Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Credible Key and safe operation method thereof

A safe operation and reliable technology, applied in the direction of instruments, digital data authentication, platform integrity maintenance, etc., can solve the problem of lack of trusted key products, and achieve the effect of simple design, convenient operation and good experience

Inactive Publication Date: 2014-04-23
EASTCOMPEACE TECH
View PDF4 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the present invention provides a trusted Key and its safe operation method to solve the problem of lack of trusted Key products based on a trusted operating environment in the prior art, and its technical solution is as follows:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credible Key and safe operation method thereof
  • Credible Key and safe operation method thereof
  • Credible Key and safe operation method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0040] see figure 1 , is a schematic structural diagram of a trusted key provided by an embodiment of the present invention. The trusted key may at least include: a communication agent module 101 , a secure storage module 102 , a trusted computing module 103 and a trusted interaction module 104 . The communication agent module 101, the secure storage module 102, the trusted computing module 103 and the trusted interaction module 104 can implement a tailored tr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a credible key and a safe operation method thereof. The credible Key comprises a communication agent module, a safe storage module, a credible computation module and a credible interaction module, wherein the communication agent module is used for establishing a safe channel between the credible Key and a credible operating system of terminal equipment; the safe storage module is used for providing a safe storage API (Application Program Interface) for developing a credible application, and providing a safe storage function for the credible Key; the credible computation module is used for providing a credible computation API for the credible application, and providing a credible computation function for the terminal equipment; the credible interaction module is used for transmitting an interaction command to the credible operating system of the terminal equipment through the communication agent module on the basis of user operation. The credible KEY can be used together with a credible running environment on the terminal equipment, thereby realizing credible services such as remote payment, online transfer, safe storage and credible computation.

Description

technical field [0001] The invention relates to the technical field of mobile payment, in particular to a trusted Key and a safe operation method thereof. Background technique [0002] At present, mobile payment terminal devices can be smartphones, PADs, or portable POS machines. The client application software of mobile payment products is generally set on the rich operating system (Rich Operating System, Rich OS) of the terminal device, and the client application software The running environment in which it resides is usually referred to as a rich resource running environment (Rich Execution Environment, REE). However, the operation of Rich OS on mobile payment terminal devices has great security problems. Therefore, these client application software are subject to security threats, especially private information such as user account information, account passwords, and transfer account information. illegally stolen and tampered with. [0003] In order to prevent the user...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/34G06Q20/34
CPCG06F21/42G06F21/34G06F21/57G06Q20/3415
Inventor 丁占阳周忠国黄小鹏蔡勃
Owner EASTCOMPEACE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products