TrustZone-based programming method, terminal equipment and storage medium

A programming method and terminal equipment technology, applied in the field of data security, can solve problems such as insufficient security of terminal equipment

Pending Publication Date: 2021-02-05
GEER TECH CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the security of the terminal equipment is still insuff

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • TrustZone-based programming method, terminal equipment and storage medium
  • TrustZone-based programming method, terminal equipment and storage medium
  • TrustZone-based programming method, terminal equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0043] refer to figure 1 , figure 1 It is a schematic diagram of the terminal structure of the hardware operating environment involved in the solution of the embodiment of the present invention.

[0044] The terminal of the embodiment of the present invention is a programming device based on TrustZone (trusted domain). (personal computer, personal computer), and other terminal equipment.

[0045] Such as figure 1 As shown, the terminal may include: a processor 1001 , such as a CPU (Central Processing Unit, central processing unit), a communication bus 1002 , a user interface 1003 , a network interface 1004 , and a memory 1005 . Wherein, the communication bus 1002 is used to realize connection and communication between these components. The user interface 1003 may include a display screen (Display), an input unit ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a TrustZone-based programming method, terminal equipment and a computer readable storage medium, the TrustZone-based programming method is applied to the terminal equipment, and the terminal equipment comprises a security extension chip with a TrustZone technology. The TrustZone-based programming method comprises the following steps: dividing a storage area of the terminalequipment into a safe area and a non-safe area; dividing the security area into a Bootloader area, an APP security area and a security data storage area, and dividing the non-security area into an APPnon-security area and a non-security data storage area; and controlling the interaction between the APP security area and the APP non-security area. According to the invention, the security of the terminal equipment can be improved, and the programming efficiency of the terminal equipment is improved.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a programming method based on TrustZone, a terminal device and a computer-readable storage medium. Background technique [0002] With the rapid development of science and technology, the application scenarios of IOT (Internet of Things, Internet of Things) are becoming more and more extensive, making more and more terminal devices capable of networking. However, there will be many security threats to the terminal equipment networking. Among them, for the terminal equipment, the terminal equipment needs to upload data to the cloud server. If the terminal equipment has security threats, the uploaded data will be unsafe, resulting in Data has no value, even negative value. Therefore, ensuring the security of terminal equipment is the basis of IOT security. [0003] Usually, an additional security encryption protection chip is added in the terminal equipment to ensure the sec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57G06F21/60G06F21/78G06F8/30
CPCG06F21/575G06F21/602G06F21/78G06F8/31
Inventor 宋伟
Owner GEER TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products