System and method for trusted operating system to create trusted process based on trusted chip
An operating system and trusted technology, applied in the field of information security, can solve problems such as leakage of sensitive data, memory leakage, resource security threats, etc., to achieve the effect of avoiding security threats, ensuring security, ensuring confidentiality and privacy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0034] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.
[0035] figure 1 It is a system composition block diagram of the present invention. As shown in the figure, the system for creating a trusted process based on a trusted operating system based on a trusted chip disclosed in the present invention is implemented based on a trusted chip. The system is installed with a trusted operating system. The system includes a system for The trusted process monitoring module monitors and manages communication between trusted processes, and the process management module is used to manage ordinary processes, trusted processes and their flags. The memory unit is divided into trusted memory areas for running trusted processes, which can The trusted process is encrypted and runs in the trusted memory area, which can be isolated from the ordinary memory area in the memory unit where ordinary processes run.
[0036]...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com