CN110072232A - A kind of anti-counterfeiting method and system of credible performing environment user interface - Google Patents
A kind of anti-counterfeiting method and system of credible performing environment user interface Download PDFInfo
- Publication number
- CN110072232A CN110072232A CN201910212671.7A CN201910212671A CN110072232A CN 110072232 A CN110072232 A CN 110072232A CN 201910212671 A CN201910212671 A CN 201910212671A CN 110072232 A CN110072232 A CN 110072232A
- Authority
- CN
- China
- Prior art keywords
- performing environment
- communication server
- credible performing
- counterfeiting mark
- mark code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/037—Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/128—Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of anti-counterfeiting method and systems of credible performing environment user interface.Using asymmetric encryption mechanism, the communication channel of a safety is established between credible performing environment and server, is used for transmission anti-counterfeiting mark code.Credible performing environment is while showing user interface, printing false-proof identification code on the screen.Anti-counterfeiting mark code generates (or end user logs server is configured) by server, and credible performing environment sends the request of downloading by the network service of common performing environment to server.In addition to credible performing environment, other programs can not decrypt anti-counterfeiting mark code.The Malware that common performing environment can be effectively prevented in the present invention forges the user interface of credible performing environment, to prevent Malware from gaining the important information of terminal user by cheating.
Description
Technical field
The present invention relates to a kind of anti-counterfeiting method and systems of credible performing environment user interface, suitable for holding with credible
The mobile terminal device of row environment belongs to mobile platform trust computing field.
Background technique
With universal and mobile platform business the prosperity of smart machine, safety problem also becomes terminal user and service mentions
For one of quotient's focus of attention.The security risks such as application program generally existing at present is cracked, private data is stolen, to a
Even country of people, enterprise all causes great threat.And the credible performing environment based on chip and equipment safety can be to answer
With higher safety guarantee is provided, the safe practice of mobile platform mainstream in the market was become already.
Credible performing environment (Trusted Execution Environment, abbreviation TEE), is one on processor
Safety zone, it can be ensured that the confidentiality and integrity of its code loaded and data.Relative to common performing environment (Rich
Execution Environment, abbreviation REE) for, credible performing environment possesses higher security level;And relative to peace
For full element (Security Element, abbreviation SE), the advantage of credible performing environment is then that cost is lower.
TEE realizes the security isolation with REE from hardware layer to application layer.High level operating system (Rich OS, also referred to as
Rich operating system) it operates in REE, and independent secure operating system (TEE OS) can be then carried in TEE.When an application needs
When calling the security service in TEE, first passes through TEE Driver and TEE OS and interact, then TEE OS will be handled
Device is set as safe mode and the security service that brings into operation.In the scene for needing to show data using user interface, TEE OS
Secure memory can be set by display memory region, refuse the access of REE, avoid the data in TEE from being leaked or distort with this.
However, the application operated in REE can forge the display interface of TEE, if user can not distinguish the interface of forgery,
The private datas such as password are had input in the interface of forgery, it will cause huge losses.
Summary of the invention
In view of the above problems, the purpose of the present invention is to provide a kind of anti-counterfeiting methods of credible performing environment user interface
And system, the authenticity of user's discrimination TEE user interface is helped using anti-counterfeiting mark code.
In order to achieve the above object, the present invention takes following technical scheme:
A kind of user interface anti-counterfeiting method of the credible performing environment of mobile terminal, comprising the following steps:
The communication server generates or setting anti-counterfeiting mark code;
Secure communication channel is established between the communication server and the credible performing environment of mobile terminal;
The communication server is simultaneously sent to the credible of mobile terminal using the secure communication channel established, encrypted anti-false identifier code
Performing environment, so that the credible performing environment of mobile terminal is decrypted to obtain anti-counterfeiting mark code to the anti-counterfeiting mark code of encryption
In plain text, and by the plaintext of anti-counterfeiting mark code the true and false to be used to distinguish user interface on the screen of the mobile terminal is shown.
A kind of user interface anti-counterfeiting method of the credible performing environment of mobile terminal, comprising the following steps:
The credible performing environment of mobile terminal receives the anti-counterfeiting mark code for the encryption that the communication server is sent;The anti-counterfeiting label
Know code to generate or be arranged in the communication server first, then be built between the communication server and the credible performing environment of mobile terminal
Vertical secure communication channel, then by the communication server using the secure communication channel established, encrypted anti-false identifier code is simultaneously sent to
The credible performing environment of mobile terminal;
The anti-counterfeiting mark code of encryption is decrypted in the credible performing environment of mobile terminal, obtains the bright of anti-counterfeiting mark code
Text;
The credible performing environment of mobile terminal shows the plaintext of anti-counterfeiting mark code on the screen of the mobile terminal, for distinguishing
The true and false of other user interface.
The above method is further illustrated below.This method mainly includes original state, anti-counterfeiting mark code setup phase, safety
Communication channel establishment stage, anti-counterfeiting mark code transmission stage and anti-counterfeiting mark code show the stage.
1. original state
Under original state, the public key certificate (being denoted as Kps) of a communication server built in credible performing environment, and be used for
The public private key pair (being denoted as Kpc and Krc respectively) of key agreement;The communication server possesses a corresponding private key (being denoted as Krs).
2. anti-counterfeiting mark code setup phase
Anti-counterfeiting mark code can be that each user generates at random by the communication server, can also be by user login services device certainly
Row setting, is generally made of 8 letter or numbers.
3. secure communication channel establishment stage
Credible performing environment downloads anti-counterfeiting mark code to communications server request, and the communication server can first be held at it with credible
The communication channel of a safety is established between row environment.The following steps are included:
(1) communication server receives request, the interim public private key pair of random generation one (it is denoted as Kps ' and Krs respectively '),
Then it is signed using the private key Krs of server to temporary public key Kps ', and is returned together by temporary public key Kps ' and to its signature
Back to credible performing environment.
(2) credible performing environment receives the return message of the communication server, is disappeared using the public key Kps verifying of the communication server
The legitimacy of breath, after being verified:
A) the temporary public key Kps ' and the private key Krc session key SK of oneself of the communication server are used.
B) the public key Krc of oneself is encrypted using server public key Kps, and is sent to the communication server.
(3) communication server decrypts the message of credible performing environment using private key Krs, obtains its public key Kpc, then credible
The private key Krs session key SK ' of the public key Kpc of performing environment and oneself.
According to key agreement protocol, the SK ' that the session key SK and step (3) that step (2) is calculated are calculated is
Consistent, the communication server and credible performing environment can be used this session key and carry out coded communication (transmission anti-counterfeiting mark
Code), i.e., a secure communication channel is established between the communication server and credible performing environment.
4. anti-counterfeiting mark code transmits the stage
After the communication server and credible performing environment establish secure communication channel, that is, the communication server and can
Letter performing environment has negotiated an interim session key.The communication server uses session key by the way of symmetric cryptography
Encrypted anti-false identifier code is simultaneously sent to credible performing environment.Anti-counterfeiting mark code ciphertext is passed via cyberspace and common performing environment
It is defeated, credible performing environment is eventually arrived at, credible performing environment decrypts to obtain anti-counterfeiting mark code in plain text with same session key.
5. anti-counterfeiting mark code shows the stage
Credible performing environment has obtained the plaintext of anti-counterfeiting mark code, it is now desired to which it will be shown in the screens of terminal device
On, so that user distinguishes the true and false of user interface.Anti-counterfeiting mark code resides secure memory, shows user circle in credible performing environment
When face, one piece of region is individually marked for showing anti-counterfeiting mark code.
The present invention also provides a kind of communication servers, including random-number-generating module, encrypting module and sending module, and mention
For the Website page of user setting anti-counterfeiting mark code;
The random-number-generating module, for generating random number, random number is for generating interim public private key pair, with movement
Terminal conversates key agreement, establishes secure communication channel;
The encrypting module is used for encrypted anti-false identifier code, is made of symmetrical and rivest, shamir, adelman;
The sending module, for sending the ciphertext of anti-counterfeiting mark code to the credible performing environment of mobile terminal.
The present invention also provides a kind of mobile terminal, including credible performing environment, the credible performing environment includes:
Deciphering module obtains anti-fake for the anti-counterfeiting mark code of the received encryption of the communication server to be decrypted
The plaintext of identification code;
Secure display controller, for showing on the screen of the mobile terminal the plaintext of anti-counterfeiting mark code, to distinguish
The true and false of user interface.
The public key certificate of a communication server built in the credible performing environment, and the public and private key for key agreement
It is right;After establishing secure communication channel with the communication server, the anti-counterfeiting mark code of encryption is received by secure communication channel.
The present invention also provides a kind of user interface anti-counterfeiting systems of the credible performing environment of mobile terminal comprising institute above
The communication server and mobile terminal stated.
The present invention utilizes asymmetric encryption mechanism, and the communication of a safety is established between credible performing environment and server
Channel is used for transmission anti-counterfeiting mark code;While showing user interface, printing false-proof identifies credible performing environment on the screen
Code;Anti-counterfeiting mark code generates (or end user logs server is configured) by server, and credible performing environment passes through general
The network service of logical performing environment sends the request of downloading to server.In addition to credible performing environment, other programs can not be solved
Tight defense puppet identification code.The Malware that common performing environment can be effectively prevented in the present invention forges user circle of credible performing environment
Face, to prevent Malware from gaining the important information of terminal user by cheating.
Detailed description of the invention
Fig. 1 is a kind of technical pattern block diagram of the anti-counterfeiting method of credible performing environment user interface provided by the invention.
Fig. 2 is a kind of display renderings of the anti-counterfeiting method of credible performing environment user interface provided by the invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, hereinafter, referring to the drawings and the embodiments,
Invention is further described in detail.It should be appreciated that described herein, specific examples are only used to explain the present invention, not
For limiting the present invention.
Fig. 1 is a kind of technical pattern block diagram of the anti-counterfeiting method of credible performing environment user interface provided by the invention,
Including terminal and server.Include common domain and security domain in terminal, is equipped with deciphering module, secure display controller in security domain
(for showing on the screen of the mobile terminal the plaintext of anti-counterfeiting mark code, to distinguish the true and false of user interface).Server
That is the communication server.
As shown in Figure 1, server includes random-number-generating module, encrypting module and sending module.Communication server response
The request of the downloading anti-counterfeiting mark code of credible performing environment, establishes a secure communication channel therebetween, then passes through peace
All channel transmits anti-counterfeiting mark code to credible performing environment.In addition, the communication server provides the net of user setting anti-counterfeiting mark code
It stands the page.Wherein:
(1) random-number-generating module is carried out for generating random number, random number for generating interim public private key pair
Session key agreement.
(2) encrypting module is made of symmetrical and rivest, shamir, adelman, including but not limited to DES, SHA256,
RSA, SM2, SM3, SM4 scheduling algorithm are used for encrypted anti-false identifier code.
(3) sending module, for sending the ciphertext of anti-counterfeiting mark code to terminal.
(4) Website page provides the verifying and secure communication of server by PKI system.
A kind of anti-counterfeiting method of credible performing environment user interface of the present embodiment mainly includes original state, anti-fake
Identification code setup phase, secure communication channel establishment stage, anti-counterfeiting mark code transmission stage and anti-counterfeiting mark code show the stage,
In:
1. original state
Mobile terminal device manufacturer generates two pairs of public private key pairs at random, and respectively server public key Kps and server are private
Key Krs, terminal public key Kpc and terminal secret key Krc.Wherein, Kps, Kpc, Krc enter terminal device with system firmware brush, and Krs is used
Security medium imports the communication server, and the communication server provides support by mobile terminal device manufacturer.
2. anti-counterfeiting mark code setup phase
The communication server is provided for user setting and the interface for checking anti-counterfeiting mark code, and user is visited by https agreement
Ask the communication server, the anti-counterfeiting mark code or self-setting for selecting the communication server to generate at random.
3. secure communication channel establishment stage
For terminal device when first time calling security service, credible performing environment detects anti-counterfeiting mark code no initializtion,
Then anti-counterfeiting mark code is downloaded to communications server request by the network service of common performing environment.The communication server can first exist
Its communication channel that a safety is established between credible performing environment, comprising the following steps:
(1) communication server receives request, the interim public private key pair of random generation one (it is denoted as Kps ' and Krs respectively '),
Then generate the signature to temporary public key Kps ' using SM2 signature algorithm and privacy key Krs, and by temporary public key Kps ' and
Credible performing environment is returned to together to its signature.
(2) credible performing environment receives the return message of the communication server, uses SM2 sign test algorithm and server public key
Kps verifies the legitimacy of message, after being verified:
A) the temporary public key Kps ' and the private key Krc session key SK of oneself of the communication server are used.
B) the public key Krc of oneself is encrypted using SM2 Encryption Algorithm and server public key Kps, and is sent to communication service
Device.
(3) communication server decrypts the message of credible performing environment using private key Krs, obtains its public key Kpc, then credible
The private key Krs session key SK ' of the public key Kpc and the communication server of performing environment oneself.
According to key agreement protocol, the SK ' that the session key SK and step (3) that step (2) is calculated are calculated is
Consistent, the communication server and credible performing environment can be used this session key and carry out coded communication (transmission anti-counterfeiting mark
Code), i.e., a secure communication channel is established between the communication server and credible performing environment.
4. anti-counterfeiting mark code transmits the stage
The communication server uses SM4 Encryption Algorithm and session key SK encrypted anti-false identifier code, encrypted anti-counterfeiting mark
Code transmits in cyberspace and common performing environment, finally reaches credible performing environment.Credible performing environment is decrypted using SK
(deciphering module of security domain in Fig. 1) obtains anti-counterfeiting mark code in plain text, and makes its resident secure memory.
5. anti-counterfeiting mark code shows the stage
When showing credible performing environment user interface every time, TEE OS copies anti-counterfeiting mark code from secure memory
To specific display memory section, anti-counterfeiting mark code is shown with specific region on a terminal screen, as shown in Figure 2.
The foregoing is merely one embodiment of the present of invention, are not intended to limit the invention, all in essence of the invention
Within mind and principle, any modification, equivalent substitution, improvement and etc. done be should be included within the scope of the present invention.
Claims (10)
1. a kind of user interface anti-counterfeiting method of the credible performing environment of mobile terminal, which comprises the following steps:
The communication server generates or setting anti-counterfeiting mark code;
Secure communication channel is established between the communication server and the credible performing environment of mobile terminal;
The communication server utilizes the secure communication channel established, encrypted anti-false identifier code and the credible execution for being sent to mobile terminal
Environment, so that the credible performing environment of mobile terminal is decrypted to obtain the bright of anti-counterfeiting mark code to the anti-counterfeiting mark code of encryption
Text, and the plaintext of anti-counterfeiting mark code is shown into the true and false to be used to distinguish user interface on the screen of the mobile terminal.
2. a kind of user interface anti-counterfeiting method of the credible performing environment of mobile terminal, which comprises the following steps:
The credible performing environment of mobile terminal receives the anti-counterfeiting mark code for the encryption that the communication server is sent;The anti-counterfeiting mark code
It generates or is arranged in the communication server first, peace is then established between the communication server and the credible performing environment of mobile terminal
Full communication channel, then by the communication server using the secure communication channel established, encrypted anti-false identifier code is simultaneously sent to movement
The credible performing environment of terminal;
The anti-counterfeiting mark code of encryption is decrypted in the credible performing environment of mobile terminal, obtains the plaintext of anti-counterfeiting mark code;
The credible performing environment of mobile terminal shows the plaintext of anti-counterfeiting mark code on the screen of the mobile terminal, uses for distinguishing
The true and false at family interface.
3. method according to claim 1 or 2, which is characterized in that the anti-counterfeiting mark code is by 8 letter or number groups
At being that each user generates at random by the communication server, or by user's logging on communication server self-setting.
4. method according to claim 1 or 2, which is characterized in that whole in the communication server and movement using following steps
Secure communication channel is established between the credible performing environment at end:
(1) public key certificate of a communication server built in credible performing environment is denoted as Kps, and the public affairs for key agreement
Private key pair is denoted as Kpc and Krc respectively;The communication server possesses a corresponding private key, is denoted as Krs;
(2) credible performing environment sends downloading anti-counterfeiting mark code to the communication server by the network service of common performing environment
Request;
(3) communication server receives request, generates an interim public private key pair at random, is denoted as Kps ' and Krs respectively ', then
It is signed using the private key Krs of the communication server to temporary public key Kps ', and is returned together by temporary public key Kps ' and to its signature
Back to credible performing environment;
(4) credible performing environment receives the return message of the communication server, verifies message using the public key Kps of the communication server
Legitimacy, after being verified: using the temporary public key Kps ' and the private key Krc session key SK of oneself of the communication server,
And the public key Krc of oneself is encrypted using communication server public key Kps, and be sent to the communication server;
(5) communication server decrypts the message of credible performing environment using private key Krs, obtains its public key Kpc, then credible execution
The private key Krs session key SK ' of the public key Kpc of environment and oneself;
According to key agreement protocol, the SK ' that the session key SK that step (4) is calculated is calculated with step (5) is consistent
, the communication server and credible performing environment are able to use this session key and carry out coded communication, i.e., in the communication server and can
A secure communication channel is established between letter performing environment.
5. method according to claim 1 or 2, which is characterized in that the communication server by the way of symmetric cryptography,
Using session key encrypted anti-false identifier code and it is sent to credible performing environment, anti-counterfeiting mark code ciphertext is via cyberspace and general
Logical performing environment transmission, eventually arrives at credible performing environment.
6. method according to claim 1 or 2, which is characterized in that a communication service built in the credible performing environment
The public key certificate of device, and the public private key pair for key agreement;After the communication channel for establishing safety with the communication server, lead to
It crosses secure communication channel to receive and decrypt to obtain anti-counterfeiting mark code, then credible performing environment operating system TEE OS is according to anti-fake
The corresponding number of identification code selection or alphabetical picture are shown in user interface.
7. method according to claim 1 or 2, which is characterized in that the anti-counterfeiting mark code resides the safety of mobile terminal
Memory individually marks one piece of region for showing anti-counterfeiting mark code when credible performing environment shows user interface.
8. a kind of communication server, which is characterized in that including random-number-generating module, encrypting module and sending module, and provide
The Website page of user setting anti-counterfeiting mark code;
The random-number-generating module, for generating random number, random number is for generating interim public private key pair, with mobile terminal
Conversate key agreement, establishes secure communication channel;
The encrypting module is used for encrypted anti-false identifier code, is made of symmetrical and rivest, shamir, adelman;
The sending module, for sending the ciphertext of anti-counterfeiting mark code to the credible performing environment of mobile terminal.
9. a kind of mobile terminal, including credible performing environment, which is characterized in that the credible performing environment includes:
Deciphering module is obtained for being decrypted to from the anti-counterfeiting mark code of the received encryption of the communication server described in claim 8
To the plaintext of anti-counterfeiting mark code;
Secure display controller, for showing on the screen of the mobile terminal the plaintext of anti-counterfeiting mark code, to distinguish user
The true and false at interface.
10. a kind of user interface anti-counterfeiting systems of the credible performing environment of mobile terminal, which is characterized in that including claim 8
The communication server and mobile terminal as claimed in claim 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910212671.7A CN110072232A (en) | 2019-03-20 | 2019-03-20 | A kind of anti-counterfeiting method and system of credible performing environment user interface |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910212671.7A CN110072232A (en) | 2019-03-20 | 2019-03-20 | A kind of anti-counterfeiting method and system of credible performing environment user interface |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110072232A true CN110072232A (en) | 2019-07-30 |
Family
ID=67366422
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910212671.7A Pending CN110072232A (en) | 2019-03-20 | 2019-03-20 | A kind of anti-counterfeiting method and system of credible performing environment user interface |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110072232A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113127814A (en) * | 2019-12-31 | 2021-07-16 | 杭州海康威视数字技术股份有限公司 | Software copy prevention method and device, electronic equipment and readable storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102129589A (en) * | 2011-02-10 | 2011-07-20 | 谢仁康 | Asymmetric encryption two-dimension code anti-counterfeiting method |
US20160171248A1 (en) * | 2014-12-16 | 2016-06-16 | Intel Corporation | Using Trusted Execution Environments for Security of Code and Data |
CN106464488A (en) * | 2015-08-28 | 2017-02-22 | 华为技术有限公司 | Information transmission method and mobile device |
CN108418812A (en) * | 2018-02-12 | 2018-08-17 | 北京豆荚科技有限公司 | A kind of intelligent terminal security message method of servicing based on credible performing environment |
CN109347809A (en) * | 2018-09-25 | 2019-02-15 | 北京计算机技术及应用研究所 | A kind of application virtualization safety communicating method towards under autonomous controllable environment |
-
2019
- 2019-03-20 CN CN201910212671.7A patent/CN110072232A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102129589A (en) * | 2011-02-10 | 2011-07-20 | 谢仁康 | Asymmetric encryption two-dimension code anti-counterfeiting method |
US20160171248A1 (en) * | 2014-12-16 | 2016-06-16 | Intel Corporation | Using Trusted Execution Environments for Security of Code and Data |
CN106464488A (en) * | 2015-08-28 | 2017-02-22 | 华为技术有限公司 | Information transmission method and mobile device |
CN108418812A (en) * | 2018-02-12 | 2018-08-17 | 北京豆荚科技有限公司 | A kind of intelligent terminal security message method of servicing based on credible performing environment |
CN109347809A (en) * | 2018-09-25 | 2019-02-15 | 北京计算机技术及应用研究所 | A kind of application virtualization safety communicating method towards under autonomous controllable environment |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113127814A (en) * | 2019-12-31 | 2021-07-16 | 杭州海康威视数字技术股份有限公司 | Software copy prevention method and device, electronic equipment and readable storage medium |
CN113127814B (en) * | 2019-12-31 | 2023-03-14 | 杭州海康威视数字技术股份有限公司 | Software anti-copying method and device, electronic equipment and readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109309565B (en) | Security authentication method and device | |
EP2289220B1 (en) | Network helper for authentication between a token and verifiers | |
US8621210B2 (en) | Ad-hoc trust establishment using visual verification | |
CN114900338B (en) | Encryption and decryption method, device, equipment and medium | |
CN108810029A (en) | Right discriminating system and optimization method between a kind of micro services infrastructure services | |
WO2017097041A1 (en) | Data transmission method and device | |
WO2017201809A1 (en) | Communication method and system for terminal | |
US8595501B2 (en) | Network helper for authentication between a token and verifiers | |
CN106302502A (en) | A kind of secure access authentication method, user terminal and service end | |
CN108347419A (en) | Data transmission method and device | |
US10742426B2 (en) | Public key infrastructure and method of distribution | |
KR20070057871A (en) | Method of authentication based on polynomials | |
CN112351037B (en) | Information processing method and device for secure communication | |
US11438316B2 (en) | Sharing encrypted items with participants verification | |
CN104901935A (en) | Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem) | |
CN106788989A (en) | A kind of method and apparatus for setting up safe encryption channel | |
CN112968971A (en) | Method and device for establishing session connection, electronic equipment and readable storage medium | |
CN108667791A (en) | Identity authentication method | |
CN112448958B (en) | Domain policy issuing method and device, electronic equipment and storage medium | |
CN105554008B (en) | User terminal, certificate server, intermediate server, system and transfer approach | |
CN106657002A (en) | Novel crash-proof base correlation time multi-password identity authentication method | |
CN110380859A (en) | Based on unsymmetrical key pond to and DH agreement quantum communications service station identity identifying method and system | |
Chow et al. | A visual one-time password authentication scheme using mobile devices | |
CN109495441A (en) | Access authentication method, device, relevant device and computer readable storage medium | |
WO2015109958A1 (en) | Data processing method based on negotiation key, and mobile phone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190730 |