Unlock instant, AI-driven research and patent intelligence for your innovation.

Heterogeneous fusion method and device for trusted computing environment and related equipment

A technology of trusted computing and fusion methods, which is applied to secure communication devices, public keys for secure communications, and key distribution, and can solve problems such as untrustworthiness between applications in heterogeneous trusted computing environments

Active Publication Date: 2020-12-15
湖南红普创新科技发展有限公司
View PDF10 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Embodiments of the present invention provide a heterogeneous fusion method, device, computer equipment, and storage medium of a trusted computing environment to solve the technical problem of untrustworthiness between TEE applications in a heterogeneous trusted computing environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Heterogeneous fusion method and device for trusted computing environment and related equipment
  • Heterogeneous fusion method and device for trusted computing environment and related equipment
  • Heterogeneous fusion method and device for trusted computing environment and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0030] The heterogeneous fusion method of a trusted computing environment provided by this application can be applied in such as figure 1 An application environment in which a client communicates with a server over a network. Among them, clients and servers can be but not limited to various personal computers, notebook computers, smart phones, tablet computers and portable wearable devices. The server can be implemented by an independent server or a s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a heterogeneous fusion method and device for a trusted computing environment, computer equipment and a storage medium, is applied to the field of computer security, and is usedfor solving the problem that TEE applications of a heterogeneous trusted computing environment cannot directly communicate with each other. By initializing a TEE container, the credibility of the TEEcontainer is determined. A client public key and a server public key are obtained by negotiating a communication key request. A server decrypts and verifies a client local integrity measurement report through the obtained client public key, and determines that the client is a server trusted TEE application; and the client decrypts and verifies the local integrity measurement report of the serverthrough the obtained server public key, determines that the server is a trusted TEE application of the client, opens a trusted closed loop and establishes mutual trust. Finally, the client encrypts and sends a credible calling request, and the server receives the request, decrypts the request, processes and returns a calling result to realize credible mutual calling.

Description

technical field [0001] The invention relates to the field of computer security, in particular to a heterogeneous fusion method, device, computer equipment and storage medium of a trusted computing environment. Background technique [0002] Trusted Computing Environment TEE (Trusted Execution Environment) is a concept proposed by GlobalPlatform, a global platform organization. By isolating an operating space in the central processing unit from the operating system, under the condition that the native operating system and peripherals are not secure, it can still It can protect programs and data running in TEE. [0003] In practical applications, currently popular solutions include TrustZone for ARM (Advanced RISC Machine) architecture processors and SGX (SoftwareGuard Extensions) for x86 (The X86 architecture) architecture processors. [0004] ARM (Advanced RISC Machine) trust zone is a security technology launched by ARM that aims to enforce security on hardware, and has bee...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/30G06F21/57
CPCG06F21/57H04L9/0822H04L9/0838H04L9/0861H04L9/30
Inventor 陈晓红郭泰彪胡东滨
Owner 湖南红普创新科技发展有限公司