Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, system and apparatus for carrying out safety authentication on application programs

An application program and security authentication technology, applied in the field of security authentication, can solve the problem of illegal theft and loss of key algorithms and sensitive information by hackers, and achieve the effect of enhancing integrity, improving security, and ensuring security

Active Publication Date: 2015-11-25
SAMSUNG ELECTRONICS CHINA R&D CENT +1
View PDF3 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing technology only performs simple security verification on the application program, without further security protection and certification for the content of the application program itself, which may lead to the illegal theft of key algorithms and sensitive information by hackers, resulting in huge losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and apparatus for carrying out safety authentication on application programs
  • Method, system and apparatus for carrying out safety authentication on application programs
  • Method, system and apparatus for carrying out safety authentication on application programs

Examples

Experimental program
Comparison scheme
Effect test

example

[0091] see image 3 , which is an example of a flow chart of the security authentication of a trusted application by a smart device in the present invention, which includes the following steps:

[0092] Step S302: Use the UUID corresponding to the trusted application and the secure shared key in the trusted execution environment to perform HMAC calculation to obtain a decryption key for decrypting the trusted application and additional information.

[0093] Step S304: Use the decryption key obtained in step S302 to decrypt the trusted application and the corresponding additional information to obtain the decrypted trusted application and the corresponding additional information.

[0094] Step S306: Perform a hash operation on the decrypted trusted application program to obtain summary information 1.

[0095] Step S308: Use the public key in the additional information to decrypt the signature information in the additional information to obtain the digest information 2.

[0096]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, system and apparatus for carrying out safety authentication on application programs. The method comprises acquiring a trusted application package from a distribution server of trusted application programs, transferring the trusted application package to a trusted execution environment, unpacking the trusted application package in the execution environment to obtain a trusted application program and additional information; acquiring decrypting keys of the trusted application program and the additional information; decrypting the trusted application program and the additional information using the decrypting keys to obtain decrypted trusted application program and additional information; carrying out single-input message digest algorithms on the decrypted trusted application program and additional information to obtain summary information; decrypting the additional information using a public key of the additional information to obtain original summary information; determining whether the original summary information is the same as the summary information, completing safety authentication, loading and operating the trusted application program in the trusted execution environment if the original summary information is the same as the summary information By adopting the method, the system and the apparatus, the security of authentication can be raised.

Description

technical field [0001] The invention relates to security authentication technology, in particular to a method, system and equipment for security authentication of application programs. Background technique [0002] With the popularity of smart devices such as smartphones, tablet computers, and smart TVs, the number of applications running on smart devices has also shown explosive growth. In order to protect the rights and interests of software developers, the distribution of applications needs to pass security certification. Smart devices are generally only allowed to install security-certified applications, and the existing security verification process is very simple, only guaranteeing the integrity of the application and the copyright of the software developer. [0003] At the same time, applications are being used in a wider range, such as audio and video playback, electronic payment, and content sharing between devices. The key algorithm (code segment) and sensitive i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/60
CPCG06F21/126G06F21/606
Inventor 叶建隆成亮刘明孙发龙
Owner SAMSUNG ELECTRONICS CHINA R&D CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products