A security communication method and device

A security communication and security chip technology, applied in the field of communication, can solve the problems of monitoring, endangering the security of communication interaction, poor user experience, etc.

Active Publication Date: 2019-03-19
HENGBAO
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Except that the public key of the chip manufacturer is stored in the ROM of the core chip of the mobile terminal, other keys are stored in the TEEOS. Since the OS in the TEE uses Flash as the storage medium, this medium is not safe. If it is used for storage, the security requirements are very high key, there is a risk of being cracked, therefore, the security of mobile terminals for information processing is still poor
[0005] Although there is currently a method of presetting the key in the security chip SE, the communication between the SE and the trusted application TA in the TEE, or the communication between the trusted application TA and the application CA in the REE, uses plaintext communication, and the link data Transparent, so it is easy to be monitored and endanger the security of communication interaction. In addition, ciphertext communication will increase system overhead and poor user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security communication method and device
  • A security communication method and device
  • A security communication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention.

[0080] This application proposes a secure communication device, such as figure 1 As shown, it includes a security chip 101, a trusted application 102 and a user application 103. The following describes each component, wherein:

[0081] 1. The security chip 101 is used to establish a connection with the trusted application 102 and communicate with the user application 103 through the trusted application 102;

[0082] Specifically: the security chip 101 sends an application confirmation instruction to the trusted security application 102, receives the TA identity information sent by the trusted security application 102, verifies the TA identity information of the trusted security application 102; 102 sends the SE identity information; receives the external authentication instru...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application proposes a secure communication method and device, wherein the method includes establishing a connection between the security chip and the trusted application through basic information authentication, external authentication, and secondary authentication, and the trusted application and the user application pass basic information authentication, external authentication, and secondary authentication To establish a connection, the security chip establishes a logical connection with the user application. By establishing a secure channel before business communication, all communication data in the secure channel is encrypted and transmitted, making the data in the link no longer transparent. This method can effectively prevent eavesdropping and ensure The secure execution of services without additional external devices enhances user experience.

Description

technical field [0001] The present invention relates to a communication technology, in particular to a safe communication method and device. Background technique [0002] At present, there are generally two types of application running environments in mobile terminals: one is the Rich Execution Environment (REE), in which any application CA can be executed; the other is the Trusted Execution Environment (TEE). ), the TEE can support security features such as secure startup and security management of the trusted application TA. Specifically, the TEE presets the relevant key in the mobile terminal, or dynamically writes the relevant key, and the trusted A series of security operations are performed when the TA is applied, thereby improving the security of information processing by the mobile terminal. [0003] When the TEE performs security operations on the application according to its preset or dynamically written key, it first obtains the relevant key from the ROM of the c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W12/04H04W12/06H04W12/0433
CPCH04W12/02H04W12/04H04W12/06
Inventor 张景宇杨俊
Owner HENGBAO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products