Unlock instant, AI-driven research and patent intelligence for your innovation.

Transparent trust chain constructing system based on virtual machine architecture

A virtual machine and trust chain technology, applied in computer security devices, software simulation/interpretation/simulation, instruments, etc., can solve problems such as large number of system vulnerabilities, huge operating system code, and difficulty in finding

Inactive Publication Date: 2011-11-30
HUAZHONG UNIV OF SCI & TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The method of modifying the kernel has many defects: First, this method is opaque to the operating system, which makes it impossible for the deployed commercial operating system to support the integrity measurement and authentication of the application layer
Secondly, the above method needs to use the operating system as a trust base (TCB), the operating system code is huge, and the number of system vulnerabilities is large and difficult to find

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Transparent trust chain constructing system based on virtual machine architecture
  • Transparent trust chain constructing system based on virtual machine architecture
  • Transparent trust chain constructing system based on virtual machine architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In order to make the features and advantages of the present invention more clearly understood, a detailed description is given below in conjunction with the accompanying drawings: figure 1 The system structure diagram of the present invention is described and the implementation of related functions is explained in the form of modules. The host (hardware) needs to have a Trusted Computing Group (TCG) Trusted Platform Module (TPM) specification or China Trusted Cryptographic module (TCM) standard security chip, and a processor that supports hardware virtualization technology (hardware-assisted virtualization processor); a virtual machine monitor is set on the hardware, which has a security chip driver module and a disk operation analysis and measurement module And system call analysis module.

[0018] The virtual machine monitor in the present invention refers to a virtual machine monitor at the hardware abstraction layer (HAL). The common operating system running in a virtu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a transparent trust chain constructing system based on virtual machine architecture. The system is provided with a virtual machine monitor on the mainframe, the virtual machine monitor comprises a safety chip drive module, a system call analysis module and a disk analysis measurement module. The invention measures the operation system and the executable code loaded after the operation system is started in the virtual machine monitor, without any modification of the existing operation system and the application program. The invention can obtain low-level operation semantic information, such as the system call and the disk access, of the operation system in the client machine, analyzes the operation semantics of the client machine operation system, and controls the operation of the client operation system on the disk to realize the transparent measurement. The technology can be used in the distributed cooperation environment, and provide transparent trust chain and integrity certification for the operation system. The invention can protect the existing property of the user and enable the existing operation system to support the process level TCG trust chain without any modification.

Description

Technical field [0001] The invention belongs to the field of trusted computing, and specifically relates to a trust chain construction system based on a virtual machine architecture that is transparent to an operating system. Background technique [0002] With the development of information technology, modern society is increasingly dependent on computer systems. Especially in recent years, under the impetus of Internet technology, more and more computers have been used in the fields of social politics, economy, education, and military, making the security of computing platforms more and more important. However, since the advent of computers, computer security problems have always existed with the development of computers. In the past 30 years, the losses caused by it have become more and more serious. An important reason for this situation is that traditional security protection methods and inherent defects of software are not sufficient to prevent the increasing number of com...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06F9/455G06F21/50
Inventor 金海程戈邹德清羌卫中余辰
Owner HUAZHONG UNIV OF SCI & TECH