Method for implementing reliable computation based on reliable multi-task operating system

An operating system and trusted computing technology, applied in computing, computer security devices, instruments, etc., to save costs and protect existing software properties

Active Publication Date: 2008-08-20
CHINA STANDARD SOFTWARE
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0023] In order to solve the above-mentioned problems, the present invention monitors and measures the behavior of the client system through methods such as virtualization technology, interception, redirection, etc., which can dynamically protect the integrity of the client system, and at the same time minimize the defects of the client system itself. The harm caused by loopholes and backdoors can effectively improve the security and credibility of the overall system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing reliable computation based on reliable multi-task operating system
  • Method for implementing reliable computation based on reliable multi-task operating system
  • Method for implementing reliable computation based on reliable multi-task operating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the features and advantages of the present invention more clearly understood, below in conjunction with accompanying drawing, describe in detail as follows: figure 1 As shown, it describes the structural diagram of the system architecture of the present invention, which is divided into three parts. The bottom layer 100 is a trusted computing chip, including TPM and TCM; the core state 110 is composed of a trusted computing chip driver module 111, a trusted virtual machine module 112. The monitoring and measurement module 113 is composed; the user mode 130 includes multiple untrusted operating systems, on which multiple application programs run. When the application program 131 in the user state requests information from the core state, the system will automatically switch from the user state to the core state, and enter the core of the trusted multitasking operating system for processing. The trusted multitasking operating system runs on the core state ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention realizes a measuring and monitoring method for a credible multi-task operating system to an incredible operating system making use of a credible computing technology. The credible multi-task operating system is composed of a credible computing chip drive module ,a credible virtual machine module, and a measuring and monitoring module, the credible multi-task operating system runs one or more incredible operating systems making use of the credible virtual machine module, the actions such as all the system call of application program, etc. in the incredible operating system are redirected by modifying the vector terminal, etc. and then operated by the measuring and monitoring module of the credible multi-task operating system, so as to realize the measuring and monitoring to the actions of the incredible operating system. The incredible operating system includes various editions such as Windows or Linux operating system. The invention can be used in PC, meanwhile the users'previous operating interface is not changed, the security and credibility of the system can be effectively enhanced, and the users' habits can be better compatible.

Description

technical field [0001] The invention relates to a trusted computing method, in particular to a method for measuring and monitoring the behavior of an untrusted operating system by a trusted multi-task operating system. Background technique [0002] In 1983, in the "Trusted Computer System Evaluation Criteria" (DOD5200.28-Std, Trusted Computer System Evaluation Criteria, referred to as TCSEC) launched by the US Department of Defense, the "Trusted Computing Base" (Trusted Computing Base, referred to as TCB) was proposed. )the concept of. The so-called "trusted computing base" refers to the realization of system security by maintaining the minimum set of trusted components and controlling the access rights of data, so as to achieve the purpose of system credibility. China's national standard GB 17859-1999 "Computer Information System Security Protection Classification Criteria" continues to use the concept of "trusted computing base". [0003] In January 1999, the "Trusted Co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/57
Inventor 韩乃平刘文清兰雨晴张东李红娟
Owner CHINA STANDARD SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products