Unlock instant, AI-driven research and patent intelligence for your innovation.

Trusted data processing method, device and mobile terminal based on tui

A data processing device and data processing technology, applied in the field of information security, can solve problems such as inability to guarantee business security, and achieve the effect of ensuring security

Active Publication Date: 2021-06-29
WATCHDATA SYST
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if a malicious TA obtains the above-mentioned APDU format and the user's authentication information through various methods, it can directly send the information to SE for signature without using the TUI to obtain the user's permission, and can carry out transaction forgery, which cannot guarantee the security of the business

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted data processing method, device and mobile terminal based on tui
  • Trusted data processing method, device and mobile terminal based on tui
  • Trusted data processing method, device and mobile terminal based on tui

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that the relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.

[0032] At the same time, it should be understood that, for the convenience of description, the sizes of the various parts shown in the drawings are not drawn according to the actual proportional relationship.

[0033] The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as any limitation of the invention, its application or uses.

[0034] Techniques, methods and devices known to those of ordinary skill in the relevant art may not be discussed in detail, but where appropriate, such techniques, methods and devices should be considered part of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention discloses a TUI-based trusted data processing method, device and mobile terminal, wherein the method includes: TA sends a data request processing message to SE through SE read-write module; SE read-write module determines whether SE returns a specific If it exists, the SE read-write module will send the obtained user confirmation information to the TUI for display, obtain the authentication information input by the user through the TUI, and send the authentication information to the SE; the SE will verify the authentication information, based on the verification As a result the data processing request message is processed accordingly. In the method, device and mobile terminal of the present invention, the TUI display is enforced by the trusted SE read-write module according to the SE requirements, which can resist malicious TA's attack method of bypassing the user's confirmation and then signing the transaction. The write module can authorize access to specific resources in SE that require user authorization only after the user permits the use of TUI, ensuring the security of transactions and other services.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a TUI-based trusted data processing method, device and mobile terminal. Background technique [0002] In recent years, the demand for online banking transactions on smart mobile terminals has become increasingly strong, and the number and amount of transactions have increased rapidly, but the security issues are not optimistic. Taking the Android system as an example, risks such as malware infection, phishing software, and rooting of the Android system have always plagued the healthy development of mobile financial services. At present, most terminals integrate a trusted execution environment TEE, which consists of a trusted application TA and a trusted operating system. The secure element SE can realize the storage and cryptographic calculation of sensitive data such as keys, and the controlled resources (keys, etc.) in the secure element SE are authorized by the u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q20/38G06Q20/40
Inventor 石玉平
Owner WATCHDATA SYST