System integrity information processing computing systems

 

(57) Abstract:

The invention relates to computing, and in particular to information and computer systems and networks, and can be used in part integrity monitoring for protection of information resources in workstations, informational, and functional servers. The technical result is to increase the protection of workstations, functional and information servers by expanding the functions of the control system integrity as the expansion of the functions of the software components, and by adding hardware components of the control system, as well as the convenience of working with a protected system by allowing authorized removal software components of the system without removing hardware components (without disassembling the computer. This system consists of software component, system integrity monitoring, hardware component monitoring systems integrity, software signal generator testing. 3 Il.

The invention relates to computing, and in particular to information and computer systems and networks, and can be used in part integrity monitoring for ntrol integrity in the General case, the task is much wider what it means today, developers and implemented in known systems of information protection. We can characterize this task as a task of critical importance in the protection of information, without a full-featured solution which is impossible to talk about the implementation of the protection system in principle.

Known protection system of information resources of the computing system and a network of Secret Net (see "System access Secret Net. User manual, 1996"). It represents a software package installed on a standalone computer or on computers in a computer network. The system solves the problem of integrity control (no distortion) files when the system is turned on. The latest version of the system Secret Net also implement the file-integrity monitoring schedule. In both cases, the low efficiency is solved only private task of monitoring the integrity of the files.

Closest to the technical nature of the claimed (prototype) is a system for ensuring the integrity of information computing systems (patent 2145727 authors Shcheglov, A. Y., Klepac C. S., Chistyakov, A. B., Butenko centuries, dzhabarov A. A., B 5).

The system shown in Fig. 1. The system is, the POC control integrity in the system 3, the control unit integrity in the system process 4, the block generation reactions 5, and the first input of the unit ensure the integrity of the file system 1 is connected to the first input of the system 6, the second input with the first output control unit system integrity 2, the output from the first input unit making the reaction 5, the first input of the control unit integrity in the system 3 is connected with the second output control unit system integrity 2, the second input to the third input of the system 8, the output from the second input unit production reactions 5, the first input of the control unit integrity in the system process 4 is connected with the third output control unit system integrity 2, the second input to the fourth input of the system 8, the output from the third input unit production reactions 5, the second input of the system 7 is connected to the input of the block of management of system integrity 2, the input/output of which is input/output unit production reactions 5 whose output is the first output of the system 10.

The system solves the problem of integrity is not a distortion of the files that control the user integrity 2 will set the sequence control information respectively received at the inputs 6, 7, 9 (respectively, control files, users, processes). Thus the control of one of the events, such as files that can be run (block produce responses 5) as a reaction detecting distortion of another event, such as a running process (which allows you to asynchronously initiate asynchronous control of the file system on an external event). Blocks ensure the integrity of the file system 1, control integrity in the system users 3, control integrity in the system process 4 on command from the control unit system integrity 2 control relevant events, the results of the control is transferred to block the production of reaction 5, which produces a response (commands}). issued to the output of the system 10. From input 7 serves to control. The control files are the lengths of the file, the checksum of the file, other file parameters (time of creation, last modification, and so on).

The function of monitoring the integrity of this system has already greatly expanded, in addition, the possibility of asynchronous control files (external characteristics) that allows you to effectively apply the control mechanism zelot the lowland objects integrity remains very narrow. The system does not allows you to monitor the integrity of the computing environment (devices, blocks, settings, and so on), does not allow messages from other system and functional programs (for example, the Windows NT operating system).

2. The most important non-implemented system functions include monitoring the integrity of the actual control system. This system must be implemented in a fundamentally different way, in particular hardware, so you can remove unauthorized software component of the control system, only disassembled the computer (removed and the chassis, in a free slot which is placed in charge of the hardware components of the system integrity monitoring) hardware implementation of the control system integrity in case of unauthorized removal of software components should be blocked ability to function evaluator (respectively not already controlled). For the convenience of the computer should be able sanctioned removal software protection system without removing hardware components without disassembly of the computer).

The aim of the invention is polysystem integrity monitoring as part of the expansion functions of the software components, and by adding hardware components of the control system, as well as the convenience of working with a secure system, by providing opportunities sanctioned removal software components of the system without removing hardware components (without disassembling the computer.

This is achieved by the fact that in the system containing the software component of the system of monitoring the integrity of the containing block ensure the integrity of the file system, the block of management of system integrity, the control unit integrity for the currently logged in user, the control unit integrity in the system processes, unit production reactions, and the first input of the unit ensure the integrity of the file system is connected to the first input of the system, the second input with the first output control unit, system integrity, the output from the first input unit making the reaction, the first input of the control unit integrity in the system the user is connected with the second output control unit system integrity, the second input to the third input of the system, the output from the second input unit production reactions, the first input of the control unit integrity in the system process the Odom system, the output from the third input unit production reactions, the second input of the system connected to the input of the control unit system integrity, the input/output of which is input/output unit production reactions, the output of which is with the first system output, inputs: hardware component monitoring systems integrity, software signal generator testing, and software component of the system integrity monitoring: L blocks monitoring the integrity of the external environment, M blocks of message processing integrity from external programs, block software signal generator test moreover, in the software component of the control system integrity first inputs of L blocks monitoring the integrity of the external environment is connected with the fourth L outputs of the block of management of system integrity, the second L inputs - fifths L inputs of the system, L outputs from the fourth L-unit generation reaction, the first inputs of the M blocks of the message processing integrity from external programs connected with the fifth M outputs of the block of management of system integrity, the second M inputs - sixth M inputs, M outputs - fifths L inputs of the block making the reaction, the sixth output unit upravit which the second output system, the first input of the hardware components of the system integrity control is connected to the seventh input of the system, the second input to the eighth input of the system, the third entrance from the ninth input of the system, the output from the third output system, the second system output is connected to the seventh input of the system, the input program signal generator test is connected to the tenth input system, the output from the fourth output of the system, with the eighth input of the system.

The circuit system integrity information processing computing systems shown in Fig.2, it contains: a software component system integrity control 1 containing the block of management of system integrity 1.1 unit ensure the integrity of the file system 1.2, the control unit integrity in the system users 1.3, the control unit integrity in the system processes 1.4 L unit control the integrity of the computing environment 1.5, M blocks of message processing integrity from external programs 1.6, unit production reactions 1.7, block software signal generator test 1.8, additionally, the system contains a hardware component monitoring system integrity 2, a software signal generator test 3, moreover, system 1.2 is connected to the first input of the system 4, the second input with the first output control unit system integrity 1.1, the output from the first input unit making the reaction to 1.7, the first input of the control unit integrity in the system users 1.3 is connected with the second output control unit system integrity 1.1, the second input to the third input of the system 6, the output from the second input unit making the reaction to 1.7, the first input of the control unit integrity in the system processes 1.4 is connected to the third output control unit system integrity 1.1, the second input to the fourth input of the system 7, the output from the third input of the unit making the reaction to 1.7, the second input of the system 5 is connected to the input of the control unit system integrity 1.1, the input/output of which is input/output unit making the reaction 1.7 whose output is the first output of the system 10, the first inputs of L blocks control the integrity of the computing environment 1.5 is connected to the fourth L outputs of the block of management of system integrity 1.1, the second L inputs with the fifths L inputs of the system 8, L outputs from the fourth L inputs of the block making the reaction 1.7, the first inputs of the M blocks of the message processing integrity from external programs 1.6 is connected to the mi system 9, M outputs - fifths L inputs of the block making the reaction 1.7, sixth output control unit system integrity 1.1 is connected to the input program signal generator test 1.8 whose output is the second output of the system 11, the first input of the hardware components of the system integrity control 2 is connected to the seventh input of the system 12, the second input to the eighth input of the system 13, the third entrance to a ninth input of the system 14, the output from the third output system 15, the second output of the system 11 is connected to the seventh input of the system 12, the input program signal generator test 3 is connected with the tenth input system 16, the output from the fourth output system 17, the eighth input of the system 13.

The system works as follows. In addition to the tasks addressed by the prototype (working prototype described above), a software component, system integrity monitoring 1 allows monitoring the integrity of the (unchanged) computing environment - it is L units of 1.5, monitoring (and controlling for other parameters) is controlled by the unit 1.1. For example, Windows provides the values of the following registry keys are sent to the input 8) the immutability of which is controlled by the block 1.5. In case of detection and is iature computer. Blocks 1.6 (on being a front-end blocks) process, also under the control of the unit 1.1, the external control message integrity, which is the established system or functional software, OS, DBMS and other SOFTWARE). In case of receiving the signal integrity from external program unit 1.6 the signal in block 1.7 to respond to the detected impact.

The hardware component of the system integrity control 2 is used to control the presence of the computer and activity software component of the control system integrity 1. The operation is that the input 12 receives a square wave frequency of testing (warning) activity of the controlled object with block 1.8 (running unit 1.1) via exit 11. Unit 1.8 is an integral part of the software components of the control system integrity 1, so its unauthorized removal or withdrawal from the passive state will stop receiving the square wave test signal at the output 11 input 12. Input 14 receives the signal off of the computer, such as Reset, which at the termination of receipt of the test signals is passed to the output 15 and blocks Dalnauka will continue until until activated component 1, and with it the block 1.8). Block 3 represents the same generator test signals that the unit 1.8, the only difference lies in the fact that its run by a security administrator separately. This unit can be hidden (protected area) of the computer, or downloaded as needed. The goal of this block connection meander test frequency from the output 17 input 13 instead of block 1.8. In this case, when authorized disposal (transfer in passive mode) software components of system integrity control 1 signal block 3 output 15 is not produced unit 3 is an emulator unit 1.8, and it helps temporarily sankzionirovaniya to translate the software component of the system integrity control 1 in a passive state without physically removing the hardware part 2 (for example, the card from the slot of the computer).

Thus, the claimed system provides the ability

1. Expand the functional mechanism of control objects integrity, due to the fact that the system allows you to monitor the integrity of the computing environment (devices, blocks, settings, and so on) allows the use of messages other systeminto the actual control system. This system is implemented in such a way that you can remove unauthorized software component of the control system only after disassembling the computer (removed and the chassis, in a free slot which is placed in charge of the hardware components of the system integrity monitoring). When the hardware implementation of the control system integrity in case of unauthorized removal software components are blocked from functioning transmitter (respectively not already controlled). For facilities with computer provided by the opportunity of the authorized removal software protection system without removing hardware components without disassembly of the computer).

The blocks used in the inventive protection system can be implemented as follows.

Blocks 1.5, implemented similarly to the blocks 1.2, 1.3, 1.4 prototype.

Blocks 1.8 and 3 is the simplest software generator clock frequency.

The 1.6 block is implemented depending on how the external software tool implements the interface, in the simplest case, this unit carries out the reading of information from a specific area of memory.

Brierly input element OR 2.1 connected to the first input of the block (with the seventh input of the system 12), the second input with the second input of the unit (with the eighth input of the system 13). the output from the first input element OR 2.3, with the first input element OR 2.5, the second input with the second input element OR 2.3, with the third input of the unit (the ninth input system 14), the generator output 2.2 connected to the first input of the trigger 2.6, with the first input trigger 2.4, a second input connected to the high potential, the third input - output element OR 2.3, the output from the second input trigger 2.6, the third input - output element OR 2.5, output - the output of the block (with the third output system 15).

The circuit works as follows. From generators 1.8, 3 and 2.2 received sequence of signals of different frequencies, as pachecano in Fig.3b). Each output signal from the generator 2.2 is set to "1" trigger 2.4. If the receipt of the next signal from the generator 1.8 trigger 2.4 is reset to "0" (input 12 or 13), then this signal "1" will set the trigger 2.6 and the bouquet of the generated signal at the output 15, such as Reset, which will reset (reboot) the computer.

Thus, the implementation of all used blocks is achieved by standard means, based on the classical principles of the implementation of the principle calculate assiran functional mechanism of control objects integrity, due to the fact that the system allows you to monitor the integrity of the computing environment (devices, blocks, settings, and so on) allows the use of messages other system and functional software (e.g., operating system, DBMS, and so on)

2. Implemented control the integrity of the actual control system. This system is implemented in such a way that you can remove unauthorized software component of the control system only after disassembling the computer (removed and the chassis, in a free slot which is placed in charge of the hardware components of the system integrity monitoring). When the hardware implementation of the control system integrity in case of unauthorized removal software components are blocked from functioning transmitter (respectively not already controlled). For facilities with computer provided by the opportunity of the authorized removal software protection system without removing hardware components without disassembly of the computer).

System integrity information processing computing systems, containing software component of the system ensure the integrity of the management system to ensure the integrity of the information processing computing systems, the control unit integrity for the currently logged in user, the control unit integrity in the system processes, unit production reactions, and the first input of the unit ensure the integrity of the file system is connected to the first input of the system, the second input with the first output control unit system integrity information processing computing systems, the output from the first input unit making the reaction to the first input of the control unit integrity in the system users connected to a second output control unit system integrity information processing computing systems, the second input to the third input of the system, the output from the second input unit production reactions, the first input of the control unit integrity in the system processes connected with the third output control unit system integrity information processing computing systems, the second input to the fourth input of the system, the output from the third input unit production reactions, the second input of the system connected to the input of the control unit system integrity information processing computing systems, input/output of which is input/output unit production a component system integrity information processing computing systems, software signal generator testing, and software component of the system ensure the integrity of the information processing computing systems - L blocks monitoring the integrity of the external environment, M blocks of message processing integrity from external programs, block software signal generator testing, and software component of the system to ensure the integrity of the information processing computing systems first inputs of L blocks monitoring the integrity of the external environment is connected with the fourth L outputs of the block of management of system integrity information processing computing systems, second L inputs - fifths L inputs of the system, L outputs from the fourth L-unit generation reaction, the first inputs of the M blocks of the message processing integrity from external programs connected with the fifth M outputs of the block of management of system integrity information processing computing systems, second M inputs - sixth M inputs, M outputs - fifths L inputs of the block making the reaction, the sixth output control unit system integrity information processing computing systems connected to the input program signal generator thee integrity of the information processing computing systems connected to the seventh input of the system, the second input to the eighth input of the system, the third entrance from the ninth input of the system, the output from the third output system, the second system output from the seventh input of the system, the input program signal generator test is connected to the tenth input system, the output from the fourth output of the system, with the eighth input of the system, the hardware component of the system ensure the integrity of the information processing computing systems contains three elements OR generator, two triggers, and the first input of the first element OR is connected to the seventh input of the system, the second input to the eighth input of the system, the output to the first input of the second element OR to the first input of the third element OR the second input with the second input of the second element OR, with the ninth input of the system, the generator output is connected to the first input of the second trigger to the first input of the first flip-flop, a second input connected to the high potential, the third input with the output of the second element OR the output to the second input of the second trigger, the third input - output of the third element OR the output from the third output system.

 

Same patents:

The invention relates to computing

The invention relates to distributed information and control systems (RIUS), mainly to RIUS, operating in real time, and can be used in various application systems, operating confidential information

The invention relates to distributed information and control systems (RIUS), mainly to RIUS, operating in real time, and can be used in various application systems, operating information of a confidential nature

The invention relates to gain access to resources of a computer system or a computer (computing) network, which is protected by a firewall, in response to requests from objects outside the firewall

The invention relates to communication technology and can be used for input and storage of confidential information, including shirokiya

The invention relates to railway automatics and is used in the management of vehicles

The invention relates to computing, and in particular to information and computer systems and networks, and can be used to protect information resources in workstations, informational, and functional (for example, a dedicated secure server, Proxy server, firewall, and t

The invention relates to computing, and in particular to information and computer systems and networks, and can be used for implementing the principles of distributed resources protection of computer systems and networks

The invention relates to computing, and in particular to information and computer systems and networks, and can be used to protect information resources in workstations and information servers
The invention relates to telecommunication networks, in particular, providing subscribers with a variety of services

The invention relates to computing and can be used to control the correct operation of the data processing system or its parts

FIELD: control systems, for lasers in particular.

SUBSTANCE: each laser on each factory is connected to appropriate server of terminal, while at each factory server of central control node exchanges information with each laser through local network. Gathering of information from lasers is realized via server device of central control and this information is used for forming of total information, which is accessible for interested parties, which are allowed to view content of Web-server.

EFFECT: higher efficiency.

14 cl, 5 dwg, 2 tbl

FIELD: automatic systems for controlling technological processes.

SUBSTANCE: module has reverse counter, protection block for executable functions of control unit in form of USB controller, decoder, RS-trigger, pulse generator, three AND elements, generator of output signal for resetting personal computer.

EFFECT: higher reliability.

3 cl, 1 dwg

FIELD: electric engineering, in particular, technology for controlling serviceability of controlling and commutating elements of electric circuits, possible use for controlling state of panels for controlling electro-mechanical devices in form of separate keys or switches, and also key-based information input devices in form of keyboards.

SUBSTANCE: method includes forming a series of testing pulses of current with given amplitude and length, sent to each piezoelectric element of key, value of resulting voltage component variable in stabilized state is measured, result of measurement is compared to given maximal and minimal boundary values.

EFFECT: possible detection in real time scale of breakdowns in form of dents or destruction of piezoelectric element crystal, violation of integrity of contact connections and conductors, both before and during process of information accumulation; increased reliability of keyboard.

FIELD: engineering of controlling and measuring equipment, possible use for engineering, producing, testing and operating of radio-electronic products.

SUBSTANCE: device for analyzing breakdowns has block for controlling gradual breakdowns, block for controlling errors, containing frequency splitter, pulse counters, subtracters, OR element, display element, and control block, containing data selector, pulse counter by module N, clock pulse generator, delay elements, memory cells block, AND elements, OR elements.

EFFECT: expanded class of solved problems and improved trustworthiness of analysis results due to controlling of moments when breakdowns occur as well as their duration, pseudo-parallel processing of controlled parameters.

1 dwg

FIELD: communications engineering, possible use in systems capable of ensuring portability between message exchange clients.

SUBSTANCE: communication message exchange system includes a set of message exchange clients. First message exchange client sets up first communication connection, working with a set of client data. First message exchange client transfers a set of client data to second message exchange client. Second message exchange client sets up a second communication connection, working with a set of client data.

EFFECT: portability between message exchange clients.

9 cl, 24 dwg

FIELD: technology for protecting information contained on a computer.

SUBSTANCE: in the device, controllable generator of radio interferences and controllable power amplifier are connected serially. Antenna commutator is connected by first signal input to output of power amplifier. Signal input of signal processing block is connected to first output of antenna commutator, first controlling output is connected to controlling input of radio interference generator, second controlling output is connected to power amplifier controlling input, and signal output is connected to input of indicator of type of radio interface or radio frequency channel. Output of power supply is connected to powering inputs of antenna commutator and signal processing block. Controllable electronic computer is connected between output of power supply and powering inputs of radio interference generator and power amplifier and is connected by control input to third control output of signal processing block. Band filter is coupled between combined second signal input and output of antenna commutator and receiving-transmitting antenna. The latter is mounted in close proximity of computer being protected with possible reaction to operation of receiver-transmitter of malefactor. Signal processing block consists of serially coupled receiver, detector and logical analyzer, made in form of microprocessor with possible determining of fact of presence of an illegal signal, its power, band of working frequencies, duration of packets and association with a type of radio interface or radio frequency channel.

EFFECT: increased efficiency of computer protection, increased informational safety of computer.

4 cl, 2 dwg

FIELD: computer engineering level, in particular, control of server resources in shared usage network.

SUBSTANCE: in accordance to the invention, monitoring of server resources is conducted, which includes monitoring, at least, the level of activity of communication interface of network server, level of usage of network server memory and level of processor usage. In case of overload of at least one server resource, load of given resource is reduced. The resource usage report is outputted to console component.

EFFECT: reduced risk of server failure and optimized server operation.

6 cl, 6 dwg

FIELD: controlling and measuring equipment which allows conduction of constant monitoring and diagnosing of electromagnetic situation, important for operation of computers in composition of local area network, and, on basis of prediction results, to realize prior switching of users to computers, not subject to effect of electromagnetic impulse.

SUBSTANCE: device contains analyzer of parametric failures and breakdowns, field strength meter and controlling board with external launch, consisting of commutation block, reprogrammable permanent memorizing device and probability-based prediction device.

EFFECT: extended class of solved problems and ensured continuity of informational service provision to clients of distributed local area network.

6 dwg

Up!