Network-operating-system-oriented trusted virtual operating platform

An operating system and operating platform technology, applied in transmission systems, public keys for secure communications, user identity/authority verification, etc., can solve problems such as tampering and counterfeiting, replay attacks, and malicious hardware modifications

Active Publication Date: 2011-09-28
SHENZHEN YUN AN BAO TECH CO LTD
View PDF3 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0019] 1. Changes to physical nodes before or during startup need to be detectable: hardware, BIOS, bootloader, or VMM of physical nodes have been maliciously modified before or during startup;
[0020] 2. The configuration change of the physical node after startup need

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network-operating-system-oriented trusted virtual operating platform
  • Network-operating-system-oriented trusted virtual operating platform
  • Network-operating-system-oriented trusted virtual operating platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0077] The technology of this patent needs to pay attention to the following matters during the specific implementation:

[0078] 1) An external trusted entity provides a trusted cloud manager to verify the networked operating system platform. TCC manages a directory locally, which stores the signed public key EK of the trusted physical node in the networked operating system PU N , public key TK PU N and the configuration list CL N In addition, it is also responsible for publishing its own signature public key EK through a secure channel. PU TCC , public key TK PU TCCand the expected TCC configuration list CL TCC .

[0079] 2) This patent also assumes that the following conditions are established:

[0080] a) The trustworthiness of external trusted entities does not need to be verified;

[0081] b) TCC's signed public key, public key and expected configuration list, physical node's signed public key and expected configuration list are published before the system run...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network-operating-system-oriented trusted virtual operating platform technology, which belongs to the technical field of computer infrastructure software. In the technology, trusted registration and starting mechanisms are designed for each node in a network operating system by setting a third-party trusted authentication mechanism which is a trusted cloud controller for main threats to the main service range and main operations of the network operating system in a typical novel network application mode; and after passing through an authentication protocol of the trusted cloud controller, the nodes can become trusted nodes to provide a trusted host operating environment for virtual machines, ensure that damages to the integrity and accuracy of the virtual machines can be detected in a starting process and interrupt the starting and registration processes of damaged machines. Moreover, corresponding trusted ensuring mechanisms are designed for the main operations of the virtual machines, namely starting and migration processes.

Description

technical field [0001] The invention belongs to the technical field of computer basic software, and mainly solves how to design and build a trustworthy networked operating system virtual operating platform. Aiming at the main operation and scope of use of the networked operating system virtual operating platform, including: physical server management and trustworthiness certification, virtual image and virtual machine management and trustworthiness certification, trustworthiness certification of virtual machine migration, etc., designed Corresponding authentication protocols and algorithms. [0002] Acronyms and key term definitions [0003] TCC (Trusted Cloud Controller): Trusted Cloud Controller [0004] CM (Cloud Manager): cloud management system [0005] BIOS (Basic Input Output System): Basic Input Output System [0006] OS(Operating System): operating system [0007] VMM (Virtual Machine Monitor): virtual machine monitor [0008] TPM (Trusted Platform Module): Trus...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/30H04L29/06
Inventor 袁玉宇刘川意杨金翠张旸旸韩强
Owner SHENZHEN YUN AN BAO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products