Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An intelligent terminal isolation system and method based on processor security extension

A security extension, intelligent terminal technology, applied in the field of intelligent terminal isolation system, can solve the problems of intelligent terminal operating environment unable to reach sufficient security level, chaotic life cycle management, loss of security of highly sensitive services, etc.

Inactive Publication Date: 2017-09-12
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] When smart terminals implement high-security and highly sensitive business scenarios (such as office and payment), there are several main problems in the terminal operating environment: (1) The common operating system of smart terminals is vulnerable to attacks, and the overall operating environment of smart terminals cannot achieve adequate security level
The Android system that is popular in the market now, due to the openness of the system, the characteristics of the system's own design, and the customization of various manufacturers, lead to fragmentation of the operating system version
It is impossible to manage unified security mechanisms and policies at the level of the smart terminal operating system
In addition, for the Chinese mainland market, application life cycle management is also extremely chaotic, which greatly increases the chances of end users accidentally installing malicious Trojans and viruses
The overall operating environment of the smart terminal and the applications running in it may be subject to illegal monitoring and theft, and the security cannot be effectively guaranteed
(2) Due to the existence of the above-mentioned problems, the basic security conditions for carrying out business such as corporate office and payment cannot be met
Due to the existence of problem 1, these basic underlying security mechanisms will not be guaranteed, resulting in the loss of security of highly sensitive services from the initiation stage
The key logical processing unit can exist and run in the form of a process. Due to the existence of problem 1, the common operating system of the smart terminal cannot provide a reliable operating environment to prevent logical services and data from being monitored and tampered with.
However, due to the existence of problem 1, the protection of related software for storing passwords is often not up to the due security level
This puts sensitive data at risk of theft
In addition, there is a risk of illegal damage when storing sensitive data in common file system media
[0012] To sum up, most smart terminals in the market now lack a trusted computing base as technical support when carrying out highly sensitive services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An intelligent terminal isolation system and method based on processor security extension
  • An intelligent terminal isolation system and method based on processor security extension
  • An intelligent terminal isolation system and method based on processor security extension

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] The present invention is further described and explained by the following examples.

[0068] The present invention will use the Android system as the common operating system 102, combined with Trustzone technology as the processor security extension module 108, to describe the specific implementation on the smart phone. However, other implementations of the present invention can still be used on existing or future common operating systems or kernels, and other processor security extension technologies can also be used. In addition, the embodiments described in the following specific examples are implemented by smart phones, but the isolation system of the invention can be used in whole or in part on smart terminals such as flat panels, digital TV set-top boxes, and smart TVs.

[0069] see figure 1 , the figure shows the relationship between the various components of the present invention. Trustzone is an embodiment of the processor security extension module 108. The p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed are an intelligent terminal isolation system and an intelligent terminal isolation method both based on processor safety extension. The intelligent terminal isolation system comprises a safety starting module, a transaction commission module, a communication agent module, a safety extension abstraction layer, a safety operating system, safety middleware, credible application modules and a common application module. The safety starting module simply initializes hardware environment of an intelligent terminal, and authenticates and guides the safety operating system. The communication agent module is responsible for encapsulation and communication of bottom layer data of the credible application modules and the common application module. The safety extension abstraction layer provides a uniform calling interface to the safety operating system. The safety operating system provides mutually independent operation space for the credible application modules in a whole safety domain and manages all software and hardware resources in the safety domain. The safety middleware is a core library related to implementation of safety functions and transaction commissions and provides related functional interfaces to credible applications. The intelligent terminal isolation system and the intelligent terminal isolation method aim to provide a complete safety isolation mechanism to the intelligent terminal and improve safety of software operation environment.

Description

technical field [0001] The invention relates to an intelligent terminal isolation system and method based on processor security expansion, belonging to the security field of intelligent terminals. Background technique [0002] At present, the entire information industry is undergoing a transformation from the traditional Internet to the mobile Internet. The functions and forms of smart terminals are more diversified. The functions realized by smart terminals are not only the communication, social and entertainment directions of the general public, but also hope to realize the traditional PC It has functions with high security and high sensitive business requirements such as corporate office and payment. [0003] When smart terminals implement high-security and highly sensitive business scenarios (such as office and payment), there are several main problems in the terminal operating environment: (1) The common operating system of smart terminals is vulnerable to attacks, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/74G06F21/12H04M1/725
CPCG06F21/575G06F21/74G06F2221/031G06F2221/032G06F2221/2113G06F2221/2149H04M1/724
Inventor 王雅哲徐震田琛王瑜
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products