TW202312707A - Data backup carrier and backup system having the same - Google Patents
Data backup carrier and backup system having the same Download PDFInfo
- Publication number
- TW202312707A TW202312707A TW110134262A TW110134262A TW202312707A TW 202312707 A TW202312707 A TW 202312707A TW 110134262 A TW110134262 A TW 110134262A TW 110134262 A TW110134262 A TW 110134262A TW 202312707 A TW202312707 A TW 202312707A
- Authority
- TW
- Taiwan
- Prior art keywords
- data
- signature
- public key
- backup
- carrier
- Prior art date
Links
Images
Landscapes
- Storage Device Security (AREA)
- Maintenance And Management Of Digital Transmission (AREA)
- Communication Control (AREA)
Abstract
Description
本發明關於一種備援載體與備援系統,特別是一種機密而無法任意複製數據的備援載體及包含該備援載體的備援系統。The present invention relates to a backup carrier and a backup system, in particular to a backup carrier that is confidential and cannot copy data arbitrarily and a backup system including the backup carrier.
在數據即市場的今日,許多實體活動、商業交易與身分認證都以不同型態的數據,在全球範圍內迅速流通。其中的一些機密數據,可能牽涉巨大金額,如果失竊或被竄改,會有無可承受的損失。這些機密數據,比如數字貨幣密鑰,通常會被妥善的保存。亦即,該些機密數據可能還會經過其它加密程序,或者是儲存於無法被任意取得的硬體中,待需要使用時解密,或經由特定解鎖方式開啟儲存硬體取得。舉例來說,數字貨幣密鑰可能會經過特定的加密程序而儲存於智慧型手機的使用者身分模組(Subscriber Identity Module,SIM)卡中,且該手機針對SIM卡晶片組實施了以密碼控制的存取控制。可以想見的是,如果智慧型手機或SIM卡壞掉了,那數字貨幣密鑰就可能永沉大海。為了預防這種情況發生,一般機密數據還可能以唯一取得的方式備份於第三方硬體中,比如私有雲伺服器。當原儲存硬體損壞時,備份硬體便可依照該唯一取得的方式,由第三方硬體處取回該機密數據。In today's world where data is the market, many physical activities, business transactions and identity verification are rapidly circulated around the world in different types of data. Some of the confidential data may involve a huge amount of money, and if it is stolen or tampered with, there will be unbearable losses. These confidential data, such as digital currency keys, are usually kept in a safe place. That is to say, these confidential data may also go through other encryption procedures, or be stored in hardware that cannot be obtained arbitrarily, and be decrypted when needed, or obtained by opening the storage hardware through a specific unlocking method. For example, a digital currency key may be stored in a smartphone's Subscriber Identity Module (SIM) card through a specific encryption program, and the phone implements password-controlled access to the SIM card chipset. access control. It is conceivable that if the smartphone or SIM card fails, the digital currency key may be lost forever. In order to prevent this from happening, generally confidential data may also be backed up in third-party hardware, such as a private cloud server, in a uniquely obtained manner. When the original storage hardware is damaged, the backup hardware can retrieve the confidential data from the third-party hardware according to the only way to obtain it.
在前述的備援過程中有兩個問題。第一、如何確認取回的是原始備份的機密數據;第二、備份硬體是否經過認證,與原儲存硬體具有相同的功能與保護級別(也就是確保備份硬體的來源安全,不至於被有心人是置入惡意軟體來竊取機密數據)。為了解決前述問題,從而有本發明的濫觴。There are two problems in the aforementioned backup process. First, how to confirm that the retrieved confidential data is the original backup; second, whether the backup hardware has been certified and has the same function and protection level as the original storage hardware (that is, to ensure that the source of the backup hardware is safe, so as not to malicious software to steal confidential data). In order to solve the aforementioned problems, there is the origin of the present invention.
本段文字提取和編譯本發明的某些特點。其它特點將被揭露於後續段落中。其目的在涵蓋附加的申請專利範圍之精神和範圍中,各式的修改和類似的排列。This paragraph extracts and compiles certain features of the present invention. Other features will be disclosed in subsequent paragraphs. It is intended to cover various modifications and similar arrangements within the spirit and scope of the appended claims.
為了解決前述問題,本發明揭露一種數據的備援載體。該數據的備援載體可為一工作主機所啟用後,備援一主載體中儲存的一保護數據,該保護數據亦使用一加密公鑰加密為一儲存數據後儲存於一第三方,其特徵在於:該備援載體儲存該加密公鑰、對應該加密公鑰的一加密私鑰、一簽章公鑰、對應該簽章公鑰的一簽章私鑰,及一簽章資料;該備援載體具有一硬體安全模組;當該備援載體安裝於該工作主機內並為該工作主機啟用後,該工作主機透過該硬體安全模組以該簽章私鑰對該簽章資料進行解密,並確認取得的一解密資料是否為該加密公鑰;及若該解密資料為該加密公鑰,將該工作主機自該第三方取得的該儲存數據,透過該硬體安全模組以該加密私鑰解密以獲得該保護數據,並將獲得的該保護數據儲存於該備援載體中。In order to solve the foregoing problems, the present invention discloses a data backup carrier. The backup carrier of the data can be activated by a working host to back up a protected data stored in a main carrier, and the protected data is also encrypted with an encryption public key into stored data and then stored in a third party, its characteristics In that: the backup carrier stores the encryption public key, an encryption private key corresponding to the encryption public key, a signature public key, a signature private key corresponding to the signature public key, and a signature data; the backup The backup carrier has a hardware security module; when the backup carrier is installed in the working host and enabled for the working host, the working host uses the hardware security module to use the signature private key to the signature data perform decryption, and confirm whether the obtained decrypted data is the encrypted public key; and if the decrypted data is the encrypted public key, use the hardware security module to obtain the stored data obtained by the working host from the third party The encrypted private key is decrypted to obtain the protected data, and the obtained protected data is stored in the backup carrier.
該備援載體可進一步儲存一數位簽章及可驗證該數位簽章的一認證公鑰,該數位簽章為使用該認證公鑰對應的一認證私鑰所生成;當該備援載體安裝於該工作主機內並為該工作主機啟用後,該工作主機進一步透過該硬體安全模組對該數位簽章與該認證公鑰進行一數位簽章驗證程序,若該數位簽章驗證程序成功,該工作主機才透過該硬體安全模組以該簽章私鑰對該簽章資料進行解密。The backup carrier can further store a digital signature and a certification public key that can verify the digital signature, and the digital signature is generated using a certification private key corresponding to the certification public key; when the backup carrier is installed in After the working host is activated for the working host, the working host further performs a digital signature verification process on the digital signature and the certification public key through the hardware security module, and if the digital signature verification process is successful, The working host decrypts the signature data with the signature private key through the hardware security module.
依照本發明,該硬體安全模組可進一步包含:一密鑰產生單元,產生複數對加密私鑰及對應的加密公鑰;一加密單元,以任一公鑰對一明文進行加密,以獲得一密文;一解密單元,以執行加密之公鑰對應的私鑰解密該密文,以獲得該明文;及一數位簽章解密單元,對該數位簽章與該認證公鑰進行該數位簽章驗證程序。According to the present invention, the hardware security module may further include: a key generation unit that generates a plurality of pairs of encrypted private keys and corresponding encrypted public keys; an encryption unit that encrypts a plaintext with any public key to obtain A ciphertext; a decryption unit, which decrypts the ciphertext with the private key corresponding to the public key performing the encryption to obtain the plaintext; and a digital signature decryption unit, which performs the digital signature on the digital signature and the authentication public key Chapter Verifier.
最好,複數個備援載體的簽章私鑰與簽章公鑰間形成一環簽名(Ring Signature)結構。該主載體與該備援載體為SIM卡。該工作主機可為智慧型手機、平板電腦或穿戴式電子裝置。該第三方可為伺服器、雲端備份平台或區塊鏈儲存架構。該保護數據可為數字貨幣密鑰或受保護的私鑰。該數位簽章之認證公鑰可受一認證簽章所簽章。Preferably, a ring signature (Ring Signature) structure is formed between the signature private key and the signature public key of the plurality of backup carriers. The main carrier and the backup carrier are SIM cards. The working host can be a smart phone, a tablet computer or a wearable electronic device. The third party can be a server, a cloud backup platform or a blockchain storage framework. This protected data may be a digital currency key or a protected private key. The certification public key of the digital signature can be signed by a certification signature.
本發明亦揭露一種備援系統,其包含:前述的備援載體;及一認證主機,儲存該認證私鑰與該認證公鑰、生成該數位簽章,並提供生成的該數位簽章與該認證公鑰給該備援載體。該認證主機可為一公開金鑰基礎建設架構中的任一伺服器。The present invention also discloses a backup system, which includes: the aforementioned backup carrier; and an authentication host that stores the authentication private key and the authentication public key, generates the digital signature, and provides the generated digital signature and the authentication host. The authentication public key is given to the backup carrier. The authentication host can be any server in a public key infrastructure.
由於備援載體在取得保護數據前會先確認加密公鑰是否為簽章公鑰加密,進而取回的主載體中原始的保護數據。另外,配合認證主機提供的數位簽章與認證公鑰,備援載體的身分也可被確認。Because the backup carrier will first confirm whether the encrypted public key is encrypted with the signature public key before obtaining the protected data, and then retrieve the original protected data in the primary carrier. In addition, with the digital signature and authentication public key provided by the authentication host, the identity of the backup carrier can also be confirmed.
本發明將藉由參照下列的實施方式而更具體地描述。The present invention will be described more specifically by referring to the following embodiments.
本發明提出之數據的備援載體可為一工作主機所啟用後,備援一主載體中儲存的一保護數據。關於備援的主載體儲存保護數據的態樣,請見圖1。依照本發明,主載體可以是任何可以透過加密或硬體設定手段,儲存保護數據,比如數字貨幣密鑰或受保護的私鑰等的具有儲存功能的裝置。在本實施方式中,主載體是個SIM卡1。備援載體是和主載體相同的硬體,所以備援載體也是個SIM卡。工作主機是安裝SIM卡1,透過SIM卡1執行特定工作的硬體。在本實施方式中,工作主機是個智慧型手機2。在其它實施例中,工作主機也可是個平板電腦或穿戴式電子裝置。因為SIM卡1安裝在智慧型手機2內部而無法由外部直視,所以以虛線方式繪示之。The backup carrier of the data proposed by the present invention can backup a protected data stored in a main carrier after a working host is enabled. Please refer to FIG. 1 for the state of storing and protecting data on the backup primary carrier. According to the present invention, the main carrier can be any device with a storage function that can store protected data, such as digital currency keys or protected private keys, through encryption or hardware configuration means. In this embodiment, the main carrier is a
SIM卡1的架構如圖1右下方所示,其包含了一處理器11、一硬體安全模組12及一儲存模組13。處理器11通過與智慧型手機2的介面(SIM卡1的接腳,未繪示),處理來自智慧型手機2的指令,並回傳結果。儲存模組13儲存了一個保護數據133,該保護數據133透過SIM卡1本身或智慧型手機2的設定,無法自由地訪問取得。此外,儲存模組13還儲存了一加密公鑰131與對應該加密公鑰131的一加密私鑰132。為了確保保護數據133不會因為SIM卡1壞掉而就此無法取得,保護數據133可藉由硬體安全模組12使用加密公鑰131加密為一儲存數據134後,儲存(比如透過行動網路)於一第三方3。依照本發明,第三方3可以是個伺服器、雲端備份平台(基於資料備份目的而形成的伺服器群組與儲存裝置群),甚至是個區塊鏈儲存架構。本實施方式中以一個雲端備份平台為例來說明。由於雲端備份平台有對應的回存程序,且即便由雲端備份平台被惡意洩漏,該儲存數據134也有加密私鑰132解密的限制。因此,保護數據133還是處於安全狀態,不會被竊取。The structure of the
當意外發生,SIM卡1(主載體)損壞時,由於沒有加密私鑰132,無法取得儲存數據134來解密取回保護數據133,因此便需要使用本發明所提出的備援載體4(也是一個和SIM卡1一樣結構的另一張SIM卡)。同樣地,備援載體4也具有相同的硬體: 處理器11、硬體安全模組12與儲存模組13。和SIM卡1不一樣的地方在於,備援載體4除了儲存加密公鑰131與加密私鑰132外,還多儲存了一簽章公鑰135、對應簽章公鑰135的一簽章私鑰136,及一簽章資料137。簽章公鑰135與簽章私鑰136是另一組用來加解密的密鑰組,而簽章資料137便是使用簽章公鑰135對特定資料加密後形成的。這些儲存的資料是為了有朝一日SIM卡1損毀或遺失,事先儲存於備援載體4中的。此外,為了確保簽章資料137的安全性,簽章私鑰135與簽章公鑰136間也可形成一環簽名(Ring Signature)結構。環簽名結構藉由與其它備援載體中擁有的簽章私鑰與簽章公鑰同源生成,保證了備援載體4中簽章私鑰135與簽章公鑰136的無條件匿名性、正確性及不可偽造性。When an accident occurs and the SIM card 1 (main carrier) is damaged, since there is no encrypted
由於前述特定資料的內容不限,只有一種資料才可用於備援載體4後續的保護數據133取得的作業:加密公鑰131。也就是說,將加密公鑰131當作明文,以簽章公鑰135將之加密的簽章資料137才是本發明所使用的。以下詳細說明其細節。Since the content of the above-mentioned specific data is not limited, only one kind of data can be used for subsequent operations of obtaining the protected
當備援載體4安裝於智慧型手機2內並為智慧型手機2啟用後,智慧型手機2便透過硬體安全模組12,以簽章私鑰136對簽章資料137進行解密。解密後,硬體安全模組12可以取得一解密資料,解密資料還不一定是前述的加密公鑰131。此時,智慧型手機2可以執行判斷工作,確認取得的解密資料是否為該加密公鑰131。如果解密資料就是加密公鑰131,由於加密公鑰131是SIM卡1的擁有者,也只有他知道並使用加密公鑰131並將之加密保存,所以備援載體4便沒有被安裝惡意程式以竊取保護數據133的風險。反之,如果不是,就表示備援載體4在保管的過程中遭到資料竄改,該備援載體4有風險而必須廢棄。若該解密資料為加密公鑰131,智慧型手機2便如同圖3所示,自第三方3取得的儲存數據134。之後,將智慧型手機2自第三方3取得的儲存數據134,透過硬體安全模組12以加密私鑰132解密,就可以獲得保護數據133,並將獲得的保護數據133儲存於備援載體4的儲存模組13中。When the backup carrier 4 is installed in the smart phone 2 and enabled for the smart phone 2, the smart phone 2 decrypts the
為了要方便加密公鑰131、加密私鑰132、簽章公鑰135與簽章私鑰136的取得,以及進行加密與解密的作業,前述的硬體安全模組12可進一步包含:一密鑰產生單元121、一加密單元122及一解密單元123。密鑰產生單元121的工作在產生複數對加密私鑰及對應的加密公鑰,也可包含簽章公鑰135與簽章私鑰136。加密單元122可以任一公鑰對一明文進行加密,以獲得一密文。解密單元123和加密單元122相反,可以執行加密之公鑰對應的私鑰解密該密文,以獲得該明文。In order to facilitate the acquisition of the encryption
以上實施方式中揭露的備援載體及其運作方式,可以確保取得的保護數據之正確性。然而,確認備援載體是否經過認證,是否受到保護而不被置入惡意軟體來竊取保護數據,無法單就備援載體為之。以下的另一實施方式將揭露解決前述問題的技術特徵。The backup carrier and its operation mode disclosed in the above embodiments can ensure the correctness of the obtained protection data. However, it is not possible to confirm whether the backup carrier is authenticated and protected from malicious software to steal protected data. The following another embodiment will disclose technical features to solve the aforementioned problems.
請見圖4,該圖繪示依照本發明實施例的一種備援系統。備援系統中包含了前述的備援載體4,另外還有認證主機5。Please refer to FIG. 4 , which shows a backup system according to an embodiment of the present invention. The backup system includes the aforementioned backup carrier 4 and an authentication host 5 in addition.
在本備援系統中,備援載體4內除了儲存加密公鑰131、加密私鑰132、簽章公鑰135、簽章私鑰136及簽章資料137外,還進一步儲存了一數位簽章138及可驗證數位簽章138的一認證公鑰139。數位簽章為使用認證公鑰139對應的一認證私鑰139’所生成。當備援載體4安裝於智慧型手機2內並為智慧型手機2啟用後,智慧型手機2不直接進行對簽章資料137的解密作業,反而是先透過硬體安全模組12對數位簽章138與認證公鑰139進行一數位簽章驗證程序,確認簽章資料137的完整性(未被竄改)。若該數位簽章驗證程序成功,智慧型手機2才透過硬體安全模組12以簽章私鑰136對簽章資料137進行解密。因此,為了完成前述作業,硬體安全模組12也配合包含了一數位簽章解密單元124。數位簽章解密單元124可對數位簽章138與認證公鑰139進行前述的數位簽章驗證程序。In this backup system, in addition to storing the encryption
在此,數位簽章138簽章程序使用的認證公鑰139與認證私鑰139’都是由認證主機5所產生。認證主機5是與智慧型手機2通過網路相連的伺服器,可儲存認證私鑰139’與認證公鑰139、生成數位簽章138,並提供生成的數位簽章138與認證公鑰139給備援載體4。數位簽章138的明文內容不限定,可由認證主機5所屬方決定。當備援載體4由製造商生產完成後,便由認證主機5(可以是屬於製造商的,或授權使用的)提供數位簽章138與認證公鑰139儲存於備援載體4中,以證明備援載體4的身分及不可竄改性。Here, the authentication
依照本發明,數位簽章138之認證公鑰139受一認證簽章所簽章,該認證簽章不為認證主機5所產生,而是由其它的憑證伺服器所產生。重複簽章的目的在於由一公開金鑰基礎建設架構(Public Key Infrastructure,PKI)更高階憑證中心的憑證伺服器來認證認證公鑰139的身分。請見圖5,該圖繪示一種公開金鑰基礎架構。認證主機5可以是屬於製造商的,其發行的認證公鑰139受設計廠商憑證伺服器的認證簽章所簽章。設計廠商的認證簽章,由次級證認證機構的憑證伺服器的認證簽章所簽章。最終,次級證認證機構的認證簽章,由根憑證認證機構(比如國家發展委員會委託中華電信管理的政府憑證管理中心)的憑證伺服器的認證簽章所簽章。因此,依照本發明,認證主機5也可以是公開金鑰基礎建設架構中的任一伺服器。According to the present invention, the authentication
雖然本發明已以實施方式揭露如上,然其並非用以限定本發明,任何所屬技術領域中具有通常知識者,在不脫離本發明之精神和範圍內,當可作些許之更動與潤飾,因此本發明之保護範圍當視後附之申請專利範圍所界定者為準。Although the present invention has been disclosed above in terms of implementation, it is not intended to limit the present invention. Anyone with ordinary knowledge in the technical field may make some changes and modifications without departing from the spirit and scope of the present invention. Therefore, The scope of protection of the present invention should be defined by the scope of the appended patent application.
1:SIM卡 2:智慧型手機 3:第三方 4:備援載體 5:認證主機 11:處理器 12:硬體安全模組 121:密鑰產生單元 122:加密單元 123:解密單元 124:數位簽章解密單元 13:儲存模組 131:加密公鑰 132:加密私鑰 133:保護數據 134:儲存數據 135:簽章公鑰 136:簽章私鑰 137:簽章資料 138:數位簽章 139:認證公鑰 139’:認證私鑰 1: SIM card 2: Smartphone 3: Third party 4: backup carrier 5: Authentication host 11: Processor 12: Hardware Security Module 121: key generation unit 122: encryption unit 123: decryption unit 124: Digital signature decryption unit 13: Storage module 131: encrypted public key 132: encrypted private key 133:Protect Data 134: Store data 135: signature public key 136: Signature private key 137: Signature information 138: Digital signature 139: Authentication public key 139': authentication private key
圖1繪示本發明備援的主載體儲存保護數據的態樣。FIG. 1 shows the state of storing and protecting data in a redundant main carrier of the present invention.
圖2繪示依照本發明實施例的一種備援載體的態樣及運作方式。FIG. 2 illustrates the appearance and operation of a backup carrier according to an embodiment of the present invention.
圖3為備援載體的又一運作方式。FIG. 3 is another operation mode of the redundant carrier.
圖4繪示依照本發明實施例的一種備援系統。FIG. 4 illustrates a backup system according to an embodiment of the present invention.
圖5繪示一種公開金鑰基礎架構。FIG. 5 illustrates a public key infrastructure.
2:智慧型手機 2: Smartphone
3:第三方 3: Third party
4:備援載體 4: backup carrier
11:處理器 11: Processor
12:硬體安全模組 12: Hardware Security Module
121:密鑰產生單元 121: key generation unit
122:加密單元 122: encryption unit
123:解密單元 123: decryption unit
13:儲存模組 13: Storage module
131:加密公鑰 131: encrypted public key
132:加密私鑰 132: encrypted private key
134:儲存數據 134: Store data
135:簽章公鑰 135: signature public key
136:簽章私鑰 136: Signature private key
137:簽章資料 137: Signature information
Claims (11)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW110134262A TWI790745B (en) | 2021-09-14 | 2021-09-14 | Data backup carrier and backup system having the same |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW110134262A TWI790745B (en) | 2021-09-14 | 2021-09-14 | Data backup carrier and backup system having the same |
Publications (2)
Publication Number | Publication Date |
---|---|
TWI790745B TWI790745B (en) | 2023-01-21 |
TW202312707A true TW202312707A (en) | 2023-03-16 |
Family
ID=86670130
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW110134262A TWI790745B (en) | 2021-09-14 | 2021-09-14 | Data backup carrier and backup system having the same |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI790745B (en) |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10891384B2 (en) * | 2017-10-19 | 2021-01-12 | Koninklijke Kpn N.V. | Blockchain transaction device and method |
CN111385084A (en) * | 2018-12-27 | 2020-07-07 | 中国电信股份有限公司 | Key management method and device for digital assets and computer readable storage medium |
CN111628864A (en) * | 2020-06-05 | 2020-09-04 | 微位(深圳)网络科技有限公司 | Method for carrying out secret key safety recovery by using SIM card |
-
2021
- 2021-09-14 TW TW110134262A patent/TWI790745B/en active
Also Published As
Publication number | Publication date |
---|---|
TWI790745B (en) | 2023-01-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7639819B2 (en) | Method and apparatus for using an external security device to secure data in a database | |
US10880100B2 (en) | Apparatus and method for certificate enrollment | |
CN104618096B (en) | Protect method, equipment and the TPM key administrative center of key authorization data | |
KR20140126787A (en) | Puf-based hardware device for providing one time password, and method for 2-factor authenticating using thereof | |
CN111971929B (en) | Secure distributed key management system | |
WO2016086788A1 (en) | Method and apparatus for encrypting/decrypting data on mobile terminal | |
CN110806919B (en) | Method and system for protecting virtual machine image in cloud environment | |
CN102646077A (en) | Method for full-disk encryption based on trusted cryptography module | |
US20130124860A1 (en) | Method for the Cryptographic Protection of an Application | |
WO2024139273A1 (en) | Federated learning method and apparatus, readable storage medium, and electronic device | |
CN117155549A (en) | Key distribution method, key distribution device, computer equipment and storage medium | |
TWI476629B (en) | Data security and security systems and methods | |
CN112906041A (en) | Dynamic multi-party signature encryption and decryption method and system | |
CN110837634B (en) | Electronic signature method based on hardware encryption machine | |
CN114942729A (en) | Data safety storage and reading method for computer system | |
CN111628864A (en) | Method for carrying out secret key safety recovery by using SIM card | |
CN110855429A (en) | Software key protection method based on TPM | |
CN103577771A (en) | Virtual desktop data leakage-preventive protection technology on basis of disk encryption | |
CN111190694A (en) | Virtualization security reinforcement method and device based on Roc platform | |
TWI790745B (en) | Data backup carrier and backup system having the same | |
CN101478538B (en) | Storage method, apparatus or system for safety management device | |
CN111542050B (en) | TEE-based method for guaranteeing remote initialization safety of virtual SIM card | |
KR101947408B1 (en) | Puf-based hardware device for providing one time password, and method for 2-factor authenticating using thereof | |
CN114553557A (en) | Key calling method, key calling device, computer equipment and storage medium | |
CN113672973A (en) | Database system of embedded equipment based on RISC-V architecture of trusted execution environment |