Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

138 results about "Operating system security" patented technology

Software package-based online automatic updating method for open source operating system of mobile terminal

ActiveCN102118500AResolve escalationTroubleshoot maintenance management issuesSubstation equipmentProgram loading/initiatingOperational systemNetwork approach
The invention discloses a software package-based online automatic updating method for an open source operating system of a mobile terminal, which relates to the field of mobile terminal software and is applied to the open source operating system of the mobile terminal. By the method, the remote automatic updating of system software can be realized by taking a package as a unit, and convenience isbrought to the rehabilitation of security holes and the installation of the operating system. The method comprises the two aspects that: a server automatically finishes structuring and publishing thesoftware package, acquires all source codes of the operating system from an open source site, automatically divides and structures a proper software package, determines the updating information of the software package according to the version information and dependency of the source codes, and publishes the software package by utilizing a network; and the mobile terminal serving as a software package acquirer and user automatically checks the updating information by client software, and downloads and updates the system by taking the software package as the unit to fulfill the aim of automaticonline updating. The method has the characteristics of high degree of automation and the like, and is easy to deploy in large scale and use.
Owner:TSINGHUA UNIV

Dynamic running method for security kernel service of tristate operating system in Feiteng CPU

The invention discloses a dynamic running method for a security kernel service of a tristate operating system in a Feiteng CPU. The method comprises the steps of: dividing a kernel into a system state and a kernel state of different privilege levels; establishing a service framework in the kernel state to serve as a container for the security kernel service, and establishing a call interface for the security kernel service; establishing a virtual driving interface in the system state to support a user state to call the security kernel service; loading the service framework and the built-in security kernel service after enabling the CPU to be powered on; and loading a loading part of a system service module and starting a system service, wherein the service framework provides the security kernel service and makes a response to a dynamic loading/unloading request of the security kernel service. The dynamic running method can realize security protection on specific hardware resources of the system, realize security access to a core service of the operating system, efficiently support credibility conformation of the system, effectively improve the system security, lower the security risk of traditional kernel bugs and provide an efficient and flexible credible calculating ecological environment for users.
Owner:TSINGHUA UNIV +1

Cross-platform safety protection system based on hardware virtualization

The invention provides a cross-platform safety protection system based on hardware virtualization, which belongs to the technical field of computer safety. The system provided by the invention comprises a system interception module, a hardware interface module, a system service module and a safety monitoring module, wherein the system interception module is used for intercepting the specified operation system sensitive behavior and outputting the intercepted information to the system service module; the system service module determines the corresponding safety protection mechanism according to the information, and outputting a control instruction to the safety monitoring module; the safety monitoring module executes the safety protection operation; and the hardware interface module receives the call instruction of the system service module and the safety monitoring module and achieves the interaction and data transmission with the hardware system. The system can monitor and intercept the sensitive behavior of the operation system through a virtual machine monitoring program, and determine whether the behavior is a bad one or a good one by virtue of the monitoring program according to the source and aim of the behavior so as to prevent or stop the harmful aggressive behavior in time to finally ensure the safe operation of the operation system.
Owner:SHANGHAI JIAO TONG UNIV

Document safety access control method and device based on Linux kernel

The invention belongs to the field of safety of operation systems, and provides a document safety access control method based on a Linux kernel. The document safety access control method comprises the following steps: when a Linux system is started up, the Linux kernel reads startup script registration information, and is registered with a pre-processing module; starting procedure information is read, and a strategy loading module is started up, wherein the pre-processing module runs in the state of the Linux kernel; after the pre-processing module is started up, a safety document system is registered in a VFS (virtual file system), and then a listening port is registered; the strategy loading module reads a local safety strategy file, and a safety strategy is created, and is sent to the listening port of the pre-processing module; the pre-processing module receives the safety strategy, and a safety strategy is created in a memory to be used for the safety file system; when a file is accessed by an application process, the safety file system calls the local file system to complete the operation of the file data according to the safety strategy. According to the method, the efficiency of the file safety access control in the Linux system is improved.
Owner:武汉华工安鼎信息技术有限责任公司

Creditable calculation password platform and realization method thereof

The invention relates to a creditable calculation password platform and a realization method thereof, which belong to the technical field of computer safety. The creditable calculation password platform comprises a hardware system and an operation system, wherein the hardware system is connected with the operation system; the hardware system comprises a hardware safety module (HSM); the HSM is bound with the platform and the realization method thereof and comprises an embedded safety module (ESM) or/and an inserted and pulled USB/PCI password module which is connected to a main plate; and theoperation system is provided with an operation system safety module comprising a forced access control submodule, a progress monitoring submodule and an application program integrality measurement identification module. The invention has the advantages of increasing the application range of the creditable calculation password platform and the technique of the realization method thereof, increasingthe self attack resisting degree of the forced access control submodule, the progress monitoring submodule and the integrality measurement identification module, measuring the integrality of the whole platform and the realization method thereof, establishing the creditable environment of the whole platform and the realization method thereof and fully ensuring the benefit of a user of the platformand the realization method thereof.
Owner:瑞达信息安全产业股份有限公司

Operation system security bootstrap device and bootstrap device

The invention discloses an operation system security bootstrap device, which includes a base input and output system, a central processing unit and a hard disk. The central processing unit is connected with the base input and output system and the hard disk; a bootstrap program is stored in the hard disk to realize the bootstrap to an operation system. Particularly, the bootstrap device further includes a dependable computing cryptographic module which is connected with the central processing unit. The central processing unit controls the dependable computing cryptographic module to verify the legality of an operator and detect the completeness of the bootstrap program, and backups the bootstrap program to realize the restorability of the bootstrap program. The invention further provides a security bootstrap method utilizing the device. Before the operation system is started, the identity of the operator is subjected to legality verification, so as to ensure that the operator is authorized legally; the hard disk bootstrap program is subjected to completeness detection, so as to ensure that the bootstrap program to be not maliciously interpolated; and the backup and restoring mechanism of the bootstrap program can continue the correct bootstrap to the operation system under the condition that the bootstrap program is interpolated.
Owner:NATIONZ TECH INC

Cascading management system and method for secure network

The invention discloses a cascading management system and method for a secure network and relates to the field of computer communication and operating system security. Through cascading setting, assert management, strategy management and global monitoring, uniform monitoring and management are carried out on whole network data centers. A superior management center of a superior data center manages subordinate management centers of subordinate data centers; moreover, the superior management center and the subordinate management centers manage terminals at the data centers; the superior management center formulates compulsive strategies or recommendation strategies to the subordinate management centers and issues the strategies in a cascading mode. The subordinate management centers reports statistics and alarm information to the superior management center in the cascading mode. A system manager grasps basic information and security states of the subordinate data centers in real time through the global monitoring of the superior management center. According to the system and the method, the network risk resulting from carrying out connection on all computers and the superior is avoided, the security and compliance of the computers are improved, and the system manager can know the security condition of the whole network computers very conveniently.
Owner:ZHENGZHOU YUNHAI INFORMATION TECH CO LTD

Automatic evaluation method for operation system security in classified protection evaluation and system thereof

The invention discloses an automatic evaluation method for operation system security in classified protection evaluation. The method comprises the following steps of establishing an evaluation script library capable of checking each security configuration checkpoint of various operation systems; identifying the type of an operated system through an evaluation script executing module, selecting an appropriate evaluation script from the evaluation script library, and executing the evaluation script; analyzing a result executed and returned by the evaluation script through a scrip return data analysis module and forming an evaluation result, and storing the result into a data base; and automatically generating an evaluation report of the operation system security through an evaluation report generation module. The invention further discloses an automatic evaluation system for the operation system security in the classified protection evaluation. The system comprises an evaluation scrip library module, an evaluation scrip executing module, a script return data analysis module and an evaluation report generation module which are sequentially connected. The automatic evaluation method for operation system security in the classified protection evaluation and the system of the automatic evaluation method achieve automatic evaluation on the operation system security and obtain the classified protection evaluation results.
Owner:ELECTRIC POWER RES INST OF GUANGDONG POWER GRID

Method for realizing bi-operation system starting of terminal equipment by using USB (universal serial bus) controller

The invention discloses a method for realizing bi-operation system starting of terminal equipment by using a USB (universal serial bus) controller and belongs to the technical field of dual operation system starting of the user terminal equipment. The method is characterized by including on a single hard disk provided with a working area and a free area, judging whether the USB controller is inserted or not by a BIOS (bi-operation system); if yes, executing a modified guide file GRLDR in the USB controller, verifying PIN of a user, loading a secret key, guiding to enter a reserved partition, executing a decryption program to decrypt the working area, and then entering the working area; if not, guiding to enter the free area by an MBR (master boot record), executing a partition boot record (PBR), in the type of BOOTMGR, of the free area, and entering the free area. Different from other methods for realizing bi-operation system starting through double hard disks, the method has the advantages that a mode of realizing bi-operation system starting through the same hard disk and multiple partitions is used, and through an encryption mechanism of a working area operation system, safety of the working area operation system is guaranteed, cost is lowered, and efficiency is improved.
Owner:BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products