Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for trusted application security authentication

An application security and security authentication technology, applied in the field of trusted application security authentication, can solve the problems of security risks, inability to identify whether the CA is legal, uncontrolled access by the CA to the TA, etc., and achieve the effect of improving security.

Active Publication Date: 2016-09-28
HENGBAO
View PDF4 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Since TEE allows multiple CAs and TAs to run at the same time, and there is no mutual authentication between CAs and TAs, that is, TAs cannot identify whether the currently accessed CA is legal, etc., there may be security issues that CA access to TAs is not controlled, such as forging a CA, whose ID number is within the range allowed by TEE, then the CA can send instructions to TA at will and get the response result, which poses a security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for trusted application security authentication
  • System and method for trusted application security authentication
  • System and method for trusted application security authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0040] An embodiment of the present invention provides a system for trusted application security authentication, such as figure 1 As shown, the system includes a client application 1 , a security manager 2 , a TEE client API interface 3 and a trusted application 5 . in:

[0041] Client application 1 runs in a rich execution environment and processes processes and / or data that are not related to security in client application 1. When running to pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a system and method for trusted application security authentication, relating to the technical field of mobile device security and used for improving the security of user data. The system comprises a client application, a security manager, a TEE client API and a trusted application, wherein the client application operates in a rich execution environment and processes a process and / or data irrelevant to security in the client application, and makes a request for invoking the TEE client API to the security manager when running to a process and / or data relevant to security; the security manager monitors authorization states of the client application, and conducts hierarchical authorization on the request for invoking the TEE client API made by the client application according to different authorization states; and the trusted application operates in a trusted application environment, and processes the process and / or data relevant to security in the request of the client application after conducting security authentication on the client application. The system and method provided by the present invention is used for improving the security of user data.

Description

technical field [0001] The present application relates to the technical field of mobile device security, and relates to a system and method for trusted application security authentication. Background technique [0002] The development of mobile communication technology has brought about the rapid development of mobile terminal technology. Modern mobile terminal equipment provides a powerful and flexible REE (Rich Execution Environment, Rich Execution Environment), but it also makes mobile terminal equipment vulnerable to security threats. TEE (Trusted Execution Environment, Trusted Execution Environment) is proposed to solve the above problems. Among them, TEE and REE run in parallel on the same mobile terminal device. TEE can ensure the storage, processing and protection of sensitive data in a trusted environment, and provides a safe execution environment for authorized security software. [0003] Common applications include TA (Trusted Application, trusted application) an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/06H04W12/08H04W12/30
CPCH04L63/105H04L63/30H04W12/06
Inventor 杨俊
Owner HENGBAO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products