Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A host remote monitoring method based on chip-level privacy computing

A remote monitoring and chip-level technology, applied in computer security devices, computing, instruments, etc., can solve the problems of high real-time connection cost, insufficient security, and increased monitoring cost, so as to improve monitoring flexibility and solve security deficiencies. , the effect of reducing monitoring costs

Active Publication Date: 2021-12-28
NANHU LAB
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Insufficient security, after the attacker remotely masters the client host, he can obtain all the running data of all software (including the monitoring software itself) through memory attacks (such as memory dump attack software), and the attacker can modify it at will and inject wrong data ( Wrong keyboard, mouse and other monitoring data) are sent to the supervisor, even if the information is encrypted by the monitoring software, the attacker can use the memory attack software to obtain the decryption key;
[0004] The data captured by monitoring will not be saved locally on the client side. The supervisor needs to establish a real-time connection with the client host. The supervisor receives the monitoring data from the monitoring software in the client host in real time. However, the cost of real-time connection is relatively high, resulting in monitoring cost increase

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A host remote monitoring method based on chip-level privacy computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0041] This embodiment discloses a host remote monitoring method based on chip-level privacy computing, including the following steps:

[0042] S1. The monitoring software in the client host is started in a trusted execution environment based on the chip level;

[0043] S2. Determine whether there is valid privacy data locally in the client host, if so, directly enter step S4, otherwise, enter step S3;

[0044] S3. Establish a secure connection with the regulator and capture private data;

[0045] S4. The monitoring software running in the trusted execution environment executes relevant monitoring instructions based on private data, and encrypts and signs the monitoring results and transmits them to the regulator.

[0046] Specifically, in step S1, the monitoring software is automatically started when the user terminal host is turne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a host remote monitoring method based on chip-level privacy calculation, including: S1. The monitoring software in the client host is started in a trusted execution environment based on the chip level; S2. Judging whether there is a valid If so, go directly to step S4; otherwise, go to step S3; S3. Establish a secure connection with the supervisor and capture private data; S4. Monitoring software running in a trusted execution environment executes relevant monitoring instructions based on private data , and encrypt and sign the monitoring results and transmit them to the regulator. This scheme uses a trusted execution environment based on privacy computing to ensure the validity, immutability, and security of monitoring information on the client side, and encrypts and signs the monitoring information based on the encryption key and signature key of the regulator. It can store regulatory information locally, avoiding the high overhead cost caused by real-time connection.

Description

technical field [0001] The invention belongs to the technical field of computer security, and in particular relates to a host monitoring method based on chip-level privacy calculation. Background technique [0002] At present, there are some obvious defects in the way that the supervisor remotely monitors all operation information of the client host (such as keyboard, mouse operation, certain programs of the client host, file operation information, etc.) through monitoring software or services (hereinafter referred to as monitoring software). ,Such as: [0003] Insufficient security, after the attacker remotely masters the client host, he can obtain all the running data of all software (including the monitoring software itself) through memory attacks (such as memory dump attack software), and the attacker can modify it at will and inject wrong data ( Wrong keyboard, mouse and other monitoring data) are sent to the supervisor, even if the information is encrypted by the moni...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/64
CPCG06F21/602G06F21/6245G06F21/64G06F2221/2107G06F21/53G06F21/6209G06F2221/034
Inventor 张磊刘昊勾鹏唐攀攀沙枫廖佳纯
Owner NANHU LAB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products