Method for providing trusted services using trusted execution environment system

An execution environment and trusted technology, applied in the computer field, can solve problems such as services that do not mention trusted computing functions, are not, or do not mention data encapsulation and remote certification

Active Publication Date: 2020-07-07
CAPITAL NORMAL UNIVERSITY
View PDF13 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In Open-TEE, it is not a real OS and cannot provide the functions of a complete OS
In addition, in OP-TEE, the security world will verify the integrity of TA before executing it, but there is no mention of data encapsulation and remote attestation services; neither ANDIX nor Open-TEE mention trusted computing related Function
The above shortcomings directly affect the security of the TEE system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for providing trusted services using trusted execution environment system
  • Method for providing trusted services using trusted execution environment system
  • Method for providing trusted services using trusted execution environment system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Hereinafter, exemplary embodiments of the present disclosure will be described in detail with reference to the accompanying drawings so that those skilled in the art can easily realize them. Also, for clarity, parts not related to describing the exemplary embodiments are omitted in the drawings.

[0047] In the present disclosure, it should be understood that terms such as "comprising" or "having" are intended to indicate the presence of features, numbers, steps, acts, components, parts or combinations thereof disclosed in the specification, and are not intended to exclude one or a plurality of other features, numbers, steps, acts, parts, parts or combinations thereof exist or are added.

[0048] In addition, it should be noted that, in the case of no conflict, the embodiments in the present disclosure and the features in the embodiments can be combined with each other. The present disclosure will be described in detail below with reference to the accompanying drawings...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention discloses a method for providing trusted services by utilizing a trusted execution environment system based on a microkernel architecture. The method comprises the following steps of: starting a trusted operation system, creating a first process for running a root task by the trusted operation system, verifying the integrity of a mirror image of the root task, and executing the root task by the first process; in response to a service request from the common world, creating and running a trusted application process corresponding to a service identifier by the roottask, verifying the integrity of a trusted application mirror image corresponding to the service identifier, and creating a trusted application process based on the trusted application mirror image after the verification is completed; after the trusted application completes processing of the related data, switching a processor to a monitor mode by calling a preset switching instruction through the root task; and storing context data of the trusted operating system by using the monitor component in the monitor mode, and switching to a general operating system in the common world.

Description

technical field [0001] The present disclosure relates to the technical field of computer technology, in particular to a method for providing trusted services using a trusted execution environment system based on microkernel architecture. Background technique [0002] With the rapid development of random computer technology and the rapid development of network technology, mobile devices have been applied to various fields of society, such as smart home, consumer electronics, network equipment and medical instruments. Data processed in mobile devices is becoming more and more important and therefore a target for attacks. Nowadays, the application of mobile devices in online payment and electronic banking is developing rapidly. Once user data is leaked or user equipment is used by attackers, it will directly cause the user's property loss. Therefore, the importance of mobile device security is self-evident. In response to the above situation, Global Platform (GP) proposed the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57G06F21/60G06F21/74
CPCG06F21/57G06F21/602G06F21/74
Inventor 张倩颖冀东旭施智平关永李晓娟王瑞王国辉邵振洲
Owner CAPITAL NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products