Secure mobile terminal electronic authentication method and system
An electronic authentication system and mobile terminal technology, which is applied in the field of secure mobile terminal electronic authentication and systems, can solve the problems of transaction data tampering by Trojan horses, high cost, and inconvenience for users to carry around, so as to improve transaction security, reduce production costs, The effect of guaranteeing uniqueness
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0074] Example 1
[0075] A secure mobile terminal electronic authentication method, including a security unit (SE) built in the mobile terminal capable of storing keys and a trusted execution environment (TEE) built in the mobile terminal. The security unit (SE) is provided with A secure application applet that can run in it, and the trusted execution environment (TEE) is provided with a secure echo trusted application (TA), including the following steps:
[0076] Step S1, the terminal uses the security application applet to generate a public-private key pair inside the security unit. The private key is stored in the security unit (SE) and cannot be exported. The public key is submitted to the electronic certification service agency to apply for a digital certificate. After completing the digital certificate application After that, store the digital certificate inside the security unit;
[0077] Step S2, before the user uses the mobile terminal APP for electronic signature of the t...
Example Embodiment
[0079] Example 2
[0080] A secure mobile terminal electronic authentication method, including a security unit (SE) built in the mobile terminal capable of storing keys and a trusted execution environment (TEE) built in the mobile terminal. The security unit (SE) is provided with A secure application applet that can run in it, and the trusted execution environment (TEE) is provided with a secure echo trusted application (TA), including the following steps:
[0081] Step S1, the terminal uses the security application applet to generate a public-private key pair inside the security unit. The private key is stored in the security unit (SE) and cannot be exported. The public key is submitted to the electronic certification service agency to apply for a digital certificate. After completing the digital certificate application After that, store the digital certificate inside the security unit;
[0082] Step S2, before the user uses the mobile terminal APP for electronic signature of the t...
Example Embodiment
[0084] Example 3
[0085] A secure mobile terminal electronic authentication method based on mobile phone security unit (SE) and trusted execution environment (TEE) technology to achieve transaction security echo, including a storable and non-exportable user private key, and a signature encryption function A TA program that is built in the security unit (SE) of the mobile terminal and can run in the trusted execution environment (TEE) to realize the transaction security echo function. A set of applets in the security unit (SE) can be managed and the TA can be displayed safely. A trusted management system for mobile electronic certification managed by programs.
[0086] The public and private key pair generated by the adopted PKI technology is generated in the security unit (SE) built into the mobile terminal. Once the key is generated, the private key cannot be derived. Including the application applet running in the security unit (SE);
[0087] The user's transaction information c...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap