation request flag of new white list software, represented by binary number "01",
the third type is an office sign for transferring the client into official business, which is represented by a binary number of 10, and in step (2.2.2), the server judges the actual requirements of the user client:
if: for the first requirement, the step (2.2.3) is carried out,
if: for the second requirement, the step (2.2.4) is carried out,
if: for the third requirement, the step (2.2.5) is carried out,
step (2.2.3), realizing the retrieval innovation service of the credible software in the form of the white list according to the following steps:
a step (2.2.3.1) of retrieving, according to the RM to PM mapping table, at least one executable software module for the online retrieval service by software type and software key,
a step (2.2.3.2) of finding at least one credible mobile white list software from the mobile APP database of the cloud credibility measurement according to the PM-to-PMS mapping table by the software abstract value corresponding to each executable software module retrieved in the step (2.2.3.1), and expressing the at least one credible mobile white list software by the software input data sequence and the software output data sequence,
step (2.2.3.3), obtaining a credible white list software tree for the client to search service according to the results from the step (2.2.3.1) to the step (2.2.3.2), wherein the root node is a software keyword in the RM, the middle node is a software abstract value in the PM corresponding to the software keyword in the RM, the leaf node is a software input data sequence A in the PMS corresponding to the software abstract value in the PM, the software output data sequence O is sent to the local server through the cloud wireless communication module,
step (2.2.3.4), the server sends the trusted white list software tree of step (2.2.3.3) to the client,
step (2.2.3.5), the client selects at least one credible white list software as an executable software module based on the software abstract value of the executable software module and the expected software input data sequence A, and the software output data sequence O preferentially selects the executable software module, and proposes a retrieval innovation request to the server;
step (2.2.4), in the stage of updating and evaluating, the client side puts forward a request for carrying out credibility measurement on the software module which has obtained the copyright number of the computer software according to the following steps:
step (2.2.4.1), the client sends out the minimal raw set of attributes WC of the to-be-trusted measurement software to the local server,
step (2.2.4.2), the local server performs the white list software updating evaluation according to the steps (2.2.3.1) to (2.2.3.4), wherein the RM replaces by WC and sends the obtained credible white list software tree to the client self-updating and/or self-evaluating,
step (2.2.4.3), if the client end has uniqueness in self-checking and self-evaluating results, the client end is transmitted to the mobile APP database of the cloud end credibility measurement through the local server for record, and simultaneously transmitted to the local server executable software module database for use, otherwise, the application of the new credibility measurement static white list software is withdrawn,
and (2.2.5), the client side realizes office service according to the following steps:
and step (2.2.5.1), the local server sends the latest trusted white list software tree to the client terminal according to the request of the user, ensures the consistency of the trusted white list software trees of the client terminal and the server,
and (2.2.5.2) the client runs the software to be detected in the office process, if the software to be detected exists in the trusted white list software tree, the software is allowed to run, otherwise, the software is blocked from running.