Transparent trust chain constructing system based on virtual machine architecture

A virtual machine and trust chain technology, applied in computer security devices, software emulation/interpretation/simulation, instruments, etc., can solve problems such as a large number of system vulnerabilities, inability to support application layer integrity measurement and authentication, and opaque operating systems.

Inactive Publication Date: 2010-10-20
HUAZHONG UNIV OF SCI & TECH
View PDF3 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The method of modifying the kernel has many defects: First, this method is opaque to the operating system, which makes it impossible for the deployed commercial operating system to support the integrity measurement and authentication of the application layer
Secondly, the above method needs to use the operating system as a trust base (TCB), the operating system code is huge, and the number of system vulnerabilities is large and difficult to find

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Transparent trust chain constructing system based on virtual machine architecture
  • Transparent trust chain constructing system based on virtual machine architecture
  • Transparent trust chain constructing system based on virtual machine architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In order to make the features and advantages of the present invention more clearly understood, below in conjunction with accompanying drawing, describe in detail as follows: figure 1 Describes the schematic diagram of the system structure of the present invention and illustrates the realization of relevant functions in the form of modules. The host (hardware) needs to have the Trusted Platform Module (TPM) specification conforming to the Trusted Computing Group (Trusted Computing Group, TCG) or China Trusted Computing Group. A security chip of the cryptographic module (TCM) specification, and a processor supporting hardware virtualization technology (hardware-assisted virtualization processor); a virtual machine monitor is set on top of the hardware, which has a security chip driver module and a disk operation analysis and measurement module And system call parsing module.

[0018] The virtual machine monitor in the present invention refers to a virtual machine monitor ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a transparent trust chain constructing system based on virtual machine architecture. The system is provided with a virtual machine monitor on the mainframe, the virtual machine monitor comprises a safety chip drive module, a system call analysis module and a disk analysis measurement module. The invention measures the operation system and the executable code loaded after the operation system is started in the virtual machine monitor, without any modification of the existing operation system and the application program. The invention can obtain low-level operation semantic information, such as the system call and the disk access, of the operation system in the client machine, analyzes the operation semantics of the client machine operation system, and controls the operation of the client operation system on the disk to realize the transparent measurement. The technology can be used in the distributed cooperation environment, and provide transparent trust chain and integrity certification for the operation system. The invention can protect the existing property of the user and enable the existing operation system to support the process level TCG trust chain without any modification.

Description

technical field [0001] The invention belongs to the field of trusted computing, and in particular relates to a trust chain construction system transparent to an operating system based on a virtual machine architecture. Background technique [0002] With the development of information technology, modern society is increasingly dependent on computer systems. Especially in recent years, under the impetus of Internet technology, more and more computers are used in social politics, economy, education and military fields, making the security of computing platforms more and more important. However, since the advent of computers, computer security issues have always existed along with the development of computers. In the past three decades, the losses caused by it have become more and more serious. An important reason for this situation is that traditional security protection methods and inherent defects of software are not enough to defend against increasing computer security pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F9/455G06F21/50
Inventor 金海程戈邹德清羌卫中余辰
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products