Supercharge Your Innovation With Domain-Expert AI Agents!

Terminal device trusted verification method and device, and terminal device

A technology of terminal equipment and authentication method, applied in secure communication devices, user identity/authority verification, digital transmission systems, etc., can solve the problems of low practicability and high cost, and achieve the effect of saving costs, improving efficiency and practicability

Inactive Publication Date: 2018-12-07
深圳市网安认证有限公司
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, an embodiment of the present invention provides a trusted authentication method, device, and terminal equipment for terminal equipment, so as to solve the problem of high cost of designing a security architecture based on OS+SE (secure chip hardware) in the prior art. Less practical issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal device trusted verification method and device, and terminal device
  • Terminal device trusted verification method and device, and terminal device
  • Terminal device trusted verification method and device, and terminal device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] Such as figure 1 As shown, this embodiment provides a trusted authentication method for a terminal device, and the method can be applied to a terminal device using a rich operating system (Rich OS), such as a mobile phone, a PC, and a tablet computer. The trusted authentication method for terminal equipment provided in this embodiment includes:

[0039] S101. Obtain a verification password and send it to a trusted TA, so as to verify the verification password.

[0040] In a specific application, the verification password input by the user is obtained, and sent to the trusted TA in the TEE trusted execution environment for verification of the verification password.

[0041] S102. If the verification password is verified successfully, obtain the access token returned by the trusted TA.

[0042] In a specific application, if the above-mentioned verification password is verified, the user has a legal identity (the server will authorize legal access to the user), that is, ...

Embodiment 2

[0055] Such as figure 2 As shown, this embodiment is a further description of the method steps in the first embodiment. In this embodiment, the third acquisition module 103 includes:

[0056] S1031. Access the trusted TA through the access token, so that the trusted TA signs the data message to be signed by using the stored private key to generate the signed message.

[0057] In a specific application, the trusted TA provided for signature calculation in the TEE trusted operating environment is accessed through the above-mentioned access token and the data message to be signed, so that the trusted TA can sign the data message to be signed with its stored private key, Generate a signed message.

[0058] S1032. Obtain the signed message returned by the trusted TA.

[0059] In a specific application, the signed message returned by the above-mentioned trusted TA is obtained, and sent to the server for verification.

[0060] In one embodiment, step S104 includes:

[0061] Sen...

Embodiment 3

[0065] Such as image 3 As shown, this embodiment provides a trusted authentication apparatus 100 for terminal equipment, which is used to execute the method steps in Embodiment 1. The trusted authentication device 100 for terminal equipment provided in this embodiment includes:

[0066] The first acquiring module 101 is configured to acquire a verification password and send it to a trusted TA to verify the verification password;

[0067] The second obtaining module 102 is configured to obtain the access token returned by the trusted TA if the verification password is verified;

[0068] A third obtaining module 103, configured to obtain a signed message through the access token;

[0069] The first sending module 104 is configured to send the data message to be signed and the signed message to the server, so as to verify the data message to be signed and the signed message;

[0070] The receiving module 105 is configured to perform credible communication with the server if t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a terminal device trusted verification method and device, and a terminal device, applied to the technical field of trusted communication. The terminal device trusted verification method comprises the following steps: obtaining a verification password and sending the verification password to a trusted TA, so as to verify the verification password; obtaining an access token returned by the trusted TA if the verification of the verification password is passed; obtaining a signed packet by using the access token; sending a data packet to be signed and the signed packet to aserver, so as to verify the data packet to be signed and the signed packet; and performing trusted communication with the server if the verification pass information sent by the server is received. The invention can save the cost of verifying the trusted terminal device and improve the efficiency and practicability of verifying the trusted terminal device.

Description

technical field [0001] The invention belongs to the technical field of trusted communication, and in particular relates to a trusted authentication method and device for terminal equipment and terminal equipment. Background technique [0002] At present, mobile devices are quite popular, but it is necessary to consider the security of devices in various scenarios, especially the security of access servers. How to ensure that a legal and trustworthy terminal device accesses the server is the basis for ensuring that the device provides services to the outside world, and it is particularly important to perform trusted authentication on the device. [0003] Many current security architecture implementations are based on OS+SE (secure chip hardware) to ensure the storage security of data on the device and realize secure encrypted communication. However, the cost of this scheme design is relatively high, and its practicability is low. Contents of the invention [0004] In view...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3213H04L9/3226H04L9/3247H04L63/08H04L63/10
Inventor 何鹏程方春冬
Owner 深圳市网安认证有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More