Supercharge Your Innovation With Domain-Expert AI Agents!

Trusted application operation request review method and trusted application management server

An application operation and application management technology, applied in the field of information security, can solve the problems of illegal requests and illegal operations of trusted applications, and achieve the effect of improving security

Active Publication Date: 2021-12-10
WATCHDATA SYST +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The smart mobile terminal makes a request to the trusted application server for the operation of the trusted application. The smart mobile terminal may not be a legal user of the server, and the request may be illegal, such as deleting trusted applications installed by other applications, which is prone to trusted When the application is illegally operated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted application operation request review method and trusted application management server
  • Trusted application operation request review method and trusted application management server
  • Trusted application operation request review method and trusted application management server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that the relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.

[0030] At the same time, it should be understood that, for the convenience of description, the sizes of the various parts shown in the drawings are not drawn according to the actual proportional relationship.

[0031] The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses.

[0032] Techniques, methods and devices known to those of ordinary skill in the relevant art may not be discussed in detail, but where appropriate, such techniques, methods and devices should be considered part of the descript...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention discloses a trusted application operation request review method and a trusted application management server, wherein the method includes: receiving a trusted application operation request sent by a terminal, detecting whether the terminal is a legal device that has Whether the trusted application operation request is a legitimate trusted application operation, and the trusted application operation request is processed accordingly based on the detection result. The method and server of the present invention can ensure that only legitimate terminals can access the trusted application management server and manage trusted applications, and ensure that only legitimate third-party applications can submit trusted application operation requests, which can ensure that trusted applications are safely processed Therefore, it is possible to prevent an illegal trusted application operation request from endangering the trusted application and the terminal, thereby improving the security of the trusted application operation.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a trusted application operation request review method and a trusted application management server. Background technique [0002] At present, most terminals integrate Trusted Execution Environment (TEE, Trusted Execution Environment) and Rich Execution Environment (REE, Rich Execution Environment). REE is composed of client application (CA, ClientApplication) and application operating system. The TEE consists of a trusted application (TA, TrustedApplication) and a trusted operating system (Trusted OS, Trusted Operating System). The development of mobile communication technology has brought about the rapid development of mobile terminal technology, and mobile smart terminals have become the development trend of mobile terminals. Smart mobile terminals are no longer pure voice communication tools. While the popularity of smart mobile terminals has brought great conven...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L9/3265H04L63/0823H04L63/0876H04L63/10H04L63/12
Inventor 石玉平
Owner WATCHDATA SYST
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More