Secure mobile terminal electronic authentication method and system

An electronic authentication system and mobile terminal technology, which is applied in the field of secure mobile terminal electronic authentication and systems, can solve the problems of transaction data tampering by Trojan horses, high cost, and inconvenience for users to carry around, so as to improve transaction security, reduce production costs, The effect of guaranteeing uniqueness

Active Publication Date: 2017-03-15
黄付营
View PDF6 Cites 49 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The key in method 1 is stored in the rich execution environment (REE), and the key is easily stolen by a Trojan horse implanted in a mobile terminal, which cannot achieve the high security specified in the "Financial Electronic Authentication Specification" (JR/T 0118-2015) Require
[0011] The private key in method 2 is stored in the Trusted Execution Environment (TEE). The private key is not easy to be stolen by a Trojan horse implanted in the mobile terminal, but it can be obtained by the administrator of the Trusted Execution Environment (TEE), and there is also security. Risk, unable to meet the high security requirements in the "Financial Electronic Authentication Specification" (JR/T 0118-2015)
[0012] Mode 3, the private key is stored in the security element (SE), and the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure mobile terminal electronic authentication method and system
  • Secure mobile terminal electronic authentication method and system
  • Secure mobile terminal electronic authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0074] Example 1

[0075] A secure mobile terminal electronic authentication method, including a security unit (SE) built in the mobile terminal capable of storing keys and a trusted execution environment (TEE) built in the mobile terminal. The security unit (SE) is provided with A secure application applet that can run in it, and the trusted execution environment (TEE) is provided with a secure echo trusted application (TA), including the following steps:

[0076] Step S1, the terminal uses the security application applet to generate a public-private key pair inside the security unit. The private key is stored in the security unit (SE) and cannot be exported. The public key is submitted to the electronic certification service agency to apply for a digital certificate. After completing the digital certificate application After that, store the digital certificate inside the security unit;

[0077] Step S2, before the user uses the mobile terminal APP for electronic signature of the t...

Example Embodiment

[0079] Example 2

[0080] A secure mobile terminal electronic authentication method, including a security unit (SE) built in the mobile terminal capable of storing keys and a trusted execution environment (TEE) built in the mobile terminal. The security unit (SE) is provided with A secure application applet that can run in it, and the trusted execution environment (TEE) is provided with a secure echo trusted application (TA), including the following steps:

[0081] Step S1, the terminal uses the security application applet to generate a public-private key pair inside the security unit. The private key is stored in the security unit (SE) and cannot be exported. The public key is submitted to the electronic certification service agency to apply for a digital certificate. After completing the digital certificate application After that, store the digital certificate inside the security unit;

[0082] Step S2, before the user uses the mobile terminal APP for electronic signature of the t...

Example Embodiment

[0084] Example 3

[0085] A secure mobile terminal electronic authentication method based on mobile phone security unit (SE) and trusted execution environment (TEE) technology to achieve transaction security echo, including a storable and non-exportable user private key, and a signature encryption function A TA program that is built in the security unit (SE) of the mobile terminal and can run in the trusted execution environment (TEE) to realize the transaction security echo function. A set of applets in the security unit (SE) can be managed and the TA can be displayed safely. A trusted management system for mobile electronic certification managed by programs.

[0086] The public and private key pair generated by the adopted PKI technology is generated in the security unit (SE) built into the mobile terminal. Once the key is generated, the private key cannot be derived. Including the application applet running in the security unit (SE);

[0087] The user's transaction information c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a secure mobile terminal electronic authentication method and system. The secure mobile terminal electronic authentication system comprises a secure element (SE) which is arranged in a mobile terminal and can store a key, and a trusted execution environment (TEE) which is arranged in the mobile terminal; a secure application applet which can run in the secure element is arranged in the secure element (SE); the secure application can generate a public-private key pair for electronic signature; and a private key is stored in the secure element (SE) and cannot be exported or duplicated. A secure redisplay trusted application (TA) is arranged in the trusted execution environment (TEE), so that transaction correctness can be confirmed artificially by a user and the transaction cannot be attacked by trojan horse in a rich execution environment (REE). The secure mobile terminal electronic authentication method and system greatly reduce high cost caused by additionally required production of hardware devices, solve the problem of using and carrying inconvenience for the user, are conducive to energy conservation and emission reduction, and save the social resources.

Description

technical field [0001] The present invention relates to the field of electronic authentication of smart mobile terminals such as mobile phones, and specifically relates to a secure mobile terminal electronic authentication system and method, which are applied to security elements (SE) / trusted execution environments (TEE) and security element-based authentication of mobile terminals. (SE) and trusted execution environment (TEE) mobile terminal security service system and method. Background technique [0002] At present, the technical background of the application of electronic authentication on the mobile terminal mainly includes the following: [0003] 1. Use the mobile terminal Rich Execution Environment (REE) to store keys, and implement electronic authentication in software. [0004] 2. Use the mobile terminal Trusted Execution Environment (TEE) to store keys, and implement electronic authentication in software. [0005] 3. Use external components that can be inserted i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32G06Q20/38
CPCG06Q20/38215G06Q20/3825H04L9/3247H04L9/3268H04L63/0823H04L63/0892
Inventor 闫春清徐超杰
Owner 黄付营
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products