Method for realization and service for trusted password module on ARM platform

A cryptographic module and service method technology, applied in the direction of platform integrity maintenance, etc., can solve the problems of insufficient consideration of computing resources and hardware platform scalability, and cannot meet the needs of easy expansion of mobile devices and efficient and reliable services, etc., to achieve strong scalability performance, improve efficiency, and ensure safety

Active Publication Date: 2016-11-16
NO 709 RES INST OF CHINA SHIPBUILDING IND CORP
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] To sum up, the existing mobile computing platforms build trusted modules by adding hardware or software simulations, without fully considering the limited computing resources in the mobile computing environment and the scalability of the hardware platform, and cannot meet the needs of mobile devices for mobile devices. The need for scalable and efficient trusted services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realization and service for trusted password module on ARM platform
  • Method for realization and service for trusted password module on ARM platform
  • Method for realization and service for trusted password module on ARM platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention is based on the TrustZone technology of the ARM processor, and provides a method for realizing trusted cryptographic modules and efficient services through software simulation in the "secure world", such as figure 1 As shown: the trusted efficient agent TEA receives trusted service requests from applications, preprocesses these requests to form trusted service request packets that can be processed by multiple cores in parallel or single core, TEA calls the communication agent CM and The request packet is passed to the CM; the CM saves and switches the main processing CPU core and the working status of the entire platform, and forwards the trusted service request to the trusted cryptographic module emulator TCME, and TCME performs module management, identity identification and verification, and data protection according to the request type Multi-core parallel or single-core processing of the measurement report; finally, the secure cryptographic libra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realization and service for a trusted password module on an ARM platform. The method comprises following steps: firstly, receiving a trusted efficient agent located in a universal world and pre-processing a trusted service request from an application program, sending to the communication agent for forwarding the request and saving and switching to a working state of a main CPU core; then, receiving TCME of a trusted password module simulator and analyzing the forwarded request, initializing the CPU core according to the core number of CPUs of the platform and assigning all requests to TCME running in principal and subordinate CPUs for processing, wherein the TCME is used for providing standard trusted services according to single service request; and finally, supporting a password algorithm for TCME by a safety password library and providing protection by root keys stored in Secure Boot ROM. The method for realization and service for the trusted password module on the ARM platform has following advantages: efficiency of trusted service is improved when multiple cores are used for processing trusted service requests at the same time; and by utilizing a root key encryption projection safety password library for safety storage, safety of the password algorithm and secret keys is ensured.

Description

technical field [0001] The invention relates to the field of mobile information security, and mainly relates to a trusted cryptographic module on an ARM platform and an efficient service method. Background technique [0002] At present, mobile intelligent terminals with powerful processing capabilities, more storage space and independent operating systems have become the development trend of mobile terminals. Like the development of personal computers, the popularity of mobile smart terminals has brought great convenience to people, but it has also brought great security risks to people. Due to its smaller size and the complexity and uncertainty of its environment, the security problems it faces are more complex than PC systems, and the losses it causes are greater. Therefore, it is very important to use trusted computing technology to build a safe and trusted computing platform for users. [0003] Today, the mainstream mobile platform processors are ARM, Intel and MIPS. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/57
Inventor 徐士伟赵爽余学俊陈敏陈敬东
Owner NO 709 RES INST OF CHINA SHIPBUILDING IND CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products