Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

72 results about "Trusted computing base" patented technology

The trusted computing base (TCB) of a computer system is the set of all hardware, firmware, and/or software components that are critical to its security, in the sense that bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system. By contrast, parts of a computer system outside the TCB must not be able to misbehave in a way that would leak any more privileges than are granted to them in accordance to the security policy.

Trustworthy computing base cutting method used for virtual machine system

The invention discloses a trustworthy computing base anti-leakage cutting method used for a virtual machine system; the virtual machine system comprises a hardware layer, a virtual machine monitor layer, a virtual trusted platform module manager, a domain creating module, a kernel and a sensitive data access policy; the virtual trusted platform module manager, the domain creating module, the kernel and the sensitive data access policy are positioned at a privilege domain; the method is characterized in that: a special user domain which is isolated with the privilege domain is built, the virtual trusted platform module manager, the domain creating module and the sensitive data access policy are moved to the special user domain, and the kernel is kept in the privilege domain; communication is built between the privilege domain and the special user domain, and the trustworthy computing base is formed by the hardware layer, the virtual machine monitor layer, the virtual trusted platform module manager, the domain creating module and the sensitive data access policy; the invention provides a trustworthy computing base cutting proposal, the advantages of the traditional trustworthy computing base proposal is not only kept, but also the safety and starting speed of the virtual machine system are enhanced.
Owner:WUHAN UNIV

Method for implementing credible recovery system in operating system

The invention discloses a method for realizing a trusted recovery system in an operating system. The method establishes transaction declaration system call to provide an interface of transaction establishment and submission for the trusted computing base (TCB) operation of a computer information system in order that the atomic nature of the TCB operation can be ensured by the trusted recovery system as long as the transaction declaration system call is used to declare a code section into transaction. The trusted recovery system consists of a transaction manager, a log system and log files. The transaction manager coordinates and manages the establishment, submission and recovery of the transaction. The log system intercepts and captures all the updated operations in the TCB operation and records the operations in the log files; after the transaction is completed, the operations are written back to a disk, thereby realizing the atomic nature of the TCB operation. When the computer system is invalid, as long as the data in the log files relevant to the TCB operation is repealed, the system can be reconstructed to a consistent state before the occurrence of a fault. The method for realizing the trusted recovery system in the operating system is suitable for mainstream operation systems, has wide application range and can increase the disaster tolerance of the operating system.
Owner:ZHEJIANG UNIV

Dynamic cryptography protection for virtual machines and key management method thereof

Provided are dynamic cryptography protection for virtual machines and a management method for keys required by dynamic cryptography protection. The management method for the keys required by dynamic cryptography protection includes that each of the virtual machines is divided into multiple data blocks, dynamic encryption and decryption process are performed when the data blocks are in input and output states, keys required for the encryption and decryption are protected by the virtual machine monitor secondary trusted computing base or the hardware-based trusted computing base and are protected in a higher safety level, a service console inquires and acquires the keys from the virtual machine monitor secondary trusted computing base and encrypts the data blocks of guest virtual machines by the aid of the keys, and the encrypted data blocks are stored in image data packages of the guest virtual machines, thus the stolen encrypted data packages are hard to decrypt even when the image data packages of the guest virtual machines are stolen. Besides, when data blocks are input to the guest virtual machines from external storages, the service console utilizes the keys to decrypt the data blocks and then sends the decrypted data blocks to internal memories of the guest virtual machines to be further processed.
Owner:道里云信息技术(北京)有限公司

Method and system for full life cycle security management of virtual machine

The invention provides a system and a method for providing full life cycle security management of a virtual machine on a virtualized computing platform. The system comprises a trusted computing base, a trusted computing base proxy object virtual machine and one or more object virtual machines, wherein the trusted computing base is operated on the bottom layer of the virtualized computing platform, and the trusted computing base proxy object virtual machine and one or more object virtual machines are operated on an object virtual machine layer of the virtualized computing platform. The trusted computing base proxy object virtual machine is established in another independent trusted secure computing environment of the virtualized computing platform, and is transmitted to the trusted computing base through an exclusive private secure communication channel established on the basis of a public key cryptography mechanism and a trusted authentication mechanism which is provided by a third party; moreover, the trusted computing base proxy object virtual machine is operated as a special object virtual machine which is deployed after the virtualized computing platform is started so as to act as an agent of the trusted computing base to provide service for client users. By using the system, the attacks initiated even by an internal system administrator from a data center can be resisted.
Owner:道里云信息技术(北京)有限公司

Password protection system based on hardware virtualization

The invention provides a password protection system based on hardware virtualization, which aims at the current situation that a traditional password protection system cannot defend an inner nuclear layer rootkit. The password protection system based on hardware virtualization deploys a password protection module and a scheduling management module in an inner nuclear layer of an operation system, provides a safe input environment and an interactive interface, and simultaneously deploys an instruction intercepting module and an inner core protection module in a manager layer of a virtual machine. The instruction intercepting module is used for intercepting privileged instructions, and transmitting the current privileged instruction information to the inner core protection module so as to lead an execution flow path to enter a manger of the virtual machine from the inner nuclear layer of the operation system. The inner core protection module prevents the rootkit from randomly modifying nuclear data and service in the operation system, and guarantees password protection in the inner nuclear layer of the operation system. The password protection system based on hardware virtualization moves a trusted computing base (TCB) from the inner nuclear layer of the operation system to the manager layer of the virtual machine, thereby achieving lower level and higher safety.
Owner:HUAZHONG UNIV OF SCI & TECH

Method for carrying out centralized control on internal memory of safety control module

The invention discloses a method for carrying out centralized control on internal memory of safety control module, which maintains name space memory blocks by using double linked list, distributes the name space by a stack mechanism and sequences the dynamically added hole memory blocks with dynamically added hole values by partitioned sequencing method. The method comprises the following steps: pre-defining parameters; distributing N memory blocks with the size being Bz and establishing a name space management mechanism by using the alloc pages () function; processing the memory distribution request from the security module by the name space; processing the memory release request from the security module by the name space; self-checking by the name space. The method can ensure that the processing of the trusted computing base security name space conforms to the principle of one-way call, the system monitors the situation of the security name space by a monitoring program, when the holes of the memory blocks are comparatively large, the hole memories are recycled; when the number of the idle memory blocks is insufficient, the idle memory blocks are supplemented. And meanwhile the trusted computing base is provided with a stable and efficient security name space memory distribution mechanism.
Owner:BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products