CN112305962A - Wireless device control method based on ARM platform supporting Trustzone - Google Patents

Wireless device control method based on ARM platform supporting Trustzone Download PDF

Info

Publication number
CN112305962A
CN112305962A CN202011129657.XA CN202011129657A CN112305962A CN 112305962 A CN112305962 A CN 112305962A CN 202011129657 A CN202011129657 A CN 202011129657A CN 112305962 A CN112305962 A CN 112305962A
Authority
CN
China
Prior art keywords
arm platform
configuring
information
kernel
wireless device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011129657.XA
Other languages
Chinese (zh)
Inventor
仇瑞
陈松
刘云鹤
张超
史晶
郭俊余
魏立峰
张铎
孔金珠
吴庆波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kirin Software Co Ltd
Original Assignee
Kirin Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kirin Software Co Ltd filed Critical Kirin Software Co Ltd
Priority to CN202011129657.XA priority Critical patent/CN112305962A/en
Publication of CN112305962A publication Critical patent/CN112305962A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/04Programme control other than numerical control, i.e. in sequence controllers or logic controllers
    • G05B19/042Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
    • G05B19/0423Input/output
    • G05B19/0425Safety, monitoring

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A wireless device management and control method based on an ARM platform supporting Trustzone comprises the following steps: an ARM platform frame is built on a system; configuring a wireless equipment switch function on the ARM platform; configuring a wireless device connection control function based on a kernel protocol on the ARM platform; configuring a trustzone-based complete control function on the ARM platform; and configuring an infrared control function based on kernel driving on the ARM platform. The method and the device have the advantages that design adjustment and function addition are carried out by adjusting the rfkill subsystem part of the linux kernel, the protocol part of the wireless equipment and the drive part of the wireless equipment (the specific equipment corresponding type relation is shown in figure 1), functional influence is not caused on the original kernel architecture, the normality of the original functions can be ensured, the function realization of wireless management and control can be completed through the technical scheme, and the method and the device have the characteristics of strong portability, good compatibility and high stability and have higher safety.

Description

Wireless device control method based on ARM platform supporting Trustzone
Technical Field
The invention belongs to the technical field of wireless equipment management and control, and particularly relates to a wireless equipment management and control method based on an ARM platform supporting Trustzone.
Background
In the use process of the existing linux system, the types of the wireless peripherals are more and more abundant, and the use frequency of the wireless peripherals such as a wireless network and Bluetooth equipment is higher and higher. However, the existing linux system has no management and control mechanism for the wireless device, so for the industry application with higher security level and the user with higher security requirement, the existing wireless device has no management and control state and cannot effectively meet the requirement, and the advantages of the wireless device cannot be effectively utilized in the using process, so that the existing mature wireless technology cannot be effectively deployed and used in the related industries, the use scene of the wireless device is greatly limited, and the wireless device-based application is not favorable for being deployed in the full environment.
In a general Linux system, the switching function of the existing wireless equipment mostly controls the direct switching authority of the equipment on the root user level, and for the convenience of application calling, more user-level interfaces in a D-bus mode are saved, so that malicious developers cannot be called, and the effect of a safe white list cannot be realized.
The method is characterized in that a black-and-white list function of the wireless network under the condition of a file system based on a user space, such as a black-and-white list scheme of wpa _ supplicant, is used for storing security configuration information by using/etc/wpa _ supplicant.
In the aspect of bluetooth management and control under the file system condition based on the user space, only the ble device adopts the blacklist mechanism in design, but the user layer configuration scheme cannot be effectively formed under the existing condition, and the bluetooth hardware cache region is directly cached, so that the bluetooth hardware management and control system has great defects in use, is poor in compatibility and cannot achieve an effective management and control function. At present, no corresponding control mechanism is provided in the aspects of infrared, 802.15.4, communication module and NFC.
In summary, under the existing linux conditions, in the aspect of wireless device security management and control, the schemes are fewer, the security is poorer, and the types of the function coverage devices are not comprehensive, so that the effect of wireless management and control cannot be achieved.
Disclosure of Invention
In order to solve the above problems, the present invention provides a method for managing and controlling wireless devices based on an ARM platform supporting Trustzone, the method comprising the steps of:
an ARM platform frame is built on a system;
configuring a wireless equipment switch function on the ARM platform;
configuring a wireless device connection control function based on a kernel protocol on the ARM platform;
configuring a trustzone-based complete control function on the ARM platform;
and configuring an infrared control function based on kernel driving on the ARM platform.
Preferably, the building of the ARM platform framework on the system comprises the following steps:
building a deployment of REE os environments on the system;
building a TEE os environment on the system;
building a Trustzone-based secure storage on the system;
deploying a driver layer and hardware equipment bottom layer operation dependence on the system;
deploying a trusted application on the system;
performing a system status test on the system.
Preferably, the configuring the wireless device switch function on the ARM platform includes the steps of:
deploying an application of a wireless device switch on the ARM platform;
calling an interface of a kernel subsystem as a unique trusted interface of the application program;
the root is disabled for gpio enabled and service node debug aspects of the device.
Preferably, the configuring of the wireless device connection management and control function based on the kernel protocol on the ARM platform includes:
configuring connection management and control information on the ARM platform;
the connection information is sent to a trusted program used for inquiring the connection management and control information;
the background program provides connectable information by performing information matching on the black or white list;
the information is fed back to the user program and is sent to the authentication part of the kernel;
and finishing the judgment of the query information on the kernel space to finish the connection process.
Preferably, the configuring of the trustzone-based full management and control function on the ARM platform includes the steps of:
a user program requests the ARM platform to use the NFC equipment;
calling the NFC equipment through an NFC driver;
and the NFC equipment completes NFC interaction.
Preferably, the step of configuring the infrared control function based on the kernel driver on the ARM platform includes:
configuring control taking information on the ARM platform;
the connection information is sent to a trusted program used for inquiring the connection management and control information;
the background program provides connectable information by performing information matching on the black or white list;
and finishing the judgment of the query information on the kernel space.
The method carries out design adjustment and function addition by adjusting the rfkill subsystem part of the linux kernel, the protocol part of the wireless equipment and the drive part of the wireless equipment (the specific equipment corresponding type relation is shown in figure 1), does not cause functional influence on the original kernel architecture, can ensure the normality of the original function, can also complete the realization of the wireless management and control function through the technical scheme, has the characteristics of strong portability, good compatibility and high stability, and also has higher safety; the secure data is written and inquired through the trustzone correlation technology, so that the interruption formed in the input process is not monitored by other programs, and a TEE os-based storage mode is merged into the scheme, thereby realizing higher security; the interaction process of the user space and the kernel space is controlled through selinux, and the interaction safety of the user space and the kernel space under the REE os condition is guaranteed.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic flowchart of a method for managing and controlling a wireless device based on an ARM platform supporting Trustzone according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings in conjunction with the following detailed description. It should be understood that the description is intended to be exemplary only, and is not intended to limit the scope of the present invention. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present invention.
As shown in fig. 1, in the embodiment of the present application, the present invention provides a method for managing and controlling a wireless device based on an ARM platform supporting Trustzone, where the method includes the steps of:
s1: an ARM platform frame is built on a system;
s2: configuring a wireless equipment switch function on the ARM platform;
s3: configuring a wireless device connection control function based on a kernel protocol on the ARM platform;
s4: configuring a trustzone-based complete control function on the ARM platform;
s5: and configuring an infrared control function based on kernel driving on the ARM platform.
When the wireless equipment is controlled based on the ARM platform supporting Trustzone, firstly, an ARM platform frame is built on a system; then configuring a wireless equipment switch function on the ARM platform; then configuring a wireless device connection control function based on a kernel protocol on the ARM platform; then configuring a trustzone-based complete control function on the ARM platform; and then configuring an infrared control function based on kernel driving on the ARM platform.
In this embodiment of the present application, the step of building an ARM platform framework on a system in step S1 includes the steps of:
building a deployment of REE os environments on the system;
building a TEE os environment on the system;
building a Trustzone-based secure storage on the system;
deploying a driver layer and hardware equipment bottom layer operation dependence on the system;
deploying a trusted application on the system;
performing a system status test on the system.
In the embodiment of the application, when an ARM platform framework is built on a system, the deployment of an REE os environment is completed firstly, the REE os environment comprises the whole linux system, and the kernel of a wireless management and control scheme is opened by the kernel, wherein the environment is the most basic environment of the whole system; then, a TEE os environment is set up, the TEE os provides safe storage, calling of trusted firmware equipment and deployment of a trusted program for an operating system under the condition of the overall wireless control scheme, and the purpose is to use a basic environment of trustzone technology under an arm platform; then, building a trustzone-based secure storage for storing relevant instructions or hardware information under the control of a black and white list; then deploying a driver layer and hardware equipment bottom layer operation dependence on the system, and completing deployment of the driver layer and the hardware equipment bottom layer api; then, a trusted application is deployed, wherein the trusted application is a program for implementing key-in of control data in a wireless device control scheme (the idea can be understood as an input method that data cannot be intercepted by other applications) and storing and querying of a black list and a white list; then, the interaction test of the secure monitor is completed, and the system state is confirmed to be normally available.
In this embodiment of the present application, the step of configuring the switch function of the wireless device on the ARM platform in step S2 includes the steps of:
deploying an application of a wireless device switch on the ARM platform;
calling an interface of a kernel subsystem as a unique trusted interface of the application program;
the root is disabled for gpio enabled and service node debug aspects of the device.
In the embodiment of the application, when the switch function of the wireless equipment is configured on the ARM platform, an application program of the wireless equipment switch is deployed at first, and the application program provides the only available switch interface under the control of the whole system; under the condition that a user opens wireless control, selinux calls an interface column of an rfkill subsystem through an application program to be a unique trusted interface, wherein the rfkill subsystem is used for solving the switch control of all wireless devices; under the wireless control condition, the permission of root to the aspects of gpio enabling, service node debugging of equipment and the like is forbidden, so that a single switch entrance of the whole system is ensured.
In this embodiment of the present application, the step S3 of configuring a kernel protocol-based wireless device connection management and control function on the ARM platform includes the steps of:
configuring connection management and control information on the ARM platform;
the connection information is sent to a trusted program used for inquiring the connection management and control information;
the background program provides connectable information by performing information matching on the black or white list;
the information is fed back to the user program and is sent to the authentication part of the kernel;
and finishing the judgment of the query information on the kernel space to finish the connection process.
In the embodiment of the application, when a wireless device connection management and control function based on a kernel protocol is configured on the ARM platform, firstly, a user configures connection management and control information, a program realizes the pull-up of a trusted environment program through a TEE client api, and the write-in operation of safe storage is completed through the key-in application of the trusted program; then, the user requests connection through the application, and the connection information is sent to a trusted program used for inquiring the connection management and control information; then, the background program provides connectable information by matching information of the black list or the white list, the connectable information is fed back to the user program, and the connectable information is directly sent to the authentication part of the kernel through a bottom library by selinux; then, the kernel space completes the judgment of the query information in the original connection authentication process, and if the connection is allowed in a control mode (namely in a white list or not in a black list), the connection can be performed; and if the control inquiry information feedback is not allowed to be connected, the connection is not allowed.
In this embodiment of the application, the step S4 of configuring the trustzone-based complete management and control function on the ARM platform includes the steps of:
a user program requests the ARM platform to use the NFC equipment;
calling the NFC equipment through an NFC driver;
and the NFC equipment completes NFC interaction.
In the embodiment of the application, when a trustzone-based complete control function is configured on the ARM platform, a user program requests the use of an NFC device, and a trusted environment program is pulled up through a TEE client api; then, the program confirms that the pull-up state is safe, the calling of the equipment is directly realized through NFC drive, and the whole operation is processed by the cpu of trustzone without being processed by REE os; and then the NFC interaction is completed, and the network synchronization or other modes of synchronization operation of the NFC synchronization information is completed through the user program.
In this embodiment of the application, the step S5 of configuring the infrared control function based on the kernel driver on the ARM platform includes the steps of:
configuring control taking information on the ARM platform;
the connection information is sent to a trusted program used for inquiring the connection management and control information;
the background program provides connectable information by performing information matching on the black or white list;
and finishing the judgment of the query information on the kernel space.
In the embodiment of the application, when an infrared control function based on kernel driving is configured on the ARM platform, firstly, a user configures connection control information, a program realizes the pull-up of a trusted environment program through a TEE client api, and the write-in operation of safe storage is completed through the key-in application of the trusted program, wherein the control information of infrared equipment is different from a protocol and is based on a coding mode; a user requests connection through an application, and connection information is sent to a trusted program used for inquiring connection management and control information; the background program provides connectable information by matching information of the black list or the white list, the connectable information is fed back to the user program and is directly sent to the drive part of the kernel through the bottom library by selinux; before the original process of driving information analysis, the kernel space completes the judgment of query information, and if analysis and connection are allowed in a control mode (namely in a white list or not in a black list), the query information can be connected; and if the control inquiry information feedback is not allowed to be connected, the connection is not allowed.
The method carries out design adjustment and function addition by adjusting the rfkill subsystem part of the linux kernel, the protocol part of the wireless equipment and the drive part of the wireless equipment (the specific equipment corresponding type relation is shown in figure 1), does not cause functional influence on the original kernel architecture, can ensure the normality of the original function, can also complete the realization of the wireless management and control function through the technical scheme, has the characteristics of strong portability, good compatibility and high stability, and also has higher safety; the secure data is written and inquired through the trustzone correlation technology, so that the interruption formed in the input process is not monitored by other programs, and a TEE os-based storage mode is merged into the scheme, thereby realizing higher security; the interaction process of the user space and the kernel space is controlled through selinux, and the interaction safety of the user space and the kernel space under the REE os condition is guaranteed.
It is to be understood that the above-described embodiments of the present invention are merely illustrative of or explaining the principles of the invention and are not to be construed as limiting the invention. Therefore, any modification, equivalent replacement, improvement and the like made without departing from the spirit and scope of the present invention should be included in the protection scope of the present invention. Further, it is intended that the appended claims cover all such variations and modifications as fall within the scope and boundaries of the appended claims or the equivalents of such scope and boundaries.

Claims (6)

1. A wireless device control method based on an ARM platform supporting Trustzone is characterized by comprising the following steps:
an ARM platform frame is built on a system;
configuring a wireless equipment switch function on the ARM platform;
configuring a wireless device connection control function based on a kernel protocol on the ARM platform;
configuring a trustzone-based complete control function on the ARM platform;
and configuring an infrared control function based on kernel driving on the ARM platform.
2. The method for managing and controlling the wireless equipment based on the ARM platform supporting Trustzone according to claim 1, wherein the step of building the ARM platform framework on the system comprises the following steps:
building a deployment of REE os environments on the system;
building a TEE os environment on the system;
building a Trustzone-based secure storage on the system;
deploying a driver layer and hardware equipment bottom layer operation dependence on the system;
deploying a trusted application on the system;
performing a system status test on the system.
3. The method for managing and controlling the wireless device based on the ARM platform supporting Trustzone according to claim 1, wherein the step of configuring the switch function of the wireless device on the ARM platform comprises the steps of:
deploying an application of a wireless device switch on the ARM platform;
calling an interface of a kernel subsystem as a unique trusted interface of the application program;
the root is disabled for gpio enabled and service node debug aspects of the device.
4. The method for managing and controlling the wireless device based on the ARM platform supporting Trustzone according to claim 1, wherein the step of configuring the wireless device connection management and control function based on the kernel protocol on the ARM platform comprises the steps of:
configuring connection management and control information on the ARM platform;
the connection information is sent to a trusted program used for inquiring the connection management and control information;
the background program provides connectable information by performing information matching on the black or white list;
the information is fed back to the user program and is sent to the authentication part of the kernel;
and finishing the judgment of the query information on the kernel space to finish the connection process.
5. The method for managing and controlling the wireless device based on the ARM platform supporting Trustzone according to claim 1, wherein the step of configuring the Trustzone-based complete management and control function on the ARM platform comprises the steps of:
a user program requests the ARM platform to use the NFC equipment;
calling the NFC equipment through an NFC driver;
and the NFC equipment completes NFC interaction.
6. The method for managing and controlling the wireless equipment based on the ARM platform supporting Trustzone according to claim 1, wherein the step of configuring the infrared management and control function based on the kernel driver on the ARM platform comprises the steps of:
configuring control taking information on the ARM platform;
the connection information is sent to a trusted program used for inquiring the connection management and control information;
the background program provides connectable information by performing information matching on the black or white list;
and finishing the judgment of the query information on the kernel space.
CN202011129657.XA 2020-10-21 2020-10-21 Wireless device control method based on ARM platform supporting Trustzone Pending CN112305962A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011129657.XA CN112305962A (en) 2020-10-21 2020-10-21 Wireless device control method based on ARM platform supporting Trustzone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011129657.XA CN112305962A (en) 2020-10-21 2020-10-21 Wireless device control method based on ARM platform supporting Trustzone

Publications (1)

Publication Number Publication Date
CN112305962A true CN112305962A (en) 2021-02-02

Family

ID=74326780

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011129657.XA Pending CN112305962A (en) 2020-10-21 2020-10-21 Wireless device control method based on ARM platform supporting Trustzone

Country Status (1)

Country Link
CN (1) CN112305962A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140283006A1 (en) * 2013-03-13 2014-09-18 Samsung Electronics Co., Ltd. Application authentication method and electronic device supporting the same
CN104102876A (en) * 2014-07-17 2014-10-15 北京握奇智能科技有限公司 Device for safeguarding operational security of client side
CN105468131A (en) * 2015-11-27 2016-04-06 山东超越数控电子有限公司 Loongson platform based wireless device control method
CN107168747A (en) * 2017-05-27 2017-09-15 努比亚技术有限公司 Differentiating method, device and the computer-readable recording medium of mobile terminal configuration
CN107251530A (en) * 2015-01-06 2017-10-13 阿费罗有限公司 system and method for realizing Internet of Things (IoT) remote control application
CN108549812A (en) * 2018-03-12 2018-09-18 深圳市元征科技股份有限公司 Security isolation method, safety insulating device based on Trustzone and car-mounted terminal
CN210691384U (en) * 2019-08-30 2020-06-05 北京银联金卡科技有限公司 Face recognition payment terminal platform based on security unit and trusted execution environment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140283006A1 (en) * 2013-03-13 2014-09-18 Samsung Electronics Co., Ltd. Application authentication method and electronic device supporting the same
CN104102876A (en) * 2014-07-17 2014-10-15 北京握奇智能科技有限公司 Device for safeguarding operational security of client side
CN107251530A (en) * 2015-01-06 2017-10-13 阿费罗有限公司 system and method for realizing Internet of Things (IoT) remote control application
CN105468131A (en) * 2015-11-27 2016-04-06 山东超越数控电子有限公司 Loongson platform based wireless device control method
CN107168747A (en) * 2017-05-27 2017-09-15 努比亚技术有限公司 Differentiating method, device and the computer-readable recording medium of mobile terminal configuration
CN108549812A (en) * 2018-03-12 2018-09-18 深圳市元征科技股份有限公司 Security isolation method, safety insulating device based on Trustzone and car-mounted terminal
CN210691384U (en) * 2019-08-30 2020-06-05 北京银联金卡科技有限公司 Face recognition payment terminal platform based on security unit and trusted execution environment

Similar Documents

Publication Publication Date Title
CN106471791B (en) Method and apparatus for a mobile device based cluster computing architecture
US10097614B2 (en) Establishing a remote desktop
US20140087712A1 (en) Virtual instance architecture for mobile device management systems
US20200218816A1 (en) Method and device for dynamically managing kernel node
CN108881103B (en) Network access method and device
US20090254924A1 (en) Operating system interfaces for virtual wifi and softap capable drivers
JP7498296B2 (en) Cell access method, user equipment, network equipment and computer-readable storage medium
CN107329865B (en) Method for opening adb function of debugging bridge, mobile terminal and computer readable medium
CN110781528B (en) Collaborative secure operating system and electronic device
WO2021022729A1 (en) Root permission assignment method and apparatus, storage medium, and terminal device
KR102414016B1 (en) Bearer configuration method of RRC connection re-establishment, terminal and network device
US20170323115A1 (en) Method and apparatus for remotely deleting information
CN110381489A (en) Bluetooth connecting method, display terminal and television set
US10764038B2 (en) Method and apparatus for generating terminal key
WO2023124589A1 (en) Method and apparatus for preventing processing by security processor from being interrupted
CN109857464B (en) System and method for platform deployment and operation of mobile operating system
KR20010041214A (en) Configuration of a base station transceiver system in a mobile communication system
CN109951560B (en) Method, terminal and storage medium for improving concurrency and application speed of application service
EP3582442A1 (en) Method, remote device and computer-readable medium for reselecting principal core device
KR20220143736A (en) Method, terminal and network function for configuring authorization and policy parameters
CN111970162B (en) Heterogeneous GIS platform service central control system under super-integration framework
CN107168747B (en) Method and device for distinguishing mobile terminal configuration and computer readable storage medium
CN112305962A (en) Wireless device control method based on ARM platform supporting Trustzone
CN112153032A (en) Information processing method, device, computer readable storage medium and system
US11323879B2 (en) Device management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Qiu Rui

Inventor after: Chen Song

Inventor after: Liu Yunhe

Inventor after: Zhang Chao

Inventor after: Shi Jing

Inventor after: Guo Junyu

Inventor after: Wei Lifeng

Inventor after: Zhang Duo

Inventor after: Kong Jinzhu

Inventor before: Qiu Rui

Inventor before: Wu Qingbo

Inventor before: Chen Song

Inventor before: Liu Yunhe

Inventor before: Zhang Chao

Inventor before: Shi Jing

Inventor before: Guo Junyu

Inventor before: Wei Lifeng

Inventor before: Zhang Duo

Inventor before: Kong Jinzhu

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210202