Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for enhancing trust of server operating system

An operating system and server technology, which is applied in the trust enhancement method and system field of the server operating system, can solve the problem that the internal information leakage or tampering of the terminal operating system cannot be prevented, and achieve the effect of preventing leakage or tampering

Inactive Publication Date: 2017-02-01
孙鸿鹏 +1
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, these traditional operating system security technologies can only prevent malicious attacks and unauthorized access from the outside, and cannot prevent the leakage or tampering of internal information of the terminal operating system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for enhancing trust of server operating system
  • Method and system for enhancing trust of server operating system
  • Method and system for enhancing trust of server operating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] see figure 1 The embodiment of the present invention provides a method for enhancing the trustworthiness of a server operating system. In the embodiment of the present invention, based on the trusted computing technology, the server terminal is managed uniformly through the management center. In the present invention, the method specifically includes the following steps:

[0059] Wherein, when realizing the trust enhancement of the server terminal, before constructing the UKey trust root, the management center first obtains the whitelist configuration file through the operation of step S101.

[0060] Step S101: The management center obtains the whitelist configuration file in the whitelist module. Further, the whitelist configuration file is obtained by the management center and stored in the whitelist module of the server. The whitelist module is an interface for program installation and only allows The interface installs the application program on the server, and st...

Embodiment 2

[0107] see Figure 6 , the embodiment of the present invention provides a server operating system trust enhancement system, the system is used to implement the above server operating system trust enhancement method. The system specifically includes: UKey module 60, identity authentication module 61, static trust chain establishment module 62 and dynamic trust chain establishment module 63, wherein,

[0108] UKey module 60 is used for constructing UKey root of trust;

[0109] The identity authentication module 61 is used for performing identity authentication based on the trusted root of the UKey;

[0110] After the static chain of trust establishment module 62 is used for identity authentication success, the operating system enters trusted guidance and establishes a static chain of trust;

[0111] The dynamic trust chain establishing module 63 is used for running the white list module based on the static trust chain, and establishing a dynamic trust chain.

[0112] In the e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and system for enhancing the trust of a server operating system, relating to the field of trusted computing. The method comprises the following steps: constructing a UKey trusted root; carrying out identity authentication based on the UKey trusted root; after the identity authentication is successful, introducing the operating system to enter trust guide so as to establish a static trust chain; and operating a white list module based on the static trust chain, and establishing a dynamic trust chain. By virtue of the complete transfer of the dynamic trust chain and the static trust chain, the safety and trust of the operating system are guaranteed.

Description

technical field [0001] The invention relates to the field of trusted computing, in particular to a server operating system trusted enhancement method and system. Background technique [0002] With the popularity of servers, the security of server operating systems has become an important issue that people pay attention to. How to realize the security of the server operating system and provide users with a reliable server computing environment has become an urgent problem to be solved. [0003] At present, for server security issues, especially server operating system security issues, traditional operating system security technologies such as firewalls, intrusion detection, and virus protection are mainly used to block illegal users who attempt to share information resources and access unauthorized access from the outside. [0004] However, these traditional operating system security technologies can only prevent malicious attacks and unauthorized access from the outside, an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/34
CPCG06F21/34
Inventor 孙鸿鹏席利宝
Owner 孙鸿鹏
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products