Computer system and measuring method thereof

A computer system and measurement method technology, applied in computer security devices, computing, protection of internal/peripheral computer components, etc., can solve problems such as low security of computer systems, and achieve the effect of improving security

Active Publication Date: 2011-07-27
天津长城计算机系统有限公司
View PDF0 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the embodiments of the present invention is to provide a measurement method for a computer system, aiming at solving the problem of low security of the existing computer system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer system and measuring method thereof
  • Computer system and measuring method thereof
  • Computer system and measuring method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0026] In the embodiment of the present invention, after the BIOS is started, before the operating system is started, the trusted security chip is invoked to measure the trustworthiness of the BIOS and the virtual machine monitor. After the virtual machine monitor passes the trusted measure, the operating system passes the The communication between its built-in front-end driver and the built-in back-end driver in the virtual machine monitor calls the trusted security chip to measure the credibility of the operating system and the application software running in the operating system, and establishes ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is suitable for the field of computer application and provides a computer system and a measuring method thereof. The method comprises the following steps of: after the startup of a BIOS (Basic Input Output System) and before the startup of an operating system, calling a credible security chip to perform measurement of trust on the BIOS and transmitting a trust chain to a virtual machine monitor after the measurement of trust passes; calling the credible security chip to perform measurement of trust on the virtual machine monitor and transmitting a trust chain to the operating system after the measurement of trust passes; calling the credible security chip to perform measurement of trust on the operating system and transmitting a trust chain to an application program running on the operating system after the measurement of trust passes; and calling the credible security chip to perform measurement of trust on the application program running on the operating system and establishing a dependable computing trust chain of the computer system when the measurement of trust passes. By adopting the embodiment of the invention, the security of the computer system can be greatly enhanced.

Description

technical field [0001] The invention belongs to the field of computer applications, in particular to a computer system and its measuring method. Background technique [0002] With the rapid development of my country's national economy, information construction and national defense construction, people's needs for high-security and high-performance information security application products are becoming more and more urgent. The research and development of information security application products based on trusted computing will promote the process of my country's economic and social informatization and ensure national information security. In order to meet the needs of users who have relatively high requirements for information security, existing technologies provide new technologies with trusted computer platforms, trusted basic input output systems (Basic Input Output System, BIOS), trusted storage, and virtual machine monitoring. A generation of trusted computing security...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F11/30G06F21/70
Inventor 林诗达贾兵宋靖王淼刘欣房顾文锦
Owner 天津长城计算机系统有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products