Dependable computing based process control method

A process control and trusted computing technology, applied in the field of information security, can solve the problems of no protection, low efficiency, insufficient effect, etc., to prevent the modification of static files, ensure normal operation, and prevent damage.

Active Publication Date: 2013-12-18
STATE GRID CORP OF CHINA +5
View PDF8 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Some of the above-mentioned patents use trusted platform modules to realize hardware and system control, and focus on analyzing the underlying aspects of the operating system such as process generation and thread operation mechanism in the process. The protection technology does not consider the analysis and analysis of files occupied by the process. Protection, the implementation efficiency is not high, and the algorithm of the trusted platform module is not fully utilized. In addition, most of the considerations are to prevent external malicious processes from running, and it does not involve the protection of the processes that should be running, and the effect is insufficient.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dependable computing based process control method
  • Dependable computing based process control method
  • Dependable computing based process control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0050] The process control method provided by the present invention utilizes the measurement algorithm of the cryptographic chip of the trusted platform module to store the static process-related files of the process and the page space dynamically occupied in the memory, and store the integrity values ​​of these various resources in the In the process control module protected by the underlying hardware, it is protected from access and modification by malicious virus programs, thereby ensuring the health of the terminal running programs.

[0051] Specifically, the implementation of the process control method of this embodiment depends on the system architecture diagram, such as figure 2 As shown, the keys include the process control module, the integrity measurement module, and the policy file storing the integrity measu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a dependable computing based process control method. The process control method includes that a system is powered and a BIOS (basic input/output system) is started; the BIOS drives an operating system bootstrap program to start; the bootstrap program drives an integrity measurement module in an inner nuclear layer to start; the integrity measurement module drives a process control module in an operating system layer to start; the process control module is used for judging ordinary files, critical files and dynamic resources in process; the process control module and the integrity measurement module are used for controlling the ordinary files, the critical files and the dynamic resources to realize protection of the program. By the method, the files related to process operation are subjected to protection based on the dependable computing platform hardware algorithm, static files and the dynamic files are protected, permission of accessed files and mapping relation label pages are defended, and protective means are stereo and include the aspects of direct encryption storage, and inputting credibility quantity into a dependable computing platform register and the like, so that the process can be effectively controlled.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a process control method based on trusted computing. Background technique [0002] With the rapid development and wide application of information and network technology, a large number of various computer terminals are used in the information network, and the safe operation of the terminal is a difficult and important research point. In 1999, well-known IT companies such as IBM, HP, Intel and Microsoft initiated the establishment of the Trusted Computing Platform Alliance. The Alliance is committed to establishing a working group to formulate relevant standards for trusted computing. The working group defines the concept of trusted computing as being based on behavior. : An entity is trustworthy if it always behaves as expected. The main technical route of trusted computing is to first establish a root of trust in the computer system. The credibility of the root o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/52G06F21/55
Inventor 陈亚东张涛林为民马媛媛曾荣费稼轩华晔秦昊王玉斐邓松张波
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products