Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Host remote monitoring method based on chip hierarchy privacy calculation

A remote monitoring and host technology, applied in computer security devices, calculations, instruments, etc., can solve the problems of increased monitoring costs, high real-time connection costs, insufficient security, etc., to reduce monitoring costs, improve monitoring flexibility, and solve The effect of insufficient security

Active Publication Date: 2021-10-29
NANHU LAB
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Insufficient security, after the attacker remotely masters the client host, he can obtain all the running data of all software (including the monitoring software itself) through memory attacks (such as memory dump attack software), and the attacker can modify it at will and inject wrong data ( Wrong keyboard, mouse and other monitoring data) are sent to the supervisor, even if the information is encrypted by the monitoring software, the attacker can use the memory attack software to obtain the decryption key;
[0004] The data captured by monitoring will not be saved locally on the client side. The supervisor needs to establish a real-time connection with the client host. The supervisor receives the monitoring data from the monitoring software in the client host in real time. However, the cost of real-time connection is relatively high, resulting in monitoring cost increase

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Host remote monitoring method based on chip hierarchy privacy calculation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0041] This embodiment discloses a host remote monitoring method based on chip-level privacy computing, including the following steps:

[0042] S1. The monitoring software in the client host is started in a trusted execution environment based on the chip level;

[0043] S2. Determine whether there is valid privacy data locally in the client host, if so, directly enter step S4, otherwise, enter step S3;

[0044] S3. Establish a secure connection with the regulator and capture private data;

[0045] S4. The monitoring software running in the trusted execution environment executes relevant monitoring instructions based on private data, and encrypts and signs the monitoring results and transmits them to the regulator.

[0046] Specifically, in step S1, the monitoring software is automatically started when the user terminal host is turne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a host remote monitoring method based on chip hierarchy privacy calculation. The host remote monitoring method comprises: S1, starting monitoring software in a client host in a trusted execution environment based on chip hierarchy; S2, judging whether valid private data exists in the local of the user side host, if so, directly entering a step S4, and otherwise, entering a step S3; S3, establishing secure connection with a supervisor and capturing privacy data; and S4, executing a related monitoring instruction by the monitoring software operating in the trusted execution environment based on the privacy data, encrypting and signing a monitoring result, and transmitting the monitoring result to a supervisor. According to the scheme, the validity, non-tampering property and monitoring safety of the monitoring information of the user side are ensured by utilizing a trusted execution environment based on privacy calculation, and the monitoring information is encrypted and signed based on the encryption key and the signature key of the supervisor, so that the supervisory information can be stored locally, and high overhead cost caused by real-time connection is avoided.

Description

technical field [0001] The invention belongs to the technical field of computer security, and in particular relates to a host monitoring method based on chip-level privacy calculation. Background technique [0002] At present, there are some obvious defects in the way that the supervisor remotely monitors all operation information of the client host (such as keyboard, mouse operation, certain programs of the client host, file operation information, etc.) through monitoring software or services (hereinafter referred to as monitoring software). ,Such as: [0003] Insufficient security, after the attacker remotely masters the client host, he can obtain all the running data of all software (including the monitoring software itself) through memory attacks (such as memory dump attack software), and the attacker can modify it at will and inject wrong data ( Wrong keyboard, mouse and other monitoring data) are sent to the supervisor, even if the information is encrypted by the moni...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/64
CPCG06F21/602G06F21/6245G06F21/64G06F2221/2107G06F21/53G06F21/6209G06F2221/034
Inventor 张磊刘昊勾鹏唐攀攀沙枫廖佳纯
Owner NANHU LAB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products