Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device and terminal for creating a root security domain

A security domain and terminal technology, applied in the field of data processing, can solve the problems of difficult storage and maintenance costs of the TSM platform

Active Publication Date: 2021-01-15
CHINA MOBILE COMM LTD RES INST +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] Different TEE terminals may be linked to different TSM platforms, so application service providers need all TSM platforms to be able to manage rSD and maintain the personalized information of all users of an application. When the number of TSM platforms and application service providers is large, Will bring unimaginable storage and maintenance overhead to the TSM platform

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and terminal for creating a root security domain
  • Method, device and terminal for creating a root security domain
  • Method, device and terminal for creating a root security domain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0051] like figure 1 As shown, the embodiment of the present invention provides a method for creating a root security domain, including:

[0052] Step 11, obtaining the user information of the application that the user currently needs to use;

[0053] Step 12, sending the user information to the service provider corresponding to the application;

[0054] Step 13, obtaining the personalized information corresponding to the user in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a building method and a building device for a root security domain, and a terminal. The method comprises the steps of acquiring user information of an application currently needing to be used by a user; sending the user information to a service provider corresponding to the application; acquiring individual information corresponding to the user informationand returned by the service provider; and building the root security domain in the terminal with a trusted execution environment (TEE) module, and writing the individual information into the root security domain. According to the scheme of the invention, the dynamic root security domain is built for the application and the individual data of the user is written in according to user needs during the using process of the user.

Description

technical field [0001] The present invention relates to the technical field of data processing, in particular to a creation method, device and terminal based on a security domain. Background technique [0002] Trusted Execution Environment TEE (Trusted Execution Environment) refers to an independent secure operating environment based on a security chip in a mobile terminal, which can be regarded as a miniature operating system. TEE is logically isolated from the normal application operating environment REE (Rich Execution Environment) (such as the Android environment), and can only interact through authorized APIs. TEE can provide high-reliability security services to common applications in REE, such as secure input, secure storage, data encryption, etc. These security features require the application service provider SP (Service Provider) to establish a root security domain rSD (Root Security Domain) in the security terminal, and preset relevant keys in it, or dynamically ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/02
Inventor 傅镜艺
Owner CHINA MOBILE COMM LTD RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products