Apparatus for security information interaction

A technology of security information and equipment, applied in the field of security information interaction equipment, can solve problems such as difficult proactive and thorough solutions, increased difficulty of application deployment, unfavorable promotion, etc., to reduce complexity, reduce deployment difficulty and Difficulty of management and effect of reducing maintenance

Active Publication Date: 2015-01-21
CHINA UNIONPAY
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the traditional technical solutions have the following problems: (1) Since new viruses and Trojan horses may continue to appear, the first method is difficult to provide active and Thorough solution; (2) Since the system management device of the information interaction equipment (such as the conventional multimedia operating system) has its own loopholes, even if the security boot method is used, the loopholes still exist. In addition, the frequent updates of the system and the application Modification of program leads to high cost
[0008]1. The client program needs two types of access interfaces, one interface is used to access the SSD under the multimedia operating system, and the other interface is used to access the SSD under the secure operating system SSD security application increases the complexity of the client program
[0009]2. It is necessary to deploy an SSD security application under the security operating system, resulting in the dispersion of the overall application environment, and it is necessary to maintain two sets of applications at the same time
[0010]3. The security application under the security operating system requires operations such as authorization and authentication of the TEE controller, which will increase the difficulty of application deployment and is not conducive to the promotion of the overall application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Apparatus for security information interaction
  • Apparatus for security information interaction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The following introduces some of the possible embodiments of the present invention, which are intended to provide a basic understanding of the present invention, but are not intended to identify key or decisive elements of the present invention or limit the scope of protection. It is easy to understand that, according to the technical solution of the present invention, those skilled in the art may propose other alternative implementation manners without changing the essence and spirit of the present invention. Therefore, the following specific embodiments and drawings are only exemplary descriptions of the technical solution of the present invention, and should not be regarded as the entirety of the present invention or as a limitation or restriction on the technical solution of the present invention.

[0028] In the following and accompanying drawings, "REE" indicates a multimedia operating system running in normal mode, "TEE" indicates a secure operating system ope...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses an apparatus for security information interaction, the apparatus comprising a first system management device and a second system management device; the first system management device is used for providing an operation environment in a normal mode for an application and is composed of: a unified interface command module used for providing a unified command interface for the application; a command distribution module for determining to which external secure carrier the command is to be sent according to the command received from the unified interface command module; and a first control module used for performing command interaction with the external secure carrier in a normal mode; and the second system management device is used for providing an operation environment in a secure mode and is composed of: a second control module used for performing command interaction with the secure carrier in a secure mode, wherein the command distribution module is configured to invoke the first control module when the external secure carrier is determined to be in the normal mode and is configured to invoke the second control module when the external secure carrier is determined to be in the secure mode.

Description

technical field [0001] The present invention relates to a device for information exchange, and more particularly, a device for security information exchange. Background technique [0002] With the increasingly wide application of computers and networks and the increasing variety of businesses in different fields, equipment used for security information interaction (that is, information interaction with high security requirements, such as transaction processing in the financial field) (especially It is a security information interaction device based on mobile terminals) is becoming more and more important. [0003] In traditional technical solutions, in order to improve the security of information interaction equipment, the following two methods are typically adopted: (1) Implement security mechanisms for existing system management devices (such as conventional multimedia operating systems) of information interaction equipment; Improvement, such as adding firewalls, anti-vir...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCG06F21/74G06F2221/2149
Inventor 陈成钱周钰郭伟
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products