Unlock instant, AI-driven research and patent intelligence for your innovation.

Cross-process call management method and device, operating system architecture and terminal equipment

A technology of operating system and management method, applied in the field of cross-process call management method and device, and operating system architecture, can solve problems affecting equipment security, achieve the effects of ensuring security, avoiding malicious CA calls, and improving execution efficiency

Pending Publication Date: 2022-03-11
BEIJING SPREADTRUM HI TECH COMM TECH CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Generally, users can deploy various CAs on terminals of operating systems such as IOS and Android, but if a malicious CA initiates a call to TA through some methods (such as hijacking other CAs), these operations may affect the security of the device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-process call management method and device, operating system architecture and terminal equipment
  • Cross-process call management method and device, operating system architecture and terminal equipment
  • Cross-process call management method and device, operating system architecture and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the above purpose, features and beneficial effects of the present application more obvious and understandable, specific embodiments of the present application will be described in detail below in conjunction with the accompanying drawings.

[0051] Although the TEE provides an environment isolated from the REE to store sensitive information of the user, the TEE can directly obtain the information of the REE, and the REE cannot obtain the information of the TEE, but it cannot be ruled out that some malicious CAs in the REE call the TA to the device. security risks. To this end, the embodiment of the present application provides a cross-process call management method and device. A hook is added to the trusted process communication, and all calls made by CAs to TAs through trusted process communications will be monitored to ensure that CAs call TAs. Both are safe calls.

[0052] Such as figure 1 As shown, it is a flow chart of the cross-process call manage...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cross-process call management method and device, an operating system architecture and terminal equipment. The method comprises the following steps: receiving a call command for a trusted application (TA) sent by a client application (CA); determining whether the CA has corresponding permission setting or not; if the CA has the corresponding permission setting, calling the TA according to the permission setting; and if the CA does not have the corresponding permission setting, displaying prompt information. According to the scheme, sensitive calling, possibly causing security risks to the user data, of the CA on the REE side can be avoided, and the security of the user data is effectively guaranteed.

Description

technical field [0001] The present application relates to the field of communication technology, in particular to a cross-process call management method and device, and also relates to an operating system architecture and a terminal device. Background technique [0002] With the increasing maturity and development of the mobile terminal market, security issues have gradually become the focus of attention. The security of terminal devices that only support one operating system (such as IOS, Android, etc.) is increasingly challenged. For this reason, more and more devices support TEE (Trusted Execution Environment, Trusted Execution Environment) . [0003] Devices that support TEE have two operating environments, REE (Rich Execution Environment, Rich Execution Environment) and TEE. The two environments have independent operating systems and software. REE is responsible for running common operating systems, such as IOS and Android. The application running in the TEE environme...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/57
CPCG06F21/126G06F21/57
Inventor 吴周镜
Owner BEIJING SPREADTRUM HI TECH COMM TECH CO LTD