Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method for implementing a high-security application system based on a trusted execution environment

An execution environment and security application technology, applied in security devices, wireless communications, electrical components, etc., can solve problems such as insufficient security level, application system Trojan horse threat, and difficulty in ensuring complete isolation, so as to reduce construction complexity and develop The effect of short cycle time and high safety

Inactive Publication Date: 2017-12-19
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Completing the sensitive business processing of the application system at this layer can guarantee the security of the application system to a certain extent. However, due to the serious fragmentation problem in the smart terminal operating system (such as the Android operating system), if many system vulnerabilities in the user’s mobile device are If it is not repaired in time, the application system will face serious security risks (such as Trojan horse threats, application system being hijacked, etc.)
At the same time, all application system codes run in the same smart terminal operating system, it is difficult to ensure complete isolation from other application systems, and sensitive data will not be stolen
Therefore, the security level of this scheme is not high enough, and it is difficult to truly solve the security problems of highly sensitive application systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for implementing a high-security application system based on a trusted execution environment
  • A method for implementing a high-security application system based on a trusted execution environment
  • A method for implementing a high-security application system based on a trusted execution environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the objectives, advantages and technical solutions of the present invention more clear, the present invention will be further described in detail below through specific implementation and in conjunction with the accompanying drawings.

[0036] for figure 1 Describes the overall structure of the implementation of the program as a whole, mainly including the following three parts.

[0037] 1. Implementation method of sensitive business library based on trusted execution environment security application system

[0038] The developer of the high-security application will apply the sensitive business processing unit and the non-sensitive business processing unit of the application system. The non-sensitive business processing unit refers to the code logic for processing non-core data, and the sensitive business processing unit is the code logic for processing core data. The sensitive business library is signed by a trusted third-party CA, so as to realize t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an implementation method of a high security application system based on a trusted execution environment. The implementation method comprises the following steps of firstly, utilizing a sensitive business library to implement hypersensitive business logic and making the sensitive business library complete signature of a trusted third party CA (Certificate Authority); secondly, implementing data interaction with the sensitive business library in the trusted environment through a gasket shared library; and lastly, publishing the high security application system to a user for downloading and installation in a terminal supporting a trusted execution environment through an application system packaging technology so as to dynamically and safely load the sensitive business library in the trusted execution environment. The implementation method has the advantages of high application system security, short development period, capability of reducing complexity for construction of the trusted execution environment and the like.

Description

technical field [0001] The invention relates to a method for realizing a high-security application system based on a trusted execution environment, and belongs to the field of high-security application construction based on a trusted execution environment for mobile terminals. Background technique [0002] With the rapid development of the mobile Internet, the services carried by mobile devices have gradually changed from the original communication, SMS, social networking, games, etc., to areas with high security requirements such as enterprise office and mobile payment. [0003] Traditionally, in order to solve the high security system requirements of mobile devices, the framework layer of the smart terminal is generally used to process the highly sensitive business of the application system (such as data encryption and decryption, signature verification, key generation, destruction, etc.). Completing the sensitive business processing of the application system at this layer...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57H04W12/06
CPCG06F21/57
Inventor 王雅哲王瑜田琛
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products