Multi-node authentication method for trusted execution environment

An authentication method and execution environment technology, which is applied in secure communication devices, user identity/authority verification, digital transmission systems, etc., can solve problems such as low algorithm efficiency and inability to provide high-performance and practical solutions, and achieve high execution efficiency Effect

Pending Publication Date: 2022-01-07
TIANYI ELECTRONICS COMMERCE
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to solve this problem, cryptographic tools such as fully homomorphic encryption algorithms can be used, but such algorithms have the problem of low efficiency and cannot provide high-performance and practical solutions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-node authentication method for trusted execution environment
  • Multi-node authentication method for trusted execution environment
  • Multi-node authentication method for trusted execution environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] The present invention as Figure 1-3 As shown, the present invention provides a trusted execution environment multi-node authentication method, assuming that multiple TEE computing nodes form a computing resource pool, and the computing resource management system uniformly allocates computing resources; the resource pool sets a unified access and authentication node (AuthNode), this node assists users to complete the remote authentication process for all allocated TEE computing nodes. The scheme includes two links: user program security deployment and user data security calculation; the main process is described as follows:

[0033] (1). User program security deployment

[0034] The user uploads the computing program to the TEE cloud computing environment and applies for the required computing resources. The computing resource pool allocates TEE computing resources for the user and deploys the user program in the secure computing environment TEE; AutNode starts the remo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a trusted execution environment (TEE) multi-node authentication method, which comprises the following steps of: assuming that a plurality of TEE computing nodes form a computing resource pool, and uniformly distributing computing resources by a computing resource management system; and setting a unified access and authentication node (AuthNode) for the the resource pool, wherein the node assists a user in completing the remote authentication process of all distributed TEE computing nodes. The method has the following advantages: 1, a user can authenticate the code security in the cloud computing environment, and realizes security protection on the computing process through the TEE; 2, the privacy protection of user data can be achieved, the user data are uploaded to the cloud environment in an encrypted state, and the data are only decrypted and used in the TEE; 3, the user can authenticate the correctness of the calculation result to ensure that the calculation result is not tampered; and 4, complete remote authentication is only carried out in a program deployment stage, the TEE authentication process is completed in the cloud environment, the user only needs to carry out simple local verification in the calculation process, and the execution efficiency is high.

Description

technical field [0001] The invention relates to the fields of trusted execution environment, cloud environment, remote authentication and privacy protection, in particular to a multi-node authentication method of trusted execution environment. Background technique [0002] Trusted Executive Environment (TEE) is a secure computing framework that implements data security protection by setting a hardware-based security zone in a general-purpose CPU. Native security protection against tampering or theft. Different from traditional simple security chips, TEE can realize the general computing function supported by CPU. In the traditional CPU+security chip architecture, the security chip provides functions such as encryption, signature, and authentication, and the CPU implements general-purpose computing, so the data in the CPU cannot be effectively protected. In TEE, general computing, encryption, authentication and other functions are all completed inside the CPU, and the encry...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L67/10H04L9/32
CPCH04L63/0428H04L63/123H04L9/3247H04L67/10H04L2209/72
Inventor 贺伟史楠迪汪昌帅徐潜马颂华范磊
Owner TIANYI ELECTRONICS COMMERCE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products