Transparent trust chain constructing system based on virtual machine architecture
A virtual machine and trust chain technology, applied in computer security devices, software simulation/interpretation/simulation, instruments, etc., can solve problems such as large number of system vulnerabilities, huge operating system code, and difficulty in finding
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0017] In order to make the features and advantages of the present invention more clearly understood, a detailed description is given below in conjunction with the accompanying drawings: figure 1 The system structure diagram of the present invention is described and the implementation of related functions is explained in the form of modules. The host (hardware) needs to have a Trusted Computing Group (TCG) Trusted Platform Module (TPM) specification or China Trusted Cryptographic module (TCM) standard security chip, and a processor that supports hardware virtualization technology (hardware-assisted virtualization processor); a virtual machine monitor is set on the hardware, which has a security chip driver module and a disk operation analysis and measurement module And system call analysis module.
[0018] The virtual machine monitor in the present invention refers to a virtual machine monitor at the hardware abstraction layer (HAL). The common operating system running in a virtu...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 