Method and system for full-time dynamic supervision of codes and data in computer operation

A running, computer technology, applied in computer security devices, computing, digital data protection, etc., can solve the problems of difficult to implement technical solutions, difficult for regulators, impossible to review in real time, etc.

Active Publication Date: 2021-05-14
NANHU LAB +1
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 2. There is no effective means for real-time source code measurement and monitoring of running computer software or applications
[0005] 3. There is no effective means to effectively measure and effectively supervise the relevant data of the running computer software or applications, such as input data, output data, data status, operating status, etc.
[0006] Based on the above analysis, monitoring and auditing computer software or applications in actual operation is the most credible regulatory audit method, but since it is difficult or almost impossible for regulators to audit the running software in real time, this technical solution is difficult to implement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for full-time dynamic supervision of codes and data in computer operation
  • Method and system for full-time dynamic supervision of codes and data in computer operation
  • Method and system for full-time dynamic supervision of codes and data in computer operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] A method for dynamic supervision of code and data in computer operation at all times, such as figure 1 As shown, the method includes the following steps:

[0055] S1. Run the supervision software in the chip-level hardware security environment of the supervised client before the supervision time node. The supervision software has local administrator rights and can monitor the operation of any target software on the supervised client. The supervision software and the supervision terminal are based on With the secure connection of heartbeat packets, the supervisory terminal monitors in real time that the supervisory software running in the hardware security environment of the client has not been forcibly interrupted, tampered with, or falsified; the typical chip-level hardware security environment is a trusted execution environment based on Intel SGX, and the supervisory terminal can pass The remote authentication mechanism of Intel SGX remotely verifies the credibility a...

Embodiment 2

[0073] A method for dynamic supervision of code and data in computer operation at all times, such as image 3 As shown, the method includes the following steps:

[0074] S1. Run the supervision software on the chip-level hardware security environment of the supervised client before the supervision time node. The supervision software can monitor the operation of any target software on the supervised client. The supervision software and the supervision terminal establish a secure connection based on heartbeat packets. The terminal monitors in real time that the supervisory software running in the hardware security environment of the user terminal has not been forcibly interrupted, tampered with, or falsified; a typical chip-level hardware security environment is a trusted execution environment based on Intel SGX, and the supervisory terminal can remotely authenticate through the Intel SGX remote authentication mechanism. Verify the credibility and integrity of regulatory softwar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a system for full-time dynamic supervision of codes and data in computer operation in all time periods based on a chip level hardware security environment. The invention discloses a method for full-time dynamic supervision of codes and data in computer operation. The method comprises the following steps that supervising software is run in a chip level hardware security environment of a user side before a supervising time node; for any target software started by the user side, the user side carries out n times of real-time measurement on the target software in the running state at different time nodes t; the measurement value and the identification information are credibly measured, read and signed by chip level hardware of a user side to obtain a signature value, and the signature value is sent to supervision software in a specified time period; and the supervision end verifies the signature of the signature value, and reads and stores the measurement information corresponding to the signature value as a recorded value for post supervision and tracing. According to the invention, dynamic monitoring of user side computer source codes, software data and the like is achieved, and credible tracing after the event can be carried out based on a measurement result.

Description

technical field [0001] The invention relates to a method and a system for dynamically supervising a computer, in particular to a method and a system for dynamically supervising codes and data in operation of a computer at all times. Background technique [0002] In recent years, the source code review in the computer field is mainly based on static review, that is, to review the source code of a certain computer software before it runs, and there is no effective means to implement a comprehensive dynamic review of the actual running computer software, so that it cannot be effectively Monitor the corresponding software source code and related operating data during the operation of computer software. The shortcomings of the existing static audit are as follows: [0003] 1. When computer software operates within the scope of the supervised client, external regulators can only conduct static audits, that is, audit the source code of a certain computer software before it runs, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/30G06F21/60G06F21/62
CPCG06F11/302G06F21/602G06F21/6218
Inventor 张磊
Owner NANHU LAB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products