Unlock instant, AI-driven research and patent intelligence for your innovation.

Build trusted applications common to multiple applications

A credible and application-unit technology, applied in wireless communication and key distribution, can solve problems such as business security threats, low standardization of TEE, high cost of construction, development, debugging and maintenance, etc.

Active Publication Date: 2021-11-19
HUAWEI TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, current TEE is less standardized
Therefore, for each business, the cost of SP building, developing, debugging, and maintaining each TA is relatively high.
Moreover, in the process of developing and maintaining each TA, it is easy for the SP to introduce security holes, which threatens the security of the business.
For example: If TA does not verify the input parameters, it is likely to cause the risk of malicious copying of the data in the TEE

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Build trusted applications common to multiple applications
  • Build trusted applications common to multiple applications
  • Build trusted applications common to multiple applications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to illustrate the technical solution provided by the present application more clearly, several application environments related to the terminal in the embodiments of the present application are briefly introduced first.

[0047] Such as figure 1 As shown in FIG. 2 , it is a schematic diagram of a terminal including multiple application environments in the prior art. The terminal includes three application environments of REE, TEE and SE.

[0048] Among them, REE includes a general operating system running on a general-purpose embedded processor, such as Rich OS (RichOperating System) or kernel, and the CA ( figure 1 CA1 and CA2 are shown). Although many security measures have been taken in REE, such as device access control, device data encryption mechanism, application runtime isolation mechanism, permission-based access control, etc., the security of important data in the application cannot be guaranteed.

[0049] Among them, the TEE is an independent oper...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method for building a trusted application common to multiple applications provided by this application relates to the field of communication technology and is beneficial to improving the security of applications in terminals. The client application corresponding to the security application, the universal trusted application in the TEE, and the secure element application corresponding to the security application in the SE; the universal trusted application is shared by multiple security applications; the method includes: a universal trusted application The application receives the first request of the first client application, and determines the corresponding first secure element application; sends the first request to the first secure element application; the first secure element application sends the first command to the general trusted application; the general The trusted application executes the first command, and returns the first execution result to the first secure element application; the first secure element application sends a first response to the general trusted application according to the first execution result; the general trusted application sends the first client The application sends the first response.

Description

technical field [0001] The present application relates to the field of communication technology, and in particular to a method for running an application in a terminal and the terminal. Background technique [0002] Currently, mobile terminals have three layers of application environments, which are Rich Execution Environment (REE), Trust Execution Environment (TEE) and Secure Element (SE). [0003] Usually, when a service provider (Service Provider, SP) deploys a business with high security (for example: bank payment business, etc.), it needs to deploy corresponding Applications. Among them, the application in the REE is called a client application (client application, CA), and has relatively low security requirements. The application in the TEE is a trusted application, called TA (TEE application), which requires high security. Applications in the SE are called secure element applications (applets), and the security requirements are the highest among the three types of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08G06F21/57
CPCH04L9/08G06F21/53G06F21/57H04W12/10G06F21/44G06F21/54
Inventor 李卓斐
Owner HUAWEI TECH CO LTD