Method and device for realizing integrity protection of operating system
An integrity protection and operating system technology, applied in the field of operating system integrity protection, can solve problems such as failure, failure to guarantee the correctness of inspection results, hijacking of functional modules, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0086] In order to facilitate the understanding of those skilled in the art, the present invention will be further described below in conjunction with the accompanying drawings, which cannot be used to limit the protection scope of the present invention. It should be noted that, in the case of no conflict, the embodiments in the present application and various manners in the embodiments can be combined with each other.
[0087] see figure 1 , the embodiment of the present invention proposes a method for implementing integrity protection of the operating system, including:
[0088] Step 100, the trusted control core module acquires the metric values corresponding to one or more metric parameters of the monitored operating behavior in the protected operating system and / or virtual machine monitoring module, and sends the metric values of all the metric parameters obtained to the Faith measurement module.
[0089] In this step, the measurement parameters include one or more ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

