User terminal and trusted application management system

A user terminal and application management technology, applied in the field of trusted applications, can solve the problems of reducing the development efficiency of trusted applications and wasting resource space, and achieve the effects of improving development efficiency, making full use of them, and avoiding waste of resource space

Active Publication Date: 2019-02-05
CHINA UNIONPAY
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) For some applications with consistent business scenarios, the functions implemented by these multiple TAs are completely consistent, which will inevitably cause waste of TEE resource space;
[0006] (2) For application developers, repeated development of TA is required every time, which reduces the development efficiency of trusted applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User terminal and trusted application management system
  • User terminal and trusted application management system
  • User terminal and trusted application management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In the following description, specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that embodiments of the invention may be practiced without these specific details. In the present invention, specific numerical references such as "first element", "second means" and the like may be made. However, specific numerical references should not be construed as necessarily obeying their literal order, but rather that "first element" is different from "second element".

[0027] The specific details set forth herein are exemplary only, and the specific details may vary while remaining within the spirit and scope of the invention. The term "coupled" is defined to mean either directly connected to a component or indirectly connected to a component via another component.

[0028] Preferred embodiments of methods, systems and devices adapted to implement the present invention are ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a user terminal, comprising: a multimedia execution environment configured to: set at least one client application program; A trusted execution environment is configured to include a sharing management module for selecting a corresponding trusted application template based on a trusted service request of a client application and loading corresponding characteristic data based on a personalized request from the client application to generate a trusted application instance in response to the trusted service request; Wherein each trusted application template corresponds to a set of client applications belonging to the same class. It can realize the full use of system resources, avoid the waste of TEE resource space, and improve the development efficiency of trusted applications.

Description

technical field [0001] The present invention relates to the technical field of trusted applications, and more specifically, to a user terminal and a trusted application management system. Background technique [0002] With the rapid development of e-commerce and mobile payment, the demand for security applications is also increasing. Developers of security applications need to develop specific client applications (Client Application, CA for short) and trusted applications (Trusted Application, TA for short) according to their actual needs. CA runs in REE (Multimedia Execution Environment), and TA runs in TEE (Trusted Execution Environment). CA is generally responsible for completing the external interface at the user space level of Rich OS and the function of sending commands (CMD) to TA, and TA according to The CMD sent by the CA implements specific security functions (such as enabling the TUI, securely processing and saving data, encrypting and decrypting data, etc.). ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/46G06F21/62G06Q20/38G06Q20/40
CPCG06F21/46G06F21/6245G06Q20/3829G06Q20/401
Inventor 陈成钱周钰郭伟
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products