Client authentication method and computer-readable storage medium
An authentication method and storage medium technology, applied in the field of client authentication method and computer-readable storage medium, can solve problems such as inability to guarantee security, and achieve the effect of preventing server software from being linked and ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0082] Please refer to figure 2 , Embodiment 1 of the present invention is: a client authentication method, the method is based on trustzone, and is suitable for running in a trustzone dual operating system environment. In this embodiment, the software running on a common operating system is called client software (CA), the software running under the safe operating system is called server software (SA), and the described method comprises the following steps:
[0083] S101: The development host generates a pair of corresponding public key and private key, and saves the public key in the secure operating system; further, saves the public key in a secure storage area of the secure operating system. Among them, the development host generally refers to a personal computer, that is, a computer device, on which tools required for developing client software are installed, and all client software is encrypted and signed with the private key in the same pair of public and private key...
Embodiment 2
[0093] Please refer to image 3 , this embodiment is a further expansion of Embodiment 1. After step S107 determines that the authentication is successful, it also includes the following steps:
[0094] S201: The security operating system generates a symmetrical communication key, starts the server software corresponding to the client software at the same time, and transmits the communication key to the server software; the authentication center passes the key of the security operating system The library generates a symmetric communication key key, and at the same time starts the server software SA corresponding to the client software, and transfers the communication key key to the server software SA as the data communication key of the server software.
[0095] S202: The secure operating system returns the decrypted client software and the communication key to the common operating system; further, the secure operating system decrypts the client software CA in clear text obtai...
Embodiment 3
[0101] Please refer to Figure 4-5 , this embodiment is a specific application scenario of the foregoing embodiment.
[0102] first, Figure 4 It is a block diagram of the system communication model of dual operating systems based on trustzone. The two operating systems are respectively a secure operating system and a common operating system. The two operating systems communicate data through the underlying common communication driver and the secure communication driver.
[0103]Among them, tee-supplicant is an application program running under the common operating system, which mainly provides services for the secure operating system. For example, the secure operating system can read and write the file system of the common operating system through the tee-supplicant application program, or start the file system under the normal operating system. Some applications, such as starting the client program;
[0104] Client API is the client system call interface under the common o...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


