Unlock instant, AI-driven research and patent intelligence for your innovation.

Intelligent terminal information safe input method and system thereof

A smart terminal and information security technology, applied in digital data protection, electronic digital data processing, instruments, etc., can solve problems such as potential safety hazards, insufficient scalability of TEE applications, and too many developers, so as to improve security and eliminate malicious The effect of program screenshot

Inactive Publication Date: 2018-05-01
FUJIAN LANDI COMML EQUIP CO LTD
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the above scheme introduces the trusted execution environment TEE, there is still the possibility that malicious programs in the common execution environment REE can obtain input information through screenshots and keystroke event information; After merging with the bank card information to generate the acquiring information, the acquiring information is encrypted and then returned to the REE for application, that is, it is necessary to configure acquiring-related services in the TEE environment, so that multiple business systems are actually coupled in one TEE application. This approach has several disadvantages: a) a TEE application requires multiple developers, at least POS manufacturers (TEE interactive interface) and banks (acquiring business system); b) too many developers participate in a TEE application, which cannot Ensure that the resources of different developers do not access each other, causing security risks; c) Multiple developers develop a TEE application at the same time, which may easily cause problems such as insufficient scalability and insufficient stability of the TEE application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent terminal information safe input method and system thereof
  • Intelligent terminal information safe input method and system thereof
  • Intelligent terminal information safe input method and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0075] Please refer to Figure 1-Figure 4 , this embodiment provides a method for securely inputting information on an intelligent terminal, which is applicable to various types of intelligent terminals that use soft keyboards to input security information, especially intelligent mobile terminals such as intelligent POS machines, smart phones, and tablet computers that operate through touch screens . At the same time, the smart terminal can be equipped with other operating systems such as Android, iOS, or Windows Phone.

[0076] The above method may include the following steps:

[0077] S1: When the application invokes the secure input, the operating system of the smart terminal enters the trusted execution environment TEE from the common execution environment REE. For example, when the smart POS machine is performing the acquiring function, and the smart phone is performing the wireless payment function, when the user needs to enter the payment password, the application pro...

Embodiment 2

[0094] Please refer to Figure 6 , the present embodiment provides a system for safe input of information on an intelligent terminal, the intelligent terminal is provided with a touch screen, preferably an intelligent mobile terminal, and can be equipped with an operating system including Android, iOS or WindowsPhone; the intelligent terminal can be an intelligent POS machine , smartphone or tablet.

[0095] The above-mentioned smart terminals may include:

[0096] The environment switching module 1 is used for the operating system of the smart terminal to enter the trusted execution environment TEE when the application calls the security input;

[0097] The authority control module 2 is configured to close the screen access authority in the common execution environment REE after entering the trusted execution environment TEE; and open the authority after obtaining the input information.

[0098] Further, it also includes:

[0099] The caching module 3 is used to cache the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an intelligent terminal information safe input method and a system thereof, and the method comprises the steps: when an application invoking safe input, the operation system ofan intelligent terminal enters a trusted execution environment (TEE); a screen access permission in a regular execution environment (REE) is closed; when the information input is finished, the permission is opened. According to the invention, the TEE and the REE are separated with each other, so that the safety of the TEE is ensured; a rogue program stealing safety information through accessing the screen in the REE can be effectively prevented, and the safety of user input information is significantly improved; further, related businesses in the TEE can be released as far as possible, so thatthe businesses have wider universality than before; further more, the REE interface can be completely recovered in time, two kinds of display modes of user input information are provided at the sametime, and user experience can be greatly optimized.

Description

technical field [0001] The invention relates to the field of mobile smart terminals, in particular to a method and system for safe input of smart terminal information. Background technique [0002] With the rapid development of mobile communication technology, financial transactions such as mobile payment based on smart terminals such as smart POS machines, smart phones and tablet computers will become an important development direction, and how to secure transactions has always been a difficult point in progress. Most of the existing intelligent terminals have large-size touch screens, which can display various information to users more intuitively and visually in the form of multimedia. Therefore, inputting security information through the soft keyboard of the touch screen has become a necessary process for financial transactions. While inputting security information through the soft keyboard brings convenience to people, it also introduces the security problem that it is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/62
CPCG06F21/57G06F21/62G06F2221/031G06F2221/2141
Inventor 张炽成许剑锋
Owner FUJIAN LANDI COMML EQUIP CO LTD