Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for Bidirectional Access Application Between Dual Execution Environments

A dual execution environment and execution environment technology, applied in digital transmission systems, secure communication devices, electrical components, etc., can solve the problems of inability to obtain basic data, reduce system security, and increase the difficulty of verifiability of secure operating systems. The effect of improving system work efficiency and reducing the possibility of system defects

Active Publication Date: 2018-12-25
CHINA UNIONPAY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the above scheme, a new Request command cannot be initiated before the Response command returns to the REE application
[0005] This solution has the following problems: when the TEE application needs to perform more complicated processing on the access request of the REE application, because the new Request command cannot be inserted between the previous pair of Request-Response commands, the TEE application cannot be accessed from the multimedia execution environment. The REE application obtains the relevant basic data required for complex processing, thus requiring the trusted execution environment itself to have more and stronger capabilities to support this complex processing
For example, when a TEE application needs the participation of the background, or needs to access the smart memory card to perform complex processing, the TEE application correspondingly needs the trusted execution environment to be able to connect to the Internet, or have a smart memory card access interface, etc., which will undoubtedly make the The structure of the trusted execution environment becomes larger and more complex, which increases the difficulty of the verifiability of the secure operating system and produces more system defects, which in turn reduces the security of the system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for Bidirectional Access Application Between Dual Execution Environments
  • Method for Bidirectional Access Application Between Dual Execution Environments
  • Method for Bidirectional Access Application Between Dual Execution Environments

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In the embodiment provided herein, the dual execution environment includes a trusted execution environment and a multimedia execution environment, both of which run together in the same smart mobile device, such as a smart phone. The multimedia execution environment is deployed with at least one client application and a first communication module, and the trusted execution environment is deployed with at least one security application and a second communication module. Each client application and security application provide at least one service respectively. communicate with each other through the first communication module and the second communication module. It should be noted that the "return access" referred to herein means that when the first client application in the multimedia execution environment sends an access request to the first security application in the trusted execution environment, in order for the first security application to obtain the In order to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a method for bidirectionally accessing applications between dual execution environments, comprising: a first client application sends an access request to a first security application through a first communication module; the first security application performs a first-stage processing on the access request, to obtain the first result data and transfer it to the second communication module; the second communication module establishes at least one two-way communication channel between the first communication module and the second communication module according to the first result data, so that the first security application respectively Revisit each second client application through each two-way communication channel; the first security application performs a second-stage processing on the access request based on the revisit results obtained by revisiting each second client application, so as to generate final result data corresponding to the access request; A security application returns final result data to the first client application. It enables the TEE application to return to multiple REE applications in parallel while processing the requests from the REE application.

Description

technical field [0001] The invention relates to the technical field of intelligent mobile devices, and more specifically, relates to a method for bidirectionally accessing applications between dual execution environments. Background technique [0002] As smart mobile devices (such as smart phones) gradually become "payment tools", their existing smart operating systems can no longer meet the security requirements of payment applications for their operating environments. Due to limited system resources, improving the security of a smart operating system will almost certainly degrade functionality and user experience. In response to this, based on the technological development of the latest mobile chips, the current industry has proposed a dual execution environment solution: that is, two execution environments run simultaneously on one device, one of which is a multimedia execution environment that focuses on functions and user experience, and the other focuses on Secure tru...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L9/40
Inventor 鲁志军郭伟周钰陈成钱
Owner CHINA UNIONPAY