Data processing method, device and system

A data processing system and data technology, applied in digital transmission systems, transmission systems, secure communication devices, etc., can solve the problems of comprehensive data leakage, data theft, singleness, etc., and achieve the effect of reducing risks

Active Publication Date: 2019-09-24
JUZIX TECH SHENZHEN CO LTD
View PDF11 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, due to the inherent defects in CPU architecture design, security processing such as blockchain, AI, and big data processing all rely on the Trusted Execution Environment (TEE) that comes with the CPU, but TEE technology only uses a single built-in private key, once the key is stolen, the data will face the risk of total theft
For example, exploiting security vulnerabilities such as Spectre / Meltdown / Foreshadow in the CPU can steal data, and even steal the root key (PRIVATE KEY) of the TEE, leading to the risk of comprehensive data leakage, and it is currently impossible to solve the above problems through simple software patches

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method, device and system
  • Data processing method, device and system
  • Data processing method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043]In order to enable those skilled in the art to better understand the technical solutions in this specification, the technical solutions in one or more embodiments of this specification will be clearly and completely described below in conjunction with the drawings in one or more embodiments of this specification Obviously, the described embodiments are only some of the embodiments in the description, not all of them. Based on one or more embodiments in the description, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the embodiments of the description.

[0044] The trusted execution environment (TEE) hardware security environment technology in the CPU of the terminal device has been more and more applied to the production environment. Due to the inherent flaws in CPU architecture design, security processes such as blockchain, AI, and big data processing all rely on the Trusted...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a data processing method, device and system. The system comprises a key generation server, a terminal device and a data providing server, and a TEE and a security module are arranged in the terminal device. The data providing server encrypts the data based on a public key, and the public key is pre-generated by a key generation server. The TEE receives the data encrypted based on the public key and initiates secure multi-party calculation. The TEE and security module performs secure multi-party calculation by using a first private key component stored in the TEE and a second private key component stored in the security module in a joint manner to obtain a private key, and the first private key component and the second private key component are obtained by splitting the TEE after the TEE receives the private key sent by the key generation server. The TEE decrypts the encrypted data by using a private key obtained by secure multi-party calculation. By means of the embodiments of the present specification, the security of TEE hardware data processing can be enhanced.

Description

technical field [0001] The present invention relates to the technical field of computer data processing, in particular to a data processing method, device and system for enhancing the security of a trusted execution environment. Background technique [0002] The trusted execution environment (Trusted Execution Environment, TEE) hardware security environment technology in the CPU of the terminal device has been more and more applied to the production environment. At present, due to the inherent defects in CPU architecture design, security processing such as blockchain, AI, and big data processing all rely on the Trusted Execution Environment (TEE) that comes with the CPU, but TEE technology only uses a single built-in private Once the key is stolen, the data will face the risk of total theft. For example, exploiting security vulnerabilities such as Spectre / Meltdown / Foreshadow in the CPU can steal data, and even steal the root key (PRIVATE KEY) of the TEE, leading to the risk...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0863H04L9/0819H04L9/0894
Inventor 唐虹刚李升林孙立林
Owner JUZIX TECH SHENZHEN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products