CN113703963A - Multi-party secure computing hardware platform system based on raspberry group - Google Patents
Multi-party secure computing hardware platform system based on raspberry group Download PDFInfo
- Publication number
- CN113703963A CN113703963A CN202110848439.XA CN202110848439A CN113703963A CN 113703963 A CN113703963 A CN 113703963A CN 202110848439 A CN202110848439 A CN 202110848439A CN 113703963 A CN113703963 A CN 113703963A
- Authority
- CN
- China
- Prior art keywords
- cluster
- raspberry
- security
- layer
- hardware platform
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5005—Allocation of resources, e.g. of the central processing unit [CPU] to service a request
- G06F9/5027—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
- G06F9/5072—Grid computing
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Mathematical Physics (AREA)
- Storage Device Security (AREA)
Abstract
The application provides many parties' safety calculation hardware platform system based on raspberry group relates to computer technology field, the system includes: the system comprises a bottom layer system, a cluster console module, a cluster performance monitoring module, a system safety protection module and a risk control module. The multi-party secure computing hardware platform system based on the raspberry group provided by the embodiment of the application realizes efficient unified allocation of resources through deployment of clusters on the basis of the existing raspberry group, and performs unified allocation of resources by virtue of the advantages of the architecture of the raspberry group, a native system and the like, so that efficient resource allocation and utilization are realized. The security of an operating system on a kernel level and the security of a near source on a hardware level are realized, a firewall and an audit strategy are arranged in the security system, the security of each platform of multi-party computing is considered from the perspectives of hackers and security researchers, so that a project is closer to a real environment, and the security problem of the multi-party computing platform of data is effectively realized.
Description
Technical Field
The application relates to the technical field of computers, in particular to a multi-party secure computing hardware platform system based on raspberry groups.
Background
In the era of digital economy, more and more enterprises or organizations need to deeply cooperate with business partners upstream and downstream of the industry chain in the field of data circulation and transaction. Because the data can be better released to have larger value only through the cooperative computing of all the data, the production efficiency is improved, and the industrial innovation is promoted. Data sharing and circulation will become a rigid business requirement. The method ensures that privacy information such as personal information, business confidentiality or unique data resources and the like cannot be leaked in the data processing and circulation process, and is a precondition for enterprises or organizations to participate in data sharing and circulation cooperation.
Under the demand of such a large amount, personal information safety involved in communication of a large number of cloud devices becomes very important, and whether information can be guaranteed not to be leaked, cracked or lost becomes an important index for judging cloud computing. The existing equipment cloud computing platform based on fully homomorphic encryption cannot guarantee data security, is low in computing efficiency and high in resource occupation, and cannot meet requirements.
Disclosure of Invention
The purpose of the application aims to solve at least one of the technical defects, especially the technical defects that the data security of the existing cloud computing platform based on the fully homomorphic encryption cannot be guaranteed, the computing efficiency is low, the resource occupation is high, and the requirement cannot be met.
In a first aspect, a raspberry pi-based multi-party secure computing hardware platform system is provided, the system comprising:
the system comprises a bottom layer system, a management system and a management system, wherein the bottom layer system is a raspberry dispatching source system based on an ARM architecture and is used for providing support for an operating system kernel;
the cluster console module comprises a cluster interface and is used for instruction sending and authentication;
the cluster performance monitoring module is used for displaying the real-time performance, the system information and the system environment of the cluster;
the system safety protection module is used for system safety protection;
and the risk control module is used for monitoring system risks and forbidding the IP corresponding to the risks when the risks are detected.
As a possible embodiment of the present application, in this embodiment, the cluster console module includes:
the unified instruction sending interface is a graphical instruction set interface and is used for controlling other modules and checking the states of the other modules;
and the unified authentication interface is used for the user to authorize the login of the system.
As a possible implementation manner of the present application, in this implementation manner, the cluster performance monitoring module includes:
the real-time performance display page is used for displaying the current system running state;
the cluster system information page is used for displaying the system information of the cluster;
and the cluster system environment page is used for showing the environment information of the clusters according to time.
As a possible embodiment of the present application, in this embodiment, the system safety protection module includes:
the bottom system safety protection unit is used for protecting the safety of the bottom system;
the network layer safety protection unit is used for carrying out safety protection on a network layer system;
and the flow auditing unit is used for monitoring and auditing the system flow.
As a possible implementation manner of the present application, in this implementation manner, the risk control module includes a threat detection unit, a risk monitoring unit, an IP block unit, and a security log recording unit, and is configured to monitor and record system security.
As a possible implementation manner of the present application, in this implementation manner, the architecture of the system includes:
the hardware layer is based on the raspberry pi and is used for providing support for an operating system kernel;
the operating system kernel is used for performing memory processing, signal processing, process allocation and system calling;
the data layer is a database on the target system and is used for storing related logs and filtering and storing protection strategies;
an application layer comprising an executable application on a target system;
and the display layer is used for rendering and interactive operation of the template engine.
As a possible embodiment of the present application, in this embodiment, the operating system kernel layer is loaded with a Linux kernel, and the kernel is provided with driver installation authentication for authenticating the installation of a non-platform driver.
As a possible implementation manner of the present application, in this implementation manner, the operations of the hardware layer are driven, invoked and implemented by the kernel layer of the operating system.
The multi-party secure computing hardware platform system based on the raspberry group provided by the embodiment of the application realizes efficient unified allocation of resources through deployment of clusters on the basis of the existing raspberry group, and performs unified allocation of resources by virtue of the advantages of the architecture of the raspberry group, a native system and the like, so that efficient resource allocation and utilization are realized. The multi-party secure computing hardware platform is realized by modifying and recompiling the raspberry group kernel. The security of an operating system at a kernel level, the near-source security at a hardware level, and the built-in firewall and audit strategy are realized, and the multi-dimensional network security requirements of related users can be met. From the perspective of hackers and security researchers, the security of each platform of multi-party computing is considered, so that the project is closer to the real environment, and the security problem of the multi-party computing platform of data is effectively realized.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings used in the description of the embodiments of the present application will be briefly described below.
Fig. 1 is a schematic structural diagram of a raspberry pi-based multi-party secure computing hardware platform system according to an embodiment of the present disclosure;
fig. 2 is a schematic structural diagram of a cluster console module according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of a cluster performance monitoring module according to an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of a system safety protection module according to an embodiment of the present disclosure;
FIG. 5 is a system architecture diagram according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
The above and other features, advantages and aspects of various embodiments of the present application will become more apparent from the following detailed description when taken in conjunction with the accompanying drawings. Throughout the drawings, the same or similar reference numbers refer to the same or similar elements. It should be understood that the drawings are schematic and that elements and features are not necessarily drawn to scale.
Detailed Description
Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary only for the purpose of explaining the present application and are not to be construed as limiting the present application.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. As used herein, the term "and/or" includes all or any element and all combinations of one or more of the associated listed items.
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
The application provides a multi-party secure computing hardware platform system based on raspberry pi, which aims to solve the technical problems in the prior art.
The following describes the technical solutions of the present application and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
An embodiment of the present application provides a multi-party secure computing hardware platform system based on raspberry pi, and as shown in fig. 1, the system includes:
the system comprises a bottom layer system 101, a management system and a management system, wherein the bottom layer system is a raspberry dispatching source system based on an ARM architecture and is used for providing support for an operating system kernel;
a cluster console module 102, including a cluster interface, for instruction transmission and authentication;
the cluster performance monitoring module 103 is used for displaying the real-time performance, the system information and the system environment of the cluster;
a system security protection module 104 for system security protection;
and the risk control module 105 is configured to monitor a system risk and block an IP corresponding to the risk when the risk is detected.
In the embodiment of the application, the bottom layer system is a raspberry dispatching source system based on an ARM architecture, and modification and recompilation of the bottom layer of the system are performed aiming at the implementation of the platform, so that the system is more suitable for the platform. The cluster performance monitoring module comprises a real-time performance display page of a cluster, a cluster system information page, a cluster system environment page and a unified instruction sending interface which is a graphical instruction set interface, can directly control other modules and check the states of the other modules. The unified authentication page is used for authentication and is mainly used for logging in a system and granting tokens to ensure that different modules accessed by different users have different permissions. The real-time performance display page is used for displaying the current system running state. The cluster system information page is used for displaying the system information of the cluster, and the cluster system environment page is used for displaying the cluster system environment. The system safety protection module comprises a bottom system safety protection part, a network layer safety protection part and a flow audit part. The bottom system security protection is a system modified based on a Linux kernel, and is compiled into a new system based on an original system, so that the system is higher in security and better in usability and compatibility. The kernel can call a network card to realize soft routing, realizes the capture and monitoring of the flow in a soft routing mode, audits the flow, and sends an alarm when abnormal flow (namely attack behavior) occurs. The risk control module comprises a threat detection part, a risk monitoring part, an IP (Internet protocol) blocking part and a safety log recording part, wherein safety protection is mainly carried out from an application layer, some flow which can not be identified and distinguished by a bottom layer can enter the layer to be recorded in a network layer, abnormal behaviors can be found through recorded audit, when abnormal attack behaviors occur, manual blocking can be carried out on a target IP, and cold and hot backup of logs can be supported.
The multi-party secure computing hardware platform system based on the raspberry group provided by the embodiment of the application realizes efficient unified allocation of resources through deployment of clusters on the basis of the existing raspberry group, and performs unified allocation of resources by virtue of the advantages of the architecture of the raspberry group, a native system and the like, so that efficient resource allocation and utilization are realized. The multi-party secure computing hardware platform is realized by modifying and recompiling the raspberry group kernel. The security of an operating system at a kernel level, the near-source security at a hardware level, and the built-in firewall and audit strategy are realized, and the multi-dimensional network security requirements of related users can be met. From the perspective of hackers and security researchers, the security of each platform of multi-party computing is considered, so that the project is closer to the real environment, and the security problem of the multi-party computing platform of data is effectively realized.
As a possible embodiment of the present application, in this embodiment, as shown in fig. 2, the cluster console module includes:
a unified instruction sending interface 201 which is a graphical instruction set interface and is used for controlling other modules and checking the states of the other modules;
and the unified authentication interface 202 is used for authorizing the user to log in the system.
In the embodiment of the application, a cluster console module displays a cluster state by a user, wherein the cluster state can be displayed through a graphical instruction set interface, a human-computer interaction module receives a control instruction input by the user, other modules are controlled, and the operating states of other modules can be checked through the graphical instruction set interface. The unified authentication page is used for authentication and is mainly used for logging in a system and granting tokens to ensure that different modules accessed by different users have different permissions.
As a possible embodiment of the present application, in this embodiment, as shown in fig. 3, the cluster performance monitoring module includes:
a real-time performance display page 301 for displaying the current system operating state;
a cluster system information page 302 for displaying system information of a cluster;
and a cluster system environment page 303 for showing the environment information of the on-time cluster.
In the embodiment of the application, the real-time performance display page is used for displaying the current system running state. The cluster system information page is used for displaying the system information of the cluster, and the cluster system environment page is used for displaying the cluster system environment. All pages are integrated in one system, so that the fully homomorphic encryption operation of data is realized, a perfect safety monitoring mechanism can give an early warning in time, and malicious input of a user and stealing of data by hackers are prevented.
As a possible embodiment of the present application, in this embodiment, as shown in fig. 4, the system safety protection module includes:
a bottom layer system security protection unit 401, configured to protect the bottom layer system;
a network layer security protection unit 402, configured to perform security protection on a network layer system;
and a flow auditing unit 403, configured to monitor and audit system flow.
In the embodiment of the application, the bottom system security protection is a system modified based on a Linux kernel, and is compiled into a new system based on an original system, so that the security is higher, and the usability and the compatibility are better. The kernel can call a network card to realize soft routing, realizes the capture and monitoring of the flow in a soft routing mode, audits the flow, and sends an alarm when abnormal flow (namely attack behavior) occurs. The risk control module comprises a threat detection unit, a risk monitoring unit, an IP (Internet protocol) blocking unit and a safety log recording unit and is used for monitoring and recording the system safety.
As a possible embodiment of the present application, in this embodiment, as shown in fig. 5, the architecture of the system includes:
a hardware layer 501, which is a raspberry-based hardware layer, for providing support for the kernel of the operating system;
the operating system kernel 502 is configured to perform memory processing, signal processing, process allocation, and system call;
the data layer 503 is a database on the target system, and is used for saving related logs, and filtering and storing protection policies;
an application layer 504 comprising executable applications on the target system;
and the display layer 505 is used for rendering and interactive operation of the template engine.
In the embodiment of the application, the hardware layer is mainly a raspberry group, and all hardware is based on the raspberry group and can provide support for the kernel of the operating system.
In the embodiment of the present application, the kernel of the operating system includes functional points such as memory processing, signal processing, process allocation, system call, and the like. For enabling the execution of the software platform and interfacing the operations of the related hardware. The data layer is a database on the target system, mainly relates to the storage of related logs, realizes that log records on other layers penetrate through all levels, and is also used for storing protection strategies and filtering strategies, such as forbidden IP lists, filtering parameter strategies and the like. The system application comprises a firewall developed along with a platform, log management and audit, an IP filtering strategy, a flow audit strategy and the like, also comprises a graphical monitoring module developed on the basis of PHP, Python and other languages for monitoring the platform, and also comprises related software for supporting cluster operation to carry out uniform resource allocation management. The presentation layer includes template engine rendering and interaction operations. The running condition of the cluster can be seen through a graphical interface, the input points at the front end are limited, all the inputs are strictly controllable, and malicious attacks are prevented through filtering by layer of strategies.
In the embodiment of the application, the kernel layer (4) of the operating system is provided with a modified Linux kernel, the modified Linux kernel is based on raspberpypi-kernel _1.20200601+ arm64-1, the authentication of access equipment, the strategy of GPIO port access and other security configurations of the kernel layer are mainly modified, in addition, the drive is strictly limited, the installation of a non-platform necessary drive is forbidden, the strict identity authentication is required even if the installation is required, and the behavior of installing a malicious drive in a possible malicious attack and silence mode is avoided. The related operation of the hardware layer is driven by the kernel layer of the operating system to call and realize.
The multi-party secure computing hardware platform system based on the raspberry group provided by the embodiment of the application realizes efficient unified allocation of resources through deployment of clusters on the basis of the existing raspberry group, and performs unified allocation of resources by virtue of the advantages of the architecture of the raspberry group, a native system and the like, so that efficient resource allocation and utilization are realized. The multi-party secure computing hardware platform is realized by modifying and recompiling the raspberry group kernel. The security of an operating system at a kernel level, the near-source security at a hardware level, and the built-in firewall and audit strategy are realized, and the multi-dimensional network security requirements of related users can be met. From the perspective of hackers and security researchers, the security of each platform of multi-party computing is considered, so that the project is closer to the real environment, and the security problem of the multi-party computing platform of data is effectively realized.
In an alternative embodiment, an electronic device is provided, as shown in fig. 6, the electronic device 4000 shown in fig. 6 comprising: a processor 4001 and a memory 4003. Processor 4001 is coupled to memory 4003, such as via bus 4002. Optionally, the electronic device 4000 may further comprise a transceiver 4004. In addition, the transceiver 4004 is not limited to one in practical applications, and the structure of the electronic device 4000 is not limited to the embodiment of the present application.
The Processor 4001 may be a CPU (Central Processing Unit), a general-purpose Processor, a DSP (Digital Signal Processor), an ASIC (Application Specific Integrated Circuit), an FPGA (Field Programmable Gate Array) or other Programmable logic device, a transistor logic device, a hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor 4001 may also be a combination that performs a computational function, including, for example, a combination of one or more microprocessors, a combination of a DSP and a microprocessor, or the like.
The Memory 4003 may be a ROM (Read Only Memory) or other types of static storage devices that can store static information and instructions, a RAM (Random Access Memory) or other types of dynamic storage devices that can store information and instructions, an EEPROM (Electrically Erasable Programmable Read Only Memory), a CD-ROM (Compact Disc Read Only Memory) or other optical Disc storage, optical Disc storage (including Compact Disc, laser Disc, optical Disc, digital versatile Disc, blu-ray Disc, etc.), a magnetic Disc storage medium or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to these.
The memory 4003 is used for storing application codes for executing the scheme of the present application, and the execution is controlled by the processor 4001. Processor 4001 is configured to execute application code stored in memory 4003 to implement what is shown in the foregoing method embodiments.
Among them, electronic devices include but are not limited to: computers, tablets, industrial controllers, and the like.
The present application provides a computer-readable storage medium, on which a computer program is stored, which, when running on a computer, enables the computer to execute the corresponding content in the foregoing method embodiments. Compared with the prior art, the multi-party secure computing hardware platform system based on the raspberry group, provided by the embodiment of the application, realizes efficient and unified allocation of resources through deployment of the cluster on the basis of the existing raspberry group, and performs unified allocation of the resources by virtue of the advantages of the architecture, the native system and the like of the raspberry group, so that efficient resource allocation and utilization are realized. The multi-party secure computing hardware platform is realized by modifying and recompiling the raspberry group kernel. The security of an operating system at a kernel level, the near-source security at a hardware level, and the built-in firewall and audit strategy are realized, and the multi-dimensional network security requirements of related users can be met. From the perspective of hackers and security researchers, the security of each platform of multi-party computing is considered, so that the project is closer to the real environment, and the security problem of the multi-party computing platform of data is effectively realized.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
The foregoing is only a partial embodiment of the present application, and it should be noted that, for those skilled in the art, several modifications and decorations can be made without departing from the principle of the present application, and these modifications and decorations should also be regarded as the protection scope of the present application.
Claims (8)
1. A raspberry pi based multi-party secure computing hardware platform system, the system comprising:
the system comprises a bottom layer system, a management system and a management system, wherein the bottom layer system is a raspberry dispatching source system based on an ARM architecture and is used for providing support for an operating system kernel;
the cluster console module comprises a cluster interface and is used for instruction sending and authentication;
the cluster performance monitoring module is used for displaying the real-time performance, the system information and the system environment of the cluster;
the system safety protection module is used for system safety protection;
and the risk control module is used for monitoring system risks and forbidding the IP corresponding to the risks when the risks are detected.
2. The raspberry pi based multi-party secure computing hardware platform system according to claim 1, wherein said cluster console module comprises:
the unified instruction sending interface is a graphical instruction set interface and is used for controlling other modules and checking the states of the other modules;
and the unified authentication interface is used for the user to authorize the login of the system.
3. The raspberry pi based multi-party secure computing hardware platform system of claim 1, wherein said cluster performance monitoring module comprises:
the real-time performance display page is used for displaying the current system running state;
the cluster system information page is used for displaying the system information of the cluster;
and the cluster system environment page is used for showing the environment information of the clusters according to time.
4. The raspberry pi based multi-party secure computing hardware platform system of claim 1, wherein said system safeguard module comprises:
the bottom system safety protection unit is used for protecting the safety of the bottom system;
the network layer safety protection unit is used for carrying out safety protection on a network layer system;
and the flow auditing unit is used for monitoring and auditing the system flow.
5. The raspberry pi based multi-party secure computing hardware platform system of claim 1, wherein the risk control module comprises a threat detection unit, a risk monitoring unit, an IP block unit, and a security log recording unit for monitoring and recording system security.
6. The raspberry pi based multi-party secure computing hardware platform system according to claim 1, wherein the architecture of said system comprises:
the hardware layer is based on the raspberry pi and is used for providing support for an operating system kernel;
the operating system kernel is used for performing memory processing, signal processing, process allocation and system calling;
the data layer is a database on the target system and is used for storing related logs and filtering and storing protection strategies;
an application layer comprising an executable application on a target system;
and the display layer is used for rendering and interactive operation of the template engine.
7. The raspberry pi based multi-party secure computing hardware platform system of claim 6, wherein the operating system kernel layer is loaded with a Linux kernel, and the kernel is provided with driver installation authentication for identity authentication of non-platform driver installations.
8. The raspberry pi based multi-party secure computing hardware platform system of claim 6, wherein the operations of said hardware layer are driven, invoked and implemented by said operating system kernel layer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110848439.XA CN113703963A (en) | 2021-07-27 | 2021-07-27 | Multi-party secure computing hardware platform system based on raspberry group |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110848439.XA CN113703963A (en) | 2021-07-27 | 2021-07-27 | Multi-party secure computing hardware platform system based on raspberry group |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113703963A true CN113703963A (en) | 2021-11-26 |
Family
ID=78650538
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110848439.XA Withdrawn CN113703963A (en) | 2021-07-27 | 2021-07-27 | Multi-party secure computing hardware platform system based on raspberry group |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113703963A (en) |
-
2021
- 2021-07-27 CN CN202110848439.XA patent/CN113703963A/en not_active Withdrawn
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11469976B2 (en) | System and method for cloud-based control-plane event monitor | |
US10664592B2 (en) | Method and system to securely run applications using containers | |
CN102184372B (en) | Reverse-sandbox-based mobilephone payment protection method | |
CN101667232B (en) | Terminal credible security system and method based on credible computing | |
CN102222292B (en) | Mobile phone payment protection method | |
CN109997138A (en) | For detecting the system and method for calculating the malicious process in equipment | |
Ouda et al. | The impact of cloud computing on network security and the risk for organization behaviors | |
CN110543775B (en) | Data security protection method and system based on super-fusion concept | |
CN101047701A (en) | System and method for ensuring safety operation of applied program | |
CN1743992A (en) | Computer operating system safety protecting method | |
WO2018182885A1 (en) | Secure software defined storage | |
US10169584B1 (en) | Systems and methods for identifying non-malicious files on computing devices within organizations | |
Grace et al. | Behaviour analysis of inter-app communication using a lightweight monitoring app for malware detection | |
US8566585B2 (en) | System and a method for processing system calls in a computerized system that implements a kernel | |
CN110659478B (en) | Method for detecting malicious files preventing analysis in isolated environment | |
US11223651B2 (en) | Augmented data collection from suspected attackers of a computer network | |
US11122079B1 (en) | Obfuscation for high-performance computing systems | |
CN117032894A (en) | Container security state detection method and device, electronic equipment and storage medium | |
EP3535681B1 (en) | System and method for detecting and for alerting of exploits in computerized systems | |
CN116522355A (en) | Electric power data boundary protection method, equipment, medium and device | |
US9560028B1 (en) | Systems and methods for filtering interprocess communications | |
CN113703963A (en) | Multi-party secure computing hardware platform system based on raspberry group | |
CN103051608B (en) | A kind of method and apparatus of movable equipment access monitoring | |
CN111159714B (en) | Method and system for verifying credibility of main body in operation in access control | |
WO2022046365A1 (en) | Advanced detection of identity-based attacks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20211126 |