Password protection system based on hardware virtualization

A hardware virtualization and password protection technology, applied in instruments, digital data authentication, computing, etc., can solve problems such as insufficient security, inability to prevent kernel-level rootkit attacks, rootkit attacks, etc., achieving good flexibility and high security , the effect of high flexibility

Inactive Publication Date: 2012-06-27
HUAZHONG UNIV OF SCI & TECH
View PDF2 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The present invention aims at the shortcomings that the traditional password protection is implemented in the operating system kernel, the security is not high enough, and the kernel layer rootkit attack cannot be prevented, and a passwo

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password protection system based on hardware virtualization
  • Password protection system based on hardware virtualization
  • Password protection system based on hardware virtualization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be further described in detail below in conjunction with the accompanying drawings.

[0026] The invention realizes the password protection module at the kernel layer of the operating system and at the same time realizes the kernel protection module at the virtual machine manager layer to prevent rootkit attacks, thereby realizing high security of the system. Divided from the working principle, the system can be divided into four parts: instruction interception module 1, kernel protection module 2, password protection module 3, scheduling management module 4. The structure diagram of the password protection system based on hardware virtualization is as follows: figure 1 shown. When a safe input environment is needed, the dynamic loading virtual machine manager takes over the operating system; during the protection process, the instruction interception module 1, the kernel protection module 2, the password protection module 3 and the schedulin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a password protection system based on hardware virtualization, which aims at the current situation that a traditional password protection system cannot defend an inner nuclear layer rootkit. The password protection system based on hardware virtualization deploys a password protection module and a scheduling management module in an inner nuclear layer of an operation system, provides a safe input environment and an interactive interface, and simultaneously deploys an instruction intercepting module and an inner core protection module in a manager layer of a virtual machine. The instruction intercepting module is used for intercepting privileged instructions, and transmitting the current privileged instruction information to the inner core protection module so as to lead an execution flow path to enter a manger of the virtual machine from the inner nuclear layer of the operation system. The inner core protection module prevents the rootkit from randomly modifying nuclear data and service in the operation system, and guarantees password protection in the inner nuclear layer of the operation system. The password protection system based on hardware virtualization moves a trusted computing base (TCB) from the inner nuclear layer of the operation system to the manager layer of the virtual machine, thereby achieving lower level and higher safety.

Description

technical field [0001] The invention belongs to the field of computer system security, and in particular relates to a novel password protection system based on hardware virtualization. Background technique [0002] With the continuous development of the Internet, network applications and services have emerged and penetrated into people's daily life, but the network security situation is not optimistic, various hacking Trojan horse activities are frequent, and the intrusion methods are becoming more and more complex. Inadvertently, confidential information such as the user's online game password and even online banking password will disappear, seriously damaging user privacy and digital property security. The key reason why these account hacking Trojans can easily steal users' password information is that they use keyloggers. According to the keylogging implementation level, it is divided into two categories: [0003] (1) Application layer keylogging: illegally use the keyb...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/46
Inventor 金海邹德清詹金波羌卫中
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products