Unlock instant, AI-driven research and patent intelligence for your innovation.

Trusted application authentication system and trusted application authentication method

A credible and legal authentication technology, applied in the field of communication, can solve the problems of man-in-the-middle attack, the security of the production environment cannot be guaranteed, and the leakage or theft of the certificate and identity identification production line, so as to prevent the man-in-the-middle attack and the authentication result is true Credible, Avoiding Disclosure or Stealing Effects

Active Publication Date: 2021-02-02
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the premise that the security of the production environment cannot be guaranteed, certificates and identities may be leaked or stolen on the production line
On the other hand, in the process of handing over certificates and identities to third-party certificate issuing organizations for verification by trusted applications, man-in-the-middle attacks may occur, and illegal terminal devices may intercept the data and pretend to complete the authentication, thereby causing information security and other issues.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted application authentication system and trusted application authentication method
  • Trusted application authentication system and trusted application authentication method
  • Trusted application authentication system and trusted application authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] In order to enable those skilled in the art to better understand the technical solution of the present invention, the trusted application authentication system and the trusted application authentication method of the present invention will be further described in detail below with reference to the drawings and specific implementation methods.

[0073] The invention provides a trusted application personalization scheme in a trusted execution environment, including a trusted application authentication system and a trusted application authentication method.

[0074] The Trusted Application Authentication System for Trusted Application Personalization in a Trusted Execution Environment, reference figure 2 or image 3 , including: terminal local configuration file auxiliary module 2, terminal service platform 3, terminal security manager 4 and certificate issuing authority 5, wherein:

[0075] The terminal local configuration file auxiliary module 2 is located in the termi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of communication, and relates to a trusted application authentication system and method. The trusted application authentication system includes: a terminal local configuration file auxiliary module, which is at least configured to issue a legality authentication instruction to the trusted application, send a legality authentication result and issue a digital certificate for deployment, and send a legality authentication request to the terminal service platform ; The terminal service platform is at least configured to generate and assign an identity for the terminal device, and realize message interaction between the terminal local configuration file auxiliary module and the terminal security manager, and between the terminal local configuration file auxiliary module and the certificate issuing authority; the terminal The security manager is at least configured to verify the device information of the terminal device according to the legality authentication request; the certificate issuing authority is at least configured to generate a digital certificate for the trusted application according to the certificate signature request. The invention realizes reliable and safe personalization of credible applications in a credible execution environment, and protects the security of digital certificates and identity marks.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to a trusted application authentication system and a trusted application authentication method. Background technique [0002] With the continuous development and popularization of eSIM technology, traditional plug-in SIM cards are facing unprecedented challenges. An eSIM card can be a physically integrated entity embedded in a device, or it can be a software application. In the solution where the eSIM card is implemented in the form of a software application, the Trusted Application (TA for short) in the Trusted Execution Environment (TEE) of the terminal device is used as the main carrier for the terminal device to realize related functional operations. All the functions of the traditional plug-in SIM card will be simulated. [0003] In the current eUICC international standards and specifications, certificates and identities are deployed to trusted applications ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0823
Inventor 仇剑书胡博刘牧洲
Owner CHINA UNITED NETWORK COMM GRP CO LTD