Supercharge Your Innovation With Domain-Expert AI Agents!

A management method and terminal for offline management instructions

A technology of management instructions and management methods, which is applied in the field of security management and can solve problems such as not having the ability to identify offline management instructions

Active Publication Date: 2020-10-09
HUAWEI TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In other words, TEE has the ability to verify the legality of offline management instructions and execute legal offline management instructions, but it does not have the ability to identify whether the use of offline management instructions is legal.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A management method and terminal for offline management instructions
  • A management method and terminal for offline management instructions
  • A management method and terminal for offline management instructions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] In the embodiment of the present invention, the terminal includes two coexisting operating environments: REE and TEE. The client application (client application, CA) runs in the REE, and the TA runs in the TEE. TEE is an operating environment with specific security functions relative to REE. The TEE is a security area that exists in the terminal and is separated from the REE. The specific implementation can be a security mode of the main processor, or an auxiliary processor isolated from the main processor. TEE is separated from REE and CA in REE to ensure that various sensitive data are stored, processed and protected in a trusted environment. TEE provides a secure execution environment for TA, including integrity verification during execution, secure communication with CA in REE, trusted storage, input and output with external secure terminals, key and encryption algorithm management, time management, etc. .

[0062] Under the TMF, in order to ensure the security o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide a method for managing offline management instructions and a terminal. The management method includes: the TEE of the terminal receives the offline management instruction sent by the REE of the terminal, the offline management instruction includes offline management parameters, and the offline management parameters include a usage time threshold And or at least one of the use times threshold; TEE executes the offline management operation corresponding to the offline management instruction, and generates an offline management strategy according to the offline management parameters; when the usage status of the security domain SD or the trusted application TA does not meet the offline management strategy , the TEE deletes the SD or TA, or the TEE restores the SD or TA to the state before the update; wherein, the SD or TA is installed or updated offline by the TEE according to the offline management instruction. Based on the offline management strategy, the terminal judges whether the offline management of SD or TA by REE meets the situation of malicious occupation of TEE resources, so that the TEE of the terminal has active defense capabilities.

Description

technical field [0001] The invention relates to the field of security management, in particular to a management method and terminal for offline management instructions. Background technique [0002] With the development of electronic products and the user's demand for data security, with the support of hardware, many terminals can have two execution environments at the same time, one is the common execution environment, or called the rich execution environment (rich execution environment, REE), general execution environment generally refers to the operating environment without specific security functions; the other is the trusted execution environment (trusted execution environment, TEE), TEE has security functions, can meet certain security needs of users, and can realize the same time as REE operating mechanism in isolation. [0003] Under the TEE management framework (TEE management framework, TMF), the international platform organization (GlobalPlatform, GP) has issued ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/57
CPCH04L63/1441H04L63/123H04L63/0807G06F21/577H04W8/22G06F21/53G06F2221/2149G06F21/55H04L9/40
Inventor 王思善孙赫佩卡·莱蒂宁常新苗
Owner HUAWEI TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More