Unlock instant, AI-driven research and patent intelligence for your innovation.

An information processing method and device

A technology of an information processing device and an information processing method, which is applied in the direction of a secure communication device, a program control device, a computer security device, etc., can solve problems such as reducing the security of encrypted information of CA

Active Publication Date: 2022-07-12
HUAWEI TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen that there are security holes in the encryption process of TA, which reduces the security of encrypted information of CA

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An information processing method and device
  • An information processing method and device
  • An information processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The embodiments of the present application provide an information processing method and apparatus. The methods of the embodiments of the present application may be applied to a computer system. Exemplarily, the computer system may be a terminal device, and common terminal devices include, for example, a mobile phone, a tablet computer, a desktop Computers, wearable devices (such as smart watches), smart home devices (such as smart speakers or smart TVs or smart screens, etc.), in-vehicle smart devices, driverless devices, virtual reality devices, augmented reality devices, mixed reality devices, and artificial smart devices, etc. The embodiments of the present application will be described below by taking a computer system as a terminal device as an example and with reference to the accompanying drawings.

[0064] With the development of the mobile Internet, the application of intelligent terminal equipment is becoming more and more extensive. In order to provide rich ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiments of the present application disclose an information processing method and apparatus, which are applied to a computer system deployed with a Rich Execution Environment (TEE) and a Trusted Execution Environment (REE). The target TA receives the password setting request sent by the REE target CA, the password setting request includes the first password, and then the target TA uses the first encryption parameter to encrypt the first password to obtain the first ciphertext. After the first security key derived from the security device, the target TA can send a password setting result to the target CA, where the password setting result includes the first ciphertext. The first security key derived from the security device has high security and is difficult to be stolen, thus increasing the difficulty of cracking the first ciphertext, thereby improving the security of the first password.

Description

technical field [0001] The present application relates to computer security technology, and in particular, to an information processing method and device. Background technique [0002] With the development of the mobile Internet, the application of intelligent terminal equipment is becoming more and more extensive. In order to provide rich functions and extensible properties of smart terminal devices, and protect user privacy and information security, terminal devices are built in a rich execution environment (REE) and a trusted execution environment (trusted execution environment) that provide an open operating environment. TEE) above. REE is also called a general operating environment, and mainly includes a rich operating system (Rich OS) running on a general-purpose processor and a client application (client application, CA) running on the Rich OS. TEE is an independent operating environment running outside REE, mainly including trusted operating system (trusted operati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/445G06F21/60H04L9/32
CPCG06F9/44505G06F21/602H04L9/3236H04L9/32G06F9/445G06F21/60
Inventor 张静超
Owner HUAWEI TECH CO LTD