CN104994503A - Mobile application access method - Google Patents

Mobile application access method Download PDF

Info

Publication number
CN104994503A
CN104994503A CN201510423837.1A CN201510423837A CN104994503A CN 104994503 A CN104994503 A CN 104994503A CN 201510423837 A CN201510423837 A CN 201510423837A CN 104994503 A CN104994503 A CN 104994503A
Authority
CN
China
Prior art keywords
control server
mobile terminal
terminal
platform
safety
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510423837.1A
Other languages
Chinese (zh)
Other versions
CN104994503B (en
Inventor
张鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Ruishi Network Technology Co., Ltd.
Original Assignee
BEIJING BLTSFE INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING BLTSFE INFORMATION TECHNOLOGY Co Ltd filed Critical BEIJING BLTSFE INFORMATION TECHNOLOGY Co Ltd
Priority to CN201510423837.1A priority Critical patent/CN104994503B/en
Publication of CN104994503A publication Critical patent/CN104994503A/en
Application granted granted Critical
Publication of CN104994503B publication Critical patent/CN104994503B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/60Subscription-based services using application servers or record carriers, e.g. SIM application toolkits
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a mobile application access method. The method comprises the steps that a mobile terminal environment is detected; a security detection report is provided for a remote control server; the remote control server provides the security detection report for an authentication server; when it is verified that a mobile terminal is safe, the authentication server boots a high security service on the mobile terminal. Through adoption of the mobile application access method, problems occurring in safety verification of the terminal, such as privacy disclosure, complexity of realization and so on, are solved, and the access of more services to the mobile terminal is convenient.

Description

A kind of Mobile solution access method
Technical field
The present invention relates to Mobile solution, particularly a kind of Mobile solution access method.
Background technology
Mobile terminal has open characteristics, and user can install program software that the third party service provider provides voluntarily and gain the name.But the opening of terminal also brings some privacies, safety problem.The leak of terminal system, the moment such as the brush machine of user affect the business of high demand for security as the safety paid by mails, and these high safety services, except the identity needing authenticated user, also need to confirm the system of active user and the fail safe of operating environment.In existing mobile terminal, operator and equipment manufacturers are leading forces of terminal.As in mobile phone, equipment manufacturers are often integrated with some and serve promotion business especially.
Based on long-range checking can safety the identity of verification terminal platform and the fail safe of operation, the fail safe of running environment when guaranteeing that security sensitive operates, it can eliminate security attack potential in a large number from source, and the business for high demand for security starts on mobile terminals provides possibility.Existing method can only provide the consistent service for checking credentials when verification terminal fail safe, because all characteristic values of checking report often containing platform sent, often brings privacy concern.And each authentication is in order to the fail safe of verification platform, often need all characteristic informations of collecting platform, this seriously hinders remote validation technology in the use of mobile terminal.
Summary of the invention
For solving the problem existing for above-mentioned prior art, the present invention proposes a kind of Mobile solution access method, comprising:
Detect mobile terminal environment, provide safety detection to report to remote control service device, examining report is provided to authentication server by Control Server, and when verifying mobile terminal safety, authentication server starts high safety service on mobile terminals.
Preferably, described Control Server detects the fail safe of basic platform assembly, comprise clean boot chain, operating system infrastructure service, system library, black list service and software, for authentication server provides safety grades and the details of basic platform, send to authentication server with the form of detection of platform report the test; Authentication server is according to the license of Control Server, the safety detection request of the applied environment of self tolerance band is initiated to terminal, comprise self application software, self initial configuration information, install after the detection request of applied environment, authentication server according to the fail safe of the applied environment testing result verification terminal environment of the detection of platform report the test fed back from Control Server and terminal feedback, and judges whether to push high safety service to mobile terminal thus;
When utilizing the equipment identities of Control Server verification terminal, authentication server and mobile terminal are consulted based on this proprietary shared symmetric key of remote validation, this symmetric key is used for the protection of terminal identity certification and testing result integrality, this is shared and is realized by online middle security side Control Server, forms shared key by mobile terminal and the safety of Control Server and the security negotiation of authentication server and Control Server; Control Server is a security platform containing secure hardware.
Preferably, described symmetric key is formed by following process:
Authentication server is to Control Server application for registration token; Control Server passes through identity and the consulting session key of this token authentication server, remembers that this token is Tc;
Proof procedure is based on public-key mechanism, and realize the negotiation of Control Server and the symmetrical shared key of mobile terminal, its step comprises:
(1) Control Server initiates detection of platform request, detect in request and comprise challenge c1, this challenge is one section of random number, is generated by Control Server this locality, described detection of platform request is one section of request detection message, and this message of terminal recognition also replys this detection request;
(2) the detection of platform request of mobile terminal response limiting server, quote operation as proof by configuration register and send examining report to Control Server, examining report content comprises one section of transportable symmetric key SK that the secure hardware of challenge c2, the identity key AIK of secure hardware and public key certificate AIK certificate, daily record, mobile terminal generates;
(3) Control Server first usage platform private key deciphering acquisition SK, uses SK to decrypt daily record, after checking AIK certificate validity, uses AIK public key verifications configuration register according to daily record after calculating configuration register, and the value of checking c1; Then, comparison log list, to judge terminal security, and generating platform test results report, and report is preserved together with SK, along with next time upgrades terminal judges; If platform base component safety, returns successfully, otherwise returns error reporting;
(4) response that returns according to Control Server of mobile terminal, judges whether the SK upgrading cryptographic storage, synchronous with what realize between Control Server and the SK of mobile terminal; Checking c2 value, if correct, upgrades SK, otherwise, return error message and describe, do not upgrade the SK of cryptographic storage;
(5) Control Server is when mobile terminal is online, and request mobile terminal provides the safety verification of terminal platform, if mobile terminal request upgrades SK, then repeats the step (process of 1) – (4);
Finally, the authentication server to Control Server registration initiates present terminal safety verification at any time, the checking platform of present terminal and applied environment whether safety.
The present invention compared to existing technology, has the following advantages:
The present invention proposes a kind of Mobile solution access method, the problems such as the privacy leakage occurred when overcoming verification terminal fail safe, realization complexity, facilitate more business access on mobile terminals.
Accompanying drawing explanation
Fig. 1 is the flow chart of the Mobile solution access method according to the embodiment of the present invention.
Embodiment
Detailed description to one or more embodiment of the present invention is hereafter provided together with the accompanying drawing of the diagram principle of the invention.Describe the present invention in conjunction with such embodiment, but the invention is not restricted to any embodiment.Scope of the present invention is only defined by the claims, and the present invention contain many substitute, amendment and equivalent.Set forth many details in the following description to provide thorough understanding of the present invention.These details are provided for exemplary purposes, and also can realize the present invention according to claims without some in these details or all details.
An aspect of of the present present invention provides a kind of Mobile solution access method, for carrying out remote validation on mobile terminals.Fig. 1 is the Mobile solution access method flow chart according to the embodiment of the present invention.In the present invention, mobile terminal has safety compute detectability, by each assembly of sense terminals system and file, and provides safety detection to report to remote port, supports Static Detection and optional detection of dynamic.Control Server is the controlling party of mobile terminal, as operator or equipment vendors, for third-party authentication server provides the cloud service of basic platform fail safe and application layer examining report.The main application-oriented layer of authentication server, such as starts the application developers of high safety service on mobile terminals.
The detection request of authentication server is dominated by Control Server.Control Server is responsible for the fail safe of basic platform assembly, as clean boot chain, operating system infrastructure service, system library, black list service and software etc., for authentication server provides safety grades and the details of basic platform, send to authentication server with the form of detection of platform report the test.Authentication server is then according to the license of Control Server, the safety detection request of the applied environment of self tolerance band is initiated to terminal, as self application software, self initial configuration information, install after the detection request of applied environment etc., authentication server according to the fail safe of the applied environment testing result verification terminal environment of the detection of platform report the test fed back from Control Server and terminal feedback, and judges whether to push high safety service to mobile terminal thus.
When utilizing the Control Server of safety to the equipment identities of remote port verification terminal; authentication server and mobile terminal is needed to consult based on this proprietary shared symmetric key of remote validation; this symmetric key is used for the protection of terminal identity certification and testing result integrality, to replace public key signature and public key verifications mechanism.This shared mechanism realizes by online middle security side Control Server, forms shared key by mobile terminal and the safety of Control Server and the security negotiation of authentication server and Control Server.Control Server can be a security platform containing secure hardware, may also be one not containing the telesecurity platform of secure hardware.
Asymmetric encryption mechanisms interaction content and flow process as follows:
First, authentication server needs to Control Server application for registration token.Control Server is by the identity of this token authentication server and consulting session key.Remember that this token is Tc.Secondly, in order to the existing basis of protecting control server and technical system, the proof procedure of remote validation can based on public-key mechanism.The mode introducing transportable key in original configuration register report transmission realizes the negotiation of Control Server and the symmetrical shared key of mobile terminal.Key step comprises:
(1) Control Server initiates detection of platform request, detects in request and comprises challenge c1.Being mainly one section of random number, being generated, for preventing Replay Attack by Control Server this locality.Detection of platform request is one section of request detection message, and this message of terminal recognition also replys this detection request.
(2) the detection of platform request of mobile terminal response limiting server, quotes operation as proof by configuration register and sends examining report to Control Server.Examining report content mainly comprises AIK and AIK certificate, is identity key and the public key certificate of secure hardware, represents equipment identities; Daily record, comprises the storage detecting file digest values and detects daily record; SK, be one section of transportable symmetric key that the secure hardware of mobile terminal generates, the Control Server only holding Control Server platform private key just can get, for confirming the key SK success or not of moving.
(3) first Control Server uses the platform private key deciphering of Control Server to obtain SK, SK is used to decrypt daily record, after checking AIK certificate validity, after calculating configuration register according to daily record, use AIK public key verifications configuration register, and the value of checking c1 is to prevent Replay Attack.Then, comparison log list, to judge terminal security, and generating platform test results report, at least should contain platform base component safety content in report.Report need be preserved together with SK, and along with upgrading terminal judges next time.If platform base component safety, returns successfully, otherwise platform base assembly is dangerous, then return error reporting.
(4) response that returns according to Control Server of mobile terminal, judges whether the SK upgrading cryptographic storage, synchronous with what realize between Control Server and the SK of mobile terminal.Checking c2 value, if correct, upgrades SK, otherwise, return error message and describe, do not upgrade the SK of cryptographic storage.
(5) Control Server is when mobile terminal is online, requires that mobile terminal provides the safety verification of terminal platform.Same, if mobile terminal request upgrades SK, then repeat (the process of 1) – (4).The term of validity of SK before terminates after next platform validation success.
Finally, the authentication server to Control Server registration can initiate present terminal safety verification at any time, the platform of checking present terminal and applied environment safety.Its idiographic flow comprises:
(1) authentication server initiates to detect request to mobile terminal, and authentication server is to the environment measuring of the detection of mobile terminal mainly application layer.
(2) mobile terminal Returning equipment AIK index and the random number c3 based on this detection.
(3) authentication server detects to Control Server application terminal, and detection request comprises sn, AIK index, and c3, cv range of application is its major part.Wherein sn is that the identity ID of authentication server, AIK index detects to certain equipment application; C3 is the random number that (2) moved further terminal sends over, so that this time of terminal recognition detects session.Cv is the random number that authentication server self produces.Range of application detects the scope of asking then mainly authentication server to detect to Control Server application.
(4) Control Server is according to AIK index, sn and detection range, and inquiry detects admission policy.If inquiry is passed through, then generate random number cc, session key, otherwise directly return authentication server error description.
(5) authentication server calculates session key, and mobile terminal uses the SK being loaded into hardware to decipher detection request scope, and provides detection list;
(6) mobile terminal sends testing result for authentication server checking.
(10) authentication server is according to the detected value comparison stored before, determines applied environment safety.In terminal environments and platform safety and applied environment foundation for security, authentication server pushes high safety service.
Wherein, Control Server and mobile terminal interaction flow: be mainly following steps:
Step 1.The request of terminal applies layer creates transportable symmetric key SK, SK and current platform infrastructure component status configuration register is bound, and secure hardware returns the key structure of father's secret key encryption.Only have when current configuration register and state consistency when creating, this key structure just can be loaded into secure hardware thus use cipher key function.Meanwhile, request key migration, secure hardware returns the key structure body that can migrate to Control Server platform according to Control Server platform PKI.
Step 2.The application-level request configuration register of mobile terminal quotes operation as proof, and secure hardware uses AIK private key signature to return aIK signconfiguration register c1.
Step 3.Application layer loads the SK key structure encrypted, and uses SK as the key of symmetric cryptography daily record, is returned the number of encryption by secure hardware encryption daily record.Application layer generates c2 and Log Sender is verified to Control Server.
Step 4.Application layer, after resolving the information that returns of Control Server, is verified c2 to secure hardware.Return the result.If be verified, then application layer upgrades the cryptographic structure storing this SK.
The terminal flow process that mobile terminal communicates with authentication server is mainly following steps:
Step 1.The encryption key structure of the terminal application software APP request of loading SK that authentication server is corresponding is in secure hardware.
Step 2.Terminal application software APP passes to license and detects agency, secure hardware keyhandle is passed to simultaneously and detects agency.
Step 3.Detect proxy requests secure hardware checking license.Require after being proved to be successful that secure hardware is deciphered and detect file extent, detect proxy resolution scope and generate and detect listed files, carry out step 4 afterwards.Otherwise return APP and do not permit response, terminate this checking.
Step 4.Detect agency and clear operation is performed to certain configuration register of exclusive application layer.
Step 5.Detect agency to start to detect and configuration register extended operation according to detection listed files, the hash value of file can derive from daily record or again carry out hash calculating to detection file.
Step 6.Send answer code after extended operation to apply to authentication server.
Step 7.The configuration register value of the exclusive application layer of APP acquisition request, sends to authentication server Front End Authentication applied environment integrality.
Mobile terminal has the open nature to third-party application, the detection ordering of applied environment is not affected to the security context of application, contrary, operating system can use parallel mechanism to detect fast applied environment, in detecting application layer, just have employed parallel mechanism.The present invention does not need according to detection daily record; only need based on detecting detected value that listed files and mobile terminal and authentication server share for judging the fail safe of applied environment; thus protect the privacy of user and application, decrease the amount of calculation of authentication server authentication simultaneously.
Obviously, it should be appreciated by those skilled in the art, above-mentioned of the present invention each module or each step can realize with general computing system, they can concentrate on single computing system, or be distributed on network that multiple computing system forms, alternatively, they can realize with the executable program code of computing system, thus, they can be stored and be performed by computing system within the storage system.Like this, the present invention is not restricted to any specific hardware and software combination.
Should be understood that, above-mentioned embodiment of the present invention only for exemplary illustration or explain principle of the present invention, and is not construed as limiting the invention.Therefore, any amendment made when without departing from the spirit and scope of the present invention, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.In addition, claims of the present invention be intended to contain fall into claims scope and border or this scope and border equivalents in whole change and modification.

Claims (3)

1. a Mobile solution access method, is characterized in that, comprising:
Detect mobile terminal environment, provide safety detection to report to remote control service device, examining report is provided to authentication server by Control Server, and when verifying mobile terminal safety, authentication server starts high safety service on mobile terminals.
2. method according to claim 1, it is characterized in that, described Control Server detects the fail safe of basic platform assembly, comprise clean boot chain, operating system infrastructure service, system library, black list service and software, for authentication server provides safety grades and the details of basic platform, send to authentication server with the form of detection of platform report the test; Authentication server is according to the license of Control Server, the safety detection request of the applied environment of self tolerance band is initiated to terminal, comprise self application software, self initial configuration information, install after the detection request of applied environment, authentication server according to the fail safe of the applied environment testing result verification terminal environment of the detection of platform report the test fed back from Control Server and terminal feedback, and judges whether to push high safety service to mobile terminal thus;
When utilizing the equipment identities of Control Server verification terminal, authentication server and mobile terminal are consulted based on this proprietary shared symmetric key of remote validation, this symmetric key is used for the protection of terminal identity certification and testing result integrality, this is shared and is realized by online middle security side Control Server, forms shared key by mobile terminal and the safety of Control Server and the security negotiation of authentication server and Control Server; Control Server is a security platform containing secure hardware.
3. method according to claim 2, is characterized in that, described symmetric key is formed by following process:
Authentication server is to Control Server application for registration token; Control Server passes through identity and the consulting session key of this token authentication server, remembers that this token is Tc;
Proof procedure is based on public-key mechanism, and realize the negotiation of Control Server and the symmetrical shared key of mobile terminal, its step comprises:
(1) Control Server initiates detection of platform request, detect in request and comprise challenge c1, this challenge is one section of random number, is generated by Control Server this locality, described detection of platform request is one section of request detection message, and this message of terminal recognition also replys this detection request;
(2) the detection of platform request of mobile terminal response limiting server, quote operation as proof by configuration register and send examining report to Control Server, examining report content comprises one section of transportable symmetric key SK that the secure hardware of challenge c2, the identity key AIK of secure hardware and public key certificate AIK certificate, daily record, mobile terminal generates;
(3) Control Server first usage platform private key deciphering acquisition SK, uses SK to decrypt daily record, after checking AIK certificate validity, uses AIK public key verifications configuration register according to daily record after calculating configuration register, and the value of checking c1; Then, comparison log list, to judge terminal security, and generating platform test results report, and report is preserved together with SK, along with next time upgrades terminal judges; If platform base component safety, returns successfully, otherwise returns error reporting;
(4) response that returns according to Control Server of mobile terminal, judges whether the SK upgrading cryptographic storage, synchronous with what realize between Control Server and the SK of mobile terminal; Checking c2 value, if correct, upgrades SK, otherwise, return error message and describe, do not upgrade the SK of cryptographic storage;
(5) Control Server is when mobile terminal is online, and request mobile terminal provides the safety verification of terminal platform, if mobile terminal request upgrades SK, then repeats the step (process of 1) – (4);
Finally, the authentication server to Control Server registration initiates present terminal safety verification at any time, the checking platform of present terminal and applied environment whether safety.
CN201510423837.1A 2015-07-17 2015-07-17 A kind of mobile application access method Active CN104994503B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510423837.1A CN104994503B (en) 2015-07-17 2015-07-17 A kind of mobile application access method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510423837.1A CN104994503B (en) 2015-07-17 2015-07-17 A kind of mobile application access method

Publications (2)

Publication Number Publication Date
CN104994503A true CN104994503A (en) 2015-10-21
CN104994503B CN104994503B (en) 2019-01-01

Family

ID=54306237

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510423837.1A Active CN104994503B (en) 2015-07-17 2015-07-17 A kind of mobile application access method

Country Status (1)

Country Link
CN (1) CN104994503B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108370509A (en) * 2015-12-03 2018-08-03 开利公司 Utilize the Verification System of kinematic parameter
CN110121168A (en) * 2018-02-06 2019-08-13 华为技术有限公司 Safe consultation method and device
CN113128944A (en) * 2019-12-31 2021-07-16 成都鼎桥通信技术有限公司 Multi-system-based security service management method, device and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102438044A (en) * 2011-12-04 2012-05-02 河南科技大学 Digital content trusted usage control method based on cloud computing
EP2002634B1 (en) * 2006-03-27 2014-07-02 Telecom Italia S.p.A. System for enforcing security policies on mobile communications devices
CN104333541A (en) * 2014-10-21 2015-02-04 广东金赋信息科技有限公司 Trusted self-help service system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2002634B1 (en) * 2006-03-27 2014-07-02 Telecom Italia S.p.A. System for enforcing security policies on mobile communications devices
CN102438044A (en) * 2011-12-04 2012-05-02 河南科技大学 Digital content trusted usage control method based on cloud computing
CN104333541A (en) * 2014-10-21 2015-02-04 广东金赋信息科技有限公司 Trusted self-help service system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ZHIYONG ZHANG,ETC: "Implementing Trustworthy Dissemination of Digital Contents by Using a Third Party Attestation Proxy-Enabling Remote Attestation Model", 《2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND INFORMATION TECHNOLOGY》 *
徐梓耀等: "一种保护隐私的高效远程验证机制", 《软件学报》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108370509A (en) * 2015-12-03 2018-08-03 开利公司 Utilize the Verification System of kinematic parameter
CN110121168A (en) * 2018-02-06 2019-08-13 华为技术有限公司 Safe consultation method and device
WO2019153994A1 (en) * 2018-02-06 2019-08-15 华为技术有限公司 Security negotiation method and apparatus
US11765578B2 (en) 2018-02-06 2023-09-19 Huawei Technologies Co., Ltd. Security negotiation method and apparatus
CN113128944A (en) * 2019-12-31 2021-07-16 成都鼎桥通信技术有限公司 Multi-system-based security service management method, device and storage medium
CN113128944B (en) * 2019-12-31 2023-10-17 成都鼎桥通信技术有限公司 Multi-system-based security service management method, device and storage medium

Also Published As

Publication number Publication date
CN104994503B (en) 2019-01-01

Similar Documents

Publication Publication Date Title
KR100463736B1 (en) Method for permitting debugging and testing of software on mobile communication device in a secure environment
US9998438B2 (en) Verifying the security of a remote server
EP2255507B1 (en) A system and method for securely issuing subscription credentials to communication devices
EP2954448B1 (en) Provisioning sensitive data into third party network-enabled devices
JP5860815B2 (en) System and method for enforcing computer policy
CN110299996B (en) Authentication method, equipment and system
CN107040513B (en) Trusted access authentication processing method, user terminal and server
CN104125565A (en) Method for realizing terminal authentication based on OMA DM, terminal and server
US20130290714A1 (en) Method and system for activation
CN103685138A (en) Method and system for authenticating application software of Android platform on mobile internet
US20050114694A1 (en) System and method for authentication of applications in a non-trusted network environment
RU2682430C1 (en) Information registration and authentication method and device
CN110020869B (en) Method, device and system for generating block chain authorization information
CN113312664A (en) User data authorization method and user data authorization system
EP2262165A1 (en) User generated content registering method, apparatus and system
CN104994503A (en) Mobile application access method
Vinh et al. Property‐based token attestation in mobile computing
Nagy et al. Peershare: A system secure distribution of sensitive data among social contacts
Kleberger et al. Protecting vehicles against unauthorised diagnostics sessions using trusted third parties
Fenzl et al. Collaborative Security Patterns for Automotive Electrical/Electronic Architectures
CN114065170A (en) Method and device for acquiring platform identity certificate and server
EP3086583B1 (en) Wireless terminal network locking method and system
Tamrakar et al. On rehoming the electronic id to TEEs
TWI673621B (en) Information registration, authentication method and device
CN117763537A (en) Application authority management and control method and device of terminal system and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20181112

Address after: Room 1240, Building 20, 958 Zhenbei Road, Putuo District, Shanghai 200062

Applicant after: Shanghai Ruishi Network Technology Co., Ltd.

Address before: 610000 No. 1, No. 3 Shen Xian Nan Road, Chengdu high tech Zone, Sichuan, China.

Applicant before: BEIJING BLTSFE INFORMATION TECHNOLOGY CO., LTD.

GR01 Patent grant
GR01 Patent grant