Security authentication method and system, equipment and medium

A security authentication and security technology, applied in the direction of digital data protection, etc., can solve the problems of the decline of real-time data processing and unusable functions, and achieve the effect of ensuring real-time performance and satisfying high-speed communication.

Active Publication Date: 2021-10-01
SPREADTRUM COMM (SHANGHAI) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the network is unstable or in places where the network cannot cover, the device cannot operate this mechanism, resulting in either the function cannot be used, or the real-time performance of data processing will drop sharply

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method and system, equipment and medium
  • Security authentication method and system, equipment and medium
  • Security authentication method and system, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the objects, technical solutions, and advantages of the present invention, the technical solutions in the embodiments of the present invention will be described in connection with the drawings of the present invention, and will be described in connection with the drawings of the present invention. Embodiments, not all of the embodiments. Based on the embodiments of the present invention, those of ordinary skill in the art will belong to the scope of the present invention without all other embodiments obtained without creative labor. Unless otherwise defined, the technical terms used herein or scientific terms should be understood by those who have general skills in the art of the present invention. Similar words to "including" as used herein refers to the elements or objects of the previous article or objects that exhibit appear later in the word and their equivalents without excluding other elements or objects.

[0028] With the digital terminal device in ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security authentication method and system, equipment and medium, and the method comprises the steps that: an application client of a target application receives an authentication request related to the target application, the application client signs original text data by calling a security interface of a security client because the authentication request comprises the original text data to be authenticated, and signature data is obtained; and the application server of the target application obtains the signature data and the original text data from the application client, and the application server verifies the signature data and the original text data by calling the security interface of the signature authentication service unit to generate a security authentication result, wherein the execution environment of the digital terminal comprises a rich execution environment and a trusted execution environment, an application client and an application server run in the rich execution environment, and a security client and a signature authentication service unit run in the trusted execution environment. According to the invention, the situation that a digital signature authentication mechanism cannot be operated due to network problems is avoided, and the real-time performance of data processing is guaranteed.

Description

Technical field [0001] Technical Field The present invention relates to a terminal, in particular, it relates to a secure authentication method, system, device and medium. Background technique [0002] With the development of digital terminals, data terminals credible security requirements received widespread attention, how to ensure that the data on the terminal is not tampered with, non-repudiation of data operations to ensure security of data transmission and to avoid defects in the operating system itself according to the security risks become a priority. [0003] Currently a more common pattern is to do a remote server signature verification to ensure safe and reliable terminal data and avoid security risks operating system, the basic principle is achieved through the deployment of the distal end having a secure server encryption and decryption functions, through a server provide security API interface to be signed original data on the server side digital signature, secret k...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64
CPCG06F21/64
Inventor 周伟成刘智勇张忠立
Owner SPREADTRUM COMM (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products