Information processing method and device for secure communication

An information processing method and a secure communication technology, which are applied in the field of information processing methods and devices for secure communication, can solve the problem of inability to meet the unified needs of interactive services between clients and clients, and between clients and servers, and the mismatching of secure channel protocols, etc. question

Active Publication Date: 2021-02-09
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF15 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003]In practice, the terminal environment is implemented based on various chip platforms, with different algorithm capabilities and encryption capabilities, and the security channel protocols they have do not match each other. If a set of encryption algorithm protocol is used, it cannot meet the unified requirements of client-client, client-server interaction business

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information processing method and device for secure communication
  • Information processing method and device for secure communication
  • Information processing method and device for secure communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The specification will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. The described embodiments are only some of the embodiments in this specification, not all of them. Based on the embodiments in this specification, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present application.

[0040] It should be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings. In the case of no conflict, the embodiments in this specification and the features in the embodiments can be combined with each other. In addition, words such as "first", "second", and "third" in this specification are only used to distinguish information...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an information processing method and device for secure communication. The method can be applied to a first security domain on terminal equipment and can also be applied to a second security domain. When the method is applied to a first security domain, the method comprises the following steps: receiving a security channel establishment request from a targetapplication on the terminal equipment, with the security channel establishment request comprising a domain identifier of a second security domain; in response to the establishment request, sending algorithm information to a second security domain, with the algorithm information comprising algorithm identifiers of a plurality of encryption and decryption algorithms supported by the target application, with the plurality of encryption and decryption algorithms corresponding to a plurality of algorithm types required by the security channel; receiving an encryption strategy from the second security domain, with the encryption strategy showing algorithm identifiers of a plurality of target algorithms and data types for encryption and decryption, with the plurality of target algorithms corresponding to the plurality of algorithm types and being encryption and decryption algorithms supported by both the target application and the second security domain; and executing a secure channel initialization operation according to the encryption strategy.

Description

technical field [0001] The embodiments of this specification relate to the technical field of information security, and in particular, to an information processing method and device for secure communication. Background technique [0002] At present, client applications with secure communication requirements (hereinafter collectively referred to as target applications) can be installed on terminal devices, and security domains (hereinafter collectively referred to as first security domains) can also be configured, such as TEE (Trusted Execution Environment, which can letter execution environment), etc. When the target application needs to communicate with applications on the server or other terminal devices, a secure channel with the second security domain can be established through the first security domain, and message transmission can be performed through the secure channel. Wherein, the second security domain is a security domain corresponding to applications on the serv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08H04L9/14
CPCH04L63/0428H04L63/0435H04L63/0442H04L63/06H04L9/08H04L9/088H04L9/14
Inventor 朱丙营辛知徐登伟
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products