Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

tee-based security application authentication method

An authentication method and security application technology, which is applied in the field of computer software and hardware information security, can solve problems such as being vulnerable to attack and cracking, and not doing SDK certification, so as to achieve the effect of ensuring security, authenticity and security

Active Publication Date: 2022-07-12
SICHUAN PANOVASIC TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, the general SDK calls are direct interface calls, without SDK certification, anyone who gets the SDK can make unlimited interface calls
Even if some of them have been authenticated, the keys are stored in an untrusted (REE) environment, which is easy to be attacked and cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • tee-based security application authentication method
  • tee-based security application authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0021] like figure 1 and figure 2 As shown, a TEE-based security application authentication method includes the following steps:

[0022] Step 1. The terminal device must first preset the private key of the key pair in the trusted execution environment TEE, and the public key of the key pair preset on the server side corresponds to the private key of the terminal device; the trusted execution environment TEE requires Save the private key and have the function of signing. The TEE environment page of the trusted execution environment includes TEE under windows, TEE under Linux, TEE under IOS and TEE under android. The key pair can be generated by the trusted execution environment TEE of the terminal device. It can also be generated externally by a trusted tool and imported into the terminal device trusted execution environment TEE. The public key on the server side is essentially the public key of the key pair generated by the terminal device;

[0023] Step 2. After the devel...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a TEE-based security application authentication method. The trusted execution environment TEE and the server side cooperate with each other. The private key exists in the trusted execution environment TEE, and the public key exists on the server side. When calling the SDK interface, the SDK interface Call the TEE-side interface of the trusted execution environment to sign the data with the private key, and the server-side uses the public key to verify the data. After the verification is passed, the application can normally call all the interfaces of the SDK, ensuring that only those registered on the server side can be used. Only applications can access the SDK interface, and the SDK interface cannot be accessed normally without registration; the present invention further authenticates the SDK call, and the key is stored on the TEE side of the trusted execution environment, and the data signature is also executed on the TEE side, ensuring the key out of a safe environment.

Description

technical field [0001] The invention relates to computer software and hardware information security, in particular to a TEE-based security application authentication method. Background technique [0002] At present, the current general SDK calls are direct interface calls without SDK certification. Anyone who gets the SDK can make unlimited interface calls. Even if some are authenticated, the keys are stored in an untrusted (REE) environment and are easily attacked and cracked. SUMMARY OF THE INVENTION [0003] In order to solve the problems existing in the prior art, the purpose of the present invention is to provide a TEE-based security application authentication method, the present invention further authenticates the SDK call, and the key is stored on the TEE side of the trusted execution environment, The signature of the data is also performed on the TEE side to ensure that the key is out of the secure environment. [0004] In order to achieve the above object, the t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08H04L9/40
CPCH04L9/3247H04L63/08H04L9/0894
Inventor 杨国东刘建敏杨超周强强翟栋
Owner SICHUAN PANOVASIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products