Host kernel data reduction and protection method

A core data, active protection technology, applied in digital data protection, electrical digital data processing, platform integrity maintenance, etc., to reduce overhead, reduce performance overhead, and improve reliability.

Inactive Publication Date: 2016-11-09
王波
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of these methods use virtual machines to implement attack detection, but how to improve the efficiency of virtualization, reduce the difficulty of its development, realize lightweight trusted computing, and take into account system security and code availability have yet to be resolved.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Host kernel data reduction and protection method
  • Host kernel data reduction and protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0029] refer to figure 1and figure 2 As shown, the present invention provides a host kernel data restoration and protection method, which is divided into two parts: establishing a kernel data restoration method system and designing a kernel data active protection prototype system.

[0030] A. Establish the kernel data restoration method system as follows:

[0031] Before realizing kernel data restoration, it is first necessary to obtain kernel data and perform corresponding processing on it, including analysis and reorganization sorting. This restoration method first captures kernel data packets, and the kernel uses the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a host kernel data reduction and protection method. The method comprises two steps as follows: a kernel data reduction method system is established, and a kernel data active protection prototype system is designed; before the kernel data are reduced, the kernel data need to be obtained firstly and are subjected to corresponding processing including analysis and reorganization and sorting, and based on a kernel data protection principle, the kernel data active protection prototype system HV-KDAP adopting hardware virtualization is designed, HV-KDAP aims to protect the kernel data, codes and relevant registers, prevent from being tampered with by malicious codes and be compatible with normal operation of other functions of an operation system. An active memory management method based on memory pre-allocation is adopted, a group of user interface API (application programming interface) function libraries are provided and allowed to be called by users in a source program, the requirement for software fault tolerance of a high-reliability system is met, and the integrity protection of a kernel is directly realized with a hardware virtualization technology, so that the application range of the technology is expanded.

Description

technical field [0001] The invention relates to the technical field of kernel data protection, in particular to a method for restoring and protecting host kernel data. Background technique [0002] Global network interconnection has brought convenience to people's life and work, and people are enjoying the better life brought by network technology. But at the same time, some criminals use the loopholes of the network to illegally invade other people's host systems, and some use the network to steal other people's personal information, such as online bank account passwords, etc., posing a major threat to the safety of other people's property. At present, our country is undergoing large-scale modern economic construction, and needs to use its own information security system to protect its own network and information system, especially for national large-scale computer networks, network security and information security must be given top priority status. Faced with this situa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/52G06F21/56
CPCG06F21/62G06F21/52G06F21/566
Inventor 王波
Owner 王波
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products