Process protection method and system and data processing method

A process and memory data technology, applied in the computer field, can solve problems such as the inability to guarantee the trusted state of dynamic processes, and achieve the effect of ensuring static integrity and ensuring trusted state.

Active Publication Date: 2020-01-10
ALIBABA GRP HLDG LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The embodiment of the present invention provides a process protection method, system and data processing method to at least solve the technical problem that the prior art cannot guarantee the trusted state of the dynamic process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Process protection method and system and data processing method
  • Process protection method and system and data processing method
  • Process protection method and system and data processing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] According to an embodiment of the present invention, an embodiment of a process protection method is also provided. It should be noted that the steps shown in the flow charts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0047] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Figure 1c A block diagram of a hardware structure of a computer terminal (or mobile device) for implementing a process protection method is shown. Such as Figure 1c As shown, the computer terminal 10 (or mobile device 10) may include one or more (shown by 102a, 102b, ..., 102n in the figure) processor 102 (the processor 102 may include ...

Embodiment 2

[0197] According to an embodiment of the present invention, a process protection method is also provided, Figure 7 It is a flow chart of a process protection method according to Embodiment 2 of the present application, combined with Figure 7 As shown, the method includes:

[0198] Step S71, if it is detected that the process needs to be started again, the initial credible measurement information of the process in the process of starting for the first time is acquired.

[0199] Specifically, the above process is the process to be protected, which may be the process of the application running on the device, and the steps in this embodiment can be executed by the TPM security chip in the device running the process.

[0200] The above starting process for the first time refers to starting the process on a device for the first time. For example, taking the process of an application as an example, if the application is started for the first time after being installed on the devi...

Embodiment 3

[0224] According to an embodiment of the present invention, there is also provided a process protection device for implementing the process protection method in Embodiment 1 above, Figure 8 It is a schematic diagram of a process protection device according to Embodiment 3 of the present application, such as Figure 8 As shown, the device 800 includes:

[0225] The first determining module 802 is configured to determine the initial credibility metric information of the process during the process of starting the process for the first time.

[0226] The first checking module 804 is configured to, if it is detected that the process needs to be started again, perform a credibility check on the starting of the process based on the initial credibility measurement information of the process.

[0227] The second determining module 806 is configured to determine that the process is allowed to start again if the verification is passed.

[0228] It should be noted here that the above-m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a process protection method and system and a data processing method. The method comprises the steps that in the process of starting a process for the first time, initial credibility measurement information of the process is determined; if it is detected that the process needs to be restarted, credibility verification is conducted on starting of the process based on the initial credibility measurement information of the process; and if the verification is passed, that the process is allowed to be restarted is determined. The technical problem that the credible state of the dynamic process cannot be guaranteed in the prior art is solved.

Description

technical field [0001] The present invention relates to the field of computers, in particular to a process protection method, system and data processing method. Background technique [0002] The trusted server uses a trusted security chip, which can transfer the trust chain from the trusted root to the operating system, ensuring the trusted status of the hardware platform below the operating system. There are currently several options as follows. [0003] 1. TCG kernel measurement scheme. [0004] The scheme uses TPM as the root of trust. When the system starts, the trusted measurement root core in the BIOS starts to measure the BIOS initial boot module, and then the BIOS initial boot module measures the BIOS main boot module, and the BIOS main boot module measures the rest of the BIOS and The OS loader, and then the OS loader measures the OS kernel, and so on, so as to finally complete the trust transfer process from the root of trust to the operating system kernel. The ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/52
CPCG06F21/52
Inventor 肖鹏付颖芳
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products