Mobile terminal and access control method and system based on trusted security environment

A security environment and access control technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as non-secure clients stealing information, file tampering, hacker attacks, etc., and achieve the effect of improving information security

Inactive Publication Date: 2018-02-27
CHINA UNIV OF PETROLEUM (BEIJING)
View PDF4 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, there are still potential security risks in accessing private files by clients

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal and access control method and system based on trusted security environment
  • Mobile terminal and access control method and system based on trusted security environment
  • Mobile terminal and access control method and system based on trusted security environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0068] The implementation mode of this application proposes a ciphertext-policy attribute-based encryption algorithm (CPABE, ciphertext-policy attribute-based encryption) and a TEE-based access control system based on a trusted security environment, storing relevant keys in the TEE and performing encryption. Decryption and authorization a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the application provides a mobile terminal and an access control method and system based on a trusted security environment. The access control method based on the trusted security environment comprises the following steps: encrypting a private file with a storage key in advance in the trusted security environment, and encrypting the storage key with CPABE and the access structureof the private file; verifying the identity of a client when receiving a trusted security environment access request initiated by the client in an ordinary execution environment; generating the CPABEprivate key of the client according to the client attribute set carried by a file access request when receiving the file access request initiated by the client after passing the identity verification; obtaining the corresponding private file according to the CPABE private key when the client attribute set satisfies the access structure of the corresponding file ciphertext; and returning the private file to the client. The embodiment of the application can improve the information security of the mobile terminal.

Description

technical field [0001] The present application relates to the technical field of access control of mobile terminals, in particular to a mobile terminal and its access control method and system based on a trusted security environment. Background technique [0002] With the rapid development of the Internet and mobile communication technologies, applications of mobile terminals such as smart phones are becoming more and more popular. Taking smart phones as an example, the current smart phones can not only make calls, take pictures, listen to music, play games, online shopping, electronic payment, but also realize rich functions including navigation and positioning, information processing, fingerprint scanning, ID card scanning, QR code scanning, etc. function. Correspondingly, with more and more functions and applications of mobile terminals, the information security faced by them has drawn more and more attention from people. [0003] Aiming at the information security prob...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0822H04L9/0869H04L63/045H04L63/08H04L63/10
Inventor 范永开刘声乐林晓东白建蓉赵冠群
Owner CHINA UNIV OF PETROLEUM (BEIJING)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products