[go: up one dir, main page]

CN103065082A - Software security protection method based on Linux system - Google Patents

Software security protection method based on Linux system Download PDF

Info

Publication number
CN103065082A
CN103065082A CN2012102288067A CN201210228806A CN103065082A CN 103065082 A CN103065082 A CN 103065082A CN 2012102288067 A CN2012102288067 A CN 2012102288067A CN 201210228806 A CN201210228806 A CN 201210228806A CN 103065082 A CN103065082 A CN 103065082A
Authority
CN
China
Prior art keywords
file
linux system
key
data
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012102288067A
Other languages
Chinese (zh)
Inventor
苏均生
李逊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jinghang Computing Communication Research Institute
Original Assignee
Beijing Jinghang Computing Communication Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jinghang Computing Communication Research Institute filed Critical Beijing Jinghang Computing Communication Research Institute
Priority to CN2012102288067A priority Critical patent/CN103065082A/en
Publication of CN103065082A publication Critical patent/CN103065082A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention belongs to the technical field of information security, and particularly relates to a software security protection method based on a Linux system. The software security protection method based on the Linux system aims to solve the problems that soft encryption strength is low, encryption speed is slow and the like in a traditional Linux system. By combining with a hardware encryption card, the software security protection method based on the Linux system improves the encryption protection intensity and processing speed of software, and reduces the influence on time sequence. The software security protection method based on the Linux system comprises a first step of combining the software security protection method based on the Linux system with the hardware encryption card and adopting a multi-level key management mechanism, a second step of adopting a classification filtering strategy and formulating a security file management method, a third step of establishing a security strategy abstract, loading the security strategy in a kernel policy repository, and processing a read-write request through a strategy security file module, a fourth step of utilizing a page buffering function to carry out data double buffering processing, and a fifth step of carrying out integrity checking to data needed to be decrypted and restored. Through the software security protection method based on the Linux system, the software security protection intensity is improved, time cost is saved, and data processing rate and efficiency are guaranteed.

Description

Software security means of defence based on linux system
Technical field
The invention belongs to field of information security technology, relate to a kind of method that file encryption is processed, be specifically related to a kind of software security means of defence based on linux system, the method is applied to non-embedded software security protection process under the linux system environment, can guarantees the reliability of software cryptography.
Background technology
Along with the continuous application of software at space industries such as test, control, mission plannings, the software security problem is more and more outstanding, software runtime environment is transparent, and the program that leaves in the storer is easy to be read and crack, thereby causes the leakage of core technology and principle of work.Therefore, be badly in need of software is carried out security protection, improve that software anti-ly copies, anti-decompiling and degeneration-resistant ability to analyzing.Software is comprised of executable file, library file, data file etc. usually, the core content of software security protection is file security control, need to be under the prerequisite that guarantees the normal operation of software, adopt various measures that the content of the critical files such as executable file, data file is encrypted, to improve the security of software running process.
At present, when the enforcement personnel carry out security protection to the software of Linux environment, usually All Files has all been carried out encryption, because file is numerous, has the problems such as enciphering rate is slow, treatment effeciency is low, has increased time loss, affected the timing of running software, the soft encryption measure of commonly using in addition is combined less with hardware characteristics, security intensity is inadequate, and critical data and parameter are easy to analyzed and steal.
Summary of the invention
The objective of the invention is for the deficiencies in the prior art, propose a kind of software security means of defence based on the Linux environment, file is carried out the categorical filtering encryption, and fast operation, security intensity is high.
The present invention is achieved in that
A kind of software security means of defence based on linux system comprises the steps:
(1) generating security file module between Virtual File System and physical file system, and set up file-management services;
(2) encrypted card and carry out initialization is installed, secure file module and encrypted card are communicated;
(3) after the communication normally, load the secure file module, protected catalogue or file type are carried out categorical filtering and file encryption-decryption processing; Pre-define catalogue to be encrypted or file type, in carrying out the encryption and decryption process, defined file is carried out encryption and decryption, undefined file is not processed.
Aforesaid a kind of software security means of defence based on linux system, wherein: described secure file module uses Virtual File System VFS to carry out file management, VFS to as if a structure, comprise super object piece, index node object, directory entry object, file object, and the function pointer of its parent object of point operation, by inheriting the general purpose function that uses VFS.
Aforesaid a kind of software security means of defence based on linux system, wherein: described when file is carried out encryption and decryption, adopt the cipher key hierarchy management method: key is divided into master key, secondary key two-stage; Master key is done seed with the stochastic system time, is kept in the shielding area of hardware encryption card crypto chip; Use master key that working key is encrypted and generate secondary key; The working key seed is by at random antilog generator generation, and the antilog generator is cured in the crypto chip at random, each encrypt file is carried out the SHA1 computing by key seed respectively produce a working key.
Aforesaid a kind of software security means of defence based on linux system, wherein: during described encrypting and protecting files, use working key in conjunction with the SM1 algorithm file to be encrypted and form the encrypt file main body, master key is encrypted working key by aes algorithm and is generated secondary key, be stored in top of file, become the part of encrypt file;
During file decryption, take out the secondary key of file header part, use master key in conjunction with AES it to be deciphered, obtain working key; To the deciphering of encrypt file main part, obtain source file again.
Aforesaid a kind of software security means of defence based on linux system, wherein: set up hidden partition, and in hidden partition Saving Safe Strategy; When reading to process, after the secure file module is intercepted and read disk requests, check whether the process of access allows to access encrypt file, if do not allow, directly let pass; Judge by the encrypted bits of tail of file whether this document is encrypted, encrypted if this document does not have, so directly let pass; Otherwise re-construct request data package, read the data content of designated length, and data are decrypted, return to original request data package;
Write when processing, after the secure file module is intercepted disk write operation, judge whether needs encrypting storing of this document according to security strategy, if need to encrypt, then data are encrypted, and write disk.
Aforesaid a kind of software security means of defence based on linux system, wherein: adopt ciphertext and plaintext double buffering method: an encrypt file is provided with two kinds of page buffered datas, and a kind of page buffered data is that expressly another kind of enciphered data is ciphertext; Kernel module judges whether process allows to access clear data, if allow, then access expressly cushions, otherwise only accesses the ciphertext buffering.
Aforesaid a kind of software security means of defence based on linux system, wherein: adopt the file integrality method of calibration: if file is defined as trusted resource, it is carried out integrity protection; If file corruption, system are recovered its data automatically; In data recovery procedure, resource backup and resource SHA1 hash data are corresponding one by one, are stored in the disk hidden partition; Before the access trusted resource, relatively the SHA1 data if do not mate, are recovered resource so from hidden partition.
The invention has the beneficial effects as follows:
By set up a new secure file module between the file system of Linux environment and operating system nucleus, this module is loaded into kernel by service.When encryption and decryption is processed, carry out file class and filter judgement, if type is classification to be encrypted, then the secure file module is called and is encrypted the encryption key that integrated circuit board produces at random, uses SM1 algorithm for encryption file content, improves software security protection intensity; If not classification to be encrypted, then directly let slip and be left intact; By the categorical filtering measure, file encryption-decryption speed and data-handling efficiency have been improved.
Description of drawings
Fig. 1 is the process flow diagram of a kind of software security means of defence based on linux system provided by the invention;
Fig. 2 is the file encryption processing procedure;
Fig. 3 is the file decryption processing procedure;
Fig. 4 is that data file is read processing procedure;
Fig. 5 is that data file is write processing procedure.
Embodiment
Below in conjunction with drawings and Examples a kind of software security means of defence based on linux system provided by the invention is done further introduction:
Embodiment 1:
As shown in Figure 1: a kind of software security means of defence based on linux system comprises the steps:
(1) the generating security file module is set up file-management services, and selected protected catalogue or protected file type; File-management services is registered under the (SuSE) Linux OS with the form of module, then creates new Service name with graphic model, behind the Linux electrifying startup, just automatically performs this service like this;
Described secure file module is inserted between Virtual File System and the physical file system, serves as the role of " filtrator ".This secure file module can adopt OO design philosophy, use Virtual File System VFS to carry out file management, VFS to as if a structure, comprise super object piece, index node object, directory entry object, file object etc., the function pointer that comprises its parent object of point operation, by inheriting the general purpose function that uses VFS, a file system model unification, abstract is provided, support concrete file system.The secure file module also can adopt other design philosophys or function to realize should " filtrator " function.
(2) encrypted card and carry out initialization is installed, secure file module and encrypted card are communicated;
(3) after the communication normally, utilize the secure file module that protected catalogue or file type are carried out categorical filtering and file encryption processing and operating right processing; For guaranteeing that document classification filters, improve encryption/decryption speed, the sorting processor system of employing, namely pre-define catalogue to be encrypted or file type, in carrying out the encryption and decryption process, defined file is carried out encryption and decryption, undefined file is not processed, normal operation, thereby avoided time loss and the wasting of resources that non-vital document encryption and decryption is caused, guaranteed encryption/decryption speed.
The secure file module is carried in (for example PCR integrated circuit board) on the circuit-board card usually, circuit-board card is set up with encrypted card communicated by letter, communication loads the secure file module after leading to normally, and the modification CONFIG.SYS, start-up system is this secure file module of carry simultaneously.
Embodiment 2:
On the basis of embodiment 1, when file is carried out encryption and decryption, adopt the cipher key hierarchy management method: key is divided into master key, secondary key two-stage.Master key is done seed with the stochastic system time, is kept in the shielding area of hardware encryption card crypto chip, and word length can be 128, is unique root key.
Working key can not be deposited with the plaintext form, need to be encrypted processing, uses master key that working key is encrypted and generates secondary key.The working key seed is by at random antilog generator generation, and the antilog generator is cured in the crypto chip at random, each encrypt file is carried out the SHA1 computing by key seed respectively produce a working key (can be 128).
The file encryption decryption processing is as follows:
As shown in Figure 2; during encrypting and protecting files, use working key in conjunction with the SM1 algorithm file to be encrypted and form the encrypt file main body, master key is encrypted working key by aes algorithm and is generated secondary key; be stored in top of file, become the part of encrypt file.
As shown in Figure 3, during file decryption, take out the secondary key of file header part, use master key in conjunction with AES it to be deciphered, obtain working key.And then to the deciphering of encrypt file main part, obtain source file.
When accessing certain file, the secure file module can be judged whether encrypted file of this file, if file is not encrypted, then directly carries out this file; If this file is the file of encryption, the secure file module can be carried out communication with encrypted card, and the undesired meeting of communication is prompted to the user.After communication is normal, gives encrypted card with this file and do decryption work and put among the internal memory.Encrypted card is finished after the decryption work, gives operating system with the content of deciphering and does the program execution work.
Embodiment 3:
On the basis of embodiment 1 or 2, for obtaining better security protection effect, set up hidden partition.Be privately owned in hidden partition File system format, other programs can't read the data of this subregion.Security strategy is read from hidden partition by the process of waiting for, and is loaded in the kernel policy library by system call.This security strategy points out usually which file need to be encrypted or the access limit of file etc.
As shown in Figure 4, when reading to process, the secure file module is intercepted and is read (file read request) after the disk requests, checks whether the process of access allows to access encrypt file, if do not allow, and directly clearance; Judge this document whether encrypted (for example 1 expression is encrypted, 0 expression unencryption) by the encrypted bits of tail of file, encrypted if this document does not have, so directly let pass; Otherwise re-construct request data package, read the data content of designated length, and data are decrypted, return to original request data package.
As shown in Figure 5, write when processing, the secure file module is intercepted (file write request) after the disk write operation, judges whether needs encrypting storing of this document according to security strategy, if need to encrypt, then data is encrypted, and writes disk.
Embodiment 4:
On embodiment 1,2 or 3 basis, in use initiatively divulge a secret in order to prevent file, do not affect again simultaneously system performance, adopt ciphertext and plaintext double buffering mode to process, namely an encrypt file has two kinds of page buffered datas, a kind of page buffered data is that expressly another kind of enciphered data is ciphertext.Take full advantage of the page pooling feature of operating system, when accessing encrypt file simultaneously, trusted process and untrusted process need not be encrypted decryption processing to disk file frequently, system's processing speed is provided greatly, kernel module only need judge whether process allows to access clear data, if allow, then access expressly cushions, otherwise can only access the ciphertext buffering.
For further obtaining the security protection effect, can adopt the file integrality method of calibration: if file is defined as trusted resource, will carry out integrity protection to it.To executable program, can prevent other malicious process crypto process that disguises oneself as, the read data files content to important data file, can check in time whether file damages, if damage, system will recover its data automatically so.In data recovery procedure, resource backup and resource SHA1 hash data are corresponding one by one, are stored in the disk hidden partition; This hidden partition is formatted as privately owned file system format, and is invisible to the user, inaccessible.Before the access trusted resource, relatively the SHA1 data if do not mate, are recovered resource so from hidden partition, guarantee normally reading of data.

Claims (7)

1. the software security means of defence based on linux system comprises the steps:
(1) generating security file module between Virtual File System and physical file system, and set up file-management services;
(2) corresponding hardware driving and carry out initialization is installed, communicates the distribution hardware resource by hardware driving and encrypted card;
(3) after the communication normally, load the secure file module, protected catalogue or file type are carried out categorical filtering and file encryption-decryption processing; Pre-define catalogue to be encrypted or file type, in carrying out the encryption and decryption process, defined file is carried out encryption and decryption, undefined file is not processed.
2. a kind of software security means of defence based on linux system as claimed in claim 1, it is characterized in that: described secure file module uses Virtual File System VFS to carry out file management, VFS to as if a structure, comprise super object piece, index node object, directory entry object, file object, and the function pointer of its parent object of point operation, by inheriting the general purpose function that uses VFS.
3. a kind of software security means of defence based on linux system as claimed in claim 1 or 2 is characterized in that: described when file is carried out encryption and decryption, adopt the cipher key hierarchy management method: key is divided into master key, secondary key two-stage; Master key is done seed with the stochastic system time, is kept in the shielding area of hardware encryption card crypto chip; Use master key that working key is encrypted and generate secondary key; The working key seed is by at random antilog generator generation, and the antilog generator is cured in the crypto chip at random, each encrypt file is carried out the SHA1 computing by key seed respectively produce a working key.
4. a kind of software security means of defence based on linux system as claimed in claim 3, it is characterized in that: during described encrypting and protecting files, use working key in conjunction with the SM1 algorithm file to be encrypted and form the encrypt file main body, master key is encrypted working key by aes algorithm and is generated secondary key, be stored in top of file, become the part of encrypt file;
During file decryption, take out the secondary key of file header part, use master key in conjunction with AES it to be deciphered, obtain working key; To the deciphering of encrypt file main part, obtain source file again.
5. a kind of software security means of defence based on linux system as claimed in claim 4 is characterized in that: set up hidden partition, and in hidden partition Saving Safe Strategy; When reading to process, after the secure file module is intercepted and read disk requests, check whether the process of access allows to access encrypt file, if do not allow, directly let pass; Judge by the encrypted bits of tail of file whether this document is encrypted, encrypted if this document does not have, so directly let pass; Otherwise re-construct request data package, read the data content of designated length, and data are decrypted, return to original request data package;
Write when processing, after the secure file module is intercepted disk write operation, judge whether needs encrypting storing of this document according to security strategy, if need to encrypt, then data are encrypted, and write disk.
6. a kind of software security means of defence based on linux system as claimed in claim 4, it is characterized in that: adopt ciphertext and plaintext double buffering method: an encrypt file is provided with two kinds of page buffered datas, a kind of page buffered data is that expressly another kind of enciphered data is ciphertext; Kernel module judges whether process allows to access clear data, if allow, then access expressly cushions, otherwise only accesses the ciphertext buffering.
7. a kind of software security means of defence based on linux system as claimed in claim 6 is characterized in that: adopt the file integrality method of calibration: if file is defined as trusted resource, it is carried out integrity protection; If file corruption, system are recovered its data automatically; In data recovery procedure, resource backup and resource SHA1 hash data are corresponding one by one, are stored in the disk hidden partition; Before the access trusted resource, relatively the SHA1 data if do not mate, are recovered resource so from hidden partition.
CN2012102288067A 2012-07-04 2012-07-04 Software security protection method based on Linux system Pending CN103065082A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012102288067A CN103065082A (en) 2012-07-04 2012-07-04 Software security protection method based on Linux system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012102288067A CN103065082A (en) 2012-07-04 2012-07-04 Software security protection method based on Linux system

Publications (1)

Publication Number Publication Date
CN103065082A true CN103065082A (en) 2013-04-24

Family

ID=48107710

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012102288067A Pending CN103065082A (en) 2012-07-04 2012-07-04 Software security protection method based on Linux system

Country Status (1)

Country Link
CN (1) CN103065082A (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103778382A (en) * 2014-01-16 2014-05-07 宇龙计算机通信科技(深圳)有限公司 Access method of encrypted file and communication terminal
CN104866778A (en) * 2015-01-30 2015-08-26 武汉华工安鼎信息技术有限责任公司 A method and device for document security access control based on Linux kernel
CN104156659B (en) * 2014-08-14 2017-02-01 电子科技大学 Embedded system secure start method
CN106529350A (en) * 2016-11-11 2017-03-22 郑州云海信息技术有限公司 Secure storage system
CN104156672B (en) * 2014-08-06 2017-05-10 厦门天锐科技股份有限公司 data encryption protection method and system based on LINUX
CN108196981A (en) * 2017-12-29 2018-06-22 成都三零嘉微电子有限公司 The service protection strategy of power down during a kind of password TF card communication
CN108255644A (en) * 2017-12-29 2018-07-06 北京元心科技有限公司 File system recovery method and device
CN108616537A (en) * 2018-04-28 2018-10-02 湖南麒麟信安科技有限公司 A kind of conventional data encryption and decryption method and system of lower coupling
CN109905412A (en) * 2019-04-28 2019-06-18 山东渔翁信息技术股份有限公司 A kind of parallel encrypting and deciphering processing method of network data, device and medium
CN110807205A (en) * 2019-09-30 2020-02-18 奇安信科技集团股份有限公司 A file security protection method and device
CN111382433A (en) * 2018-12-29 2020-07-07 龙芯中科技术有限公司 Module loading method, device, equipment and storage medium
CN111539042A (en) * 2020-07-13 2020-08-14 南京云信达科技有限公司 Safe operation method based on trusted storage of core data files
CN112270012A (en) * 2020-11-19 2021-01-26 北京炼石网络技术有限公司 Device, method and system for distributed data security protection
CN112738083A (en) * 2020-12-28 2021-04-30 福建正孚软件有限公司 Cross-network cross-border data transmission based secure access key management system and method
CN114741706A (en) * 2022-03-10 2022-07-12 新华三大数据技术有限公司 Virtual disk file encryption method, device and equipment
CN119696928A (en) * 2025-02-21 2025-03-25 西安热工研究院有限公司 A method and system for transparent encryption and decryption of DCS controller files

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020019935A1 (en) * 1997-09-16 2002-02-14 Brian Andrew Encrypting file system and method
US20050091487A1 (en) * 2003-10-24 2005-04-28 Cross David B. System, method, and computer program product for file encrypton, decryption and transfer
CN1859088A (en) * 2005-05-08 2006-11-08 联想(北京)有限公司 Method for providing enciphering service and system using said method
CN101751536A (en) * 2009-12-16 2010-06-23 深圳市虹安信息技术有限公司 Transparent file encryption method for increasing file header
CN102014133A (en) * 2010-11-26 2011-04-13 清华大学 Method for implementing safe storage system in cloud storage environment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020019935A1 (en) * 1997-09-16 2002-02-14 Brian Andrew Encrypting file system and method
US20050091487A1 (en) * 2003-10-24 2005-04-28 Cross David B. System, method, and computer program product for file encrypton, decryption and transfer
CN1859088A (en) * 2005-05-08 2006-11-08 联想(北京)有限公司 Method for providing enciphering service and system using said method
CN101751536A (en) * 2009-12-16 2010-06-23 深圳市虹安信息技术有限公司 Transparent file encryption method for increasing file header
CN102014133A (en) * 2010-11-26 2011-04-13 清华大学 Method for implementing safe storage system in cloud storage environment

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103778382A (en) * 2014-01-16 2014-05-07 宇龙计算机通信科技(深圳)有限公司 Access method of encrypted file and communication terminal
CN104156672B (en) * 2014-08-06 2017-05-10 厦门天锐科技股份有限公司 data encryption protection method and system based on LINUX
CN104156659B (en) * 2014-08-14 2017-02-01 电子科技大学 Embedded system secure start method
CN104866778A (en) * 2015-01-30 2015-08-26 武汉华工安鼎信息技术有限责任公司 A method and device for document security access control based on Linux kernel
CN106529350A (en) * 2016-11-11 2017-03-22 郑州云海信息技术有限公司 Secure storage system
CN108255644B (en) * 2017-12-29 2021-12-31 北京元心科技有限公司 File system recovery method and device
CN108196981B (en) * 2017-12-29 2021-08-27 成都三零嘉微电子有限公司 Power-down service protection strategy during password TF card communication
CN108255644A (en) * 2017-12-29 2018-07-06 北京元心科技有限公司 File system recovery method and device
CN108196981A (en) * 2017-12-29 2018-06-22 成都三零嘉微电子有限公司 The service protection strategy of power down during a kind of password TF card communication
CN108616537A (en) * 2018-04-28 2018-10-02 湖南麒麟信安科技有限公司 A kind of conventional data encryption and decryption method and system of lower coupling
CN111382433A (en) * 2018-12-29 2020-07-07 龙芯中科技术有限公司 Module loading method, device, equipment and storage medium
CN111382433B (en) * 2018-12-29 2022-12-13 龙芯中科技术股份有限公司 Module loading method, device, equipment and storage medium
CN109905412A (en) * 2019-04-28 2019-06-18 山东渔翁信息技术股份有限公司 A kind of parallel encrypting and deciphering processing method of network data, device and medium
CN110807205A (en) * 2019-09-30 2020-02-18 奇安信科技集团股份有限公司 A file security protection method and device
CN111539042A (en) * 2020-07-13 2020-08-14 南京云信达科技有限公司 Safe operation method based on trusted storage of core data files
CN112270012A (en) * 2020-11-19 2021-01-26 北京炼石网络技术有限公司 Device, method and system for distributed data security protection
CN112738083A (en) * 2020-12-28 2021-04-30 福建正孚软件有限公司 Cross-network cross-border data transmission based secure access key management system and method
CN112738083B (en) * 2020-12-28 2023-05-19 福建正孚软件有限公司 System and method for managing secure access key based on cross-network and cross-border data transmission
CN114741706A (en) * 2022-03-10 2022-07-12 新华三大数据技术有限公司 Virtual disk file encryption method, device and equipment
CN119696928A (en) * 2025-02-21 2025-03-25 西安热工研究院有限公司 A method and system for transparent encryption and decryption of DCS controller files
CN119696928B (en) * 2025-02-21 2025-06-03 西安热工研究院有限公司 Transparent encryption and decryption method and system for DCS controller file

Similar Documents

Publication Publication Date Title
CN103065082A (en) Software security protection method based on Linux system
US11088846B2 (en) Key rotating trees with split counters for efficient hardware replay protection
CN112005237B (en) Secure collaboration between processors and processing accelerators in a secure zone
US20230080528A1 (en) Smart data protection
CN109587106B (en) Cross-domain security in a password-partitioned cloud
US9898624B2 (en) Multi-core processor based key protection method and system
US9798900B2 (en) Flexible counter system for memory protection
CN110032885B (en) Method, node and storage medium for implementing privacy protection in block chain
US10496841B2 (en) Dynamic and efficient protected file layout
US20040093505A1 (en) Open generic tamper resistant CPU and application system thereof
CN111901402A (en) Method, node and storage medium for implementing privacy protection in block chain
CN108133144A (en) A kind of virtual disk files guard method, device, equipment and readable storage medium storing program for executing
WO2020192406A1 (en) Method and apparatus for data storage and verification
US10496814B2 (en) Software integrity checking systems and methods
CN110825672B (en) High performance autonomous hardware engine for online encryption processing
EP3271828B1 (en) Cache and data organization for memory protection
CN111651787A (en) Method, node and storage medium for implementing privacy protection in block chain
CN104579689A (en) Soft secret key system and implementation method
CN104463020B (en) The method of memory data integrity protection
US20240073013A1 (en) High performance secure io
US8844024B1 (en) Systems and methods for using tiered signing certificates to manage the behavior of executables
CN107330336B (en) Instant encryption and decryption method and system for memory page of Linux operating system
Zhang et al. QKPT: securing your private keys in cloud with performance, scalability and transparency
EP4202748A1 (en) Data oblivious cryptographic computing
US20220014381A1 (en) Message authentication code (mac) generation for live migration of encrypted virtual machiness

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130424