CN117149439B - Method and system for reducing frequency and frequency of trusted computing static measurement - Google Patents
Method and system for reducing frequency and frequency of trusted computing static measurement Download PDFInfo
- Publication number
- CN117149439B CN117149439B CN202311374543.5A CN202311374543A CN117149439B CN 117149439 B CN117149439 B CN 117149439B CN 202311374543 A CN202311374543 A CN 202311374543A CN 117149439 B CN117149439 B CN 117149439B
- Authority
- CN
- China
- Prior art keywords
- attribute
- measurement
- frequency
- policy file
- trusted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000005259 measurement Methods 0.000 title claims abstract description 119
- 238000000034 method Methods 0.000 title claims abstract description 38
- 230000003068 static effect Effects 0.000 title claims abstract description 24
- 230000008859 change Effects 0.000 claims abstract description 24
- 230000008569 process Effects 0.000 claims abstract description 11
- 238000012986 modification Methods 0.000 claims description 8
- 230000004048 modification Effects 0.000 claims description 8
- 238000012544 monitoring process Methods 0.000 claims description 6
- 230000006870 function Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5005—Allocation of resources, e.g. of the central processing unit [CPU] to service a request
- G06F9/5027—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/26—Power supply means, e.g. regulation thereof
- G06F1/32—Means for saving power
- G06F1/3203—Power management, i.e. event-based initiation of a power-saving mode
- G06F1/3234—Power saving characterised by the action undertaken
- G06F1/3243—Power saving in microcontroller unit
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Mathematical Physics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a method and a system for reducing the frequency and the frequency of trusted computing static measurement, belonging to the technical field of information security. Aiming at the problem that the CPU resource consumption is excessive because the cryptographic signature algorithm is required to be frequently applied to measure the strategy file in the trusted computing process, before the measurement is executed on the strategy file, judging according to the attribute vector cache table of the strategy file in the memory, and judging whether the content of the strategy file is changed or not on the basis of the last measurement; if not, the credible measurement is not needed, and the measurement result of the last time is taken as the basis; if the change occurs, the credible measurement is needed, and meanwhile, the attribute vector cache table of the strategy file in the memory is updated according to the measurement result. The invention reduces the frequency and the frequency of the trusted measurement while ensuring the integrity and the correctness of the trusted measurement, thereby reducing the occupation and the consumption of the trusted measurement on CPU resources and ensuring the smooth operation of the whole operation system service.
Description
Technical Field
The invention belongs to the technical field of information security, and relates to a method and a system for reducing the frequency and the frequency of trusted computing static measurement.
Background
Trusted computing (Trusted Computing, generally TC) is a technology that is facilitated and designed by the trusted computing group (Trusted Computing Group, generally TCG). One of the key goals of trusted computing is to guarantee the integrity of the operating system and applications, thereby determining that the operating system or applications can run within a predetermined range according to the intended goals. The credibility and the safety are closely connected, the credibility is the basic of the safety, and the user can master the safety better by mastering the credibility, so that the user can build a firm safety management system.
The trusted measurement is taken as the core of trusted computing and is an indispensable key link in the trusted computing link. Trusted metrics are divided into static metrics and dynamic metrics. Static measurement generally refers to a process of performing trusted measurement on a static file based on hash or cryptographic signature algorithm in the links of system booting, operating system starting, application program execution, file system access and the like, and the static file comprises a system image, an executable program, a dependency library and the like. In the process of carrying out the trusted measurement on the file, a cryptographic signature algorithm or a hash algorithm is needed, and the hash algorithm or the cryptographic signature algorithm consumes CPU resources of an operating system in the using process, and particularly when the file subjected to the trusted measurement is relatively large, a relatively large burden is caused on the CPU resources. Therefore, how to reduce the consumption of CPU resources by the trusted measurement process has become an unsound problem in the trusted computing field.
Disclosure of Invention
The invention aims to overcome the defects of the prior art, and provides a method and a system for reducing the frequency and the frequency of trusted computing static measurement, so as to solve the problems that CPU resources are excessively consumed and a larger burden is caused to the CPU resources of an operating system when static measurement files are used.
In order to achieve the purpose, the invention is realized by adopting the following technical scheme:
a method of reducing the frequency and frequency of trusted computing static metrics, comprising the steps of:
s1, inquiring an attribute vector cache table, judging whether a policy file is a first credible measurement, and if so, executing S2; if not, comparing whether the actual attribute of the policy file is consistent with the cache attribute, if so, ending the judgment, and if not, executing S2; the cache attribute is an attribute of the policy file cached in an attribute vector cache table, and the actual attribute is a self-contained attribute of the policy file;
s2, the policy file is measured in a trusted way, and the current measurement value and the last measurement time are written in an attribute vector cache table of the policy file.
The invention further improves that:
preferably, in S1, the determining whether the policy file is a first trusted measure includes: the attribute vector cache table is queried for the attribute of the policy file, and if the query is not received, the policy file is the first trusted measure.
Preferably, in the executing process, the S1 monitors the attribute change of the policy file in real time in a kernel layer of the operating system.
Preferably, in S1, both the cache attribute and the actual attribute include an inode, a time information variable, and a last write-back time of the disk.
Preferably, in S1, the specific process of comparing whether the actual attribute and the cached attribute of the policy file are consistent is: judging whether index nodes of the strategy file change or not, if so, determining that the index nodes are inconsistent, and executing S2; if the time information variable of the policy file is unchanged, judging whether the time information variable of the policy file is changed, and if the time information variable of the policy file is unchanged, not requiring a trusted measure; if the time information variable is changed, judging whether the last disk write-back time of the strategy file is changed, if not, the credible measurement is not needed, otherwise, executing S2.
Preferably, the time information variable includes a last time measurement time, a last time modification time, and a last time attribute change time.
Preferably, any one of the last measurement time, the last modification time and the last attribute change time is changed, and the time information variable is considered to be changed.
Preferably, in S1, when the trusted measurement is not needed, the last measurement result is extracted from the attribute vector cache table as the current measurement result.
A system for reducing the frequency and frequency of trusted computing static metrics, comprising:
the measurement judging module is used for inquiring the attribute vector cache table and judging whether the strategy file is the first trusted measurement or not, and if so, the measurement module is executed; if not, comparing whether the actual attribute of the policy file is consistent with the cache attribute, if so, ending the judgment, and if not, executing the measurement module; the cache attribute is an attribute of the policy file cached in an attribute vector cache table, and the actual attribute is a self-contained attribute of the policy file;
and the measurement module is used for credibly measuring the policy file and writing the current measurement value and the last measurement time into an attribute vector cache table of the policy file.
Preferably, the method further comprises:
and the attribute change monitoring module is used for monitoring the attribute change of the strategy file in the attribute vector cache table in real time.
Compared with the prior art, the invention has the following beneficial effects:
the invention discloses a method for reducing the frequency and the frequency of trusted computing static measurement, which aims at the problem that the consumption of CPU resources is large because a password algorithm is required to be frequently applied to a file in the trusted computing technology, and before the trusted measurement is executed on a policy file, the method judges whether the attribute of the policy file changes or not on the basis of the last trusted measurement according to an attribute vector cache table of the policy file in a memory; if not, the measurement is not needed, and the measurement result of the last time is taken as the basis; if so, the trusted measurement is needed, and the attribute vector cache table of the policy file in the memory is updated. The method reduces the frequency and the frequency of the trusted measurement while guaranteeing the integrity and the correctness of the trusted measurement, thereby reducing the occupation and the consumption of the trusted measurement on CPU resources and guaranteeing the smooth running of the operation system business. The invention reduces the frequency and frequency of the credible measurement to the maximum extent, realizes unnecessary measurement, ensures the integrity and the correctness of the credible measurement, and further reduces the occupation and the consumption of the credible measurement on CPU resources. The method is simple to implement, safe and reliable, and can be widely applied to a plurality of fields such as network servers, industrial control, cloud computing, data centers and the like.
Further, the invention monitors the attribute change of the strategy file in real time at the kernel layer of the operating system, and constructs an attribute vector cache table of the strategy file in the memory.
Drawings
FIG. 1 is a flow chart of a method of reducing the frequency and frequency of trusted computing static metrics in accordance with the present invention;
FIG. 2 is a flowchart showing a method for reducing the frequency and frequency of trusted computing static metrics in accordance with the present invention;
FIG. 3 is a block diagram of a system for reducing the frequency and frequency of trusted computing static metrics in accordance with the present invention.
Detailed Description
It should be noted that the terms "first," "second," and the like in the description and the figures of the present invention are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the invention described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In order to clearly illustrate the inventive arrangements, the following terms are to be interpreted:
CPU: the central processing unit, which is generally called Central Processing Unit, is the final execution unit for information processing and program running as the operation and control core of the computer system.
AVC: an attribute vector cache table, collectively Attribute Vector Cache, is used to cache attribute information and metric information of policy files.
The trusted measurement is taken as the core of trusted computing and is an indispensable key link in the trusted computing link. The trust metric is typically a trust metric for a file or process based on a cryptographic signature algorithm or a hash algorithm. The hash algorithm comprises bit operation and a hash function, wherein the bit operation generally does not occupy too high CPU resources, but the hash function is a strong CPU consumption type operation, so that the occupancy rate of the CPU resources is always high when the hash algorithm is used densely. Compared with a hash algorithm, the cryptographic signature algorithm has stronger consumption of CPU resources, and when the number of files requiring trusted measurement in an operating system is more or the number of files is larger, the CPU resource occupancy rate of the operating system is inevitably too high, so that the normal operation is influenced. Therefore, there is a need to design an effective method to reduce the occupation and consumption of the CPU resources by the trusted metrics while ensuring the integrity and correctness of the trusted metrics.
In order to solve the above problems, referring to fig. 1, a first object of the present invention is to provide a method for reducing the frequency and frequency of trusted computing static metrics, which includes the following steps:
s1, inquiring an attribute vector cache table, judging whether a policy file is a first credible measurement, and if so, executing S2; if not, comparing whether the actual attribute of the policy file is consistent with the cache attribute, wherein the cache attribute is the attribute of the policy file cached in the attribute vector cache table, and the actual attribute is the self-contained attribute of the policy file; if the attribute is consistent, the actual attribute is determined to be unchanged relative to the cache attribute, the credible measurement is not needed, and the judgment is ended; if not, S2 is performed.
S2, the trusted measurement policy file writes the current measurement value and the last measurement time into an attribute vector cache table of the policy file.
The method monitors the attribute change condition of the policy file in real time at the kernel layer of the operating system, builds an attribute vector cache table of the policy file in the memory, judges whether the measurement is needed or not based on the cache attribute in the attribute vector cache table before the trusted measurement, and achieves unnecessary measurement, thereby reducing the frequency and the frequency of the trusted measurement to the greatest extent.
Referring to fig. 2, one of the embodiments of the present invention discloses a method for reducing the frequency and frequency of trusted computing static metrics, specifically, the method includes the following steps:
s1, after the policy file triggers the credible measurement, firstly, the attribute information of the policy file cache, namely the cache attribute, is queried in the attribute vector cache table. If the query is not found, the current file is indicated to belong to the first measurement, and a measurement module is required to be called to perform the credible measurement on the policy file, namely S2 is executed; after the trusted measurement is completed, the measurement value of the policy file and the last measurement time are stored in the attribute vector cache table. If the caching attribute of the policy file can be queried in the attribute vector caching table, comparing the actual attribute of the policy file with the caching attribute, and judging whether the content of the policy file is changed or not on the basis of the last measurement of the policy file. If the content of the strategy file is unchanged, the measurement is not needed at this time, and the measurement result of the last time is taken as the basis; if the content of the policy file is changed, measurement is needed, and the cache attribute of the policy file in the attribute vector cache table is synchronously updated according to the measurement result.
Specifically, it is required to compare whether the actual attribute of the current policy file itself changes with the cache attribute in the attribute vector cache table. Based on the last measurement of the policy file, the decision whether the content in the policy file changes is based on the following:
(1) Firstly, judging whether an index node (i.e. inode) of a strategy file is changed, if so, indicating that the strategy file can be a brand new file, and directly performing credibility measurement without judging other attributes of the strategy file; after the trusted measurement is completed, the current measurement value and the last measurement time are stored in the attribute vector cache table, and the last measurement time is the measurement time of the current measurement value.
(2) If the index node of the policy file is unchanged, judging whether the actual attribute is consistent with the time information variable in the cache attribute. The specific time information variables comprise last measurement time, last modification time and last attribute change time. If the three time information variables in the cache attribute and the actual attribute are consistent, the content of the policy file is considered to be unchanged on the basis of the last measurement, the measurement is not needed at this time, and the last measurement result of the policy file is extracted from the attribute vector cache table as the measurement result at this time. Wherein, the last time of modification refers to the time when the content of the policy file changes; the last attribute change time comprises the last access time, index node number change time, file size and other attribute change times, and any one of the time changes, so that the last attribute change time needs to be modified.
(3) If any one of the last measured time, the last modified time and the last attribute change time of the policy file is changed in the last step, the policy file cannot represent that the content of the file is changed. Whether the disk write-back time of the strategy file is changed or not is further judged, if the disk write-back time is not changed, the content of the strategy file is considered to be unchanged on the basis of the last measurement, the measurement is not needed at this time, and the last measurement result of the strategy file is extracted from the attribute vector cache table to serve as the measurement result at this time; otherwise, if the write-back time of the disk also changes, the credibility measurement needs to be performed and the attribute vector cache table of the file needs to be updated.
As one of the preferable schemes, if the operating system has no attribute vector cache table; before S1, an attribute vector cache table of the policy file is constructed in a memory of an operating system and used for storing the metric value, the metric time and the attribute of the policy file.
S2, performing credibility measurement on the policy file, and after the policy file performs credibility measurement once, storing the current measurement value and the last measurement time into an attribute vector cache table.
As one of preferable schemes, the attribute change of the policy file is monitored in real time at the kernel layer of the operating system, and the monitored attribute comprises, but is not limited to, information such as an index node of the policy file, last modification time, last attribute change time, last disk write-back time, last measurement time and the like.
Referring to fig. 3, a second object of the present invention is to provide a system for reducing the frequency and frequency of trusted computing static metrics, the system comprising:
the measurement judging module is used for inquiring the attribute vector cache table and judging whether the strategy file is the first trusted measurement or not, and if so, the measurement module is executed; if not, comparing whether the actual attribute of the policy file is consistent with the cache attribute, if so, ending the judgment, and if not, executing the measurement module; the cache attribute is an attribute of the policy file cached in an attribute vector cache table, and the actual attribute is a self-contained attribute of the policy file.
And the measurement module is used for credibly measuring the policy file and writing the current measurement value and the last measurement time into an attribute vector cache table of the policy file.
Further, the system also comprises an attribute change monitoring module which is used for monitoring the attribute change of the strategy file in the attribute vector cache table in real time.
The foregoing description of the preferred embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, alternatives, and improvements that fall within the spirit and scope of the invention.
Claims (8)
1. A method for reducing the frequency and frequency of trusted computing static metrics, comprising the steps of:
s1, inquiring an attribute vector cache table, judging whether a policy file is a first credible measurement, and if so, executing S2; if not, comparing whether the actual attribute of the policy file is consistent with the cache attribute, if so, ending the judgment, and if not, executing S2; the cache attribute is an attribute of the policy file cached in an attribute vector cache table, and the actual attribute is a self-contained attribute of the policy file;
in S1, both the cache attribute and the actual attribute comprise an index node, a time information variable and the last disk write-back time;
in S1, the specific process of comparing whether the actual attribute and the cache attribute of the policy file are consistent is as follows: judging whether index nodes of the strategy file change or not, if so, determining that the index nodes are inconsistent, and executing S2; if the time information variable of the policy file is unchanged, judging whether the time information variable of the policy file is changed, and if the time information variable of the policy file is unchanged, not requiring a trusted measure; if the time information variable is changed, judging whether the last disc write-back time of the strategy file is changed, if not, not needing the credible measurement, otherwise executing S2;
s2, the policy file is measured in a trusted way, and the current measurement value and the last measurement time are written in an attribute vector cache table of the policy file.
2. The method for reducing the frequency and the frequency of trusted computing static metrics according to claim 1, wherein in S1, the determining whether the policy file is a first trusted metric comprises: the attribute vector cache table is queried for the attribute of the policy file, and if the query is not received, the policy file is the first trusted measure.
3. The method of claim 1, wherein S1 monitors the change of the attributes of the policy file in real time in the kernel layer of the operating system during execution.
4. The method of claim 1, wherein the time information variables include last time of measurement, last time of modification, and last time of attribute change.
5. The method of reducing the frequency and frequency of trusted computing as claimed in claim 4, wherein any one of the last time the metric, the last time the modification and the last time the attribute was changed is changed, the time information variable is considered to be changed.
6. The method for reducing the frequency and the frequency of trusted computing static measurement according to claim 1, wherein in S1, when the trusted measurement is not needed, the last measurement result is extracted from the attribute vector cache table as the current measurement result.
7. A system for reducing the frequency and frequency of trusted computing static metrics for implementing the method of claim 1, comprising:
the measurement judging module is used for inquiring the attribute vector cache table and judging whether the strategy file is the first trusted measurement or not, and if so, the measurement module is executed; if not, comparing whether the actual attribute of the policy file is consistent with the cache attribute, if so, ending the judgment, and if not, executing the measurement module; the cache attribute is an attribute of the policy file cached in an attribute vector cache table, and the actual attribute is a self-contained attribute of the policy file;
and the measurement module is used for credibly measuring the policy file and writing the current measurement value and the last measurement time into an attribute vector cache table of the policy file.
8. The system for reducing the frequency and frequency of trusted computing static metrics of claim 7 further comprising:
and the attribute change monitoring module is used for monitoring the attribute change of the strategy file in the attribute vector cache table in real time.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311374543.5A CN117149439B (en) | 2023-10-23 | 2023-10-23 | Method and system for reducing frequency and frequency of trusted computing static measurement |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311374543.5A CN117149439B (en) | 2023-10-23 | 2023-10-23 | Method and system for reducing frequency and frequency of trusted computing static measurement |
Publications (2)
Publication Number | Publication Date |
---|---|
CN117149439A CN117149439A (en) | 2023-12-01 |
CN117149439B true CN117149439B (en) | 2024-01-30 |
Family
ID=88884437
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311374543.5A Active CN117149439B (en) | 2023-10-23 | 2023-10-23 | Method and system for reducing frequency and frequency of trusted computing static measurement |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117149439B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104517057A (en) * | 2014-12-22 | 2015-04-15 | 中国人民解放军信息工程大学 | Software hybrid measure method based on trusted computing |
CN112214769A (en) * | 2020-10-30 | 2021-01-12 | 国家电网有限公司信息通信分公司 | Active measurement system of Windows system based on SGX architecture |
WO2023061397A1 (en) * | 2021-10-12 | 2023-04-20 | 中兴通讯股份有限公司 | Trusted measurement method and apparatus, computer device, and readable medium |
-
2023
- 2023-10-23 CN CN202311374543.5A patent/CN117149439B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104517057A (en) * | 2014-12-22 | 2015-04-15 | 中国人民解放军信息工程大学 | Software hybrid measure method based on trusted computing |
CN112214769A (en) * | 2020-10-30 | 2021-01-12 | 国家电网有限公司信息通信分公司 | Active measurement system of Windows system based on SGX architecture |
WO2023061397A1 (en) * | 2021-10-12 | 2023-04-20 | 中兴通讯股份有限公司 | Trusted measurement method and apparatus, computer device, and readable medium |
Non-Patent Citations (2)
Title |
---|
A review on trust management in fog/edge computing: Techniques, trends, and challenges;Mohammad Nikravan等;《Journal of Network and Computer Applications》;全文 * |
一种可配置策略的软件动态完整性度量架构;范超;赵荣彩;单征;王银浩;;信息工程大学学报(01);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN117149439A (en) | 2023-12-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8055633B2 (en) | Method, system and computer program product for duplicate detection | |
CN103339613B (en) | Operation management device, operation management method and program | |
US9003239B2 (en) | Monitoring and resolving deadlocks, contention, runaway CPU and other virtual machine production issues | |
US7181651B2 (en) | Detecting and correcting a failure sequence in a computer system before a failure occurs | |
US10467081B2 (en) | Enabling symptom verification | |
US20200045075A1 (en) | Real-time mitigations for unfamiliar threat scenarios | |
US20100153431A1 (en) | Alert triggered statistics collections | |
CN110647750B (en) | File integrity measurement method and device, terminal and security management center | |
US20180121275A1 (en) | Method and apparatus for detecting and managing faults | |
US11385996B1 (en) | Monitoring execution of software using online path signatures | |
US20210092135A1 (en) | System and method for generating and storing forensics-specific metadata | |
CN112561197A (en) | Power data prefetching and caching method with active defense influence range | |
CN111291083B (en) | Webpage source code data processing method and device and computer equipment | |
CN111274245B (en) | Method and device for optimizing data storage | |
US8533533B2 (en) | Monitoring processes via autocorrelation | |
CN117828649A (en) | Micro data center system | |
CN118250206A (en) | High concurrency pressure testing method and related device based on flow playback | |
CN117149439B (en) | Method and system for reducing frequency and frequency of trusted computing static measurement | |
JP2011013793A (en) | Data processing apparatus and program | |
JP6517468B2 (en) | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, MONITORING APPARATUS, MONITORING METHOD, AND PROGRAM | |
CN115086047B (en) | Interface authentication method and device, electronic equipment and storage medium | |
CN103514402A (en) | Intrusion detection method and device | |
CN115687129A (en) | Coverage rate report generation method and device, storage medium and computer equipment | |
US11669498B2 (en) | Facilitating exclusive local locks on a distributed file system | |
CN111159714B (en) | Method and system for verifying credibility of main body in operation in access control |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |