CN113703963A - Multi-party secure computing hardware platform system based on raspberry group - Google Patents

Multi-party secure computing hardware platform system based on raspberry group Download PDF

Info

Publication number
CN113703963A
CN113703963A CN202110848439.XA CN202110848439A CN113703963A CN 113703963 A CN113703963 A CN 113703963A CN 202110848439 A CN202110848439 A CN 202110848439A CN 113703963 A CN113703963 A CN 113703963A
Authority
CN
China
Prior art keywords
cluster
raspberry
security
layer
hardware platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202110848439.XA
Other languages
Chinese (zh)
Inventor
冯志林
刘春艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhijiang College of ZJUT
Original Assignee
Zhijiang College of ZJUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhijiang College of ZJUT filed Critical Zhijiang College of ZJUT
Priority to CN202110848439.XA priority Critical patent/CN113703963A/en
Publication of CN113703963A publication Critical patent/CN113703963A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5027Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • G06F9/5072Grid computing

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Mathematical Physics (AREA)
  • Storage Device Security (AREA)

Abstract

The application provides many parties' safety calculation hardware platform system based on raspberry group relates to computer technology field, the system includes: the system comprises a bottom layer system, a cluster console module, a cluster performance monitoring module, a system safety protection module and a risk control module. The multi-party secure computing hardware platform system based on the raspberry group provided by the embodiment of the application realizes efficient unified allocation of resources through deployment of clusters on the basis of the existing raspberry group, and performs unified allocation of resources by virtue of the advantages of the architecture of the raspberry group, a native system and the like, so that efficient resource allocation and utilization are realized. The security of an operating system on a kernel level and the security of a near source on a hardware level are realized, a firewall and an audit strategy are arranged in the security system, the security of each platform of multi-party computing is considered from the perspectives of hackers and security researchers, so that a project is closer to a real environment, and the security problem of the multi-party computing platform of data is effectively realized.

Description

Multi-party secure computing hardware platform system based on raspberry group
Technical Field
The application relates to the technical field of computers, in particular to a multi-party secure computing hardware platform system based on raspberry groups.
Background
In the era of digital economy, more and more enterprises or organizations need to deeply cooperate with business partners upstream and downstream of the industry chain in the field of data circulation and transaction. Because the data can be better released to have larger value only through the cooperative computing of all the data, the production efficiency is improved, and the industrial innovation is promoted. Data sharing and circulation will become a rigid business requirement. The method ensures that privacy information such as personal information, business confidentiality or unique data resources and the like cannot be leaked in the data processing and circulation process, and is a precondition for enterprises or organizations to participate in data sharing and circulation cooperation.
Under the demand of such a large amount, personal information safety involved in communication of a large number of cloud devices becomes very important, and whether information can be guaranteed not to be leaked, cracked or lost becomes an important index for judging cloud computing. The existing equipment cloud computing platform based on fully homomorphic encryption cannot guarantee data security, is low in computing efficiency and high in resource occupation, and cannot meet requirements.
Disclosure of Invention
The purpose of the application aims to solve at least one of the technical defects, especially the technical defects that the data security of the existing cloud computing platform based on the fully homomorphic encryption cannot be guaranteed, the computing efficiency is low, the resource occupation is high, and the requirement cannot be met.
In a first aspect, a raspberry pi-based multi-party secure computing hardware platform system is provided, the system comprising:
the system comprises a bottom layer system, a management system and a management system, wherein the bottom layer system is a raspberry dispatching source system based on an ARM architecture and is used for providing support for an operating system kernel;
the cluster console module comprises a cluster interface and is used for instruction sending and authentication;
the cluster performance monitoring module is used for displaying the real-time performance, the system information and the system environment of the cluster;
the system safety protection module is used for system safety protection;
and the risk control module is used for monitoring system risks and forbidding the IP corresponding to the risks when the risks are detected.
As a possible embodiment of the present application, in this embodiment, the cluster console module includes:
the unified instruction sending interface is a graphical instruction set interface and is used for controlling other modules and checking the states of the other modules;
and the unified authentication interface is used for the user to authorize the login of the system.
As a possible implementation manner of the present application, in this implementation manner, the cluster performance monitoring module includes:
the real-time performance display page is used for displaying the current system running state;
the cluster system information page is used for displaying the system information of the cluster;
and the cluster system environment page is used for showing the environment information of the clusters according to time.
As a possible embodiment of the present application, in this embodiment, the system safety protection module includes:
the bottom system safety protection unit is used for protecting the safety of the bottom system;
the network layer safety protection unit is used for carrying out safety protection on a network layer system;
and the flow auditing unit is used for monitoring and auditing the system flow.
As a possible implementation manner of the present application, in this implementation manner, the risk control module includes a threat detection unit, a risk monitoring unit, an IP block unit, and a security log recording unit, and is configured to monitor and record system security.
As a possible implementation manner of the present application, in this implementation manner, the architecture of the system includes:
the hardware layer is based on the raspberry pi and is used for providing support for an operating system kernel;
the operating system kernel is used for performing memory processing, signal processing, process allocation and system calling;
the data layer is a database on the target system and is used for storing related logs and filtering and storing protection strategies;
an application layer comprising an executable application on a target system;
and the display layer is used for rendering and interactive operation of the template engine.
As a possible embodiment of the present application, in this embodiment, the operating system kernel layer is loaded with a Linux kernel, and the kernel is provided with driver installation authentication for authenticating the installation of a non-platform driver.
As a possible implementation manner of the present application, in this implementation manner, the operations of the hardware layer are driven, invoked and implemented by the kernel layer of the operating system.
The multi-party secure computing hardware platform system based on the raspberry group provided by the embodiment of the application realizes efficient unified allocation of resources through deployment of clusters on the basis of the existing raspberry group, and performs unified allocation of resources by virtue of the advantages of the architecture of the raspberry group, a native system and the like, so that efficient resource allocation and utilization are realized. The multi-party secure computing hardware platform is realized by modifying and recompiling the raspberry group kernel. The security of an operating system at a kernel level, the near-source security at a hardware level, and the built-in firewall and audit strategy are realized, and the multi-dimensional network security requirements of related users can be met. From the perspective of hackers and security researchers, the security of each platform of multi-party computing is considered, so that the project is closer to the real environment, and the security problem of the multi-party computing platform of data is effectively realized.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings used in the description of the embodiments of the present application will be briefly described below.
Fig. 1 is a schematic structural diagram of a raspberry pi-based multi-party secure computing hardware platform system according to an embodiment of the present disclosure;
fig. 2 is a schematic structural diagram of a cluster console module according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of a cluster performance monitoring module according to an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of a system safety protection module according to an embodiment of the present disclosure;
FIG. 5 is a system architecture diagram according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
The above and other features, advantages and aspects of various embodiments of the present application will become more apparent from the following detailed description when taken in conjunction with the accompanying drawings. Throughout the drawings, the same or similar reference numbers refer to the same or similar elements. It should be understood that the drawings are schematic and that elements and features are not necessarily drawn to scale.
Detailed Description
Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary only for the purpose of explaining the present application and are not to be construed as limiting the present application.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. As used herein, the term "and/or" includes all or any element and all combinations of one or more of the associated listed items.
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
The application provides a multi-party secure computing hardware platform system based on raspberry pi, which aims to solve the technical problems in the prior art.
The following describes the technical solutions of the present application and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
An embodiment of the present application provides a multi-party secure computing hardware platform system based on raspberry pi, and as shown in fig. 1, the system includes:
the system comprises a bottom layer system 101, a management system and a management system, wherein the bottom layer system is a raspberry dispatching source system based on an ARM architecture and is used for providing support for an operating system kernel;
a cluster console module 102, including a cluster interface, for instruction transmission and authentication;
the cluster performance monitoring module 103 is used for displaying the real-time performance, the system information and the system environment of the cluster;
a system security protection module 104 for system security protection;
and the risk control module 105 is configured to monitor a system risk and block an IP corresponding to the risk when the risk is detected.
In the embodiment of the application, the bottom layer system is a raspberry dispatching source system based on an ARM architecture, and modification and recompilation of the bottom layer of the system are performed aiming at the implementation of the platform, so that the system is more suitable for the platform. The cluster performance monitoring module comprises a real-time performance display page of a cluster, a cluster system information page, a cluster system environment page and a unified instruction sending interface which is a graphical instruction set interface, can directly control other modules and check the states of the other modules. The unified authentication page is used for authentication and is mainly used for logging in a system and granting tokens to ensure that different modules accessed by different users have different permissions. The real-time performance display page is used for displaying the current system running state. The cluster system information page is used for displaying the system information of the cluster, and the cluster system environment page is used for displaying the cluster system environment. The system safety protection module comprises a bottom system safety protection part, a network layer safety protection part and a flow audit part. The bottom system security protection is a system modified based on a Linux kernel, and is compiled into a new system based on an original system, so that the system is higher in security and better in usability and compatibility. The kernel can call a network card to realize soft routing, realizes the capture and monitoring of the flow in a soft routing mode, audits the flow, and sends an alarm when abnormal flow (namely attack behavior) occurs. The risk control module comprises a threat detection part, a risk monitoring part, an IP (Internet protocol) blocking part and a safety log recording part, wherein safety protection is mainly carried out from an application layer, some flow which can not be identified and distinguished by a bottom layer can enter the layer to be recorded in a network layer, abnormal behaviors can be found through recorded audit, when abnormal attack behaviors occur, manual blocking can be carried out on a target IP, and cold and hot backup of logs can be supported.
The multi-party secure computing hardware platform system based on the raspberry group provided by the embodiment of the application realizes efficient unified allocation of resources through deployment of clusters on the basis of the existing raspberry group, and performs unified allocation of resources by virtue of the advantages of the architecture of the raspberry group, a native system and the like, so that efficient resource allocation and utilization are realized. The multi-party secure computing hardware platform is realized by modifying and recompiling the raspberry group kernel. The security of an operating system at a kernel level, the near-source security at a hardware level, and the built-in firewall and audit strategy are realized, and the multi-dimensional network security requirements of related users can be met. From the perspective of hackers and security researchers, the security of each platform of multi-party computing is considered, so that the project is closer to the real environment, and the security problem of the multi-party computing platform of data is effectively realized.
As a possible embodiment of the present application, in this embodiment, as shown in fig. 2, the cluster console module includes:
a unified instruction sending interface 201 which is a graphical instruction set interface and is used for controlling other modules and checking the states of the other modules;
and the unified authentication interface 202 is used for authorizing the user to log in the system.
In the embodiment of the application, a cluster console module displays a cluster state by a user, wherein the cluster state can be displayed through a graphical instruction set interface, a human-computer interaction module receives a control instruction input by the user, other modules are controlled, and the operating states of other modules can be checked through the graphical instruction set interface. The unified authentication page is used for authentication and is mainly used for logging in a system and granting tokens to ensure that different modules accessed by different users have different permissions.
As a possible embodiment of the present application, in this embodiment, as shown in fig. 3, the cluster performance monitoring module includes:
a real-time performance display page 301 for displaying the current system operating state;
a cluster system information page 302 for displaying system information of a cluster;
and a cluster system environment page 303 for showing the environment information of the on-time cluster.
In the embodiment of the application, the real-time performance display page is used for displaying the current system running state. The cluster system information page is used for displaying the system information of the cluster, and the cluster system environment page is used for displaying the cluster system environment. All pages are integrated in one system, so that the fully homomorphic encryption operation of data is realized, a perfect safety monitoring mechanism can give an early warning in time, and malicious input of a user and stealing of data by hackers are prevented.
As a possible embodiment of the present application, in this embodiment, as shown in fig. 4, the system safety protection module includes:
a bottom layer system security protection unit 401, configured to protect the bottom layer system;
a network layer security protection unit 402, configured to perform security protection on a network layer system;
and a flow auditing unit 403, configured to monitor and audit system flow.
In the embodiment of the application, the bottom system security protection is a system modified based on a Linux kernel, and is compiled into a new system based on an original system, so that the security is higher, and the usability and the compatibility are better. The kernel can call a network card to realize soft routing, realizes the capture and monitoring of the flow in a soft routing mode, audits the flow, and sends an alarm when abnormal flow (namely attack behavior) occurs. The risk control module comprises a threat detection unit, a risk monitoring unit, an IP (Internet protocol) blocking unit and a safety log recording unit and is used for monitoring and recording the system safety.
As a possible embodiment of the present application, in this embodiment, as shown in fig. 5, the architecture of the system includes:
a hardware layer 501, which is a raspberry-based hardware layer, for providing support for the kernel of the operating system;
the operating system kernel 502 is configured to perform memory processing, signal processing, process allocation, and system call;
the data layer 503 is a database on the target system, and is used for saving related logs, and filtering and storing protection policies;
an application layer 504 comprising executable applications on the target system;
and the display layer 505 is used for rendering and interactive operation of the template engine.
In the embodiment of the application, the hardware layer is mainly a raspberry group, and all hardware is based on the raspberry group and can provide support for the kernel of the operating system.
In the embodiment of the present application, the kernel of the operating system includes functional points such as memory processing, signal processing, process allocation, system call, and the like. For enabling the execution of the software platform and interfacing the operations of the related hardware. The data layer is a database on the target system, mainly relates to the storage of related logs, realizes that log records on other layers penetrate through all levels, and is also used for storing protection strategies and filtering strategies, such as forbidden IP lists, filtering parameter strategies and the like. The system application comprises a firewall developed along with a platform, log management and audit, an IP filtering strategy, a flow audit strategy and the like, also comprises a graphical monitoring module developed on the basis of PHP, Python and other languages for monitoring the platform, and also comprises related software for supporting cluster operation to carry out uniform resource allocation management. The presentation layer includes template engine rendering and interaction operations. The running condition of the cluster can be seen through a graphical interface, the input points at the front end are limited, all the inputs are strictly controllable, and malicious attacks are prevented through filtering by layer of strategies.
In the embodiment of the application, the kernel layer (4) of the operating system is provided with a modified Linux kernel, the modified Linux kernel is based on raspberpypi-kernel _1.20200601+ arm64-1, the authentication of access equipment, the strategy of GPIO port access and other security configurations of the kernel layer are mainly modified, in addition, the drive is strictly limited, the installation of a non-platform necessary drive is forbidden, the strict identity authentication is required even if the installation is required, and the behavior of installing a malicious drive in a possible malicious attack and silence mode is avoided. The related operation of the hardware layer is driven by the kernel layer of the operating system to call and realize.
The multi-party secure computing hardware platform system based on the raspberry group provided by the embodiment of the application realizes efficient unified allocation of resources through deployment of clusters on the basis of the existing raspberry group, and performs unified allocation of resources by virtue of the advantages of the architecture of the raspberry group, a native system and the like, so that efficient resource allocation and utilization are realized. The multi-party secure computing hardware platform is realized by modifying and recompiling the raspberry group kernel. The security of an operating system at a kernel level, the near-source security at a hardware level, and the built-in firewall and audit strategy are realized, and the multi-dimensional network security requirements of related users can be met. From the perspective of hackers and security researchers, the security of each platform of multi-party computing is considered, so that the project is closer to the real environment, and the security problem of the multi-party computing platform of data is effectively realized.
In an alternative embodiment, an electronic device is provided, as shown in fig. 6, the electronic device 4000 shown in fig. 6 comprising: a processor 4001 and a memory 4003. Processor 4001 is coupled to memory 4003, such as via bus 4002. Optionally, the electronic device 4000 may further comprise a transceiver 4004. In addition, the transceiver 4004 is not limited to one in practical applications, and the structure of the electronic device 4000 is not limited to the embodiment of the present application.
The Processor 4001 may be a CPU (Central Processing Unit), a general-purpose Processor, a DSP (Digital Signal Processor), an ASIC (Application Specific Integrated Circuit), an FPGA (Field Programmable Gate Array) or other Programmable logic device, a transistor logic device, a hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor 4001 may also be a combination that performs a computational function, including, for example, a combination of one or more microprocessors, a combination of a DSP and a microprocessor, or the like.
Bus 4002 may include a path that carries information between the aforementioned components. The bus 4002 may be a PCI (Peripheral Component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The bus 4002 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 6, but this is not intended to represent only one bus or type of bus.
The Memory 4003 may be a ROM (Read Only Memory) or other types of static storage devices that can store static information and instructions, a RAM (Random Access Memory) or other types of dynamic storage devices that can store information and instructions, an EEPROM (Electrically Erasable Programmable Read Only Memory), a CD-ROM (Compact Disc Read Only Memory) or other optical Disc storage, optical Disc storage (including Compact Disc, laser Disc, optical Disc, digital versatile Disc, blu-ray Disc, etc.), a magnetic Disc storage medium or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to these.
The memory 4003 is used for storing application codes for executing the scheme of the present application, and the execution is controlled by the processor 4001. Processor 4001 is configured to execute application code stored in memory 4003 to implement what is shown in the foregoing method embodiments.
Among them, electronic devices include but are not limited to: computers, tablets, industrial controllers, and the like.
The present application provides a computer-readable storage medium, on which a computer program is stored, which, when running on a computer, enables the computer to execute the corresponding content in the foregoing method embodiments. Compared with the prior art, the multi-party secure computing hardware platform system based on the raspberry group, provided by the embodiment of the application, realizes efficient and unified allocation of resources through deployment of the cluster on the basis of the existing raspberry group, and performs unified allocation of the resources by virtue of the advantages of the architecture, the native system and the like of the raspberry group, so that efficient resource allocation and utilization are realized. The multi-party secure computing hardware platform is realized by modifying and recompiling the raspberry group kernel. The security of an operating system at a kernel level, the near-source security at a hardware level, and the built-in firewall and audit strategy are realized, and the multi-dimensional network security requirements of related users can be met. From the perspective of hackers and security researchers, the security of each platform of multi-party computing is considered, so that the project is closer to the real environment, and the security problem of the multi-party computing platform of data is effectively realized.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
The foregoing is only a partial embodiment of the present application, and it should be noted that, for those skilled in the art, several modifications and decorations can be made without departing from the principle of the present application, and these modifications and decorations should also be regarded as the protection scope of the present application.

Claims (8)

1. A raspberry pi based multi-party secure computing hardware platform system, the system comprising:
the system comprises a bottom layer system, a management system and a management system, wherein the bottom layer system is a raspberry dispatching source system based on an ARM architecture and is used for providing support for an operating system kernel;
the cluster console module comprises a cluster interface and is used for instruction sending and authentication;
the cluster performance monitoring module is used for displaying the real-time performance, the system information and the system environment of the cluster;
the system safety protection module is used for system safety protection;
and the risk control module is used for monitoring system risks and forbidding the IP corresponding to the risks when the risks are detected.
2. The raspberry pi based multi-party secure computing hardware platform system according to claim 1, wherein said cluster console module comprises:
the unified instruction sending interface is a graphical instruction set interface and is used for controlling other modules and checking the states of the other modules;
and the unified authentication interface is used for the user to authorize the login of the system.
3. The raspberry pi based multi-party secure computing hardware platform system of claim 1, wherein said cluster performance monitoring module comprises:
the real-time performance display page is used for displaying the current system running state;
the cluster system information page is used for displaying the system information of the cluster;
and the cluster system environment page is used for showing the environment information of the clusters according to time.
4. The raspberry pi based multi-party secure computing hardware platform system of claim 1, wherein said system safeguard module comprises:
the bottom system safety protection unit is used for protecting the safety of the bottom system;
the network layer safety protection unit is used for carrying out safety protection on a network layer system;
and the flow auditing unit is used for monitoring and auditing the system flow.
5. The raspberry pi based multi-party secure computing hardware platform system of claim 1, wherein the risk control module comprises a threat detection unit, a risk monitoring unit, an IP block unit, and a security log recording unit for monitoring and recording system security.
6. The raspberry pi based multi-party secure computing hardware platform system according to claim 1, wherein the architecture of said system comprises:
the hardware layer is based on the raspberry pi and is used for providing support for an operating system kernel;
the operating system kernel is used for performing memory processing, signal processing, process allocation and system calling;
the data layer is a database on the target system and is used for storing related logs and filtering and storing protection strategies;
an application layer comprising an executable application on a target system;
and the display layer is used for rendering and interactive operation of the template engine.
7. The raspberry pi based multi-party secure computing hardware platform system of claim 6, wherein the operating system kernel layer is loaded with a Linux kernel, and the kernel is provided with driver installation authentication for identity authentication of non-platform driver installations.
8. The raspberry pi based multi-party secure computing hardware platform system of claim 6, wherein the operations of said hardware layer are driven, invoked and implemented by said operating system kernel layer.
CN202110848439.XA 2021-07-27 2021-07-27 Multi-party secure computing hardware platform system based on raspberry group Withdrawn CN113703963A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110848439.XA CN113703963A (en) 2021-07-27 2021-07-27 Multi-party secure computing hardware platform system based on raspberry group

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110848439.XA CN113703963A (en) 2021-07-27 2021-07-27 Multi-party secure computing hardware platform system based on raspberry group

Publications (1)

Publication Number Publication Date
CN113703963A true CN113703963A (en) 2021-11-26

Family

ID=78650538

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110848439.XA Withdrawn CN113703963A (en) 2021-07-27 2021-07-27 Multi-party secure computing hardware platform system based on raspberry group

Country Status (1)

Country Link
CN (1) CN113703963A (en)

Similar Documents

Publication Publication Date Title
US11469976B2 (en) System and method for cloud-based control-plane event monitor
US10664592B2 (en) Method and system to securely run applications using containers
CN102184372B (en) Reverse-sandbox-based mobilephone payment protection method
CN101667232B (en) Terminal credible security system and method based on credible computing
CN102222292B (en) Mobile phone payment protection method
CN109997138A (en) For detecting the system and method for calculating the malicious process in equipment
Ouda et al. The impact of cloud computing on network security and the risk for organization behaviors
CN110543775B (en) Data security protection method and system based on super-fusion concept
CN101047701A (en) System and method for ensuring safety operation of applied program
CN1743992A (en) Computer operating system safety protecting method
WO2018182885A1 (en) Secure software defined storage
US10169584B1 (en) Systems and methods for identifying non-malicious files on computing devices within organizations
Grace et al. Behaviour analysis of inter-app communication using a lightweight monitoring app for malware detection
US8566585B2 (en) System and a method for processing system calls in a computerized system that implements a kernel
CN110659478B (en) Method for detecting malicious files preventing analysis in isolated environment
US11223651B2 (en) Augmented data collection from suspected attackers of a computer network
US11122079B1 (en) Obfuscation for high-performance computing systems
CN117032894A (en) Container security state detection method and device, electronic equipment and storage medium
EP3535681B1 (en) System and method for detecting and for alerting of exploits in computerized systems
CN116522355A (en) Electric power data boundary protection method, equipment, medium and device
US9560028B1 (en) Systems and methods for filtering interprocess communications
CN113703963A (en) Multi-party secure computing hardware platform system based on raspberry group
CN103051608B (en) A kind of method and apparatus of movable equipment access monitoring
CN111159714B (en) Method and system for verifying credibility of main body in operation in access control
WO2022046365A1 (en) Advanced detection of identity-based attacks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20211126