CN105592019A - Method for bidirectional access to application between dual execution environments - Google Patents

Method for bidirectional access to application between dual execution environments Download PDF

Info

Publication number
CN105592019A
CN105592019A CN201410613548.3A CN201410613548A CN105592019A CN 105592019 A CN105592019 A CN 105592019A CN 201410613548 A CN201410613548 A CN 201410613548A CN 105592019 A CN105592019 A CN 105592019A
Authority
CN
China
Prior art keywords
return visit
application
communication module
client application
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410613548.3A
Other languages
Chinese (zh)
Other versions
CN105592019B (en
Inventor
鲁志军
郭伟
周钰
陈成钱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Unionpay Co Ltd
Original Assignee
China Unionpay Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Unionpay Co Ltd filed Critical China Unionpay Co Ltd
Priority to CN201410613548.3A priority Critical patent/CN105592019B/en
Priority to PCT/CN2015/093770 priority patent/WO2016070810A1/en
Publication of CN105592019A publication Critical patent/CN105592019A/en
Application granted granted Critical
Publication of CN105592019B publication Critical patent/CN105592019B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention relates to a method for bidirectional access to an application between dual execution environments. The method comprises the following steps: a first client application emitting an access request for a first security application through a first communication module; the first security application performing first-phase processing on the access request so as to obtain first result data and transmit the first result data to a second communication module; the second communication module, according to the first result data, establishing at least one bidirectional communication channel between the first communication module and the second communication module so as to enable the first security application to re-access each second client application respectively through each bidirectional communication channel; the first security application, based on each re-access result obtained by re-accessing each second client application, performing second-phase processing on the access request so as to generate final result data corresponding to the access request; and the first security application returning the final result data to the first client application. According to the invention, a TEE application can concurrently re-access multiple REE applications in the process when requests from the REE application are processed.

Description

The method of two-way access application between two execution environments
Technical field
The present invention relates to Intelligent mobile equipment technical field, more particularly, relate to the method for two-way access application between a kind of pair of execution environment.
Background technology
Along with progressively " means of payment " change of Intelligent mobile equipment (as smart mobile phone), its existing intelligent operating system cannot meet the security requirement of payment application to its residing running environment. Because system resource is limit, if improve the security of intelligent operating system, be almost certain to make function and user to experience and decrease. Be directed to this, the technical development of current industry based on up-to-date moving chip, proposed two execution environment schemes: on an equipment, operation has two execution environments simultaneously, one of them is the multimedia execution environment of focusing on function, user's experience, and another is the credible execution environment of focusing on safety.
Current, the credible execution environment (Trustedexecutionenvironment is called for short TEE) that GlobalPlatform proposes, as a technology implementation platform of this scheme, is widely applied. On this platform, the function that meets a certain business demand realizes and is divided into two kinds of application by original single application: one is deployed in multimedia execution environment as Client application, also referred to as REE(Richexecutionenvironment) application, another kind is deployed in credible execution environment as Secure Application, applies also referred to as TEE. For realizing the security function of system, REE application in multimedia execution environment need to be accessed the TEE application in credible execution environment, that is, access TEE is provided by the service providing, and corresponding service result is applied by TEE the REE returning in multimedia execution environment again and applied.
As shown in Figure 1, between REE application and TEE application, adopt following mechanism to communicate: REE communication module and TEE communication module operate in respectively under multimedia execution environment and credible execution environment, adopt a kind of request-response mode to realize the data interaction between REE application and TEE application. particularly, when REE application request access TEE application, first request of access is transferred to REE communication module, REE communication module is switched under SOS by the handover mechanism between dual system, send the request to TEE communication module with the form of Request order again, TEE communication module gets after request, determine the TEE application that this request will specifically be mail to and request data is transferred to this TEE application, after request is received in this TEE application, process the data that bear results, call again the Response order of TEE communication module, result data is returned to REE application. in such scheme, before REE application is not returned in Response order, can not initiate new Request order.
There are the following problems for this scheme: in the time that TEE application need to be carried out comparatively complicated processing to the request of access of REE application, due to last to inserting new Request order between Request-Response order, the TEE application again application of the REE from multimedia execution environment is obtained and is carried out the required relevant basic data of complex process, supports this complex process thereby require credible execution environment self to possess more, stronger ability. Such as: need the participation on backstage, maybe need to access intelligent memory card etc. while carrying out complex process in TEE application, TEE application just correspondingly needs credible execution environment can network or be provided with intelligent memory card access interface etc., this can make credible execution environment structure become large, complicate undoubtedly, thereby the difficulty of SOS verifiability is increased, also more system defect can be produced, and then the security of system can be reduced.
Therefore, those skilled in the art expect to obtain a kind of TEE of making and are applied in the method that can pay a return visit REE application in the request process from REE application of processing.
Summary of the invention
The object of the present invention is to provide the method for two-way access application between a kind of pair of execution environment, so that Secure Application is carried out complex process stage by stage to the request of access of Client application.
For achieving the above object, the invention provides a kind of technical scheme as follows:
The method of two-way access application between a kind of pair of execution environment, wherein, two execution environments comprise credible execution environment and multimedia execution environment, multimedia execution environment is deployed with at least one Client application and first communication module, credible execution environment is deployed with at least one Secure Application and second communication module, between Client application and Secure Application, carry out data interaction by first communication module and second communication module, the method comprises the steps: a), the first Client application sends the request of access to the first Secure Application by first communication module; Wherein, the first Client application is arbitrary Client application, and the first Secure Application is the Secure Application that the first Client application need to be accessed; B), the first Secure Application carries out first stage processing to request of access, to obtain the first result data and to be transferred to second communication module; Wherein, the first result data is specified at least one the second Client application, and the second Client application is the Client application that the first Secure Application need to be paid a return visit; C), second communication module is according to the first result data, sets up at least one bi-directional communication channel, so that the first Secure Application is paid a return visit each the second Client application by each bi-directional communication channel respectively between first communication module and second communication module; Wherein, bi-directional communication channel is corresponding one by one with the second Client application; D), the first Secure Application is based on paying a return visit each return visit result of each the second Client application gained, request of access carried out to second stage processing, to generate the final result data corresponding to request of access; E), the first Secure Application is returned to final result data to the first Client application.
Preferably, step c) in, second communication module with and first communication module between request-response mode set up at least one bi-directional communication channel.
Preferably, step c) specifically comprises: c1), second communication module generates at least one return visit request to Client application based on the first result data, and at least one return visit request is sent to first communication module; Wherein, return visit request is corresponding one by one with the second Client application; C2), first communication module receives each return visit request, and selects respectively each the second Client application based on each return visit request; C3), each the second Client application processes corresponding return visit request respectively, to generate at least one return visit result and to transfer to first communication module; Wherein, paying a return visit result asks corresponding one by one with return visit; C4), first communication module generates respectively at least one return visit response based on each return visit result, and each return visit response is sent it back to second communication module; Wherein, return visit response is corresponding one by one with return visit result; C5), second communication module resolves to each return visit response respectively each return visit result and each return visit result is transferred to the first Secure Application.
Preferably, the second Client application is multiple, and the first Secure Application is paid a return visit each the second Client application concurrently.
The method of two-way access application between two execution environments that various embodiments of the present invention provide, TEE is applied in the request process of processing from REE application and can pays a return visit REE application, thereby TEE application can be to carrying out complex process to realize more complete function from the request of access of REE application. Various embodiments of the present invention also can effectively reduce the structure complexity of credible execution environment in ensureing security of system, thereby have reduced the possibility that produces system defect. In addition, various embodiments of the present invention support a certain Secure Application to pay a return visit concurrently multiple Client applications, and each return visit undertaken by bi-directional communication channel independently, and this has significantly improved system works efficiency.
Brief description of the drawings
Fig. 1 illustrate in prior art in multimedia execution environment TEE in REE application and credible execution environment apply between the schematic diagram of data exchange process.
Fig. 2 illustrates the schematic flow sheet of the method for two-way access application between two execution environments that first embodiment of the invention provides.
Fig. 3 illustrates the data exchange process schematic diagram in the method for two-way access application between two execution environments that first embodiment of the invention provides.
Detailed description of the invention
Provide in embodiment in this paper institute, two execution environments comprise credible execution environment and multimedia execution environment, and both run in same intelligent mobile device jointly, for example, and smart mobile phone. Multimedia execution environment is deployed with at least one Client application and first communication module, credible execution environment is deployed with at least one Secure Application and second communication module, each Client application and Secure Application provide respectively at least one service, between Client application and Secure Application, communicate by first communication module and second communication module. It should be noted that, when herein indication " return visit " is illustrated in the first Client application in multimedia execution environment and sends request of access to the first Secure Application in credible execution environment, obtain some Service Source response to this request of access with realization in multimedia execution environment for making the first Secure Application, and in reverse access multimedia execution environment any or appoint multiple Client applications, but not only access the first Client application.
In embodiment provided in this article, arbitrary Client application or Secure Application all can provide at least one service, the function that herein indication " service " is realized for Client application or Secure Application, in other words, arbitrary Client application or Secure Application all can realize at least one function. The first Client application is accessed the first Secure Application and is in essence at least one the service that access the first Secure Application provides.
Indication " the first Client application " is arbitrary Client application in multimedia execution environment herein, and " the first Secure Application " is the Secure Application in execution environment that the first Client application need to be accessed, credible.
As shown in Figures 2 and 3, first embodiment of the invention provides the method for two-way access application between a kind of pair of execution environment, and it comprises the steps:
Step S10, the first Client application send the request of access to the first Secure Application by first communication module;
Particularly, the first Client application produces the request of access 100 to the first Secure Application, and first communication module can encapsulate request of access 100 according to certain data format, for example, be encapsulated as Request order 101, sends to subsequently second communication module; Second communication module is resolved after receiving encapsulation of data (Request order 101), obtains request of access 100 and is transferred to the first Secure Application.
Step S20, the first Secure Application are carried out first stage processing to request of access, to obtain the first result data 102 and to be transferred to second communication module.
Wherein, the first result data 102 is specified at least one second Client application, and this at least one second Client application may comprise the first Client application, also may not comprise. Herein indication the second Client application is the Client application in that the first Secure Application need to be paid a return visit, multimedia execution environment.
The first Secure Application is carried out treatment by stages to the request of access 100 from the first Client application, first stage processes required basic data and can obtain from this request of access 100, and second stage is processed required basic data to need to pay a return visit the second Client application and obtain. First stage processes generation the first result data 102, the first Secure Application this first result data 102 is transferred to second communication module.
It will be appreciated by those skilled in the art that, may there is following situation: the first Secure Application is being carried out after first stage processing request of access, learn that the second Secure Application that needs access to be in together in credible execution environment completes subsequent treatment, and the second Secure Application need to be paid a return visit at least one Client application in multimedia execution environment, thereby now the first result data can be generated by the second Secure Application. This situation is covered by scope of the present invention.
Step S30, second communication module, according to the first result data 102, are set up at least one bi-directional communication channel between first communication module and second communication module, so that the first Secure Application is paid a return visit each the second Client application by each bi-directional communication channel respectively.
In this step, second communication module with and first communication module between request-response mode between second communication module and first communication module, set up at least one bi-directional communication channel, bi-directional communication channel is corresponding one by one with the second Client application, so that the first Secure Application is paid a return visit each the second Client application concurrently by bi-directional communication channel independently respectively.
Under preferable case, step S30 specifically comprises:
Step S301, second communication module generate at least one return visit request 200 to Client application based on the first result data 102, and this at least one return visit request 200 is sent to first communication module.
Wherein, return visit request 200 is corresponding one by one with the second Client application.
Step S302, first communication module receive each return visit request 200, and select respectively each the second Client application based on each return visit request 200.
Step S303, each the second Client application are processed corresponding return visit request 200 respectively, to generate at least one return visit result 201 and to transfer to first communication module.
Each the second Client application is provided respectively by the one or more services that himself provide, to its corresponding, independently process from the return visit request of Secure Application in credible execution environment, and respectively generate pay a return visit result. Wherein, return visit result 201 is corresponding one by one with the request of paying a return visit 200.
Step S304, first communication module generate respectively at least one return visit response 202 based on each return visit result 201, and each return visit response 202 is sent it back to second communication module.
Wherein, return visit response 202 is corresponding one by one with return visit result 201. First communication module will encapsulate to form corresponding return visit response 202 to each return visit result 201.
Pay a return visit request 200, pay a return visit response 202 respectively with the first Client application to the request of access 100 of the first Secure Application field that takes on a different character. Wherein, pay a return visit response 202 and corresponding return visit result 201 can be used as to a feature field.
For example, request of access 100 can have following feature field:
Return visit request 200, return visit response 202 can have following feature field, for example:
Wherein, for example, " TEE information ", " TEE/REE information " feature field are recorded the status information of multimedia execution environment or credible execution environment; " the first Secure Application information ", feature field record request of access 100 for object, " the first Secure Application/the second client application message " feature field record pay a return visit response/pay a return visit request for object; " order " feature field can indicate the first Client application need to access which service that the first Secure Application provides, or the first Secure Application need to be paid a return visit which service that the second Client application provides; " parameter " feature field can comprise IP address, backstage, port numbers, with the information such as the connection status of background server; " status information " feature field can be distinguished the request of return visit 200 and pay a return visit response 202 with different default values.
Step S305, second communication module resolve to each return visit response 202 respectively each return visit result 201 and each return visit result 201 are transferred to the first Secure Application.
By step S30, with the request of paying a return visit 200 with pay a return visit response 202 form (, request-response mode), can between second communication module and first communication module, set up at least one bi-directional communication channel, bi-directional communication channel is corresponding one by one, equally also corresponding one by one with the second Client application with the request of paying a return visit 200. Each bi-directional communication channel is all special channel, only supplies the first Secure Application and carries out data interaction corresponding to the second Client application of this bi-directional communication channel. In the situation that the first Secure Application need to be paid a return visit multiple the second Client application, each bi-directional communication channel can use concurrently, that is, the first Secure Application can be paid a return visit each the second Client application concurrently, thereby significantly improves the operating efficiency of system.
After step S30 finishes, second communication module has obtained each return visit result 201.
Step S40, the each return visit result 201 of the first Secure Application based on paying a return visit each the second Client application gained, carry out second stage processing to request of access, to generate the final result data 103 corresponding to request of access 100.
Particularly, each return visit result 201 that the first Secure Application is paid a return visit each the second Client application gained is returned to the first Secure Application by corresponding bi-directional communication channel respectively. The first Secure Application is paid a return visit result 201 based on these, and the request of access 100 from the first Client application is carried out to second stage processing, to generate final result data 103, as the final response to this request of access 100.
Those skilled in the art understand, second stage is processed the final result data that likely can't generate corresponding to request of access,, the first Secure Application need to the Client application from multimedia execution environment be obtained some basic datas again and is carried out phase III processing, processes even more frequently, to form the final response to this request of access, thereby after second stage is processed, the first Secure Application still may be paid a return visit again to the Client application in multimedia execution environment. This situation is covered by scope of the present invention.
Step S50, the first Secure Application are returned to final result data to the first Client application.
Particularly, in this step, the first Secure Application is returned to final result data 103 via second communication module, first communication module to the first Client application successively. Wherein, second communication module encapsulates final result data, for example, be encapsulated as Response order 104, first communication module to encapsulation of data (Response order 104) resolve and obtain final result data 103.
According to the preferred embodiment of above-described embodiment, first communication module can comprise protocol process module and service management module, protocol process module is carried out request of access, is paid a return visit encapsulation and/or the parsing of asking, paying a return visit result, and service management module is registered each Client application in multimedia execution environment, foundation (or assisting to set up) bi-directional communication channel and selected each the second Client application according to the first result data.
Further, the Client application in multimedia execution environment provides any in serving with external device communication service, safety barrier access services, data storage service and resource operation or appoints multiple.
Wherein: provide with external device communication service the ability that is connected external equipment, comprise the needed Socket abilities in connection backstage such as using wifi, GPRS or use the equipment such as bluetooth, NFC to visit the ability of other-end.
Safety barrier access services provides the ability of various safety barriers on access intelligent terminal, comprises SD card, intelligent SD card, SIM, eSE etc.
Data storage service provides the ability of local datastore, can file system, the mode such as the read-write interface of specific implementation provides the provisional and permanent storage to data, and the security storage of data protection can be provided as required.
Resource operation service provides the mode of other resources of operative intelligence equipment, as access camera, GPS module etc.
The method of two-way access application between two execution environments that the above embodiment of the present invention provides, TEE is applied in the request process of processing from REE application and can pays a return visit REE application, thereby TEE application can be to carrying out complex process to realize more complete function from the request of access of REE application.
Based on embodiments of the invention, can in ensureing security of system, effectively reduce the structure complexity of credible execution environment, thereby reduce the possibility that produces system defect.
In addition,, in the situation that a certain Secure Application need to be paid a return visit multiple Client application, follow-up return visit needn't wait last time to pay a return visit and finish just to start, but can carry out concurrently multiple return visit processes. Thereby the present invention is by supporting a certain Secure Application to pay a return visit concurrently multiple Client applications with multiple separate bi-directional communication channels, this has significantly improved system works efficiency.
Above-mentioned explanation is only directed to the preferred embodiments of the present invention, and does not lie in and limit the scope of the invention. Based on thought of the present invention, those skilled in the art can make various deformation designs, and do not depart from thought of the present invention and subsidiary claim.

Claims (10)

1. the method for two-way access application between two execution environments, wherein, described pair of execution environment comprises credible execution environment and multimedia execution environment, described multimedia execution environment is deployed with at least one Client application and first communication module, described credible execution environment is deployed with at least one Secure Application and second communication module, between described Client application and Secure Application, carry out data interaction by described first communication module and second communication module, described method comprises the steps:
A), the first Client application sends the request of access to the first Secure Application by described first communication module; Wherein, described the first Client application is arbitrary described Client application, and described the first Secure Application is the described Secure Application that described the first Client application need to be accessed;
B), described the first Secure Application carries out first stage processing to described request of access, to obtain the first result data and to be transferred to described second communication module; Wherein, described the first result data is specified at least one the second Client application, and described the second Client application is the described Client application that described the first Secure Application need to be paid a return visit;
C), described second communication module is according to described the first result data, between described first communication module and described second communication module, set up at least one bi-directional communication channel, so that described the first Secure Application is paid a return visit each described the second Client application by each described bi-directional communication channel respectively; Wherein, described bi-directional communication channel is corresponding one by one with described the second Client application;
D), described the first Secure Application is based on paying a return visit each return visit result of each described the second Client application gained, described request of access carried out to second stage processing, to generate the final result data corresponding to described request of access;
E), described the first Secure Application is returned to described final result data to described the first Client application.
2. method according to claim 1, is characterized in that, described step c) in, described second communication module with and described first communication module between request-response mode set up described at least one bi-directional communication channel.
3. method according to claim 2, is characterized in that, described step c) specifically comprises:
C1), described second communication module generates at least one return visit request to described Client application based on described the first result data, and described at least one return visit request is sent to described first communication module; Wherein, described return visit request is corresponding one by one with described the second Client application;
C2), described first communication module receives each described return visit request, and selects respectively each described the second Client application based on each described return visit request;
C3), each described the second Client application processes corresponding described return visit request respectively, to generate at least one described return visit result and to transfer to described first communication module; Wherein, described return visit result is corresponding one by one with described return visit request;
C4), described first communication module generates respectively at least one return visit response based on each described return visit result, and each described return visit response is sent it back to described second communication module; Wherein, described return visit response is corresponding one by one with described return visit result;
C5), described second communication module resolves to each described return visit response respectively each described return visit result and each described return visit result is transferred to described the first Secure Application.
4. method according to claim 3, it is characterized in that, described first communication module comprises protocol process module and service management module, described protocol process module is carried out encapsulation and/or the parsing to described request of access, described return visit request, described return visit result, and described service management module is registered each described Client application, sets up described bi-directional communication channel and selected each described the second Client application according to described the first result data.
5. method according to claim 3, is characterized in that, field that described return visit request, described return visit respond and described request of access takes on a different character.
6. method according to claim 3, is characterized in that, described return visit responds using the described return visit result of correspondence as a feature field.
7. method according to claim 1, is characterized in that, described the second Client application is multiple, and described the first Secure Application is paid a return visit each described the second Client application concurrently.
8. method according to claim 1, is characterized in that, described Client application provides any in serving with external device communication service, safety barrier access services, data storage service and resource operation or appoints multiple.
9. according to the method described in any one in claim 1 to 8, it is characterized in that, described credible execution environment and multimedia execution environment run in same intelligent mobile device jointly.
10. method according to claim 9, is characterized in that, described intelligent mobile device is smart mobile phone.
CN201410613548.3A 2014-11-05 2014-11-05 The method that two-way access is applied between dual execution environment Active CN105592019B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410613548.3A CN105592019B (en) 2014-11-05 2014-11-05 The method that two-way access is applied between dual execution environment
PCT/CN2015/093770 WO2016070810A1 (en) 2014-11-05 2015-11-04 Method for a dual access application between two execution environments

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410613548.3A CN105592019B (en) 2014-11-05 2014-11-05 The method that two-way access is applied between dual execution environment

Publications (2)

Publication Number Publication Date
CN105592019A true CN105592019A (en) 2016-05-18
CN105592019B CN105592019B (en) 2018-12-25

Family

ID=55908597

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410613548.3A Active CN105592019B (en) 2014-11-05 2014-11-05 The method that two-way access is applied between dual execution environment

Country Status (2)

Country Link
CN (1) CN105592019B (en)
WO (1) WO2016070810A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106547633A (en) * 2016-10-19 2017-03-29 沈阳微可信科技有限公司 Multi-channel communication systems and electronic equipment
CN108282764A (en) * 2017-01-03 2018-07-13 中国移动通信有限公司研究院 A kind of information interacting method and terminal device
CN110383240A (en) * 2017-03-20 2019-10-25 华为技术有限公司 The method and apparatus of safe computing resource for containerization
WO2020119258A1 (en) * 2018-12-12 2020-06-18 阿里巴巴集团控股有限公司 Data processing method and device
CN111357255A (en) * 2018-04-27 2020-06-30 华为技术有限公司 Building a trusted application common to multiple applications
CN111712815A (en) * 2018-08-14 2020-09-25 华为技术有限公司 Artificial intelligence AI processing method and AI processing device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120331550A1 (en) * 2011-06-24 2012-12-27 Microsoft Corporation Trusted language runtime on a mobile platform
CN103745155A (en) * 2014-01-03 2014-04-23 东信和平科技股份有限公司 Credible Key and safe operation method thereof
CN104077533A (en) * 2014-07-17 2014-10-01 北京握奇智能科技有限公司 Sensitive data operating method and device
US20140317686A1 (en) * 2013-04-22 2014-10-23 Oracle International Corporation System with a trusted execution environment component executed on a secure element

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104125226B (en) * 2014-07-28 2018-01-26 北京握奇智能科技有限公司 A kind of method, apparatus and system for locking and unlocking application

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120331550A1 (en) * 2011-06-24 2012-12-27 Microsoft Corporation Trusted language runtime on a mobile platform
US20140317686A1 (en) * 2013-04-22 2014-10-23 Oracle International Corporation System with a trusted execution environment component executed on a secure element
CN103745155A (en) * 2014-01-03 2014-04-23 东信和平科技股份有限公司 Credible Key and safe operation method thereof
CN104077533A (en) * 2014-07-17 2014-10-01 北京握奇智能科技有限公司 Sensitive data operating method and device

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106547633A (en) * 2016-10-19 2017-03-29 沈阳微可信科技有限公司 Multi-channel communication systems and electronic equipment
WO2018072714A1 (en) * 2016-10-19 2018-04-26 北京豆荚科技有限公司 Multichannel communication system and electronic device
CN106547633B (en) * 2016-10-19 2019-12-31 沈阳微可信科技有限公司 Multi-channel communication system and electronic device
CN108282764A (en) * 2017-01-03 2018-07-13 中国移动通信有限公司研究院 A kind of information interacting method and terminal device
CN110383240A (en) * 2017-03-20 2019-10-25 华为技术有限公司 The method and apparatus of safe computing resource for containerization
CN111357255A (en) * 2018-04-27 2020-06-30 华为技术有限公司 Building a trusted application common to multiple applications
CN111357255B (en) * 2018-04-27 2021-11-19 华为技术有限公司 Building a trusted application common to multiple applications
US11734416B2 (en) 2018-04-27 2023-08-22 Huawei Technologies Co., Ltd. Construct general trusted application for a plurality of applications
CN111712815A (en) * 2018-08-14 2020-09-25 华为技术有限公司 Artificial intelligence AI processing method and AI processing device
US11954204B2 (en) 2018-08-14 2024-04-09 Huawei Technologies Co., Ltd. Artificial intelligence AI processing method and AI processing apparatus
WO2020119258A1 (en) * 2018-12-12 2020-06-18 阿里巴巴集团控股有限公司 Data processing method and device
US11038673B2 (en) 2018-12-12 2021-06-15 Advanced New Technologies Co., Ltd. Data processing method and apparatus

Also Published As

Publication number Publication date
WO2016070810A1 (en) 2016-05-12
CN105592019B (en) 2018-12-25

Similar Documents

Publication Publication Date Title
US11039299B2 (en) ESIM card activation method, wireless router, and user terminal
CN105592019A (en) Method for bidirectional access to application between dual execution environments
CN105659634B (en) For the method close to service and the combined registering and cancellation of Internet of Things service
US20180310157A1 (en) Near field communication method and mobile terminal
US20180041893A1 (en) Method and system of multi-terminal mapping to a virtual sim card
US10624022B2 (en) Method for establishing wireless LAN communication connection and electronic device therefor
US10945130B2 (en) Method for establishing wireless connection for application of user equipment
US20190342738A1 (en) Method and Device for Sharing File Between Different Terminals
CN104756080A (en) Augmenting capabilities of a host device
KR102141854B1 (en) Apparatus and method for controlling push message transmission
WO2016076075A1 (en) Information provision system, information provision server, control program, control method, display device, and content provision server
CN106408096A (en) Data processing method in online ticketing system and online ticketing system
KR102045662B1 (en) System and method for managing logical channels for accessing several virtual profiles within a secure element
US9609681B2 (en) Method and apparatus for discovering target in device-to-device direct communication
CN110750206B (en) Data processing method, device and system
CN105530714A (en) MIFI communication service system and MIFI and communication method thereof
JP5931224B2 (en) Data access method and apparatus
CN105451367A (en) Wireless network connection method, device and system
CN106231538A (en) A kind of method and apparatus of OneM2M framework apparatus bound
CN106845974B (en) Method and device for realizing point-to-point communication of near field communication
CN101951585A (en) User identity authentication method, system and mobile communication terminal
CN115426139A (en) Access control method based on SIM card information and communication device
EP3203774A1 (en) Assignment of network resource to a device
KR101552568B1 (en) System for multi-channel certificating using automatic selection of mode, method of multi-channel certificating and apparatus for the same
CN112383617A (en) Method, device, terminal equipment and medium for long connection

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant