A Trusted Technology Compatibility Testing Method Based on nkv6.0 System

A compatibility test and compatibility technology, applied in the computer field, can solve problems such as inability to execute, affect software performance, and different operating results, and achieve the effect of ensuring safety and quality

Active Publication Date: 2021-02-09
CHINA STANDARD SOFTWARE
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because different hardware configurations may affect the performance of the software, some software may have different running results or cannot be executed at all in different hardware environments;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Trusted Technology Compatibility Testing Method Based on nkv6.0 System
  • A Trusted Technology Compatibility Testing Method Based on nkv6.0 System
  • A Trusted Technology Compatibility Testing Method Based on nkv6.0 System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0128] Embodiment 1: Trusted operation control checks file integrity protection compatibility

[0129] 1. Test description

[0130] Verify CTMM's integrity measurement of kernel modules and executable files loaded during operation, and compare the measurement results with the baseline value of the whitelist. If the verification fails, the loading of the module or the execution of the application is rejected.

[0131] 2. Preconditions

[0132] (1) The machine under test has a TCM chip, and the NKV6.0 system has been installed;

[0133] (2) ctmm is on;

[0134] (3) The executable program ntsysv exists under / usr / sbin and is in the whitelist.

[0135] 3. Operation steps

[0136] Step 1: The secadm user logs in to the NKV6.0 system and enters the Trusted Management Center: Click "Start" - "System Tools" - "Security Control Management Center" in sequence - double-click to enter the Trusted Management Center;

[0137] Step 2: Set the executable file to strict mode: click "Setti...

Embodiment 2

[0151] Example 2: Trusted Management Center adds a whitelist test

[0152] 1. Test description

[0153] Verify that the system can be scanned in the Trusted Management Center and the scanned files can be added to the whitelist.

[0154] 2. Test premise

[0155] (1) The machine under test has a TCM chip, and the NKV6.0 system has been installed;

[0156] (2) There is a test script file test3 in the " / tmp / lvl4" directory, and this file does not exist in the whitelist;

[0157] (3) ctmm status is on and standard / normal scripts are set to loose mode.

[0158] 3. Operation steps

[0159] Step 1: Run the test script file test3 and execute the command:

[0160][secadm@locahost~]$cd / tmp / lvl4

[0161] [secadm@locahost~]$. / test3

[0162] Step 2: After editing the contents of the script file test3, run again:

[0163] [secadm@locahost~]$ vim test3

[0164] [secadm@locahost~]$. / test3

[0165] Step 3: The secadm user logs in to the NKV6.0 system and opens the "Trusted Management...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a trusted technology compatibility testing method based on NKV6.0 system, comprising: trusted boot test: used to measure NKV6.0 system kernel image, initrd and startup configuration files by using TCM chip in the grub stage; trusted Interface test: used to verify the implementation of the interface for operating TCM trusted chips for NKV6.0 systems and applications; trusted operation control test: used to verify the integrity of CTMM’s kernel modules and system configuration files loaded during operation Metrics; Trusted Management Center Test: Used to verify the graphical management of the responsible system metrics whitelist. The invention can ensure that the trusted guidance module, the trusted chip interface execution module, the trusted operation control module and the trusted management center in the trusted technology can work perfectly and stably in the NKV6.0 system, ensuring its NKV6. 0 security quality of trusted technology in the system.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a trusted technology compatibility testing method based on NKV6.0 system. Background technique [0002] Trusted computing is a trusted computing platform supported by hardware security modules that is widely used in computing and communication systems. After years of development, trusted computing technology has been widely used abroad. At present, the statistics of terminals integrated with trusted computing technology Types of equipment reached more than 1.9 billion sets. It fundamentally improves the security of the computer system, and is an effective technical means to solve the security problems of new technology applications such as cloud security and the Internet of Things. [0003] At present, the Trusted Computing Group (TCG-Ttrusted Computing Group) has a great influence on trusted computing in the world. At the same time, standards such as TPM1.2 and TPM2.0 have al...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/36
CPCG06F11/3684G06F11/3688
Inventor 潘婷申利飞
Owner CHINA STANDARD SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products