Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A design method and system of trusted tcm software stack based on linux operating system

A technology of an operating system and a design method, applied in the design method and system field of a trusted TCM software stack, can solve the problems of low utilization rate of resource access of trusted TCM chips, ensure integrity and authenticity, and solve limited bottlenecks , less error-prone effect

Active Publication Date: 2022-05-10
KYLIN CORP
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The main purpose of the present invention is to provide a design method and system of a trusted TCM software stack based on the Linux operating system, to solve the problem that the trusted software stack has a low access utilization rate to trusted TCM chip resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A design method and system of trusted tcm software stack based on linux operating system
  • A design method and system of trusted tcm software stack based on linux operating system
  • A design method and system of trusted tcm software stack based on linux operating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0041] In order for those skilled in the art to better understand the solution of this application, it is necessary to understand the current status of the existing domestic trusted computing encryption support platform. The purpose of this application is to adapt the self-developed trusted computing trusted TCM chip on the domestic operating system, and the upper ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses a design method and system of a trusted TCM software stack based on the Linux operating system, which can realize the communication and interaction between the upper layer application of the domestic Linux operating system and the trusted TCM chip, realize trusted computing, and ensure data integrity and authenticity, resistance to tampering attacks, safe execution of code, protection of confidentiality of sensitive data, etc. The resource management of trusted TCM chips is added to the Tcs layer of the Trousers software stack to better solve the bottleneck of limited resources of trusted TCM chips and improve the utilization rate of trusted TCM chip resources for users.

Description

technical field [0001] The present application relates to the field of trusted TCM software stacks, in particular to a design method and system for a trusted TCM software stack based on a Linux operating system. Background technique [0002] With the continuous development of computer applications, the problem of security threats is becoming more and more serious, and traditional relying solely on software to resist security threats often cannot solve the problem. The main technologies of traditional information security are firewall, intrusion detection and antivirus software. When the firewall is built higher and taller, the intrusion detection becomes more and more complex, and the virus database becomes larger and larger, the overall information security situation still has a trend of becoming more and more complicated and chaotic: false alarm rate increases, security investment continues to increase, maintenance and management It is more complex and difficult to implem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F8/30G06F8/61G06F9/445
CPCG06F8/31G06F8/61G06F9/44521
Inventor 屈志林王文功张志成杨诏钧魏立峰姬一文
Owner KYLIN CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products