CN106102054A - A kind of method and communication system that safe unit is carried out safety management - Google Patents

A kind of method and communication system that safe unit is carried out safety management Download PDF

Info

Publication number
CN106102054A
CN106102054A CN201610359171.2A CN201610359171A CN106102054A CN 106102054 A CN106102054 A CN 106102054A CN 201610359171 A CN201610359171 A CN 201610359171A CN 106102054 A CN106102054 A CN 106102054A
Authority
CN
China
Prior art keywords
management
trusted application
trusted
application
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610359171.2A
Other languages
Chinese (zh)
Inventor
姜波
韩医徽
方琍
李川川
王巨
张海洋
章勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Snowball Technology Co Ltd
Original Assignee
Shenzhen Snowball Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Snowball Technology Co Ltd filed Critical Shenzhen Snowball Technology Co Ltd
Priority to CN201610359171.2A priority Critical patent/CN106102054A/en
Publication of CN106102054A publication Critical patent/CN106102054A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Abstract

The present invention relates to a kind of method that safe unit is carried out safety management and the communication system utilizing the method to realize.The method comprises the steps: to load trusted application in terminal unit;Manage in described trusted application and described trusted service and set up escape way between server;Described trusted service management server issues management key to described trusted application by described escape way, by the described trusted application described management key of storage;Described trusted service management server issues management instruction by described escape way and arrives described trusted application, described trusted application store described management instruction;And described trusted application carries out Content Management based on management key and management instruction to described safe unit.In accordance with the invention it is possible on the basis of assuring data security, reduce networking number of times, improve the execution efficiency of task.

Description

A kind of method and communication system that safe unit is carried out safety management
Technical field
The present invention relates to mobile communication technology, a kind of method that safe unit is carried out safety management and Communication system.
Background technology
Along with the development of mobile communication technology, can be with integrated increasing application in terminal.Should in order to realize these By, terminal by some sensitive informations, such as (i.e. SE, Security during user profile etc. are arranged on the safe unit of terminal Element), when needs use sensitive information, the user profile in this safe unit of the accessible with application software of terminal.In safety The user profile arranged in unit such as includes personal information and the accounts information etc. of user, when accessing safe unit, and terminal On any one application software can pass through the application programming in terminal operating system (OS, Operation System) Interface (API, Application Programming Interface) accesses safe unit.In this case, safety is single Unit probably attacked by malicious application software, cause in safe unit arrange user profile disappearance, distort and/or Revealing, cause the user is lost.In order to ensure user information safety set in safe unit, the access to safe unit Need to carry out security monitoring.
At present, the mode that safe unit accesses employing security monitoring is: employing trusted service management (TSM, Trusted Service Manager) server and terminal unit combine, pacify the application software accessing safe unit Full monitoring.
Specifically, as the method for existing this terminal unit safe unit Content Management, the safety shown in Fig. 1 is enumerated The communication system of location contents management.As it is shown in figure 1, arrange TSM server (i.e. trusted service management server) 10, pass through TSM server 10 and the two-way authentication of the safe unit (i.e. SE) 21 in terminal unit 20, set up escape way 30, utilize safety Passage 30 implements the Content Management of safe unit, and these Content Management include such as, and application is downloaded, application is installed, auxiliary security Territory creates, application locking, application unblock and application deletion etc..
Have an advantage in that, trusted service management server 10 pass through TSM Agent 22 and the safety of terminal unit 20 Unit (i.e. SE) 21 directly sets up escape way, and its safety is higher.But the shortcoming of there is also, i.e. need real-time with credible Service manager server 10 communicates, and terminal unit its error probability the most outstanding for network environment can be higher, Mourn in silence and when processing, be also possible to cause the situation of flow of escaping, will be unable to carry out in the case of terminal unit does not has network simultaneously Content Management, cannot accomplish smoothness for slightly bigger the applying of some data volumes on Consumer's Experience.
Summary of the invention
In view of the above problems, it is desirable to provide one has only to carry out half on the basis of assuring data security Networking can be realized as safe unit carrying out the method for managing security of the safe unit of effective Content Management and utilizing the party The communication system that method realizes.
The method that safe unit is carried out safety management of the present invention, it is characterised in that comprise the steps:
Trusted application loads and initialization step, loads trusted application in terminal unit;
Escape way establishment step, manages in described trusted application and described trusted service and sets up escape way between server;
Management delivering key storing step, described trusted service management server issues management key by described escape way and arrives Described trusted application, is stored described management key by described trusted application;
Management instruction issues step, and described trusted service management server issues management instruction to described by described escape way Trusted application, is stored described management instruction by described trusted application;And
Content Management operating procedure, described trusted application carries out content based on management key and management instruction to described safe unit Management.
Preferably, load and in initialization step in described trusted application, by trusted application integrated in terminal unit Or download online trusted application realizes the loading of trusted application,
Wherein, described trusted application comprises the server certificate that trusted service management server is signed and issued.
Preferably, in described escape way establishment step, manage service in described trusted application and described trusted service Between device, the public private key pair comprised in described server certificate is utilized to set up escape way or directly set up SSL connection.
Preferably, load and in initialization step in trusted application so that trusted application is in TEE environment.
Preferably, described Content Management includes: application is downloaded, applies installation, the establishment of auxiliary security territory, application locking, answered With unlocking and application deletion.
The communication system of the present invention, this communication system possesses trusted service management server and terminal unit, and its feature exists In,
Described terminal unit possesses:
Safe unit;And
Trusted application, for setting up escape way between described trusted service management server and described terminal unit, receives And store the data come from the management server transmission of described trusted service and based on described data, described safe unit carried out Content Management.
Preferably, described trusted application is integrated in terminal unit or by download online to terminal unit.
Preferably, described trusted application possesses storage module, and described storage module is used for storing the management of described trusted service Server certificate that server is signed and issued and the management key issued from described trusted service management server and management instruction.
Preferably, manage between server in described trusted application and described trusted service, utilize described server certificate In the public private key pair that comprises set up escape way or directly set up SSL and connect.
Preferably, during described trusted application is arranged on TEE environment.
As it has been described above, the method that safe unit is carried out safety management of the present invention and the communication utilizing the method to realize System, on the basis of the safety ensureing data transmission, it is possible to effectively solve to carry out during safe unit Content Management necessary real Time networking problem, user only need connect primary network can not limit number of times Content Management operation, Thereby, it is possible to the network service reduced between trusted servers management server, meanwhile, improve the success rate of task and carry High execution efficiency.
Accompanying drawing explanation
Fig. 1 illustrates the communication system that safe unit carries out Content Management of the prior art.
Fig. 2 illustrates the communication system that safe unit carries out Content Management of the present invention.
Fig. 3 is the flow chart of the method that safe unit carries out Content Management of the present invention.
Detailed description of the invention
Be described below be the present invention multiple embodiments in some, it is desirable to provide the basic understanding to the present invention.And It is not intended to confirm the crucial of the present invention or conclusive key element or limit scope of the claimed.
It is an object of the invention to solve to carry out the problem of necessary real-time interconnection, energy of the present invention during safe unit Content Management Reaching user on the basis of ensureing safety only needs connection primary network can not limit the content of number of times Management operation, it is possible to reduce the network service between trusted servers management server, in addition to necessary state synchronized Particular content management instruction is issued without trusted service management server.
Fig. 2 illustrates the communication system that safe unit carries out Content Management of the present invention.
As in figure 2 it is shown, the communication system of the present invention possesses trusted service management server 100 (is shown as TSM clothes in fig. 2 Business device) and terminal unit 200.
Wherein, terminal unit 200 possesses: safe unit 210, trusted application 220 and TSM Agent 230.Terminal sets Standby 200 such as have smart mobile phone, intelligent watch, panel computer etc., and its CPU should comprise TEE environment.At safe unit 210 In can store the safety information of terminal unit and user, such as, the personal information of user and accounts information etc..
In the present invention, trusted application 220 can be to be previously integrated in terminal unit, it is also possible to is to pass through download online In terminal unit 200.Trusted application 220 is for setting up peace between trusted service management server 100 and terminal unit 200 Full tunnel 300, and trusted application 220 sends the data come also for receiving and storing from trusted service management server 100 And based on data, safe unit 210 is carried out Content Management.Meanwhile, during trusted application 220 is arranged on TEE environment.TEE (Trusted Execution Environment, credible execution environment) refers to an independent safety in terminal unit Running environment, this environment and normal application runtime environment REE(Rich Execution Environment) logic isolation, only Can be interacted by the API authorized.TEE can support the security feature such as clean boot, safety applications management.Due to TEE ring Border is security context, and therefore, the storage that the trusted application 220 in TEE environment is carried out may be considered safe.
Specifically, trusted application 220 possesses storage module, stores module and is used for storing trusted service management server 100 The server certificate signed and issued and the management key and the management that issue from trusted service management server 100 instruct.Answer credible Manage between server 100 with 220 and trusted service, utilize the public private key pair comprised in described server certificate to set up safety logical Road or directly set up SSL connect.Wherein, SSL(Secure Sockets Layer, SSL) it is to carry for network service For safety and a kind of security protocol of data integrity, in order to be guaranteed in the safety of data transmission on networks, it utilizes data Encryption technology, it can be ensured that data are difficult in the transmitting procedure on network be intercepted and eavesdrop, and SSL has been widely used end Authentication between end and server and encrypted data transmission.
So, the escape way 300 between server 100, trusted service are managed by trusted application 220 and trusted service Management server 100 can issue SE management key and management instruction, based on the SE management key issued and management instruction, credible Application 220 can carry out Content Management to safe unit 210, and the instruction of its management may come from trusted service management server 100, it is also possible to come from the TSM Agent 230 of terminal unit 200.
So, trusted application 220 is by receiving the pipe that trusted service management server 100 or TSM Agent 230 is sent Reason instruction, uses SE management key to carry out safe unit 210 and carries out Content Management, and these Content Management include but not limited to application Downloading, application is installed, and auxiliary security territory creates, application locking, and application unlocks, and application is deleted.
Then, the communication system for the present invention realizes carrying out safe unit the method for Content Management and illustrates.
Fig. 3 is the flow chart of the method that safe unit carries out Content Management of the present invention.As it is shown on figure 3, the present invention The method that safe unit carries out safety management comprises the steps:
Trusted application loads and initialization step S100: load trusted application 220 in terminal unit 200;
Escape way establishment step S200: manage in trusted application 220 and trusted service and set up escape way between server 100 300;
Management delivering key storing step S300: trusted service management server 100 issues management key by escape way 300 To trusted application 220, and stored this management key by trusted application 220;
Management instruction issues step S400: trusted service management server 100 issues management instruction to can by escape way 300 Letter application 220, and stored described management instruction by trusted application 220;And
Content Management operating procedure S500: in safe unit 210 is carried out by trusted application 220 based on management key and management instruction Hold management.
Then, these steps are specifically described.
Load and in initialization step S100 in trusted application, by trusted application integrated in terminal unit 200, such as It is integrated in the ROM of terminal unit 200, or download online is installed and updated trusted application, it is possible to realize trusted application Load.And, it is necessary to trusted application 220 is arranged in TEE environment, owing to TEE environment is security context, therefore, TEE ring The storage that trusted application 220 in border is carried out is considered as safe.
Wherein, for the initialization of trusted application 220 so that comprise trusted service management service in trusted application 220 The server certificate that device 100 is signed and issued, this server certificate include producing a public private key pair (its algorithm include but not limited to RSA, The asymmetric arithmetics such as ECC), for setting up escape way with trusted service management server 100 in subsequent step.
In escape way establishment step S200, manage between server 100 in trusted application 220 and trusted service, profit Escape way 300 is set up specifically with the public private key pair comprised in server certificate, such as public including but not limited to using the other side Key is directly encrypted and is thus set up escape way, such as, can also directly set up SSL and connect.
In management delivering key storing step S300, trusted service management server 100 is issued by escape way 300 Management key, to trusted application 220, is stored this management key by trusted application 220, owing to trusted application 220 is in TEE environment In, therefore, its storage carried out is safe.
Issuing in step S400 in management instruction, trusted service management server 100 issues management by escape way 300 Instruction, to trusted application 220, is stored described management instruction by trusted application 220, owing to trusted application 220 is in TEE environment, Therefore, its storage carried out is safe.Furthermore in the present invention it is possible to issue disposable instruction to arrive trusted application 220, Command content is including but not limited to timed task, delayed tasks, preprocessing tasks etc..
In Content Management operating procedure S500, trusted application 220 instructs safe unit based on management key and management 210 carry out Content Management, such as by trusted application 220 organization instruction, and can be in the internal preset predetermined operation of trusted application 220 Instruction code, according to trusted service management server 100 send come instruction, choose from instruction code and assemble calculate suitable Close the instruction of safe unit, carry out the Content Management of safe unit.These Content Management include: application download, application install, auxiliary Help security domain to create, application locking, application unblock and application are deleted.And, this step can be realized as without networking, this Sample, needs time consuming operation (such as download and install application, individualize) for some, owing to can reduce networking time Number, saving networking time, it is possible to reduce and perform failure because of what network quality difference caused, improve the success rate of task, improve meanwhile Execution efficiency.
It is to say, in the present invention, user only needs to connect primary network and (includes step: escape way establishment step S200, management delivering key storing step S300 and management instruction issue step S400) connection can be not required on terminal unit 200 Entoilage does not limit Content Management operation (i.e. Content Management operating procedure S500) of number of times, thereby, it is possible to reduce terminal unit Network service between 200 and trusted servers management server 100, manages without trusted service in addition to necessary state synchronized Server 100 issues particular content management instruction.Thus, the present invention is capable of on the basis of assuring data security only needing Carry out half networking and can be realized as safe unit is carried out the method for managing security of the safe unit of effective Content Management.
As it has been described above, the method that safe unit is carried out safety management of the present invention and the communication utilizing the method to realize System, on the basis of the safety ensureing data transmission, it is possible to effectively solve to carry out during safe unit Content Management necessary real Time networking problem, user only need connect primary network can not limit number of times Content Management operation, Thereby, it is possible to the network service reduced between trusted servers management server, meanwhile, improve the success rate of task and carry High execution efficiency.
Example above primarily illustrates method and the communication system that safe unit carries out safety management of the present invention.To the greatest extent The detailed description of the invention of the some of them present invention is only described by pipe, but those of ordinary skill in the art it is to be appreciated that The present invention can be implementing with other forms many with in scope without departing from its spirit.Therefore, the example shown and enforcement Mode is considered illustrative and not restrictive, without departing from the spirit of the present invention as defined in appended claims and model In the case of enclosing, the present invention may contain various amendments and replacement.

Claims (10)

1. the method that safe unit is carried out safety management, it is characterised in that comprise the steps:
Trusted application loads and initialization step, loads trusted application in terminal unit;
Escape way establishment step, manages in described trusted application and described trusted service and sets up escape way between server;
Management delivering key storing step, described trusted service management server issues management key by described escape way and arrives Described trusted application, is stored described management key by described trusted application;
Management instruction issues step, and described trusted service management server issues management instruction to described by described escape way Trusted application, is stored described management instruction by described trusted application;And
Content Management operating procedure, described trusted application carries out content based on management key and management instruction to described safe unit Management.
2. the method as claimed in claim 1 safe unit being carried out safety management, it is characterised in that
Load and in initialization step in described trusted application, by trusted application integrated in terminal unit or download online Trusted application realizes the loading of trusted application,
Wherein, described trusted application comprises the server certificate that trusted service management server is signed and issued.
3. the method as claimed in claim 2 safe unit being carried out safety management, it is characterised in that
In described escape way establishment step, manage between server in described trusted application and described trusted service, utilize The public private key pair comprised in described server certificate is set up escape way or directly sets up SSL connection.
4. the method as claimed in claim 2 safe unit being carried out safety management, it is characterised in that
Load and in initialization step in trusted application so that trusted application is in TEE environment.
5. the method that safe unit is carried out safety management as described in Claims 1 to 4 any one, it is characterised in that
Described Content Management includes: application is downloaded, applies installation, the establishment of auxiliary security territory, application locking, applied unblock and answer With deletion.
6. a communication system, this communication system possesses trusted service management server and terminal unit, it is characterised in that
Described terminal unit possesses:
Safe unit;And
Trusted application, for setting up escape way between described trusted service management server and described terminal unit, receives And store the data come from the management server transmission of described trusted service and based on described data, described safe unit carried out Content Management.
7. communication system as claimed in claim 6, it is characterised in that
Described trusted application is integrated in terminal unit or by download online to terminal unit.
8. communication system as claimed in claim 7, it is characterised in that
Described trusted application possesses storage module, and described storage module is for storing what described trusted service management server was signed and issued Server certificate and the management key and the management that issue from described trusted service management server instruct.
9. communication system as claimed in claim 8, it is characterised in that
Manage between server at described trusted application and described trusted service, utilize comprise in described server certificate public and private Key is to setting up escape way or directly setting up SSL connection.
10. the communication system as described in claim 6~9 any one, it is characterised in that
Described trusted application is arranged in TEE environment.
CN201610359171.2A 2016-05-27 2016-05-27 A kind of method and communication system that safe unit is carried out safety management Pending CN106102054A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610359171.2A CN106102054A (en) 2016-05-27 2016-05-27 A kind of method and communication system that safe unit is carried out safety management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610359171.2A CN106102054A (en) 2016-05-27 2016-05-27 A kind of method and communication system that safe unit is carried out safety management

Publications (1)

Publication Number Publication Date
CN106102054A true CN106102054A (en) 2016-11-09

Family

ID=57230852

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610359171.2A Pending CN106102054A (en) 2016-05-27 2016-05-27 A kind of method and communication system that safe unit is carried out safety management

Country Status (1)

Country Link
CN (1) CN106102054A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107682159A (en) * 2017-10-12 2018-02-09 北京握奇智能科技有限公司 The trusted application management method and trusted application management system of a kind of intelligent terminal
CN108200078A (en) * 2018-01-18 2018-06-22 中国建设银行股份有限公司 The download and installation method and terminal device of signature authentication tool
CN108282467A (en) * 2017-12-29 2018-07-13 北京握奇智能科技有限公司 The application process of digital certificate, system
CN108282466A (en) * 2017-12-29 2018-07-13 北京握奇智能科技有限公司 Method, system for providing digital certificate functionality in TEE
CN108985756A (en) * 2017-06-05 2018-12-11 华为技术有限公司 SE application processing method, user terminal and server
CN109145653A (en) * 2018-08-01 2019-01-04 Oppo广东移动通信有限公司 Data processing method and device, electronic equipment, computer readable storage medium
CN109347629A (en) * 2018-10-12 2019-02-15 阿里巴巴集团控股有限公司 Key transmission method and system based on shared security application, storage medium, equipment
CN109922056A (en) * 2019-02-26 2019-06-21 阿里巴巴集团控股有限公司 Data safety processing method and its terminal, server
CN111034118A (en) * 2017-09-18 2020-04-17 华为技术有限公司 Secure delegation credentials in third party networks
CN111414605A (en) * 2020-03-17 2020-07-14 Oppo(重庆)智能科技有限公司 Unlocking method and device of embedded security unit, electronic equipment and storage medium
CN112134777A (en) * 2020-09-09 2020-12-25 中国科学院信息工程研究所 Trusted IPSec module and VPN tunnel construction method
CN112560116A (en) * 2020-12-04 2021-03-26 Oppo(重庆)智能科技有限公司 Function control method, device and storage medium
WO2022170857A1 (en) * 2021-02-09 2022-08-18 深圳市汇顶科技股份有限公司 Secure transmission method and apparatus for signaling, and server and se chip
CN115604715A (en) * 2022-12-01 2023-01-13 北京紫光青藤微系统有限公司(Cn) NFC function control method based on security channel and mobile terminal device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103793815A (en) * 2014-01-23 2014-05-14 武汉天喻信息产业股份有限公司 Mobile intelligent terminal acquirer system and method suitable for bank cards and business cards
CN103856485A (en) * 2014-02-14 2014-06-11 武汉天喻信息产业股份有限公司 System and method for initializing safety indicator of credible user interface
CN104010044A (en) * 2014-06-12 2014-08-27 北京握奇数据系统有限公司 Application limitation installing method, manager and terminal based on trusted execution environment technology
CN104125216A (en) * 2014-06-30 2014-10-29 华为技术有限公司 Method, system and terminal capable of improving safety of trusted execution environment
CN104125226A (en) * 2014-07-28 2014-10-29 北京握奇智能科技有限公司 Locking and unlocking application method, device and system
CN104933355A (en) * 2015-06-18 2015-09-23 上海斐讯数据通信技术有限公司 Installation checkout system and checkout method thereof of trustable application of mobile terminal
CN105101169A (en) * 2014-05-13 2015-11-25 中国移动通信集团公司 Method and apparatus of information processing by trusted execution environment, terminal and SIM card

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103793815A (en) * 2014-01-23 2014-05-14 武汉天喻信息产业股份有限公司 Mobile intelligent terminal acquirer system and method suitable for bank cards and business cards
CN103856485A (en) * 2014-02-14 2014-06-11 武汉天喻信息产业股份有限公司 System and method for initializing safety indicator of credible user interface
CN105101169A (en) * 2014-05-13 2015-11-25 中国移动通信集团公司 Method and apparatus of information processing by trusted execution environment, terminal and SIM card
CN104010044A (en) * 2014-06-12 2014-08-27 北京握奇数据系统有限公司 Application limitation installing method, manager and terminal based on trusted execution environment technology
CN104125216A (en) * 2014-06-30 2014-10-29 华为技术有限公司 Method, system and terminal capable of improving safety of trusted execution environment
CN104125226A (en) * 2014-07-28 2014-10-29 北京握奇智能科技有限公司 Locking and unlocking application method, device and system
CN104933355A (en) * 2015-06-18 2015-09-23 上海斐讯数据通信技术有限公司 Installation checkout system and checkout method thereof of trustable application of mobile terminal

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10977021B2 (en) 2017-06-05 2021-04-13 Huawei Technologies Co., Ltd. SE applet processing method, terminal, and server
CN108985756A (en) * 2017-06-05 2018-12-11 华为技术有限公司 SE application processing method, user terminal and server
WO2018223831A1 (en) * 2017-06-05 2018-12-13 华为技术有限公司 Se application processing method, user terminal, and server
CN111034118A (en) * 2017-09-18 2020-04-17 华为技术有限公司 Secure delegation credentials in third party networks
CN111034118B (en) * 2017-09-18 2021-08-31 华为技术有限公司 Secure delegation credentials in third party networks
CN107682159B (en) * 2017-10-12 2021-02-02 北京握奇智能科技有限公司 Trusted application management method and trusted application management system of intelligent terminal
CN107682159A (en) * 2017-10-12 2018-02-09 北京握奇智能科技有限公司 The trusted application management method and trusted application management system of a kind of intelligent terminal
CN108282467B (en) * 2017-12-29 2020-12-18 北京握奇智能科技有限公司 Application method and system of digital certificate
CN108282467A (en) * 2017-12-29 2018-07-13 北京握奇智能科技有限公司 The application process of digital certificate, system
CN108282466B (en) * 2017-12-29 2021-02-02 北京握奇智能科技有限公司 Method, system for providing digital certificate functionality in a TEE
CN108282466A (en) * 2017-12-29 2018-07-13 北京握奇智能科技有限公司 Method, system for providing digital certificate functionality in TEE
CN108200078B (en) * 2018-01-18 2021-01-05 中国建设银行股份有限公司 Downloading and installing method of signature authentication tool and terminal equipment
CN108200078A (en) * 2018-01-18 2018-06-22 中国建设银行股份有限公司 The download and installation method and terminal device of signature authentication tool
CN109145653A (en) * 2018-08-01 2019-01-04 Oppo广东移动通信有限公司 Data processing method and device, electronic equipment, computer readable storage medium
TWI706660B (en) * 2018-10-12 2020-10-01 香港商阿里巴巴集團服務有限公司 Key transfer method and system based on shared security application, storage medium and equipment
CN109347629A (en) * 2018-10-12 2019-02-15 阿里巴巴集团控股有限公司 Key transmission method and system based on shared security application, storage medium, equipment
CN109922056A (en) * 2019-02-26 2019-06-21 阿里巴巴集团控股有限公司 Data safety processing method and its terminal, server
US11251976B2 (en) 2019-02-26 2022-02-15 Advanced New Technologies Co., Ltd. Data security processing method and terminal thereof, and server
CN111414605A (en) * 2020-03-17 2020-07-14 Oppo(重庆)智能科技有限公司 Unlocking method and device of embedded security unit, electronic equipment and storage medium
CN111414605B (en) * 2020-03-17 2023-07-18 Oppo(重庆)智能科技有限公司 Unlocking method and device of embedded security unit, electronic equipment and storage medium
CN112134777A (en) * 2020-09-09 2020-12-25 中国科学院信息工程研究所 Trusted IPSec module and VPN tunnel construction method
CN112560116A (en) * 2020-12-04 2021-03-26 Oppo(重庆)智能科技有限公司 Function control method, device and storage medium
WO2022170857A1 (en) * 2021-02-09 2022-08-18 深圳市汇顶科技股份有限公司 Secure transmission method and apparatus for signaling, and server and se chip
CN115604715A (en) * 2022-12-01 2023-01-13 北京紫光青藤微系统有限公司(Cn) NFC function control method based on security channel and mobile terminal device

Similar Documents

Publication Publication Date Title
CN106102054A (en) A kind of method and communication system that safe unit is carried out safety management
CN107690793B (en) Method, equipment and the computer-readable storage medium of tunnelling for mobile platform
JP6687641B2 (en) Client device authentication based on entropy from server or other device
CN106471783B (en) Via the business system certification and authorization of gateway
CN111523108B (en) System and method for encryption key management, federation, and distribution
CN105308923B (en) Data management to the application with multiple operating mode
US8887296B2 (en) Method and system for object-based multi-level security in a service oriented architecture
US11880490B2 (en) Context-based access control and revocation for data governance and loss mitigation
US20140020062A1 (en) Techniques for protecting mobile applications
CN106031128B (en) The method and apparatus of mobile device management
CN105379223A (en) Validating the identity of a mobile application for mobile application management
CN105637523A (en) Secure client drive mapping and file storage system for mobile device management type security
US11082413B2 (en) Secure network connections
CN107852585A (en) improve the performance of packaged application program
CA3083722C (en) Re-encrypting data on a hash chain
US20140229603A1 (en) Validation of service management requests of a mobile device in a geographically bounded space
US20220407694A1 (en) Attested end-to-end encryption for transporting sensitive data
KR20210119491A (en) API and encryption key secret management system and method
CN103973715A (en) Cloud computing security system and method
US11509465B2 (en) Computing device and related methods providing virtual session access using group connection leases and user interface (UI) caches
CN114679473B (en) Financial account management system and method based on distributed digital identity
CN103793658B (en) A kind of protection system and method for off-line files based on VPN
CN117882337A (en) Certificate revocation as a service at a data center
US11184354B2 (en) Network-based authorization for disconnected devices
Kandil et al. Mobile agents' authentication using a proposed light Kerberos system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20161109

WD01 Invention patent application deemed withdrawn after publication