Method for protecting computer system

A computer system and security technology, which is applied in the field of computer security, can solve the problems of no integrity verification result processing operation, and the inability to fundamentally guarantee the security of computer platforms, etc.

Inactive Publication Date: 2009-06-17
CHINA GREATWALL TECH GRP CO LTD
View PDF0 Cites 62 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the embodiments of the present invention is to provide a method for protecting the security of a computer system, which aims to solve the problem that the existing trusted computer permits the platform to enter any state without processing the integrity check result, and cannot fundamentally guarantee the security of the computer platform. safety issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting computer system
  • Method for protecting computer system
  • Method for protecting computer system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0018] In the embodiment of the present invention, the trusted computing platform integrates a dedicated module in the computing system as the root of trust, and uses a cryptographic mechanism to establish a trust chain from the bottom layer components to the upper layer application, from the computer system boot, to the BIOS, to the configuration information detection , to the hardware platform, to load the operating system, to measure the integrity of the application operations under the operating system and network access, calculate the hash value and load it into the PCR of the trusted computing...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for protecting compute system, belonging to the computer security technical field, which comprises: processing attestation of integrity on a computer system; recording the metric value via a credit calculation chip into a platform state register; judging the consistence between the metric value and an initial metric value corresponding to the platform state recorded in the credit calculation chip, when they are consistent, allowing the execution, or else, hanging the computer system. The computer system generates a credit root via embedding a hardware chip on a main board, utilizes password mechanism to build a credit chain from bottom components to superior application, and calculates and adds discrete values into a platform configuration register of a credit calculation chip. When the value is inconsistent to the one stored in the credit calculation chip, the computer system recovers or hangs, thereby confirming the safety of the computer system.

Description

technical field [0001] The invention belongs to the field of computer security, in particular to a method for protecting computer system security. Background technique [0002] With the development of information technology, the use and application of computer platforms such as personal computers (PC), notebook computers or network servers are becoming more and more extensive, thus greatly enriching and facilitating people's lives, but at the same time Due to the loopholes in the computer system architecture, computer platforms are increasingly threatened, such as computer viruses and online hackers, which pose a great threat to the security of computer system platforms such as personal computers and network servers. [0003] The imperfect structure of the existing computer system has caused many loopholes in information security. Due to the uncontrollability of the operation behavior, that is, from the underlying basic input output system (Basic Input Output System, BIOS) c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/57
Inventor 贾兵林诗达石明张拥军姚文泽宋靖
Owner CHINA GREATWALL TECH GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products