Security data storage method, computer device and computer readable storage medium

A technology for secure data and computer programs, applied in the field of computer-readable storage media, storage methods, and computer devices for implementing such methods, capable of solving problems such as unsuitability for deployment

Pending Publication Date: 2022-07-22
ALLWINNER TECH CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, the OPTEE open source community also provides a set of secure storage methods, but this method relies on the Linux operating system in the rich execu

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security data storage method, computer device and computer readable storage medium
  • Security data storage method, computer device and computer readable storage medium
  • Security data storage method, computer device and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The method for storing security data of the present invention is applied to an embedded device, and preferably, the embedded device can store security data. Preferably, the embedded device is provided with a processor and a memory, the memory stores a computer program, and the processor implements the above-mentioned storage method of the security data by executing the computer program.

[0035] Embodiments of the storage method of security data:

[0036] This embodiment involves multiple links of writing, reading, and programming of secure data, and ensures secure data storage by encrypting, decrypting, writing, and reading the secure data in the trusted execution environment TEE of the embedded device. security, and low-cost realization of secure data read and write.

[0037] Combine below figure 1 Describes the process of writing secure data. The original security data 11 is important asset data, such as DRM (Digital Rights) certificate, HDCP key (for output prote...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security data storage method, a computer device and a computer readable storage medium, and the method comprises the steps: obtaining first-level encrypted data, transmitting the first-level encrypted data to a trusted execution environment through a shared memory, encrypting the first-level encrypted data in the trusted execution environment by using a unique key of equipment, and storing the encrypted first-level encrypted data in the trusted execution environment; obtaining secondary encrypted data; and transmitting the second-level encrypted data to the rich execution environment through the shared memory, and storing the second-level encrypted data in a preset storage area of the rich execution environment. The invention further provides a computer device and a computer readable storage medium for implementing the method. According to the invention, the embedded device can store the security data with low cost, and the security of security data storage is ensured.

Description

technical field [0001] The present invention relates to the technical field of data safe storage, and in particular, to a method for storing safe data, a computer device and a computer-readable storage medium for implementing the method. Background technique [0002] With the widespread application of embedded devices, the use of embedded devices to store secure data has become commonplace. With the widespread application of important data assets, the use of embedded devices to store important data assets is becoming more and more common. Common important data assets include DRM (digital rights) certificates, HDCP keys (for output protection), Google trust chain certificates, and other user data that need to be protected. These data assets that need to be protected are usually hundreds of bytes to A few thousand bytes. [0003] Using embedded devices to store data has the following advantages in data security: First, confidentiality, the data stored in embedded devices is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/62G06F21/57G06F9/54
CPCG06F21/602G06F21/57G06F21/6218G06F9/544
Inventor 王伟欧阳焜余显杨罗阳
Owner ALLWINNER TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products