Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Android system based on software TCM and trusted software stack and trusted authentication system and method thereof

A technology of Android system and software stack, which is applied in the direction of transmission system, digital transmission system, electrical components, etc., can solve the problems of Android system's bottom layer security powerlessness, neglect of Android system terminal integrity inspection, lag, etc., and increase the ability of interactive authentication , strengthen protection, increase the effect of inspection

Active Publication Date: 2016-06-29
NORTHEASTERN UNIV
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] It can be seen that compared with the fast-updating malicious software, the current security protection scheme of the Android system is relatively lagging and passive, and ignores the integrity inspection of the Android system terminal, which is helpless for the underlying security of the Android system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android system based on software TCM and trusted software stack and trusted authentication system and method thereof
  • Android system based on software TCM and trusted software stack and trusted authentication system and method thereof
  • Android system based on software TCM and trusted software stack and trusted authentication system and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0069] The present invention introduces the idea of ​​trusted computing and standards of trusted computing, and at the same time combines the characteristics of the Android system itself, combines the soft TCM and trusted software stack with the Android system to obtain the soft TCM and trusted software stack based on this embodiment Android system, such as figure 1 As shown, it includes soft TCM, trusted software stack and soft TCM driver module built on the Android kernel of the existing Android system; the system library of the existing Android system embedded in the soft TCM and the trusted software stack is Android The application program of the system provides a calling environment; wherein the trusted software stack is on the soft TCM, such as figure 2 As shown, as an interface for external access and management of the soft T...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an android system based on software TCM and a trusted software stack and a trusted authentication system and method thereof, and belongs to the technical field of android system and android software safety.The android system comprises the software TCM built on an android core of an existing android system, the trusted software stack and a software TCM driving module; the software TCM and the trusted software stack are embedded into a system library of the existing android system; the trusted software stack is arranged on the software TCM; the software TCM driving module is located on a Linux core layer of the existing android system.The trusted authentication system comprises a trusted authentication system started by the android system and a trusted authentication system installed by the android software.The trusted authentication method includes the steps of the starting trusted authentication process of the android system and the installing trusted authentication process of the android software.According to the android system based on the software TCM and the trusted software stack and the trusted authentication system and method thereof, the integration solution of the safety of the android operating system is achieved based on the trusted computing thought, checkout to the integrity of an android terminal is additionally conducted, protection of a system bottom layer is reinforced, third-party software in the android terminal is also safe and credible, and therefore the android terminal is absolutely safe.

Description

Technical field [0001] The invention belongs to the technical field of Android system and Android software security, and in particular relates to an Android system based on soft TCM and trusted software stack and its trusted authentication system and method. Background technique [0002] The development of technology in the information age is changing rapidly. Mobile Internet technology is undoubtedly a hot topic in the world today, and the Android operating system has a high market share, and its security issues are getting more and more attention. At present, the security problems faced by the Android system mainly include two aspects: [0003] (1) Malicious attack: The attacker uses the loopholes of the Android system itself to launch a malicious attack on the Android system, thereby stealing the user's private information for illegal purposes, and even directly obtaining the control of the Android system, which can easily obtain and modify the user The data information,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57G06F21/51G06F21/12H04L9/32
CPCG06F21/12G06F21/51G06F21/57H04L9/3236H04L9/3249
Inventor 周福才易海高健
Owner NORTHEASTERN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products