Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Trusted application calling method, device and equipment and computer storage medium

An application program and program invocation technology, applied in the field of information security, can solve problems such as information security risks, and achieve the effect of increasing security

Pending Publication Date: 2021-10-26
CHINA MOBILE CHENGDU INFORMATION & TELECOMM TECH CO LTD +1
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, in the process of completing the corresponding business, the processor needs to control the CA on the REE side to call the TA on the TEE side, and only check whether the signature of the TEE OS on the TA is legal, and there are certain information security risks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted application calling method, device and equipment and computer storage medium
  • Trusted application calling method, device and equipment and computer storage medium
  • Trusted application calling method, device and equipment and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The characteristics and exemplary embodiments of various aspects of the present invention will be described in detail below. In order to make the purpose, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described here are only configured to explain the present invention, not to limit the present invention. It will be apparent to one skilled in the art that the present invention may be practiced without some of these specific details. The following description of the embodiments is only to provide a better understanding of the present invention by showing examples of the present invention.

[0053] It should be noted that in this article, relational terms such as first and second are only used to distinguish one entity or operation from another entity or operation, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a trusted application calling method and device, equipment and a computer storage medium. The trusted application calling method comprises the following steps: receiving first communication information sent by a client application program; judging whether the first communication information meets a preset condition or not; and if the first communication information meets the preset condition, controlling the client application program to call a trusted application program corresponding to the client application program. According to the trusted application calling method and device, the equipment and the computer storage medium, trusted application calling can be carried out more safely.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a calling method, device, electronic equipment and computer storage medium of a trusted application program. Background technique [0002] With the development of network information technology, information security issues are becoming more and more important. However, in order to improve the efficiency of business processing, the same processor is divided into two sets of isolated systems (Trust Execution Environment (TEE) It is time-shared with the rich execution environment (Rich Execution Environment, REE)). [0003] Among them, TEE is a set of software and hardware components that can provide the necessary facilities for applications. A trusted application (Trusted Application, TA) is an application running in the TEE environment, and the TA must have the signature of the TEE OS. TEE OS is an operating system in the TEE environment, such as the op...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/448G06F21/51
CPCG06F9/4482G06F21/51
Inventor 刘耕骆平
Owner CHINA MOBILE CHENGDU INFORMATION & TELECOMM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products