Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

142 results about "Dependable computing" patented technology

Dependable computing system capable of protecting BIOS and method of use thereof

The invention provides a trusted computer system for protecting BIOS and the application method thereof, belonging to the field of information security. The invention is characterized in the physical connective way of a trusted computing module and a BOOT ROM, wherein the trusted computing module is connected to a system mainboard, and the BOOT ROM is connected to the trusted computing module by a communication bus. The trusted computing module comprises a DMA controller, a FIFO unit and a security isolation unit; the DMA controller is used for reading BIOS code to the FIFO unit of the trusted computing module or reading the BIOS code from the FIFO unit to the I/O bus of the trusted computing module; the FIFO unit is used for temporally storing BIOS code to be processed; the security isolation unit is used for preventing vicious procedures outside the trusted computing module from reading confidential information in memory cell inside the trusted computing module. The read/write and update of BIOS code need the identity authentication and password authentication of a current user, ensuring the security of BIOS key code; the equipment access control is realized by hardware method, reaching the effect of active control of mainboard peripheral equipment.
Owner:BEIJING UNIV OF TECH

Dynamic measuring method based on dependable computing and management system

The invention discloses a dynamic measuring method based on dependable computing and a management system. The management system interacts with a user through a user management interface of an operation system and application programs. The management system comprises a dynamic measurement control module interacting with the operation system, wherein the dynamic measurement control module controls a judgment module, an audit module and a measuring module, the judgment module obtains a latest measurement result from the audit module and judges whether the operation system is dependable or not according to a strategy, the measuring module is responsible for detecting the dependable state of the operation system in operation, the audit module is responsible for calculating, storing and reporting measurement results in a classified mode, the control module is responsible for configuring external management programs to other modules, sending system state information to the external management programs and providing access ports of trusted software special hardware for the modules. The management system works in a kernel layer, the system can guarantee integrity of the modules once starting static measurement, and credibility and safety are improved.
Owner:BEIJING KEXIN HUATAI INFORMATION TECH

Operation system security bootstrap device and bootstrap device

The invention discloses an operation system security bootstrap device, which includes a base input and output system, a central processing unit and a hard disk. The central processing unit is connected with the base input and output system and the hard disk; a bootstrap program is stored in the hard disk to realize the bootstrap to an operation system. Particularly, the bootstrap device further includes a dependable computing cryptographic module which is connected with the central processing unit. The central processing unit controls the dependable computing cryptographic module to verify the legality of an operator and detect the completeness of the bootstrap program, and backups the bootstrap program to realize the restorability of the bootstrap program. The invention further provides a security bootstrap method utilizing the device. Before the operation system is started, the identity of the operator is subjected to legality verification, so as to ensure that the operator is authorized legally; the hard disk bootstrap program is subjected to completeness detection, so as to ensure that the bootstrap program to be not maliciously interpolated; and the backup and restoring mechanism of the bootstrap program can continue the correct bootstrap to the operation system under the condition that the bootstrap program is interpolated.
Owner:NATIONZ TECH INC

Terminal dependable computing and data static safety system and method

The invention provides a terminal dependable computing and data static safety system. The system comprises a server, a client computer and an authenticated microsystem module. The server is connected with the client computer through the network, and a template file of a dependable root system and a data pointer file from the client computer are stored in the server; a dependable authenticated microsystem is stored in the authenticated microsystem module and used for comparing data information of the server with that of the client computer, and after the client computer passes the hardware dependable authentication, the data pointer file, stored in the server, of the client computer is mapped to the hardware of the client computer; the authenticated microsystem module compares the data of the dependable root system tagged by the data pointer file with the corresponding data of a dependable root system of a storage sector of a hard disk; if the data is inconsistent, it is determined that the client computer is not dependable. The invention further discloses a terminal dependable computing and data static safety method. Real-time dependable monitoring is achieved before a remote terminal enters a system layer, and data safety is protected.
Owner:山东微创软件有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products