Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A fast authentication method and system for a trusted execution environment

A technology of execution environment and authentication method, applied in the direction of transmission system, digital transmission system, secure communication device, etc., can solve problems such as complex process, inability to reuse enclaves, unfavorable applications to process multiple user requests at the same time, etc. , to achieve the effect of reducing interfaces, improving ease of use and security

Active Publication Date: 2022-07-26
INST FOR INTERDISCIPLINARY INFORMATION CORE TECH XIAN CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] However, the existing remote authentication mainly has two bottlenecks: one is that the enclave cannot be reused well, and frequent authentication is required to establish trust, which is not conducive to the application to process multiple user requests at the same time, and does not meet the high requirements of cloud services. Throughput requirements
2. The one-time authentication process itself is a very time-consuming work, the process is complicated, and the overhead is relatively large, which may even exceed the actual calculation overhead.
Brutally authenticating every enclave an application contains would impose a huge overhead on the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A fast authentication method and system for a trusted execution environment
  • A fast authentication method and system for a trusted execution environment
  • A fast authentication method and system for a trusted execution environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The present invention will be further described in detail below in conjunction with specific embodiments, which are to explain rather than limit the present invention.

[0056] A fast authentication method and system for a trusted execution environment of the present invention, related technical terms and explanations will be involved in the description of the embodiments, which are summarized in Table 1 below.

[0057] Table 1 Explanation of related technical terms.

[0058]

[0059]

[0060] The present invention is a fast authentication method for a trusted execution environment, such as figure 1 shown, which includes,

[0061] When the trusted execution environment is initialized, the proxy enclave receives the authentication request from the service provider, pre-generates and obtains its own authentication report;

[0062] The subordinate enclaves managed by the proxy enclave initiate authentication requests in turn, and perform verification and authentica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a fast authentication method and system for a trusted execution environment, with reasonable design, fast authentication speed for enclave, low calculation overhead, and rapid establishment of a trusted communication channel. The method includes, when the trusted execution environment is initialized, the proxy enclave receives the authentication request from the service provider, and pre-generates and obtains its own authentication report; and the subordinate enclaves managed by the proxy enclave initiate the authentication request in sequence, according to the preset authentication request. If all subordinate enclaves pass the authentication, establish a secure communication channel between the agent enclave and the subordinate enclaves it manages, otherwise stop the initialization; after the initialization is completed, receive the user service request and send it to the The user sends the pre-generated authentication report of the proxy enclave corresponding to the service request; and after interactive authentication with the user, encrypts the communication content, establishes a trusted communication channel between the user and the proxy enclave and the subordinate enclaves it manages, and completes the trusted execution Fast certification of the environment.

Description

technical field [0001] The invention relates to an authentication method in an Internet environment, in particular to a fast authentication method and system in a trusted execution environment. Background technique [0002] With the rapid development of the Internet industry and computers, our lives are inseparable from computers. Computer security and data privacy have always been hot topics in academia and industry. Especially in the Internet environment, network services have major security problems. On the one hand, data providers are worried that service providers will collect their own private data, and on the other hand, they are worried that the platforms of service providers are controlled by attackers. [0003] The SGX technology proposed by Intel in 2013 is a technology that aims to solve the above-mentioned secure remote computing problem through remote trusted hardware. Based on processor hardware, SGX provides authentication, isolated execution and sealing f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/32H04L9/08
CPCH04L63/0884H04L63/0823H04L9/3268H04L9/3247H04L63/123H04L9/0869H04L9/0819H04L63/0435
Inventor 李发兵林伟伟李想毛兴中
Owner INST FOR INTERDISCIPLINARY INFORMATION CORE TECH XIAN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products