Trusted measurement method, device and system, electronic equipment and storage medium
A credible and credible technology, applied in computer security devices, electrical digital data processing, instruments, etc., can solve problems such as insufficient security of systems and data, and achieve the effect of ensuring system and data security and ensuring effectiveness
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0019] As mobile terminals become more intelligent and have more and more applications, more and more sensitive information involving business secrets or personal privacy is facing serious security threats. Various applications continue to emerge on mobile terminals. If developers do not strengthen security when developing these applications, hackers may use the inherent security loopholes of these applications to obtain root privileges of mobile terminal operating systems and easily intercept users' sensitive information. data. So far, how to ensure the security of the mobile terminal becomes more and more important.
[0020] In order to provide a safe operating environment for mobile terminals, ARM introduced TrustZone technology from the ARMv6 architecture. TrustZone technology divides the working state of the central processing unit into a normal state and a safe state. The environment running in the secure state is a Trusted Execution Environment (TEE), and the environm...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap