TrustZone-based data encryption and decryption methods and apparatuses, and terminal device

A data encryption and data decryption technology, applied in digital data protection, secure communication devices, computer security devices, etc., can solve problems such as low performance, many details, and no scalability, so as to reduce development costs, ensure safety, The effect of improving safety

Active Publication Date: 2017-08-01
北京元心君盛科技有限公司
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Common encryption schemes used in mobile terminal equipment are as follows: 1) Encrypt data through external components, such as TF (Trans-Flash) encryption cards, etc., which have high security, but low performance, and basically No scalability; 2) Encrypt data through the built-in encryption engine, which is generally integrated in SoC (System on Chip, system on chip), its security depends on the access control mechanism of the system, and its performance is high, but using There are many details that need to be understood, and there is basically no scalability; 3) The data is encrypted through a soft encryption library, which is based on a general-purpose CPU for calculation, with a friendly interface and high computing performance. mostly in user space, so the system kernel is usually not available

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • TrustZone-based data encryption and decryption methods and apparatuses, and terminal device
  • TrustZone-based data encryption and decryption methods and apparatuses, and terminal device
  • TrustZone-based data encryption and decryption methods and apparatuses, and terminal device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete and fully convey the concept of example embodiments to those skilled in the art. The drawings are merely schematic illustrations of the invention and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus repeated descriptions thereof will be omitted.

[0042] Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided in order to give a thorough understanding of embodiments of the invention. However, those skilled in the art will appreciate...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses TrustZone-based data encryption and decryption methods and apparatuses, and a terminal device. The encryption method comprises the steps of sending a data encryption request to a trusted application in a trusted execution environment through a client interface between a general execution environment and the trusted execution environment, wherein the data encryption request comprises a class key and to-be-encrypted data; decrypting the class key according to a main key pre-stored in the trusted execution environment by the trusted application; encrypting the to-be-encrypted data according to the decrypted class key by the trusted application; and returning the encrypted to-be-encrypted data to the general execution environment through the client interface by the trusted application. The encryption method has high security performance and expandability.

Description

technical field [0001] The present invention relates to the technical field of mobile terminal equipment security, in particular, to a TrustZone-based data encryption and decryption method, device and terminal equipment. Background technique [0002] With the popularization of mobile terminal devices (such as smart phones, tablet computers, etc.), various application programs for mobile terminal devices have been born. In various applications, there are usually a large number of small pieces of sensitive data that need proper persistent protection, and encryption is the most common means of data protection. [0003] Common encryption schemes used in mobile terminal equipment are as follows: 1) Encrypt data through external components, such as TF (Trans-Flash) encryption cards, etc., which have high security, but low performance, and basically No scalability; 2) Encrypt data through the built-in encryption engine, which is generally integrated in SoC (System on Chip, system ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60H04L9/08
CPCG06F21/602H04L9/0877H04L9/0897
Inventor 孙国峰
Owner 北京元心君盛科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products