Safe remote loading method of operating system

An operating system and remote technology, applied in transmission systems, electrical components, digital data authentication, etc., can solve problems such as operating system measurement and operating system tampering

Active Publication Date: 2017-07-11
GUANGZHOU UNIVERSITY
View PDF9 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, although Secure Boot is incorporated into the OS boot process as an optional feature during the UEFI boot pha...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe remote loading method of operating system
  • Safe remote loading method of operating system
  • Safe remote loading method of operating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to make the purpose of the invention, technical solution and beneficial technical effects of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods. It should be understood that the specific implementations described in this specification are only for explaining the present invention, not for limiting the present invention.

[0019] In this embodiment, the TFTP server and the FTP server use Ubuntu14.04 as the operating system, and the database is MySQL; the client (computer to be loaded) is a desktop computer, and the operating system to be loaded is Windows7.

[0020] see figure 1 , figure 2 with image 3 , the safe remote loading method of the operating system in this embodiment includes the following steps:

[0021] Step 1. set up trusted list on the server that has configured Dynamic Host Configuration Protocol (Dynamic Host Configur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safe remote loading method of an operating system. The safe remote loading method comprises the following steps: (1) a legality verification step of a computer to be subjected to loading; (2) a remote loading step of the operating system; (3) an integrity measurement step of the operating system in a loading process. Aiming at the problem that current security software cannot process operating system-level malicious programs, the integrity of the operating system can be measured before the operating system is started up, so that the environment security before startup is guaranteed.

Description

technical field [0001] The invention relates to a method for remotely loading an operating system, and more specifically, relates to a method for safely remotely loading an operating system. Background technique [0002] With the rapid development of cloud computing today, data security issues are becoming more and more serious. While using security software to ensure computer security, it is also a very important task to protect the security of operating system loading. At present, the technologies for realizing the security protection of the operating system are very rich, but the security protection measures for the loading environment of the operating system, the loading process of the operating system and the remote loading are still not perfect. In the process of remotely loading the operating system, the security and integrity of the operating system are difficult to guarantee. At the same time, due to the insecure network transmission, the operating system may be tam...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/44H04L29/06H04L29/12
CPCH04L63/08H04L63/101G06F21/44H04L61/5014
Inventor 王国军孟大程陈淑红谢冬青
Owner GUANGZHOU UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products