Credible application management system and loading method for credible applications

An application management and credible technology, applied in the direction of electrical digital data processing, instruments, computer security devices, etc., can solve the problems of destroying TEEkernel trusted applications, upgrade failures, affecting development efficiency, etc., to improve flexibility and scalability , the effect of reducing the start-up time

Inactive Publication Date: 2016-07-20
LEADCORE TECH
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Modifying, adding, and deleting a trusted application requires recreating the image file, which seriously affects the development efficiency during the product development stage. After the product is used, there is a risk of upgrade failure and damage to TEEkernel and other trusted applications; compared to the normal operation of the system Load trusted applications on demand when TEEkernel starts. Loading all trusted applications when TEEkernel starts will increase system startup time and allocate system resources to all trusted applications prematurely.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credible application management system and loading method for credible applications
  • Credible application management system and loading method for credible applications
  • Credible application management system and loading method for credible applications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention will be further described in detail below with reference to the accompanying drawings and specific embodiments. The advantages and features of the present invention will become apparent from the following description and claims. It should be noted that, the accompanying drawings are all in a very simplified form and use imprecise ratios, and are only used to facilitate and clearly assist the purpose of explaining the embodiments of the present invention.

[0032] In view of the problems existing in the prior art, the inventor thought of using each trusted application as a separate file, and proposed a trusted application management system, so that the REE system can dynamically request the trusted application to be used from the TEE system during operation. (TrustedApplication), the security kernel (TEEkernel) loads the trusted application, that is, the loading of the trusted application is performed during the operation of the trusted application ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a credible application management system. Each credible application serves as a single file, and then a common execution module can dynamically request a desired credible application for a credible execution module during operation; a safe kernel loads the credible application, i.e., loading of the credible application can be performed during operation of the credible application management system, and in this way, the flexibility and the extendibility of the system can be improved, and the run-up time of the system can be shortened. The invention also provides a loading method for the credible applications in order to achieve a dynamic loading process.

Description

technical field [0001] The invention relates to the field of software, in particular to a trusted application management system and a method for loading trusted applications. Background technique [0002] All software and hardware of the embedded system based on TrustZone / TEE technology are divided into two parts: REE (RichExecutionEnvironment) system and TEE (TrustedExecutionEnvironment) system. The TEE system is a secure and trusted system, and its resources cannot be accessed by the REE system. Trusted applications run on the security kernel (TEEkernel) and provide security-related services for the REE system. [0003] In the existing solution, all trusted applications and the TEEkernel are generally made into an image file and stored in a non-volatile memory, and all trusted applications are loaded when the TEEkernel is started and initialized. Its loading link is like figure 1 shown. That is, first realize remote diskless boot through BootRom, then run TEEbootloader...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/51
Inventor 黄庆伟
Owner LEADCORE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products