Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Smart mobile terminal trust chain security transfer method and system based on trustzone

A smart mobile terminal and delivery system technology, applied in the field of information security, can solve problems such as unestablished and unable to ensure the security of the startup process of smart mobile terminals

Active Publication Date: 2020-02-18
NO 709 RES INST OF CHINA SHIPBUILDING IND CORP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The chain of trust should be able to resist software attacks and hardware attacks. At present, smart mobile terminals based on TrustZone only realize the boot loading process from the security environment to the normal environment, and have not established complete trust of Bootloader1→Bootloader2→OS1→APP1 / Bootloader3→OS2→APP2 Chain, unable to ensure the security of the smart mobile terminal startup process, and resist software attacks and hardware attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Smart mobile terminal trust chain security transfer method and system based on trustzone
  • Smart mobile terminal trust chain security transfer method and system based on trustzone
  • Smart mobile terminal trust chain security transfer method and system based on trustzone

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention and are not intended to limit the invention.

[0028] OTP (One Time Programming) is a special register inside FLASH. The OTP register can only be programmed once, and it can no longer be modified after programming. The OTP register is similar to the FLASH data area, 1 can be rewritten to 0, but 0 cannot be written to 1.

[0029] The present invention utilizes this feature of the OTP register to provide a TrustZone-based intelligent mobile terminal trust chain security transfer method, such as figure 1 and figure 2 As shown, the described TrustZone-based intelligent mobile terminal trust chain security delivery method comprises t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a TrustZone-based intelligent mobile terminal trust chain security transfer method and system, which uses a trusted third-party TTP to interact with Bootloader1, Bootloader2, OS1, APP1, Bootloader3, OS2, and APP2 to perform security boot preprocessing respectively, and obtain public key hash value; and store the public key hash value in the OTP area respectively; finally, the public key provided by the latter program is authenticated by the earlier program through the public key hash value of the latter program in sequence according to the startup sequence. Started through security certification, a trust chain security transfer process from the security environment to the normal environment has been established. According to OTP’s one-time programmable characteristics, the hash value of the public key is stored in the OTP area to ensure the uniqueness of the public key, thus ensuring It ensures the security of the startup process of the smart mobile terminal, and can resist software attacks and hardware attacks.

Description

technical field [0001] The invention relates to the field of information security, in particular to a TrustZone-based intelligent mobile terminal trust chain security transmission method and system. Background technique [0002] With the development of mobile Internet and smart mobile terminals, the ability of mobile terminals to obtain and process information has been greatly improved, and some data services that could only be processed by personal computers have gradually been transferred to mobile terminals, which makes more and more mobile terminals. Handle personal data and sensitive information with care. Therefore, it is necessary to provide security protection means for smart mobile terminals, so as to deal with the security problems brought by the openness of mobile Internet and the complexity of smart operating systems to smart mobile terminals. [0003] ARM has launched TrustZone, which is a security method implemented at all levels within the computer system, ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/64G06F21/62G06F21/71
CPCG06F21/6281G06F21/645G06F21/71
Inventor 徐明迪沈楚楚任正伟童言高杨高雪原
Owner NO 709 RES INST OF CHINA SHIPBUILDING IND CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products