Trusted application processing method based on multiple containers and related equipment

A technology of application programs and processing methods, applied in the field of communication, can solve the problems of complex development and deployment process of trusted applications, vulnerability to external attacks, and low processing efficiency of trusted application programs TA

Active Publication Date: 2019-12-03
HUAWEI TECH CO LTD
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Due to some limitations in the current TEE application architecture, there are many differences in the implementation of trusted application management platforms by TEEs of different terminal manufacturers, which makes the development and deployment process of trusted applications more complicated. Since the core framework of TEE technology lies in REE and TEE isolation, because the REE side is vulnerable to external attacks, high-level data processing can only be implemented on the TEE side
Because TEE needs to ensure that TEE is truly credible through proprietary measures such as digitally signing TA's secure computing unit, TA developers must contact various TEE issuers (usually terminal manufacturers) for cooperative development. This upstream and downstream (TA development) The coupling relationship between the author and the TEE issuer) will lead to low processing efficiency of the trusted application TA

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted application processing method based on multiple containers and related equipment
  • Trusted application processing method based on multiple containers and related equipment
  • Trusted application processing method based on multiple containers and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The embodiment of the present application provides a multi-container-based trusted application processing method and related equipment, which are used to simplify the development and deployment process of trusted applications, and improve the processing efficiency and trusted execution of trusted applications The security of the access interface of the environment.

[0049] In order to enable those skilled in the art to better understand the solutions of the present application, the following will describe the embodiments of the present application with reference to the drawings in the embodiments of the present application.

[0050] The terms "first", "second", "third", "fourth", etc. (if any) in the specification and claims of the present application and the above drawings are used to distinguish similar objects, and not necessarily Used to describe a specific sequence or sequence. It is to be understood that the terms so used are interchangeable under appropriate ci...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-container-based trusted application program processing method and related equipment, which are used for simplifying the development and deployment process of trusted application programs and improving the processing efficiency of the trusted application programs and the security of an access interface of a trusted execution environment. The method comprises the steps that a terminal performs integrity verification on a signed security computing unit through a security computing container; if the signed security computing unit passes the integrity verification, the terminal performs legality verification on the signed security computing unit through the security computing container and acquires a verification result; and if the verification result is legal, the terminal loads the signed security computing unit through a trusted execution environment (TEE) or a security element (SE) and acquires a security computing result of the trusted application.

Description

technical field [0001] The present application relates to the communication field, and in particular to a multi-container-based trusted application processing method and related equipment. Background technique [0002] Currently, terminal security mainly involves five areas: identity authentication, access control, security authentication, service authorization, and service audit. In the field of security authentication, hardware devices based on the universal serial bus interface (universal serial bus key, USB Key), trusted execution environment (trusted execution environment, TEE) and secure element (secure element, SE) have begun to appear. Among them, the trusted execution environment TEE can solve various security demands of upstream and downstream participants such as consumers, merchants, mobile operators, third-party payment, and financial institutions in the mobile payment scenario, and is currently the most promising solution. one of the technologies. At present,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/54
CPCG06F21/54G06F21/74G06F21/53G06F21/57H04L63/0823
Inventor 季杰
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products