Unlock instant, AI-driven research and patent intelligence for your innovation.

Implementation and service method of a trusted cryptographic module on an arm platform

A cryptographic module and service method technology, applied in the direction of platform integrity maintenance, etc., can solve the problems of insufficient consideration of computing resources and hardware platform scalability, and cannot meet the needs of easy expansion of mobile devices and efficient and reliable services, etc., to achieve strong scalability performance, improve efficiency, and ensure safety

Active Publication Date: 2019-03-29
NO 709 RES INST OF CHINA SHIPBUILDING IND CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] To sum up, the existing mobile computing platforms build trusted modules by adding hardware or software simulations, without fully considering the limited computing resources in the mobile computing environment and the scalability of the hardware platform, and cannot meet the needs of mobile devices for mobile devices. The need for scalable and efficient trusted services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation and service method of a trusted cryptographic module on an arm platform
  • Implementation and service method of a trusted cryptographic module on an arm platform
  • Implementation and service method of a trusted cryptographic module on an arm platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention is based on the TrustZone technology of the ARM processor, and provides a method for realizing trusted cryptographic modules and efficient services through software simulation in the "secure world", such as figure 1 As shown: the trusted efficient agent TEA receives trusted service requests from applications, preprocesses these requests to form trusted service request packets that can be processed by multiple cores in parallel or single core, TEA calls the communication agent CM and The request packet is passed to the CM; the CM saves and switches the main processing CPU core and the working status of the entire platform, and forwards the trusted service request to the trusted cryptographic module emulator TCME, and TCME performs module management, identity identification and verification, and data protection according to the request type Multi-core parallel or single-core processing of the measurement report; finally, the secure cryptographic libra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an implementation and service method of a trusted cryptographic module on an ARM platform: first, a trusted high-efficiency agent located in the ordinary world receives and preprocesses a trusted service request from an application program, and forwards the request to the communication agent , save and switch the working state of the main CPU core; then the trusted cryptographic module emulator TCME receives and parses the forwarded requests, initializes the slave CPU cores according to the actual number of CPU cores on the platform, and distributes all requests to the master and slave CPU cores in a round-robin manner The TCME of operation is processed, and TCME provides standard credible service according to single service request; Finally, safe cryptographic storehouse provides cryptographic algorithm support to TCME, and is encrypted and protected by the root key stored in Secure Boot ROM; Advantage of the present invention is: Trusted service requests are processed by multiple cores at the same time, which improves the efficiency of trusted services in the system; the security of cryptographic algorithms and keys is ensured by using securely stored root keys to encrypt and protect the secure cryptographic library.

Description

technical field [0001] The invention relates to the field of mobile information security, and mainly relates to a trusted cryptographic module on an ARM platform and an efficient service method. Background technique [0002] At present, mobile intelligent terminals with powerful processing capabilities, more storage space and independent operating systems have become the development trend of mobile terminals. Like the development of personal computers, the popularity of mobile smart terminals has brought great convenience to people, but it has also brought great security risks to people. Due to its smaller size and the complexity and uncertainty of its environment, the security problems it faces are more complex than PC systems, and the losses it causes are greater. Therefore, it is very important to use trusted computing technology to build a safe and trusted computing platform for users. [0003] Today, the mainstream mobile platform processors are ARM, Intel and MIPS. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
CPCG06F21/57
Inventor 徐士伟赵爽余学俊陈敏陈敬东
Owner NO 709 RES INST OF CHINA SHIPBUILDING IND CORP