Supercharge Your Innovation With Domain-Expert AI Agents!

Credible display architecture based on hardware isolation technology, system-on-chip and method

A hardware isolation and display method technology, applied in the direction of internal/peripheral computer component protection, platform integrity maintenance, etc., can solve problems affecting user experience, insufficient support for business scenarios, and inability to obtain display content in a trusted display environment, etc., to achieve The effect of improving user experience

Active Publication Date: 2020-01-14
无锡融卡科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, due to the system isolation characteristics of this method of implementing a secure interactive interface, the software in the common operating system cannot obtain the display content in the trusted display environment to achieve the purpose of protection.
However, common operating systems and trusted operating systems share the display output unit, and can only meet the display requirements of one system at the same time, and cannot achieve simultaneous display, which is not enough to support richer business scenarios such as trusted message notifications, such as when playing games Trusted notification messages cannot be displayed at the same time
In addition, because the trusted operating system has a high priority and occupies the display output unit by preempting, the ordinary operating system can continue to display only after the trusted operating system completes the display task, and the trusted operating system will interrupt the display of the ordinary operating system. affect user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credible display architecture based on hardware isolation technology, system-on-chip and method
  • Credible display architecture based on hardware isolation technology, system-on-chip and method
  • Credible display architecture based on hardware isolation technology, system-on-chip and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0071] A trusted display architecture based on hardware isolation technology, including common operating environment and trusted operating environment;

[0072] An ordinary operating system is deployed in the ordinary operating environment, the ordinary operating system includes ordinary display components, and the ordinary operating system runs ordinary applications;

[0073] The trusted operating environment deploys a trusted operating system, the trusted operating system includes a trusted display component, and the trusted operating system runs trusted applications;

[0074] The normal display component drives a normal display input unit and a normal display output unit, and the trusted display component drives a trusted display input unit and a trusted display output unit;

[0075] Alternatively, the ordinary display component drives the common display input unit, and the trusted display component drives the trusted display input unit and the display output unit.

[0076...

Embodiment 2

[0082] Embodiment 2 On the basis of Embodiment 1, it provides an implementation method of a completely dedicated display output unit for common display components and trusted display components, that is, each of the trusted operating system and the common operating system has a display output that can independently complete the display function. unit.

[0083] The trusted display architecture of this embodiment can be found in image 3 , the two display output units each display their corresponding data without interfering with each other. The module diagram of the system-on-chip adopting the trusted display architecture can be found in Figure 4 .

[0084] When the trusted display architecture is applied specifically, taking a mobile phone as an example, it is only necessary to add a display output unit to the mobile phone. Technically speaking, with the upgrade of mobile phone products, the CPU is upgraded to 8 cores or more, or the main frequency of a single CPU is highe...

Embodiment 3

[0097] Embodiment 3 On the basis of other embodiments, it provides the implementation of some dedicated display output units of common display components and trusted display components. Then the preprocessed data is transmitted to the display output unit, and displayed in a superimposed manner.

[0098] The trusted display architecture of this embodiment can be found in Figure 5 , generally, common display input units are configured, accessed and used by common operating systems and common applications. Trusted display input units and display output units can only be configured, accessed and used by trusted operating systems and trusted applications. The module diagram of the system-on-chip adopting the trusted display architecture can be found in Figure 6 .

[0099] In addition, this embodiment also provides a trusted display method based on hardware isolation technology, which operates under the trusted display architecture described in this embodiment. When the common ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

the invention provides a credible display architecture based on the hardware isolation technology. A common operating system is deployed in a common operating environment, the common operating systemcomprises a common display assembly, and the common operating system operates a common application; A trusted operating system is deployed in the trusted operating environment, the trusted operating system comprising a trusted display component, and the trusted operating system operating a trusted application. The common display assembly drives the common display input unit and the common displayoutput unit, and the trusted display assembly drives the trusted display input unit and the trusted display output unit. Or the common display assembly drives the common display input unit, and the trusted display assembly drives the trusted display input unit and the display output unit. The architecture is simultaneously provided with the common display channel and the trusted display channel, the common application calls the common display component to display the common interface, the trusted application calls the trusted display component to display the trusted interface, the trusted operating system display does not need to interrupt the common operating system display, the two do not interfere with each other, and the user experience is improved.

Description

technical field [0001] The invention belongs to the field of trusted display technology, and in particular relates to a trusted display architecture, an on-chip system and a method based on hardware isolation technology. Background technique [0002] With the development of Internet technology, terminal devices are becoming more and more intelligent, capable of performing various functions and accessing various Internet services. At the same time, personal information is increasingly exposed in the network environment. How to ensure that various sensitive data of users will not be stolen has attracted more and more attention, and various security technologies have also emerged. For example, based on Trusted Execution Environment (TEE), the system architecture has also evolved from a single system to a dual system, including a common operating system (Rich OS) and a trusted operating system (Trusted OS), which isolates sensitive data and operations for To achieve the purpose...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/74G06F21/57
CPCG06F21/74G06F21/57
Inventor 朱恒毅潘朝阳朱述波
Owner 无锡融卡科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More