A virtual disk integrity protection system and method based on a trusted cryptographic module

A technology of integrity protection and virtual disk, which is applied in the field of information security and can solve problems such as user file integrity verification problems

Active Publication Date: 2016-05-11
SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the field of trusted computing, there have been many methods to solve the problem of component integrity measurement and verification before the operating system is loaded. However, when the operating system is running, user files a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A virtual disk integrity protection system and method based on a trusted cryptographic module
  • A virtual disk integrity protection system and method based on a trusted cryptographic module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0028] The embodiment of the present invention is realized by the written software system and the connected hardware equipment, figure 1 The system module structure diagram of the present embodiment is given, such as figure 1 As shown, the software system includes a virtual disk management module, a virtual disk measurement module and a virtual disk verification module, and the hardware device includes a trusted password module (TCM) and a trusted storage device (USBKey).

[0029] Such as figure 1 The shown virtual disk management module is a control module that manages the life cycle of virtual disks. It formats a virtual disk container file with a bootsector file header structure through the formatting method, and loads the virtual disk container file through the virtual disk driver as a virtual disk that the system can recognize. . Such a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses trusted cryptography module based system and method for protection of virtual disk completeness, and belongs to the technical field of information security. The trusted cryptography module based system comprises a virtual disk management module, a virtual disk measurement module, a virtual disk verification module, a trusted cryptography module and a trusted memory device. The virtual disk management module is used for generating and identifying virtual disk container files, and loading the virtual disk container files to turn into a virtual disk recognizable by a system. The method includes: initializing hardware devices required by the system, establishing a new virtual disk, establishing a standard metric for the virtual disk, verifying completeness of the virtual disk, and loading or not loading the virtual disk and updating the metric in unloading of the virtual disk according to verification results. By the system and the method compared with the prior art, safety of the virtual disk in use is improved, completeness verification is achieved, and security strength is greatly improved.

Description

technical field [0001] The invention relates to a technology in the field of information security, in particular to a virtual disk integrity protection system and method based on a trusted cryptographic module. Background technique [0002] With the development of information technology and network, more and more attention has been paid to the issue of data security, especially the classified information systems of governments and enterprises carry a large number of state secrets and commercial secrets, and data encryption technology is generally used for important data protection. The virtual disk technology establishes a container file in the file system to virtualize a disk that can be recognized by the operating system. The reading and writing of the disk is no different from the operation of the hard disk, and the user data ciphertext is stored in the container file through encryption technology. The virtual disk method is convenient and quick to protect data, and has b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F12/14G06F21/80
Inventor 赵斌
Owner SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products