Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Construction method and system for Java program trusted execution environment

A construction method and execution environment technology, applied in the field of establishing a trusted execution environment for application programs, can solve the problems of insufficient security of Java programs of computer systems, integrity damage such as Java bytecode tampering, memory tampering, etc., to meet the security requirements. and trustworthy requirements, protect integrity, improve security and the effect of trustworthy requirements

Active Publication Date: 2017-05-31
湖南文盾智链科技有限公司
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The object of the present invention is to provide a method for constructing a trusted execution environment for Java programs, so as to solve the threats of Java bytecode tampering, memory tampering and other integrity damages that Java application programs may face during publishing, loading and running, so that the computer The technical problem of insufficient security of the Java program of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Construction method and system for Java program trusted execution environment
  • Construction method and system for Java program trusted execution environment
  • Construction method and system for Java program trusted execution environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The embodiments of the present invention will be described in detail below with reference to the accompanying drawings, but the present invention can be implemented in various ways defined and covered by the claims.

[0043] figure 1 Is the overall flow chart of the present invention; The present invention comprises the following steps:

[0044] The first step is to build a Java program trusted execution environment. The Java program trusted execution environment is composed of a coprocessor board, a main processor, and a TPM chip. The coprocessor board, the main processor, and the TPM chip are all inserted into the motherboard. .

[0045] The memory chip requires more than 1GB of running memory, and the flash memory chip requires more than 4GB of solidified flash memory.

[0046] The second step is to configure the security requirement level of the Java application deployed on the main processor.

[0047] The third step is to configure the Java application measureme...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a construction method for a Java program trusted execution environment. The method comprises the steps that a coprocessor board card is constructed, and the coprocessor board card is connected with a mainboard, wherein the coprocessor comprises a coprocessor chip, a memory chip and a flash chip; a main processor and a TPM chip are inserted into the mainboard, and the main processor, the coprocessor board card and the TPM chip are mutually connected; a person fills the security requirement level of each Java application in a Java application security requirement level configuration table, wherein the Java application name and hash value are written into a Java application measurement experience table of the coprocessor board card flash chip, and processing is conducted separately according to the security level. Accordingly, the Java trusted execution environment is constructed under the support of the TPM chip and the coprocessor board card, a high security Java application is executed in an isolated mode in a coprocessor transparent to a user, measurement and verification are conducted on a coprocessor drive program and a Java application program through the TPM chip, and the security of executing the Java application is greatly strengthened.

Description

technical field [0001] The present invention relates to the technical field of establishing a trusted execution environment for application programs, in particular to a method for building a trusted execution environment for Java application programs written based on the Java language. Background technique [0002] With the rapid development of computer and Internet technology, human beings have entered the "information age". Information systems are more and more widely used in politics, economy, education and military fields. However, problems such as system flaws, policy loopholes, and malicious attacks have been seriously threatening the security of information systems. How to effectively resist various security threats and improve the reliability of information systems has always been a hot issue in the field of information security. [0003] Java technology utilizes Java Virtual Machine (Java Virtual Machine, JVM) to realize platform-independent, front-end design lang...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/53
CPCG06F21/53
Inventor 张妲
Owner 湖南文盾智链科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products