Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for multi-process access to trusted application

A multi-process and credible technology, applied in the network field, can solve problems affecting business execution efficiency, process access failure, etc., and achieve the effect of improving business execution efficiency

Active Publication Date: 2019-12-10
ADVANCED NEW TECH CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Processes in the general execution environment of the terminal device may access TA. In related technologies, TA only supports single-process access. If multiple processes access the same TA, some processes will fail to access, affecting the corresponding process of the process. business execution efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for multi-process access to trusted application
  • Method and system for multi-process access to trusted application
  • Method and system for multi-process access to trusted application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] With the rapid development of network technology and smart terminals, users can download a large number of applications to terminal devices. In order to ensure the security of these applications, TEE has created a trusted environment, where it will be safer to run applications involving sensitive data. figure 1 The system architecture of TEE setting is illustrated, and the terminal device 11 (for example, mobile terminal, tablet computer, wearable device, POS machine, etc.) includes a processor 12 (for example, a system-on-chip SOC, a main processor CPU, etc.), the processing The processor 12 may be set on the printed circuit board (Printed Circuit Board, PCB) of the terminal device 11, and the processor 12 is set with two execution environments, which are Rich Execution Environment (Rich Execution Environment, REE) and TEE.

[0021] Among them, the REE is an ordinary non-confidential execution environment, which may include multiple client applications (ClientApplicatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for multiple processes to access a trusted application and a system thereof. The method comprises the following steps of receiving access requests to the same trusted application at the same moment, wherein the access requests are sent by the multiple processes respectively; each access request includes an application identification of the trusted application and a process parameter of the process to access the trusted application; adding the multiple processes in an access queue and making the processes in the access queue access the trusted application corresponding to the application identification one by one till that a process that the trusted application processes the process parameter is ended. In the invention, the multiple processes simultaneously access TA and service execution efficiency is increased.

Description

technical field [0001] The invention relates to network technology, in particular to a method and system for multi-process access to trusted applications. Background technique [0002] With the continuous development of smart terminal technology, users can easily download various applications to terminal devices for use, followed by users' concern about the security of these applications, especially in applications involving some sensitive data (that is, data with security and confidentiality requirements), users expect more effective security protection for these data. Trusted execution environment (Trusted execution environment, TEE) is an execution environment created on a terminal device that can provide security protection functions. In this environment, application execution or data security is relatively high; and, TEE also provides some A trusted application (Trusted Application, TA) provides security services for the TA. Processes in the general execution environm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 孙元博
Owner ADVANCED NEW TECH CO LTD