Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Concept lattice-based software credibility measurement method and device

A technology of concept lattice and credibility, applied in the direction of electronic digital data processing, instrument, platform integrity maintenance, etc., to avoid repeated measurement and speed up

Pending Publication Date: 2020-03-17
SHENZHEN ZTE NETVIEW TECH +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem mainly solved by the present invention is: effectively solve the problem that the modules that the software process depends on need to be re-measured and verified every time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Concept lattice-based software credibility measurement method and device
  • Concept lattice-based software credibility measurement method and device
  • Concept lattice-based software credibility measurement method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] This embodiment provides a software credibility measurement method based on concept lattice, please refer to figure 1 , including the following steps:

[0049]Step 102, obtain the software process to be measured; the method for measuring software trustworthiness in this embodiment is to carry out trusted security maintenance for the entire computer operating system. When the computer operating system is started, the method starts. Each software process in the system performs trust measurement, which can passively obtain the software process to be measured, that is, the trust measurement method in this embodiment is set to a dormant state, and when each software process is started in the operating system, it is woken up for measurement , it can also be to actively acquire the software process to be measured, which can be acquired by actively scanning the software process in the operating system at an interval of time, and can also combine passive acquisition and active ...

Embodiment approach

[0054] For the concept lattice, it is necessary to construct an initial concept lattice first. No concept with data is inserted in the initial concept lattice, which only includes the bottom concept and the top concept. Therefore, the preset concept lattice in this embodiment includes: The lattice structure generation direction generates bottom concept and top concept. The direction of lattice structure generation is the direction stipulated when constructing the concept lattice, which can be in various ways such as top-down or bottom-up. In one implementation mode, such as figure 2 As shown, the bottom concept and the top concept are generated according to the top-down direction; the top concept is set to maximize the extension and minimize the intension, and set the bottom concept to minimize the extension and maximize the intension. figure 2 Among them, the top concept top means and , that is, record the top concept as the concept top And the concept bottom, and form th...

Embodiment 2

[0075] See Figure 7 , on the basis of Embodiment 1, this embodiment provides a method for credible verification of dependent modules, including:

[0076] The measurement result of each dependent module is ANDed with the preset root of trust, and then the preset measurement benchmark and the calculation result are trusted and verified. If the trusted verification results are consistent, the dependent module is in a trusted state .

[0077] Such as Image 6 As shown, the measurement result of each dependent module is ANDed with the preset root of trust, for example, the measurement result Hash value 1 of the module Ntdll.dll is ANDed with the initial root of trust, and then the calculation result is compared with the predetermined A good measurement benchmark 1 is verified and compared. If the verification results are inconsistent, it means that the module Ntdll.dll has been tampered with. At this time, the measurement and trusted verification will be terminated and an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a concept lattice-based software credibility measurement method and device. The method comprises the steps of obtaining a to-be-measured software process; searching a subset ofthe module set on which the to-be-measured software process depends in a preset concept lattice, if the subset is found, obtaining a measurement result of the subset through the concept lattice, andperforming measurement and credibility verification on the to-be-measured software process according to the measurement result of the subset; otherwise, subjecting modules on which the to-be-measuredsoftware process depends to measurement and credibility verification one by one; and generating a concept from a module on which the software process subjected to credibility verification depends anda measurement result of the module, and inserting the generated concept into the concept lattice and updating the concept lattice. As the measurement process of the software process is combined with concept lattice construction, repeated measurement of related modules of a plurality of software processes in a computer system is avoided, and the speed of the software measurement process and the credibility verification is further increased.

Description

technical field [0001] The invention relates to the technical field of trustworthiness and safety monitoring, in particular to a method and device for measuring software trustworthiness based on concept lattices. Background technique [0002] Trusted Computing (Trusted Computing) is a secure computing technology promoted and developed by Trusted Computing Group (Trusted Computing Group, TCG), which has emerged in recent years. Trusted computing platforms based on hardware security modules are widely used in the computing and communication fields. To improve the security and integrity of the entire system and application software. [0003] The core of trusted computing is measurement and trusted verification, that is, level-by-level measurement from the bottom up, usually using the code of the software and hardware (such as security chips and CRTM) that are started first as the root of trust / root of trust, and using This is used as a benchmark to measure and verify the softw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/56G06F2221/033
Inventor 谭喆钱新红黄启明
Owner SHENZHEN ZTE NETVIEW TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products