EA201000361A1 - METHOD OF IMPLEMENTATION OF TRUSTED CALCULATIONS - Google Patents

METHOD OF IMPLEMENTATION OF TRUSTED CALCULATIONS

Info

Publication number
EA201000361A1
EA201000361A1 EA201000361A EA201000361A EA201000361A1 EA 201000361 A1 EA201000361 A1 EA 201000361A1 EA 201000361 A EA201000361 A EA 201000361A EA 201000361 A EA201000361 A EA 201000361A EA 201000361 A1 EA201000361 A1 EA 201000361A1
Authority
EA
Eurasian Patent Office
Prior art keywords
instructions
task
event monitoring
operating system
monitoring monitor
Prior art date
Application number
EA201000361A
Other languages
Russian (ru)
Other versions
EA019399B1 (en
Inventor
Александр Викторович Шмид
Вячеслав Владимирович Наумов
Original Assignee
Закрытое Акционерное Общество "Ес-Лизинг"
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Закрытое Акционерное Общество "Ес-Лизинг" filed Critical Закрытое Акционерное Общество "Ес-Лизинг"
Priority to EA201000361A priority Critical patent/EA019399B1/en
Publication of EA201000361A1 publication Critical patent/EA201000361A1/en
Publication of EA019399B1 publication Critical patent/EA019399B1/en

Links

Landscapes

  • Debugging And Monitoring (AREA)
  • Storage Device Security (AREA)

Abstract

Изобретение относится к области информатики, а более конкретно - к способу реализации доверенных вычислений. Настоящее изобретение может найти применение при создании и эксплуатации компьютерных систем различного назначения, в которых необходимо обеспечить высокий уровень доверия к вычислительному процессу и обеспечению безопасности, а изучение исходных текстов программного обеспечения по различным причинам невозможно или затруднено. Настоящее изобретение относится к способу реализации доверенных вычислений в компьютерной системе, включающей по меньшей мере один процессор, выполняющий инструкции, задачи, состоящие из инструкций, по меньшей мере одну операционную систему, являющуюся выделенной задачей, которая может запускать и/или останавливать выполнение других задач, монитора контроля событий, также являющегося задачей, и базы данных, содержащей разрешенные инструкции и/или их последовательности, заключающемуся в том, что монитор контроля событий запускается операционной системой, после чего он переводит процессор в режим контроля событий, при котором исполнение по меньшей мере части инструкций любой задачи, включая операционную систему, вызывает в мониторе контроля событий события, позволяющие определять выполняемые задачей инструкции и сравнивать выполняемые задачей инструкции и/или их последовательности с находящимися в базе данных и выполнять их, если они разрешены, и не выполнять, если они не разрешены.The invention relates to the field of computer science, and more specifically to a method for implementing trusted computing. The present invention may find application in the creation and operation of computer systems for various purposes, in which it is necessary to ensure a high level of confidence in the computational process and security, and the study of the source texts of software for various reasons is impossible or difficult. The present invention relates to a method for implementing trusted computing in a computer system comprising at least one processor executing instructions, tasks consisting of instructions, at least one operating system being a dedicated task that can start and / or stop the execution of other tasks event monitoring monitor, which is also a task, and a database containing permitted instructions and / or their sequence, consisting in that the event monitoring monitor is running an operating system, after which it transfers the processor to the event monitoring mode, in which the execution of at least a part of instructions of any task, including the operating system, calls up events in the event monitoring monitor that allow determining the instructions performed by the task and comparing the instructions performed by the task and / or their sequence with those in the database and execute them if they are allowed, and do not execute them if they are not allowed.

EA201000361A 2010-03-19 2010-03-19 Method for implementation of trusted calculations EA019399B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EA201000361A EA019399B1 (en) 2010-03-19 2010-03-19 Method for implementation of trusted calculations

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EA201000361A EA019399B1 (en) 2010-03-19 2010-03-19 Method for implementation of trusted calculations

Publications (2)

Publication Number Publication Date
EA201000361A1 true EA201000361A1 (en) 2011-10-31
EA019399B1 EA019399B1 (en) 2014-03-31

Family

ID=44925718

Family Applications (1)

Application Number Title Priority Date Filing Date
EA201000361A EA019399B1 (en) 2010-03-19 2010-03-19 Method for implementation of trusted calculations

Country Status (1)

Country Link
EA (1) EA019399B1 (en)

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7376732B2 (en) * 2002-11-08 2008-05-20 Federal Network Systems, Llc Systems and methods for preventing intrusion at a web host
US7552426B2 (en) * 2003-10-14 2009-06-23 Microsoft Corporation Systems and methods for using synthetic instructions in a virtual machine

Also Published As

Publication number Publication date
EA019399B1 (en) 2014-03-31

Similar Documents

Publication Publication Date Title
CN110737895B (en) Extending dynamic detection of malware using static and dynamic malware analysis
RU2016115859A (en) SYSTEM AND METHOD FOR APPLYING THE REPUTATION INDICATOR TO EASY SCAN ON THE PRESENCE OF MALICIOUS APPLICATIONS
BR112014015443A2 (en) system, method and apparatus for electronic patient care
WO2012135192A3 (en) System and method for virtual machine monitor based anti-malware security
WO2016118033A3 (en) Systems and methods for exposing a result of a current processor instruction upon exiting a virtual machine
JP2014521184A5 (en)
WO2014013499A8 (en) System and method for operating system agnostic hardware validation
GB2505104A (en) Malware detection
WO2012112833A3 (en) System and method for application attestation
GB2523057A (en) User trusted device for detecting a virtualized environment
JP2014525105A5 (en)
BR112013005586A2 (en) multimodal systems for processing information and methods for running multimodal applications
RU2012156443A (en) SYSTEM AND METHOD FOR DETECTING THREATS IN THE CODE USED BY THE VIRTUAL MACHINE
BR112014018761A8 (en) METHOD TO REDUCE PLATFORM INITIALIZATION TIMES BY PROVIDING SLOW INPUT/OUTPUT ABSTRACTIONS
JP2014524608A5 (en)
IN2014MU00158A (en)
GB201118490D0 (en) A method and apparatus for preventing unwanted code execution
WO2012099643A3 (en) Integrated environment for execution monitoring and profiling of applications running on multi-processor system-on-chip
JP2016513324A5 (en)
JP2015508549A5 (en) Computer-implemented method, non-temporary computer-readable medium and computer system for identifying Trojanized applications (apps) for mobile environments
EA201490684A2 (en) METHOD FOR DECORATING MALWARE PROGRAMS BLOCKING PC WORK WITH THE USE OF A SEPARATE DEVICE TO ACTIVATE THE USER TO PROTECT THE HARMFUL SOFTWARE PROTECTION
GB2506551A (en) Unified,adaptive ras for hybrid systems
GB2562014A (en) Prioritization of transactions
JP2014501412A5 (en)
JP2018523220A5 (en)

Legal Events

Date Code Title Description
MM4A Lapse of a eurasian patent due to non-payment of renewal fees within the time limit in the following designated state(s)

Designated state(s): AM AZ BY KZ KG MD TJ TM RU

NF4A Restoration of lapsed right to a eurasian patent

Designated state(s): RU

MM4A Lapse of a eurasian patent due to non-payment of renewal fees within the time limit in the following designated state(s)

Designated state(s): RU