CN108021823A - Method, device and terminal for seamlessly running application program based on trusted execution environment - Google Patents
Method, device and terminal for seamlessly running application program based on trusted execution environment Download PDFInfo
- Publication number
- CN108021823A CN108021823A CN201711262367.0A CN201711262367A CN108021823A CN 108021823 A CN108021823 A CN 108021823A CN 201711262367 A CN201711262367 A CN 201711262367A CN 108021823 A CN108021823 A CN 108021823A
- Authority
- CN
- China
- Prior art keywords
- memory
- destination application
- tee
- file system
- application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 33
- 230000015654 memory Effects 0.000 claims abstract description 146
- 238000009434 installation Methods 0.000 claims description 21
- 238000012544 monitoring process Methods 0.000 claims description 19
- 238000013475 authorization Methods 0.000 claims description 9
- 238000012217 deletion Methods 0.000 claims description 4
- 230000037430 deletion Effects 0.000 claims description 4
- 238000000151 deposition Methods 0.000 claims 1
- 101100264195 Caenorhabditis elegans app-1 gene Proteins 0.000 description 44
- 238000005516 engineering process Methods 0.000 description 12
- 238000010586 diagram Methods 0.000 description 6
- 238000004590 computer program Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 238000002955 isolation Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 238000010168 coupling process Methods 0.000 description 2
- 238000005859 coupling reaction Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000009472 formulation Methods 0.000 description 2
- 238000011900 installation process Methods 0.000 description 2
- 230000009545 invasion Effects 0.000 description 2
- 239000000203 mixture Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000004321 preservation Methods 0.000 description 2
- 238000003672 processing method Methods 0.000 description 2
- 230000032258 transport Effects 0.000 description 2
- 230000003612 virological effect Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a method, a device and a terminal for tracelessly running an application program based on a trusted execution environment, wherein the method comprises the following steps: when the starting of the target application program is monitored, a memory file system corresponding to the target application program is created in a memory of the trusted execution environment TEE; running a target application program in an internal memory file system; when the operation of the target application program is monitored to be finished, the related data in the memory file system is deleted, and the memory file system is unloaded from the memory of the TEE.
Description
Technical field
The present invention relates to mobile internet technical field, and specifically, the present invention relates to one kind to be based on credible performing environment
The method, apparatus and terminal of seamless operation application program.
Background technology
Mobile Internet is mobile communication and internet development to the inevitable development direction of certain phase and fusion product.But
With the fast development of mobile Internet, the safety problem for having triggered some to protrude.During user's using terminal equipment,
On the one hand, since mobile terminal often installs extensive application, usage scenario is more and complicated, the various viral wooden horses one in internet
Directly do not stopping to seek an opportunity to the progress illegal invasion of each terminal device, to steal the privacy information of user;On the other hand, terminal is set
It is standby to there is the risk lost unavoidably, also bring along leaking data problem.Two aspect problem of the above causes data on terminal device
Safety problem is increasingly prominent, personal private data, and all there will be the threat being stolen for enterprise-essential information.For example, we are frequent
It can read from network to since personal payment by using short messages password is stolen, and then suffer the news of economic loss;And it is numerous
The enterprise's application run in mobile terminal, the data also all feared in terminal are illegally accessed.Even exist more extreme
Data theft means, data are read after can mobile phone storage equipment component be removed using special reading equipment.
Traditional is encrypted user's sensitive data in terminal device and private data by encryption technology, Neng Gouyi
Determine illegally to be stolen data after solving the problems, such as the mobile device losses in part in degree.But data encryption still have it is various
Problem, such as:Often clear text key is stored in terminal device in the prior art, though ciphertext data can not be used directly, eventually
After end equipment is lost, disabled user still can obtain clear text key by illegally traveling through the memory block of whole terminal device, so that
Ciphertext is decrypted.In addition, except the sensitive data to storage and private data are stolen, for answering in operational process
With program, there is also the danger of leak data.Main cause be exactly application program in the process of running, store in Dram
Data completely are applied, once the Dram where application program operation will be stolen easily by unauthorized access, data.
The content of the invention
To overcome above-mentioned technical problem or solving above-mentioned technical problem at least in part, spy proposes following technical scheme:
The present invention provides a kind of method based on the seamless operation application program of credible performing environment, includes the following steps:
When monitoring that destination application starts, being created in the memory of credible performing environment TEE should with the target
With the corresponding memory file system of program;
The destination application is run in the memory file system;
When monitoring that the destination application terminates operation, the related data in the memory file system is deleted,
And the memory file system is unloaded from the memory of the TEE.
Specifically, the memory of the credible performing environment TEE is to be distributed in system cold start-up according to presumptive address size
's.
Further, before destination application starts, further include:
The TEE authorizes the destination application;
Wherein, before described the step of running the destination application in the memory file system, further include:
The TEE is authenticated the licensing status of the destination application.
It is described when monitoring that destination application starts when including multiple application container systems in practical application,
The step of memory file system corresponding with the destination application is created in the memory of credible performing environment TEE includes:
Determine the application container system residing for the destination application;
Corresponding memory file system is created in the memory of the TEE based on the application container system.
Alternatively, before the step of destination application starts is monitored, further include:
When the installation kit for monitoring destination application starts operation, the installation kit of the destination application is obtained,
And store into the memory of the TEE.
The present invention also provides a kind of device based on the seamless operation application program of credible performing environment, including:
Memory file system creation module, for when monitor destination application start when, in credible performing environment TEE
Memory in create corresponding with destination application memory file system;
Application program runs module, for running the destination application in the memory file system;
Deletion and Unload module, for when monitoring that the destination application terminates operation, deleting the memory text
Related data in part system, and the memory file system is unloaded from the memory of the TEE.
Further, described device further includes:Authorization module,
The authorization module is used for before destination application startup, and the TEE awards the destination application
Power;
The authorization module is additionally operable to the TEE and the licensing status of the destination application is authenticated.
In practical application, when including multiple application container systems, the memory file system creation module is specifically used for
Determine the application container system residing for the destination application;And
The memory file system creation module is specifically used for based on the application container system in the memory of the TEE
Create corresponding memory file system.
Alternatively, described device further includes, and installation kit obtains and storage module, and destination application is monitored for working as
When installation kit starts operation, the installation kit of the destination application is obtained, and store into the memory of the TEE.
The present invention also provides a kind of terminal, including memory, processor and storage are on a memory and can be on a processor
The computer program of operation, the processor realize the method described in any of the above-described when performing described program.
In the above-mentioned scheme based on the seamless operation application program of credible performing environment, when monitoring that destination application opens
When dynamic, memory file system corresponding with destination application is created in the memory of credible performing environment TEE;In memory file
Operational objective application program in system;When monitoring that destination application terminates operation, the phase in memory file system is deleted
Data are closed, and memory file system is unloaded from the memory of TEE, the present invention combines TEE technologies, by the operation data of application program
In safe and reliable memory isolate preserve, since TEE technologies are hardware based isolating means, be effectively ensured operate in it is dynamic
The security using data in state memory, the complete application data for avoiding storing in Dram are stolen, and are tied in operation
These are removed during beam in time and applies data, leaves no trace, further avoids the danger of leaking data.
The additional aspect of the present invention and advantage will be set forth in part in the description, these will become from the following description
Obtain substantially, or recognized by the practice of the present invention.
Brief description of the drawings
Of the invention above-mentioned and/or additional aspect and advantage will become from the following description of the accompanying drawings of embodiments
Substantially and it is readily appreciated that, wherein:
Fig. 1 is that the flow of the method provided in an embodiment of the present invention based on the seamless operation application program of credible performing environment is shown
It is intended to;
Fig. 2 is the structure diagram of memory file system provided in an embodiment of the present invention;
Fig. 3 is the structure diagram of multiple application container systems provided in an embodiment of the present invention;
Fig. 4 is that the frame of the device provided in an embodiment of the present invention based on the seamless operation application program of credible performing environment shows
It is intended to.
Embodiment
The embodiment of the present invention is described below in detail, the example of the embodiment is shown in the drawings, wherein from beginning to end
Same or similar label represents same or similar element or has the function of same or like element.Below with reference to attached
The embodiment of figure description is exemplary, and is only used for explaining the present invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative " one " used herein, " one
It is a ", " described " and "the" may also comprise plural form.It is to be further understood that what is used in the specification of the present invention arranges
Diction " comprising " refer to there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition
One or more other features, integer, step, operation, element, component and/or their groups.It should be understood that when we claim member
Part is " connected " or during " coupled " to another element, it can be directly connected or coupled to other elements, or there may also be
Intermediary element.In addition, " connection " used herein or " coupling " can include wireless connection or wireless coupling.It is used herein to arrange
Taking leave "and/or" includes whole or any cell and all combinations of one or more associated list items.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art
Language and scientific terminology), there is the meaning identical with the general understanding of the those of ordinary skill in fields of the present invention.Should also
Understand, those terms such as defined in the general dictionary, it should be understood that have with the context of the prior art
The consistent meaning of meaning, and unless by specific definitions as here, idealization or the implication of overly formal otherwise will not be used
To explain.
The technical solution of the embodiment of the present invention is specifically introduced below in conjunction with the accompanying drawings.
An embodiment of the present invention provides a kind of method based on the seamless operation application program of credible performing environment, such as Fig. 1 institutes
Show, include the following steps:
Step S110:When monitoring that destination application starts, establishment and mesh in the memory of credible performing environment TEE
Mark the corresponding memory file system of application program.
Wherein, TEE (Trusted Execution Environment, credible performing environment), is GP (Global
Platform, global platform International Standards Organization) propose arm processor on safety approach.Its cardinal principle is namely based on
The bus access of hardware, safer world and non-security world's two parts by hardware isolated are divided into by terminal resource, and respectively
Resource is labeled with the mark of two kinds of performing environments respectively, and the resource for being identified as safe condition can only pacified by TEE access controls
Switching needs special instruction and secure configuration registers between the whole world and the non-security world.
Therefore, in the embodiment of the present invention, the secure memory under the TEE of configuration is that the terminal resource for forbidding non-secure states is visited
Ask, can ensure to carry out sensitive data in safer world by way of performing partial data secrecy and data access authority
And operation, processing, the storage of private data, such as encryption and decryption, signature authentication, security strategy, credible metric algorithm, root can be disposed
The security context identification such as key mode carries out authentication to the terminal resource for accessing TEE secure memories, avoids disliking from hardware
The access of meaning, substantially increases the security of mobile terminal.
Specifically, in the embodiment of the present invention, the memory of TEE is to be distributed in system cold start-up according to presumptive address size
, the Dram address space as having 1G in terminal device A altogether from address 0x20000000 to 0x5FFFFFFF, this area skill
Art personnel can be allocated according to actual needs, not be limited herein.
As illustratively, in terminal device A, destination application App1 is needs with the application journey of seamless mode operation
Sequence, it is marked in the configuration file of App1 by the mark rule of formulation marked with the corresponding of seamless mode operation App1 in advance
Know.When the application operation management module in terminal device A monitors that App1 starts, the corresponding mark in App1 configuration files
Know information and determine that App1 needs with seamless mode operation, then to create memory file system corresponding with App1 in the memory of TEE,
Distribution and the secure memory of the corresponding certain capacities of App1 namely in the TEE memories of terminal device A configurations, in the distribution
TEE memories in establish virtual disk, corresponding file system is then established on the disk, and be this document system design phase
The data structure answered comes administrative directory, the free space of virtual disk, allocation space etc. has operated, the structure of memory file system
Schematic diagram can be found in Fig. 2.
Step S120:The operational objective application program in memory file system;
Specifically, example is connected, in terminal device A, starts in the memory file system created and runs App1.This
When, all data that App1 is operationally produced are merely stored in memory file system, since memory file system is located at TEE's
In secure memory, data can not be accessed by the terminal resource of non-secure states, protect the data safeties of the App1 operationally.
In the embodiment of the present invention, in order to enable to be run in the memory file system that App1 creates on TEE memories, run
Preceding TEE needs in advance to authorize App1.For example, the signature of state safe to carry can be included.
Before App1 is run in memory file system, TEE is authenticated the licensing status of App1, can include pair
Its signature carried is verified.If certification success, App1 brings into operation, if authentification failure, App1 abandons running.
Step S130:When monitoring that destination application terminates operation, the related data in memory file system is deleted,
And unload memory file system from the memory of TEE.
As illustratively, when the application operation management module of terminal device A monitors that destination application App1 terminates to transport
During row, application operation management module deletes total data caused by App1 operations in memory file system, and from the memory of TEE
Middle unloading memory file system.Therefore, the untrue write-in persistent storage equipment of data that destination application App1 is produced
In, leaking data problem caused by avoiding various viral wooden horse illegal invasions or terminal device loss, further ensures
The security of sensitive data and private data.
In a preferred embodiment of the invention, as shown in figure 3, terminal device A can include multiple operating systems, and it is more
A operating system shares same system kernel.Multiple operating system in the embodiment of the present invention can be based on a variety of virtual technologies come real
It is existing, can specifically include a primary tank system and it is multiple depend on primary tank systematic difference containment system, or can wrap
Include multiple application container systems arranged side by side.Wherein, various operating systems include but not limited to Linux, Ubuntu, FireFox,
The terminals such as Windows, Android, Windows Mobile, iOS, Maemo, WebOS, Palm OS or BlackberryOS are grasped
Make system.
Preferably, application container system can be above-mentioned traditional operating system or to traditional kernel into
Row improves and/or outside kernel after (such as ccf layer and application layer) increase function module, obtained operating system.Its
In, each application container system and primary tank system share same system kernel, when the operating system in each container is grasped for Linux
Make system or be derived based on (SuSE) Linux OS system when, each application container system is based on Linux kernel
On namespace frames, by container instance layer, the management function module to device resource in terminal device is added
Afterwards, the operating system obtained.
Hereafter implemented by taking the container handling system that Linux container (container) virtualization technology creates as an example
The detailed description of example.Wherein, the multiple operating system realized using linux container technology, between multiple application container systems independently of each other,
And multiple application container system operations are on same terminal device physical hardware.Therefore, multiple applications are held in the embodiment of the present invention
Device system can share the TEE secure memories of same configuration.
Specifically, when system framework layer monitors that destination application starts, which determines intended application
Application container system residing for program, and corresponding memory file system is created in the memory of TEE based on application container system.
Wherein, system framework layer is located in primary tank system, or the application container system of current interactive interface.
As illustratively, in terminal device A, destination application App1 is needs with the application journey of seamless mode operation
Sequence, is transported from the foregoing, it can be understood that App1 is marked by the mark rule of formulation in the configuration file of App1 in advance with seamless pattern
The respective identification of row App1.When system framework layer monitors that App1 starts, the respective identification letter in App1 configuration files
Breath determines that App1 is needed with seamless mode operation, and system framework layer determines the application container system OS1 residing for App1, for depending on
, can be directly by primary tank system operatio OS1, for multiple application container system structures arranged side by side in the OS1 of primary tank system
Into multisystem in any OS1, the OS1 can be switched to.Based on OS1, created in the memory of TEE in corresponding with App1
File system is deposited, that is, in the TEE memories of terminal device A configurations in the safety of distribution and the corresponding certain capacities of App1
Deposit, virtual disk is established in the TEE memories of the distribution, corresponding file system is then established on the disk, and be this article
The corresponding data structure of part system design comes administrative directory, the free space of virtual disk, allocation space etc. has operated.
After being authenticated successfully to the licensing status of App1, start in fixed OS1 and run App1.
When system framework layer monitors that App1 terminates operation, which deletes App1 in memory file system and transports
Total data caused by row, and the memory file system is unloaded from the memory of TEE, it can exit if necessary or switch OS1.
In practical application, between each application container system or with predefined passage can be passed through between primary tank system
Or container path communicates with other containment systems, predefined passage can be socket (socket) passage.This feelings
Under condition, TEE communication drivings can also be included in terminal hardware equipment, TEE communications drive control destination application can only be with
Communicate between other safety applications.
It should be noted that those skilled in the art are it can be appreciated that the resource isolation mechanism of linux kernel, such as Linux
Kernel namespace frames, the framework provides the system calling of six kinds of namespace (NameSpace) isolation, wherein,
Resource under each namespace be for the resource under other namespace it is transparent, it is sightless, and in user level
On can only see the system resource belonged under user oneself namespace, therefore so that each namespace seem just as
One single linux system;Those skilled in the art are further appreciated that in software developer's R&D process, establishment
Example creates corresponding entity, such as by calling the relevant interface of container instance layer to create the reality of multiple application container systems
Example.
It is appreciated that in the embodiment of the present invention, the memory that is created in the application container system residing for destination application
File system is the privately owned example of the application container system, invisible to other containment systems, realizes each application container system
Data isolation between system, necessary premise guarantee is provided subsequently to ensure that data are highly safe.
In presently preferred embodiment, can destination application install at the beginning of, just to installation data into
Row protection.Specifically, when the installation kit for monitoring destination application starts operation, the installation of destination application is obtained
Bag, and store into the memory of TEE.
As illustratively, the installation kit Apk1 of destination application App1 is designated as needing to open with seamless pattern through user
It is dynamic.When installation management module monitors to Apk1, which start, to be run, center is applied by predetermined way, such as XX, obtains application program
The installation kit of App1, and Apk1 is stored into the memory of TEE.At this moment, it is possible to memory file system is created in the memory of TEE
System, and App1 is installed into memory file system, can be directly in the memory when system framework layer monitors that App1 starts
App1 is run in file system, a new memory file system can also be re-created and be used for running App1, it will be understood that is preceding
When person deletes the memory file system of operation data and unloading for operation after App1 end of runs, installation letter can be directly deleted
Breath, and the latter can retain mount message, it is necessary to which individually unloading could complete deletion installation for the memory file system installed
Information.Those skilled in the art can be configured according to actual conditions, not be limited herein.
It should be noted that when system framework layer monitors that App1 starts, it is necessary to obtain the corresponding executable text of App1
Part, and load the corresponding executable file obtained.Those skilled in the art it can be appreciated that executable file refer to can be with
The file of load and execution is carried out by operating system.Under different operating system environments, the presentation mode of executable program differs
Sample, for example, under Windows operating system, executable program can be the type files such as .exe files .sys files .com;
Executable file format in (SuSE) Linux OS for ELF (Executable and Linkable Format, can perform with
Form can be linked) etc..Application operation management module runs App1 based on the executable file loaded.
In the embodiment of the present invention, destination application is directly mounted to memory file system, outside can not get mesh
The mount message of application program is marked, while can not also get the All Files that destination application generates in installation process,
Such as the binary file that destination application produces in installation process, the security risk that application program is spied upon is avoided.
In an alternative embodiment of the invention, when the application operation management module in terminal device A monitors that multiple targets should
Started at the same time with program App1 and App2, based on the above method, establish corresponding memory file system respectively, wherein each memory is literary
Part system is mutually independent, under the control of TEE, it is impossible to is accessed mutually when unauthorized, ensure that each intended application
It is mutually isolated between the corresponding memory file system of program, and the data in application program operational process can not be obtained illegally
Take.
Method provided in an embodiment of the present invention based on the seamless operation application program of credible performing environment, when monitoring target
During application program launching, memory file system corresponding with destination application is created in the memory of credible performing environment TEE;
The operational objective application program in memory file system;When monitoring that destination application terminates operation, memory file is deleted
Related data in system, and memory file system is unloaded from the memory of TEE, combination TEE technologies of the embodiment of the present invention should
Isolate preservation in safe and reliable memory with the operation data of program, since TEE technologies are hardware based isolating means, have
Effect ensure that the security using data operated in Dram, avoid the complete application data quilt stored in Dram
Steal, and remove these in time in end of run and apply data, leave no trace, further avoid the danger of leaking data
Danger.
The embodiment of the present invention also provides a kind of device based on the seamless operation application program of credible performing environment, such as Fig. 4 institutes
Show, including:
Memory file system creation module 420, for when monitor destination application start when, in credible performing environment
Memory file system corresponding with destination application is created in the memory of TEE;
Application program runs module 440, for the operational objective application program in memory file system;
Deletion and Unload module 450, for when monitoring that destination application terminates operation, deleting memory file system
In related data, and unload memory file system from the memory of TEE.
Further, device further includes:Authorization module 430,
Authorization module 430 is used for before destination application startup, and TEE authorizes destination application;
Authorization module 430 is additionally operable to TEE and the licensing status of destination application is authenticated.
In practical application, when including multiple application container systems, memory file system creation module 420 is specifically used for true
The application container system to set the goal residing for application program;
And memory file system creation module 420 is specifically used for creating in the memory of TEE based on application container system
Corresponding memory file system.
Alternatively, device further includes, and installation kit obtains and storage module 410, and destination application is monitored for working as
When installation kit starts operation, the installation kit of destination application is obtained, and store into the memory of TEE.
The device that the embodiment of the present invention is provided can be specific hardware in equipment or load on software in equipment
Or firmware etc..The technique effect and preceding method embodiment of the device that the embodiment of the present invention is provided, its realization principle and generation
Identical, to briefly describe, device embodiment part does not refer to part, refers to corresponding contents in preceding method embodiment, herein
Repeat no more.
Device provided in an embodiment of the present invention based on the seamless operation application program of credible performing environment, with reference to TEE technologies,
The operation data of application program are isolated to preservation in safe and reliable memory, since TEE technologies are hardware based isolation hands
Section, has been effectively ensured the security using data operated in Dram, has avoided the complete application stored in Dram
Data are stolen, and remove these in time in end of run and apply data, leave no trace, further avoid leaking data
Danger.
The embodiment of the present invention also provides a kind of terminal, including memory, processor and storage on a memory and can located
The computer program run on reason device, the processor realize the method described in any of the above-described embodiment when performing described program.
The terminal can be include computer, mobile phone, tablet computer, PDA (Personal Digital Assistant,
Personal digital assistant), POS (Point of Sales, point-of-sale terminal), any terminal device such as vehicle-mounted computer.
Wherein, memory can be used for storage software program and module, and processor is stored in the soft of memory by operation
Part program and module, so as to perform various functions application and data processing.Memory can mainly include storing program area and
Storage data field.In addition, memory can include high-speed random access memory, nonvolatile memory, example can also be included
Such as at least one disk memory, flush memory device or other volatile solid-state parts.
Processor is control centre, using various interfaces and the various pieces of the whole terminal of connection, by operation or
The software program and/or module being stored in memory are performed, and calls the data being stored in memory, performs various work(
Data and can be handled, so as to carry out integral monitoring to terminal.Optionally, processor may include one or more processing units;It is excellent
Choosing, processor can integrate application processor and modem processor, wherein, application processor mainly handle operating system,
User interface and application program etc., modem processor mainly handles wireless communication.It is understood that above-mentioned modulation /demodulation
Processor can not also be integrated into processor.
Those skilled in the art of the present technique be appreciated that can with computer program instructions come realize these structure charts and/or
The combination of each frame and these structure charts and/or the frame in block diagram and/or flow graph in block diagram and/or flow graph.This technology is led
Field technique personnel be appreciated that these computer program instructions can be supplied to all-purpose computer, special purpose computer or other
The processor of programmable data processing method is realized, so that the processing by computer or other programmable data processing methods
Device performs the scheme specified in the frame of structure chart and/or block diagram and/or flow graph disclosed by the invention or multiple frames.
Those skilled in the art of the present technique are appreciated that in the various operations discussed in the present invention, method, flow
Steps, measures, and schemes can be replaced, changed, combined or be deleted.Further, it is each with having been discussed in the present invention
Other steps, measures, and schemes in kind operation, method, flow may also be alternated, changed, rearranged, decomposed, combined or deleted.
Further, it is of the prior art to have and the step in the various operations disclosed in the present invention, method, flow, measure, scheme
It may also be alternated, changed, rearranged, decomposed, combined or deleted.
The above is only some embodiments of the present invention, it is noted that for the ordinary skill people of the art
For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications also should
It is considered as protection scope of the present invention.
Claims (10)
- A kind of 1. method based on the seamless operation application program of credible performing environment, it is characterised in that include the following steps:When monitoring that destination application starts, created and the intended application journey in the memory of credible performing environment TEE The corresponding memory file system of sequence;The destination application is run in the memory file system;When monitoring that the destination application terminates operation, the related data in the memory file system is deleted, and from The memory file system is unloaded in the memory of the TEE.
- 2. according to the method described in claim 1, it is characterized in that, the memory of the credible performing environment TEE is cold in system According to the distribution of presumptive address size during startup.
- 3. according to the method described in claim 1, it is characterized in that, before destination application startup, further include:The TEE authorizes the destination application;Wherein, before described the step of running the destination application in the memory file system, further include:The TEE is authenticated the licensing status of the destination application.
- It is 4. described when monitoring according to the method described in claim 1, it is characterized in that, when including multiple application container systems When starting to destination application, created in the memory of credible performing environment TEE in corresponding with the destination application The step of depositing file system includes:Determine the application container system residing for the destination application;Corresponding memory file system is created in the memory of the TEE based on the application container system.
- 5. according to the method described in claim 1, it is characterized in that, monitor destination application start the step of before, Further include:When the installation kit for monitoring destination application starts operation, the installation kit of the destination application is obtained, and deposit Put into the memory of the TEE.
- A kind of 6. device based on the seamless operation application program of credible performing environment, it is characterised in that including:Memory file system creation module, for when monitor destination application start when, in credible performing environment TEE Deposit middle establishment memory file system corresponding with the destination application;Application program runs module, for running the destination application in the memory file system;Deletion and Unload module, for when monitoring that the destination application terminates operation, deleting the memory file system Related data in system, and the memory file system is unloaded from the memory of the TEE.
- 7. device according to claim 6, it is characterised in that further include:Authorization module,The authorization module is used for before destination application startup, and the TEE authorizes the destination application;The authorization module is additionally operable to the TEE and the licensing status of the destination application is authenticated.
- 8. device according to claim 6, it is characterised in that when including multiple application container systems, the memory text Part system creation module is specifically used for determining the application container system residing for the destination application;AndThe memory file system creation module is specifically used for creating in the memory of the TEE based on the application container system Corresponding memory file system.
- 9. device according to claim 6, it is characterised in that further include, installation kit obtains and storage module, for when prison When measuring the installation kit startup operation of destination application, the installation kit of the destination application is obtained, and store to described In the memory of TEE.
- 10. a kind of terminal, including memory, processor and storage are on a memory and the computer journey that can run on a processor Sequence, it is characterised in that the processor realizes claim 1-5 any one of them methods when performing described program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711262367.0A CN108021823A (en) | 2017-12-04 | 2017-12-04 | Method, device and terminal for seamlessly running application program based on trusted execution environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711262367.0A CN108021823A (en) | 2017-12-04 | 2017-12-04 | Method, device and terminal for seamlessly running application program based on trusted execution environment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108021823A true CN108021823A (en) | 2018-05-11 |
Family
ID=62078262
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711262367.0A Pending CN108021823A (en) | 2017-12-04 | 2017-12-04 | Method, device and terminal for seamlessly running application program based on trusted execution environment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108021823A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109828916A (en) * | 2018-12-29 | 2019-05-31 | 航天信息股份有限公司 | A kind of method and system solving memory overflow |
CN110298178A (en) * | 2019-07-05 | 2019-10-01 | 北京可信华泰信息技术有限公司 | Credible policy learning method and device, credible and secure management platform |
WO2020015416A1 (en) * | 2018-07-19 | 2020-01-23 | 华为技术有限公司 | Display method and device, and storage medium |
CN112084490A (en) * | 2020-09-09 | 2020-12-15 | 南京烽火星空通信发展有限公司 | Method and system for realizing protection of software source code based on Linux kernel calling |
CN112182557A (en) * | 2019-09-19 | 2021-01-05 | 中国科学院信息工程研究所 | Chip-level built-in active security monitoring architecture implementation method and electronic device |
CN113268742A (en) * | 2021-04-07 | 2021-08-17 | 支付宝(杭州)信息技术有限公司 | Data authorization method and device and electronic equipment |
CN113505376A (en) * | 2021-09-09 | 2021-10-15 | 北京全息智信科技有限公司 | Control method and device for application program running environment and electronic equipment |
WO2021227954A1 (en) * | 2020-05-09 | 2021-11-18 | 支付宝(杭州)信息技术有限公司 | Application access request processing based on container cluster |
CN116578968A (en) * | 2023-04-24 | 2023-08-11 | 国网冀北电力有限公司信息通信分公司 | Method and device for providing safety protection for application program in power control system |
CN117688017A (en) * | 2023-11-15 | 2024-03-12 | 北京西能电子科技发展有限公司 | Automatic updating method and device for protection area address adapting to AUTOSAR standard |
CN117688017B (en) * | 2023-11-15 | 2024-07-05 | 北京西能电子科技发展有限公司 | Automatic updating method and device for protection area address adapting to AUTOSAR standard |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150331698A1 (en) * | 2013-01-03 | 2015-11-19 | Giesecke & Devrient Gmbh | Method for loading an application consisting of a plurality of components into a device consisting of a plurality of components |
CN106845285A (en) * | 2016-12-28 | 2017-06-13 | 北京握奇智能科技有限公司 | A kind of TEE systems coordinate to realize the method and terminal device of service with REE systems |
CN107066298A (en) * | 2017-04-18 | 2017-08-18 | 北京元心科技有限公司 | Method and device for running application program without traces |
CN107483213A (en) * | 2017-08-23 | 2017-12-15 | 北京华大智宝电子系统有限公司 | A kind of method of safety certification, relevant apparatus and system |
-
2017
- 2017-12-04 CN CN201711262367.0A patent/CN108021823A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150331698A1 (en) * | 2013-01-03 | 2015-11-19 | Giesecke & Devrient Gmbh | Method for loading an application consisting of a plurality of components into a device consisting of a plurality of components |
CN106845285A (en) * | 2016-12-28 | 2017-06-13 | 北京握奇智能科技有限公司 | A kind of TEE systems coordinate to realize the method and terminal device of service with REE systems |
CN107066298A (en) * | 2017-04-18 | 2017-08-18 | 北京元心科技有限公司 | Method and device for running application program without traces |
CN107483213A (en) * | 2017-08-23 | 2017-12-15 | 北京华大智宝电子系统有限公司 | A kind of method of safety certification, relevant apparatus and system |
Non-Patent Citations (1)
Title |
---|
中国人民银行科技司: "《移动金融关键技术与标准解读》", 31 March 2016 * |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020015416A1 (en) * | 2018-07-19 | 2020-01-23 | 华为技术有限公司 | Display method and device, and storage medium |
CN109828916A (en) * | 2018-12-29 | 2019-05-31 | 航天信息股份有限公司 | A kind of method and system solving memory overflow |
CN109828916B (en) * | 2018-12-29 | 2023-04-21 | 航天信息股份有限公司 | Method and system for solving memory leakage |
CN110298178A (en) * | 2019-07-05 | 2019-10-01 | 北京可信华泰信息技术有限公司 | Credible policy learning method and device, credible and secure management platform |
CN110298178B (en) * | 2019-07-05 | 2021-07-27 | 北京可信华泰信息技术有限公司 | Trusted policy learning method and device and trusted security management platform |
CN112182557B (en) * | 2019-09-19 | 2022-05-03 | 中国科学院信息工程研究所 | Chip-level built-in active security monitoring architecture implementation method and electronic device |
CN112182557A (en) * | 2019-09-19 | 2021-01-05 | 中国科学院信息工程研究所 | Chip-level built-in active security monitoring architecture implementation method and electronic device |
WO2021227954A1 (en) * | 2020-05-09 | 2021-11-18 | 支付宝(杭州)信息技术有限公司 | Application access request processing based on container cluster |
CN112084490A (en) * | 2020-09-09 | 2020-12-15 | 南京烽火星空通信发展有限公司 | Method and system for realizing protection of software source code based on Linux kernel calling |
CN113268742A (en) * | 2021-04-07 | 2021-08-17 | 支付宝(杭州)信息技术有限公司 | Data authorization method and device and electronic equipment |
CN113505376B (en) * | 2021-09-09 | 2022-03-08 | 北京全息智信科技有限公司 | Control method and device for application program running environment and electronic equipment |
CN113505376A (en) * | 2021-09-09 | 2021-10-15 | 北京全息智信科技有限公司 | Control method and device for application program running environment and electronic equipment |
CN116578968A (en) * | 2023-04-24 | 2023-08-11 | 国网冀北电力有限公司信息通信分公司 | Method and device for providing safety protection for application program in power control system |
CN117688017A (en) * | 2023-11-15 | 2024-03-12 | 北京西能电子科技发展有限公司 | Automatic updating method and device for protection area address adapting to AUTOSAR standard |
CN117688017B (en) * | 2023-11-15 | 2024-07-05 | 北京西能电子科技发展有限公司 | Automatic updating method and device for protection area address adapting to AUTOSAR standard |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108021823A (en) | Method, device and terminal for seamlessly running application program based on trusted execution environment | |
JP7086908B2 (en) | How to authenticate the actions performed on the target computing device | |
US10579793B2 (en) | Managed securitized containers and container communications | |
CN104903910B (en) | Control access of the mobile device to secure data | |
US9300640B2 (en) | Secure virtual machine | |
CN103843303B (en) | The management control method and device of virtual machine, system | |
CN105340309B (en) | Application with multiple operator schemes | |
CN102948114B (en) | Single for accessing enciphered data uses authentication method and system | |
JP6321041B2 (en) | Protecting the results of privileged computing operations | |
CN105379223B (en) | Manage the method and apparatus to the access of ERM | |
CN102884535B (en) | Protected device manages | |
AU2020234675B2 (en) | Binding secure keys of secure guests to a hardware security module | |
KR102068580B1 (en) | Method of securing a computing device | |
US8984592B1 (en) | Enablement of a trusted security zone authentication for remote mobile device management systems and methods | |
CN103827881B (en) | Method and system for the dynamic platform safety in device operating system | |
US20160314299A1 (en) | Mobile Device with Improved Security | |
US20100146267A1 (en) | Systems and methods for providing secure platform services | |
CN103002445A (en) | Safe mobile electronic equipment for providing application services | |
CN105637523A (en) | Secure client drive mapping and file storage system for mobile device management type security | |
CN105340239A (en) | Mobile device locking with context | |
CN108595983A (en) | A kind of hardware structure and application context integrity measurement method based on hardware security isolated execution environment | |
Ying et al. | Truz-view: Developing trustzone user interface for mobile os using delegation integration model | |
CN108335105A (en) | Data processing method and relevant device | |
CN109190335A (en) | A kind of software copyright protecting method and system | |
US20050081065A1 (en) | Method for securely delegating trusted platform module ownership |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180511 |
|
RJ01 | Rejection of invention patent application after publication |