Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Execution environment virtualization method and apparatus, and virtual execution environment access method and apparatus

An execution environment and virtual machine technology, applied in the field of virtualization, can solve problems such as loss, and achieve the effect of ensuring security, avoiding illegal modifications, and ensuring data security

Active Publication Date: 2017-08-11
HUAWEI TECH CO LTD
View PDF10 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Obviously, this completely loses the essential function of Trusted Execution Environment to provide a secure execution environment for secure applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Execution environment virtualization method and apparatus, and virtual execution environment access method and apparatus
  • Execution environment virtualization method and apparatus, and virtual execution environment access method and apparatus
  • Execution environment virtualization method and apparatus, and virtual execution environment access method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to enable those skilled in the art to better understand the solution of the present invention, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings and implementation manners.

[0051] The mobile terminal has a trusted execution environment and a common execution environment provided by the hardware. In order to ensure the data security of the user's security application, the security application with high data security requirements is run separately in the trusted execution environment, while the normal Applications run in a common execution environment isolated from said trusted execution environment. However, since the current mobile terminal hardware can only provide a trusted execution environment for configured multiple virtual machines, all virtual machine users on the mobile terminal have to share the same trusted execution environment for running their respective security appli...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an execution environment virtualization method. The method is applied to a mobile terminal. The mobile terminal has a general execution environment provided by hardware. The method comprises the steps of establishing a general virtual machine and a trusted virtual machine for a user in the general execution environment, wherein the general virtual machine is used for executing a general application of the user, and the trusted virtual machine is used for executing a secure application of the user; performing memory allocation for the general virtual machine and the trusted virtual machine, and establishing a mapping relationship between a general memory of the general virtual machine and a physical memory to obtain a first memory mapping table; and establishing a mapping relationship between a virtual physical memory of the trusted virtual machine and the physical memory to obtain a second memory mapping table. According to the method, the two virtual machines are used to simulate the general execution environment and the trusted execution environment for the user, so that the general application and the secure application can run in the independent execution environments, the execution environments of the secure application and the general application are isolated, and the user data security is ensured.

Description

technical field [0001] The invention relates to the technical field of virtualization, in particular to a method and device for virtualizing an execution environment and accessing the virtual execution environment. Background technique [0002] With the increasing popularity of mobile terminals, more and more data closely related to user privacy are stored in them, which also makes people pay more and more attention to the security of mobile terminals. An existing mainstream security solution is to use the trusted execution environment provided by the hardware to isolate the security application running in the mobile terminal from the common application, that is, the security application runs in the trusted execution environment provided by the hardware of the mobile terminal, while the common application Then run in the common execution environment provided by the hardware of the mobile terminal. Hardware-level isolation can effectively protect secure applications in TEEs ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F9/455G06F21/62
CPCG06F9/45558G06F12/1483G06F21/629G06F2212/1052G06F2221/2141G06F2009/45583G06F2009/45579G06F12/109G06F12/1433G06F12/1441G06F12/1491G06F2212/151G06F2212/656G06F2212/657G06F21/53G06F2009/45587G06F9/4812G06F9/5077G06F2009/45595
Inventor 华志超夏虞斌陈海波
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products