Trusted execution environment activation method and device
An execution environment and rich execution environment technology, applied in the electronic field, can solve problems such as activation code damage, inability to realize online activation of production equipment, and inability to use production software.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0095] In order to make the above objects, features and advantages of the present application more obvious and comprehensible, the present application will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.
[0096] refer to figure 1 , shows a flow chart of the steps of Embodiment 1 of a method for activating a trusted execution environment of the present application, wherein the trusted execution environment is configured in a device, and the device is further configured with a The trusted application program of the environment, the rich execution environment, and the client program running in the rich execution environment; the method may specifically include the following steps:
[0097] Step 101, the trusted execution environment obtains the activation file sent by the client program and preset on the device;
[0098] Trusted Execution Environment TEE (Trusted Execution Environment) and Rich Execution En...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com