Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and computing device for isolating power information and relying on it for power checking

A technology of power and inspection results, applied in the information field, can solve problems such as lack of effective mechanisms, and achieve the effect of avoiding unauthorized operations, single function, and simple processing

Active Publication Date: 2021-12-14
杨力祥
View PDF21 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Furthermore, there is no effective mechanism for user access control in the operating system, which makes it easy for the attack program to obtain beyond the authorization through the attack and maintain this state

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and computing device for isolating power information and relying on it for power checking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0058] An implementation method for "no interaction with the outside world during the calculation and processing of any power information" is:

[0059] Before shutting down, the general shutdown program of the kernel triggers a special program for power information synchronization to synchronize all the power information to the peripherals to ensure that the power information stored on the peripherals is consistent with the power information in the memory. The logic of this special program includes synchronizing power information on peripherals, and there is no other content, so as to ensure its single function and simple logic. The correctness of this special program can be confirmed through formal testing and exhaustive testing , it will not generate attacks by itself during synchronization and affect the reliability of power information.

Embodiment 3

[0061] An implementation method for "no interaction with the outside world during the calculation and processing of any power information" is:

[0062] Take creating a file as an example:

[0063] Through the system call soft interrupt, after entering the corresponding function MSU of the system call, the function MSU will receive parameters including the path of the file to be created, read and write attributes, and create file tags, etc., and will first call the power check MSU to perform permission checks, power checks The MSU will pass the passed parameters to the power information MSU. The specific inspection work is performed in the power information MSU by a special program for file power information processing, that is, by analyzing the path name, it is determined whether the current user has the right to access directory files at all levels. If the check is passed, finally create and add a file management structure for the target file (wherein the file authority attri...

Embodiment 4

[0069]An implementation method for "no interaction with the outside world during the calculation and processing of any power information" is:

[0070] Take writing to a file as an example:

[0071] Through the system call soft interrupt, after entering the function MSU corresponding to the system call, it will receive parameters including the file handle to write the target file, the address of the data to be written in the process space, and the number of bytes to be written. Call the power check MSU to perform permission check. The power check MSU will pass the passed parameters to the power information MSU. The specific checking work is carried out in the power information MSU by a special program for data block processing, and the file file management is obtained through the file handle. structure, check whether the file management structure is within the scope of the current user-operable file, if the check is passed, further obtain the data block index information, and d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access control method, which relates to information technology, in particular to the field of information security, including: ensuring the correctness of authority information and performing authority inspection based on the authority information. Ensuring the correctness of rights information includes: in the memory space, isolating the rights information and codes for maintaining it from the rest of the software system; during the calculation and processing of any rights information, no interaction with the outside world. The power checking based on the power information includes: checking the data processed by the software system at the designated position according to the power information during the completion of the task specified by the user. By applying the solution provided by the present invention, the power information will not be tampered by the attacker, and no effective attack result can be obtained.

Description

technical field [0001] The present application relates to the field of information technology, in particular to an access control technology and a technology for preventing attacks through power control. Background technique [0002] In the prior art, software inevitably has design flaws, and these flaws often become "loopholes" that can be exploited by attacks. For example, by using methods such as copying the array out of range, array out of bounds caused by the array subscript operation, etc., the attacker can use the prepared data to modify the data and code of the kernel, and then launch an attack. [0003] On this basis, the attacker can further modify the authorization information, change the authorization state, and obtain a state beyond authorization. In turn, operations such as the following can be performed: [0004] 1. Read user data (including memory and peripheral data) beyond authorization. [0005] 2. Writing (including tampering and deleting) user data be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06F21/52
CPCG06F21/57G06F21/52
Inventor 杨力祥
Owner 杨力祥
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products