Method for implementing credible recovery system in operating system

An operating system and recovery system technology, applied in the field of operating systems, can solve the problems of destroying the consistency and security protection performance of the operating system, lack of operating system security, and lack of foundation for computer system security, etc., to meet the requirements of high throughput and reliability. Effects of Sexual Demand, Good Scalability, and Robustness

Inactive Publication Date: 2008-08-27
ZHEJIANG UNIV
View PDF0 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] There is no foundation for computer system security without the security provided by the operating system
U

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing credible recovery system in operating system
  • Method for implementing credible recovery system in operating system
  • Method for implementing credible recovery system in operating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The invention discloses a method for realizing a trusted recovery system in an operating system, and adopts the method to establish a trusted recovery system on a Linux operating system (issue version Fedora Core 3, kernel version 2.6.8).

[0040] The method for realizing a trusted recovery system in an operating system includes the following steps:

[0041] 1) Create a log file designed for disk blocks. It consists of a long sequence of disk blocks. Each disk block has a serial number. It is logically regarded as a circular queue, and the log data blocks are written in sequence. ;

[0042] A log file is a very long sequence of disk blocks, each with a unique sequence number. System recovery requires quick access to this log but most of it can be kept offline or discarded. Online log files are used to hold the "useful" parts of the log. The log files are managed as a ring buffer. The log file can be regarded as a circular queue logically, and the log data blocks are...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realizing a trusted recovery system in an operating system. The method establishes transaction declaration system call to provide an interface of transaction establishment and submission for the trusted computing base (TCB) operation of a computer information system in order that the atomic nature of the TCB operation can be ensured by the trusted recovery system as long as the transaction declaration system call is used to declare a code section into transaction. The trusted recovery system consists of a transaction manager, a log system and log files. The transaction manager coordinates and manages the establishment, submission and recovery of the transaction. The log system intercepts and captures all the updated operations in the TCB operation and records the operations in the log files; after the transaction is completed, the operations are written back to a disk, thereby realizing the atomic nature of the TCB operation. When the computer system is invalid, as long as the data in the log files relevant to the TCB operation is repealed, the system can be reconstructed to a consistent state before the occurrence of a fault. The method for realizing the trusted recovery system in the operating system is suitable for mainstream operation systems, has wide application range and can increase the disaster tolerance of the operating system.

Description

technical field [0001] The invention relates to the technical field of operating systems, in particular to a method for realizing a trusted recovery system in an operating system. Background technique [0002] Information security is of great significance to the national economy and national security. In the current information security strategy, one of the core issues is that security product technology must and can only be independently developed and localized in my country to meet security needs. Operating system security is the foundation of information security. If any security-related program runs on an operating system with security holes, there is still a danger of being destroyed. Therefore, a high-level security operating system is the basis of all information security applications. [0003] Computer system security has no foundation without the security provided by the operating system. Unexpected system failures may destroy the consistency and security protect...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/14G06F9/48G06F21/22G06F21/50
Inventor 姜励平玲娣潘雪增陈小平李善平
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products