System configuration attribute proving method and system based on trusted execution environment
An execution environment and system configuration technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve the problems of being unable to interfere with the fingerprint identification process and results, and unable to obtain any fingerprint information, achieving a high degree of realizability and security The effect of ensuring reliability, ensuring privacy, and protecting privacy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0050] The specific implementation of the present invention will be described below by taking the trusted execution environment technology based on ARM TrustZone technology (ARM processor and bus security extension technology) to realize the distribution and use of data configured with privacy protection on the smart mobile terminal as an example.
[0051] 1. The smart mobile terminal divides security areas and non-security areas based on ARM TrustZone technology.
[0052] By configuring TZASC (TrustZone Address Space Controller) and other controllers in the TrustZone technology, the memory and peripherals of the smart mobile terminal are divided into a safe world (a safe world is a technical term for TrustZone, corresponding to the above-mentioned safe area) and a normal world ( The normal world is the technical term of TrustZone, which corresponds to the non-secure zone above); among them, the secure world only needs a small amount of memory to mainly deploy the cryptography ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
