Method and system for enhancing trust of server operating system
An operating system and server technology, which is applied in the trust enhancement method and system field of the server operating system, can solve the problem that the internal information leakage or tampering of the terminal operating system cannot be prevented, and achieve the effect of preventing leakage or tampering
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0058] see figure 1 The embodiment of the present invention provides a method for enhancing the trustworthiness of a server operating system. In the embodiment of the present invention, based on the trusted computing technology, the server terminal is managed uniformly through the management center. In the present invention, the method specifically includes the following steps:
[0059] Wherein, when realizing the trust enhancement of the server terminal, before constructing the UKey trust root, the management center first obtains the whitelist configuration file through the operation of step S101.
[0060] Step S101: The management center obtains the whitelist configuration file in the whitelist module. Further, the whitelist configuration file is obtained by the management center and stored in the whitelist module of the server. The whitelist module is an interface for program installation and only allows The interface installs the application program on the server, and st...
Embodiment 2
[0107] see Figure 6 , the embodiment of the present invention provides a server operating system trust enhancement system, the system is used to implement the above server operating system trust enhancement method. The system specifically includes: UKey module 60, identity authentication module 61, static trust chain establishment module 62 and dynamic trust chain establishment module 63, wherein,
[0108] UKey module 60 is used for constructing UKey root of trust;
[0109] The identity authentication module 61 is used for performing identity authentication based on the trusted root of the UKey;
[0110] After the static chain of trust establishment module 62 is used for identity authentication success, the operating system enters trusted guidance and establishes a static chain of trust;
[0111] The dynamic trust chain establishing module 63 is used for running the white list module based on the static trust chain, and establishing a dynamic trust chain.
[0112] In the e...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com