Authentication method and system in trust execution environment

A technology of execution environment and authentication method, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as embezzlement, attack on business applications, data leakage, etc., and achieve the effect of improving security

Active Publication Date: 2017-07-07
CHINA TELECOM CORP LTD
View PDF4 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The client application does not authenticate the trusted application, which may easily cause the client application to be unable to identify the trusted application that has been forged or tampered with, or the trusted application that has been misused, allowing hackers to attack business applications by forging or tampering with trusted applications
The trusted application does not authenticate the client application call, which may easily cause the trusted application to be accessed by the illegal client application, resulting in the leakage and theft of data stored in the trusted execution environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and system in trust execution environment
  • Authentication method and system in trust execution environment
  • Authentication method and system in trust execution environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0024] The present invention is proposed based on the identity authentication problem between the trusted application TA and the client application CA.

[0025] image 3 It is a schematic diagram of deployment of trusted application TA and client application CA in the present invention. Such as i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication method and system in a trust execution environment, and relates to the technical field of mobile terminals. The authentication method comprises the following steps: a system communication drive acquires feature information of a client application CA, and sends a trust application TA to the CA to perform the identity authentication; and/or the system communication drive acquires the feature information of the TA, and sends the CA to the TA to perform the identity authentication. The identity authentication between the client application and the trust application is accomplished through the cooperation of the system communication drive, and the security is improved.

Description

technical field [0001] The invention relates to the technical field of mobile terminals, in particular to an authentication method and system in a trusted execution environment. Background technique [0002] With the rapid development of the mobile Internet, the types and quantities of mobile applications are increasing. The security of business processed and stored data in mobile terminals is also increasingly threatened, especially for industrial applications with high security requirements such as payment, office work, and copyright protection. However, the design of the operating system of the smart terminal focuses on functionality, is open, and is large and complex with many system loopholes, making malicious applications appear continuously and threatening the user's data security. [0003] In order to meet the high security requirements of mobile applications, industry research has proposed a TEE (Trusted Execution Environment, Trusted Execution Environment) solutio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L63/0823H04L63/0892
Inventor 陈平辉郭茂文何峣王磊
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products