Application activation method and device based on trusted execution environment

An execution environment and trusted technology, applied in the field of application security, can solve problems such as illegal cracking of software, illegal extension of software use times or validity period, unencrypted storage of registration code files, etc.

Pending Publication Date: 2020-09-04
ALIBABA GRP HLDG LTD
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. The registration code file is not encrypted and stored in the device, so it can be copied to other devices in plain text, so that the software installed on other devices can be illegally cracked
In addition, the content of the registration code file may be tampered with by the user to illegally extend the number of times of use or the validity period of the software
[0005] 2. The registration code file is not bound to the device, so the registration code file can be used in different devices, and the software installed on other devices is illegally cracked
[0006] 3. When the server transmits the registration code to the device, the content of the registration code file is not encrypted, which makes the registration code file easy to be monitored or forged

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application activation method and device based on trusted execution environment
  • Application activation method and device based on trusted execution environment
  • Application activation method and device based on trusted execution environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Hereinafter, exemplary embodiments of the present disclosure will be described in more detail with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure can be implemented in various forms and should not be limited by the embodiments set forth herein. On the contrary, these embodiments are provided to enable a more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0036] The invention provides an application activation scheme based on a trusted execution environment. In the technical solution of the present invention, firstly, the trusted execution environment in the terminal device is activated. After the trusted execution environment has been activated, the trusted execution environment can provide trusted application activation to other applications of the terminal ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an activation method of a trusted execution environment, the trusted execution environment is deployed in a terminal device, and the method comprises the following steps: sending a terminal device identifier to a server; receiving activation information returned by the server, the activation information comprising an encrypted trusted identity identifier, a trusted key andan activation code, the trusted identity identifier and the trusted key corresponding to the terminal device identifier, and the activation code being generated according to the terminal device identifier; decrypting the activation information to obtain a trusted identity, a trusted key and an activation code; and encrypting and storing the trusted identity, the trusted key and the activation codeinto a secure storage space. The invention also discloses an activation verification method of the trusted execution environment, an application activation and activation verification method based onthe trusted execution environment, and a corresponding device.

Description

Technical field [0001] The present invention relates to the technical field of application security, in particular to an application activation method and device based on a trusted execution environment. Background technique [0002] After the software is released, a way is needed to prevent the software from being cracked and misappropriated to ensure the software developers' own interests. Currently, the software is usually protected by a registration code, that is, the user first downloads and installs the trial version of the software, and then activates the software by applying for the registration code from the server. Later, when the user uses the software, the software will read the registration code file and determine whether the software is available according to the registration code file. [0003] There are some problems with the above software activation scheme: [0004] 1. The registration code file is not encrypted and stored in the device, so that it can be copied t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/60
CPCG06F21/57G06F21/602G06F21/12G06F21/60
Inventor 黄腾成亮李海东
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products