Method and apparatus for managing applications in a security device
A security device and installed technology, applied in the field of information processing, can solve the problems of intensifying SE space, occupying space, and low utilization rate of SE space.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0060] The technical solutions of the present application will be further described in detail below through the drawings and embodiments.
[0061] The methods used in the management of SE provided in this application can be applied to figure 1 In the system shown. Such as figure 1 As shown, the system may include a server and a terminal. The server may include a trusted application management server (trusted service manager, TSM). The terminal may include a rich execution environment (REE), a trusted excution environment (TEE), and a security unit SE. Among them, the rich execution environment can be an Android operating environment, and the TEE can include SE content management agent (management agent / Mgt agent), card application code storage unit (executable load file storage / ELF Storage), and card application management interface (managementUI / Mgt UI). TSM Agent is the entity that serves the communication between TSM and SE in the terminal. TSM Agent can exist in REE or TEE...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


