Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

TEE access control method and mobile terminal for achieving same

An access control and mobile terminal technology, applied in the computer field, can solve problems such as system jitter, Android system unresponsiveness, failure to respond to normal access requests of legitimate applications, etc., to prevent malicious access, avoid inaccessibility, and improve overall usability and reliability Effect

Active Publication Date: 2016-07-27
CHINA UNIONPAY
View PDF3 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] When an Android application uses this mechanism to continuously maliciously access the TEE trusted application, since each selection needs to be determined by the TEE to determine whether the access is valid, the terminal must be continuously switched to the TEE for execution, causing the terminal to run on the Android Switching back and forth between TEE and TEE is likely to cause system jitter and cause the Android system to be unresponsive
At the same time, when the TEE application is initiated and maliciously selected to access, it is easy to make the TEE trusted application always in the state of user permission judgment, and cannot respond to the normal access request of the legitimate application.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • TEE access control method and mobile terminal for achieving same
  • TEE access control method and mobile terminal for achieving same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Introduced below are some of the various embodiments of the invention, intended to provide a basic understanding of the invention. It is not intended to identify key or critical elements of the invention or to delineate the scope of protection.

[0046] The access control method of the present invention and the mobile terminal implementing the access control method will be described below. In this manual, the Android system is taken as an example of a multimedia operating system, and the TEE system is taken as an example of a security operating system for illustration. Certainly, the present invention is not limited to the Android system, and may also be other multimedia operating systems.

[0047] figure 1 is a structural block diagram of a mobile terminal according to an embodiment of the present invention.

[0048] Such as figure 1 As shown, a mobile terminal according to an embodiment of the present invention includes a multimedia operating system system and a sec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an access control method of a multimedia system on a secure operating system and a mobile terminal for achieving the method.The method comprises the steps that an application access request for selecting dependable applications is initiated for the secure operating system from client side applications of the multimedia system; whether the current client applications initiating calling are vicious applications or not is judged, if not, the next step continues, and if yes, the information that selection fails is returned to the client side applications, and processing is interrupted; the application access request is sent to the secure operating system from the multimedia system; the dependable applications are obtained in the secure operating system according to the application access request and returned to the multimedia system.According to the method, vicious access initiated by the vicious applications to the dependable applications in the secure operating system can be prevented under the condition of not switching the systems, and the problem that access to the dependable applications cannot be achieved due to vicious access can be avoided.

Description

technical field [0001] The invention relates to computer technology, in particular to an access control method for realizing access to a safe operating system from a multimedia operating system in a mobile terminal and a mobile terminal for realizing the access control method. Background technique [0002] With the increasingly wide application of computers and networks and the increasing variety of businesses in different fields, equipment used for security information interaction (that is, information interaction with high security requirements, such as transaction processing in the financial field) (especially It is a security information interaction device based on mobile terminals) is becoming more and more important. [0003] In traditional technical solutions, in order to improve the security of information exchange devices, the concept of Trusted Execution Environment (Trusted Execution Environment, TEE) has been proposed. Due to the emergence of TEE, more and mor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/31G06F21/562G06F21/56G06F21/53G06F21/74G06F2221/033G06F2221/2149
Inventor 陈成钱周钰郭伟
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products