Initialization scheme of the trusted execution environment based on the user card
Smartphones with a trusted execution environment (TEE) has an authority issue of the certificate with the loading stage.Based on the analysis of the initialization architecture and initializing scheme of the trusted execution environment,by using trust chain technology,a scheme was proposed to initi...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2017-02-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2017034/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530030202552320 |
---|---|
author | Lei WANG Meng LU |
author_facet | Lei WANG Meng LU |
author_sort | Lei WANG |
collection | DOAJ |
description | Smartphones with a trusted execution environment (TEE) has an authority issue of the certificate with the loading stage.Based on the analysis of the initialization architecture and initializing scheme of the trusted execution environment,by using trust chain technology,a scheme was proposed to initialize the trusted terminal of the operator's card as the trusted root,and ideas were provided for the telecom operators to use the user card resources to participate in the construction of the industrial chain of the trusted execution environment. |
format | Article |
id | doaj-art-1ede1748799a493782f0939535daee0c |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2017-02-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-1ede1748799a493782f0939535daee0c2025-01-15T03:13:17ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012017-02-013391459603251Initialization scheme of the trusted execution environment based on the user cardLei WANGMeng LUSmartphones with a trusted execution environment (TEE) has an authority issue of the certificate with the loading stage.Based on the analysis of the initialization architecture and initializing scheme of the trusted execution environment,by using trust chain technology,a scheme was proposed to initialize the trusted terminal of the operator's card as the trusted root,and ideas were provided for the telecom operators to use the user card resources to participate in the construction of the industrial chain of the trusted execution environment.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2017034/user cardcard initializationtrusted execution environment |
spellingShingle | Lei WANG Meng LU Initialization scheme of the trusted execution environment based on the user card Dianxin kexue user card card initialization trusted execution environment |
title | Initialization scheme of the trusted execution environment based on the user card |
title_full | Initialization scheme of the trusted execution environment based on the user card |
title_fullStr | Initialization scheme of the trusted execution environment based on the user card |
title_full_unstemmed | Initialization scheme of the trusted execution environment based on the user card |
title_short | Initialization scheme of the trusted execution environment based on the user card |
title_sort | initialization scheme of the trusted execution environment based on the user card |
topic | user card card initialization trusted execution environment |
url | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2017034/ |
work_keys_str_mv | AT leiwang initializationschemeofthetrustedexecutionenvironmentbasedontheusercard AT menglu initializationschemeofthetrustedexecutionenvironmentbasedontheusercard |