Method for realizing memory database by adopting TrustZone technology
A database and memory technology, applied in digital data protection, electrical digital data processing, instruments, etc., can solve problems such as inability to ensure absolute and safe access to memory database data, speed up access and modification, simplify workflow, and reduce transplantation costs effect of difficulty
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0028] Such as figure 1 with figure 2 As shown, this embodiment provides a method for implementing an in-memory database using TrustZone technology, which includes the following steps:
[0029] (1) Using TrustZone technology to divide the safe world and the ordinary world of CPU chips and memory. This step is a mature practice of TrustZone technology. It is a conventional technology. The working principle of TrustZone technology is as follows figure 1 Shown
[0030] (2) The in-memory database is installed on the hard disk as a software. The in-memory database is based on caching data in the memory for data addition, deletion, and modification. The in-memory database caches the data that the CPU chip needs to use in the safe world of the memory. Not only can speed up the access and modification of data, but more importantly, it can ensure the security of the data, which is an important function of the memory database;
[0031] (3) The database user encrypts the data that needs to b...
Embodiment 2
[0038] A method for implementing an in-memory database using TrustZone technology, the operation steps are as described in Embodiment 1, and the difference lies in: step (3), the SHA1 encryption algorithm is used for data encryption. Step (5): Use decryption software to decrypt the encrypted data in the memory database regularly according to the set time (such as 10s, 1min, etc.), and then store the decrypted data persistently to disk. The decryption software uses the memory database that comes with it. The decoding API for decoding.
Embodiment 3
[0040] A method for implementing an in-memory database using TrustZone technology, the operation steps are as described in Embodiment 1, and the difference lies in: step (3), the AES encryption algorithm is used for data encryption. In step (5), the AOF persistence method of Redis is adopted to save the command written to the memory database to realize persistence.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

