Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A data transmission method and system

A data transmission method and data technology, applied in the direction of electrical digital data processing, instruments, etc., can solve the problems of low communication efficiency and large system overhead

Active Publication Date: 2020-01-03
MEIZU TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The embodiment of the present invention provides a data transmission method and system to solve the problems of high system overhead and low communication efficiency caused by the interaction mode between the existing TA layer and the securedriver layer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data transmission method and system
  • A data transmission method and system
  • A data transmission method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] In Embodiment 1 of the present invention, a data transmission method is provided, such as image 3 As shown, it specifically includes the following steps:

[0052] S301. When the trusted application layer 101 sends a data transmission request to the security driver layer 102, the trusted application layer 101 stores initial data in the first address space of the trusted application layer 101.

[0053] S302. The trusted application layer 101 maps the first address space to the physical memory to obtain a shared memory of the physical memory.

[0054] S303. When the security driver layer 102 receives the request in S301, map the shared memory to the address space of the security driver layer 102 to obtain a second address space.

[0055] S304. The security driver layer 102 stores the initial data obtained from the shared memory in the second address space.

[0056] The solution of this embodiment also includes a process of establishing a mapping relationship between the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a method and a system for data transmission, wherein a TA layer sends a data transmission request to secure a driver layer and sends a first data stored in a first address space to a shared memory establishing a first mapping relationship with the first address space, the secure driver layer acquires the first data from the shared memory according to the received request and stores the first data in the second address space establishing a second mapping relationship with the shared memory;wherein the first mapping relationship and the second mapping relationship remain unchanged. The mapping relationship reduces the system overhead between the TA layer and the secure driver layer and improves the efficiency of communication. The method and system for data transmission relates to a field of embedded technology.

Description

technical field [0001] The invention relates to the field of embedded technology, in particular to a data transmission method and system. Background technique [0002] In order to add security control to the software, hardware and physical design of embedded products, to ensure that the products are not subject to external malicious attacks, the ARM (Advanced Reduced Instruction Set Computing Machines) provides different working modes, including: normal mode ( normal world) and safe mode (secureworld). Under the normal world, a normal operating system (for example: Android system) can be run, and under the secureworld, system programs related to data security can be maintained. Trustonic provides a TEE (Trusted Execution Environments, Trusted Execution Environment) solution for ARM's secure world: t-base solution. [0003] t-base can be considered as a simple operating system running under ARM secure world. The system can be divided into two layers, the trusted application...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F13/42
CPCG06F13/42
Inventor 吴东南
Owner MEIZU TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products