Check patentability & draft patents in minutes with Patsnap Eureka AI!

Business authorization method, device and apparatus

A business and equipment technology, applied in the computer field, can solve the problem that the verification result of identity verification cannot be certified by credit, and achieve the effect of an effective identity verification method

Active Publication Date: 2018-05-18
ADVANCED NEW TECH CO LTD
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] This manual provides a method of business authorization to solve the problem in the prior art that the verification result of identity verification generated in one security environment cannot obtain the credit certification of another security environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Business authorization method, device and apparatus
  • Business authorization method, device and apparatus
  • Business authorization method, device and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] Usually, the system in which the device operates usually includes different security environments. In practical applications, the entire business execution process can only be completed through the cooperation of execution units or applications in different security environments. Specifically, the business application running in the first security environment can send the information to be verified obtained by the device to the first execution unit running in the first security environment, and the first execution unit can verify the information to be verified , and send the obtained verification result to the second execution unit running in the second security environment, and the second execution unit can use the verification result to determine whether to authorize the service currently executed by the business application.

[0061] Since the first execution unit and the second execution unit are located in different security environments, usually, the second executi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a business authorization method, device and apparatus. According to the method, after to-be-verified information is acquired, the to-be-verified information can be sent to a first performance unit, so the first performance unit verifies the to-be-verified information; an acquired verification result is signed through utilization of a signature verification private key stored by the first performance, thereby acquiring signature information; a business application can acquire the signature information returned by the first performance unit and further the signature information is sent to a second performance unit, so the second performance unit verifies the signature information through utilization of a signature verification public key corresponding to the signatureverification private key; and after it is determined that the signature information is verified successfully, business authorization is carried out according to a verification result.

Description

technical field [0001] This description relates to the field of computer technology, in particular to a method, device and equipment for service authorization. Background technique [0002] At present, the traditional password-based identity verification method has gradually been unable to meet the convenience and security needs of users when performing identity verification due to problems such as being easily forgotten, easily stolen, and inconvenient to input. Biometric authentication methods such as fingerprints and facial recognition have been widely used in various scenarios because they are safer and more convenient. [0003] In practical applications, the system in which the device runs usually includes two environments, one is the trusted execution environment (Trusted Execution Environment, TEE), and the other is the execution environment provided for the secure element (Secure Element, SE), wherein, Business applications for business processing usually run on the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3247H04L63/083H04L63/12G06F21/53H04L63/0861H04L63/0892H04L9/0825H04L9/3231H04L9/3263
Inventor 孙曦落红卫
Owner ADVANCED NEW TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More