System and method for trusted operating system to create trusted process based on trusted chip

An operating system and trusted technology, applied in the field of information security, can solve problems such as leakage of sensitive data, memory leakage, resource security threats, etc., to achieve the effect of avoiding security threats, ensuring security, ensuring confidentiality and privacy

Active Publication Date: 2017-07-07
DATANG GAOHONG XINAN ZHEJIANG INFORMATION TECH CO LTD
View PDF8 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The process is the basic unit of the operating system structure and the entity of the program. When the process is executed, various resources (memory, storage, configuration files, etc.) in the system need to coordinate ac...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for trusted operating system to create trusted process based on trusted chip
  • System and method for trusted operating system to create trusted process based on trusted chip
  • System and method for trusted operating system to create trusted process based on trusted chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0035] figure 1 It is a system composition block diagram of the present invention. As shown in the figure, the system for creating a trusted process based on a trusted operating system based on a trusted chip disclosed in the present invention is implemented based on a trusted chip. The system is installed with a trusted operating system. The system includes a system for The trusted process monitoring module monitors and manages communication between trusted processes, and the process management module is used to manage ordinary processes, trusted processes and their flags. The memory unit is divided into trusted memory areas for running trusted processes, which can The trusted process is encrypted and runs in the trusted memory area, which can be isolated from the ordinary memory area in the memory unit where ordinary processes run.

[0036]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a system and a method for a trusted operating system to create a trusted process based on a trusted chip. The method comprises: installing the trusted operating system on a hardware system based on the trusted chip, creating a trusted process, and after encrypting the trusted process, operating the encrypted trusted process in a trusted memory area of a memory unit. Communication cannot be implemented between the trusted process and the general process, and effective isolation is realized between the trusted process and the general process in the memory space and data communication, so that the potential risk to the trusted process caused by the general process can be effectively avoided, and security of sensitive data can be guaranteed. According to the system and the method provided by the present invention, system security is guaranteed comprehensively from hardware to the operating system and to the application process; and according to the system platform established based on the present invention, not only use requirements of ordinary users can be satisfied, but also specific requirements of institutional users with high requirements for data security can be satisfied.

Description

technical field [0001] The invention relates to a system and method for creating a trusted process based on a trusted operating system of a trusted chip, belonging to the technical field of information security. Background technique [0002] In today's era, with the rapid development of information network technology, information data has become a strategic resource concerning the overall situation, and important network information systems have become the lifeline of the country. As the underlying platform support, the security of the operating system is particularly important. [0003] The process is the basic unit of the operating system structure and the entity of the program. When the process is executed, various resources (memory, storage, configuration files, etc.) in the system need to coordinate actions to ensure the normal operation of the system. Intrusion into the system will pose a security threat to normal processes and their resources. On the other hand, once...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/74
CPCG06F21/74
Inventor 郑驰梁思谦
Owner DATANG GAOHONG XINAN ZHEJIANG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products