Initialization scheme of the trusted execution environment based on the user card

Smartphones with a trusted execution environment (TEE) has an authority issue of the certificate with the loading stage.Based on the analysis of the initialization architecture and initializing scheme of the trusted execution environment,by using trust chain technology,a scheme was proposed to initi...

Full description

Saved in:
Bibliographic Details
Main Authors: Lei WANG, Meng LU
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2017-02-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2017034/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530030202552320
author Lei WANG
Meng LU
author_facet Lei WANG
Meng LU
author_sort Lei WANG
collection DOAJ
description Smartphones with a trusted execution environment (TEE) has an authority issue of the certificate with the loading stage.Based on the analysis of the initialization architecture and initializing scheme of the trusted execution environment,by using trust chain technology,a scheme was proposed to initialize the trusted terminal of the operator's card as the trusted root,and ideas were provided for the telecom operators to use the user card resources to participate in the construction of the industrial chain of the trusted execution environment.
format Article
id doaj-art-1ede1748799a493782f0939535daee0c
institution Kabale University
issn 1000-0801
language zho
publishDate 2017-02-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-1ede1748799a493782f0939535daee0c2025-01-15T03:13:17ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012017-02-013391459603251Initialization scheme of the trusted execution environment based on the user cardLei WANGMeng LUSmartphones with a trusted execution environment (TEE) has an authority issue of the certificate with the loading stage.Based on the analysis of the initialization architecture and initializing scheme of the trusted execution environment,by using trust chain technology,a scheme was proposed to initialize the trusted terminal of the operator's card as the trusted root,and ideas were provided for the telecom operators to use the user card resources to participate in the construction of the industrial chain of the trusted execution environment.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2017034/user cardcard initializationtrusted execution environment
spellingShingle Lei WANG
Meng LU
Initialization scheme of the trusted execution environment based on the user card
Dianxin kexue
user card
card initialization
trusted execution environment
title Initialization scheme of the trusted execution environment based on the user card
title_full Initialization scheme of the trusted execution environment based on the user card
title_fullStr Initialization scheme of the trusted execution environment based on the user card
title_full_unstemmed Initialization scheme of the trusted execution environment based on the user card
title_short Initialization scheme of the trusted execution environment based on the user card
title_sort initialization scheme of the trusted execution environment based on the user card
topic user card
card initialization
trusted execution environment
url http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2017034/
work_keys_str_mv AT leiwang initializationschemeofthetrustedexecutionenvironmentbasedontheusercard
AT menglu initializationschemeofthetrustedexecutionenvironmentbasedontheusercard