Trusted application authentication system and trusted application authentication method
A credible and legal authentication technology, applied in the field of communication, can solve the problems of man-in-the-middle attack, the security of the production environment cannot be guaranteed, and the leakage or theft of the certificate and identity identification production line, so as to prevent the man-in-the-middle attack and the authentication result is true Credible, Avoiding Disclosure or Stealing Effects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0072] In order to enable those skilled in the art to better understand the technical solution of the present invention, the trusted application authentication system and the trusted application authentication method of the present invention will be further described in detail below with reference to the drawings and specific implementation methods.
[0073] The invention provides a trusted application personalization scheme in a trusted execution environment, including a trusted application authentication system and a trusted application authentication method.
[0074] The Trusted Application Authentication System for Trusted Application Personalization in a Trusted Execution Environment, reference figure 2 or image 3 , including: terminal local configuration file auxiliary module 2, terminal service platform 3, terminal security manager 4 and certificate issuing authority 5, wherein:
[0075] The terminal local configuration file auxiliary module 2 is located in the termi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


