Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption method and encryption system based on ARM TrustZone

An encryption method and encryption and decryption technology, which are applied in the field of encryption methods and encryption systems based on ARM TrustZone, can solve problems such as hidden dangers, slow encryption and decryption speed, and restrict the efficiency of encryption systems, and achieve the effect of improving efficiency and improving security.

Inactive Publication Date: 2014-01-15
上海盛轩网络科技有限公司
View PDF0 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the process of implementing the present invention, the inventor found that: in the prior art, since the encryption and decryption operations and authentication are all completed at the user layer, each user can access the encryption chip, or use a specific programming tool to convert the encryption chip Content extraction can even deceive the authentication server by simulating encryption chip operations, so there is a great security risk; moreover, to prevent brute-force authentication cracking, the internal firmware (firmware) of the encryption chip is restricted by encryption operations. Therefore, the speed of encryption and decryption is very slow; in addition, the encryption chip communicates with the processor of the mobile device through a special interface such as I2C, which further restricts the efficiency of the encryption system, making the encryption system only used for the authentication function of the mobile device , a very narrow range of use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method and encryption system based on ARM TrustZone
  • Encryption method and encryption system based on ARM TrustZone
  • Encryption method and encryption system based on ARM TrustZone

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] This embodiment proposes an encryption method based on ARM TrustZone, which stores the key of the mobile device in a security area invisible to the user and performs encryption, decryption and authentication operations in this security area, and this encryption and decryption operation and this block The security of the security area is ensured by both ARM bus encryption and interrupt protection. This security encryption technology utilizes the existing characteristics of the CPU of the ARM TrustZone architecture, so it is a security encryption technology combining software and hardware.

[0050] see figure 1 As shown, the solution provided by this embodiment first provides a security framework, so that the device can defend against many specific threats that will be encountered. And it also supports building a programmable environment to prevent mobile device hardware from being cracked and content copyright from being attacked. Using the TrustZone architecture ARM pl...

Embodiment 2

[0077] This embodiment provides an encryption system based on ARM TrustZone, see Figure 5 As shown, the system is used for a mobile device, and the mobile device has an ARM processor, and the system includes:

[0078] The security microkernel module 501 is used to divide the security area memory into multiple task memory spaces, and supports multiple independent security applications to run simultaneously without mutual detection and trustworthiness;

[0079] A secure boot module 502, configured to perform secure boot, so that the mobile device runs in a safe zone when the system kernel is started;

[0080] The communication module 503 is configured to call the secure microkernel module through the TrustZone API to complete the encryption and decryption when the upper layer application needs encryption and decryption.

[0081] Preferably, the communication module 503 may specifically include:

[0082] The driver layer calls the submodule, which is used to call the mobile de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an encryption method and an encryption system based on ARM TrustZone. The encryption method is used in a mobile device which is provided with an ARM processor. The encryption method includes the steps that a security microkernel is preset in the mobile device, wherein the security microkernel is used for dividing a security zone internal storage into a plurality of task internal storage spaces to support the simultaneous operation of a plurality of independent secure application programs which are dependable without the need for mutual detection; secure startup is carried out to enable the mobile device to run in a security zone when a system kernel is started up; when encryption and decryption need to be carried out on an upper-layer application, the security microkernel is called through TrustZone API to finish the encryption and decryption. On the technical basis of the ARM TrustZone, the security microkernel is built to enable the security zone to be separated from a common zone, and all applications relevant to security on the mobile device are placed in the security zone, so the security of the mobile device is greatly improved.

Description

technical field [0001] The invention relates to the field of encryption of mobile equipment, in particular to an encryption method and encryption system based on ARM TrustZone. Background technique [0002] Mobile devices, such as mobile phones, tablet computers, e-book devices, etc., often have encryption systems to complete some functions such as authentication. In the prior art, the encryption system of the mobile device is generally based on an encryption chip, and communicates with the processor of the mobile device through a dedicated interface such as an I2C interface, and encryption, decryption, and authentication are all completed at the user layer. [0003] In the process of implementing the present invention, the inventor found that: in the prior art, since the encryption and decryption operations and authentication are all completed at the user layer, each user can access the encryption chip, or use a specific programming tool to convert the encryption chip Cont...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/71H04W12/06H04W12/03
CPCH04W12/06G06F21/71
Inventor 李炎华狄俊龙
Owner 上海盛轩网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products