Trusted booting method based on TrustZone system

A credible, operating system technology, applied in the field of information security, can solve problems such as cost increase and the risk of being cracked, and achieve the effects of reducing difficulty and product cost, reducing the risk of cracking, and preventing tampering or replacement

Inactive Publication Date: 2018-07-17
XIAMEN YAXON NETWORKS CO LTD
View PDF5 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, the trusted chip or trusted computing module brings about an increase in cost. On the other hand, because it exi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted booting method based on TrustZone system
  • Trusted booting method based on TrustZone system
  • Trusted booting method based on TrustZone system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] To further illustrate the various embodiments, the present invention is provided with accompanying drawings. These drawings are a part of the disclosure of the present invention, which are mainly used to illustrate the embodiments, and can be combined with related descriptions in the specification to explain the operating principles of the embodiments. With reference to these contents, those skilled in the art should understand other possible implementations and advantages of the present invention. Components in the figures are not drawn to scale, and similar component symbols are generally used to denote similar components.

[0036] The present invention will be further described in conjunction with the accompanying drawings and specific embodiments.

[0037] The trusted startup method of the system based on TrustZone of the present invention can be applied to various systems with TrustZone technology, such as mobile terminal systems, computer systems, vehicle-mounted...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a trusted booting method based on a TrustZone system. The system is based on a system supporting a TrustZone technology, equipment of the system at least comprises memorizers,and the memorizers at least comprise an ROM and an RAM located in a security domain and a memorizer located in a generic domain. The method comprises the steps that S1, the system is started; S2, an ROM loading program located in the ROM is started; S3, loading verification is conducted on a bootstrap program of an operating system by the ROM loading program, and if the verification is passed, thebootstrap program of the operating system is started; S4, loading verification is conducted on a kernel program of the operating system by the bootstrap program of the operating system, and if the verification is passed, the kernel program of the operating system is started. According to the method, the trusted booted process of the system is deployed by using hardware technology characteristicsof a system on chip (SOC) of ARM, no additional trusted chip or trusted calculation module is needed, and cracked risks are reduced; the difficulty of circuit designing and the product cost are reduced.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a TrustZone-based system trusted startup method. Background technique [0002] In today's information age, protecting information security and providing a reliable computing environment has become an inevitable requirement of informatization. With the rapid evolution of malware, malware is using the underlying firmware and startup programs as the preferred attack targets. It is difficult to defend against viruses that attack the underlying firmware and startup programs. Therefore, it is particularly important to protect the credibility and security of the system startup process. [0003] Existing trusted boot technologies are basically based on an external trusted chip or trusted computing module to arm the entire trusted boot process. For example, the Chinese patent "Operating System Safe Startup Method and Device" with publication number CN 103927490 A...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57
CPCG06F21/575
Inventor 赵国开刘炯钟涂岩恺池炜宾
Owner XIAMEN YAXON NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products