发明名称 METHOD FOR ESTABLISHING A TRUSTED RUNNING ENVIRONMENT IN THE COMPUTER
摘要 <p>The present invention discloses a method for establishing a trusted running environment in the computer, the key of the invention is that the trusted file authentication module, the trusted process memory code authentication module are set in the OS, the secured OS is loaded and ran. The trusted file authentication module intercepts all of the file operation action, and processes the file according to the file operation type if the operation action is to the trusted file, or operates the file after verifies the eligibility for the file if the operation action is to the untrusted file. The trusted process memory code authentication module authenticates every fixed time whether the running state and the integrality for all of the process code are normal, and gives the alarm if abnormal, closes up and repairs the process after saves the field data ran by process, otherwise runs normally. Applying the present invention, whether the file and the process themselves are attacked is detected, thus the secure for the computer running environment is ensured whether the attack of known or unknown virus exists or not, and the application for user is convenience, the cost of realizing is low.</p>
申请公布号 WO2006058472(A1) 申请公布日期 2006.06.08
申请号 WO2005CN01017 申请日期 2005.07.11
申请人 LENOVO (BEIJING) LIMITED;WEI, WEI;PENG, CHAORAN;YIN, PING;LIU, YONGHUA 发明人 WEI, WEI;PENG, CHAORAN;YIN, PING;LIU, YONGHUA
分类号 G06F11/00;G06F1/00;G06F21/00 主分类号 G06F11/00
代理机构 代理人
主权项
地址