Unlock instant, AI-driven research and patent intelligence for your innovation.

Trustworthy application operation request auditing method and trustworthy application management server

A technology of application operation and application management, applied in the field of information security, can solve problems such as illegal requests and illegal operations of trusted applications, and achieve the effect of improving security

Active Publication Date: 2018-11-06
WATCHDATA SYST +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The smart mobile terminal makes a request to the trusted application server for the operation of the trusted application. The smart mobile terminal may not be a legal user of the server, and the request may be illegal, such as deleting trusted applications installed by other applications, which is prone to trusted When the application is illegally operated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trustworthy application operation request auditing method and trustworthy application management server
  • Trustworthy application operation request auditing method and trustworthy application management server
  • Trustworthy application operation request auditing method and trustworthy application management server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that the relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.

[0030] At the same time, it should be understood that, for the convenience of description, the sizes of the various parts shown in the drawings are not drawn according to the actual proportional relationship.

[0031] The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses.

[0032] Techniques, methods and devices known to those of ordinary skill in the relevant art may not be discussed in detail, but where appropriate, such techniques, methods and devices should be considered part of the descript...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a trustworthy application operation request auditing method and a trustworthy application management server. The trustworthy application operation request auditing method comprises the steps that a trustworthy application operation request sent by a terminal is received; whether the terminal is authenticated legal equipment or not and whether the trustworthy application operation request is legal trustworthy application operation or not are detected; and the trustworthy application operation request is processed correspondingly on the basis of the detection result. According to the trustworthy application operation request auditing method and the trustworthy application management server, it can be guaranteed that only the legal terminal can accessthe trustworthy application management server and manage trustworthy application, it is guaranteed that only a legal third-party application program can make the trustworthy application operation request, it can be ensured that the trustworthy application is safely processed, an illegal trustworthy application operation request can be prevented from harming the trustworthy application and the terminal, and the safety of trustworthy application operation is improved accordingly.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a trusted application operation request review method and a trusted application management server. Background technique [0002] At present, most terminals integrate Trusted Execution Environment (TEE, Trusted Execution Environment) and Rich Execution Environment (REE, Rich Execution Environment). REE is composed of client application (CA, ClientApplication) and application operating system. The TEE consists of a trusted application (TA, TrustedApplication) and a trusted operating system (Trusted OS, Trusted Operating System). The development of mobile communication technology has brought about the rapid development of mobile terminal technology, and mobile smart terminals have become the development trend of mobile terminals. Smart mobile terminals are no longer pure voice communication tools. While the popularity of smart mobile terminals has brought great conven...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L9/3265H04L63/0823H04L63/0876H04L63/10H04L63/12
Inventor 石玉平
Owner WATCHDATA SYST