Safe communication method and device

A secure communication and security chip technology, applied in the field of communication, can solve problems such as monitoring, endangering communication interaction security, and poor user experience

Active Publication Date: 2016-02-03
HENGBAO
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Except that the public key of the chip manufacturer is stored in the ROM of the core chip of the mobile terminal, other keys are stored in the TEEOS. Since the OS in the TEE uses Flash as the storage medium, this medium is not safe. If it is used for storage, the security requirements are very high key, there is a risk of being cracked, therefore, the security of mobile terminals for information processing is still poor
[0005] Although there is currently a method of presetting the key in the security chip SE, the communication between the SE and the trusted application TA in the TEE, or the communication between the trusted application TA and the application CA in the REE, uses plaintext communication, and the link data Transparent, so it is easy to be monitored and endanger the security of communication interaction. In addition, ciphertext communication will increase system overhead and poor user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe communication method and device
  • Safe communication method and device
  • Safe communication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention.

[0076] This application proposes a secure communication device, such as figure 1 As shown, it includes a security chip 101, a trusted application 102 and a user application 103. The following describes each component, wherein:

[0077] 1. The security chip 101 is used to establish a connection with the trusted application 102 and communicate with the user application 103 through the trusted application 102;

[0078] Specifically: the security chip 101 sends an application confirmation instruction to the trusted security application 102, receives the TA identity information sent by the trusted security application 102, verifies the TA identity information of the trusted security application 102; 102 sends the SE identity information; receives the external authentication instru...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safe communication method and device. The method comprises steps of performing basic information authentication, external authentication and secondary authentication on a security chip and a trusted application, so as to establish a connection between the security chip and the trusted application; performing basic information authentication, external authentication and secondary authentication on the trusted application and a user application, so as to establish a connection between the trusted application and the user application; and establishing a logic connection between the security chip and the user application. A safe channel is established before business communication, and all data communicated in the safe channel is encrypted and transmitted, so that the data in the link is not transparent any longer. The method can effectively prevent interception, guarantees the business to be executed safely, needs no external equipment, and increases user experience.

Description

technical field [0001] The present invention relates to a communication technology, in particular to a safe communication method and device. Background technique [0002] At present, there are generally two types of application running environments in mobile terminals: one is Rich Execution Environment (REE), in which any application CA can be executed; the other is Trusted Execution Environment (TEE), TEE It can support security features such as secure startup and security management of the trusted application TA. Specifically, the TEE presets the relevant key in the mobile terminal, or dynamically writes the relevant key, when downloading, starting or running the trusted application TA A series of security operations are performed to improve the security of information processing by the mobile terminal. [0003] When the TEE performs security operations on the application according to its preset or dynamically written key, it first obtains the relevant key from the ROM of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/04H04W12/06H04W12/0433
CPCH04W12/02H04W12/04H04W12/06
Inventor 张景宇杨俊
Owner HENGBAO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products