CN108021823A - Method, device and terminal for seamlessly running application program based on trusted execution environment - Google Patents

Method, device and terminal for seamlessly running application program based on trusted execution environment Download PDF

Info

Publication number
CN108021823A
CN108021823A CN201711262367.0A CN201711262367A CN108021823A CN 108021823 A CN108021823 A CN 108021823A CN 201711262367 A CN201711262367 A CN 201711262367A CN 108021823 A CN108021823 A CN 108021823A
Authority
CN
China
Prior art keywords
memory
destination application
tee
file system
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711262367.0A
Other languages
Chinese (zh)
Inventor
高连凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yuanxin Technology
Original Assignee
Yuanxin Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yuanxin Technology filed Critical Yuanxin Technology
Priority to CN201711262367.0A priority Critical patent/CN108021823A/en
Publication of CN108021823A publication Critical patent/CN108021823A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a method, a device and a terminal for tracelessly running an application program based on a trusted execution environment, wherein the method comprises the following steps: when the starting of the target application program is monitored, a memory file system corresponding to the target application program is created in a memory of the trusted execution environment TEE; running a target application program in an internal memory file system; when the operation of the target application program is monitored to be finished, the related data in the memory file system is deleted, and the memory file system is unloaded from the memory of the TEE.

Description

Method, apparatus and terminal based on the seamless operation application program of credible performing environment
Technical field
The present invention relates to mobile internet technical field, and specifically, the present invention relates to one kind to be based on credible performing environment The method, apparatus and terminal of seamless operation application program.
Background technology
Mobile Internet is mobile communication and internet development to the inevitable development direction of certain phase and fusion product.But With the fast development of mobile Internet, the safety problem for having triggered some to protrude.During user's using terminal equipment, On the one hand, since mobile terminal often installs extensive application, usage scenario is more and complicated, the various viral wooden horses one in internet Directly do not stopping to seek an opportunity to the progress illegal invasion of each terminal device, to steal the privacy information of user;On the other hand, terminal is set It is standby to there is the risk lost unavoidably, also bring along leaking data problem.Two aspect problem of the above causes data on terminal device Safety problem is increasingly prominent, personal private data, and all there will be the threat being stolen for enterprise-essential information.For example, we are frequent It can read from network to since personal payment by using short messages password is stolen, and then suffer the news of economic loss;And it is numerous The enterprise's application run in mobile terminal, the data also all feared in terminal are illegally accessed.Even exist more extreme Data theft means, data are read after can mobile phone storage equipment component be removed using special reading equipment.
Traditional is encrypted user's sensitive data in terminal device and private data by encryption technology, Neng Gouyi Determine illegally to be stolen data after solving the problems, such as the mobile device losses in part in degree.But data encryption still have it is various Problem, such as:Often clear text key is stored in terminal device in the prior art, though ciphertext data can not be used directly, eventually After end equipment is lost, disabled user still can obtain clear text key by illegally traveling through the memory block of whole terminal device, so that Ciphertext is decrypted.In addition, except the sensitive data to storage and private data are stolen, for answering in operational process With program, there is also the danger of leak data.Main cause be exactly application program in the process of running, store in Dram Data completely are applied, once the Dram where application program operation will be stolen easily by unauthorized access, data.
The content of the invention
To overcome above-mentioned technical problem or solving above-mentioned technical problem at least in part, spy proposes following technical scheme:
The present invention provides a kind of method based on the seamless operation application program of credible performing environment, includes the following steps:
When monitoring that destination application starts, being created in the memory of credible performing environment TEE should with the target With the corresponding memory file system of program;
The destination application is run in the memory file system;
When monitoring that the destination application terminates operation, the related data in the memory file system is deleted, And the memory file system is unloaded from the memory of the TEE.
Specifically, the memory of the credible performing environment TEE is to be distributed in system cold start-up according to presumptive address size 's.
Further, before destination application starts, further include:
The TEE authorizes the destination application;
Wherein, before described the step of running the destination application in the memory file system, further include:
The TEE is authenticated the licensing status of the destination application.
It is described when monitoring that destination application starts when including multiple application container systems in practical application, The step of memory file system corresponding with the destination application is created in the memory of credible performing environment TEE includes:
Determine the application container system residing for the destination application;
Corresponding memory file system is created in the memory of the TEE based on the application container system.
Alternatively, before the step of destination application starts is monitored, further include:
When the installation kit for monitoring destination application starts operation, the installation kit of the destination application is obtained, And store into the memory of the TEE.
The present invention also provides a kind of device based on the seamless operation application program of credible performing environment, including:
Memory file system creation module, for when monitor destination application start when, in credible performing environment TEE Memory in create corresponding with destination application memory file system;
Application program runs module, for running the destination application in the memory file system;
Deletion and Unload module, for when monitoring that the destination application terminates operation, deleting the memory text Related data in part system, and the memory file system is unloaded from the memory of the TEE.
Further, described device further includes:Authorization module,
The authorization module is used for before destination application startup, and the TEE awards the destination application Power;
The authorization module is additionally operable to the TEE and the licensing status of the destination application is authenticated.
In practical application, when including multiple application container systems, the memory file system creation module is specifically used for Determine the application container system residing for the destination application;And
The memory file system creation module is specifically used for based on the application container system in the memory of the TEE Create corresponding memory file system.
Alternatively, described device further includes, and installation kit obtains and storage module, and destination application is monitored for working as When installation kit starts operation, the installation kit of the destination application is obtained, and store into the memory of the TEE.
The present invention also provides a kind of terminal, including memory, processor and storage are on a memory and can be on a processor The computer program of operation, the processor realize the method described in any of the above-described when performing described program.
In the above-mentioned scheme based on the seamless operation application program of credible performing environment, when monitoring that destination application opens When dynamic, memory file system corresponding with destination application is created in the memory of credible performing environment TEE;In memory file Operational objective application program in system;When monitoring that destination application terminates operation, the phase in memory file system is deleted Data are closed, and memory file system is unloaded from the memory of TEE, the present invention combines TEE technologies, by the operation data of application program In safe and reliable memory isolate preserve, since TEE technologies are hardware based isolating means, be effectively ensured operate in it is dynamic The security using data in state memory, the complete application data for avoiding storing in Dram are stolen, and are tied in operation These are removed during beam in time and applies data, leaves no trace, further avoids the danger of leaking data.
The additional aspect of the present invention and advantage will be set forth in part in the description, these will become from the following description Obtain substantially, or recognized by the practice of the present invention.
Brief description of the drawings
Of the invention above-mentioned and/or additional aspect and advantage will become from the following description of the accompanying drawings of embodiments Substantially and it is readily appreciated that, wherein:
Fig. 1 is that the flow of the method provided in an embodiment of the present invention based on the seamless operation application program of credible performing environment is shown It is intended to;
Fig. 2 is the structure diagram of memory file system provided in an embodiment of the present invention;
Fig. 3 is the structure diagram of multiple application container systems provided in an embodiment of the present invention;
Fig. 4 is that the frame of the device provided in an embodiment of the present invention based on the seamless operation application program of credible performing environment shows It is intended to.
Embodiment
The embodiment of the present invention is described below in detail, the example of the embodiment is shown in the drawings, wherein from beginning to end Same or similar label represents same or similar element or has the function of same or like element.Below with reference to attached The embodiment of figure description is exemplary, and is only used for explaining the present invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative " one " used herein, " one It is a ", " described " and "the" may also comprise plural form.It is to be further understood that what is used in the specification of the present invention arranges Diction " comprising " refer to there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition One or more other features, integer, step, operation, element, component and/or their groups.It should be understood that when we claim member Part is " connected " or during " coupled " to another element, it can be directly connected or coupled to other elements, or there may also be Intermediary element.In addition, " connection " used herein or " coupling " can include wireless connection or wireless coupling.It is used herein to arrange Taking leave "and/or" includes whole or any cell and all combinations of one or more associated list items.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art Language and scientific terminology), there is the meaning identical with the general understanding of the those of ordinary skill in fields of the present invention.Should also Understand, those terms such as defined in the general dictionary, it should be understood that have with the context of the prior art The consistent meaning of meaning, and unless by specific definitions as here, idealization or the implication of overly formal otherwise will not be used To explain.
The technical solution of the embodiment of the present invention is specifically introduced below in conjunction with the accompanying drawings.
An embodiment of the present invention provides a kind of method based on the seamless operation application program of credible performing environment, such as Fig. 1 institutes Show, include the following steps:
Step S110:When monitoring that destination application starts, establishment and mesh in the memory of credible performing environment TEE Mark the corresponding memory file system of application program.
Wherein, TEE (Trusted Execution Environment, credible performing environment), is GP (Global Platform, global platform International Standards Organization) propose arm processor on safety approach.Its cardinal principle is namely based on The bus access of hardware, safer world and non-security world's two parts by hardware isolated are divided into by terminal resource, and respectively Resource is labeled with the mark of two kinds of performing environments respectively, and the resource for being identified as safe condition can only pacified by TEE access controls Switching needs special instruction and secure configuration registers between the whole world and the non-security world.
Therefore, in the embodiment of the present invention, the secure memory under the TEE of configuration is that the terminal resource for forbidding non-secure states is visited Ask, can ensure to carry out sensitive data in safer world by way of performing partial data secrecy and data access authority And operation, processing, the storage of private data, such as encryption and decryption, signature authentication, security strategy, credible metric algorithm, root can be disposed The security context identification such as key mode carries out authentication to the terminal resource for accessing TEE secure memories, avoids disliking from hardware The access of meaning, substantially increases the security of mobile terminal.
Specifically, in the embodiment of the present invention, the memory of TEE is to be distributed in system cold start-up according to presumptive address size , the Dram address space as having 1G in terminal device A altogether from address 0x20000000 to 0x5FFFFFFF, this area skill Art personnel can be allocated according to actual needs, not be limited herein.
As illustratively, in terminal device A, destination application App1 is needs with the application journey of seamless mode operation Sequence, it is marked in the configuration file of App1 by the mark rule of formulation marked with the corresponding of seamless mode operation App1 in advance Know.When the application operation management module in terminal device A monitors that App1 starts, the corresponding mark in App1 configuration files Know information and determine that App1 needs with seamless mode operation, then to create memory file system corresponding with App1 in the memory of TEE, Distribution and the secure memory of the corresponding certain capacities of App1 namely in the TEE memories of terminal device A configurations, in the distribution TEE memories in establish virtual disk, corresponding file system is then established on the disk, and be this document system design phase The data structure answered comes administrative directory, the free space of virtual disk, allocation space etc. has operated, the structure of memory file system Schematic diagram can be found in Fig. 2.
Step S120:The operational objective application program in memory file system;
Specifically, example is connected, in terminal device A, starts in the memory file system created and runs App1.This When, all data that App1 is operationally produced are merely stored in memory file system, since memory file system is located at TEE's In secure memory, data can not be accessed by the terminal resource of non-secure states, protect the data safeties of the App1 operationally.
In the embodiment of the present invention, in order to enable to be run in the memory file system that App1 creates on TEE memories, run Preceding TEE needs in advance to authorize App1.For example, the signature of state safe to carry can be included.
Before App1 is run in memory file system, TEE is authenticated the licensing status of App1, can include pair Its signature carried is verified.If certification success, App1 brings into operation, if authentification failure, App1 abandons running.
Step S130:When monitoring that destination application terminates operation, the related data in memory file system is deleted, And unload memory file system from the memory of TEE.
As illustratively, when the application operation management module of terminal device A monitors that destination application App1 terminates to transport During row, application operation management module deletes total data caused by App1 operations in memory file system, and from the memory of TEE Middle unloading memory file system.Therefore, the untrue write-in persistent storage equipment of data that destination application App1 is produced In, leaking data problem caused by avoiding various viral wooden horse illegal invasions or terminal device loss, further ensures The security of sensitive data and private data.
In a preferred embodiment of the invention, as shown in figure 3, terminal device A can include multiple operating systems, and it is more A operating system shares same system kernel.Multiple operating system in the embodiment of the present invention can be based on a variety of virtual technologies come real It is existing, can specifically include a primary tank system and it is multiple depend on primary tank systematic difference containment system, or can wrap Include multiple application container systems arranged side by side.Wherein, various operating systems include but not limited to Linux, Ubuntu, FireFox, The terminals such as Windows, Android, Windows Mobile, iOS, Maemo, WebOS, Palm OS or BlackberryOS are grasped Make system.
Preferably, application container system can be above-mentioned traditional operating system or to traditional kernel into Row improves and/or outside kernel after (such as ccf layer and application layer) increase function module, obtained operating system.Its In, each application container system and primary tank system share same system kernel, when the operating system in each container is grasped for Linux Make system or be derived based on (SuSE) Linux OS system when, each application container system is based on Linux kernel On namespace frames, by container instance layer, the management function module to device resource in terminal device is added Afterwards, the operating system obtained.
Hereafter implemented by taking the container handling system that Linux container (container) virtualization technology creates as an example The detailed description of example.Wherein, the multiple operating system realized using linux container technology, between multiple application container systems independently of each other, And multiple application container system operations are on same terminal device physical hardware.Therefore, multiple applications are held in the embodiment of the present invention Device system can share the TEE secure memories of same configuration.
Specifically, when system framework layer monitors that destination application starts, which determines intended application Application container system residing for program, and corresponding memory file system is created in the memory of TEE based on application container system. Wherein, system framework layer is located in primary tank system, or the application container system of current interactive interface.
As illustratively, in terminal device A, destination application App1 is needs with the application journey of seamless mode operation Sequence, is transported from the foregoing, it can be understood that App1 is marked by the mark rule of formulation in the configuration file of App1 in advance with seamless pattern The respective identification of row App1.When system framework layer monitors that App1 starts, the respective identification letter in App1 configuration files Breath determines that App1 is needed with seamless mode operation, and system framework layer determines the application container system OS1 residing for App1, for depending on , can be directly by primary tank system operatio OS1, for multiple application container system structures arranged side by side in the OS1 of primary tank system Into multisystem in any OS1, the OS1 can be switched to.Based on OS1, created in the memory of TEE in corresponding with App1 File system is deposited, that is, in the TEE memories of terminal device A configurations in the safety of distribution and the corresponding certain capacities of App1 Deposit, virtual disk is established in the TEE memories of the distribution, corresponding file system is then established on the disk, and be this article The corresponding data structure of part system design comes administrative directory, the free space of virtual disk, allocation space etc. has operated.
After being authenticated successfully to the licensing status of App1, start in fixed OS1 and run App1.
When system framework layer monitors that App1 terminates operation, which deletes App1 in memory file system and transports Total data caused by row, and the memory file system is unloaded from the memory of TEE, it can exit if necessary or switch OS1.
In practical application, between each application container system or with predefined passage can be passed through between primary tank system Or container path communicates with other containment systems, predefined passage can be socket (socket) passage.This feelings Under condition, TEE communication drivings can also be included in terminal hardware equipment, TEE communications drive control destination application can only be with Communicate between other safety applications.
It should be noted that those skilled in the art are it can be appreciated that the resource isolation mechanism of linux kernel, such as Linux Kernel namespace frames, the framework provides the system calling of six kinds of namespace (NameSpace) isolation, wherein, Resource under each namespace be for the resource under other namespace it is transparent, it is sightless, and in user level On can only see the system resource belonged under user oneself namespace, therefore so that each namespace seem just as One single linux system;Those skilled in the art are further appreciated that in software developer's R&D process, establishment Example creates corresponding entity, such as by calling the relevant interface of container instance layer to create the reality of multiple application container systems Example.
It is appreciated that in the embodiment of the present invention, the memory that is created in the application container system residing for destination application File system is the privately owned example of the application container system, invisible to other containment systems, realizes each application container system Data isolation between system, necessary premise guarantee is provided subsequently to ensure that data are highly safe.
In presently preferred embodiment, can destination application install at the beginning of, just to installation data into Row protection.Specifically, when the installation kit for monitoring destination application starts operation, the installation of destination application is obtained Bag, and store into the memory of TEE.
As illustratively, the installation kit Apk1 of destination application App1 is designated as needing to open with seamless pattern through user It is dynamic.When installation management module monitors to Apk1, which start, to be run, center is applied by predetermined way, such as XX, obtains application program The installation kit of App1, and Apk1 is stored into the memory of TEE.At this moment, it is possible to memory file system is created in the memory of TEE System, and App1 is installed into memory file system, can be directly in the memory when system framework layer monitors that App1 starts App1 is run in file system, a new memory file system can also be re-created and be used for running App1, it will be understood that is preceding When person deletes the memory file system of operation data and unloading for operation after App1 end of runs, installation letter can be directly deleted Breath, and the latter can retain mount message, it is necessary to which individually unloading could complete deletion installation for the memory file system installed Information.Those skilled in the art can be configured according to actual conditions, not be limited herein.
It should be noted that when system framework layer monitors that App1 starts, it is necessary to obtain the corresponding executable text of App1 Part, and load the corresponding executable file obtained.Those skilled in the art it can be appreciated that executable file refer to can be with The file of load and execution is carried out by operating system.Under different operating system environments, the presentation mode of executable program differs Sample, for example, under Windows operating system, executable program can be the type files such as .exe files .sys files .com; Executable file format in (SuSE) Linux OS for ELF (Executable and Linkable Format, can perform with Form can be linked) etc..Application operation management module runs App1 based on the executable file loaded.
In the embodiment of the present invention, destination application is directly mounted to memory file system, outside can not get mesh The mount message of application program is marked, while can not also get the All Files that destination application generates in installation process, Such as the binary file that destination application produces in installation process, the security risk that application program is spied upon is avoided.
In an alternative embodiment of the invention, when the application operation management module in terminal device A monitors that multiple targets should Started at the same time with program App1 and App2, based on the above method, establish corresponding memory file system respectively, wherein each memory is literary Part system is mutually independent, under the control of TEE, it is impossible to is accessed mutually when unauthorized, ensure that each intended application It is mutually isolated between the corresponding memory file system of program, and the data in application program operational process can not be obtained illegally Take.
Method provided in an embodiment of the present invention based on the seamless operation application program of credible performing environment, when monitoring target During application program launching, memory file system corresponding with destination application is created in the memory of credible performing environment TEE; The operational objective application program in memory file system;When monitoring that destination application terminates operation, memory file is deleted Related data in system, and memory file system is unloaded from the memory of TEE, combination TEE technologies of the embodiment of the present invention should Isolate preservation in safe and reliable memory with the operation data of program, since TEE technologies are hardware based isolating means, have Effect ensure that the security using data operated in Dram, avoid the complete application data quilt stored in Dram Steal, and remove these in time in end of run and apply data, leave no trace, further avoid the danger of leaking data Danger.
The embodiment of the present invention also provides a kind of device based on the seamless operation application program of credible performing environment, such as Fig. 4 institutes Show, including:
Memory file system creation module 420, for when monitor destination application start when, in credible performing environment Memory file system corresponding with destination application is created in the memory of TEE;
Application program runs module 440, for the operational objective application program in memory file system;
Deletion and Unload module 450, for when monitoring that destination application terminates operation, deleting memory file system In related data, and unload memory file system from the memory of TEE.
Further, device further includes:Authorization module 430,
Authorization module 430 is used for before destination application startup, and TEE authorizes destination application;
Authorization module 430 is additionally operable to TEE and the licensing status of destination application is authenticated.
In practical application, when including multiple application container systems, memory file system creation module 420 is specifically used for true The application container system to set the goal residing for application program;
And memory file system creation module 420 is specifically used for creating in the memory of TEE based on application container system Corresponding memory file system.
Alternatively, device further includes, and installation kit obtains and storage module 410, and destination application is monitored for working as When installation kit starts operation, the installation kit of destination application is obtained, and store into the memory of TEE.
The device that the embodiment of the present invention is provided can be specific hardware in equipment or load on software in equipment Or firmware etc..The technique effect and preceding method embodiment of the device that the embodiment of the present invention is provided, its realization principle and generation Identical, to briefly describe, device embodiment part does not refer to part, refers to corresponding contents in preceding method embodiment, herein Repeat no more.
Device provided in an embodiment of the present invention based on the seamless operation application program of credible performing environment, with reference to TEE technologies, The operation data of application program are isolated to preservation in safe and reliable memory, since TEE technologies are hardware based isolation hands Section, has been effectively ensured the security using data operated in Dram, has avoided the complete application stored in Dram Data are stolen, and remove these in time in end of run and apply data, leave no trace, further avoid leaking data Danger.
The embodiment of the present invention also provides a kind of terminal, including memory, processor and storage on a memory and can located The computer program run on reason device, the processor realize the method described in any of the above-described embodiment when performing described program.
The terminal can be include computer, mobile phone, tablet computer, PDA (Personal Digital Assistant, Personal digital assistant), POS (Point of Sales, point-of-sale terminal), any terminal device such as vehicle-mounted computer.
Wherein, memory can be used for storage software program and module, and processor is stored in the soft of memory by operation Part program and module, so as to perform various functions application and data processing.Memory can mainly include storing program area and Storage data field.In addition, memory can include high-speed random access memory, nonvolatile memory, example can also be included Such as at least one disk memory, flush memory device or other volatile solid-state parts.
Processor is control centre, using various interfaces and the various pieces of the whole terminal of connection, by operation or The software program and/or module being stored in memory are performed, and calls the data being stored in memory, performs various work( Data and can be handled, so as to carry out integral monitoring to terminal.Optionally, processor may include one or more processing units;It is excellent Choosing, processor can integrate application processor and modem processor, wherein, application processor mainly handle operating system, User interface and application program etc., modem processor mainly handles wireless communication.It is understood that above-mentioned modulation /demodulation Processor can not also be integrated into processor.
Those skilled in the art of the present technique be appreciated that can with computer program instructions come realize these structure charts and/or The combination of each frame and these structure charts and/or the frame in block diagram and/or flow graph in block diagram and/or flow graph.This technology is led Field technique personnel be appreciated that these computer program instructions can be supplied to all-purpose computer, special purpose computer or other The processor of programmable data processing method is realized, so that the processing by computer or other programmable data processing methods Device performs the scheme specified in the frame of structure chart and/or block diagram and/or flow graph disclosed by the invention or multiple frames.
Those skilled in the art of the present technique are appreciated that in the various operations discussed in the present invention, method, flow Steps, measures, and schemes can be replaced, changed, combined or be deleted.Further, it is each with having been discussed in the present invention Other steps, measures, and schemes in kind operation, method, flow may also be alternated, changed, rearranged, decomposed, combined or deleted. Further, it is of the prior art to have and the step in the various operations disclosed in the present invention, method, flow, measure, scheme It may also be alternated, changed, rearranged, decomposed, combined or deleted.
The above is only some embodiments of the present invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications also should It is considered as protection scope of the present invention.

Claims (10)

  1. A kind of 1. method based on the seamless operation application program of credible performing environment, it is characterised in that include the following steps:
    When monitoring that destination application starts, created and the intended application journey in the memory of credible performing environment TEE The corresponding memory file system of sequence;
    The destination application is run in the memory file system;
    When monitoring that the destination application terminates operation, the related data in the memory file system is deleted, and from The memory file system is unloaded in the memory of the TEE.
  2. 2. according to the method described in claim 1, it is characterized in that, the memory of the credible performing environment TEE is cold in system According to the distribution of presumptive address size during startup.
  3. 3. according to the method described in claim 1, it is characterized in that, before destination application startup, further include:
    The TEE authorizes the destination application;
    Wherein, before described the step of running the destination application in the memory file system, further include:
    The TEE is authenticated the licensing status of the destination application.
  4. It is 4. described when monitoring according to the method described in claim 1, it is characterized in that, when including multiple application container systems When starting to destination application, created in the memory of credible performing environment TEE in corresponding with the destination application The step of depositing file system includes:
    Determine the application container system residing for the destination application;
    Corresponding memory file system is created in the memory of the TEE based on the application container system.
  5. 5. according to the method described in claim 1, it is characterized in that, monitor destination application start the step of before, Further include:
    When the installation kit for monitoring destination application starts operation, the installation kit of the destination application is obtained, and deposit Put into the memory of the TEE.
  6. A kind of 6. device based on the seamless operation application program of credible performing environment, it is characterised in that including:
    Memory file system creation module, for when monitor destination application start when, in credible performing environment TEE Deposit middle establishment memory file system corresponding with the destination application;
    Application program runs module, for running the destination application in the memory file system;
    Deletion and Unload module, for when monitoring that the destination application terminates operation, deleting the memory file system Related data in system, and the memory file system is unloaded from the memory of the TEE.
  7. 7. device according to claim 6, it is characterised in that further include:Authorization module,
    The authorization module is used for before destination application startup, and the TEE authorizes the destination application;
    The authorization module is additionally operable to the TEE and the licensing status of the destination application is authenticated.
  8. 8. device according to claim 6, it is characterised in that when including multiple application container systems, the memory text Part system creation module is specifically used for determining the application container system residing for the destination application;And
    The memory file system creation module is specifically used for creating in the memory of the TEE based on the application container system Corresponding memory file system.
  9. 9. device according to claim 6, it is characterised in that further include, installation kit obtains and storage module, for when prison When measuring the installation kit startup operation of destination application, the installation kit of the destination application is obtained, and store to described In the memory of TEE.
  10. 10. a kind of terminal, including memory, processor and storage are on a memory and the computer journey that can run on a processor Sequence, it is characterised in that the processor realizes claim 1-5 any one of them methods when performing described program.
CN201711262367.0A 2017-12-04 2017-12-04 Method, device and terminal for seamlessly running application program based on trusted execution environment Pending CN108021823A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711262367.0A CN108021823A (en) 2017-12-04 2017-12-04 Method, device and terminal for seamlessly running application program based on trusted execution environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711262367.0A CN108021823A (en) 2017-12-04 2017-12-04 Method, device and terminal for seamlessly running application program based on trusted execution environment

Publications (1)

Publication Number Publication Date
CN108021823A true CN108021823A (en) 2018-05-11

Family

ID=62078262

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711262367.0A Pending CN108021823A (en) 2017-12-04 2017-12-04 Method, device and terminal for seamlessly running application program based on trusted execution environment

Country Status (1)

Country Link
CN (1) CN108021823A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109828916A (en) * 2018-12-29 2019-05-31 航天信息股份有限公司 A kind of method and system solving memory overflow
CN110298178A (en) * 2019-07-05 2019-10-01 北京可信华泰信息技术有限公司 Credible policy learning method and device, credible and secure management platform
WO2020015416A1 (en) * 2018-07-19 2020-01-23 华为技术有限公司 Display method and device, and storage medium
CN112084490A (en) * 2020-09-09 2020-12-15 南京烽火星空通信发展有限公司 Method and system for realizing protection of software source code based on Linux kernel calling
CN112182557A (en) * 2019-09-19 2021-01-05 中国科学院信息工程研究所 Chip-level built-in active security monitoring architecture implementation method and electronic device
CN113268742A (en) * 2021-04-07 2021-08-17 支付宝(杭州)信息技术有限公司 Data authorization method and device and electronic equipment
CN113505376A (en) * 2021-09-09 2021-10-15 北京全息智信科技有限公司 Control method and device for application program running environment and electronic equipment
WO2021227954A1 (en) * 2020-05-09 2021-11-18 支付宝(杭州)信息技术有限公司 Application access request processing based on container cluster
CN116578968A (en) * 2023-04-24 2023-08-11 国网冀北电力有限公司信息通信分公司 Method and device for providing safety protection for application program in power control system
CN117688017A (en) * 2023-11-15 2024-03-12 北京西能电子科技发展有限公司 Automatic updating method and device for protection area address adapting to AUTOSAR standard
CN117688017B (en) * 2023-11-15 2024-07-05 北京西能电子科技发展有限公司 Automatic updating method and device for protection area address adapting to AUTOSAR standard

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150331698A1 (en) * 2013-01-03 2015-11-19 Giesecke & Devrient Gmbh Method for loading an application consisting of a plurality of components into a device consisting of a plurality of components
CN106845285A (en) * 2016-12-28 2017-06-13 北京握奇智能科技有限公司 A kind of TEE systems coordinate to realize the method and terminal device of service with REE systems
CN107066298A (en) * 2017-04-18 2017-08-18 北京元心科技有限公司 Method and device for running application program without traces
CN107483213A (en) * 2017-08-23 2017-12-15 北京华大智宝电子系统有限公司 A kind of method of safety certification, relevant apparatus and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150331698A1 (en) * 2013-01-03 2015-11-19 Giesecke & Devrient Gmbh Method for loading an application consisting of a plurality of components into a device consisting of a plurality of components
CN106845285A (en) * 2016-12-28 2017-06-13 北京握奇智能科技有限公司 A kind of TEE systems coordinate to realize the method and terminal device of service with REE systems
CN107066298A (en) * 2017-04-18 2017-08-18 北京元心科技有限公司 Method and device for running application program without traces
CN107483213A (en) * 2017-08-23 2017-12-15 北京华大智宝电子系统有限公司 A kind of method of safety certification, relevant apparatus and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
中国人民银行科技司: "《移动金融关键技术与标准解读》", 31 March 2016 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020015416A1 (en) * 2018-07-19 2020-01-23 华为技术有限公司 Display method and device, and storage medium
CN109828916A (en) * 2018-12-29 2019-05-31 航天信息股份有限公司 A kind of method and system solving memory overflow
CN109828916B (en) * 2018-12-29 2023-04-21 航天信息股份有限公司 Method and system for solving memory leakage
CN110298178A (en) * 2019-07-05 2019-10-01 北京可信华泰信息技术有限公司 Credible policy learning method and device, credible and secure management platform
CN110298178B (en) * 2019-07-05 2021-07-27 北京可信华泰信息技术有限公司 Trusted policy learning method and device and trusted security management platform
CN112182557B (en) * 2019-09-19 2022-05-03 中国科学院信息工程研究所 Chip-level built-in active security monitoring architecture implementation method and electronic device
CN112182557A (en) * 2019-09-19 2021-01-05 中国科学院信息工程研究所 Chip-level built-in active security monitoring architecture implementation method and electronic device
WO2021227954A1 (en) * 2020-05-09 2021-11-18 支付宝(杭州)信息技术有限公司 Application access request processing based on container cluster
CN112084490A (en) * 2020-09-09 2020-12-15 南京烽火星空通信发展有限公司 Method and system for realizing protection of software source code based on Linux kernel calling
CN113268742A (en) * 2021-04-07 2021-08-17 支付宝(杭州)信息技术有限公司 Data authorization method and device and electronic equipment
CN113505376B (en) * 2021-09-09 2022-03-08 北京全息智信科技有限公司 Control method and device for application program running environment and electronic equipment
CN113505376A (en) * 2021-09-09 2021-10-15 北京全息智信科技有限公司 Control method and device for application program running environment and electronic equipment
CN116578968A (en) * 2023-04-24 2023-08-11 国网冀北电力有限公司信息通信分公司 Method and device for providing safety protection for application program in power control system
CN117688017A (en) * 2023-11-15 2024-03-12 北京西能电子科技发展有限公司 Automatic updating method and device for protection area address adapting to AUTOSAR standard
CN117688017B (en) * 2023-11-15 2024-07-05 北京西能电子科技发展有限公司 Automatic updating method and device for protection area address adapting to AUTOSAR standard

Similar Documents

Publication Publication Date Title
CN108021823A (en) Method, device and terminal for seamlessly running application program based on trusted execution environment
JP7086908B2 (en) How to authenticate the actions performed on the target computing device
US10579793B2 (en) Managed securitized containers and container communications
CN104903910B (en) Control access of the mobile device to secure data
US9300640B2 (en) Secure virtual machine
CN103843303B (en) The management control method and device of virtual machine, system
CN105340309B (en) Application with multiple operator schemes
CN102948114B (en) Single for accessing enciphered data uses authentication method and system
JP6321041B2 (en) Protecting the results of privileged computing operations
CN105379223B (en) Manage the method and apparatus to the access of ERM
CN102884535B (en) Protected device manages
AU2020234675B2 (en) Binding secure keys of secure guests to a hardware security module
KR102068580B1 (en) Method of securing a computing device
US8984592B1 (en) Enablement of a trusted security zone authentication for remote mobile device management systems and methods
CN103827881B (en) Method and system for the dynamic platform safety in device operating system
US20160314299A1 (en) Mobile Device with Improved Security
US20100146267A1 (en) Systems and methods for providing secure platform services
CN103002445A (en) Safe mobile electronic equipment for providing application services
CN105637523A (en) Secure client drive mapping and file storage system for mobile device management type security
CN105340239A (en) Mobile device locking with context
CN108595983A (en) A kind of hardware structure and application context integrity measurement method based on hardware security isolated execution environment
Ying et al. Truz-view: Developing trustzone user interface for mobile os using delegation integration model
CN108335105A (en) Data processing method and relevant device
CN109190335A (en) A kind of software copyright protecting method and system
US20050081065A1 (en) Method for securely delegating trusted platform module ownership

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180511

RJ01 Rejection of invention patent application after publication