Method and system for protecting safety of dual-system shared memory data
A shared memory and data security technology, applied in the field of data interaction, can solve problems such as data leakage and lack of data security, and achieve the effect of protecting security and preventing data leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0087] Example one
[0088] Please refer to figure 2 with image 3 This embodiment provides a method for protecting the data security of the dual-system shared memory, which can effectively prevent other client programs from reading the data in the shared memory, thereby ensuring the security of the data in the shared memory during the communication process.
[0089] This embodiment is based on figure 2 The data communication model of the dual system shown is realized. The server system call interface (GPTEE Internel API) is called by the server program of the security operating system, and the client program of the common operating system calls the client system call interface (GPTEE Client API), and the underlying common communication driver ( Doscom-driver) and the underlying secure communication driver (tee-driver) of the secure operating system for data communication.
[0090] The shared memory in this embodiment physically reflects a contiguous physical memory area, and the ...
Example Embodiment
[0114] Example two
[0115] This embodiment provides a specific application scenario based on the first embodiment, in which the client A requests the server A to encrypt data.
[0116] Specifically, the following steps may be included:
[0117] 1. Client A enters the doscom-driver area through the GPTEE Client API interface (assuming that the shared memory is idle at this time);
[0118] 2. Client A obtains the exclusive right of shared memory;
[0119] 3. Client A clears shared memory data;
[0120] 4. Client A encapsulates the data that needs to be sent to server A, and copies the encapsulated data to the shared memory area;
[0121] 5. The processor switches to the secure operating system to run, and the client enters sleep and waits;
[0122] 6. The secure operating system informs tee-driver to read shared memory data;
[0123] 7. tee-driver reads the shared memory data and parses the data;
[0124] 8. tee-driver sends the parsed data to server A;
[0125] 9. After server A receives the ...
Example Embodiment
[0132] Example three
[0133] This embodiment is further expanded on the basis of the first embodiment, and provides a data interaction method based on dual-system shared memory, which solves the problem of how to coordinate the dual-system and protect the data in the shared memory by using shared memory for communication between dual systems. This embodiment can effectively prevent other client programs from reading data in the shared memory, and can coordinate multiple clients and two operating systems to perform orderly operations on the shared memory process.
[0134] This embodiment is also based on figure 2 The data communication model of the dual system shown is realized.
[0135] Combine at the same time image 3 , The specific data exchange process is as follows:
[0136] S1: Preset a fast interrupt and its corresponding fast interrupt handler, an ordinary interrupt and its corresponding ordinary interrupt handler, the fast interrupt handler is located in the underlying secu...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap