Active trusted computing method and active trusted computing system based on TrustZone sub-core asynchronous execution

A technology of trusted computing and asynchronous execution, applied in computing, execution paradigm, protection of internal/peripheral computer components, etc., can solve the problem of not considering trusted measurement and control issues, and achieve the effect of preventing interruptions

Active Publication Date: 2020-06-30
NAT UNIV OF DEFENSE TECH
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the basic service of TrustZone is designed with the idea of ​​passive execution, and the existing design does not consider the issue of active trustworthiness measurement and control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Active trusted computing method and active trusted computing system based on TrustZone sub-core asynchronous execution
  • Active trusted computing method and active trusted computing system based on TrustZone sub-core asynchronous execution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Such as figure 1 As shown, the implementation steps of the active trusted computing method based on TrustZone sub-core asynchronous execution in this embodiment include:

[0033] 1) Configure and start the active trusted computing service after the computer is powered on, and establish a static trusted chain between the host loading module and the host operating system through a static measurement mechanism during system startup. The active trusted computing service includes trusted computing Main body service, trusted computing proxy service and trusted computing call interface, the trusted computing main body service and trusted computing proxy service are mapped to the running environment TEE, the trusted computing calling interface and the host system are mapped to the running environment In REE, the operating environment TEE and the operating environment REE are two operating environments in which software and hardware resources are isolated from each other based o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an active trusted computing method and system based on TrustZone kernel asynchronous execution. According to the invention, the active trusted computing system is configured and started after a computer is powered on; the system comprises a trusted computing main body service, a trusted computing proxy service and a trusted computing calling interface, wherein the trusted computing main body service and the trusted computing proxy service are mapped into the TEE, the trusted computing calling interface and the host system are mapped into the REE, and the active trustedcomputing system can execute trusted computing, resource monitoring and real-time intervention according to needs. According to the invention, a new trusted computing architecture can be realized on the basis that the TrustZone basic service is passively executed; various requirements of trusted computing of active defense can be met, active trusted measurement and control problems are fully considered, active operation and resource access capacity can be provided in a simple mode, a TEE is prevented from occupying a CPU for a long time, and mechanisms such as interruption of a host system areprevented from being influenced by timeout and the like.

Description

technical field [0001] The invention relates to an active trusted computing technology in the computer field, in particular to an active trusted computing method and system based on TrustZone sub-core asynchronous execution. Background technique [0002] The basic idea of ​​trusted computing is: first build a root of trust in the computer system, root of trust is the most basic part of trusted computing, it is the part that must be given trust, and then establish a chain of trust, starting from the root of trust to From the software and hardware platform, to the operating system, and then to the application, there is a level of measurement and certification, a level of trust, and a level of trust. Finally, trust is extended to the entire computer system, thereby ensuring the credibility of the computer system. The trusted base module started with the TPM1.0 specification formulated by the Trusted Computing Platform Alliance (Trusted Computing Platform Alliance) in 2000. Tra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/74G06F9/445G06F9/448G06F9/48
CPCG06F21/57G06F21/74G06F9/44505G06F9/4482G06F9/4812
Inventor 董攀杨保绚马俊谭郁松杨增吴吉红黄辰林丁滟秦莹
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products