基于TrustZone的智能手机安全技术研究与实现
[Abstract]:Intelligent terminals play a very important role in different scenes of life and work, and more users store them in their personal privacy. The problem of ensuring data security has become particularly prominent. Users often use the corresponding password to verify the identity to prevent the accidental occurrence of data leakage. However, in order to improve the security intensity of passwords, users have to remember complex passwords and execute frequent password inputs, which greatly affects the user experience. However, with the rapid application and popularization of biometric technology, its convenient and fast characteristics have been widely recognized. For example, fingerprint identification technology is rapidly applied to the field of intelligent terminals, replacing the traditional password verification method, using identification comparison to the user's fingerprint information to achieve secure and fast authentication behavior. Therefore, the problem of how to ensure the security of fingerprint recognition and ensure the safety and reliability of the recognition process is becoming more and more prominent. The concept of a trusted execution environment (Trusted Execution Environment,TEE) is designed to provide a secure execution environment for trusted applications. The concept of secure execution environment can be implemented from three mechanisms, including TXT of Intel and SVM of AMD, which can provide secure execution environment; ARM Trust Zone security technology, and provide isolation mechanism of non-secure area and secure area directly on CPU. Hypervisor/VMM virtualization mechanism, which provides isolation between secure and insecure applications. ARM processor, which is widely used in embedded platform, provides a security extension mechanism of Trust Zone, which divides SOC soft and hard resources into trusted execution environment for operating key resources and common execution environment for operating other resources (Rich Execution Environment,REE). The purpose of this paper is to build a security framework based on processor hardware architecture to ensure that devices resist many potential threats. The purpose of this paper is to solve many security problems in the field of intelligent terminal. Combined with ARM Trust Zone security extension technology, and according to the idea of fingerprint recognition based on biological characteristics, a fingerprint recognition security framework based on Trust Zone is proposed. It provides a trusted execution environment for fingerprint identification applications, prevents attacks by potential malicious programs to ensure the security of fingerprint identification process, and at the same time, in order to ensure the security of fingerprint information, Provide Trust Zone protected keys for fingerprint data and feature security encryption to ensure that they are not stolen. In addition, the secure transmission channel and communication protocol of fingerprint data are designed and implemented to ensure the security of fingerprint transmission process. Finally, a prototype system is designed and implemented, and the effectiveness of the scheme is verified by experiments. The experimental results also prove the feasibility of the proposed technology and method.
【学位授予单位】:电子科技大学
【学位级别】:硕士
【学位授予年份】:2016
【分类号】:TN929.53
【相似文献】
相关期刊论文 前3条
1 温研;刘波;王怀民;;基于本地虚拟化技术的安全虚拟执行环境[J];计算机工程与科学;2008年04期
2 敬军;郝福珍;徐东华;;国产自主平台下可信执行环境的设计与实现[J];计算机工程与设计;2012年10期
3 ;[J];;年期
相关会议论文 前1条
1 李亚;康健;李习彬;;政策实验室:政策执行环境的模拟系统[A];西部开发与系统工程——中国系统工程学会第12届年会论文集[C];2002年
相关重要报纸文章 前10条
1 本报记者 李旭阳;构建移动终端可信执行环境[N];计算机世界;2014年
2 山东省东营市中级人民法院 李贯英 山东省东营市东营区人民法院 王丽;依法协助执行 优化执行环境[N];人民法院报;2013年
3 ;金华法院执行环境专项整治出成效[N];人民法院报;2003年
4 岳跃国;执行环境标准岂容玩猫腻?[N];中国环境报;2014年
5 记者 黄献安;浙江不断优化执行环境[N];人民法院报;2004年
6 记者 张宽明 通讯员 晏祥龙;荣辱观教育优化宿迁执行环境[N];人民法院报;2006年
7 本报记者 张羽馨;淮安:外抓执行环境 内抓规范管理[N];江苏法制报;2006年
8 记者 赵向南 通讯员 金俊贤;俺村街道不比城里差[N];山西日报;2003年
9 住房和城乡建设部副部长 齐骥;健全制度 加强配合 创造良好执行环境[N];人民法院报;2008年
10 记者 黄献安 通讯员 余建华;浙江提出提高六个方面能力[N];人民法院报;2005年
相关硕士学位论文 前6条
1 张亚飞;基于可信执行环境的智能密码钥匙设计与实现[D];西安电子科技大学;2014年
2 刘志伟;基于TrustZone的智能手机安全技术研究与实现[D];电子科技大学;2016年
3 黄泽群;面向融合的业务平台中业务执行环境的优化设计与实现[D];北京邮电大学;2008年
4 王熙友;ARM TrustZone安全隔离技术研究与应用[D];电子科技大学;2013年
5 龚涛;基于SOA的泛在多节点业务协同执行环境的研究与实现[D];北京邮电大学;2013年
6 肖汉波;CPU/GPU异构多核虚拟执行环境框架的设计与实现[D];上海交通大学;2010年
,本文编号:2478423
本文链接:https://www.wllwen.com/kejilunwen/xinxigongchenglunwen/2478423.html