Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for realizing memory database by adopting TrustZone technology

A database and memory technology, applied in digital data protection, electrical digital data processing, instruments, etc., can solve problems such as inability to ensure absolute and safe access to memory database data, speed up access and modification, simplify workflow, and reduce transplantation costs effect of difficulty

Inactive Publication Date: 2020-06-23
SHANDONG UNIV
View PDF10 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, it is still impossible to ensure that the data access of the memory database is absolutely safe, and the memory data will not be stolen or attacked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing memory database by adopting TrustZone technology
  • Method for realizing memory database by adopting TrustZone technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] Such as figure 1 with figure 2 As shown, this embodiment provides a method for implementing an in-memory database using TrustZone technology, which includes the following steps:

[0029] (1) Using TrustZone technology to divide the safe world and the ordinary world of CPU chips and memory. This step is a mature practice of TrustZone technology. It is a conventional technology. The working principle of TrustZone technology is as follows figure 1 Shown

[0030] (2) The in-memory database is installed on the hard disk as a software. The in-memory database is based on caching data in the memory for data addition, deletion, and modification. The in-memory database caches the data that the CPU chip needs to use in the safe world of the memory. Not only can speed up the access and modification of data, but more importantly, it can ensure the security of the data, which is an important function of the memory database;

[0031] (3) The database user encrypts the data that needs to b...

Embodiment 2

[0038] A method for implementing an in-memory database using TrustZone technology, the operation steps are as described in Embodiment 1, and the difference lies in: step (3), the SHA1 encryption algorithm is used for data encryption. Step (5): Use decryption software to decrypt the encrypted data in the memory database regularly according to the set time (such as 10s, 1min, etc.), and then store the decrypted data persistently to disk. The decryption software uses the memory database that comes with it. The decoding API for decoding.

Embodiment 3

[0040] A method for implementing an in-memory database using TrustZone technology, the operation steps are as described in Embodiment 1, and the difference lies in: step (3), the AES encryption algorithm is used for data encryption. In step (5), the AOF persistence method of Redis is adopted to save the command written to the memory database to realize persistence.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for realizing a memory database by adopting a TrustZone technology. The method comprises the following steps of: dividing a chip and a memory into a safe world and acommon world by adopting the TrustZone technology; the memory data is placed in the safe world, and a database user encrypts the data needing to be cached in the memory database; caching the encrypteddata into a memory database; and decrypting the encrypted data in the memory database by using decryption software, and persistently storing the decrypted data in the disk database. The TrustZone technology has the characteristics of high efficiency and low cost for solving the security problem of the memory database; some important data with large transmission quantity can be directly encryptedand stored into a memory database through a TrustZone technology, so that the data can be effectively prevented from being stolen and lost, and then the data is decrypted and persisted into a disk.

Description

Technical field [0001] The invention relates to a method for implementing a memory database using TrustZone technology, and belongs to the technical field of memory data storage. Background technique [0002] TrustZone is a hardware architecture designed by ARM for consumer electronic devices. Its purpose is to build a security framework for consumer electronic products to resist various possible attacks. [0003] TrustZone conceptually divides SoC hardware and software resources into two worlds: Secure World and Normal World. All operations that require confidentiality are performed in the secure world (such as fingerprint recognition, password processing, data encryption and decryption, Security authentication, etc.), the rest of the operations are performed in the non-secure world (such as user operating systems, various applications, etc.). The secure world and the non-secure world are converted through a mode called Monitor Mode, as attached figure 1 Shown. In terms of proces...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/6227G06F21/602
Inventor 戴鸿君李清宇
Owner SHANDONG UNIV