Method for establishing trusted path in secure operating system

A secure operating system and trusted path technology, applied in the field of secure operating system design, can solve security problems and other issues, and achieve the effect of protecting system security

Inactive Publication Date: 2012-12-19
INST OF SOFTWARE - CHINESE ACAD OF SCI +1
View PDF2 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In computer systems, users generally do not directly deal with the kernel, and there is an application layer in the middle that acts as an interface to interact between users and the kernel. It also brings security problems. The access path of users or applications to the system is intercepted or tampered with by illegal programs, which is one of the typical security holes in the operating system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for establishing trusted path in secure operating system
  • Method for establishing trusted path in secure operating system
  • Method for establishing trusted path in secure operating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The trusted path mechanism refers to a mechanism that enables end users to communicate directly with the Trusted Computing Base (TCB) of computer information systems. Trusted Computing Base (TCB) is "the totality of protection devices in a computer system, including hardware, firmware, software, and a combination responsible for implementing security policies. It establishes a basic protection environment and provides a trusted computing system. additional user services". The trusted computing base generally referred to is the combination of all security protection devices (commonly referred to as security subsystems) that constitute a secure computer information system to prevent interference and tampering by untrusted subjects. Trusted computing base is a concept in the field of computer security information protection, which does not depend on a specific operating system. According to the requirements of the standard (GB / T20272 / 20271-2006) on the trusted path of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for establishing a trusted path in a secure operating system. The access of any course to a terminal requires arbitration of a trusted path system; the design core of the trusted path system is a trusted program list and a trusted course list; and the terminal can be operated by the course only when access is allowed after the two lists of the trusted path system are verified.

Description

technical field [0001] The invention belongs to the field of safe operating system (OS) design, in particular to a method for establishing a trusted path in the safe operating system. Background technique [0002] In computer systems, users generally do not directly deal with the kernel, and there is an application layer in the middle that acts as an interface to interact between the user and the kernel. It also brings about security problems. It is one of the typical security holes in the operating system that the access path of users or application programs to the system is intercepted or tampered with by illegal programs. When users log in to the system, they first access the login verification program, but unauthorized programs or Trojan horses may intercept this process, replace the login program with fake components, intercept user passwords, or perform unauthorized harmful operations. The GINA Trojan horse destroys the communication between the user and the system by...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/20
Inventor 刘燕刘冬梅赵强周启明龚文王戍靖郎金刚
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products