CN106354687B - Data transmission method and system - Google Patents

Data transmission method and system Download PDF

Info

Publication number
CN106354687B
CN106354687B CN201610752474.0A CN201610752474A CN106354687B CN 106354687 B CN106354687 B CN 106354687B CN 201610752474 A CN201610752474 A CN 201610752474A CN 106354687 B CN106354687 B CN 106354687B
Authority
CN
China
Prior art keywords
address space
data
shared memory
layer
trusted application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610752474.0A
Other languages
Chinese (zh)
Other versions
CN106354687A (en
Inventor
吴东南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Meizu Technology Co Ltd
Original Assignee
Meizu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Meizu Technology Co Ltd filed Critical Meizu Technology Co Ltd
Priority to CN201610752474.0A priority Critical patent/CN106354687B/en
Publication of CN106354687A publication Critical patent/CN106354687A/en
Application granted granted Critical
Publication of CN106354687B publication Critical patent/CN106354687B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/38Information transfer, e.g. on bus
    • G06F13/42Bus transfer protocol, e.g. handshake; Synchronisation

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention provides a data transmission method and a data transmission system.A TA layer sends a data transmission request to a secure driver layer, sends first data stored in a first address space of the TA layer and the first data of the TA layer to a shared memory establishing a first mapping relation with the first address space, and the secure driver layer acquires the first data from the shared memory according to the received request and stores the first data to a second address space establishing a second mapping relation with the shared memory; wherein the first mapping relation and the second mapping relation are kept unchanged. The interaction system overhead of the TA layer and the secure driver layer is reduced, and the communication efficiency is improved. The invention relates to the technical field of embedding.

Description

Data transmission method and system
Technical Field
The present invention relates to the field of embedded technologies, and in particular, to a data transmission method and system.
Background
In order to add security control in the software, hardware and physical characteristic design of an embedded product and ensure that the product is not attacked by external malicious attacks, an Advanced Reduced Instruction chip (ARM) provides different working modes, including: normal world (normal world) and secure (secure world) modes. Under normal world, a normally used operating system (such as an android system) can be run, and under secureworld, a system program related to data security can be maintained. Trustonic provides a TEE (Trusted Execution Environments) solution for secure world of ARM: t-base solution.
the t-base can be regarded as a simple operating system running under the ARM secure world, and the system can be divided into two layers, namely a Trusted Application layer (TA) and a secure driver layer (secure driver). The system comprises a secure driver layer, a normal network layer, a hardware protection mechanism and a TA layer, wherein the secure driver layer is positioned at a bottom layer and directly faces hardware operation, because the secure driver layer runs on secure world, hardware resources operated by the secure driver layer are not operable for normal world, the hardware protection mechanism is provided by ARM, the TA layer is an upper application layer, software logic operation is completed mainly based on an interface provided by the secure driver, and the operating mechanism is similar to that of Linux: the bottom layer loads the mechanism, and the upper layer is responsible for the strategy.
The operation of the TA layer and the secure driver layer will be described below by taking a fingerprint chip as an example. The fingerprint chip can be regarded as belonging to a hardware resource related to data security, can be located under secure world, is directly operated by a secure driver layer, provides a relevant read-write interface for a TA layer, and realizes logic relevant operations of a fingerprint chip algorithm by the TA layer, for example: the TA layer obtains fingerprint data through the secure driver layer, performs algorithm processing, completes fingerprint matching and the like, and then transmits a result of whether the fingerprints are matched to the normal world through the TA layer.
From the above process, when operating the hardware resource under secure world, the TA layer and secure driver layer need to interact frequently. In the prior art, the interaction between the TA layer and the secure driver layer includes: the TA layer is provided with a data segment in the address space of the TA layer, the data segment is mainly used for storing commands to be sent by the TA layer or corresponding parameters and the like, when the interaction with the secure driver layer is needed, the TA layer can send an Inter-Process Communication (IPC) request to the secure driver layer, and after the IPC request is received by the secure driver layer, the interface provided by the t-base is used for moving the data segment in the address space of the TA layer, which stores the commands or the parameters, into the address space of the secure driver layer integrally and analyzing the stored commands or parameters to complete the corresponding operation.
For some hardware under secure world, the TA layer and secure driver layer need to interact frequently when in use, for example: some fingerprint chips provided by manufacturers need to frequently set registers to execute a drawing collecting function, and each time the TA layer and the secure driver layer are interacted, respective virtual address allocation and mapping with a shared memory physical address are performed, so that not only is the system overhead large, but also the communication efficiency is reduced, and the hardware is too long in time consumption.
Disclosure of Invention
The embodiment of the invention provides a data transmission method and a data transmission system, which are used for solving the problems of high system overhead and low communication efficiency caused by the interaction mode of the existing TA layer and secure driver layer.
Based on the above problem, an embodiment of the present invention provides a data transmission method, including:
the trusted application layer sends a request for data transmission to the security driver layer;
the trusted application layer sends first data stored in a first address space of the trusted application layer to a shared memory which establishes a first mapping relation with the first address space;
the security driver layer acquires the first data from the shared memory according to the request, and stores the first data to a second address space of the security driver layer which establishes a second mapping relation with the shared memory;
wherein the first mapping relationship and the second mapping relationship remain unchanged.
The data transmission method provided by the invention further comprises the following steps:
the security driver layer sends second data stored in the second address space to the shared memory, wherein the second data is generated according to the first data;
the security driver layer sends a response message for the request to the trusted application layer;
and the trusted application layer acquires the second data from the shared memory according to the response message and stores the second data to the first address space.
The first address space is kept unchanged in the life cycle of the trusted application layer, and the second address space is kept unchanged in the life cycle of the secure driver layer.
Further, before the trusted application layer sends the first data stored in the first address space of the trusted application layer to the shared memory that establishes the first mapping relationship with the first address space, the method further includes:
when a trusted application layer sends a request for data transmission to the security driver layer, the trusted application layer stores initial data in a first address space of the trusted application layer address space; mapping the first address space to a physical memory to obtain a shared memory of the physical memory;
when the security driving layer receives the request, mapping the shared memory to an address space of the security driving layer to obtain a second address space;
the security driver layer stores the initial data obtained from the shared memory in the second address space.
Further, the method of the invention can also comprise the following steps: and improving the operating frequency of the shared memory.
An embodiment of the present invention further provides a data transmission system, including:
the trusted application layer is used for sending a data transmission request to the security driver layer; sending first data stored in a first address space of the trusted application layer to a shared memory which establishes a first mapping relation with the first address space;
the security driver layer is used for acquiring the first data from the shared memory according to the request and storing the first data to a second address space of the security driver layer which establishes a second mapping relation with the shared memory;
wherein the first mapping relationship and the second mapping relationship remain unchanged.
Further, the security driver layer is further configured to send second data stored in the second address space to the shared memory, where the second data is generated according to the first data; and sending a response message to the trusted application layer for the request;
the trusted application layer is further configured to obtain the second data from the shared memory according to the response message, and store the second data in the first address space.
Further, the trusted application layer is further configured to, before sending the first data stored in the first address space of the trusted application layer to the shared memory that establishes the first mapping relationship with the first address space, store the initial data in the first address space when sending a request for data transmission to the security driver layer; mapping the first address space to a physical memory to obtain a shared memory of the physical memory;
the secure driver layer is further configured to map the shared memory to an address space of the secure driver layer when receiving the request, and obtain a second address space; and storing the initial data obtained from the shared memory in the second address space.
The system also comprises a frequency adjusting interface used for adjusting the running frequency of the shared memory.
The embodiment of the invention has the beneficial effects that:
in the data transmission method and system provided by the embodiment of the invention, the TA layer sends a data transmission request to the secure driver layer, and sends first data stored in a first address space of the TA layer and the first data in the first address space to the shared memory in which a first mapping relationship is established, and the secure driver layer acquires the first data from the shared memory according to the received request and stores the first data to a second address space in which a second mapping relationship is established with the shared memory; wherein the first mapping relation and the second mapping relation are kept unchanged. It can be seen that, in the data transmission method provided in the embodiment of the present invention, the TA layer and the secure driver layer respectively allocate a first address space and a second address space in their own address spaces, and respectively map with the shared memory of the physical memory, and the mapping relationship remains unchanged, compared with the prior art in which the TA layer and the secure driver layer respectively allocate an address space for each interaction and establish a mapping relationship with the shared memory of the physical memory for each interaction, the TA layer and the secure driver layer respectively allocate an address space for the transmitted data, and then the mapping relationship established between the allocated address space and the shared memory also remains unchanged, and when the TA layer and the secure driver layer interact each time, the shared memory is operated through the fixed address space, and it is not necessary to allocate an address space and establish a mapping relationship with the shared memory for each interaction, the interaction system overhead of the TA layer and the secure driver layer is reduced, the communication efficiency is improved, the system overhead of the hardware under the secure driver layer in use is reduced, and the response speed of the hardware is accelerated.
Drawings
Fig. 1 is a schematic structural diagram of a t-base system including a TA layer and a secure driver layer according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a data transmission method according to an embodiment of the present invention;
fig. 3 is a schematic flow chart of another data transmission method according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a data transmission system according to an embodiment of the present invention.
Detailed Description
The present invention provides a data transmission method and system, and the following description is made in conjunction with the accompanying drawings, and it should be understood that the preferred embodiments described herein are only for illustrating and explaining the present invention and are not intended to limit the present invention. And the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
Fig. 1 is a schematic structural diagram of a t-base system including a TA layer 101 and a secure driver layer 102 according to an embodiment of the present invention.
An embodiment of the present invention provides a data transmission method, as shown in fig. 2, including:
s201, the trusted application layer 101 sends a request for data transmission to the security driver layer 102.
In an implementation, the security driver layer 102 may start a waiting thread after starting up, for waiting for a request of the trusted application layer 101, and the waiting thread can receive a data transmission request sent by the trusted application layer 101 to the security driver layer 102.
Further, the data transmission request in this step may be an IPC (Inter-Process Communication) request.
S202, the trusted application layer 101 sends the first data stored in the first address space of the trusted application layer 101 to the shared memory that establishes the first mapping relationship with the first address space.
The process can be allocated with its own address space when running, and the processes can not realize mutual communication by directly accessing the address space of the other side, but need a special inter-process communication mode, for example: communication is performed through a shared memory. Therefore, when data is transmitted between the trusted application layer 101 and the secure driver layer 102, the address space of the other party cannot be directly accessed, but needs to pass through a shared memory.
In the prior art, each time data transmission is performed, and each time a TA layer and a secure driver layer need to interact with each other, the TA layer applies for a storage address for data to be transmitted this time in its own address space, and maps the applied virtual address with a physical address of a shared memory, and similarly, the secure driver layer applies for a storage address for the acquired data in its own address space before moving the acquired data stored in the TA layer to its own address space, and maps the applied virtual address with a physical address of a shared memory. That is, the process of "applying for a virtual address space — mapping the virtual address space to a physical space" is performed for each data transmission, which results in high system overhead and reduced communication efficiency. Therefore, in the embodiment of the present invention, the first address space and the first mapping relationship between the first address space and the physical address of the shared memory are kept unchanged, so that when data transmission is performed subsequently, it is not necessary to reallocate the address space and perform mapping for the address space again, but the established first address space and the established second address space which are dedicated to storing data and the shared memory which has the first mapping relationship with the first address space and the second mapping relationship with the second address space are directly used, thereby reducing system overhead and improving communication efficiency.
S203, the security driver layer 102 obtains the first data from the shared memory according to the request in S201, and stores the first data in the second address space of the security driver layer that establishes the second mapping relationship with the shared memory; wherein the first mapping relation and the second mapping relation are kept unchanged.
In the prior art, each time the security driver layer 102 acquires data from a physical address of a shared memory, it also needs to apply for an address space for the data in its own address space, establish a mapping relationship between the physical address of the shared memory and the address space, and then store the acquired data in the applied address space, which has large system overhead and low communication efficiency.
The method and system provided by the present invention will be described in detail with specific embodiments in conjunction with the accompanying drawings.
Example 1:
in embodiment 1 of the present invention, a data transmission method is provided, as shown in fig. 3, which specifically includes the following steps:
s301, when the trusted application layer 101 sends a request for data transmission to the security driver layer 102, the trusted application layer 101 stores the initial data in the first address space of the trusted application layer 101.
S302, the trusted application layer 101 maps the first address space to the physical memory, and obtains a shared memory of the physical memory.
S303, when the security driver layer 102 receives the request in S301, mapping the shared memory to the address space of the security driver layer 102 to obtain a second address space.
S304, the security driver layer 102 stores the initial data obtained from the shared memory in the second address space.
The scheme of this embodiment further includes a process of establishing a mapping relationship between the trusted application layer 101 and the secure driver layer 102 and the shared memory of the physical memory.
Specifically, in the lifetime of the trusted application layer 101, when a data transmission request needs to be sent to the security driver layer 102 for the first time, initial data (which may be a command, a parameter, or the like) to be transmitted may be stored in the allocated first address space, and a first mapping relationship between the first address space and a physical address of the shared memory is triggered to be established, so as to obtain the shared memory of the physical memory; in the lifetime of the security driver layer 102, when a data transmission request sent by the trusted application layer 101 is received for the first time, it may be triggered to establish a second mapping relationship between the shared memory and the address space of the security driver layer 102, that is, to obtain a second address space, and store the initial data stored in the shared memory to the second address space.
Further, the first address space remains unchanged during the lifetime of the trusted application layer 101, and the second address space remains unchanged during the lifetime of the secure driver layer 102. That is to say, in the subsequent data transmission process of the trusted application layer 101 and the security driver layer 102, the first mapping relationship and the second mapping relationship are kept unchanged, that is, new address space allocation and mapping between a new address space and a shared memory are not performed for the transmitted data, and the allocated address space and the established mapping relationship are repeatedly used, so that not only is the system overhead saved, but also the data transmission efficiency is improved. It can be seen that steps S301 to S304 may be performed once, and steps S305 to S310 may be performed each time data transmission is performed subsequently.
Further, the life cycle of the trusted application layer 101 and the secure driver layer 102 may be understood as from the start operation of the corresponding program (including the start operation or the restart operation after the program is finished), to the end of the normal operation of the corresponding program, or to the forced end of the corresponding program when an error occurs during the operation process.
S305, the trusted application layer 101 sends a request for data transmission to the security driver layer 102.
Step S305 is not strictly sequential to the execution of steps S303 to S304, that is, step S305 can be executed after the first mapping of the first address space and the shared memory is completed (i.e., after step S302 is executed).
S306, the trusted application layer 101 sends the first data stored in the first address space of the trusted application layer 101 to the shared memory that establishes the first mapping relationship with the first address space.
S307, the security driver layer 102 obtains the first data from the shared memory according to the request in S305, and stores the first data in the second address space of the security driver layer that establishes the second mapping relationship with the shared memory; wherein the first mapping relation and the second mapping relation are kept unchanged.
Further, before steps S305 to S307, mapping relationships may be respectively established between the trusted application layer 101 and the secure driver layer 102 and the shared memory, and data transmission may be performed through the mapping relationships that remain unchanged. The first data may be commands, parameters, etc.
S308, the security driver layer 102 sends the second data stored in the second address space to the shared memory, where the second data is generated according to the first data.
S309, the security driver layer 102 sends a response message to the trusted application layer 101 for the request in S305.
S310, the trusted application layer 101 obtains the second data from the shared memory according to the response message in S309, and stores the second data in the first address space.
Further, steps S308 to S310 may be executed when the security driver layer 102 needs to respond to the first data and send the second data after receiving the first data sent by the trusted application layer 101, and for a case where the second data does not need to be sent, steps S308 to S310 may not be executed.
In steps S308 to S310, the security driver layer 102 may store the second data in the second address space, and send the second data to the shared memory based on the established mapping relationship between the second address space and the shared memory. And sending a response message to the trusted application layer 101 to prompt the trusted application layer 101 to acquire the second data, where the trusted application layer 101 acquires the second data from the shared memory based on the established mapping relationship between the first address space and the shared memory, and stores the second data in the first address space.
Therefore, the trusted application layer 101 and the secure driver layer 102 complete inter-process communication in a shared memory manner, and by fixing the mapping relationship between the shared memory and the address space allocated for the transmitted data, the overhead of the data transmission process is small, and the transmission efficiency is improved.
In order to further improve the transmission efficiency, the operation frequency of the shared memory may also be increased, so that the faster the memory operation speed is, the less time is consumed by the communication between the trusted application layer 101 and the secure driver layer 102. In specific implementation, the memory may be locked to a higher operating frequency by using an interface provided by the system, which is not described herein again.
Based on the same inventive concept, embodiments of the present invention further provide a data transmission system, and because the principle of the problems solved by these systems is similar to the foregoing data transmission method, the implementation of the system may refer to the implementation of the foregoing method, and repeated details are not repeated.
As shown in fig. 4, a data transmission system provided in an embodiment of the present invention includes:
the trusted application layer 401 is configured to send a request for data transmission to the security driver layer 402; sending first data stored in a first address space of the trusted application layer 401 to a shared memory which establishes a first mapping relationship with the first address space;
the secure driver layer 402 is configured to obtain the first data from the shared memory according to the request, and store the first data in a second address space of the secure driver layer 402, where a second mapping relationship is established with the shared memory; wherein the first mapping relationship and the second mapping relationship remain unchanged.
Further, the security driver layer 402 is further configured to send second data stored in the second address space to the shared memory, where the second data is generated according to the first data; and sending a response message to the trusted application layer 401 for the request;
the trusted application layer 401 is further configured to obtain the second data from the shared memory according to the response message, and store the second data in the first address space.
Further, the first address space remains unchanged in the lifetime of the trusted application layer 401, and the second address space remains unchanged in the lifetime of the secure driver layer 402.
Further, the trusted application layer 401 is further configured to, before sending the first data stored in the first address space of the trusted application layer 401 to the shared memory that establishes the first mapping relationship with the first address space, store the initial data in the first address space when sending a request for data transmission to the security driver layer 402; mapping the first address space to a physical memory to obtain a shared memory of the physical memory;
the security driver layer 402 is further configured to map the shared memory to an address space of the security driver layer when receiving the request, and obtain a second address space; and storing the initial data obtained from the shared memory in the second address space.
Further, the system further comprises: a frequency adjustment interface 403, configured to adjust an operating frequency of the shared memory;
the functions of the interfaces may correspond to the corresponding processing steps in the flows shown in fig. 2 to fig. 3, and are not described herein again.
Through the above description of the embodiments, it is clear to those skilled in the art that the embodiments of the present invention may be implemented by hardware, or by software plus a necessary general hardware platform. Based on such understanding, the technical solutions of the embodiments of the present invention may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.), and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods according to the embodiments of the present invention.
Those skilled in the art will appreciate that the drawings are merely schematic representations of one preferred embodiment and that the blocks or flow diagrams in the drawings are not necessarily required to practice the present invention.
Those skilled in the art will appreciate that the modules in the devices in the embodiments may be distributed in the devices in the embodiments according to the description of the embodiments, and may be correspondingly changed in one or more devices different from the embodiments. The modules of the above embodiments may be combined into one module, or further split into multiple sub-modules.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (8)

1. A method of data transmission, comprising:
the trusted application layer sends a request for data transmission to the security driver layer;
the trusted application layer sends first data stored in a first address space of the trusted application layer to a shared memory which establishes a first mapping relation with the first address space;
the security driver layer acquires the first data from the shared memory according to the request, and stores the first data to a second address space of the security driver layer which establishes a second mapping relation with the shared memory;
improving the operating frequency of the shared memory, and locking the operating frequency of the memory by using an interface provided by a system;
wherein the first mapping relationship and the second mapping relationship remain unchanged.
2. The method of claim 1, further comprising:
the security driver layer sends second data stored in the second address space to the shared memory, wherein the second data is generated according to the first data;
the security driver layer sends a response message for the request to the trusted application layer;
and the trusted application layer acquires the second data from the shared memory according to the response message and stores the second data to the first address space.
3. The method of claim 1 or 2, wherein the first address space remains unchanged during a lifetime of the trusted application layer and the second address space remains unchanged during a lifetime of the secure driver layer.
4. The method of claim 3, wherein before the trusted application layer sends the first data stored in the first address space of the trusted application layer to the shared memory that establishes the first mapping relationship with the first address space, further comprising:
when a trusted application layer sends a request for data transmission to the security driver layer, the trusted application layer stores initial data in a first address space of the trusted application layer address space; mapping the first address space to a physical memory to obtain a shared memory of the physical memory;
when the security driving layer receives the request, mapping the shared memory to an address space of the security driving layer to obtain a second address space;
the security driver layer stores the initial data obtained from the shared memory in the second address space.
5. A data transmission system, comprising:
the trusted application layer is used for sending a data transmission request to the security driver layer; sending first data stored in a first address space of the trusted application layer to a shared memory which establishes a first mapping relation with the first address space;
the security driver layer is used for acquiring the first data from the shared memory according to the request and storing the first data to a second address space of the security driver layer which establishes a second mapping relation with the shared memory;
the frequency adjusting interface is used for adjusting the running frequency of the shared memory and locking the running frequency of the memory by using an interface provided by a system;
wherein the first mapping relationship and the second mapping relationship remain unchanged.
6. The system of claim 5, wherein the security driver layer is further configured to send second data stored in the second address space to the shared memory, wherein the second data is generated according to the first data; and sending a response message to the trusted application layer for the request;
the trusted application layer is further configured to obtain the second data from the shared memory according to the response message, and store the second data in the first address space.
7. The system of claim 5 or 6, wherein the first address space remains unchanged during a lifetime of the trusted application layer and the second address space remains unchanged during a lifetime of the secure driver layer.
8. The system of claim 7, wherein the trusted application layer is further configured to store initial data in a first address space of the trusted application layer when sending a request for data transfer to the secure driver layer before sending the first data stored in the first address space to the shared memory that establishes the first mapping relationship with the first address space; mapping the first address space to a physical memory to obtain a shared memory of the physical memory;
the secure driver layer is further configured to map the shared memory to an address space of the secure driver layer when receiving the request, and obtain a second address space; and storing the initial data obtained from the shared memory in the second address space.
CN201610752474.0A 2016-08-29 2016-08-29 Data transmission method and system Active CN106354687B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610752474.0A CN106354687B (en) 2016-08-29 2016-08-29 Data transmission method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610752474.0A CN106354687B (en) 2016-08-29 2016-08-29 Data transmission method and system

Publications (2)

Publication Number Publication Date
CN106354687A CN106354687A (en) 2017-01-25
CN106354687B true CN106354687B (en) 2020-01-03

Family

ID=57854791

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610752474.0A Active CN106354687B (en) 2016-08-29 2016-08-29 Data transmission method and system

Country Status (1)

Country Link
CN (1) CN106354687B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107329410B (en) * 2017-06-23 2019-10-25 唐山钢铁集团微尔自动化有限公司 A kind of fast data store method of industrial stokehold
CN109460373B (en) * 2017-09-06 2022-08-26 阿里巴巴集团控股有限公司 Data sharing method, terminal equipment and storage medium
CN110427274B (en) * 2019-07-16 2020-07-17 阿里巴巴集团控股有限公司 Data transmission method and device in TEE system
US11003785B2 (en) 2019-07-16 2021-05-11 Advanced New Technologies Co., Ltd. Data transmission method and apparatus in tee systems
CN110399235B (en) 2019-07-16 2020-07-28 阿里巴巴集团控股有限公司 Multithreading data transmission method and device in TEE system
US10699015B1 (en) 2020-01-10 2020-06-30 Alibaba Group Holding Limited Method and apparatus for data transmission in a tee system
CN110442462B (en) 2019-07-16 2020-07-28 阿里巴巴集团控股有限公司 Multithreading data transmission method and device in TEE system
CN110442463B (en) * 2019-07-16 2020-07-07 阿里巴巴集团控股有限公司 Data transmission method and device in TEE system
CN111148039B (en) * 2019-12-09 2021-06-01 西安电子科技大学 Customized position data privacy protection system and method for mobile terminal application
CN113434089B (en) * 2021-06-29 2022-08-16 苏州科达科技股份有限公司 Data moving method and device and PCIE system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102110196B (en) * 2009-12-25 2015-04-29 中国长城计算机深圳股份有限公司 Method and system for safely transmitting data among parallel-running multiple user operating systems
CN104572313B (en) * 2013-10-22 2018-03-13 华为技术有限公司 Communication means and device between a kind of process
CN104392188B (en) * 2014-11-06 2017-10-27 三星电子(中国)研发中心 A kind of secure data store method and system
CN109871717A (en) * 2016-02-29 2019-06-11 华为技术有限公司 A kind of data security transmission device and method

Also Published As

Publication number Publication date
CN106354687A (en) 2017-01-25

Similar Documents

Publication Publication Date Title
CN106354687B (en) Data transmission method and system
US10701139B2 (en) Life cycle management method and apparatus
US7823023B2 (en) Test framework for testing an application
US9342326B2 (en) Allocating identified intermediary tasks for requesting virtual machines within a trust sphere on a processing goal
WO2013030432A1 (en) Methods and apparatuses for providing a virtual machine with dynamic assignment of a physical hardware resource
US10970105B2 (en) Storage device operation method and physical server
CN107370622B (en) Method and system for multiplexing host machine MAC and IP by virtual machine
CN106683035B (en) GPU acceleration method and device
US20240086228A1 (en) Resource Configuration Method and Apparatus, Electronic Device, and Computer-Readable Storage Medium
US20230221997A1 (en) System and method for subscription management using composed systems
US10318343B2 (en) Migration methods and apparatuses for migrating virtual machine including locally stored and shared data
CN111143031A (en) Method and device for changing capacity of virtual machine
US9467532B2 (en) Server, arithmatic processing method, and arithmatic processing system
CN116860391A (en) GPU computing power resource scheduling method, device, equipment and medium
CN116028455A (en) Data processing method and device, storage medium and electronic equipment
RU2600538C2 (en) Launching applications on basis of message transmission interface (mpi) in heterogeneous medium
CN113296926A (en) Resource allocation method, computing device and storage medium
CN108984270B (en) Memory allocation method and device for virtual machine
CN105677481B (en) A kind of data processing method, system and electronic equipment
CN113285843B (en) Container network configuration method and device, computer readable medium and electronic equipment
US20190205156A1 (en) Container access method and apparatus
JP6878570B2 (en) Methods and devices for resource reconfiguration
WO2016172978A1 (en) Software security verification method, equipment and system
US9569241B2 (en) Sharing devices assigned to virtual machines using runtime exclusion
US20150227383A1 (en) Application program virtualization system and method of virtualizing application program of user terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant