Operating system kernel mandatory access control method and system based on TEE extension
A mandatory access control and access control technology, applied in the direction of instrument, platform integrity maintenance, digital data protection, etc., can solve problems such as failure of access control mechanism, and achieve the effect of comprehensive protection, good versatility and high verification level
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] In the following, the TEE environment (Trusted Execution Environment, trusted execution environment) of the domestic Feiteng CPU will be used as an example to further describe the method and system for forced access control of the operating system kernel based on the TEE extension of the present invention. Among them, the REE system under the REE environment (Rich Execution Environment, general computing environment) runs the Kylin operating system, and the mandatory access control module is implemented through the LSM access control framework.
[0025] Such as figure 1 As shown, the implementation steps of the operating system kernel mandatory access control method based on TEE extension in this embodiment include:
[0026] 1) When an access behavior is detected in the REE system (Universal Operating System), the interface of the access control enhanced verification framework in the TEE system (Trusted Execution System) is called, which is based on the access operation type ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

