Virtualization of execution environment, method and device for accessing virtual execution environment

An execution environment and virtualization technology, applied in the field of virtualization, can solve problems such as loss, and achieve the effect of ensuring security, ensuring data security, and avoiding illegal modifications

Active Publication Date: 2020-07-28
HUAWEI TECH CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Obviously, this completely loses the essential function of Trusted Execution Environment to provide a secure execution environment for secure applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtualization of execution environment, method and device for accessing virtual execution environment
  • Virtualization of execution environment, method and device for accessing virtual execution environment
  • Virtualization of execution environment, method and device for accessing virtual execution environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to enable those skilled in the art to better understand the solution of the present invention, the embodiments of the present invention will be further described in detail below with reference to the accompanying drawings and the implementation manner.

[0051] The mobile terminal has a trusted execution environment and a common execution environment provided by hardware. In order to ensure the data security of the user's security applications, the security applications with higher data security requirements are run separately in the trusted execution environment, and the common execution environment is used. The application runs in a normal execution environment isolated from the trusted execution environment. However, since the current mobile terminal hardware can only provide a trusted execution environment for multiple virtual machines configured, all virtual machine users on the mobile terminal have to share the same trusted execution environment for runnin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a virtualization method of an execution environment, the method is applied to a mobile terminal, and the mobile terminal has a common execution environment provided by hardware; a common virtual machine and a trusted virtual machine are established for users in the common execution environment , the ordinary virtual machine is used to execute the user's ordinary application, and the trusted virtual machine is used to execute the user's security application; performing memory allocation for the ordinary virtual machine and the trusted virtual machine, and Establishing a mapping relationship between common memory and physical memory of the common virtual machine to obtain a first memory mapping table; establishing a mapping relationship between virtual physical memory and physical memory of the trusted virtual machine to obtain a second memory mapping table. The present invention utilizes two virtual machines to simulate a common execution environment and a trusted execution environment for users, so that common applications and safe applications run in independent execution environments, so that the execution environments of safe applications and common applications are isolated, and user data security is ensured.

Description

technical field [0001] The present invention relates to the field of virtualization technology, in particular to a virtualization of an execution environment, and a method and device for accessing the virtual execution environment. Background technique [0002] With the increasing popularity of mobile terminals, more and more data closely related to user privacy are stored in them, which also makes people pay more and more attention to the security of mobile terminals. An existing mainstream security solution is to use the trusted execution environment provided by the hardware to isolate the security applications running in the mobile terminal from the ordinary applications, that is, the security applications run in the trusted execution environment provided by the hardware of the mobile terminal, while the ordinary applications Then it runs in a common execution environment provided by the hardware of the mobile terminal. Hardware-level isolation can effectively ensure tha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F12/14G06F9/455G06F21/62
CPCG06F9/45558G06F12/1483G06F21/629G06F2212/1052G06F2221/2141G06F2009/45583G06F2009/45579G06F12/109G06F12/1433G06F12/1441G06F12/1491G06F2212/151G06F2212/656G06F2212/657G06F21/53G06F2009/45587G06F9/4812G06F9/5077G06F2009/45595
Inventor 华志超夏虞斌陈海波
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products