Supercharge Your Innovation With Domain-Expert AI Agents!

Trusted execution environment construction method, system and storage medium

A technology of execution environment and construction method, applied in the direction of internal/peripheral computer component protection, platform integrity maintenance, etc., can solve problems such as reducing software operation security, unable to provide software operation environment, etc., to achieve the effect of improving security

Active Publication Date: 2022-05-31
SOUTH UNIVERSITY OF SCIENCE AND TECHNOLOGY OF CHINA
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The RISC-V architecture, which is different from the Intel x86 architecture, has attracted many researchers due to its open source architecture, but the RISC-V architecture does not directly provide a trusted execution environment supported by hardware, so that users cannot provide a A secure software operating environment gives software, thereby reducing the security of software operation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted execution environment construction method, system and storage medium
  • Trusted execution environment construction method, system and storage medium
  • Trusted execution environment construction method, system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In the description of the present invention, if related to orientation description, such as "up", "down", "front", "rear", "left", "right"

[0052] Intel SGX was proposed by Intel in 2013, and this technology includes a series of new additions to Intel processors

[0063] In some embodiments, creating a request includes: a running memory requirement, a running program request, an I / O device request, an execution

[0064] An enclave is an application that can create a protected execution environment in memory, and each target application can

[0069] S340, assign the instruction execution authority corresponding to the execution authority request to the target application according to the execution authority request.

[0072] S400, if the enclave reserved memory is less than the memory size corresponding to the running memory requirement, re-monitor the creation request.

[0077] S600, the I / O driver completes the initialization of the I / O device corresponding to the I / O devi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a trusted execution environment construction method, system and storage medium. The trusted execution environment construction method includes: receiving a creation request, the creation request is used to indicate the creation of a target application with a trusted execution environment cache enclave; according to the creation request Save the external context, and verify the target application corresponding to the creation request, and obtain a successfully verified target application; allocate the running resources of the trusted execution environment cache enclave to the target application according to the creation request, and run the running resources for the target application to run . After receiving the creation request, the present invention saves the external context according to the creation request, and then verifies the target application corresponding to the creation request. If the verification of the target application is successful, it allocates the corresponding running resources to the target application, so that the target application can run normally according to the running resources. run, so that the user can safely access the I / O device through the target application, thereby improving the security of software running.

Description

Trusted execution environment construction method, system and storage medium technical field The present invention relates to the technical field of software operating environment, especially relate to a kind of trusted execution environment construction method, system and storage medium. Background technique With the development of software, the software operating environment for building software security has received extensive attention, among which the most typical Types of trusted execution environments include SGX under Intel x86 architecture, TrustZone under Arm architecture, and AMD x86 architecture. SEV. These trusted execution environments are widely used in various scenarios with different security requirements. [0003] The RISC-V architecture, which is different from the Intel x86 architecture, has attracted many researchers due to its open-source architecture, but The RISC‑V architecture does not directly provide a trusted execution environment support...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06F21/71
CPCG06F21/57G06F21/71
Inventor 宁振宇张锋巍
Owner SOUTH UNIVERSITY OF SCIENCE AND TECHNOLOGY OF CHINA
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More