Unlock instant, AI-driven research and patent intelligence for your innovation.

A system and method for establishing a session key between CA and TA

A session key and session establishment technology, applied in transmission systems, digital transmission systems, and key distribution, can solve problems such as attacks, confidentiality cannot be effectively guaranteed, and achieve the effect of zero overhead.

Active Publication Date: 2022-07-26
BEIJING WATCH DATA SYST
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if the same key is used for a long time, it is easy to be attacked by cryptanalysis methods, and the confidentiality cannot be effectively guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A system and method for establishing a session key between CA and TA
  • A system and method for establishing a session key between CA and TA
  • A system and method for establishing a session key between CA and TA

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The preferred embodiments of the present invention are described in detail below with reference to the accompanying drawings. Reference numerals refer to components and techniques in the present invention, so that the advantages and features of the present invention can be more easily understood in a suitable environment. The following description is an embodiment of the claims of the present invention, and other specific implementations related to the claims that are not expressly stated also belong to the scope of the claims.

[0016] The present invention will be described below by taking a mobile phone installed with a rich operating system and a trusted operating system as an example.

[0017] A client application (CA) is installed in the rich operating system (REE) of the mobile phone, and a trusted application (TA) is installed in the trusted operating system (TEE). The client application is used for payment, for example, and the trusted application is used to pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system for establishing a session key between a CA and a TA, the CA runs in a rich system environment, the TA runs in a trusted environment, and the CA includes the following modules: a time factor calculation module 11; a root key storage module 12 saves the root The key S; the hash calculation module 13, which generates the session key K1; the CA encryption module 14, which encrypts the plaintext message to obtain the ciphertext message. TA includes the following modules: time factor calculation module 21; root key storage module 22 to store root key S; hash calculation module 23 to generate session key K2; TA decryption module 24 to perform decryption operation to obtain plaintext information. Through the present invention, the CA and the TA do not need to carry out additional communication before transmitting the message, and the ciphertext of the message can be directly transmitted, and the other party can decrypt it. The ciphertext transmitted at different times uses different session keys; the goal of security, efficiency, and zero overhead can be achieved in the high-frequency communication scenario of one-time-one-pad.

Description

technical field [0001] The present invention relates to information security transmission technology, and more particularly, to a system and method for establishing a session key between a CA and a TA. Background technique [0002] Currently, terminals such as mobile phones are mostly integrated with a Trusted Execution Environment (TEE, Trusted Execution Environment) and a Rich Execution Environment (REE, Rich Execution Environment). The REE consists of a client application (CA, Client Application) and an application operating system. The TEE is composed of a trusted application (TA, Trusted Application) and a trusted operating system (Trusted OS, Trusted Operating System). REE supports rich applications, but REE has certain security risks. The TEE is an independent area in the terminal. The installation of applications in this area is controlled by the management server platform, and is usually used to manage documents with high security requirements. [0003] In the AR...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/08
CPCH04L9/0643H04L9/0863H04L9/0836H04L9/085
Inventor 李勃刘晓蕾
Owner BEIJING WATCH DATA SYST