Build trusted applications common to multiple applications
A credible and application-unit technology, applied in wireless communication and key distribution, can solve problems such as business security threats, low standardization of TEE, high cost of construction, development, debugging and maintenance, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0046] In order to illustrate the technical solution provided by the present application more clearly, several application environments related to the terminal in the embodiments of the present application are briefly introduced first.
[0047] Such as figure 1 As shown in FIG. 2 , it is a schematic diagram of a terminal including multiple application environments in the prior art. The terminal includes three application environments of REE, TEE and SE.
[0048] Among them, REE includes a general operating system running on a general-purpose embedded processor, such as Rich OS (RichOperating System) or kernel, and the CA ( figure 1 CA1 and CA2 are shown). Although many security measures have been taken in REE, such as device access control, device data encryption mechanism, application runtime isolation mechanism, permission-based access control, etc., the security of important data in the application cannot be guaranteed.
[0049] Among them, the TEE is an independent oper...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


