Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Movable equipment based on credible embedded platform and its security storage method

A mobile device and secure storage technology, applied in computer security devices, instruments, computing, etc., can solve problems such as the inability to guarantee a reliable environment for encryption and decryption operations, and achieve the effect of solving transmission speed bottlenecks, high security, and highly secure data storage

Inactive Publication Date: 2009-05-13
WUHAN UNIV
View PDF0 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is a bottleneck in the transmission speed of the current embedded system and encryption engine, and it cannot guarantee a reliable environment for encryption and decryption operations.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Movable equipment based on credible embedded platform and its security storage method
  • Movable equipment based on credible embedded platform and its security storage method
  • Movable equipment based on credible embedded platform and its security storage method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0064] like Figure 4 As shown, the mobile device of the present invention includes an embedded platform, an encryption and decryption chip made by FPGA, and also includes a TPM module. Embedded platform, TPM module, encryption and decryption chip are connected through internal high-speed bus. The embedded platform includes CPU, non-volatile memory Nand Flash. The TPM module and the encryption and decryption chip constitute the encryption engine. The internal bus is connected with the external bus through the bridge Bridge. External devices such as IIC bus and USB are connected to the external bus.

[0065] The functional architecture of this mobile device is as follows figure 1 shown. A secure storage method for mobile devices based on a trusted embedded platform includes user layer, system call layer, file system layer, page cache layer, general block layer, IO scheduling layer, block device driver layer, and physical block device layer. The user layer, the system call...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a mobile device based on a trustable embedded platform and a safe storage method thereof. The mobile device comprises an embedded platform, an encrypt / decrypt chip and a TPM module, wherein, the embedded platform, the TPM module and the encrypt / decrypt chip are connected with a high speed bus. In the device and the storage method, according to the characteristics of an embedded system, the embedded platform, the TPM trustable platform module and the hardware encrypt / decrypt chip together are combined, thereby effectively solving the problem of key safe storage, breaking through bottleneck of transmission speed of an embedded system and an encryption engine, and ensuring a reliable environment for encrypt / decrypt operation.

Description

technical field [0001] The invention relates to the technical field of computer information security, in particular to a data security storage of a mobile device based on a trusted embedded platform. Background technique [0002] A mobile device PDA (Personal Digital Assistant) is a personal digital assistant, which contains a large amount of private information and key data. Mobile devices can be lost and stolen, and if data is stored in clear text in its storage medium, it can easily lead to information leakage. The protection of important confidential data by embedded systems used in mobile devices is mostly realized in the form of PIN codes. The current encryption storage protection also has problems such as insecure key storage and encryption and decryption operating environments. And the resources of the embedded system are limited, and the encryption and decryption operations will deplete the performance of the system. How to improve the speed of encryption and decr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/62
Inventor 张焕国赵波郑鹏俞婷韩碧霞黄祥梨劳勇康路
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products