Unlock instant, AI-driven research and patent intelligence for your innovation.

Security control method, device and system

A technology of security control and management system, applied in the field of security control, to achieve the effect of fast and safe processing operations, reducing user risks, and improving user experience

Active Publication Date: 2016-04-06
HUAWEI TECH CO LTD
View PDF7 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, SELinux is powerless in the face of exploits from Linuxkernel, such as Pingpangroot attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security control method, device and system
  • Security control method, device and system
  • Security control method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] The embodiment of the present invention provides a method for security management and control, which can actively detect the SELinux security service device through the trusted application device in the TEE. When the system on the REE side is attacked, it can be discovered in time, so that security processing operations can be performed quickly, reducing user risk. Embodiments of the present invention also provide corresponding devices and systems. Each will be described in detail below.

[0073] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative efforts fall within the protection scope of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security control method, which is applied to a trustzone management system. The trusted zone management system comprises a TEE (trusted execution environment) and an REE (Rich Execution Environment), wherein the TEE comprises a trusted application device and a security operation device, and the REE comprises an authentication proxy device and a SELinux (Security-Enhanced Linux) security service device. The method comprises the following steps: the trusted application device sends a test command to the authentication proxy device, wherein the test command is used for the authentication proxy device to carry out security detection on the SELinux security service device; a detection result returned from the authentication proxy device is received; and according to the detection result, the SELinux security service device is determined to be attacked, an exception notice is sent to the security operation device, wherein the exception notice is used for the security operation device to carry out a security processing operation on the SELinux security service. The scheme of the embodiment of the invention can timely find when an REE side system is attacked and can carry out a security processing operation.

Description

technical field [0001] The present invention relates to the technical field of safety management and control, in particular to a method, device and system for safety management and control. Background technique [0002] Trust Zone (TrustZone) is a brand-new security technology, which introduces the concept of Trust Zone by upgrading the architecture of the Central Processing Unit (CPU) and the hardware design of the memory subsystem. The hardware isolation of the trusted zone and the untrusted zone is separate, and the communication between the two is realized through the monitoring mode. [0003] The introduction of the trust zone can enhance the security of the system, for example, for wallet type payment operations, the user's fingerprint needs to be verified at runtime. Whether the fingerprint and identification in the trusted zone are correct, and return the result to the untrusted zone. This can not only ensure the authenticity of the user, but also protect the finge...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/034
Inventor 卫渊
Owner HUAWEI TECH CO LTD