Supercharge Your Innovation With Domain-Expert AI Agents!

Embedded operating system running environment monitoring method based on security chip

An operating system and security chip technology, applied in hardware monitoring, computer security devices, instruments, etc., can solve the problems of no integrated security chip, not providing much support and use, etc., to ensure credibility, avoid adversary tampering, efficiency boosted effect

Active Publication Date: 2021-10-26
JIANGSU ELECTRIC POWER INFORMATION TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing embedded mobile terminals usually do not integrate a security chip due to cost and other reasons, even if a security chip is integrated, it does not provide much support and use at the software level

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embedded operating system running environment monitoring method based on security chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The specific implementation mode of the present invention is illustrated below in conjunction with accompanying drawing:

[0041]A method for monitoring the operating environment of an embedded system based on a security chip. Those skilled in the art can refer to the method to design and implement a corresponding system security protection system. It mainly includes the following steps: (1) the measurement framework collects the integrity data of the system environment; (2) the administrator manages the integrity through the interface; (3) formulates and deploys corresponding whitelist security policies according to their specific needs; (4) ) after deployment, the platform enters the control state, and applications not on the whitelist are prohibited from executing. details as follows:

[0042] 1. Terminal equipment manufacturers, embedded operating system manufacturers: According to the requirements of secure boot, realize the two-level digital signature verificatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an embedded operating system running environment monitoring method based on a security chip. The embedded operating system running environment monitoring method comprises the following steps: performing security starting; during starting, loading a kernel measurement module into a kernel; obtaining a knowledge base; providing an application program management interface in a user layer; enabling the system kernel module to obtain an executable program measurement result and record the executable program measurement result in a measurement log; starting a management and control mode, reading the content in the white list by the system kernel module, searching a metric value of a corresponding file, if the metric value of the corresponding file is found and successfully compared, allowing the program to be started, otherwise, stopping the program from being started, and recording a program name and the metric value of the program name into an alarm log; and enabling the application program to use the security chip to carry out algorithm testing. A safe and reliable program runtime measurement and control mechanism is provided, the specified executable file is verified in the runtime, the specified executable file is not tampered in the runtime, or a certificate can be reserved in time when tampering occurs.

Description

technical field [0001] The invention belongs to the technical field of computer operating system safety enhancement, and in particular relates to a method for monitoring the operating environment of an embedded operating system based on a safety chip. Background technique [0002] With the continuous development of various computer systems, various forms of computer systems have penetrated into various fields and levels of society, playing an increasingly important role. Especially in recent years, mobile smart terminals and tablet , mobile office and other application scenarios are widely used to carry and process various private and confidential information. Due to the increasing value of the information involved, computer systems are increasingly becoming the target of attackers for system damage and information theft. [0003] Trusted computing technology is a new type of security technology based on hardware root of trust, with measurement and trust chain as the main t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/30G06F21/51G06F21/57G06F21/64
CPCG06F11/3013G06F11/3051G06F21/51G06F21/575G06F21/64Y02D10/00
Inventor 程伟华徐超承轶青王纪军张明远
Owner JIANGSU ELECTRIC POWER INFORMATION TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More