Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access control method and device

An access control and security access technology, applied in the field of communication, can solve problems such as leakage of important private information, brute force cracking of the security switching mechanism verification process, etc., to achieve the effect of improving security, strengthening protection, and avoiding direct contact

Active Publication Date: 2015-12-09
HUAWEI TECH CO LTD
View PDF6 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In practical applications, although the trusted application platform will verify the application program that triggers the security switch mechanism, all applications running in the untrusted execution environment can access the security switch mechanism, which provides malicious programs with an attempt to attack. The possibility that the verification process of the security switching mechanism may be cracked violently by malicious programs, resulting in the leakage of important private information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and device
  • Access control method and device
  • Access control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0055] The access control method in the embodiment of the present invention is applied to an access control device running on a trusted computing platform. Access data hidden under hardware protection mechanisms in computing platforms. The data under the hardware protection mechanism may include the user's private data, and may also include data that requires special protection for some applications that require a higher level of security, which is not limited here. The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an access control method and device. The access control method and device are used for reinforcing protection over data concealed under a hardware protection mechanism of a dependable computing platform and preventing violent cracking by a malicious application program. The method comprises the steps that a container is established for the running application program, then whether the application program is a dependable security application program or not is judged, and if the circumstance that the application program is the dependable security application program cannot be confirmed, the access permission of a safety access interface is not released for the container.

Description

technical field [0001] The present invention relates to the communication field, in particular to an access control method and device. Background technique [0002] Trusted Computing (Trusted Computing) is a trusted computing platform supported by hardware security modules that is widely used in computing and communication systems to improve the overall security of the system. [0003] ARM's TrustZone technology is a chip-level trusted computing framework, and its hardware architecture is an extension of the security system in the entire system design process, with the purpose of preventing various specific threats that equipment may encounter. On the processor architecture, each physical processor core provides two virtual cores, one is a non-safety core and the other is a safe core, which can be switched through the access of the safety driver, and the non-safety core can only access the non-safety core System resources, while the secure core can access all system resourc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/53G06F21/57
CPCG06F21/53G06F21/57G06F2221/2149
Inventor 叶磊
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products