A dual-architecture trusted operating system and method

An architecture and operating system technology, applied in multi-programming devices, program control design, instruments, etc., to achieve the effect of enhancing information confidentiality and ensuring safe operation

Active Publication Date: 2021-07-30
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +2
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the embodiment of the present invention provides a dual-architecture trusted operating system and method to solve the problem of how to efficiently run the operating system in a secure environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A dual-architecture trusted operating system and method
  • A dual-architecture trusted operating system and method
  • A dual-architecture trusted operating system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative efforts fall within the protection scope of the present invention.

[0021] The early research on the security operating system architecture was concentrated on the basis of the macro-kernel operating system, which can be divided into standard-oriented security architecture and application-oriented security architecture. attack. Therefore, the security architecture of the operating system based on the microkernel is gradually...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a trusted operating system with a dual architecture and a method thereof. The system includes: a common computing kernel, in which a trusted computing kernel agent is configured to obtain a common computing kernel state request for processing, and through the trusted computing kernel agent Semantic analysis of the kernel semantics is sent to the trusted computing kernel. The trusted computing kernel includes: a kernel policy module, which is used to generate trusted computing strategies, and parse common computing kernel semantics; a monitoring management module, which monitors, measures, and controls the status of common computing kernels; The computing strategy allocates and schedules hardware resources; the memory management module is used to allocate and schedule memory resources according to the trusted computing strategy. By implementing the present invention, the operation of the system can be actively protected without interfering with the system business. The trusted computing kernel of the present application is compatible with various computing architectures, and is more suitable for applications with diversified business software and hardware environments or terminals with high security levels.

Description

technical field [0001] The invention relates to the technical field of operating system security, in particular to a dual-architecture trusted operating system and a method thereof. Background technique [0002] The early research on the security operating system architecture was concentrated on the basis of the macro-kernel operating system, which can be divided into standard-oriented security architecture and application-oriented security architecture. attack. Therefore, the security architecture of the operating system based on the microkernel is gradually recognized. After the concept of trusted computing was proposed, there have been many researches on the security architecture combined with the idea of ​​trusted computing, such as the PERSEUS system of the typical representative L4 microkernel. , Google's ASM framework and GP's TEE architecture, etc. Among them, PERSEUS improves the isolation and operating efficiency between processes on the basis of Mach, and provid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06F9/50
CPCG06F9/5016G06F9/5027G06F21/57
Inventor 赵保华高昆仑王志皓梁潇安宁钰任春卉
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products