Unlock instant, AI-driven research and patent intelligence for your innovation.

Heterogeneous fusion method, device and related equipment of trusted computing environment

A technology of trusted computing and fusion methods, which is applied to secure communication devices, public keys for secure communications, and key distribution, can solve problems such as untrustworthiness between applications in heterogeneous trusted computing environments, and achieve the effect of solving untrustworthiness

Active Publication Date: 2021-08-17
湖南红普创新科技发展有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Embodiments of the present invention provide a heterogeneous fusion method, device, computer equipment, and storage medium of a trusted computing environment to solve the technical problem of untrustworthiness between TEE applications in a heterogeneous trusted computing environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Heterogeneous fusion method, device and related equipment of trusted computing environment
  • Heterogeneous fusion method, device and related equipment of trusted computing environment
  • Heterogeneous fusion method, device and related equipment of trusted computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0030] The heterogeneous fusion method of a trusted computing environment provided by this application can be applied in such as figure 1 An application environment in which a client communicates with a server over a network. Among them, clients and servers can be but not limited to various personal computers, notebook computers, smart phones, tablet computers and portable wearable devices. The server can be implemented by an independent server or a s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a heterogeneous fusion method, device, computer equipment and storage medium of a trusted computing environment, which are applied to the field of computer security and are used to solve the problem that TEE applications in a heterogeneous trusted computing environment cannot directly communicate with each other. The present invention determines that the TEE container itself is credible by initializing the TEE container. Obtain the client public key and the server public key by negotiating the communication key request. The server decrypts and verifies the client's local integrity measurement report through the obtained client public key, and determines that the client is a trusted TEE application of the server; the client decrypts and verifies the server's local integrity measurement report through the obtained server public key, and determines that the server is a trusted TEE application. The client-side trusted TEE application opens a trusted closed loop and establishes mutual trust. Finally, the client encrypts and sends a trusted call request, and the server receives the request, decrypts it, processes the returned call result, and implements trusted mutual calls.

Description

technical field [0001] The invention relates to the field of computer security, in particular to a heterogeneous fusion method, device, computer equipment and storage medium of a trusted computing environment. Background technique [0002] Trusted Computing Environment TEE (Trusted Execution Environment) is a concept proposed by GlobalPlatform, a global platform organization. By isolating an operating space in the central processing unit from the operating system, under the condition that the native operating system and peripherals are not secure, it can still It can protect programs and data running in TEE. [0003] In practical applications, currently popular solutions include TrustZone for ARM (Advanced RISC Machine) architecture processors and SGX (SoftwareGuard Extensions) for x86 (The X86 architecture) architecture processors. [0004] ARM (Advanced RISC Machine) trust zone is a security technology launched by ARM that aims to enforce security on hardware, and has bee...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/30G06F21/57
CPCG06F21/57H04L9/0822H04L9/0838H04L9/0861H04L9/30
Inventor 陈晓红郭泰彪胡东滨
Owner 湖南红普创新科技发展有限公司