CN110072232A - A kind of anti-counterfeiting method and system of credible performing environment user interface - Google Patents

A kind of anti-counterfeiting method and system of credible performing environment user interface Download PDF

Info

Publication number
CN110072232A
CN110072232A CN201910212671.7A CN201910212671A CN110072232A CN 110072232 A CN110072232 A CN 110072232A CN 201910212671 A CN201910212671 A CN 201910212671A CN 110072232 A CN110072232 A CN 110072232A
Authority
CN
China
Prior art keywords
performing environment
communication server
credible performing
counterfeiting mark
mark code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910212671.7A
Other languages
Chinese (zh)
Inventor
荆继武
王跃武
雷灵光
周荃
任鸽
黄若鹏
王杰
林璟锵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Data Assurance and Communication Security Research Center of CAS
Original Assignee
Data Assurance and Communication Security Research Center of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Data Assurance and Communication Security Research Center of CAS filed Critical Data Assurance and Communication Security Research Center of CAS
Priority to CN201910212671.7A priority Critical patent/CN110072232A/en
Publication of CN110072232A publication Critical patent/CN110072232A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/037Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of anti-counterfeiting method and systems of credible performing environment user interface.Using asymmetric encryption mechanism, the communication channel of a safety is established between credible performing environment and server, is used for transmission anti-counterfeiting mark code.Credible performing environment is while showing user interface, printing false-proof identification code on the screen.Anti-counterfeiting mark code generates (or end user logs server is configured) by server, and credible performing environment sends the request of downloading by the network service of common performing environment to server.In addition to credible performing environment, other programs can not decrypt anti-counterfeiting mark code.The Malware that common performing environment can be effectively prevented in the present invention forges the user interface of credible performing environment, to prevent Malware from gaining the important information of terminal user by cheating.

Description

A kind of anti-counterfeiting method and system of credible performing environment user interface
Technical field
The present invention relates to a kind of anti-counterfeiting method and systems of credible performing environment user interface, suitable for holding with credible The mobile terminal device of row environment belongs to mobile platform trust computing field.
Background technique
With universal and mobile platform business the prosperity of smart machine, safety problem also becomes terminal user and service mentions For one of quotient's focus of attention.The security risks such as application program generally existing at present is cracked, private data is stolen, to a Even country of people, enterprise all causes great threat.And the credible performing environment based on chip and equipment safety can be to answer With higher safety guarantee is provided, the safe practice of mobile platform mainstream in the market was become already.
Credible performing environment (Trusted Execution Environment, abbreviation TEE), is one on processor Safety zone, it can be ensured that the confidentiality and integrity of its code loaded and data.Relative to common performing environment (Rich Execution Environment, abbreviation REE) for, credible performing environment possesses higher security level;And relative to peace For full element (Security Element, abbreviation SE), the advantage of credible performing environment is then that cost is lower.
TEE realizes the security isolation with REE from hardware layer to application layer.High level operating system (Rich OS, also referred to as Rich operating system) it operates in REE, and independent secure operating system (TEE OS) can be then carried in TEE.When an application needs When calling the security service in TEE, first passes through TEE Driver and TEE OS and interact, then TEE OS will be handled Device is set as safe mode and the security service that brings into operation.In the scene for needing to show data using user interface, TEE OS Secure memory can be set by display memory region, refuse the access of REE, avoid the data in TEE from being leaked or distort with this.
However, the application operated in REE can forge the display interface of TEE, if user can not distinguish the interface of forgery, The private datas such as password are had input in the interface of forgery, it will cause huge losses.
Summary of the invention
In view of the above problems, the purpose of the present invention is to provide a kind of anti-counterfeiting methods of credible performing environment user interface And system, the authenticity of user's discrimination TEE user interface is helped using anti-counterfeiting mark code.
In order to achieve the above object, the present invention takes following technical scheme:
A kind of user interface anti-counterfeiting method of the credible performing environment of mobile terminal, comprising the following steps:
The communication server generates or setting anti-counterfeiting mark code;
Secure communication channel is established between the communication server and the credible performing environment of mobile terminal;
The communication server is simultaneously sent to the credible of mobile terminal using the secure communication channel established, encrypted anti-false identifier code Performing environment, so that the credible performing environment of mobile terminal is decrypted to obtain anti-counterfeiting mark code to the anti-counterfeiting mark code of encryption In plain text, and by the plaintext of anti-counterfeiting mark code the true and false to be used to distinguish user interface on the screen of the mobile terminal is shown.
A kind of user interface anti-counterfeiting method of the credible performing environment of mobile terminal, comprising the following steps:
The credible performing environment of mobile terminal receives the anti-counterfeiting mark code for the encryption that the communication server is sent;The anti-counterfeiting label Know code to generate or be arranged in the communication server first, then be built between the communication server and the credible performing environment of mobile terminal Vertical secure communication channel, then by the communication server using the secure communication channel established, encrypted anti-false identifier code is simultaneously sent to The credible performing environment of mobile terminal;
The anti-counterfeiting mark code of encryption is decrypted in the credible performing environment of mobile terminal, obtains the bright of anti-counterfeiting mark code Text;
The credible performing environment of mobile terminal shows the plaintext of anti-counterfeiting mark code on the screen of the mobile terminal, for distinguishing The true and false of other user interface.
The above method is further illustrated below.This method mainly includes original state, anti-counterfeiting mark code setup phase, safety Communication channel establishment stage, anti-counterfeiting mark code transmission stage and anti-counterfeiting mark code show the stage.
1. original state
Under original state, the public key certificate (being denoted as Kps) of a communication server built in credible performing environment, and be used for The public private key pair (being denoted as Kpc and Krc respectively) of key agreement;The communication server possesses a corresponding private key (being denoted as Krs).
2. anti-counterfeiting mark code setup phase
Anti-counterfeiting mark code can be that each user generates at random by the communication server, can also be by user login services device certainly Row setting, is generally made of 8 letter or numbers.
3. secure communication channel establishment stage
Credible performing environment downloads anti-counterfeiting mark code to communications server request, and the communication server can first be held at it with credible The communication channel of a safety is established between row environment.The following steps are included:
(1) communication server receives request, the interim public private key pair of random generation one (it is denoted as Kps ' and Krs respectively '), Then it is signed using the private key Krs of server to temporary public key Kps ', and is returned together by temporary public key Kps ' and to its signature Back to credible performing environment.
(2) credible performing environment receives the return message of the communication server, is disappeared using the public key Kps verifying of the communication server The legitimacy of breath, after being verified:
A) the temporary public key Kps ' and the private key Krc session key SK of oneself of the communication server are used.
B) the public key Krc of oneself is encrypted using server public key Kps, and is sent to the communication server.
(3) communication server decrypts the message of credible performing environment using private key Krs, obtains its public key Kpc, then credible The private key Krs session key SK ' of the public key Kpc of performing environment and oneself.
According to key agreement protocol, the SK ' that the session key SK and step (3) that step (2) is calculated are calculated is Consistent, the communication server and credible performing environment can be used this session key and carry out coded communication (transmission anti-counterfeiting mark Code), i.e., a secure communication channel is established between the communication server and credible performing environment.
4. anti-counterfeiting mark code transmits the stage
After the communication server and credible performing environment establish secure communication channel, that is, the communication server and can Letter performing environment has negotiated an interim session key.The communication server uses session key by the way of symmetric cryptography Encrypted anti-false identifier code is simultaneously sent to credible performing environment.Anti-counterfeiting mark code ciphertext is passed via cyberspace and common performing environment It is defeated, credible performing environment is eventually arrived at, credible performing environment decrypts to obtain anti-counterfeiting mark code in plain text with same session key.
5. anti-counterfeiting mark code shows the stage
Credible performing environment has obtained the plaintext of anti-counterfeiting mark code, it is now desired to which it will be shown in the screens of terminal device On, so that user distinguishes the true and false of user interface.Anti-counterfeiting mark code resides secure memory, shows user circle in credible performing environment When face, one piece of region is individually marked for showing anti-counterfeiting mark code.
The present invention also provides a kind of communication servers, including random-number-generating module, encrypting module and sending module, and mention For the Website page of user setting anti-counterfeiting mark code;
The random-number-generating module, for generating random number, random number is for generating interim public private key pair, with movement Terminal conversates key agreement, establishes secure communication channel;
The encrypting module is used for encrypted anti-false identifier code, is made of symmetrical and rivest, shamir, adelman;
The sending module, for sending the ciphertext of anti-counterfeiting mark code to the credible performing environment of mobile terminal.
The present invention also provides a kind of mobile terminal, including credible performing environment, the credible performing environment includes:
Deciphering module obtains anti-fake for the anti-counterfeiting mark code of the received encryption of the communication server to be decrypted The plaintext of identification code;
Secure display controller, for showing on the screen of the mobile terminal the plaintext of anti-counterfeiting mark code, to distinguish The true and false of user interface.
The public key certificate of a communication server built in the credible performing environment, and the public and private key for key agreement It is right;After establishing secure communication channel with the communication server, the anti-counterfeiting mark code of encryption is received by secure communication channel.
The present invention also provides a kind of user interface anti-counterfeiting systems of the credible performing environment of mobile terminal comprising institute above The communication server and mobile terminal stated.
The present invention utilizes asymmetric encryption mechanism, and the communication of a safety is established between credible performing environment and server Channel is used for transmission anti-counterfeiting mark code;While showing user interface, printing false-proof identifies credible performing environment on the screen Code;Anti-counterfeiting mark code generates (or end user logs server is configured) by server, and credible performing environment passes through general The network service of logical performing environment sends the request of downloading to server.In addition to credible performing environment, other programs can not be solved Tight defense puppet identification code.The Malware that common performing environment can be effectively prevented in the present invention forges user circle of credible performing environment Face, to prevent Malware from gaining the important information of terminal user by cheating.
Detailed description of the invention
Fig. 1 is a kind of technical pattern block diagram of the anti-counterfeiting method of credible performing environment user interface provided by the invention.
Fig. 2 is a kind of display renderings of the anti-counterfeiting method of credible performing environment user interface provided by the invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, hereinafter, referring to the drawings and the embodiments, Invention is further described in detail.It should be appreciated that described herein, specific examples are only used to explain the present invention, not For limiting the present invention.
Fig. 1 is a kind of technical pattern block diagram of the anti-counterfeiting method of credible performing environment user interface provided by the invention, Including terminal and server.Include common domain and security domain in terminal, is equipped with deciphering module, secure display controller in security domain (for showing on the screen of the mobile terminal the plaintext of anti-counterfeiting mark code, to distinguish the true and false of user interface).Server That is the communication server.
As shown in Figure 1, server includes random-number-generating module, encrypting module and sending module.Communication server response The request of the downloading anti-counterfeiting mark code of credible performing environment, establishes a secure communication channel therebetween, then passes through peace All channel transmits anti-counterfeiting mark code to credible performing environment.In addition, the communication server provides the net of user setting anti-counterfeiting mark code It stands the page.Wherein:
(1) random-number-generating module is carried out for generating random number, random number for generating interim public private key pair Session key agreement.
(2) encrypting module is made of symmetrical and rivest, shamir, adelman, including but not limited to DES, SHA256, RSA, SM2, SM3, SM4 scheduling algorithm are used for encrypted anti-false identifier code.
(3) sending module, for sending the ciphertext of anti-counterfeiting mark code to terminal.
(4) Website page provides the verifying and secure communication of server by PKI system.
A kind of anti-counterfeiting method of credible performing environment user interface of the present embodiment mainly includes original state, anti-fake Identification code setup phase, secure communication channel establishment stage, anti-counterfeiting mark code transmission stage and anti-counterfeiting mark code show the stage, In:
1. original state
Mobile terminal device manufacturer generates two pairs of public private key pairs at random, and respectively server public key Kps and server are private Key Krs, terminal public key Kpc and terminal secret key Krc.Wherein, Kps, Kpc, Krc enter terminal device with system firmware brush, and Krs is used Security medium imports the communication server, and the communication server provides support by mobile terminal device manufacturer.
2. anti-counterfeiting mark code setup phase
The communication server is provided for user setting and the interface for checking anti-counterfeiting mark code, and user is visited by https agreement Ask the communication server, the anti-counterfeiting mark code or self-setting for selecting the communication server to generate at random.
3. secure communication channel establishment stage
For terminal device when first time calling security service, credible performing environment detects anti-counterfeiting mark code no initializtion, Then anti-counterfeiting mark code is downloaded to communications server request by the network service of common performing environment.The communication server can first exist Its communication channel that a safety is established between credible performing environment, comprising the following steps:
(1) communication server receives request, the interim public private key pair of random generation one (it is denoted as Kps ' and Krs respectively '), Then generate the signature to temporary public key Kps ' using SM2 signature algorithm and privacy key Krs, and by temporary public key Kps ' and Credible performing environment is returned to together to its signature.
(2) credible performing environment receives the return message of the communication server, uses SM2 sign test algorithm and server public key Kps verifies the legitimacy of message, after being verified:
A) the temporary public key Kps ' and the private key Krc session key SK of oneself of the communication server are used.
B) the public key Krc of oneself is encrypted using SM2 Encryption Algorithm and server public key Kps, and is sent to communication service Device.
(3) communication server decrypts the message of credible performing environment using private key Krs, obtains its public key Kpc, then credible The private key Krs session key SK ' of the public key Kpc and the communication server of performing environment oneself.
According to key agreement protocol, the SK ' that the session key SK and step (3) that step (2) is calculated are calculated is Consistent, the communication server and credible performing environment can be used this session key and carry out coded communication (transmission anti-counterfeiting mark Code), i.e., a secure communication channel is established between the communication server and credible performing environment.
4. anti-counterfeiting mark code transmits the stage
The communication server uses SM4 Encryption Algorithm and session key SK encrypted anti-false identifier code, encrypted anti-counterfeiting mark Code transmits in cyberspace and common performing environment, finally reaches credible performing environment.Credible performing environment is decrypted using SK (deciphering module of security domain in Fig. 1) obtains anti-counterfeiting mark code in plain text, and makes its resident secure memory.
5. anti-counterfeiting mark code shows the stage
When showing credible performing environment user interface every time, TEE OS copies anti-counterfeiting mark code from secure memory To specific display memory section, anti-counterfeiting mark code is shown with specific region on a terminal screen, as shown in Figure 2.
The foregoing is merely one embodiment of the present of invention, are not intended to limit the invention, all in essence of the invention Within mind and principle, any modification, equivalent substitution, improvement and etc. done be should be included within the scope of the present invention.

Claims (10)

1. a kind of user interface anti-counterfeiting method of the credible performing environment of mobile terminal, which comprises the following steps:
The communication server generates or setting anti-counterfeiting mark code;
Secure communication channel is established between the communication server and the credible performing environment of mobile terminal;
The communication server utilizes the secure communication channel established, encrypted anti-false identifier code and the credible execution for being sent to mobile terminal Environment, so that the credible performing environment of mobile terminal is decrypted to obtain the bright of anti-counterfeiting mark code to the anti-counterfeiting mark code of encryption Text, and the plaintext of anti-counterfeiting mark code is shown into the true and false to be used to distinguish user interface on the screen of the mobile terminal.
2. a kind of user interface anti-counterfeiting method of the credible performing environment of mobile terminal, which comprises the following steps:
The credible performing environment of mobile terminal receives the anti-counterfeiting mark code for the encryption that the communication server is sent;The anti-counterfeiting mark code It generates or is arranged in the communication server first, peace is then established between the communication server and the credible performing environment of mobile terminal Full communication channel, then by the communication server using the secure communication channel established, encrypted anti-false identifier code is simultaneously sent to movement The credible performing environment of terminal;
The anti-counterfeiting mark code of encryption is decrypted in the credible performing environment of mobile terminal, obtains the plaintext of anti-counterfeiting mark code;
The credible performing environment of mobile terminal shows the plaintext of anti-counterfeiting mark code on the screen of the mobile terminal, uses for distinguishing The true and false at family interface.
3. method according to claim 1 or 2, which is characterized in that the anti-counterfeiting mark code is by 8 letter or number groups At being that each user generates at random by the communication server, or by user's logging on communication server self-setting.
4. method according to claim 1 or 2, which is characterized in that whole in the communication server and movement using following steps Secure communication channel is established between the credible performing environment at end:
(1) public key certificate of a communication server built in credible performing environment is denoted as Kps, and the public affairs for key agreement Private key pair is denoted as Kpc and Krc respectively;The communication server possesses a corresponding private key, is denoted as Krs;
(2) credible performing environment sends downloading anti-counterfeiting mark code to the communication server by the network service of common performing environment Request;
(3) communication server receives request, generates an interim public private key pair at random, is denoted as Kps ' and Krs respectively ', then It is signed using the private key Krs of the communication server to temporary public key Kps ', and is returned together by temporary public key Kps ' and to its signature Back to credible performing environment;
(4) credible performing environment receives the return message of the communication server, verifies message using the public key Kps of the communication server Legitimacy, after being verified: using the temporary public key Kps ' and the private key Krc session key SK of oneself of the communication server, And the public key Krc of oneself is encrypted using communication server public key Kps, and be sent to the communication server;
(5) communication server decrypts the message of credible performing environment using private key Krs, obtains its public key Kpc, then credible execution The private key Krs session key SK ' of the public key Kpc of environment and oneself;
According to key agreement protocol, the SK ' that the session key SK that step (4) is calculated is calculated with step (5) is consistent , the communication server and credible performing environment are able to use this session key and carry out coded communication, i.e., in the communication server and can A secure communication channel is established between letter performing environment.
5. method according to claim 1 or 2, which is characterized in that the communication server by the way of symmetric cryptography, Using session key encrypted anti-false identifier code and it is sent to credible performing environment, anti-counterfeiting mark code ciphertext is via cyberspace and general Logical performing environment transmission, eventually arrives at credible performing environment.
6. method according to claim 1 or 2, which is characterized in that a communication service built in the credible performing environment The public key certificate of device, and the public private key pair for key agreement;After the communication channel for establishing safety with the communication server, lead to It crosses secure communication channel to receive and decrypt to obtain anti-counterfeiting mark code, then credible performing environment operating system TEE OS is according to anti-fake The corresponding number of identification code selection or alphabetical picture are shown in user interface.
7. method according to claim 1 or 2, which is characterized in that the anti-counterfeiting mark code resides the safety of mobile terminal Memory individually marks one piece of region for showing anti-counterfeiting mark code when credible performing environment shows user interface.
8. a kind of communication server, which is characterized in that including random-number-generating module, encrypting module and sending module, and provide The Website page of user setting anti-counterfeiting mark code;
The random-number-generating module, for generating random number, random number is for generating interim public private key pair, with mobile terminal Conversate key agreement, establishes secure communication channel;
The encrypting module is used for encrypted anti-false identifier code, is made of symmetrical and rivest, shamir, adelman;
The sending module, for sending the ciphertext of anti-counterfeiting mark code to the credible performing environment of mobile terminal.
9. a kind of mobile terminal, including credible performing environment, which is characterized in that the credible performing environment includes:
Deciphering module is obtained for being decrypted to from the anti-counterfeiting mark code of the received encryption of the communication server described in claim 8 To the plaintext of anti-counterfeiting mark code;
Secure display controller, for showing on the screen of the mobile terminal the plaintext of anti-counterfeiting mark code, to distinguish user The true and false at interface.
10. a kind of user interface anti-counterfeiting systems of the credible performing environment of mobile terminal, which is characterized in that including claim 8 The communication server and mobile terminal as claimed in claim 9.
CN201910212671.7A 2019-03-20 2019-03-20 A kind of anti-counterfeiting method and system of credible performing environment user interface Pending CN110072232A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910212671.7A CN110072232A (en) 2019-03-20 2019-03-20 A kind of anti-counterfeiting method and system of credible performing environment user interface

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910212671.7A CN110072232A (en) 2019-03-20 2019-03-20 A kind of anti-counterfeiting method and system of credible performing environment user interface

Publications (1)

Publication Number Publication Date
CN110072232A true CN110072232A (en) 2019-07-30

Family

ID=67366422

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910212671.7A Pending CN110072232A (en) 2019-03-20 2019-03-20 A kind of anti-counterfeiting method and system of credible performing environment user interface

Country Status (1)

Country Link
CN (1) CN110072232A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113127814A (en) * 2019-12-31 2021-07-16 杭州海康威视数字技术股份有限公司 Software copy prevention method and device, electronic equipment and readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102129589A (en) * 2011-02-10 2011-07-20 谢仁康 Asymmetric encryption two-dimension code anti-counterfeiting method
US20160171248A1 (en) * 2014-12-16 2016-06-16 Intel Corporation Using Trusted Execution Environments for Security of Code and Data
CN106464488A (en) * 2015-08-28 2017-02-22 华为技术有限公司 Information transmission method and mobile device
CN108418812A (en) * 2018-02-12 2018-08-17 北京豆荚科技有限公司 A kind of intelligent terminal security message method of servicing based on credible performing environment
CN109347809A (en) * 2018-09-25 2019-02-15 北京计算机技术及应用研究所 A kind of application virtualization safety communicating method towards under autonomous controllable environment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102129589A (en) * 2011-02-10 2011-07-20 谢仁康 Asymmetric encryption two-dimension code anti-counterfeiting method
US20160171248A1 (en) * 2014-12-16 2016-06-16 Intel Corporation Using Trusted Execution Environments for Security of Code and Data
CN106464488A (en) * 2015-08-28 2017-02-22 华为技术有限公司 Information transmission method and mobile device
CN108418812A (en) * 2018-02-12 2018-08-17 北京豆荚科技有限公司 A kind of intelligent terminal security message method of servicing based on credible performing environment
CN109347809A (en) * 2018-09-25 2019-02-15 北京计算机技术及应用研究所 A kind of application virtualization safety communicating method towards under autonomous controllable environment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113127814A (en) * 2019-12-31 2021-07-16 杭州海康威视数字技术股份有限公司 Software copy prevention method and device, electronic equipment and readable storage medium
CN113127814B (en) * 2019-12-31 2023-03-14 杭州海康威视数字技术股份有限公司 Software anti-copying method and device, electronic equipment and readable storage medium

Similar Documents

Publication Publication Date Title
CN109309565B (en) Security authentication method and device
EP2289220B1 (en) Network helper for authentication between a token and verifiers
US8621210B2 (en) Ad-hoc trust establishment using visual verification
CN114900338B (en) Encryption and decryption method, device, equipment and medium
CN108810029A (en) Right discriminating system and optimization method between a kind of micro services infrastructure services
WO2017097041A1 (en) Data transmission method and device
WO2017201809A1 (en) Communication method and system for terminal
US8595501B2 (en) Network helper for authentication between a token and verifiers
CN106302502A (en) A kind of secure access authentication method, user terminal and service end
CN108347419A (en) Data transmission method and device
US10742426B2 (en) Public key infrastructure and method of distribution
KR20070057871A (en) Method of authentication based on polynomials
CN112351037B (en) Information processing method and device for secure communication
US11438316B2 (en) Sharing encrypted items with participants verification
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
CN106788989A (en) A kind of method and apparatus for setting up safe encryption channel
CN112968971A (en) Method and device for establishing session connection, electronic equipment and readable storage medium
CN108667791A (en) Identity authentication method
CN112448958B (en) Domain policy issuing method and device, electronic equipment and storage medium
CN105554008B (en) User terminal, certificate server, intermediate server, system and transfer approach
CN106657002A (en) Novel crash-proof base correlation time multi-password identity authentication method
CN110380859A (en) Based on unsymmetrical key pond to and DH agreement quantum communications service station identity identifying method and system
Chow et al. A visual one-time password authentication scheme using mobile devices
CN109495441A (en) Access authentication method, device, relevant device and computer readable storage medium
WO2015109958A1 (en) Data processing method based on negotiation key, and mobile phone

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190730