Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure card communication method based on credible environment, and mobile terminal

A technology for secure communication and mobile terminals, applied in the field of card-based secure communication methods and mobile terminals, can solve the problems of personal information data leakage, forgery and duplication, etc.

Active Publication Date: 2018-11-30
JIANGSU HENGBAO INTELLIGENT SYST TECH CO LTD
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of mobile terminals and 4G networks, various applications that use mobile terminals for online identity authentication to complete user identity identification have sprung up. Among them, user identity is basically obtained by entering relevant information, and then information binding is realized. However, there are risks such as personal information data leakage, forgery and copying in this input and binding form.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure card communication method based on credible environment, and mobile terminal
  • Secure card communication method based on credible environment, and mobile terminal
  • Secure card communication method based on credible environment, and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] Combined with the above figure 1 The structure of the safety communication system is introduced, and the following is combined with the attached figure 2 The specific structure of the mobile terminal 102 in this application is further introduced, wherein the mobile terminal 102 includes an untrusted execution element 1021 , a secure communication element 1022 and a security chip 1023 . The untrusted execution element 1021 and the secure communication element 1022 are hardware or software integrated on the chip card in the mobile terminal to realize the communication function of the mobile terminal.

[0034] Among them, the untrusted execution element 1021 includes a three-layer structure, namely the application layer 10211, the framework layer 10212, the untrusted execution element operating system kernel 10213, and the application layer 10211 includes various public applications and controls, and the front server for implementation and business processing and other e...

Embodiment 2

[0038] The structures of the secure communication system and the mobile terminal have been described above, and the working methods of the secure communication system and the mobile terminal are introduced below. The secure communication method includes the following steps:

[0039] Step S310, in response to the wireless communication information sent by the physical card, the security chip encrypts the received wireless communication information.

[0040]Step S320, sending the encrypted wireless communication information to a secure communication element;

[0041] Step S330, the secure communication element forwards the wireless communication information to the public application;

[0042] Step S340, the public application sends the wireless communication information to the service processing front-end server for processing.

[0043] Two-way authentication is implemented between the front-end server for business processing and the trusted application of the secure communicat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure card communication method based on a credible environment. The method is applied to a mobile terminal with a secure chip and a secure communication element, and comprises the steps as follows: in response to wireless communication information sent by a physical card, the secure chip encrypts the received wireless communication information; the encrypted wireless communication information is sent to the secure communication element; and the secure communication element forwards the wireless communication information to a public application. The secure card communication method based on the credible environment provided by the invention is applied to the field of secure accesses.

Description

technical field [0001] The application relates to the field of secure access, in particular to a trusted environment-based secure card-present communication method and a mobile terminal. Background technique [0002] With the rapid development of mobile terminals and 4G networks, various applications that use mobile terminals for online identity authentication to complete user identity identification have sprung up. Among them, user identity is basically obtained by entering relevant information, and then information binding is realized. However, there are risks such as personal information data leakage, forgery and copying in this form of input and binding. Contents of the invention [0003] The purpose of the present application is to provide a secure card-present communication method and a mobile terminal based on a trusted environment, which are used to improve the security performance of the existing mobile terminal. [0004] The first aspect of the present applicati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W8/20H04W12/02H04W12/06H04L9/08H04W12/03H04W12/041H04W12/0433
CPCH04L9/0822H04L9/0897H04W8/205H04W12/02H04W12/06
Inventor 王玉岗陆道如
Owner JIANGSU HENGBAO INTELLIGENT SYST TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products