Method and system for protecting data structure in Linux kernel initialization based on TPM (Trusted Platform Module)
A data structure and initialization technology, applied in the direction of digital data protection, platform integrity maintenance, etc., can solve problems such as large amount of tool code, malicious code injection or dynamic modification of data structure that cannot be found in time, and unfavorable replay attacks.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0080] Taking GRUB-0.9.7 as the boot loader and the initialization of the Linux-2.6.32 kernel as an example, the data structure protection method in the TPM-based Linux kernel initialization of the present invention is further described.
[0081] figure 1 It is a flow chart of the data structure protection method in the TPM-based Linux kernel initialization of the present invention. Such as figure 1 As shown, the method includes:
[0082] Step 1. Calculate the integrity metric of the Linux kernel after booting the loader and record it as Kernel-Integrity-Value1;
[0083] Step 2: Digitally sign the Kernel-Integrity-Value1 and initialize the data structure as Loader_Secure_Data;
[0084] Step 3. Send the Loader_Secure_Data to the Linux kernel;
[0085] Step 4. Verify the integrity of the Linux kernel and decompress the Linux kernel;
[0086] Step 5: Perform TPM-based data binding operations on initializing page tables, initializing GDT tables, and initializing IDT tables respectively;
[0...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap