Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An application key data protection system and its protection method

A technology for key data and applications, applied in the direction of preventing unauthorized use of memory, etc., can solve problems such as many loopholes, operating system security cannot be fully trusted, and achieve the effect of protecting security

Active Publication Date: 2016-08-31
NANJING UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to its huge code size and unavoidable flaws in the design and implementation process, the security of the operating system cannot be fully trusted.
In fact, as the scale of software continues to increase, there will be more vulnerabilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An application key data protection system and its protection method
  • An application key data protection system and its protection method
  • An application key data protection system and its protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] The present invention will be further described below in conjunction with the accompanying drawings.

[0075] like figure 1 As shown, an application key data protection system provided by the present invention includes a host process, a client operating system, computer hardware, and a key data protector. The application program to which the key data belongs is called the host process. When there is no key data When protection is required, the host process works in a normal way, using the client operating system to access computer hardware. When high-security key data protection is required, the host process contains key data KD, sends a request to the key data protector, and passes the key data The key data KD is read and written after the protector is allowed; the key data protector is the core component of this system, which provides an isolated protection environment for the key data KD, and is a lightweight virtual machine monitor that implements full-process manag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an application key data protection system which comprises a hosting process, a guest operating system, computer hardware and a key data protector. The hosting process utilizes the guest operating system to access the computer hardware; when key data protection needs to be carried out, a request is sent to the key data protector and the read-write operation is executed on key data under the control of the key data protector; the key data protector operates on the computer hardware, provides an insulation protection environment for the key data in the hosting process and carries out management and access processing on the key data. The invention also provides an application key data protection method which comprises the following steps of starting and initializing the key data protector; registering the key data; requesting to access the key data; judging the legality of the access request by the key data protector; exiting access to the key data; logging out the key data. According to the invention, the hostile attack on the kernel level in the operating system can be effectively stopped and safety protection is provided for the application key data.

Description

technical field [0001] The invention relates to the field of key data protection with high security requirements used by application programs, in particular to a virtual machine monitor implementation and key data protection method for protecting key data of application programs under the condition of an untrustworthy operating system kernel. Background technique [0002] Operating systems are usually part of the trusted computing base for upper-layer applications, and their security is an important basis for trusted execution environments. However, due to its huge code size and unavoidable flaws in the design and implementation process, the security of the operating system cannot be fully trusted. In fact, as the scale of software continues to increase, there will be more vulnerabilities. In addition, the cloud computing model is becoming more and more popular. When multiple users share the same computing environment, the user's demand for the protection of their own impor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F12/14
Inventor 曾庆凯黄啸
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products