Trusted kernel-based anti-attack data processor

A data processor and kernel technology, applied in the field of information security, can solve problems such as system crashes and achieve the effect of switching security

Active Publication Date: 2017-12-12
C SKY MICROSYST CO LTD
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, attackers can still use a series of methods to attack the trusted kernel in non-secure mode to obtain sensitive data, etc., and even cause the system to crash

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted kernel-based anti-attack data processor
  • Trusted kernel-based anti-attack data processor
  • Trusted kernel-based anti-attack data processor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is only some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0028] The invention provides an anti-attack data processor based on a trusted kernel. figure 1 A schematic diagram of the basic architecture of the data processor provided by the present invention is shown. Such as figure 1 As shown, the data processor includes a trusted kernel exception vector table, a trusted kernel stack pointer registe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a trusted kernel-based anti-attack data processor. The data processor comprises a trusted kernel exception vector table used for providing a processing entry of kernel switching, a trusted kernel stack pointer register used for storing a trusted kernel stack pointer pointing to a trusted kernel stack space, and a trusted scene located in the trusted kernel stack space and comprising a program state register used for storing an initial kernel flag bit of the kernel switching, a program pointer and a universal register. When the data processor executes the kernel switching from a non trusted kernel to a trusted kernel, the trusted kernel is addressed to the processing entry of the kernel switching and the switching is executed. According to the processor, a bottom software protection mechanism can be provided for the switching entry of the trusted kernel, so that the switching of the trusted kernel and the non trusted kernel is securer.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an anti-attack data processor based on a trusted kernel. Background technique [0002] With the development of the mobile Internet and the Internet of Things and the wide application of information technology in production, operation, and management, the human economy and society are increasingly dependent on networks and information systems. Incidents such as virus attack, hacker attack and information theft occur from time to time, making the system security work increasingly important and attracting people's attention. [0003] At present, the security of system information has been guaranteed to a certain extent by introducing the security mode. In safe mode, the system truly implements hardware isolation. The system kernel runs at the highest privilege layer of the entire system, manages and controls the underlying hardware resources, and provides securely iso...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/74G06F21/57
CPCG06F21/57G06F21/74G06F9/545G06F21/52G06F21/556
Inventor 崔晓夏李春强侯光恩陈理
Owner C SKY MICROSYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products