Safe communication method and device

A technology of secure communication and equipment, applied in the field of information security, can solve the problems of stealing sensitive data, insufficient protection, disrupting the normal operation of the TEE system, etc., to prevent the theft of sensitive data or destroy the communication system, and ensure confidentiality and integrity Effect

Active Publication Date: 2018-07-03
LEADCORE TECH +1
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the process of realizing the present invention, the inventor of the present application found that for the CA, the existing solutions either have no protection or insufficient protection. For example, when the CA adopts the form of Android APK (Android Package, Android installation package) , CA APK can be signed, but Android uses a self-signed method. The signed certificate used in this self-signed method is not issued by an authoritative certification authority, but generated by the developer himself. Since the self-signed certificate cannot be used for authentication The organization's root certificate is verified, so an additional mechanism must be added to protect the integrity of the public key in the self-signed certificate, but Android does not have a relevant mechanism, so the integrity of the CA cannot be guaranteed in essence, that is to say, the CA may Has been tampered with or counterfeited, but the system does not detect
Attackers can pose a threat to the TEE system by tampering or counterfeiting the CA, such as stealing sensitive data, disrupting the normal operation of the TEE system, etc.
In addition, the existing solution does not protect the confidentiality and integrity of the shared memory communication between CA and TA, and GlobalPlatform (Global Platform International Standards Organization), the maker of the TEE specification, has not released relevant specifications, so that attackers can Malware steals or tampers with communication content, thereby stealing sensitive data or disrupting the normal operation of the TEE system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe communication method and device
  • Safe communication method and device
  • Safe communication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the object, technical solution and advantages of the present invention clearer, various embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. However, those of ordinary skill in the art can understand that, in each implementation manner of the present invention, many technical details are provided for readers to better understand the present application. However, even without these technical details and various changes and modifications based on the following implementation modes, the technical solution claimed in this application can also be realized.

[0022] The first embodiment of the present invention relates to a secure communication method. The specific process is as figure 2 shown.

[0023] In step 201, verify whether the public key of the client application is complete and whether the digital signature is valid, if the public key of the client application is complete and the dig...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safe communication method and device, which relate to the field of information safety. In the embodiment of the invention, a public key of CA is verified to be integral or not and the digital signature of CA is verified to be effective or not. If the public key of CA is integral and the digital signature of CA is effective, the CA and TA would generate a symmetric secretkey through three times of hand shaking, and encrypted communication can be conducted based on the symmetric secret key. The invention is advantageous in that through verifying the public key and thedigital signature of CA, the tampered or counterfeited CA can be effectively identified; the CA and TA generate the symmetric secret key through three times of hand shaking, and encrypted communication can be conducted based on the symmetric secret key, and thereby the confidentiality and integrity of communication content can be ensured, and attackers can be effectively prevented from stealing sensitive data or destroying a communication system.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and equipment for secure communication. Background technique [0002] In the terminal device system that introduces TEE (Trusted Execution Environment, Trusted Execution Environment), it includes two subsystems, TEE and REE (Rich Execution Environment, Rich Execution Environment). TEE is responsible for processing transactions that require higher security protection, such as secret keys Storage, encryption and decryption, fingerprint identification, etc., REE is a common operating system, such as Android system, iOS Apple system, etc. CA (Client Application, customer application) and TA (Trusted Application, trusted application) running on the REE operating system applications) communicate through shared memory, such as figure 1 As shown, the rich execution environment 11 includes a client application 111 and a rich execution environment operating system 112, the tru...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32H04L29/06
CPCH04L9/0869H04L9/3247H04L63/0435
Inventor 黄庆伟
Owner LEADCORE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products