Trusted platform for wireless terminal, and method

A wireless terminal and trusted technology, applied in the field of communication, can solve the problems of loss of user calls, malicious subscriptions, automatic dialing of voice stations, etc., to avoid intrusion and data leakage, and ensure security.

Inactive Publication Date: 2018-03-06
POTEVIO INFORMATION TECH CO LTD
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Further, with the trend of terminal intelligence and network broadband, mobile Internet services are increasingly prosperous. At the same time, more and more mobile terminals involve sensitive information such as business secrets and personal privacy, and mobile terminals are also facing various security threats. Such as malicious ordering, automatic dialing of the voice message station, automatic networking, etc., resulting in the loss of the user's call charges

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted platform for wireless terminal, and method
  • Trusted platform for wireless terminal, and method
  • Trusted platform for wireless terminal, and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0020] In order to create a more secure mobile smart terminal, two standard organizations, Trusted Computing Group (TCG) and Global Platform (GP), have successively proposed TPM (Trusted Platform Module, Trusted Platform Module) and TEE (Trusted Execution Environment, Trusted Execution Environment). ) as the representative solution.

[0021] Among them, the purpose of TCG is to widely use trusted computing platforms supported by hardware security modules in computing and communication systems to improve overall security. The TCG specification defines a chip device called Trusted Platform Module (TPM) as a "trust base" for protected activities. TPM is the core of the TCG s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a trusted wireless terminal platform, and a method for realizing trustworthiness of a wireless terminal. The platform comprises a trusted platform control module used for safelycalling programs and configuration data stored in an off-chip manner, triggering a processor to perform loading and assisting the execution of the processor. Therefore, a terminal device can avoid intrusion and data leakage from the source, and the security of the platform and a network system is guaranteed.

Description

technical field [0001] The present invention relates to the technical field of communication, and more specifically, to a trusted platform and method for wireless terminals. Background technique [0002] With the rapid development of computer and network communication technology, the networking of computing resources, equipment resources and data resources has also been rapidly developed, and terminal equipment is also becoming more and more diversified, miniaturized and intelligent. Terminal equipment is the basic equipment for information storage, transmission and processing, and its own security affects system security, data security and network security. As a result, terminal equipment has become the weakest link in the information security system, and ensuring the security of terminal equipment for the entire system and network has become an urgent problem to be solved. [0003] At present, various wireless network technologies are constantly developing, and the existe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0877
Inventor 刘道斌冯绍鹏
Owner POTEVIO INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products