Unlock instant, AI-driven research and patent intelligence for your innovation.

Trusted execution environment security storage security testing method and device

A technology for security testing and execution environment, applied in software testing/debugging and other directions, which can solve the problem of inability to effectively detect the security technical requirements of security storage functions

Active Publication Date: 2022-05-31
CHINA ACADEMY OF INFORMATION & COMM
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the current problem of being unable to effectively detect whether the secure storage function satisfies relevant security technical requirements, an embodiment of the present invention provides a trusted execution environment secure storage security testing method, the method comprising:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted execution environment security storage security testing method and device
  • Trusted execution environment security storage security testing method and device
  • Trusted execution environment security storage security testing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Embodiments of the present invention provide a trusted execution environment security storage security testing method and device.

[0059] According to the requirements in the industry standard, the safe storage of TEE products should meet the following security requirements: 1) Confidentiality, i.e.

[0064] Specifically, the test logic and steps required for different security technologies in the Test CA are as follows.

[0070] c.Test CA calls the function of Test TA to read the data in the file f1, and is marked as m2; if m2! =m1, then the TEE is

[0075] The safety storage integrity test process is shown in accompanying drawing 4.

[0079] c.Test CA calls the function of Test TA to read the data in the file f1, denoted as m2; if m2! =m1, then the TEE is

[0086] The process of the security storage anti-rollback test is shown in FIG. 5 .

[0090] c.Test CA calls the function of Test TA to read the data in the file f1, and is marked as m2; if m2! =m1, then the TEE is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a trusted execution environment security storage security testing method and device. The method includes: receiving a test instruction; performing a corresponding test on the trusted execution environment according to the type of the test instruction, and generating a corresponding test result; obtaining a safety test result according to the test result. The present invention provides an implementable penetration test for the safe storage security test of TEE products, and provides the test case operation logic and steps, which can effectively determine the tested product according to the test case operation results by installing and running the test case in the TEE product Security implemented by secure storage.

Description

Trusted execution environment security storage security testing method and device technical field The present invention relates to the technical field of trusted execution environment security storage security testing, especially a kind of trusted execution environment Safe storage safety testing method and device. Background technique [0002] With the rapid development of the mobile Internet, mobile intelligent terminal devices such as mobile phones, wearable devices, etc. are rapidly popularized, It undertakes more and more sensitive functions related to the vital interests of users, such as financial payment, work social networking, health monitoring, etc. Its security also faces unprecedented challenges. Mobile intelligent terminal security incidents emerge in an endless stream, malicious applications are rampant, Security problems such as personal privacy theft and tariff consumption occur from time to time, and ordinary mobile intelligent terminal systems can n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/36
Inventor 路晔绵詹鹏翼魏凡星李煜光国炜潘娟
Owner CHINA ACADEMY OF INFORMATION & COMM