FIELD: electrical communication engineering.
SUBSTANCE: invention relates to mobile communication devices. Disclosed is a mobile communication device comprising a first trusted platform module; a second trusted platform module; a processor and a storage medium containing instructions that cause the processor to establish a root of trust for a first persona and a second persona, comprising a first operating system and a first trusted execution environment; to establish a root of trust for a second persona comprising a second operating system and a second trusted execution environment, wherein the root of trust for the first persona is separate from the root of trust for the second persona; storing measurements that define the root of trust for the first persona in the first trusted platform module; storing measurements that define the root of trust for the second persona in the second trusted platform module and loading the first persona and the second persona using roots of trust for the first and second personas, wherein the first persona obtains access to the components of the mobile communication device in accordance with the root of trust for the first persona, and the second persona obtains access to the components of the mobile communication device in accordance with the root of trust for the second persona.
EFFECT: technical result is the separation of certain data from other applications and / or operations of the mobile communication device and maintaining their security at a higher level than the security of said other applications and / or operations.
20 cl, 9 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF AUTHORISING OPERATION TO BE PERFORMED ON TARGETED COMPUTING DEVICE | 2014 |
|
RU2675902C2 |
MOBILE COMMUNICATION DEVICE AND METHOD FOR OPERATION THEREOF | 2014 |
|
RU2672712C2 |
RANSOMWARE MITIGATION IN INTEGRATED ISOLATED APPLICATIONS | 2020 |
|
RU2807463C2 |
DEVICE SAFETY AUTOMATIC CERTIFICATION WITH THE USE OF THE BLOCKS CHAIN | 2016 |
|
RU2673842C1 |
COMPLEX OF HARDWARE AND SOFTWARE CREATING PROTECTED CLOUD ENVIRONMENT WITH AUTONOMOUS FULL-FUNCTION LOGICAL CONTROL INFRASTRUCTURE WITH BIOMETRIC-NEURAL NETWORK IDENTIFICATION OF USERS AND WITH AUDIT OF CONNECTED HARDWARE | 2016 |
|
RU2635269C1 |
PRESENTING OPERATING SYSTEM CONTEXT IN TRUSTED PLATFORM MODULE | 2015 |
|
RU2702276C2 |
ATTESTATION OF HOST CONTAINING TRUSTED EXECUTION ENVIRONMENT | 2015 |
|
RU2679721C2 |
HARDWARE VIRTUALIZED ISOLATION FOR ENSURING SECURITY | 2017 |
|
RU2755880C2 |
PROCESSING OF CONTENT FOR APPLICATIONS | 2012 |
|
RU2626658C2 |
PROGRAM-HARDWARE PLATFORM AND METHOD OF ITS REALISATION FOR WIRELESS COMMUNICATION FACILITIES | 2016 |
|
RU2626550C1 |
Authors
Dates
2018-12-03—Published
2014-07-01—Filed