Method, device and equipment for credibly executing environmental safety authentication

A technology of execution environment and security authentication, applied in the field of network information security and computer, it can solve problems such as hindering the normal information acquisition of components

Active Publication Date: 2017-05-31
BEIJING BANGCLE TECH CO LTD
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the development of computer systems, this absolute isolation may hinder normal information acquisition between components. For example, under certain conditions, components outside the isolation area should be allowed to access some components in the isolation area.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and equipment for credibly executing environmental safety authentication
  • Method, device and equipment for credibly executing environmental safety authentication
  • Method, device and equipment for credibly executing environmental safety authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for ease of description, only parts related to the invention are shown in the drawings.

[0022] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0023] Please refer to figure 1 , which shows an exemplary system architecture to which the embodiments of the present application can be applied.

[0024] Such as figure 1 As shown, the system architecture may include an external access module 102 , an authentication center 101 , and a protecte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, a device and equipment for credibly executing environmental safety authentication. The method comprises the following steps: receiving an access request from an external access module, wherein access operation content is contained in the access request; acquiring an identity of the external access module; sending the acquired identity of the external access module to an authentication center and authenticating the identity of the external access module; if passing the identity authentication, judging the access type from the access operation content; sending the access type to the authentication center and authenticating the authority of the external access module; and if passing the authority authentication, allowing to execute the access operation content. The invention provides a more flexible TEE safety authentication method which can meet various information authentication requirements of the computer development at present.

Description

technical field [0001] The present disclosure generally relates to the field of computer technology, specifically to the field of network information security, and in particular to a trusted execution environment security authentication method and device. Background technique [0002] Trusted Execution Environment (TEE) is to isolate highly security-sensitive applications from the general software environment, and securely provide the ability to access hardware resources (such as secure storage, secure display, and user interface, etc.). TEE provides security support for terminal products and can accelerate the development of mobile commerce. [0003] The current TEE basically isolates highly security-sensitive applications from the general software environment through hardware physical isolation. Components outside the enclave are not allowed to access protected applications inside the enclave. However, with the development of computer systems, this absolute isolation may...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6218G06F2221/2141
Inventor 阚志刚卢佐华吕文昊刘乐光陈彪彭建芬
Owner BEIJING BANGCLE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products