Trusted measurement method, device and system, electronic equipment and storage medium

A credible and credible technology, applied in computer security devices, electrical digital data processing, instruments, etc., can solve problems such as insufficient security of systems and data, and achieve the effect of ensuring system and data security and ensuring effectiveness

Pending Publication Date: 2021-03-02
INST OF INFORMATION ENG CAS
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present application provides a trusted measurement method, device, system, electronic equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted measurement method, device and system, electronic equipment and storage medium
  • Trusted measurement method, device and system, electronic equipment and storage medium
  • Trusted measurement method, device and system, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0019] As mobile terminals become more intelligent and have more and more applications, more and more sensitive information involving business secrets or personal privacy is facing serious security threats. Various applications continue to emerge on mobile terminals. If developers do not strengthen security when developing these applications, hackers may use the inherent security loopholes of these applications to obtain root privileges of mobile terminal operating systems and easily intercept users' sensitive information. data. So far, how to ensure the security of the mobile terminal becomes more and more important.

[0020] In order to provide a safe operating environment for mobile terminals, ARM introduced TrustZone technology from the ARMv6 architecture. TrustZone technology divides the working state of the central processing unit into a normal state and a safe state. The environment running in the secure state is a Trusted Execution Environment (TEE), and the environm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a trusted measurement method, device and system, electronic equipment and a storage medium, and the method comprises the steps: obtaining a switching instruction, and switching the operation environment of a mobile terminal into a trusted execution environment; obtaining an integrity state value of a memory state of the rich execution environment; measuringthe memory state of the rich execution environment to obtain a current value; and when the integrity state value is inconsistent with the current value, giving an alarm. According to the method, thetrusted execution environment is switched in, the memory state of the rich execution environment is measured in the trusted execution environment, and the effectiveness of measurement and the integrity and security of the memory are ensured, so that the system and data security of the mobile terminal are effectively ensured.

Description

technical field [0001] The present application relates to the field of mobile terminal security, in particular, to a method, device, system, electronic equipment and storage medium for trustworthiness measurement. Background technique [0002] As mobile terminals become more intelligent and their applications more abundant, more and more sensitive information involving business secrets or personal privacy is facing serious security threats. Various applications are constantly emerging on mobile terminals. If developers do not implement security reinforcement protection when developing these applications, hackers may take advantage of the inherent security holes in these applications to obtain the root authority of the mobile terminal operating system and easily intercept users' sensitive data. data. [0003] Therefore, the security guarantee of the mobile terminal becomes more and more important, and there is an urgent need for a method that can effectively protect the syst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 孟丹贾晓启王睿怡武希耀孙慧琪杜海超白璐
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products