Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A whitelist library file protection method based on trusted computing

A technology of trusted computing and library files, applied in computing, digital data protection, computer security devices, etc., can solve problems such as illegally obtained secrets, loss of comparison meaning, and inability to perform security functions normally. High security protection strength, real and effective protection, high security protection effect

Active Publication Date: 2022-08-02
上海思赞博微信息科技有限公司
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The whitelist library file is one of the foundations of the whitelist security mechanism. Once the library file is tampered with but not found, the security application loses the meaning of comparing with the whitelist list and cannot perform security functions normally.
Most of the security applications will protect the whitelist library files to a certain extent, but the software-based protection methods have never been able to properly solve the problem of illegally obtained secrets, leaving security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A whitelist library file protection method based on trusted computing
  • A whitelist library file protection method based on trusted computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0023] see Figure 1-2 , the present invention provides a technical scheme: a whitelist library file protection method based on trusted computing, comprising the following steps:

[0024] Step 1: The trusted service agent (A) is added to the startup trusted chain, and the metric value of the trusted service agent (A) is extended to the platform configuration register (PCR) when the system is started;

[0025] Step 2: The security app...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a whitelist library file protection method based on trusted computing. First, the trusted service agent's own measurement value is extended to a specified platform configuration register, and after receiving an encapsulation request, the whitelist library file is measured. , calculate the hash value of the file, and encapsulate the hash value of the measurement with the specified platform configuration register. Then, after receiving the verification request, re-measure the whitelist library file, and decapsulate the encapsulated data. Finally, compare the two User hash value to determine whether the library file has been modified. This method can realize high-security whitelist library file protection, and the encapsulated data is generated by the trusted service agent's own state and the whitelist library file metric value together with the trusted cryptographic chip. Any tampering in the letter chip can be found in time, which protects the authenticity and effectiveness of the whitelist library file.

Description

technical field [0001] The invention relates to the technical field of trusted computing security, in particular to a whitelist library file protection method based on trusted computing. Background technique [0002] Whitelisting is a security technology that has been used in many security applications, such as firewalls, mail systems, and authorized access systems. The whitelist mechanism is to add "good" and "allowed" program information or data information to the whitelist and store it in the whitelist library. When receiving a program or data request, the security application judges this by comparing it with the whitelist. Whether the program or data is "good" or "allowed", if it is not in the whitelist or does not match the information in the list, it will be processed through the corresponding security policy. [0003] The whitelist library file is one of the foundations of the whitelist security mechanism. Once the library file is tampered with and not found, the sec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56G06F21/64G06F21/60
CPCG06F21/562G06F21/64G06F21/602
Inventor 周强孙群李珏莹
Owner 上海思赞博微信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products