Method for secure storage of data and electronic equipment

A technology for safe data storage and electronic equipment, applied in the electronic field, can solve problems such as insecure data storage, and achieve the effect of ensuring communication security

Inactive Publication Date: 2016-04-20
LENOVO (BEIJING) CO LTD
View PDF2 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a method for securely storing data and electronic equipment, which are used to solve t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for secure storage of data and electronic equipment
  • Method for secure storage of data and electronic equipment
  • Method for secure storage of data and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0087] Please refer to figure 1 , which is a flowchart of a method for securely storing data provided in Embodiment 1 of the present application, the method includes:

[0088] S101: The first trusted execution environment authenticates the first application program successfully, receives the storage instruction of the first application program for the first data, and parses the storage instruction, and the storage instruction is based on the second trusted execution environment. The first data is written; wherein, the first trusted execution environment is the underlying operating environment of the first operating system, and the first application is an upper-layer application of the first operating system;

[0089] S102: The second trusted execution environment successfully authenticates the first trusted execution environment, and receives the storage instruction; the second trusted execution environment is the second operating system;

[0090] S103: In response to the sto...

Embodiment 2

[0129] Based on the same inventive concept as in Embodiment 1 of this application, Embodiment 2 of this application provides an electronic device, please refer to Figure 6 ,include:

[0130] housing 10;

[0131] The memory 20 is arranged in the casing 10, wherein the memory includes a first storage device and a second storage device, and the first storage device is used for storing the first system file corresponding to the first operating system and the first system file corresponding to the first operating system. an application program file corresponding to the application program, the second storage device is used to store a second system file corresponding to the second operating system;

[0132] a processor 30, arranged in the housing 10, configured to receive a storage instruction of the first application program for the first data when the first trusted execution environment successfully authenticates the first application program, and parse the storage instruction, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for secure storage of data and electronic equipment. The method comprises steps as follows: a first credible execution environment authenticates a first application successfully, receives a storage instruction of the first application for first data and analyzes the storage instruction, and the storage instruction represents to perform write operation on the first data on the basis of a second credible execution environment; the second credible execution environment authenticates the first credible execution environment successfully and receives the storage instruction; the second credible execution environment is a second operation system; the second credible execution environment responds to the storage instruction and writes the first data in a storage device corresponding to the second credible execution environment in a preset encryption mode, and the first data written in the storage device in the preset encryption mode are invisible to an upper-layer application of a first operation system.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a method for safely storing data and electronic equipment. Background technique [0002] With the continuous development of science and technology, electronic technology has also developed rapidly. Many electronic devices, such as tablet computers, smart phones, etc., have become the necessities of people's daily life. In order to meet user requirements, electronic devices can generally be used to run various operating systems or application programs, which brings great flexibility to the electronic devices. [0003] In the prior art, since the electronic equipment can support the operation of various application programs, the careless operation of the user will also cause malicious processes such as various Trojan horses and viruses to enter the electronic equipment. For example, when the user clicks on a virus-carrying website, the virus will parasitize in the operating sy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/78G06F21/44
CPCG06F21/44G06F21/78
Inventor 赵志扬王亮亮
Owner LENOVO (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products