A method for protecting the interaction integrity and confidentiality of a trusted application and a common application

A common application and integrity technology, applied in the field of protecting the interactive integrity and confidentiality of trusted applications and common applications, can solve problems such as direct attacks without consideration

Active Publication Date: 2019-04-02
SHANGHAI TRUSTKERNEL INFORMATION TECH CO LTD
View PDF8 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since isolation technologies such as TrustZone do not provide sufficient hardware support, monitoring context switching requires complex software processes and involves modification of the rich exe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for protecting the interaction integrity and confidentiality of a trusted application and a common application
  • A method for protecting the interaction integrity and confidentiality of a trusted application and a common application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0054] The principle of the present invention is to place the kernel and the application of the rich execution environment in different virtual machines to run, and realize the transparent compatibility with the kernel and the application with the support of the virtual machine monitor and the user state library.

[0055] Concrete steps of the present invention include:

[0056] 1. When an ordinary application requests protection, the user state library ac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for protecting the interaction integrity and confidentiality of a trusted application and a common application. The method comprises the following steps: establishingmemory isolation between a kernel of a rich execution environment and an application by using a virtualization technology; by means of a virtual machine monitor and hardware virtualization support, operations of system calling, interruption and memory page swap-in and swap-out are transparently processed under the condition that a kernel and application codes are not modified; and establishing atrusted application and common application interaction library which is compatible with the original system and is not supported by the kernel drive. Compared with the prior art, the method has the advantages that multiple threads of hardware are supported, the kernel of the rich execution environment does not need to be modified, and more complete protection can be provided for common application.

Description

technical field [0001] The invention relates to the technical field of mobile platform security, in particular to a method for protecting the integrity and confidentiality of interactions between trusted applications and common applications. Background technique [0002] Trusted execution environment, especially the trusted execution environment based on TrustZone technology is gradually popularized on mobile terminals, and IntelSGX technology is gradually popularized on servers and desktop computers. Security issues that may exist on the rich execution environment side during common application interactions. [0003] The normal interaction process depends on the kernel software in the rich execution environment. A correctly implemented kernel can guarantee the security of the interaction and the isolation between multiple common applications. Therefore, the possible security problems in the rich execution environment are mainly due to the possibility of malicious kernels. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F9/455G06F21/53
CPCG06F9/45558G06F21/53G06F2009/45583
Inventor 李子男夏虞斌利文浩梁凉
Owner SHANGHAI TRUSTKERNEL INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products