Unlock instant, AI-driven research and patent intelligence for your innovation.

Constructing method for trusted application environment based on mandatory access control technology

A technology for mandatory access control and construction methods, which is applied in the fields of instruments, electrical digital data processing, platform integrity maintenance, etc., to prevent malicious interference and ensure the isolation of space.

Active Publication Date: 2011-07-20
BEIJING UNIV OF TECH
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Trusted computing technology is currently a hot topic. Trusted computing has proposed the concept of trust chain transfer. Using trusted chain transfer technology can ensure the trustworthiness from hardware to operating system. The trusted measurement of trusted computing technology can only To ensure that the initial state of the application is credible, but how to ensure that the trust degree of the application does not decay during runtime, so as to extend the trust to the application system and maintain the transmission of the trust chain is a challenge in building a trusted application environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Constructing method for trusted application environment based on mandatory access control technology
  • Constructing method for trusted application environment based on mandatory access control technology
  • Constructing method for trusted application environment based on mandatory access control technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Such as Figure 1-2As shown, the technical solution realized by the present invention is characterized in that, according to the dependencies between application installation software packages, the software packages are marked securely by using specific marking rules, and the combination of mandatory access control mechanism and trusted computing technology is used to achieve The strict isolation between applications in time and space limits the range of system resources used by applications, reduces or shields unexpected interference between applications, and establishes a safe and reliable application environment for users.

[0032] Take Debian 5.0, a distribution version of Linux, as an example. This version provides a basic system and a large number of software packages in .deb format. These packages provide a list of other software packages that the normal installation of this package depends on. During the installation process of the system, the apt-get command ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a constructing method for realizing trusted application environment by utilizing the mandatory access technology, the trusted computing technology and the like. The method not only can realize self protection, but also can provide safe and trusted operating environment for upper-layer application of the system and maintains the trusted state of the application. The methodcomprises two parts of applying integrity marks of installation packages and realizing the application security separation; the part of applying integrity marks of installation packages uses the graded and classified mark regulation to describe the dependency among software packages of an operating system environment; the marks are divided into graded marks and classified marks; and the division of security regions with different applications supported by the system is realized by the steps of graded marks, classified marks and security separation, insulation protection is carried out and unexpected interference of other applications in the environment is reduced or shielded.

Description

(1) Technical field [0001] The invention belongs to the field of secure operating systems, and is a method for constructing a trusted application environment by using mandatory access technology and trusted computing technology. The method can not only realize self-protection, but also provide safe and reliable The operating environment maintains the trusted state of the application. (2) Background technology [0002] The application environment is the working environment of the user, and it is the place where the application acts as the agent of the user to exercise authority and perform tasks. With the advancement of informatization, especially the development of the network, various new applications emerge one after another, and the application environment becomes more and more complex. The credibility of the application environment directly affects the security of the entire information system. If the application environment is untrustworthy, the application may suffer ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/22G06F21/57
Inventor 胡俊沈昌祥申永波蔡勉
Owner BEIJING UNIV OF TECH