Dual-architecture trusted operating system and method

A system structure and operating system technology, applied in the direction of multi-program device, program control design, instrument, etc., to achieve resource security, increase security, and ensure security

Active Publication Date: 2019-08-27
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +2
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the embodiment of the present invention provides a dual-architecture trusted operating

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dual-architecture trusted operating system and method
  • Dual-architecture trusted operating system and method
  • Dual-architecture trusted operating system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative efforts fall within the protection scope of the present invention.

[0021] The early research on the security operating system architecture was concentrated on the basis of the macro-kernel operating system, which can be divided into standard-oriented security architecture and application-oriented security architecture. attack. Therefore, the security architecture of the operating system based on the microkernel is gradually...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a dual-architecture trusted operating system and method, and the system comprises a common computing kernel, a trusted computing kernel, a monitoring management module and a hardware mangament module as well as a memory mangament module. The common computing kernel is configured with a trusted computing kernel agent for obtaining a common computing kernel state request forprocessing, and carrying out semantic analysis on kernel semantics through a trusted computing kernel agent, and sending the kernel semantics to the trusted computing kernel. The trusted computing kernel comprises a kernel strategy module used for generating a trusted computing strategy and analyzing the semantics of the common computing kernel. The monitoring management module is used for monitoring, measuring and controlling the state of the common computing kernel. The hardware management module is used for distributing and scheduling hardware resources according to a trusted computing strategy. The memory management module is used for allocating and scheduling the memory resources according to the trusted computing strategy. System operation can be actively protected on the basis of not interfering system services, and the trusted computing kernel is compatible with various computing architectures and is more suitable for being applied to terminals with diversified service softwareand hardware environments or high security levels.

Description

technical field [0001] The invention relates to the technical field of operating system security, in particular to a dual-architecture trusted operating system and a method thereof. Background technique [0002] The early research on the security operating system architecture was concentrated on the basis of the macro-kernel operating system, which can be divided into standard-oriented security architecture and application-oriented security architecture. attack. Therefore, the security architecture of the operating system based on the microkernel is gradually recognized. After the concept of trusted computing was proposed, there have been many researches on the security architecture combined with the idea of ​​trusted computing, such as the PERSEUS system of the typical representative L4 microkernel. , Google's ASM framework and GP's TEE architecture, etc. Among them, PERSEUS improves the isolation and operating efficiency between processes on the basis of Mach, and provid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57G06F9/50
CPCG06F9/5016G06F9/5027G06F21/57
Inventor 赵保华高昆仑王志皓梁潇安宁钰任春卉
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products