Encryption system and encryption method based on TrustZone

An encryption method and encryption and decryption technology, applied in the field of mobile device encryption, can solve problems such as security risks and achieve the effect of improving security

Inactive Publication Date: 2015-12-09
SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
View PDF6 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention aims at the deficiency and problem that the mobile device encryption system in the prior art is only based on the encryption chip to complete the security operation, and there are great potential safety hazards, and provides a TrustZone-based encryptio

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption system and encryption method based on TrustZone
  • Encryption system and encryption method based on TrustZone

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The specific embodiments of the present invention are further explained in conjunction with the drawings.

[0026] An encryption method based on TrustZone, which mainly uses an encryption system based on TrustZone, which is used to establish normal mode and safe mode. The safe microkernel is preset in the safe mode. The safe microkernel divides the safe zone memory into multiple task memories Space, mobile devices that support independent security applications running at the same time, including the driver layer calling submodule, API calling submodule, key return submodule, and key verification submodule;

[0027] The driver layer calling sub-module is used to call the mobile device driver layer interface through shared memory when the upper application needs to encrypt and decrypt;

[0028] The API call sub-module is used for the driver layer to call the security microkernel through TrustZoneAPI after receiving the call command from the upper layer, so that the mobile device...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption system and an encryption method based on TrustZone, belonging to the field of encryption of mobile devices. According to the invention, a mobile device system builds a normal mode and a safe mode, in the safe mode, a safe microkernel is preset, and the safe microkernel divides a safe zone memory into a plurality of task memory spaces and supports simultaneous running of independent safe applications; when upper applications need to be encrypted or decrypted, the mobile device system enters in a system monitor mode, context of the normal mode is backed up in the monitor mode, and then, the system enters in a safe mode, a driver layer calls the safe microkernel through a TrustZone API after receiving a call command of the upper applications, the system enters in a user running mode of the safe mode to execute corresponding safe services, and the safe microkernel returns back a key to a server for verification after encryption and decryption; and after the key passes the verification of the server, a user program and the server start normal data exchange, and restore the context of the normal mode.

Description

Technical field [0001] The invention discloses an encryption system and method based on TrustZone, belonging to the field of mobile equipment encryption. Background technique [0002] Today's device interconnection and intelligence have made huge mobile and embedded OSes popular, giving rise to many security issues. Mobile devices, such as mobile phones, tablet computers, and e-book devices, often have encryption systems to perform functions such as authentication. In the prior art, the encryption system of a mobile device is generally based on an encryption chip, which communicates with the processor of the mobile device through a dedicated interface such as an I2C interface, and encryption and decryption operations and authentication are all completed at the user layer. Every user can access the encryption chip, or take out the content of the encryption chip through a specific programming tool, or even simulate the operation of the encryption chip to achieve the purpose of dec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/74G06F21/60
CPCG06F21/74G06F21/602
Inventor 陈勇陈乃阔
Owner SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products