Embedded system and implementation method of secure operating system

A security operating system and embedded system technology, applied in the direction of memory address/allocation/relocation, etc., can solve problems such as the limitation of protection function, and achieve the effect of ensuring security and reliability and ensuring system security.

Active Publication Date: 2014-03-05
湖南长城科技信息有限公司 +1
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to protect the operating system and its key data from being damaged by malicious programs, technologies such as antivirus software and data encryption have emerged. These technologies can protect the operating system and its key data to a certain extent, but they are based on the operating system. It is not part of the operating system itself, so the protection is limited, and the security of these protection programs themselves also needs attention

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embedded system and implementation method of secure operating system
  • Embedded system and implementation method of secure operating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] Such as Figure 1-2, a method for implementing a secure operating system, in which an encryption chip that supports the RSA asymmetric encryption algorithm and can provide a 2048-bit private key and a protected non-volatile memory are set in the hardware system; the memory is FLASH memory;

[0047] On the basis of the Linux operating system, the process (PP) carrying the public key is authenticated based on an asymmetric encryption algorithm. If the authentication is passed, the process management module (PM) of the operating system allows the process to continue running. If the authentication fails, the process The management module (PM) prohibits the process from running;

[0048] The authentication process is:

[0049] 1): The process (PP) carrying the public key is started by the process management module (PM), and the public key is submitted to the process management module, after which the process carrying the public key enters a waiting state;

[0050] 2) Afte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an embedded system and an implementation method of a secure operating system. A hardware system comprises an encryption chip which supports an RSA asymmetric encryption algorithm and can provide 2048-bit private keys, and a protected nonvolatile memory. A software system carries out asymmetric encryption algorithm authentication on progresses on the basis of a Linux operating system, operations related to the private keys are accomplished in a specific memory region, namely a section with a hidden address, of the protected nonvolatile memory, only the progresses which pass authentication can run in the secure operating system at the moment, and the progresses which do not pass authentication can be killed. Due to the fact that the secure operating system has the memory protection function, the key authentication function and the like, the secure operating system is a trusted computing framework system, and has high safety. The secure operating system is mainly used in the special fields, such as the security field and confidentiality field, and can be matched with hardware systems of universal PCs, embedded tablet personal computers and the like.

Description

technical field [0001] The invention relates to an embedded system and a method for realizing a safe operating system. Background technique [0002] With the development of computer technology, more and more attention has been paid to system security, and the operating system, as a key component of the computer system, has received more consideration for its security features. In order to protect the operating system and its key data from being damaged by malicious programs, technologies such as anti-virus software and data encryption have emerged. These technologies can protect the operating system and its key data to a certain extent, but they are based on the operating system. It is not part of the operating system itself, so the protective effect is limited, and the security of these protection programs themselves also needs attention. After the "Prism Gate" incident, many well-known application software and operating systems may have "backdoors". Therefore, whether the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/02
Inventor 刘智臣肖弱谭永祥孙文德聂世刚黄波
Owner 湖南长城科技信息有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products