Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure mobile terminal electronic authentication method and system

An electronic authentication system and mobile terminal technology, which is applied in the field of secure mobile terminal electronic authentication and systems, can solve the problems of transaction data tampering by Trojan horses, high cost, and inconvenience for users to carry around, so as to improve transaction security, reduce production costs, The effect of guaranteeing uniqueness

Active Publication Date: 2017-03-15
黄付营
View PDF6 Cites 49 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The key in method 1 is stored in the rich execution environment (REE), and the key is easily stolen by a Trojan horse implanted in a mobile terminal, which cannot achieve the high security specified in the "Financial Electronic Authentication Specification" (JR / T 0118-2015) Require
[0011] The private key in method 2 is stored in the Trusted Execution Environment (TEE). The private key is not easy to be stolen by a Trojan horse implanted in the mobile terminal, but it can be obtained by the administrator of the Trusted Execution Environment (TEE), and there is also security. Risk, unable to meet the high security requirements in the "Financial Electronic Authentication Specification" (JR / T 0118-2015)
[0012] Mode 3, the private key is stored in the security element (SE), and the Trojan horse cannot steal it, but the user's transaction confirmation operation is operated in the rich execution environment (REE), and the transaction data is easily tampered by the Trojan horse in the rich execution environment (REE). Therefore, it cannot meet the high security requirements in the "Financial Electronic Authentication Specification" (JR / T 0118-2015)
[0013] Method 4, the private key is stored in the security unit (SE), and there is an independent operating system to control the transaction echo to facilitate the user's secondary confirmation of the transaction, which can meet the "Financial Electronic Authentication Specification" (JR / T 0118-2015) High security level requirements in the medium, but it is inconvenient for users to carry it around, and the cost is high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure mobile terminal electronic authentication method and system
  • Secure mobile terminal electronic authentication method and system
  • Secure mobile terminal electronic authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0075] A secure electronic authentication method for a mobile terminal, comprising a built-in security element (SE) capable of storing keys in the mobile terminal and a built-in trusted execution environment (TEE) in the mobile terminal, the security element (SE) is provided with A safe application program applet that can run therein, the trusted execution environment (TEE) is provided with a safe echo trusted application program (TA), including the following steps:

[0076] Step S1, the terminal uses the security application program applet to generate a public-private key pair inside the security element. The private key is stored in the security element (SE) and cannot be exported. The public key is submitted to the electronic certification service agency to apply for a digital certificate. After completing the digital certificate application After that, store the digital certificate inside the security unit;

[0077] Step S2, before the user uses the mobile terminal APP to ...

Embodiment 2

[0080] A secure electronic authentication method for a mobile terminal, comprising a built-in security element (SE) capable of storing keys in the mobile terminal and a built-in trusted execution environment (TEE) in the mobile terminal, the security element (SE) is provided with A safe application program applet that can run therein, the trusted execution environment (TEE) is provided with a safe echo trusted application program (TA), including the following steps:

[0081] Step S1, the terminal uses the security application program applet to generate a public-private key pair inside the security element. The private key is stored in the security element (SE) and cannot be exported. The public key is submitted to the electronic certification service agency to apply for a digital certificate. After completing the digital certificate application After that, store the digital certificate inside the security unit;

[0082] Step S2, before the user uses the mobile terminal APP to ...

Embodiment 3

[0085] A secure mobile terminal electronic authentication method based on mobile phone security element (SE) and trusted execution environment (TEE) technology to realize transaction security echo, including a user private key that can be stored and cannot be exported, and can complete the signature encryption function A TA program that is built into the security element (SE) of the mobile terminal and can run in the trusted execution environment (TEE) to realize the transaction security echo function. A set of applets in the security element (SE) can be managed, and TA can be safely displayed. A mobile electronic authentication trusted management system managed by the program.

[0086] The public-private key pair generated by the PKI technology is generated in the built-in security element (SE) of the mobile terminal. Once the key is generated, the private key cannot be exported. Contains application applets running in a secure element (SE);

[0087] The transaction informat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a secure mobile terminal electronic authentication method and system. The secure mobile terminal electronic authentication system comprises a secure element (SE) which is arranged in a mobile terminal and can store a key, and a trusted execution environment (TEE) which is arranged in the mobile terminal; a secure application applet which can run in the secure element is arranged in the secure element (SE); the secure application can generate a public-private key pair for electronic signature; and a private key is stored in the secure element (SE) and cannot be exported or duplicated. A secure redisplay trusted application (TA) is arranged in the trusted execution environment (TEE), so that transaction correctness can be confirmed artificially by a user and the transaction cannot be attacked by trojan horse in a rich execution environment (REE). The secure mobile terminal electronic authentication method and system greatly reduce high cost caused by additionally required production of hardware devices, solve the problem of using and carrying inconvenience for the user, are conducive to energy conservation and emission reduction, and save the social resources.

Description

technical field [0001] The present invention relates to the field of electronic authentication of smart mobile terminals such as mobile phones, and specifically relates to a secure mobile terminal electronic authentication system and method, which are applied to security elements (SE) / trusted execution environments (TEE) and security element-based authentication of mobile terminals. (SE) and trusted execution environment (TEE) mobile terminal security service system and method. Background technique [0002] At present, the technical background of the application of electronic authentication on the mobile terminal mainly includes the following: [0003] 1. Use the mobile terminal Rich Execution Environment (REE) to store keys, and implement electronic authentication in software. [0004] 2. Use the mobile terminal Trusted Execution Environment (TEE) to store keys, and implement electronic authentication in software. [0005] 3. Use external components that can be inserted i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32G06Q20/38
CPCG06Q20/38215G06Q20/3825H04L9/3247H04L9/3268H04L63/0823H04L63/0892
Inventor 闫春清徐超杰
Owner 黄付营
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products