Font Size: a A A

Design And Implementation Of Security Mechanism Of Embedded Operating System

Posted on:2009-04-08Degree:MasterType:Thesis
Country:ChinaCandidate:S W ShenFull Text:PDF
GTID:2178360242983744Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Nowadays, mobile phone viruses have made a big influence to people's life. They do harm to people's privacy and benefit seriously. In order to resist the embedded viruses effectively, represented by mobile phone viruses, we had made some research. This article mainly focuses on the system level security of the embedded system platform, represented by intelligentized mobile phone. We especially pay our attention on how to utilize the features of the embedded system and how to add some information protection mechanisms to repel the baleful programs or codes, and promote the network security and system stability of the embedded operating system. We proposed a series of methods to enhance the security of the embedded system, such as design of security policies, design of access control mechanism, add of some security criteria to the network and implementation of audit record. These methods can effectively reject the attack of the baleful programs or codes, and by use of the audit record, we can analyse the attack and find out the malefactor eventually. In this article, we had made use of the Public Key Infrastructure to construct a trusted environment. According to this trusted environment, we can identify which program is trusted and which is untrusted by verifying the origin of the programs and integrity of the programs. Different trusted levels of the programs use different access control methods. In the system we designed in this article, we can resist the executable file viruses effectively and make a big constraint to the vicious code of other kinds. Most importantly, according to the audit mechanism and the access control mechanism, we can find out the vicious programs and charged the producers of these programs to be responsible for the loss of the customers.
Keywords/Search Tags:Embedded Operating System, Digital Signature, Access Control, Network Security, Security Audit
PDF Full Text Request
Related items