Unlock instant, AI-driven research and patent intelligence for your innovation.

Safety authentication method, related device and system

A security authentication and to-be-authenticated technology, used in secure communication devices, transmission systems, digital transmission systems, etc.

Active Publication Date: 2017-12-15
BEIJING HUADA ZHIBAO ELECTRONICS SYST
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, only a small number of terminal devices are installed with security applications, and the frequency of user replacement of terminal devices is increasing. For users who have high security requirements and frequently replace terminal devices, they need to download security applications in the terminal device Class applications have large limitations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety authentication method, related device and system
  • Safety authentication method, related device and system
  • Safety authentication method, related device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0132] The embodiment of the present invention provides a security authentication method, related device and system. The user can use a user identification card with a low replacement frequency, so that the terminal device can perform security authentication under the TEE, thereby improving the practicability and reliability of the solution. safety.

[0133] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of the present invention and the above drawings are used to distinguish similar objects, and not necessarily Used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of practice in sequences other than those illustrated or described herein. Furthermore, the terms "comprising" and "having", as well as any variations thereof, are intended to cover a non-exclusi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a safety authentication method. The method is applied to a safety authentication system, wherein the safety authentication system includes a terminal device and an SIM card, wherein the SIM card is provided with a built-in TEE. The method includes the following steps that: a safety authentication request initiated by the terminal device is received; when the safety authentication request is valid, to-be-authenticated data sent by the terminal device are received through a trusted application, wherein the trusted application operates in the built-in TEE in the SIM card; a trusted driver in the terminal device is called and is utilized to control the external device of the terminal device, the trusted driver and the TEE have a unique calling relationship; and the external device of the terminal device is utilized to perform authentication operation on the to-be-authenticated data so as to obtain an authentication result, and the authentication result is sent to the terminal device. The present invention adopted, it only needs to use the SIM card with a lower replacement frequency to enable the terminal device to achieve safety authentication under the TEE, and therefore, the practicability and safety of the method can be improved.

Description

technical field [0001] Embodiments of the present invention relate to the field of information security, and in particular, to a security authentication method, related device, and system. Background technique [0002] With the development of mobile communication technology, terminal equipment has become an indispensable equipment for people. Terminal equipment is no longer a simple voice communication tool, but has the processing power of a computer and network functions, and has been widely used in social networking, transportation, finance, shopping, etc. [0003] At present, in order to eliminate the security risks existing in the current terminal equipment, some solutions have been proposed, such as adding security applications inside the terminal equipment, such applications can scan whether the environment where the user enters information is safe, so as to provide users with more secure experience. [0004] However, only a small number of terminal devices are insta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3226H04L9/3231H04L9/3234
Inventor 侯高鹏张强
Owner BEIJING HUADA ZHIBAO ELECTRONICS SYST