EA201000361A1 - METHOD OF IMPLEMENTATION OF TRUSTED CALCULATIONS - Google Patents
METHOD OF IMPLEMENTATION OF TRUSTED CALCULATIONSInfo
- Publication number
- EA201000361A1 EA201000361A1 EA201000361A EA201000361A EA201000361A1 EA 201000361 A1 EA201000361 A1 EA 201000361A1 EA 201000361 A EA201000361 A EA 201000361A EA 201000361 A EA201000361 A EA 201000361A EA 201000361 A1 EA201000361 A1 EA 201000361A1
- Authority
- EA
- Eurasian Patent Office
- Prior art keywords
- instructions
- task
- event monitoring
- operating system
- monitoring monitor
- Prior art date
Links
Landscapes
- Debugging And Monitoring (AREA)
- Storage Device Security (AREA)
Abstract
Изобретение относится к области информатики, а более конкретно - к способу реализации доверенных вычислений. Настоящее изобретение может найти применение при создании и эксплуатации компьютерных систем различного назначения, в которых необходимо обеспечить высокий уровень доверия к вычислительному процессу и обеспечению безопасности, а изучение исходных текстов программного обеспечения по различным причинам невозможно или затруднено. Настоящее изобретение относится к способу реализации доверенных вычислений в компьютерной системе, включающей по меньшей мере один процессор, выполняющий инструкции, задачи, состоящие из инструкций, по меньшей мере одну операционную систему, являющуюся выделенной задачей, которая может запускать и/или останавливать выполнение других задач, монитора контроля событий, также являющегося задачей, и базы данных, содержащей разрешенные инструкции и/или их последовательности, заключающемуся в том, что монитор контроля событий запускается операционной системой, после чего он переводит процессор в режим контроля событий, при котором исполнение по меньшей мере части инструкций любой задачи, включая операционную систему, вызывает в мониторе контроля событий события, позволяющие определять выполняемые задачей инструкции и сравнивать выполняемые задачей инструкции и/или их последовательности с находящимися в базе данных и выполнять их, если они разрешены, и не выполнять, если они не разрешены.The invention relates to the field of computer science, and more specifically to a method for implementing trusted computing. The present invention may find application in the creation and operation of computer systems for various purposes, in which it is necessary to ensure a high level of confidence in the computational process and security, and the study of the source texts of software for various reasons is impossible or difficult. The present invention relates to a method for implementing trusted computing in a computer system comprising at least one processor executing instructions, tasks consisting of instructions, at least one operating system being a dedicated task that can start and / or stop the execution of other tasks event monitoring monitor, which is also a task, and a database containing permitted instructions and / or their sequence, consisting in that the event monitoring monitor is running an operating system, after which it transfers the processor to the event monitoring mode, in which the execution of at least a part of instructions of any task, including the operating system, calls up events in the event monitoring monitor that allow determining the instructions performed by the task and comparing the instructions performed by the task and / or their sequence with those in the database and execute them if they are allowed, and do not execute them if they are not allowed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EA201000361A EA019399B1 (en) | 2010-03-19 | 2010-03-19 | Method for implementation of trusted calculations |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EA201000361A EA019399B1 (en) | 2010-03-19 | 2010-03-19 | Method for implementation of trusted calculations |
Publications (2)
Publication Number | Publication Date |
---|---|
EA201000361A1 true EA201000361A1 (en) | 2011-10-31 |
EA019399B1 EA019399B1 (en) | 2014-03-31 |
Family
ID=44925718
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EA201000361A EA019399B1 (en) | 2010-03-19 | 2010-03-19 | Method for implementation of trusted calculations |
Country Status (1)
Country | Link |
---|---|
EA (1) | EA019399B1 (en) |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7376732B2 (en) * | 2002-11-08 | 2008-05-20 | Federal Network Systems, Llc | Systems and methods for preventing intrusion at a web host |
US7552426B2 (en) * | 2003-10-14 | 2009-06-23 | Microsoft Corporation | Systems and methods for using synthetic instructions in a virtual machine |
-
2010
- 2010-03-19 EA EA201000361A patent/EA019399B1/en not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
EA019399B1 (en) | 2014-03-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110737895B (en) | Extending dynamic detection of malware using static and dynamic malware analysis | |
RU2016115859A (en) | SYSTEM AND METHOD FOR APPLYING THE REPUTATION INDICATOR TO EASY SCAN ON THE PRESENCE OF MALICIOUS APPLICATIONS | |
BR112014015443A2 (en) | system, method and apparatus for electronic patient care | |
WO2012135192A3 (en) | System and method for virtual machine monitor based anti-malware security | |
WO2016118033A3 (en) | Systems and methods for exposing a result of a current processor instruction upon exiting a virtual machine | |
JP2014521184A5 (en) | ||
WO2014013499A8 (en) | System and method for operating system agnostic hardware validation | |
GB2505104A (en) | Malware detection | |
WO2012112833A3 (en) | System and method for application attestation | |
GB2523057A (en) | User trusted device for detecting a virtualized environment | |
JP2014525105A5 (en) | ||
BR112013005586A2 (en) | multimodal systems for processing information and methods for running multimodal applications | |
RU2012156443A (en) | SYSTEM AND METHOD FOR DETECTING THREATS IN THE CODE USED BY THE VIRTUAL MACHINE | |
BR112014018761A8 (en) | METHOD TO REDUCE PLATFORM INITIALIZATION TIMES BY PROVIDING SLOW INPUT/OUTPUT ABSTRACTIONS | |
JP2014524608A5 (en) | ||
IN2014MU00158A (en) | ||
GB201118490D0 (en) | A method and apparatus for preventing unwanted code execution | |
WO2012099643A3 (en) | Integrated environment for execution monitoring and profiling of applications running on multi-processor system-on-chip | |
JP2016513324A5 (en) | ||
JP2015508549A5 (en) | Computer-implemented method, non-temporary computer-readable medium and computer system for identifying Trojanized applications (apps) for mobile environments | |
EA201490684A2 (en) | METHOD FOR DECORATING MALWARE PROGRAMS BLOCKING PC WORK WITH THE USE OF A SEPARATE DEVICE TO ACTIVATE THE USER TO PROTECT THE HARMFUL SOFTWARE PROTECTION | |
GB2506551A (en) | Unified,adaptive ras for hybrid systems | |
GB2562014A (en) | Prioritization of transactions | |
JP2014501412A5 (en) | ||
JP2018523220A5 (en) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MM4A | Lapse of a eurasian patent due to non-payment of renewal fees within the time limit in the following designated state(s) |
Designated state(s): AM AZ BY KZ KG MD TJ TM RU |
|
NF4A | Restoration of lapsed right to a eurasian patent |
Designated state(s): RU |
|
MM4A | Lapse of a eurasian patent due to non-payment of renewal fees within the time limit in the following designated state(s) |
Designated state(s): RU |