Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Rapid authentication method and system for trusted execution environment

A technology of execution environment and authentication method, applied in transmission systems, digital transmission systems, secure communication devices, etc., and can solve problems such as complex processes, inability to reuse enclaves, and unfavorable applications processing requests from multiple users at the same time. , to achieve the effect of reducing interfaces, improving ease of use and security

Active Publication Date: 2021-08-31
INST FOR INTERDISCIPLINARY INFORMATION CORE TECH XIAN CO LTD
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] However, the existing remote authentication mainly has two bottlenecks: one is that the enclave cannot be reused well, and frequent authentication is required to establish trust, which is not conducive to the application to process multiple user requests at the same time, and does not meet the high requirements of cloud services. Throughput requirements
2. The one-time authentication process itself is a very time-consuming work, the process is complicated, and the overhead is relatively large, which may even exceed the actual calculation overhead.
Brutally authenticating every enclave an application contains would impose a huge overhead on the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Rapid authentication method and system for trusted execution environment
  • Rapid authentication method and system for trusted execution environment
  • Rapid authentication method and system for trusted execution environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The present invention will be further described in detail below in conjunction with specific embodiments, which are explanations of the present invention rather than limitations.

[0056] A fast authentication method and system for a trusted execution environment of the present invention, related technical terms and explanations will be involved in the description of the embodiments, summarized in Table 1 below.

[0057] Table 1 Explanation of relevant technical terms.

[0058]

[0059]

[0060] A fast authentication method of a trusted execution environment in the present invention, such as figure 1 shown, which includes,

[0061] When the trusted execution environment is initialized, the proxy enclave receives the certification request from the service provider, pre-generates and obtains its own certification report;

[0062] The subordinate enclaves managed by the proxy enclave initiate authentication requests in turn, and perform verification and authenticat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a rapid authentication method and system for a trusted execution environment, which are reasonable in design, fast in enclave authentication speed, small in calculation overhead and capable of rapidly establishing a trusted communication channel. The method comprises the following steps: when a trusted execution environment is initialized, an agent enclave receives an authentication request of a service provider, and pre-generates and obtains an own authentication report; the subordinate enclaves managed by the agent enclave sequentially initiate authentication requests, verification authentication is carried out according to a preset authentication program, if all the subordinate enclaves pass authentication, a safe communication channel between the agent enclave and the subordinate enclaves managed by the agent enclave is established, and otherwise, initialization is stopped; after initialization is completed, a user service request is received, and a pre-generated proxy enclave authentication report corresponding to the service request is sent to the user; and after interactive authentication with the user, the communication content is encrypted, a trusted communication channel between the user and the agent enclave and the slave enclave managed by the agent enclave is established, and rapid authentication of the trusted execution environment is completed.

Description

technical field [0001] The invention relates to an authentication method in an Internet environment, in particular to a fast authentication method and system in a trusted execution environment. Background technique [0002] With the rapid development of the Internet industry and computers, our lives are inseparable from computers. Computer security and data privacy have always been hot topics in academia and industry. Especially in the Internet environment, there are major security problems in network services. On the one hand, the data provider is worried that the service provider will collect its own private data, and on the other hand, it is worried that the service provider's platform will be controlled by attackers. [0003] The SGX technology proposed by Intel in 2013 is a technology designed to solve the above-mentioned secure remote computing problems through remote trusted hardware. Based on processor hardware, SGX provides attestation, isolated execution and sea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L63/0884H04L63/0823H04L9/3268H04L9/3247H04L63/123H04L9/0869H04L9/0819H04L63/0435
Inventor 李发兵林伟伟李想毛兴中
Owner INST FOR INTERDISCIPLINARY INFORMATION CORE TECH XIAN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products