Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile terminal security protection method and device

A mobile terminal and security protection technology, applied in the field of information security, can solve the problems of increasing the difficulty of developing and deploying a certificate management system, increasing the complexity of design and implementation, and increasing the development and maintenance costs of the TEE platform.

Inactive Publication Date: 2021-04-27
WATCHDATA SYST +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For the existing two different implementation technical solutions of online banking shield, in the personalization process or when performing the same core security function, the online banking system APP and certificate management system running in REE are used by TA running in TEE and running in eSE The online banking Applet in the application needs to use different instruction streams. Correspondingly, for the online banking system APP and the certificate management system, the existence of this difference increases the complexity of the design and implementation of the APP, and increases the difficulty of developing and deploying the certificate management system.
At the same time, the TEE soft shield solution develops a TA that includes TUI and security services, and the eSE hard shield solution needs to develop a TA that includes TUI and transparent transmission of commands with eSE, which increases the development and maintenance costs under the TEE platform

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal security protection method and device
  • Mobile terminal security protection method and device
  • Mobile terminal security protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that the relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.

[0033] At the same time, it should be understood that, for the convenience of description, the sizes of the various parts shown in the drawings are not drawn according to the actual proportional relationship.

[0034] The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses.

[0035] Techniques, methods and devices known to those of ordinary skill in the relevant art may not be discussed in detail, but where appropriate, such techniques, methods and devices should be considered part of the descriptio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention discloses a mobile terminal security protection method and system, wherein the method includes: a pre-TA determines a security module corresponding to service data and a deployment method of the security module, and the security module includes: a security function TA, an eSE The pre-TA sends the business data to the security module, performs corresponding data security processing on the business data through the security module, and receives the data security processing result data returned by the security module and sends it to the business application or external device. In the method and system of the present invention, the traditional mobile phone shield TA is divided into functions, the core security function can be realized by the TEE soft shield or the eSE hard shield, and the pre-TA has a unified certificate management method for the TEE soft shield and the eSE hard shield. The password verification and transaction message signature process uses a unique process to reduce development and maintenance costs under the TEE platform.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a mobile terminal security protection method and device. Background technique [0002] With the development of mobile communication technology, the demand for online banking transactions and other services on smart mobile terminals is increasingly strong, and the security requirements for mobile payment transactions are also getting higher and higher. Using the TEE solution on smart mobile terminals for online banking transactions, there are two solutions for the realization of online banking shield: use TA in TEE to realize all functions of the second-generation online banking shield, including non-core security functions, such as transaction message analysis, transaction information Display, password input, transaction information confirmation, etc., as well as core security functions, such as password verification and transaction message signature. Messag...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32G06Q20/38
CPCG06Q20/38215G06Q20/3825H04L9/3247H04L9/3263H04L63/0807H04L63/0823H04L63/205
Inventor 郭静
Owner WATCHDATA SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products