Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Data interaction method and system based on dual-system shared memory

A shared memory and data interaction technology, applied in the field of data interaction to ensure orderliness, prevent data leakage, and ensure security.

Active Publication Date: 2019-05-21
XIAMEN YAXON NETWORKS CO LTD
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The technical problem to be solved by the present invention is: to provide a method that can simultaneously solve the problems of data protection and system coordination for dual systems using shared memory for data communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data interaction method and system based on dual-system shared memory
  • Data interaction method and system based on dual-system shared memory
  • Data interaction method and system based on dual-system shared memory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0100] Please refer to figure 2 and image 3 , this embodiment provides a data interaction method based on the shared memory of the dual systems, which solves the problem of how to coordinate the dual systems and protect data in the shared memory by using the shared memory for communication between the two systems. This embodiment can not only effectively prevent other client programs from reading data in the shared memory, but also coordinate multiple clients and two operating systems to perform orderly operations on shared memory processes.

[0101] This embodiment is based on figure 2 The data communication model of the two systems shown is realized. Call the server system call interface (GPTEE Internal API) through the server program of the security operating system, call the client system call interface (GPTEE Client API) through the client program of the ordinary operating system, and pass the underlying ordinary communication driver of the ordinary operating system ...

Embodiment 2

[0133] This embodiment provides a specific application scenario corresponding to Embodiment 1. The application scenario is that the client A requests the server A to encrypt data.

[0134] Specifically, the following steps may be included:

[0135] 1. Client A enters the doscom-driver area through the GPTEE Client API interface (assuming that the shared memory is idle at this time);

[0136] 2. Client A obtains the exclusive right to shared memory;

[0137] 3. Client A clears the shared memory data;

[0138] 4. Client A encapsulates the data that needs to be sent to server A, and copies the encapsulated data to the shared memory area;

[0139] 5. Client A generates a fast interrupt FIQ-129 (the processor will automatically switch to the safe operating system for operation), and then enters dormancy and waits;

[0140] 6. The safe operating system enters the FIQ-129 fast interrupt service program, and the interrupt service program notifies the tee-driver to read the shared m...

Embodiment 3

[0152] see Figure 5 , this embodiment corresponds to Embodiment 1, and provides a data interaction system based on dual-system shared memory, including:

[0153] The preset module 1 is used to preset a fast interrupt corresponding to a safe operating system, and a common interrupt corresponding to a common operating system;

[0154] In a specific embodiment, the preset module is specifically used to preset a fast interrupt and its corresponding fast interrupt processing program, a normal interrupt and its corresponding normal interrupt processing program, and the fast interrupt processing program is located in the security In the underlying security communication driver of the operating system, the common interrupt handler is located in the underlying common communication driver of the common operating system;

[0155] The obtaining module 2 is used for a client in the common operating system to obtain the exclusive right of the shared memory in the non-use state;

[0156] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data interaction method and system based on a dual-system shared memory. The method comprises the steps that a client in a common operating system obtains the exclusive rightof the shared memory; copying data to be sent to a server in the secure operating system to a shared memory, and triggering quick interruption; switching the processor to a secure operating system; reading the data in the shared memory, and sending the data to a server; copying feedback data obtained after the server performs corresponding processing on the data to a shared memory, and triggeringcommon interruption; switching the processor to a common operating system; reading feedback data in the shared memory, and sending the feedback data to the client; and the common operating system clears the data in the shared memory and releases the exclusive right. According to the method, conflicts caused by the fact that a plurality of client programs access the shared memory at the same time can be solved, and access orderliness is guaranteed; and the shared memory data can be prevented from being acquired by other client programs, so that the security of the data in the shared memory in the dual systems is ensured.

Description

technical field [0001] The invention relates to the field of data interaction, in particular to a data interaction method and system based on dual-system shared memory. Background technique [0002] Trustzone technology is a security extension function of the ARM processor. This technology can divide the processor core into two virtual cores: one is a security virtual core and the other is a normal virtual core; at the same time, it can divide the devices on the processor into Two states: safe state device and non-safe state device. An operating system can run on each of the two virtual cores. An operating system running under a secure virtual core is called a secure operating system, and an operating system running on a non-secure virtual core is called a normal operating system. Ordinary operating systems are rich in content and can run many applications, such as linux or Android systems. The secure operating system can access all resources on the processor, while the o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/54G06F9/48
CPCY02D10/00
Inventor 刘炯钟赵国开牛方超黄运峰涂岩恺
Owner XIAMEN YAXON NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products