Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data integrity protection method

A data integrity and integrity protection technology, applied in the direction of electrical digital data processing, digital data processing components, instruments, etc., can solve problems such as the inability to guarantee that the code is not malicious, the inability to detect malicious code, and the inability to prevent malicious code, etc., to achieve Real-time integrity protection, good availability, and little impact on system performance

Inactive Publication Date: 2006-05-17
NAT UNIV OF DEFENSE TECH
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The technical problem to be solved by the present invention is that the existing data integrity protection methods either cannot detect new or unknown malicious codes, or can only check regularly but cannot check whether the system is damaged in real time, or can only prevent specific malicious codes from being damaged. All malicious codes cannot guarantee that the codes are not malicious, etc. We propose an integrity protection method suitable for operating system kernel support. This method is both mandatory and a mandatory access control method, and can implement system-wide integrity security. strategy to effectively protect the integrity of the system; it can also ensure real-time performance and prevent damage to the integrity of the system in real time; and this method does not affect the use of the system by normal users as much as possible while protecting the integrity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data integrity protection method
  • Data integrity protection method
  • Data integrity protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] figure 1 It is the structural diagram of the integrity protection model. The model is divided into two parts: inner core and outer core. The inner core is composed of integrity protection modules and system calls realized in the form of dynamic modules, and the outer core is composed of function libraries, command line tools and graphical tools. The integrity protection module mainly includes an integrity mark calculator and an integrity checker. The integrity mark calculator calculates the integrity mark of the subject or object according to the integrity logic relationship when creating or reading an object; Or the execution operation point judges whether the subject can operate the object according to the access control rules, and protects the integrity of the system. The integrity protection module provides the user layer with the functions of viewing the integrity marks of the subject and objects and setting the integrity marks of the objects by means of system ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a data completeness protection method. Its technical scheme includes the following contents: defining completeness mark of object, its completeness logic relationship and access control rule and designing completeness protection model. The kernel interior of said model is formed from completeness protection module implemented by means of dynamic module mode and system call, and its kernel exterior is formed from functional library, command line tool and graphic tool. The completeness protection module includes completeness mark calculator and completeness surveyor. Said can effectively protect completeness of system.

Description

technical field [0001] The invention relates to a method for protecting data integrity in the field of computer information security, in particular to a method for protecting data integrity in an operating system kernel. Background technique [0002] Computer information security mainly includes the confidentiality, integrity and availability of information. With the continuous development of computer applications and networks, many organizations and institutions use computers for information processing, and the information stored in computers has become a huge asset for these units. The loss or destruction of these data will lead to huge loss of life and property. At the same time, the integrity protection of the computer system itself is also a necessary condition for the normal operation of the system. All in all, the integrity protection of information, especially the integrity protection of stored information is becoming more and more important. Integrity breaches ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F1/00
Inventor 唐晓东何连跃罗军
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products