Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A secure computing architecture method and device based on multi-container separation processing

A technology that separates processing and computing architectures. It is applied in the protection of internal/peripheral computer components. It can solve problems such as lack of defense depth, damage to the normal operation of targets, and hidden dangers of single-container processing architectures.

Active Publication Date: 2021-09-10
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Whether the computing architecture of the existing computer system adopts single-core or multi-core, it is all based on the design idea of ​​a single physical container. The software system and file system are located in the same physical storage space, and the operating system and various application software are in the same storage space. The attack code can use various application software as intrusion vectors. Viruses, Trojan horses and other malicious software can break into the computer system through external interfaces such as network cards, optical drives, and USBs. pose a serious security threat
The traditional single-container computing architecture only considers the efficiency and reliability of computing functions, and its security completely depends on the terminal security protection system or cloud security protection implemented by software. Due to its inherent architectural defects, there is no defense flexibility and no Without defense in depth, the single-container computing architecture is difficult to defend against various unknown security threats. Any security vulnerability exploited may break the entire defense system. This is a inherent security risk of the single-container processing architecture. Today is almost defenseless
[0003] The essence of a network attack is to tamper with the system software of the target computer or insert malicious codes in the application software, or to steal the target's sensitive data, or to sneak into the target's dynamic memory to obtain the opportunity to execute, or to destroy the normal operation of the target

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure computing architecture method and device based on multi-container separation processing
  • A secure computing architecture method and device based on multi-container separation processing
  • A secure computing architecture method and device based on multi-container separation processing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] All features disclosed in this specification, or steps in all methods or processes disclosed, may be combined in any manner, except for mutually exclusive features and / or steps.

[0066] Any feature disclosed in this specification, unless specifically stated, can be replaced by other alternative features that are equivalent or have similar purposes. That is, unless expressly stated otherwise, each feature is one example only of a series of equivalent or similar features.

[0067] The computing architecture method and device proposed by the present invention include four different processing containers (elastic defense container C1, elastic defense container C2, security isolation container and security storage container), three kinds of external physical security locks (computer external interface Lock, external physical lock of system software FLASH and external physical lock of sensitive file FLASH), FLASH internal logic lock, and various mechanisms to ensure safe com...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of secure computer architecture, in particular to a method and device for a secure computing architecture based on multi-container separation processing. The computing architecture method proposed by the present invention includes four different processing containers, adopting container security isolation, container collaborative defense, external physical lock and internal logical lock security control, dynamic memory security cleaning, software behavior independent supervision, sensitive file Various security mechanisms such as security processing and protection, electronic payment password protection, separate installation of operating system software and application software, security upgrade of system software, etc., implement strict security processing control and operation procedures on the proposed secure computing architecture, and finally achieve for secure computing purposes.

Description

technical field [0001] The invention relates to the field of secure computer architecture, in particular to a method and device for a secure computing architecture based on multi-container separation processing. Background technique [0002] Whether the computing architecture of the existing computer system adopts single-core or multi-core, it is all based on the design idea of ​​a single physical container. The software system and file system are located in the same physical storage space, and the operating system and various application software are in the same storage space. The attack code can use various application software as intrusion vectors. Viruses, Trojan horses and other malicious software can break into the computer system through external interfaces such as network cards, optical drives, and USBs. pose a serious security threat. The traditional single-container computing architecture only considers the efficiency and reliability of computing functions, and it...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/71G06F21/74
CPCG06F21/71G06F21/74
Inventor 李大双赵越苏宏
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products