A method and system for dynamic supervision of code and data in computer operation at all times

A running computer technology, applied in computer security devices, computing, digital data protection, etc., can solve problems such as technical solutions are difficult to implement, regulators are difficult, and real-time auditing is impossible

Active Publication Date: 2022-08-05
NANHU LAB +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 2. There is no effective means for real-time source code measurement and monitoring of running computer software or applications
[0005] 3. There is no effective means to effectively measure and effectively supervise the relevant data of the running computer software or applications, such as input data, output data, data status, operating status, etc.
[0006] Based on the above analysis, monitoring and auditing computer software or applications in actual operation is the most credible regulatory audit method, but since it is difficult or almost impossible for regulators to audit the running software in real time, this technical solution is difficult to implement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for dynamic supervision of code and data in computer operation at all times
  • A method and system for dynamic supervision of code and data in computer operation at all times
  • A method and system for dynamic supervision of code and data in computer operation at all times

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] A method for dynamic supervision of the code and data in the running of the computer at all times, such as figure 1 As shown, the method includes the following steps:

[0055] S1. Run the supervision software in the chip-level hardware security environment of the supervised client before the supervision time node. The supervision software has local administrator rights and can monitor the operation of any target software of the supervised user. The establishment of the supervision software and the supervision terminal is based on The heartbeat packet is securely connected, and the supervisory end monitors in real time that the supervisory software running in the user-end hardware security environment has not been forcibly interrupted, tampered with, or faked; the typical chip-level hardware security environment is a trusted execution environment based on Intel SGX, and the supervisory end can pass The remote authentication mechanism of Intel SGX remotely verifies the op...

Embodiment 2

[0073] A method for dynamic supervision of the code and data in the running of the computer at all times, such as image 3 As shown, the method includes the following steps:

[0074] S1. Run the supervisory software in the chip-level hardware security environment of the supervised client before the supervisory time node. The supervisory software can monitor the operation of any target software on the supervised user. The real-time monitoring of the supervisory software running in the hardware security environment of the user terminal has not been forcibly interrupted, tampered with, or fraudulent; the typical chip-level hardware security environment is a trusted execution environment based on Intel SGX, and the supervisory terminal can be used remotely through the remote authentication mechanism of Intel SGX. Verify the operational reliability and integrity of the supervisory software;

[0075] S2. For any target software started by the supervised user terminal, the supervise...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a method and system for dynamically supervising code and data in the running of a computer over a full period of time based on a chip-level hardware security environment. A method for dynamically supervising code and data in the running of a computer over a full period of time, the method comprising the following steps: running supervision software in a chip-level hardware security environment of a user end before a supervision time node; for any target software started by the user end, the user The terminal performs n real-time measurements of the target software under the operating states of different time nodes t; the measurement value and identification information are measured, read, and signed by the chip-level hardware at the user terminal to obtain the signature value and sent to the specified time period. Supervision software; the supervision terminal verifies the signature of the signature value, reads and saves the measurement information corresponding to the signature value as a record value for post-event supervision and traceability. The invention realizes the dynamic monitoring of the client computer source code, software data, etc., and can carry out post-event credible traceability based on the measurement results.

Description

technical field [0001] The present invention relates to a method and system for dynamic supervision of computers, in particular to a method and system for dynamic supervision of codes and data in the running of a computer over a full period of time. Background technique [0002] In recent years, source code auditing in the computer field is mainly based on static auditing, that is, the source code of a computer software is audited before it runs. Monitor the corresponding software source code and related operating data during the running process of computer software. The deficiencies of the existing static audit are as follows: [0003] 1. When the computer software is operated within the scope of the supervised user terminal, the external supervisor can only conduct a static review, that is, review the source code of a computer software before it runs, and verify a computer software (executable file) through cryptographic technology. ) corresponds to a certain (legal) sou...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/30G06F21/60G06F21/62
CPCG06F11/302G06F21/602G06F21/6218
Inventor 张磊
Owner NANHU LAB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products