Supercharge Your Innovation With Domain-Expert AI Agents!

Intelligent terminal control system based on trusted security environment

A smart terminal and security environment technology, applied in the field of information security, can solve problems such as attacks, data confidentiality in the cloud, integrity and service availability threats, data storage, use, deletion and reuse, and achieve the effect of ensuring security

Inactive Publication Date: 2021-07-16
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this service model completely separates the ownership, management and use rights of user data, making users lose direct control over data
Because the storage, use, deletion and reuse of data in the cloud computing environment are out of the control of the user, the confidentiality, integrity and service availability of the data in the cloud are threatened.
[0005] (2) Virtualization security issues
[0007] From the perspective of virtualization technology architecture, the virtual machine system is composed of three different functional components: a virtual machine monitor, a virtual machine management tool, and a client operating system Guest OS. Each component may introduce new security risks and expand the original There is an attack surface of the information system, causing serious consequences such as destruction, misuse, leakage and tampering of cloud computing resources and user data
[0008] (3) Unknown problems that users operate in the cloud environment
However, the sharing of resources by different users reduces the isolation of applications, which may cause malicious users to attack other users or cloud computing infrastructure through shared resources.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent terminal control system based on trusted security environment
  • Intelligent terminal control system based on trusted security environment
  • Intelligent terminal control system based on trusted security environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The technical solution of the present invention will be described in detail below in combination with the embodiments and the accompanying drawings.

[0037] Taking the application of the present invention to a smartphone as an example, the details of the present invention will be described.

[0038] S1. Ensure the security of mobile terminals

[0039] Such as figure 1 As shown, the protection levels of a secure mobile phone include shielding Trojan horses, encrypting communication, eliminating surface attacks, detecting unknown threats, resource intrusion, and data protection. In addition, the mobile phone-based security architecture includes such figure 2 Secure OS, Secure Phone, Secure Call, Secure App, and Secure Help shown. Therefore, the security environment developed by the present invention is a comprehensive protection scheme based on software design, which is defined as DOOV-OS. It ensures the security of mobile terminals through a series of protection me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information security, and particularly relates to an intelligent terminal control system based on a trusted security environment. The intelligent terminal control system based on the trusted security environment comprises an intelligent terminal control module and a security payment module, the intelligent terminal control module is used for constructing a trusted security environment for the intelligent terminal, and the security payment module is used for providing a secure payment environment for the intelligent terminal. A multi-layer security protection method is used, different security modes are adopted in each layer, so that the intelligent terminal can cope with unknown threats, and the security of the mobile terminal and the threats existing in the security terminal are ensured through a series of protection means.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to an intelligent terminal control system based on a trusted security environment. Background technique [0002] Due to its technical characteristics and service model, cloud computing makes the security problems existing in traditional network services more prominent, so users have higher requirements for the credibility of cloud services. On the one hand, compared with traditional distributed network services, cloud computing generally adopts virtualization technology, outsourcing service mode, and multi-user architecture to improve resource utilization and save user investment, while providing a large number of development interfaces to facilitate user customization of cloud services. But at the same time, it also introduces new security shortcomings, weakens the user's control over their own data, and weakens the boundaries between different user applica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56G06F21/57G06F8/65H04W12/12
CPCG06F21/566G06F21/577G06F8/65
Inventor 张忠培杨松洁
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More