Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Dual-system peripheral resource allocation method, terminal device and storage medium

A configuration method and resource configuration file technology are applied in the configuration field of dual-system peripheral resources to achieve the effect of solving security and ensuring convenience.

Active Publication Date: 2019-03-08
XIAMEN YAXON NETWORKS CO LTD
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This not only effectively solves the adverse defects caused by the isolation settings of peripheral resources, but also ensures the security of the configuration list and effectively improves the security of the system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dual-system peripheral resource allocation method, terminal device and storage medium
  • Dual-system peripheral resource allocation method, terminal device and storage medium
  • Dual-system peripheral resource allocation method, terminal device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] see Figure 1-Figure 3 As shown, the present invention provides a method for configuring peripheral resources of a dual system,

[0036] The concrete process of the method described in the present invention is as follows:

[0037] (1) Before the dual system starts, configure the peripheral resource configuration file of the MCU peripheral resource security and non-secure status, after encryption, download the ciphertext to the non-volatile memory, and burn the decryption key to the security The operating system can only be accessed on the system-on-chip SOC.

[0038] (2) The dual system is started, the safety operating system is started first, and the ciphertext of the peripheral resource configuration file is decrypted using the decryption key of the soc.

[0039] (3) Allocate a memory space used by a secure operating system, i.e. a secure storage area, which cannot be accessed by a non-secure operating system, and then store the decrypted peripheral resource configu...

Embodiment 2

[0051] The present invention also provides a dual-system peripheral resource configuration terminal device, including a memory, a processor, and a computer program stored in the memory and operable on the processor, and the processor executes the computer program When implementing the steps in the above-mentioned method embodiments of the embodiments of the present invention, for example Figure 1-Figure 3 Method steps for the steps shown.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a dual-system peripheral resource allocation method, including that following steps of S0 carrying out the peripheral resource configuration file encryption, S1using the secureoperating system to decrypt the peripheral resource configuration file, 2 storing that peripheral resource configuration file in a secure storage area, S3 parsing the peripheral resource configuration file, obtaining a list of secure peripheral resources and a list of non-secure peripheral resources, S4 storing the list of non-secure peripheral resources in the memory sharing area, storing a listof secure peripheral resource in a secure storage zone, S5 enabling the secure operating system to access the secure storage zone, reading the list of secure peripheral resources, setting a peripheral resource to a security state according to its configuration information, and loading the device driver; S6 using the secure operating system to switch to the non-secure operating system; S7 using the non-secure operating system to read the non-secure peripheral resource list; and S8 loading or not loading the device driver according to the configuration information in the non-secure peripheral resource list.

Description

technical field [0001] The invention relates to the technical field of system security, in particular to a method for configuring peripheral resources of a dual system, a terminal device and a storage medium. Background technique [0002] With the continuous development of automotive intelligent network technology, nearly a hundred types of ECUs in the car are fully monitored and controlled through the internal vehicle network. Although this greatly improves the user experience, it has become a new target for hackers, making the car’s Security risks. In addition, the inherent lack of security protection in the internal system of the car will trigger a series of car attacks, such as remote hijacking of the car, intrusion into the car control system through the cloud, etc., causing the equipment on the car to generate wrong data, misleading and interfering with the driver, thus Causing serious consequences such as traffic accidents and car theft. [0003] Therefore, there is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/74G06F9/4401
CPCG06F9/4411G06F21/74
Inventor 池炜宾赵国开刘炯钟
Owner XIAMEN YAXON NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products