Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Android integrity verification method and device based on trusted execution environment

A technology for integrity verification and execution environment, applied in the field of trusted computing of mobile terminals, it can solve the problems of inability to widely popularize applications, rough security of rights management, etc., and achieve the effect of avoiding attacks and facilitating popularization and application.

Active Publication Date: 2020-12-04
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method makes full use of the principle of TPM integrity verification, and overcomes the shortcomings of the existing Android platform, such as rough permission management and security that cannot meet user needs.
However, this method relies on the TPM hardware module and cannot be widely applied to existing devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android integrity verification method and device based on trusted execution environment
  • Android integrity verification method and device based on trusted execution environment
  • Android integrity verification method and device based on trusted execution environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0046] This embodiment provides a method for detecting abuse of Android application rights based on process communication, including the following steps:

[0047] S1. With the support of the TrustZone trusted platform, develop trusted software based on the T6 security system to simulate the PCR and NV registers of the hardware TPM chip. Among them, the T6 security system refers to the operating system and Trusted Execution Environment (TEE) platform independently developed by the core team of Pingbo Information Technology, which is designed for security. By using the chip-level isolation technology ARM TrustZone and the most The advanced protection mechanism effectively prevents the leakage of sensitive information, and ensures the security of the operating system itself and the applications, biometrics, passwords, files, etc. carried...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an Android integrity verification method and device based on a trusted execution environment. The method comprises the steps that under the support of a TrustZone trusted platform, a secure operating system based on the trusted execution environment is adopted to develop trusted software used for simulating a PCR and an NV register of a hardware TPM chip; when the secure operating system is loaded with an Android system kernel, the integrity of the Android system kernel is verified by use of the NV register simulated through the software; and the integrity of an application layer of an Android system is verified by use of the PCR and the NV register simulated through the software and based on an IMA integrity verification framework. According to the Android integrity verification method and device, the TrustZone trusted environment is utilized, hardware equipment is simulated through a software mode, an IMA integrity verification scheme which is only suitable for a PC terminal originally is applied to a mobile terminal, and the situation that mobile platform integrity verification is relatively hysteretic and weak in development can be relieved.

Description

technical field [0001] The invention relates to the technical field of mobile terminal trusted computing, mainly relates to the integrity verification of the Android platform, and more specifically relates to a method and device for the integrity verification of the system layer and the application layer of the Android platform based on the TrustZone trusted execution environment. Background technique [0002] In recent years, with the development of science and technology, the number of users of mobile smart phones has increased day by day, and its application fields have also continued to expand. People are more and more inclined to use mobile devices to obtain information and handle various affairs, such as using mobile phones to check emails, Online shopping, mobile bank transfer, etc. With the continuous expansion of the application field of smart phones, the security problems caused by them can no longer be ignored, and mobile phone security has become a major issue. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/44G06F21/60G06F21/62
CPCG06F21/44G06F21/602G06F21/6245
Inventor 李丽颖姜舟陈坚李委周启明
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products