CN108469962A - Mobile terminal based on cellphone shield and cellphone shield management method - Google Patents

Mobile terminal based on cellphone shield and cellphone shield management method Download PDF

Info

Publication number
CN108469962A
CN108469962A CN201810258810.5A CN201810258810A CN108469962A CN 108469962 A CN108469962 A CN 108469962A CN 201810258810 A CN201810258810 A CN 201810258810A CN 108469962 A CN108469962 A CN 108469962A
Authority
CN
China
Prior art keywords
application
mobile terminal
shield
configuration information
cellphone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810258810.5A
Other languages
Chinese (zh)
Other versions
CN108469962B (en
Inventor
王玉岗
郑涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hengbao Co Ltd
Original Assignee
Jiangsu Hengbao Intelligent System Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Hengbao Intelligent System Technology Co Ltd filed Critical Jiangsu Hengbao Intelligent System Technology Co Ltd
Priority to CN201810258810.5A priority Critical patent/CN108469962B/en
Publication of CN108469962A publication Critical patent/CN108469962A/en
Application granted granted Critical
Publication of CN108469962B publication Critical patent/CN108469962B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • G06Q20/3227Aspects of commerce using mobile devices [M-devices] using secure elements embedded in M-devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Telephone Function (AREA)

Abstract

The application provides a kind of mobile terminal based on cellphone shield and cellphone shield management method, and mobile terminal includes credible performing environment and rich performing environment;Mobile terminal user's application installation package is installed, mobile terminal user's application installation package includes at least one end-user application in rich performing environment;Cellphone shield trusted application is installed, cellphone shield trusted application includes configuration information memory module corresponding with end-user application in credible performing environment.Relevant configuration management function of the application based on the TA exploitations of cellphone shield business on TEE environment Android systems, makes it possible that the system manufacturer of mobile terminal safeguards a cellphone shield TA, simplifies the management of TA;A TA is also only safeguarded in the sides cellphone shield CA, and the business demand of different industries user (bank, security, insurance etc.) is completed by configuration information.

Description

Mobile terminal based on cellphone shield and cellphone shield management method
Technical field
This application involves cellphone shield technical field more particularly to a kind of mobile terminal and cellphone shield management methods.
Background technology
With Android platform TEE (Trusted Execution Environment) credible performing environment it is general And the various financial payments based on TEE environment, the demand of the higher sector application of the security level requireds such as authentication is increasingly It is more, for example, the bank of tradition PC platforms personal Internet-based banking services start gradually to mobile phone side migrate.Traditional PC platforms are personal Internet-based banking services need to use the physics shield of the external safety certification of USB interface, ensure the safety of transaction.
Universal with smart mobile phone, user is more likely to personal internet banking operation and the use of mobile phone, but mobile phone Open system lead to many unsafe loopholes and limitation, the appearance of TEE systems just can be with the online silver of individual of mobile phone Industry business combines, and provides a kind of safe, efficiently services, since TEE systems support TUI (trusted User Interface, trusted user interface), it is possible to provide the information of the user interface of security context, the transaction of guarantee is not tampered It is inputted with the safety of PIN, realizes the two generation Usbkey business of " finding is to be signed " of PC platforms.
The transaction message of the transaction processing system of Mobile banking does not unify format, and trading algorithms are also no to fix specification, For the cellphone shield business of TEE environment, only increases a kind of new communication meson for bank, will not be situated between because of newly-increased communication Son and change existing business transaction system, can only be new communication meson adaptation existing system.
The UI modes of operation of the Mobile banking APP of bank, display styles, subject color have very big difference, bank simultaneously Requirements at the higher level are proposed to the TUI display systems of TEE environment.
For the cellphone shield business demand of the bank of TEE environment, cell phone system side needs to support the business of different bank to need It asks, corresponding TA (Trusted application, trusted application) side exploitation needs to customize corresponding TA, but due to mobile phone TEE rings Border resource is limited, it is impossible to which infinite expanding supports multiple TA, multiple TA also to increase maintenance cost simultaneously, be also unfavorable for business and push away Extensively.
Invention content
The application's be designed to provide a kind of mobile terminal and cellphone shield management method, proposes the exploitation for the sides TA Configuration management requirement simplifies adaptation of the operation system to TA of different industries user (bank, security, insurance etc.).
In order to achieve the above objectives, the application provides a kind of mobile terminal based on cellphone shield, and mobile terminal includes credible holds Row environment and rich performing environment;Mobile terminal user's application installation package, mobile terminal user's application peace are installed in rich performing environment Dress includes at least one end-user application;Cellphone shield trusted application is installed, cellphone shield is credible in credible performing environment Using including configuration information memory module corresponding with end-user application.
As above, wherein end-user application has unique application identifier;Cellphone shield trusted application further includes Maps application identifiers table, maps application identifiers table record the corresponding pass between application identifier and configuration information memory module System.
As above, wherein trusted user interface configuration information is stored in configuration information memory module, trusted user interface is matched Confidence breath includes that the scheme of colour of trusted user interface, end-user application LOGO, trusted user interface input frame carry Show content, PIN code input requirement, the Cipher Strength requirement of PIN code, the button location information of particular trusted user interface, mistake It is one or more in the configuration of prompt message and the transaction message display rule of trusted user interface.
As above, wherein transaction message fonnat configuring information is stored in configuration information memory module, transaction message format is matched Confidence breath includes the coded format of message and the display rule of key message.
As above, wherein transaction message fonnat configuring information includes message coding mark, message key message extraction mark Know, message shows content identification, it is one or more in the start of heading signed mark and end of identification to need.
As above, wherein trading algorithms configuration information, trading algorithms configuration information packet are stored in configuration information memory module It includes one or more in PIN verification algorithms mark, message hash algorithm mark and message signature algorithm identifier.
As above, wherein mobile terminal user's application installation package includes cellphone shield Client application control, and cellphone shield client answers Include TAM controls with control, TAM controls provide setting for cellphone shield TAM background systems and update trusted application configuration information Standard interface.
As above, wherein the Android operation system of mobile terminal includes the shield service module being arranged in frame and setting Shield service driver in kernel, shield service module provide the standard interface communicated between TAM controls and shield service driver, Shield service driver passes through in the communication agent of rich performing environment and the communication agent of credible performing environment and credible performing environment Trusted application communicated.
The application also provides a kind of cellphone shield management method based on above-mentioned mobile terminal, includes the following steps:Terminal is used Family application program calls trusted application configuration information update interface by user interface side;The Android operation system of mobile terminal adds The trusted application under credible performing environment is carried, and is sent to trusted application and reads version command;The Android operation system of mobile terminal The version information that trusted application returns is uploaded to cellphone shield TAM background systems by system, and initiates update configuration request;It is mobile The Android operation system of terminal receives that cellphone shield TAM background systems are different in response to version information and what is issued answer with terminal user With the corresponding new version trusted application configuration information of program;The Android operation system of mobile terminal configures new version trusted application Information is sent to trusted application, makes trusted application update configuration information and returns to update result;The Android operation system of mobile terminal The update result of trusted application is returned to end-user application by system.
As above, wherein further include:Before loading the trusted application under credible performing environment, answered in response to terminal user With routine call trusted application configuration information update interface, the TAM controls of cellphone shield Client application control are triggered, and TAM Shield management module of the control into the Android operation system of mobile terminal is initiated to read version request;Also, configuration information more During new, TAM controls and shield management module are used between end-user application and trusted application and after cellphone shield TAM Data transmission between platform system and trusted application.
What the application realized has the beneficial effect that:
Relevant configuration management function of the application based on the TA exploitations of cellphone shield business on TEE environment Android systems, makes The system manufacturer of mobile terminal safeguards that a cellphone shield TA is possibly realized, and simplifies the management of TA;Cellphone shield CA also only safeguards one in side A TA completes the business demand of different industries user (bank, insurance, security etc.) by configuration information.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments described in application can also be obtained according to these attached drawings other attached for those skilled in the art Figure.
Fig. 1 is the cellphone shield business general frame figure of mobile terminal;
Fig. 2 is the general frame figure of TEE environment;
Fig. 3 is the flow chart of TA configuration information updates;
Fig. 4 is preferred TA configuration information updates flow chart.
Specific implementation mode
With reference to the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Ground describes, it is clear that described embodiment is some embodiments of the present application, instead of all the embodiments.Based on the application In embodiment, the every other embodiment that those skilled in the art are obtained without making creative work, all Belong to the range of the application protection.
Embodiment one
Fig. 1 is the cellphone shield business general frame figure of mobile terminal, and mobile terminal is that the portable terminals such as mobile phone, tablet are set It is standby.As shown in Figure 1, by taking mobile phone 100 as an example, mobile terminal 100 includes credible performing environment, rich performing environment and embedded peace Full module (Embedded security module, ESE) 170.Credible performing environment security module driver (ESE Driver it) 1602 is communicated with ESE170.
Mobile terminal user's application installation package and Android operation system are installed in rich performing environment.
Mobile terminal user's application installation package includes at least one user application (Application, APP).User Application program can be bank's class user terminal application program, security class user terminal application program or insurance class user terminal application program Etc. application programs.Here by taking at least one Mobile banking APP (only showing a Mobile banking APP 110 in Fig. 1) as an example.It can be with Understand that ground, mobile terminal can install the user application of multiple phase same industries and/or user's application of different industries simultaneously Program.
Preferably, mobile terminal user's application installation package further include cellphone shield Client application (client application, CA) control 120.Cellphone shield CA controls 120 include trusted service management (Trusted Service Manager, TSM) control 1201, business control 1202 and trusted application management (Trusted Application Manager, TAM) control 1203, TSM controls 1201 provide for the TSM platforms 210 and ESE170 of cell phone manufacturer and create auxiliary security domain (Auxiliary Security domain, SSD), download applet (applet) and establishment application example standard interface, business control 1202 provide the standard interface of the finishing service under TEE environment for Mobile banking APP, and TAM controls 1203 are that Mobile banking APP is carried Standard interface for the configuration information for being arranged and updating cellphone shield trusted application (Trusted application, TA) 150.
Android operation system includes the Android kernel 140 under frame 130 and REE environment.Frame 130 includes TEE shield management Module (TEEKeyManager) 1301 and TEE shields service module (TEEKey Service) 1302.Shield pipe is equipped in kernel 140 Manage driver (TEEKeyManager Driver) 1401, shield service driver (TEEKeyService Driver) 1402 and richness The communication agent (REE Communication Agent) 1403 of performing environment.Shield management module 1301 provides TSM controls 1201 The standard interface communicated between shield managing driver 1401, shield managing driver 1401 and ESE170 carry out direct communication.Shield Service module 1302 provides the standard communicated between business control 1202 and TAM controls 1203 and shield service driver 1402 and connects Mouthful, shield service driver 1402 passes through the communication agent 1403 of rich performing environment and the communication agent (TEE of credible performing environment Communication Agent) it 1601 is communicated with the cellphone shield TA150 in TEE environment.
As shown in Fig. 2, installing cellphone shield TA150 in TEE environment, cellphone shield TA150 includes multiple configuration information storage moulds Block 1501 (Fig. 2 only shows a configuration information memory module 1501), each configuration information memory module 1501 and one of them User application (such as Mobile banking APP) is corresponding.Under operation, only there are one user applications to access cellphone shield TA150。
As shown in Fig. 2, storage XML transaction messages fonnat configuring information, trading algorithms in configuration information memory module 1501 Configuration information, TUI interface configuration informations, configuration information read and write and the certificate and signed data of bank's (or security, insurance etc.) Deng.Wherein, the certificate of bank's (or security, insurance etc.) is obtained by the root certificate signature of cellphone shield TAM background systems.
Wherein, TUI configuration informations include the scheme of colour (such as font color, size) of TUI, the terminal on the interfaces TUI Suggestion content (for example, " 6-8 bit digitals, letter please be input "), the PIN code of input frame on the interfaces user application LOGO, TUI Input requirements (for example, whether PIN code includes number, letter or symbol), the Cipher Strength of PIN code require, (such as, if packet Containing capital and small letter, whether can input the rules such as identical characters, number whether can be continuous), the button position confidence at the specific interfaces TUI Breath (for example, " confirmation " key in left or right side, whether the " Cancel " button is set), the configuration of TUI miscue information and TUI It is one or more in transaction message display rule.
Transaction message fonnat configuring information includes the coded format of message, display rule of key message etc..Preferably, it hands over Easy message format configuration information is standard JSON formats, including message coding mark, the extraction of message key message identify, message is aobvious Show one or more in start of heading mark and end of identification that content identification, needs are signed etc..
Trading algorithms configuration information is standard JSON formats, and trading algorithms configuration information includes that PIN verification algorithms identify (such as DES, 3DES), message hash algorithm mark (such as sha1, sha256, SM3) and message signature algorithm identifier (such as RSA, SM2 one or more in).
Preferably, Mobile banking APP110 have unique application identifier (Application identifier, AID).Cellphone shield TA150 further includes AID mapping tables 1502, AID mapping tables 1502 record AID and configuration information memory module it Between correspondence.
Embodiment two
Present invention also provides a kind of cellphone shield management methods based on above-mentioned mobile terminal, including cellphone shield TA to match confidence The update of breath.
Fig. 3 is TA configuration information update flow charts.As shown in figure 3, by taking Mobile banking APP as an example, update cellphone shield TA's Configuration information includes the following steps:
S310:Mobile banking APP calls trusted application configuration information update interface by user interface side.
S320:Cellphone shield TA under the Android operation system load TEE environment of mobile terminal, and send and read to cellphone shield TA Take version command.
S330:After the cellphone shield TA version informations returned are uploaded to cellphone shield TAM by the Android operation system of mobile terminal Platform system, and initiate update configuration request.
S340:The Android operation system of mobile terminal receive cellphone shield TAM background systems it is different in response to version information and The new version trusted application configuration information corresponding with Mobile banking APP issued.
S350:New version trusted application configuration information is sent to cellphone shield TA by the Android operation system of mobile terminal, is made Cellphone shield TA update configuration informations simultaneously return to update result.
S360:The update result of cellphone shield TA is returned to Mobile banking APP by the Android operation system of mobile terminal.
Fig. 4 is preferred TA configuration information updates flow chart.In this embodiment, TAM controls and shield management module are used for Data transmission between Mobile banking APP and cellphone shield TA and between cellphone shield TAM background systems and cellphone shield TA.Such as Fig. 4 Shown, the configuration information of update cellphone shield TA includes the following steps:
S401:The user interface side of Mobile banking APP calls TA configuration information update interfaces, triggering cellphone shield CA controls TAM controls, TAM controls obtain the corresponding AID of Mobile banking APP.
S402:TAM controls judge whether installed cellphone shield in mobile phone by the Open interfaces of TeeKeyService TA, TeeKeyService will determine that result returns to TAM controls.If having installed cellphone shield TA, S403 is executed.Otherwise, it returns Non- mount message is returned, the flow is terminated.
S403:TAM controls initiate TA external authentication requests to cellphone shield TAM background systems, are wrapped in TA external authentication requests The corresponding AID of APP containing Mobile banking.
S404:Cellphone shield TAM background systems correspond to the external authentication requests data of bank according to external authentication requests tissue (including the root certificate public key of request, the sessionID and random number random of session etc.), and by TAM controls and External authentication requests data are sent to cellphone shield TA by the transmit interfaces of TeeKeyService.
S405:Cellphone shield TA restores certificate according to related algorithm and verifies signed data, and according to session sessionId and Random generates session key.
S406:Authentication result is returned to TAM controls by cellphone shield TA by the transmit interfaces of TeeKeyService.
S407:TAM controls call the open interface loading mobile phone shield TA of TeeKeyService, and pass through The transmit interfaces of TeeKeyService send to cellphone shield TA and read TA version commands, include Mobile banking in the instruction The AID of APP.
S408:Cellphone shield TA determines configuration information memory module corresponding with the bank according to the AID of Mobile banking APP, TA version informations are returned to TAM controls by the transmit interfaces of TeeKeyService after wherein extracting configuration information.
S409:The cellphone shield TA version informations returned are uploaded to cellphone shield TAM background systems and initiate to configure by TAM controls Information update is asked.
S410:Cellphone shield TAM background systems compare the existing version and cellphone shield of cellphone shield TA according to request relevant information The newest version information stored in TAM background systems, determines whether two versions are consistent, to judge whether to need to update TA Configuration information.If two version differences, need to update, then execute S407.If two versions are consistent, terminate the stream Journey.
S411:Cellphone shield TAM background systems generate session key according to the S404 sessionId obtained and random, and After the TA configuration informations of new version being encrypted using the session key be issued to TAM controls.
S412:TAM controls call the transmit of TeekeyService to connect according to the information that the backstages cellphone shield TAM return Mouthful, the TA configuration informations of new version are sent to cellphone shield TA.
S413:After cellphone shield TA receives configuration request, safety certification is carried out, the session key pair generated using S405 The TA configuration informations of new version are decrypted, and the configuration information update that decryption is obtained is to corresponding with the AID of Mobile banking APP Configuration information memory module.
S414:Cellphone shield TA is returned to configuration information update result by the transmit interfaces of TeekeyService TAM controls.
S415:TAM controls call the close interfaces unloading cellphone shield TA of TeeKeyService.
S416:Configuration information update result is returned to Mobile banking APP by TAM controls.
Wherein, in S402, if not installing cellphone shield TA, the flow of installation cellphone shield TA can be initiated.In installation mobile phone When shield TA, TAM controls call the open interfaces of TeeKeyService to initiate asking for loading mobile phone shield TA to TEE OS systems first It asks, the file path and file AID of the cellphone shield TA for needing to load is included in open interfaces;TEE OS systems judge the conjunction of file Method, then TAM controls to cellphone shield TAM background systems initiate TA configuration informations download request, cellphone shield TAM background systems according to Request issues configuration information, TEE OS systems by the transmit interfaces of TAM controls and TeeKeyService to TEE OS systems System executes installation operation.
Safety approach based on cellphone shield is not limited to the client application of bank, other industry, for example insures, security It, all can be corresponding based on the mobile terminal exploitation for providing TEE security contexts etc. the mobile terminal application for being related to user's fund security TA and CA applications.
What the application realized has the beneficial effect that:
Relevant configuration management function of the application based on the TA exploitations of cellphone shield business on TEE environment Android systems, makes The system manufacturer of mobile terminal safeguards that a cellphone shield TA is possibly realized, and simplifies the management of TA;Cellphone shield CA also only safeguards one in side A TA completes the business demand of different industries user (bank, security, insurance etc.) by configuration information.
Although the preferred embodiment of the application has been described, created once a person skilled in the art knows basic Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the application range.Obviously, those skilled in the art can be to the application Various modification and variations are carried out without departing from spirit and scope.If in this way, these modifications and variations of the application Belong within the scope of the application claim and its equivalent technologies, then the application is also intended to exist comprising these modification and variations It is interior.

Claims (10)

1. a kind of mobile terminal based on cellphone shield, which is characterized in that the mobile terminal includes that credible performing environment and richness are held Row environment;
Mobile terminal user's application installation package is installed in the richness performing environment, mobile terminal user's application installation package includes At least one end-user application;
Cellphone shield trusted application is installed, the cellphone shield trusted application includes and the terminal user in the credible performing environment The corresponding configuration information memory module of application program.
2. the mobile terminal according to claim 1 based on cellphone shield, which is characterized in that the end-user application With unique application identifier;
The cellphone shield trusted application further includes maps application identifiers table, and the maps application identifiers table records the application Correspondence between identifier and the configuration information memory module.
3. the mobile terminal according to claim 1 or 2 based on cellphone shield, which is characterized in that the configuration information storage Trusted user interface configuration information is stored in module, the trusted user interface configuration information includes the color matching of trusted user interface Scheme, the LOGO of end-user application, the suggestion content of trusted user interface input frame, PIN code input requirement, PIN code Cipher Strength requirement, the button location information of particular trusted user interface, the configuration of miscue information and trusted users It is one or more in the transaction message display rule at interface.
4. the mobile terminal according to claim 1 or 2 based on cellphone shield, which is characterized in that the configuration information storage Store transaction message fonnat configuring information in module, the transaction message fonnat configuring information include message coded format and The display rule of key message.
5. the mobile terminal according to claim 4 based on cellphone shield, which is characterized in that the transaction message format configuration Information includes message coding mark, message key message extraction mark, message display content identification, needs the start of heading signed It is one or more in mark and end of identification.
6. the mobile terminal according to claim 1 or 2 based on cellphone shield, which is characterized in that the configuration information storage Trading algorithms configuration information is stored in module, the trading algorithms configuration information includes PIN verification algorithms mark, the calculation of message Hash It is one or more in method mark and message signature algorithm identifier.
7. the mobile terminal according to claim 1 based on cellphone shield, which is characterized in that mobile terminal user's application Installation kit includes cellphone shield Client application control, and the cellphone shield Client application control includes TAM controls, and the TAM controls are Cellphone shield TAM background systems provide the standard interface of setting and update trusted application configuration information.
8. the mobile terminal according to claim 1 based on cellphone shield, which is characterized in that the Android of the mobile terminal is grasped Include the shield service module being arranged in frame and the shield service driver being arranged in kernel, the shield service module as system The standard interface communicated between the TAM controls and the shield service driver is provided, the shield service driver is held by richness The communication agent of row environment and the communication agent of credible performing environment are led to the trusted application in the credible performing environment Letter.
9. a kind of cellphone shield management method of mobile terminal according to claim 1-8, which is characterized in that including walking as follows Suddenly:
End-user application calls trusted application configuration information update interface by user interface side;
The Android operation system of mobile terminal loads the trusted application under credible performing environment, and sends and read to the trusted application Take version command;
The version information that trusted application returns is uploaded to cellphone shield TAM background systems by the Android operation system of mobile terminal, and Initiate update configuration request;
The Android operation system of mobile terminal receive cellphone shield TAM background systems in response to version information is different and issue with institute State the corresponding new version trusted application configuration information of end-user application;
The new version trusted application configuration information is sent to the trusted application by the Android operation system of mobile terminal, makes institute It states trusted application update configuration information and returns to update result;
The update result of trusted application is returned to end-user application by the Android operation system of mobile terminal.
10. the cellphone shield management method of mobile terminal according to claim 9, which is characterized in that further include:
Before loading the trusted application under credible performing environment, trusted application is called to match confidence in response to end-user application More new interface is ceased, the TAM controls of cellphone shield Client application control are triggered, and the TAM controls are to the mobile terminal Shield management module in Android operation system is initiated to read version request;Also,
During configuration information update, the TAM controls and the shield management module are used for the end-user application Data transmission between the trusted application and between the cellphone shield TAM background systems and the trusted application.
CN201810258810.5A 2018-03-27 2018-03-27 Mobile terminal based on mobile phone shield and mobile phone shield management method Active CN108469962B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810258810.5A CN108469962B (en) 2018-03-27 2018-03-27 Mobile terminal based on mobile phone shield and mobile phone shield management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810258810.5A CN108469962B (en) 2018-03-27 2018-03-27 Mobile terminal based on mobile phone shield and mobile phone shield management method

Publications (2)

Publication Number Publication Date
CN108469962A true CN108469962A (en) 2018-08-31
CN108469962B CN108469962B (en) 2020-03-17

Family

ID=63265839

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810258810.5A Active CN108469962B (en) 2018-03-27 2018-03-27 Mobile terminal based on mobile phone shield and mobile phone shield management method

Country Status (1)

Country Link
CN (1) CN108469962B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109815662A (en) * 2018-12-06 2019-05-28 北京握奇智能科技有限公司 Gesture password identity identifying method and system under a kind of TEE environment
CN110708161A (en) * 2018-09-27 2020-01-17 安徽省电子认证管理中心有限责任公司 Method for mobile device signature
CN113673000A (en) * 2020-03-25 2021-11-19 支付宝(杭州)信息技术有限公司 Operation method and device of trusted program in TEE
CN113703790A (en) * 2021-08-12 2021-11-26 北京鲸鲮信息系统技术有限公司 Software framework of Linux system security application and establishing method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104700268A (en) * 2015-03-30 2015-06-10 中科创达软件股份有限公司 Mobile payment method and mobile device
US20160132881A1 (en) * 2014-11-12 2016-05-12 Samsung Electronics Co., Ltd. Apparatus and method for payment
CN105978920A (en) * 2016-07-28 2016-09-28 恒宝股份有限公司 Method for having access to credible application, CA and TA
CN105978917A (en) * 2016-07-19 2016-09-28 恒宝股份有限公司 System and method for trusted application security authentication
CN106228072A (en) * 2016-07-21 2016-12-14 恒宝股份有限公司 A kind of general TA payment platform and method of payment
CN106778255A (en) * 2016-11-24 2017-05-31 工业和信息化部电信研究院 Credible performing environment isolation detection method and device based on internal memory traversal
CN206441227U (en) * 2017-02-10 2017-08-25 王晓华 The terminal that a kind of near field is paid

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160132881A1 (en) * 2014-11-12 2016-05-12 Samsung Electronics Co., Ltd. Apparatus and method for payment
CN104700268A (en) * 2015-03-30 2015-06-10 中科创达软件股份有限公司 Mobile payment method and mobile device
CN105978917A (en) * 2016-07-19 2016-09-28 恒宝股份有限公司 System and method for trusted application security authentication
CN106228072A (en) * 2016-07-21 2016-12-14 恒宝股份有限公司 A kind of general TA payment platform and method of payment
CN105978920A (en) * 2016-07-28 2016-09-28 恒宝股份有限公司 Method for having access to credible application, CA and TA
CN106778255A (en) * 2016-11-24 2017-05-31 工业和信息化部电信研究院 Credible performing environment isolation detection method and device based on internal memory traversal
CN206441227U (en) * 2017-02-10 2017-08-25 王晓华 The terminal that a kind of near field is paid

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110708161A (en) * 2018-09-27 2020-01-17 安徽省电子认证管理中心有限责任公司 Method for mobile device signature
CN109815662A (en) * 2018-12-06 2019-05-28 北京握奇智能科技有限公司 Gesture password identity identifying method and system under a kind of TEE environment
CN113673000A (en) * 2020-03-25 2021-11-19 支付宝(杭州)信息技术有限公司 Operation method and device of trusted program in TEE
CN113673000B (en) * 2020-03-25 2024-03-08 支付宝(杭州)信息技术有限公司 Method and device for operating trusted program in TEE
CN113703790A (en) * 2021-08-12 2021-11-26 北京鲸鲮信息系统技术有限公司 Software framework of Linux system security application and establishing method
CN113703790B (en) * 2021-08-12 2024-07-23 北京字节跳动网络技术有限公司 Software framework product of Linux system security application and creation method

Also Published As

Publication number Publication date
CN108469962B (en) 2020-03-17

Similar Documents

Publication Publication Date Title
KR102604046B1 (en) Method for Managing Program and Electronic Device supporting the same
US20180341937A1 (en) Method and apparatus for performing settlement transaction
US10728222B2 (en) System and method for providing vehicle information based on personal authentication and vehicle authentication
US10044510B2 (en) Storing and using data with secure circuitry
US10546291B2 (en) Method and apparatus for performing payment
CN107430657B (en) Authentication by proxy
US11256496B2 (en) Apparatus and method for managing application
US10554656B2 (en) Authentication processing method and electronic device supporting the same
US20170083882A1 (en) Secure payment method and electronic device adapted thereto
TW201512878A (en) Mobile communication device and method of operating thereof
EP3258641B1 (en) Security message transmission apparatus and processing method therefor
CN108469962A (en) Mobile terminal based on cellphone shield and cellphone shield management method
KR20160105300A (en) Electronic device providing electronic payment function and operating method thereof
EP4303798A2 (en) Card registration method for payment service and mobile electronic device implementing the same
CN105493044A (en) Mobile communication device and method of operating thereof
US20170201378A1 (en) Electronic device and method for authenticating identification information thereof
KR20160100151A (en) Processing for secure information
US10805293B2 (en) Method for providing service update and electronic device supporting the same
KR20160101635A (en) Storing and Using Data with Secure Circuitry
KR20170030408A (en) Appratus and method for payment
US11010749B2 (en) Payment processing method and electronic device supporting the same
US10356089B2 (en) Electronic device for processing biometric information and method of controlling same
KR20160033510A (en) Electronic Device Using Token for Setting Permission
KR102349714B1 (en) Method for Managing Program and Electronic Device supporting the same
KR20160058375A (en) A Protected Communication with an Embedded Secure Element

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200220

Address after: 212355 Zhenjiang city of Jiangsu province Danyang City Heng Tang Industrial Zone

Applicant after: Hengbao Corp.

Address before: 212355 Hengtang Industrial Park, Yunyang Town, Danyang City, Zhenjiang City, Jiangsu Province

Applicant before: Jiangsu Hengbao Intelligent System Technology Co. Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Mobile phone key-based mobile terminal and mobile phone key management method

Effective date of registration: 20200526

Granted publication date: 20200317

Pledgee: Agricultural Bank of China Limited Danyang sub branch

Pledgor: HENGBAO Corp.

Registration number: Y2020980002520

PE01 Entry into force of the registration of the contract for pledge of patent right