tee-based security application authentication method
An authentication method and security application technology, which is applied in the field of computer software and hardware information security, can solve problems such as being vulnerable to attack and cracking, and not doing SDK certification, so as to achieve the effect of ensuring security, authenticity and security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0021] like figure 1 and figure 2 As shown, a TEE-based security application authentication method includes the following steps:
[0022] Step 1. The terminal device must first preset the private key of the key pair in the trusted execution environment TEE, and the public key of the key pair preset on the server side corresponds to the private key of the terminal device; the trusted execution environment TEE requires Save the private key and have the function of signing. The TEE environment page of the trusted execution environment includes TEE under windows, TEE under Linux, TEE under IOS and TEE under android. The key pair can be generated by the trusted execution environment TEE of the terminal device. It can also be generated externally by a trusted tool and imported into the terminal device trusted execution environment TEE. The public key on the server side is essentially the public key of the key pair generated by the terminal device;
[0023] Step 2. After the devel...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com