CN104994503A - Mobile application access method - Google Patents
Mobile application access method Download PDFInfo
- Publication number
- CN104994503A CN104994503A CN201510423837.1A CN201510423837A CN104994503A CN 104994503 A CN104994503 A CN 104994503A CN 201510423837 A CN201510423837 A CN 201510423837A CN 104994503 A CN104994503 A CN 104994503A
- Authority
- CN
- China
- Prior art keywords
- control server
- mobile terminal
- terminal
- platform
- safety
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/60—Subscription-based services using application servers or record carriers, e.g. SIM application toolkits
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a mobile application access method. The method comprises the steps that a mobile terminal environment is detected; a security detection report is provided for a remote control server; the remote control server provides the security detection report for an authentication server; when it is verified that a mobile terminal is safe, the authentication server boots a high security service on the mobile terminal. Through adoption of the mobile application access method, problems occurring in safety verification of the terminal, such as privacy disclosure, complexity of realization and so on, are solved, and the access of more services to the mobile terminal is convenient.
Description
Technical field
The present invention relates to Mobile solution, particularly a kind of Mobile solution access method.
Background technology
Mobile terminal has open characteristics, and user can install program software that the third party service provider provides voluntarily and gain the name.But the opening of terminal also brings some privacies, safety problem.The leak of terminal system, the moment such as the brush machine of user affect the business of high demand for security as the safety paid by mails, and these high safety services, except the identity needing authenticated user, also need to confirm the system of active user and the fail safe of operating environment.In existing mobile terminal, operator and equipment manufacturers are leading forces of terminal.As in mobile phone, equipment manufacturers are often integrated with some and serve promotion business especially.
Based on long-range checking can safety the identity of verification terminal platform and the fail safe of operation, the fail safe of running environment when guaranteeing that security sensitive operates, it can eliminate security attack potential in a large number from source, and the business for high demand for security starts on mobile terminals provides possibility.Existing method can only provide the consistent service for checking credentials when verification terminal fail safe, because all characteristic values of checking report often containing platform sent, often brings privacy concern.And each authentication is in order to the fail safe of verification platform, often need all characteristic informations of collecting platform, this seriously hinders remote validation technology in the use of mobile terminal.
Summary of the invention
For solving the problem existing for above-mentioned prior art, the present invention proposes a kind of Mobile solution access method, comprising:
Detect mobile terminal environment, provide safety detection to report to remote control service device, examining report is provided to authentication server by Control Server, and when verifying mobile terminal safety, authentication server starts high safety service on mobile terminals.
Preferably, described Control Server detects the fail safe of basic platform assembly, comprise clean boot chain, operating system infrastructure service, system library, black list service and software, for authentication server provides safety grades and the details of basic platform, send to authentication server with the form of detection of platform report the test; Authentication server is according to the license of Control Server, the safety detection request of the applied environment of self tolerance band is initiated to terminal, comprise self application software, self initial configuration information, install after the detection request of applied environment, authentication server according to the fail safe of the applied environment testing result verification terminal environment of the detection of platform report the test fed back from Control Server and terminal feedback, and judges whether to push high safety service to mobile terminal thus;
When utilizing the equipment identities of Control Server verification terminal, authentication server and mobile terminal are consulted based on this proprietary shared symmetric key of remote validation, this symmetric key is used for the protection of terminal identity certification and testing result integrality, this is shared and is realized by online middle security side Control Server, forms shared key by mobile terminal and the safety of Control Server and the security negotiation of authentication server and Control Server; Control Server is a security platform containing secure hardware.
Preferably, described symmetric key is formed by following process:
Authentication server is to Control Server application for registration token; Control Server passes through identity and the consulting session key of this token authentication server, remembers that this token is Tc;
Proof procedure is based on public-key mechanism, and realize the negotiation of Control Server and the symmetrical shared key of mobile terminal, its step comprises:
(1) Control Server initiates detection of platform request, detect in request and comprise challenge c1, this challenge is one section of random number, is generated by Control Server this locality, described detection of platform request is one section of request detection message, and this message of terminal recognition also replys this detection request;
(2) the detection of platform request of mobile terminal response limiting server, quote operation as proof by configuration register and send examining report to Control Server, examining report content comprises one section of transportable symmetric key SK that the secure hardware of challenge c2, the identity key AIK of secure hardware and public key certificate AIK certificate, daily record, mobile terminal generates;
(3) Control Server first usage platform private key deciphering acquisition SK, uses SK to decrypt daily record, after checking AIK certificate validity, uses AIK public key verifications configuration register according to daily record after calculating configuration register, and the value of checking c1; Then, comparison log list, to judge terminal security, and generating platform test results report, and report is preserved together with SK, along with next time upgrades terminal judges; If platform base component safety, returns successfully, otherwise returns error reporting;
(4) response that returns according to Control Server of mobile terminal, judges whether the SK upgrading cryptographic storage, synchronous with what realize between Control Server and the SK of mobile terminal; Checking c2 value, if correct, upgrades SK, otherwise, return error message and describe, do not upgrade the SK of cryptographic storage;
(5) Control Server is when mobile terminal is online, and request mobile terminal provides the safety verification of terminal platform, if mobile terminal request upgrades SK, then repeats the step (process of 1) – (4);
Finally, the authentication server to Control Server registration initiates present terminal safety verification at any time, the checking platform of present terminal and applied environment whether safety.
The present invention compared to existing technology, has the following advantages:
The present invention proposes a kind of Mobile solution access method, the problems such as the privacy leakage occurred when overcoming verification terminal fail safe, realization complexity, facilitate more business access on mobile terminals.
Accompanying drawing explanation
Fig. 1 is the flow chart of the Mobile solution access method according to the embodiment of the present invention.
Embodiment
Detailed description to one or more embodiment of the present invention is hereafter provided together with the accompanying drawing of the diagram principle of the invention.Describe the present invention in conjunction with such embodiment, but the invention is not restricted to any embodiment.Scope of the present invention is only defined by the claims, and the present invention contain many substitute, amendment and equivalent.Set forth many details in the following description to provide thorough understanding of the present invention.These details are provided for exemplary purposes, and also can realize the present invention according to claims without some in these details or all details.
An aspect of of the present present invention provides a kind of Mobile solution access method, for carrying out remote validation on mobile terminals.Fig. 1 is the Mobile solution access method flow chart according to the embodiment of the present invention.In the present invention, mobile terminal has safety compute detectability, by each assembly of sense terminals system and file, and provides safety detection to report to remote port, supports Static Detection and optional detection of dynamic.Control Server is the controlling party of mobile terminal, as operator or equipment vendors, for third-party authentication server provides the cloud service of basic platform fail safe and application layer examining report.The main application-oriented layer of authentication server, such as starts the application developers of high safety service on mobile terminals.
The detection request of authentication server is dominated by Control Server.Control Server is responsible for the fail safe of basic platform assembly, as clean boot chain, operating system infrastructure service, system library, black list service and software etc., for authentication server provides safety grades and the details of basic platform, send to authentication server with the form of detection of platform report the test.Authentication server is then according to the license of Control Server, the safety detection request of the applied environment of self tolerance band is initiated to terminal, as self application software, self initial configuration information, install after the detection request of applied environment etc., authentication server according to the fail safe of the applied environment testing result verification terminal environment of the detection of platform report the test fed back from Control Server and terminal feedback, and judges whether to push high safety service to mobile terminal thus.
When utilizing the Control Server of safety to the equipment identities of remote port verification terminal; authentication server and mobile terminal is needed to consult based on this proprietary shared symmetric key of remote validation; this symmetric key is used for the protection of terminal identity certification and testing result integrality, to replace public key signature and public key verifications mechanism.This shared mechanism realizes by online middle security side Control Server, forms shared key by mobile terminal and the safety of Control Server and the security negotiation of authentication server and Control Server.Control Server can be a security platform containing secure hardware, may also be one not containing the telesecurity platform of secure hardware.
Asymmetric encryption mechanisms interaction content and flow process as follows:
First, authentication server needs to Control Server application for registration token.Control Server is by the identity of this token authentication server and consulting session key.Remember that this token is Tc.Secondly, in order to the existing basis of protecting control server and technical system, the proof procedure of remote validation can based on public-key mechanism.The mode introducing transportable key in original configuration register report transmission realizes the negotiation of Control Server and the symmetrical shared key of mobile terminal.Key step comprises:
(1) Control Server initiates detection of platform request, detects in request and comprises challenge c1.Being mainly one section of random number, being generated, for preventing Replay Attack by Control Server this locality.Detection of platform request is one section of request detection message, and this message of terminal recognition also replys this detection request.
(2) the detection of platform request of mobile terminal response limiting server, quotes operation as proof by configuration register and sends examining report to Control Server.Examining report content mainly comprises AIK and AIK certificate, is identity key and the public key certificate of secure hardware, represents equipment identities; Daily record, comprises the storage detecting file digest values and detects daily record; SK, be one section of transportable symmetric key that the secure hardware of mobile terminal generates, the Control Server only holding Control Server platform private key just can get, for confirming the key SK success or not of moving.
(3) first Control Server uses the platform private key deciphering of Control Server to obtain SK, SK is used to decrypt daily record, after checking AIK certificate validity, after calculating configuration register according to daily record, use AIK public key verifications configuration register, and the value of checking c1 is to prevent Replay Attack.Then, comparison log list, to judge terminal security, and generating platform test results report, at least should contain platform base component safety content in report.Report need be preserved together with SK, and along with upgrading terminal judges next time.If platform base component safety, returns successfully, otherwise platform base assembly is dangerous, then return error reporting.
(4) response that returns according to Control Server of mobile terminal, judges whether the SK upgrading cryptographic storage, synchronous with what realize between Control Server and the SK of mobile terminal.Checking c2 value, if correct, upgrades SK, otherwise, return error message and describe, do not upgrade the SK of cryptographic storage.
(5) Control Server is when mobile terminal is online, requires that mobile terminal provides the safety verification of terminal platform.Same, if mobile terminal request upgrades SK, then repeat (the process of 1) – (4).The term of validity of SK before terminates after next platform validation success.
Finally, the authentication server to Control Server registration can initiate present terminal safety verification at any time, the platform of checking present terminal and applied environment safety.Its idiographic flow comprises:
(1) authentication server initiates to detect request to mobile terminal, and authentication server is to the environment measuring of the detection of mobile terminal mainly application layer.
(2) mobile terminal Returning equipment AIK index and the random number c3 based on this detection.
(3) authentication server detects to Control Server application terminal, and detection request comprises sn, AIK index, and c3, cv range of application is its major part.Wherein sn is that the identity ID of authentication server, AIK index detects to certain equipment application; C3 is the random number that (2) moved further terminal sends over, so that this time of terminal recognition detects session.Cv is the random number that authentication server self produces.Range of application detects the scope of asking then mainly authentication server to detect to Control Server application.
(4) Control Server is according to AIK index, sn and detection range, and inquiry detects admission policy.If inquiry is passed through, then generate random number cc, session key, otherwise directly return authentication server error description.
(5) authentication server calculates session key, and mobile terminal uses the SK being loaded into hardware to decipher detection request scope, and provides detection list;
(6) mobile terminal sends testing result for authentication server checking.
(10) authentication server is according to the detected value comparison stored before, determines applied environment safety.In terminal environments and platform safety and applied environment foundation for security, authentication server pushes high safety service.
Wherein, Control Server and mobile terminal interaction flow: be mainly following steps:
Step 1.The request of terminal applies layer creates transportable symmetric key SK, SK and current platform infrastructure component status configuration register is bound, and secure hardware returns the key structure of father's secret key encryption.Only have when current configuration register and state consistency when creating, this key structure just can be loaded into secure hardware thus use cipher key function.Meanwhile, request key migration, secure hardware returns the key structure body that can migrate to Control Server platform according to Control Server platform PKI.
Step 2.The application-level request configuration register of mobile terminal quotes operation as proof, and secure hardware uses AIK private key signature to return
aIK
signconfiguration register c1.
Step 3.Application layer loads the SK key structure encrypted, and uses SK as the key of symmetric cryptography daily record, is returned the number of encryption by secure hardware encryption
daily record.Application layer generates c2 and Log Sender is verified to Control Server.
Step 4.Application layer, after resolving the information that returns of Control Server, is verified c2 to secure hardware.Return the result.If be verified, then application layer upgrades the cryptographic structure storing this SK.
The terminal flow process that mobile terminal communicates with authentication server is mainly following steps:
Step 1.The encryption key structure of the terminal application software APP request of loading SK that authentication server is corresponding is in secure hardware.
Step 2.Terminal application software APP passes to license and detects agency, secure hardware keyhandle is passed to simultaneously and detects agency.
Step 3.Detect proxy requests secure hardware checking license.Require after being proved to be successful that secure hardware is deciphered and detect file extent, detect proxy resolution scope and generate and detect listed files, carry out step 4 afterwards.Otherwise return APP and do not permit response, terminate this checking.
Step 4.Detect agency and clear operation is performed to certain configuration register of exclusive application layer.
Step 5.Detect agency to start to detect and configuration register extended operation according to detection listed files, the hash value of file can derive from daily record or again carry out hash calculating to detection file.
Step 6.Send answer code after extended operation to apply to authentication server.
Step 7.The configuration register value of the exclusive application layer of APP acquisition request, sends to authentication server Front End Authentication applied environment integrality.
Mobile terminal has the open nature to third-party application, the detection ordering of applied environment is not affected to the security context of application, contrary, operating system can use parallel mechanism to detect fast applied environment, in detecting application layer, just have employed parallel mechanism.The present invention does not need according to detection daily record; only need based on detecting detected value that listed files and mobile terminal and authentication server share for judging the fail safe of applied environment; thus protect the privacy of user and application, decrease the amount of calculation of authentication server authentication simultaneously.
Obviously, it should be appreciated by those skilled in the art, above-mentioned of the present invention each module or each step can realize with general computing system, they can concentrate on single computing system, or be distributed on network that multiple computing system forms, alternatively, they can realize with the executable program code of computing system, thus, they can be stored and be performed by computing system within the storage system.Like this, the present invention is not restricted to any specific hardware and software combination.
Should be understood that, above-mentioned embodiment of the present invention only for exemplary illustration or explain principle of the present invention, and is not construed as limiting the invention.Therefore, any amendment made when without departing from the spirit and scope of the present invention, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.In addition, claims of the present invention be intended to contain fall into claims scope and border or this scope and border equivalents in whole change and modification.
Claims (3)
1. a Mobile solution access method, is characterized in that, comprising:
Detect mobile terminal environment, provide safety detection to report to remote control service device, examining report is provided to authentication server by Control Server, and when verifying mobile terminal safety, authentication server starts high safety service on mobile terminals.
2. method according to claim 1, it is characterized in that, described Control Server detects the fail safe of basic platform assembly, comprise clean boot chain, operating system infrastructure service, system library, black list service and software, for authentication server provides safety grades and the details of basic platform, send to authentication server with the form of detection of platform report the test; Authentication server is according to the license of Control Server, the safety detection request of the applied environment of self tolerance band is initiated to terminal, comprise self application software, self initial configuration information, install after the detection request of applied environment, authentication server according to the fail safe of the applied environment testing result verification terminal environment of the detection of platform report the test fed back from Control Server and terminal feedback, and judges whether to push high safety service to mobile terminal thus;
When utilizing the equipment identities of Control Server verification terminal, authentication server and mobile terminal are consulted based on this proprietary shared symmetric key of remote validation, this symmetric key is used for the protection of terminal identity certification and testing result integrality, this is shared and is realized by online middle security side Control Server, forms shared key by mobile terminal and the safety of Control Server and the security negotiation of authentication server and Control Server; Control Server is a security platform containing secure hardware.
3. method according to claim 2, is characterized in that, described symmetric key is formed by following process:
Authentication server is to Control Server application for registration token; Control Server passes through identity and the consulting session key of this token authentication server, remembers that this token is Tc;
Proof procedure is based on public-key mechanism, and realize the negotiation of Control Server and the symmetrical shared key of mobile terminal, its step comprises:
(1) Control Server initiates detection of platform request, detect in request and comprise challenge c1, this challenge is one section of random number, is generated by Control Server this locality, described detection of platform request is one section of request detection message, and this message of terminal recognition also replys this detection request;
(2) the detection of platform request of mobile terminal response limiting server, quote operation as proof by configuration register and send examining report to Control Server, examining report content comprises one section of transportable symmetric key SK that the secure hardware of challenge c2, the identity key AIK of secure hardware and public key certificate AIK certificate, daily record, mobile terminal generates;
(3) Control Server first usage platform private key deciphering acquisition SK, uses SK to decrypt daily record, after checking AIK certificate validity, uses AIK public key verifications configuration register according to daily record after calculating configuration register, and the value of checking c1; Then, comparison log list, to judge terminal security, and generating platform test results report, and report is preserved together with SK, along with next time upgrades terminal judges; If platform base component safety, returns successfully, otherwise returns error reporting;
(4) response that returns according to Control Server of mobile terminal, judges whether the SK upgrading cryptographic storage, synchronous with what realize between Control Server and the SK of mobile terminal; Checking c2 value, if correct, upgrades SK, otherwise, return error message and describe, do not upgrade the SK of cryptographic storage;
(5) Control Server is when mobile terminal is online, and request mobile terminal provides the safety verification of terminal platform, if mobile terminal request upgrades SK, then repeats the step (process of 1) – (4);
Finally, the authentication server to Control Server registration initiates present terminal safety verification at any time, the checking platform of present terminal and applied environment whether safety.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510423837.1A CN104994503B (en) | 2015-07-17 | 2015-07-17 | A kind of mobile application access method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510423837.1A CN104994503B (en) | 2015-07-17 | 2015-07-17 | A kind of mobile application access method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104994503A true CN104994503A (en) | 2015-10-21 |
CN104994503B CN104994503B (en) | 2019-01-01 |
Family
ID=54306237
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510423837.1A Active CN104994503B (en) | 2015-07-17 | 2015-07-17 | A kind of mobile application access method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104994503B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108370509A (en) * | 2015-12-03 | 2018-08-03 | 开利公司 | Utilize the Verification System of kinematic parameter |
CN110121168A (en) * | 2018-02-06 | 2019-08-13 | 华为技术有限公司 | Safe consultation method and device |
CN113128944A (en) * | 2019-12-31 | 2021-07-16 | 成都鼎桥通信技术有限公司 | Multi-system-based security service management method, device and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102438044A (en) * | 2011-12-04 | 2012-05-02 | 河南科技大学 | Digital content trusted usage control method based on cloud computing |
EP2002634B1 (en) * | 2006-03-27 | 2014-07-02 | Telecom Italia S.p.A. | System for enforcing security policies on mobile communications devices |
CN104333541A (en) * | 2014-10-21 | 2015-02-04 | 广东金赋信息科技有限公司 | Trusted self-help service system |
-
2015
- 2015-07-17 CN CN201510423837.1A patent/CN104994503B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2002634B1 (en) * | 2006-03-27 | 2014-07-02 | Telecom Italia S.p.A. | System for enforcing security policies on mobile communications devices |
CN102438044A (en) * | 2011-12-04 | 2012-05-02 | 河南科技大学 | Digital content trusted usage control method based on cloud computing |
CN104333541A (en) * | 2014-10-21 | 2015-02-04 | 广东金赋信息科技有限公司 | Trusted self-help service system |
Non-Patent Citations (2)
Title |
---|
ZHIYONG ZHANG,ETC: "Implementing Trustworthy Dissemination of Digital Contents by Using a Third Party Attestation Proxy-Enabling Remote Attestation Model", 《2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND INFORMATION TECHNOLOGY》 * |
徐梓耀等: "一种保护隐私的高效远程验证机制", 《软件学报》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108370509A (en) * | 2015-12-03 | 2018-08-03 | 开利公司 | Utilize the Verification System of kinematic parameter |
CN110121168A (en) * | 2018-02-06 | 2019-08-13 | 华为技术有限公司 | Safe consultation method and device |
WO2019153994A1 (en) * | 2018-02-06 | 2019-08-15 | 华为技术有限公司 | Security negotiation method and apparatus |
US11765578B2 (en) | 2018-02-06 | 2023-09-19 | Huawei Technologies Co., Ltd. | Security negotiation method and apparatus |
CN113128944A (en) * | 2019-12-31 | 2021-07-16 | 成都鼎桥通信技术有限公司 | Multi-system-based security service management method, device and storage medium |
CN113128944B (en) * | 2019-12-31 | 2023-10-17 | 成都鼎桥通信技术有限公司 | Multi-system-based security service management method, device and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN104994503B (en) | 2019-01-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR100463736B1 (en) | Method for permitting debugging and testing of software on mobile communication device in a secure environment | |
US9998438B2 (en) | Verifying the security of a remote server | |
EP2255507B1 (en) | A system and method for securely issuing subscription credentials to communication devices | |
EP2954448B1 (en) | Provisioning sensitive data into third party network-enabled devices | |
JP5860815B2 (en) | System and method for enforcing computer policy | |
CN110299996B (en) | Authentication method, equipment and system | |
CN107040513B (en) | Trusted access authentication processing method, user terminal and server | |
CN104125565A (en) | Method for realizing terminal authentication based on OMA DM, terminal and server | |
US20130290714A1 (en) | Method and system for activation | |
CN103685138A (en) | Method and system for authenticating application software of Android platform on mobile internet | |
US20050114694A1 (en) | System and method for authentication of applications in a non-trusted network environment | |
RU2682430C1 (en) | Information registration and authentication method and device | |
CN110020869B (en) | Method, device and system for generating block chain authorization information | |
CN113312664A (en) | User data authorization method and user data authorization system | |
EP2262165A1 (en) | User generated content registering method, apparatus and system | |
CN104994503A (en) | Mobile application access method | |
Vinh et al. | Property‐based token attestation in mobile computing | |
Nagy et al. | Peershare: A system secure distribution of sensitive data among social contacts | |
Kleberger et al. | Protecting vehicles against unauthorised diagnostics sessions using trusted third parties | |
Fenzl et al. | Collaborative Security Patterns for Automotive Electrical/Electronic Architectures | |
CN114065170A (en) | Method and device for acquiring platform identity certificate and server | |
EP3086583B1 (en) | Wireless terminal network locking method and system | |
Tamrakar et al. | On rehoming the electronic id to TEEs | |
TWI673621B (en) | Information registration, authentication method and device | |
CN117763537A (en) | Application authority management and control method and device of terminal system and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20181112 Address after: Room 1240, Building 20, 958 Zhenbei Road, Putuo District, Shanghai 200062 Applicant after: Shanghai Ruishi Network Technology Co., Ltd. Address before: 610000 No. 1, No. 3 Shen Xian Nan Road, Chengdu high tech Zone, Sichuan, China. Applicant before: BEIJING BLTSFE INFORMATION TECHNOLOGY CO., LTD. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |