Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure container and design method thereof

A security container and design method technology, applied in the field of information security, can solve problems such as hidden dangers, attacks, failure to completely solve network information security problems, etc., and achieve the effect of ensuring its own security

Inactive Publication Date: 2015-04-29
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF3 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Today, the establishment of these security systems has played a great role, but these security systems still have not completely solved the problem of network information security
The security issues of the system were not paid attention to in the past, leaving many hidden dangers
For example: Although the user has installed an anti-virus, the PC will still be infected with viruses, Trojan horses, and hackers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure container and design method thereof
  • Secure container and design method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0035] as attached figure 1 As shown, the security container of the present invention utilizes three mechanisms of mandatory access control, resource isolation and trusted measurement, so that a group of processes can be run in a region, and this group of processes can only perform operations on the resources (CPU, memory, etc.) of the region. Access, cannot access resources outside this area, and processes outside this area cannot access resources in this area, and conduct credible verification of policies in this area and applications in the area, and make different responses according to the verification results , this region forms a secure container.

[0036] The security container design framework of the present invention is as attached figure 2 As shown, first add one or more applications to be protected or files to be accessed by programs to the security container, generate a series of policies by configuring the access rights of these programs or files, and specify ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure container and a design method thereof, belonging to the technical field of information safety. The secure container disclosed by the invention is characterized in that a secure area is constructed in an operation system; a set of processes is operated in the area by utilizing the three mechanisms including mandatory access control, resource isolation and trusted measurement; the set of processes is only capable of accessing resources in the area and is incapable of accessing resources outside the area; processes outside the area are also incapable of accessing resources in the area; and furthermore, the strategy of the area and application in the area need to be subjected to trusted measurement. Compared with the prior art, the secure container disclosed by the invention is capable of resisting various attacks in a network through the operation system level; therefore, the network information security problem is thoroughly solved; and the secure container and the design method thereof disclosed by the invention have good popularization and application value.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a security container and a design method thereof. Background technique [0002] With the development of the Internet, the network has spread to every corner of our life. The Internet and local area network have become an important part of our life, and the security problems of the network have been exposed. In order to ensure the security of the network, a lot of energy has been spent to establish a network security system, mainly including VPN, firewall, virus detection and other security systems. Today, the establishment of these security systems has played a great role, but these security systems still have not completely solved the problem of network information security. The security issue of the system was not paid attention to in the past, leaving many hidden dangers. For example: Although the user has installed an anti-virus, the PC will still be infected w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/53
CPCG06F21/53G06F2221/033
Inventor 赵媛
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products