Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

124 results about "Kernel level" patented technology

A kernel is the lowest level of easily replaceable software that interfaces with the hardware in your computer.

A Trusted Software Base for Proactive Security Services

InactiveCN102270287APrevent unauthorized operationsPrevent unauthorized modificationPlatform integrity maintainanceActive safetyBIOS
The invention discloses a trusted software base providing an active security service, comprising a trusted password module and an operating system kernel. The operating system kernel is provided with a kernel-level trusted password module driver, a kernel-level trusted software stack and a kernel-level security service module; a security manager and a security strategy server are arranged in the kernel-level security service module; the trusted password module provides a hardware engine for encryption operation and hash operation, and verifies integrity of a trusted BIOS (Basic Input/Output System); the trusted BIOS is used for verifies the integrity of PC hardware devices and an MBR (Master Boot Record); the MBR is used for guiding an OS (Operating system) Loader, and verifies the integrity of the OS Loader; and the kernel-level security service module captures security related information at a key security control point in a kernel layer of the operating system, and performs access control and least privilege control. The trusted software base effectively prevents unauthorized operations and rogue programs from performing unauthorized modification on application codes and configurations, and prevents secret disclosure of application resources, thereby guaranteeing the privacy and the integrity of an application environment.
Owner:中国人民解放军海军计算技术研究所

Operating system kernel-level error positioning method and device

The invention discloses an operating system kernel-level error positioning method and an operating system kernel-level error positioning device. When an operating system generates a kernel-level error prompt, a log file recording the system state information at the prompting moment is automatically generated. The method comprises the following steps that the log file is accessed through an interface provided by the operating system, and the type code of the current kernel-level error is obtained; error positioning related information to be obtained corresponding to the type code of the current kernel-level error is determined according to the preset first corresponding relationship; the first corresponding relationship is the corresponding relationship between the type code and the error positioning related information to be obtained; the error positioning related information to be obtained is extracted from the log file; an error source causing the kernel-level error is determined according to the extracted error positioning related information and the preset second corresponding relationship; and the second corresponding relationship is the corresponding relationship between the error positioning related information and the error source. Through the method and the device provided by the invention, the error source causing the kernel-level error can be automatically positioned.
Owner:三六零数字安全科技集团有限公司

Kernel-level code reuse type attack detection method based on QEMU

The invention discloses a kernel-level code reuse type attack detection method based on QEMU. The method mainly solves the problem of relying on hardware or need of modifying kernel source code in the prior art. According to the method, a function module of a QEMU virtual machine manager is expanded; each instruction which operates on the function module and in an operating system kernel is traversed and detected; jumping instructions relevant to the control flow process are recognized from the instructions, wherein the jumping instructions include ret and indirect call instructions; the jumping target addresses of the instructions are recorded; then, the target addresses are compared with legal target addresses in the system normal execution flow process for detecting whether a system is normally executed or not; and meanwhile, the interruption return addresses pushed into a stack during the interruption occurrence and the return addresses used during interruption actual return are subjected to comparison verification, so that whether attack occurs or not is judged. The kernel-level code reuse type attack detection method has the advantages that by aiming at the characteristic that the system original execution flow process needs to be changed for the code reuse type attack, the attack can be effectively discovered by monitoring the kernel execution flow process change instructions (and positions), and the kernel-level code reuse type attack detection method can be used for protecting the security of an operating system.
Owner:XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products