Unlock instant, AI-driven research and patent intelligence for your innovation.

Dual-system security chip control method, terminal, computer readable storage medium and dual-system architecture based on security chip

A technology of security chip and control method, applied in the field of electronics, can solve problems such as unsolvable, single security service, etc., and achieve the effect of ensuring safe operation

Inactive Publication Date: 2017-11-24
SHENZHEN GIONEE COMM EQUIP
View PDF3 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, external security elements such as security chips in the prior art are generally only connected to the TEE execution environment in the system layer, which cannot solve the problem that different applications need to run in different system layers, and are connected to the TEE in the system layer The use can only provide a single security service

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dual-system security chip control method, terminal, computer readable storage medium and dual-system architecture based on security chip
  • Dual-system security chip control method, terminal, computer readable storage medium and dual-system architecture based on security chip
  • Dual-system security chip control method, terminal, computer readable storage medium and dual-system architecture based on security chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0032] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0033] It should also be understood that the terminology used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a dual-system security chip control method, a terminal, a computer readable storage medium and a dual-system architecture based on a security chip. The method comprises the steps of detecting whether a security application request exists or not; if it is detected that the security application request exists, and according to preset conditions, determining an execution environment corresponding to the security application request; according to the determined execution environment corresponding to the security application request, controlling the security chip to be connected with the execution environment corresponding to the security application request so that the security chip can check whether the security application request is effective or not; if yes, starting a service corresponding to the security application request. The security chip is arranged outside dual systems of REE and TEE, the chip is connected with the dual systems of REE and TEE, the chip can be controlled to be connected with the systems of REE and TEE according to different security requirements so that different security requirements can run under the proper execution environment, and security running of the terminal is ensured.

Description

technical field [0001] The present invention relates to the field of electronic technology, in particular to a dual-system security chip control method, a terminal, a computer-readable storage medium, and a dual-system architecture based on the security chip. Background technique [0002] At present, with the rapid development of Internet technology and smart terminals, smart terminals are not only satisfied with entertainment, interaction and other functional applications in daily life, but also achieved good results in related financial applications such as mobile payment. People are increasingly inseparable from mobile phones and other terminal devices in their daily work and life. The mobile payment function of mobile phones and other terminal devices can solve the user's basic necessities of life anytime, anywhere. Among them, the most commonly used mobile payment tools are WeChat, Alipay, etc. application. However, in the process of mobile payment, applications such a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/74G06F21/53
CPCG06F21/74G06F21/53
Inventor 刘岩
Owner SHENZHEN GIONEE COMM EQUIP