Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure storage service system and method based on TrustZone technology

A secure storage and service system technology, applied in the field of secure data storage of mobile terminal equipment, can solve problems such as denial of service attacks, sensitive data theft, and insufficient security, and achieve the effects of transparency, isolation, and security improvement

Inactive Publication Date: 2016-01-20
INST OF INFORMATION ENG CAS
View PDF6 Cites 77 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the complexity and openness of traditional mobile terminal operating systems, it is impossible to create a safe operating environment, and the operating system itself and applications are vulnerable to malicious attacks.
After the malicious application attacks the legitimate application, it accesses the encrypted data stored on the file system as a legitimate application, and obtains the sensitive data through the corresponding decryption logic, resulting in the theft of sensitive data
At the same time, some mobile terminal device users flash their devices in order to obtain a better experience. When a malicious application obtains the highest authority of the mobile operating system, all the protection of sensitive data in the system will be insecure.
In addition, storing sensitive data encrypted in the ordinary file system also has the risk of illegal destruction leading to denial of service attacks
Therefore, the security of traditional solutions is not high enough, and it is difficult to effectively solve the problem of secure storage of application sensitive data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure storage service system and method based on TrustZone technology
  • Secure storage service system and method based on TrustZone technology
  • Secure storage service system and method based on TrustZone technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention utilizes the ARMTrustZone hardware isolation technology and the Trusted Execution Environment (TEE) as the basic platform to effectively provide data security storage services, and common applications and trusted applications on the basic platform call the unified interface provided by the security storage service system Realize the safe storage, safe loading and safe destruction of sensitive data; at the same time, under the premise of ensuring the minimum modification of the operating system, in the trusted execution environment, the common application program that initiates the data safe storage service request is checked for runtime legitimacy and rejected Service requests initiated by illegal common applications or maliciously attacked by legitimate common applications prevent sensitive data from leaking, thereby effectively ensuring data security. Based on this, the secure storage service system and method based on the TrustZone technology of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a secure storage service system and method based on a TrustZone technology. The secure storage service system comprises a data request module, a common application program, a secure storage service and a trusted application program; the data request module is responsible for packaging and transferring a secure storage service request of data between the common application program and the trusted application program, and providing a unified service request interface for data storage, data loading and data destruction for the common application program; and the secure storage service comprises a legality detection module, a data processing module and a secrete key management module. The secure storage service system and method disclosed by the invention aim to provide the unified data secure storage interface for the application programs on terminal equipment supporting the TrustZone technology; therefore, the secure storage problem of sensitive data of the application programs can be solved; and furthermore, the development convenience of the application programs is ensured.

Description

technical field [0001] The invention relates to a safe storage service system and method based on TrustZone technology, belonging to the field of data safe storage of mobile terminal equipment. Background technique [0002] With the rapid development of mobile Internet technology and mobile smart terminals, the business handled by mobile terminals has extended from traditional communication and entertainment fields to high-security and high-sensitive business fields such as mobile office and mobile payment. Mobile terminals need to process more and more sensitive data, including user account information, personal privacy information, payment order information, corporate private files, etc. How to effectively guarantee the security of sensitive data on mobile terminals has become a major problem for mobile terminal devices to carry out high-security and high-sensitive services. [0003] The usual solution is to encrypt sensitive data through a high-strength cryptographic alg...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 田琛王雅哲徐震蔡智强
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products