Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure memory implementation method and system

A technology for realizing the system and method, which is applied in the field of computers, can solve the problems of high cost, the impossibility of using secure memory for low-end devices, and raise the threshold for mid-to-high-end devices, so as to reduce hardware dependence, wide application range, and improve security Effect

Pending Publication Date: 2020-11-03
沈阳谦川科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the number of continuous physical addresses is limited, the more the number, the higher the cost
Usually only higher-end devices have extra MPU for this function, and low-end devices have only enough MPU to isolate TEE memory, which makes it almost impossible for low-end devices to use secure memory technology
The security camera itself is also a proprietary technology of the chip supplier. In addition to the hardware cost, there is usually a software integration fee, which also raises the threshold for mid-to-high-end devices to use this technology.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure memory implementation method and system
  • Secure memory implementation method and system
  • Secure memory implementation method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The technical solutions in the embodiments of the present invention are clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0044] The purpose of this application is to provide a secure memory implementation method and its system, which has secure memory that can be quickly deployed, and reduces the dependence of security camera technology on hardware, so that security camera services can also be used on low-end devices that lack hardware protection The benefits brought about by the technical effect.

[0045] Such as Figure 5 As shown, the application provides a secure memory implemen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure memory implementation method and a secure memory implementation system, and the secure memory implementation system comprises a face algorithm and a secure memory service which are arranged at a secure execution environment end; a client program,camera service, a secure memory distributor and a secure memory arranged at a general execution environment end; and a camera hardware. The invention has the technical effects that the safe memory can be quickly allocated, and the dependence of a safe camera technology on hardware is reduced, so that the advantages brought by safe camera service can be used on a low-end device lacking hardware protection.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a method and system for implementing a secure memory. Background technique [0002] In recent years, the authentication mechanism of face recognition has become more and more popular, but it has also caused some security concerns. If the process of face recognition is interfered by malicious hackers and directly replaces the face data to be recognized, it may directly endanger the rights and interests of users. Therefore, it is extremely important to ensure the security of the face recognition process, and the security camera is a technology born out of this demand. The purpose of using the security camera is to ensure that during the process of face recognition, the face data will not be tampered with due to the security loopholes of some programs, so the security risks can be greatly reduced. [0003] Security cameras are usually equipped with a Trusted Execute En...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/78
CPCG06F21/32G06F21/78
Inventor 周博
Owner 沈阳谦川科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products