首页>
外国专利>
Trusted execution environment access control rules derivation
Trusted execution environment access control rules derivation
展开▼
机译:可信执行环境访问控制规则的推导
展开▼
页面导航
摘要
著录项
相似文献
摘要
An access control method for Trusted Applications (20) characterised by inferring an access control rule (28) for a Trusted Application (20) from a rule (26) applied in a Rich OS (12) to a Rich OS application (16). The access control method is suitably implemented in a system comprising a Rich Execution Environment (12) and a Trusted Execution Environment (14), and whereby for each facility for which access control rules (24, 26) is defined in the Rich OS (12), a corresponding set of access control rules (28, 29) is defined in the TEE (14). An apparatus is also disclosed, which comprises a TEE (12) capable, in use, of running Trusted Applications (20) and a Rich OS (12) capable, in use, of running Rich applications (16), a secured interface between Rich OS (12) and the TEE (14), characterised by each Rich application (16) having access rights to facilities defined by an access control protocol (22) comprising access control rules (24) for the Rich OS application (16); and by the TEE (14) comprising a Session Access Control module (29) adapted in use, to block or allow sessions (18) from the Rich application (16) to a Trusted Application (20), wherein the session access control module (29) is configured to accept or deny session requests (18) depending on the context of the request (18).
展开▼