White list library file protection method based on trusted computing

A technology of trusted computing and library files, applied in computing, digital data protection, computer security devices, etc., can solve problems such as the inability to properly solve the problem of illegal acquisition of secrets, the inability to perform security functions normally, and the loss of the meaning of comparison. High security protection strength, real and effective protection, high security protection effect

Active Publication Date: 2021-01-08
上海思赞博微信息科技有限公司
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The whitelist library file is one of the foundations of the whitelist security mechanism. Once the library file is tampered with but not found, the security application loses the meaning of comparing with the whitelist list and cannot perform security functions normally.
Most of the security applications will protect the whitelist library files to a certain extent, but the software-based protection methods have never been able to properly solve the problem of illegally obtained secrets, leaving security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • White list library file protection method based on trusted computing
  • White list library file protection method based on trusted computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0023] see Figure 1-2 , the present invention provides a technical solution: a whitelist library file protection method based on trusted computing, comprising the following steps:

[0024] The first step: the trusted service agent (A) joins in the startup trusted chain, and the measurement value of the trusted service agent (A) is extended to the platform configuration register (PCR) when the system starts;

[0025] Step 2: the security application sends a self-t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a white list library file protection method based on trusted computing, which comprises the following steps: firstly, extending a metric value of a trusted service agent into aspecified platform configuration register, then measuring a white list library file after receiving an encapsulation request, and calculating a file hash value; performing data encapsulation on the measured hash value and a specified platform configuration register, measuring the white list library file again after a verification request is received, decapsulating encapsulated data, and finally comparing the two hash values to judge whether the library file is modified or not. High-security white list library file protection can be realized, the packaged data is generated by the state of thetrusted service agent and the white list library file metric value together with the trusted cryptographic chip, and any one of the trusted service agent, the white list library file and the trusted chip can be discovered in time when being tampered; and the white list library file is protected to be real and effective.

Description

technical field [0001] The invention relates to the technical field of trusted computing security, in particular to a trusted computing-based whitelist library file protection method. Background technique [0002] White list is a kind of security technology and has been used in many security applications, such as firewall, mail system, authorized access system and so on. The whitelist mechanism is to add "good" and "allowed" program information or data information to the whitelist and store them in the whitelist library. When a security application receives a program or data request, it judges the information by comparing it with the whitelist. Whether the program or data is "good" and "allowed", for those not in the white list or inconsistent with the information in the list, it will be processed through the corresponding security policy. [0003] The whitelist library file is one of the foundations of the whitelist security mechanism. Once the library file is tampered wit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06F21/64G06F21/60
CPCG06F21/562G06F21/64G06F21/602
Inventor 周强孙群李珏莹
Owner 上海思赞博微信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products