Data processing method, device and storage medium based on intelligent security equipment

A technology of intelligent security and data processing, applied in the field of data processing, can solve problems such as inability to send data

Active Publication Date: 2022-01-04
SHANGHAI IMILAB TECHNOLOGY CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the existing retransmission mechanism, the Trusted Execution Environment (TEE, Trusted Execution Environment) as a security environment can only accept passive calls and send data based on passive calls. For example, when there is data to be sent in the TEE, at this time , if the TEE is not called by the external environment, it will result in the inability to send data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method, device and storage medium based on intelligent security equipment
  • Data processing method, device and storage medium based on intelligent security equipment
  • Data processing method, device and storage medium based on intelligent security equipment

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0113] Example 1, the specific steps include:

[0114]Step 1-1: In the case that the REE has the first target data that needs to be sent to the Bluetooth component, the REE calls the preset write interface of the TEE (that is, the second operating environment), and uses the preset write interface to write The first target data is passed into the TEE.

[0115] Here, it should be noted that both the preset writing interface and the preset writing interface described in this example are software interfaces.

[0116] Step 1-2: In the TEE, determine whether there is data in the preset linked list, that is, whether there is historical data. If there is no data in the preset linked list, execute step 1-3; otherwise, execute step 1-4.

[0117] Here, it should be noted that the preset linked list is preset in the TEE, and the preset linked list is used to store data to be sent to the Bluetooth component, for example, used to store the first target data, and at the same time, record t...

example 2

[0133] Example 2, the specific steps include:

[0134] Step 2-1: In the case that the REE has the first target data that needs to be sent to the Bluetooth component, the REE calls the preset write interface of the TEE (that is, the second operating environment), and uses the preset write interface to write The first target data is passed into the TEE.

[0135] Here, it should be noted that both the preset writing interface and the preset writing interface described in this example are software interfaces.

[0136] Step 2-2: In the TEE, respond to the call of the preset writing interface to write the first target data into the preset linked list; and, after successfully storing in the preset linked list, Send the first target data to the bluetooth component to complete the write operation to the bluetooth component. Go to steps 2-3.

[0137]Here, it should be noted that the preset linked list is preset in the TEE, and the preset linked list is used to store data to be sent t...

Embodiment approach 1

[0150] Embodiment 1: The data that needs to be reported to the TEE in the Bluetooth component is the second target data or the first preset data; here, in practical applications, the Bluetooth component will notify the REE of the existence of the second target data or The first preset data needs to be reported to TEE; the specific steps include:

[0151] Step 1: The Bluetooth component notifies the REE of the existence of the second target data to be reported to the TEE by wireless communication. Specifically, the Bluetooth component sends a second notification message to the REE by wireless communication, and the second notification message is used to notify There is data sent to the TEE in the REE Bluetooth component; for example, it is the response data sent after the Bluetooth component successfully processes the received first target data, that is, the second target data.

[0152] Step 2: In the REE, periodically call the preset read interface of the TEE, that is, the REE...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present disclosure proposes a data processing method, device, and storage medium based on intelligent security equipment; wherein, the method includes: in the second operating environment, determining that the first operating environment stops calling the preset read interface of the second operating environment In the case of , send a preset instruction to the Bluetooth component; in the first operating environment, obtain the first notification message sent by the Bluetooth component; in the first operating environment, respond to the first notification message, and call the second operating environment A preset read interface; in the second operating environment, respond to the call of the preset read interface to obtain the first preset data from the Bluetooth component, and determine the current first target data to be resent from the preset linked list , and resend to the bluetooth component; wherein, at least one first target data to be sent to the bluetooth component is stored in the preset linked list.

Description

technical field [0001] The present disclosure relates to the field of data processing, and in particular to a data processing method, device and storage medium based on an intelligent security device. Background technique [0002] In the existing retransmission mechanism, the Trusted Execution Environment (TEE, Trusted Execution Environment) as a security environment can only accept passive calls and send data based on passive calls. For example, when there is data to be sent in the TEE, at this time , if the TEE is not called by the external environment, the data cannot be sent. Contents of the invention [0003] The present disclosure proposes a data processing method, device and storage medium based on an intelligent security device to at least solve the above technical problems. [0004] In a first aspect, the present disclosure provides a data processing method based on an intelligent security device, the intelligent security device is at least installed with a first...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L1/18H04W4/80H04W28/04G06F21/74
CPCH04L1/1867H04W4/80H04W28/04G06F21/74G06F2221/2105
Inventor 黄燕青谢剑杨洋
Owner SHANGHAI IMILAB TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products