Movatterモバイル変換


[0]ホーム

URL:


CN105843653B - A kind of safety applications collocation method and device - Google Patents

A kind of safety applications collocation method and device
Download PDF

Info

Publication number
CN105843653B
CN105843653BCN201610225472.6ACN201610225472ACN105843653BCN 105843653 BCN105843653 BCN 105843653BCN 201610225472 ACN201610225472 ACN 201610225472ACN 105843653 BCN105843653 BCN 105843653B
Authority
CN
China
Prior art keywords
safety applications
untrusted
performing environment
application
client application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610225472.6A
Other languages
Chinese (zh)
Other versions
CN105843653A (en
Inventor
张志华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Hengbao Intelligent System Technology Co Ltd
Original Assignee
Hengbao Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hengbao Co LtdfiledCriticalHengbao Co Ltd
Priority to CN201610225472.6ApriorityCriticalpatent/CN105843653B/en
Publication of CN105843653ApublicationCriticalpatent/CN105843653A/en
Application grantedgrantedCritical
Publication of CN105843653BpublicationCriticalpatent/CN105843653B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

The application provides a kind of safety applications collocation method and device, wherein, methods described includes:In deployment phase, safety applications are deployed in credible performing environment;In service stage, conduct interviews control to safety applications;In the more new stage, safety applications are updated by trusted service management system;Wherein, it is described that safety applications are deployed in credible performing environment, including:Safety applications are preset on mobile phone terminal;The mode that safety applications and some untrusted applications bundle to installation is attached on mobile phone terminal;Safety applications are placed in trusted service management system, are attached to by way of trusted service management system interacts with mobile phone terminal on mobile phone terminal.The safety applications collocation method and device that the application proposes, safety prevention measure is employed by each stage to TA, and more believable secure interactive service is provided to the CA in REE.

Description

A kind of safety applications collocation method and device
Technical field
The application is related to communication technical field, more particularly to a kind of safety applications collocation method and device.
Background technology
The development of mobile communication technology brings the fast development of mobile terminal technology, the biography using BBP as coreFunctional form mobile terminal of uniting has been difficult to meet the mobile service demand that people are become increasingly abundant.With open high-order independent operation systemSystem, the Mobile solution that third party's exploitation can be installed, wireless access can be realized by mobile network, there is powerful disposal abilityThe development trend of mobile terminal is turned into the mobile intelligent terminal of more memory spaces.With traditional functional form mobile terminal notTogether, mobile intelligent terminal has no longer been simple voice call instrument, and it possesses the mobility of regular handset, telecommunications service work(The disposal ability of energy and PC (Personal Computer, personal computer) computer, network function, by telecommunications service and networkService convergence is within one device.While the popularization of mobile intelligent terminal brings great convenience, also bringGreat potential safety hazard.
Mobile intelligent terminal, which has evolved into, can download and install opening for various third-party applications from mobile InternetSoftware platform is put, meanwhile, the demand of mobile intelligent terminal processing critical services increasingly increases.From multimedia service to mobile phone remotePay and cause mobile intelligent terminal to turn into the viruses such as Malware, wooden horse with function, these development trends such as bank account managementTarget of attack.Due to lacking integrity protection mechanism on current mobile intelligent terminal, its software and hardware is easily under attack and usurpsChange, security breaches existing for operating system and third party software make security threat existing for mobile intelligent terminal exist than PC terminalSecurity threat it is more serious.
Common Mobile operating system Android, iOS belong to REE (untrusted performing environment) insecure environments, install thereonApplication belong to non-security application.Corresponding with REE is TEE (credible performing environment), it be run parallel with REE and therewith everyFrom isolated execution environment, and provide security service by TA (safety applications) for REE, REE passes through CA (client application) and visitedAsk TA.
Application software deployment way under traditional REE insecure environments is broadly divided into two kinds:The first, by device fabricationBusiness is preset in smart machine, the application software customized such as mobile operator;Second, issued by application developer using cityField or official website, voluntarily download and install for user.
The content of the invention
The problem of existing is that two kinds of deployment way all do not need special access right and extra safety certification measure, relies only on shiftingSoftware levels protection (such as antivirus software or security guard) in dynamic operating system, security protection rank is low.In download or moreEasily it is forged and is distorted during new, it is impossible to meets the demand of user's business high to sensitive data and level of security.
In order to solve the above problems, the application provides a kind of safety applications collocation method and device.
The application proposes a kind of safety applications collocation method, including:
In deployment phase, safety applications are deployed in credible performing environment;
In service stage, conduct interviews control to safety applications;
In the more new stage, safety applications are updated by trusted service management system;
Wherein, it is described that safety applications are deployed in credible performing environment, including:
Safety applications are preset on mobile phone terminal;Safety applications and some untrusted applications bundle to the side of installationFormula is attached on mobile phone terminal;Safety applications are placed in trusted service management system, pass through trusted service management system and handThe mode of machine terminal interaction is attached on mobile phone terminal.
Preferably, the control that safety applications are conducted interviews, including:
When client application sends safety applications access request, safety applications are examined to current untrusted performing environmentSurvey, judge whether risk;
Safety applications send authenticating identity request to client application, judge the security of client application;
Safety applications establish escape way with client application, are communicated by escape way.
Preferably, the safety applications deployment way that safety applications are preset on mobile phone terminal includes:
Preset safety applications are into credible performing environment, and preset client application is into untrusted performing environment;
Credible performing environment access modules are created, are deployed in untrusted performing environment;
Client application behavior script is write, is stored into client application;
Start client application and access credible performing environment;
Client application reading client application behavior script, access behavior is sent to credible performing environment and accesses mouldBlock;
The safety that credible performing environment access modules are loaded according to client application behavior script in credible performing environment shouldWith.
Preferably, the mode that safety applications and some untrusted applications bundle to installation is attached to mobile phone terminalOn safety applications deployment way include:
Safety applications and untrusted application are bundled;
Installed in untrusted performing environment or upgrade untrusted application;
Untrusted application is run in untrusted performing environment;
Untrusted is applied and copies to the safety applications file of binding under credible performing environment assigned catalogue;
Load the safety applications in credible performing environment.
Preferably, it is described that safety applications are placed in trusted service management system, pass through trusted service management system and handThe safety applications deployment way that the mode of machine terminal interaction is attached on mobile phone terminal includes:
Step S1:Installed in untrusted performing environment or upgrade untrusted application;
Step S2:Untrusted application is run in untrusted performing environment;
Step S3:Untrusted application judges whether client has safety applications installation file, does not continue, has and then perform stepRapid S5;
Step S4:System connection trusted service management system obtains safety applications installation kit;
Step S5:System opens safety applications installation kit and obtains safety applications file;
Step S6:Safety applications file is copied to client by system;
Step S7:System judges whether there is safety applications file in credible performing environment, has, and continues, not no then perform stepRapid S3;
Step S8:Safety applications file is copied under credible performing environment assigned catalogue by system;
Step S9:Safety applications in system loads are credible performing environment environment.
Preferably, it is described that safety applications are updated by trusted service management system, including:
Untrusted application is run in untrusted performing environment;
Untrusted applies the version information for obtaining safety applications by escape way with client application;
Untrusted application connection trusted service management system obtains the version information of safety applications installation kit;
Untrusted application compares safety applications and the version information of safety applications installation kit, and the party is exited if alwaysMethod, otherwise continue;
Safety applications installation kit is obtained from trusted service management system;
Open safety applications installation kit and obtain safety applications file;
Safety applications file is copied under the assigned catalogue of the credible performing environment of client;
Former safety applications file is deleted;
Load the safety applications in credible performing environment environment.
The application also proposes a kind of safety applications configuration device, including:
Deployment module, in deployment phase, safety applications to be deployed in credible performing environment;
Wherein, the deployment module, including:
Preset deployment component, for safety applications to be preset at into mobile phone terminal;
Binding deployment component, the mode for safety applications and some untrusted applications bundle to installation are attached to handIn machine terminal;
Remote deployment component, for safety applications to be placed in into trusted service management system, it is by trusted service managementThe mode interacted with mobile phone terminal of uniting is attached on mobile phone terminal.
Access control module, in service stage, to conduct interviews control to safety applications;
Security update module, in the more new stage, being updated by trusted service management system to safety applications.
Preferably, the access control module includes:
Risk Monitoring module, for when client application sends safety applications access request, safety applications to be to current non-Credible performing environment is detected, and judges whether risk
Authentication module, authenticating identity request is sent to client application for safety applications, judges client applicationSecurity;
Secure communication module, escape way is established for safety applications and client application, is led to by escape wayLetter.
Preferably, the preset deployment component includes:
Using preset unit, for preset safety applications into credible performing environment, preset client application to untrustedIn performing environment;
Module creation unit, for creating credible performing environment access modules, it is deployed in untrusted performing environment;
Script compilation unit, for writing client application behavior script, store into client application;
Communication unit, credible performing environment is accessed for starting client application;
Data transmission unit, for client application reading client application behavior script, access behavior is sent to canBelieve performing environment access modules;
First applies loading unit, can according to the loading of client application behavior script for credible performing environment access modulesBelieve the safety applications in performing environment.
Preferably, the binding deployment component includes:
Application bundle unit, for safety applications and untrusted application to be bundled;
First performs operating unit, for being installed in untrusted performing environment or upgrading untrusted application;
First operation applying unit, for running untrusted application in untrusted performing environment;
First file transmission unit, applied for untrusted and the safety applications file of binding is copied into credible performing environmentUnder assigned catalogue;
Second applies loading unit, for loading the safety applications in credible performing environment.
Preferably, the remote deployment component includes:
Second performs operating unit, for being installed in untrusted performing environment or upgrading untrusted application;
Second operation applying unit, for running untrusted application in untrusted performing environment;
First file judging unit, judge whether client has safety applications installation file for untrusted application;
First installation kit acquiring unit, safety applications installation kit is obtained for connecting trusted service management system;
First installation kit execution unit, safety applications file is obtained for opening safety applications installation kit;
File storage unit, for safety applications file to be copied into client;
Second file judging unit, for judging whether there is safety applications file in credible performing environment;
Second file transmission unit, for safety applications file to be copied under credible performing environment assigned catalogue;
3rd applies loading unit, for loading the safety applications in credible performing environment.
Preferably, the security update module includes:
3rd applies running unit, for running untrusted application in untrusted performing environment;
Application message acquiring unit, applied for untrusted and safety applications are obtained by escape way with client applicationVersion information;
Installation kit information acquisition unit, safety applications installation is obtained for untrusted application connection trusted service management systemThe version information of bag;
Information comparing unit, safety applications and the version information of safety applications installation kit are compared for untrusted application;
Second installation kit acquiring unit, for obtaining safety applications installation kit from trusted service management system;
Second installation kit execution unit, safety applications file is obtained for opening safety applications installation kit;
3rd file transmission unit, for safety applications file to be copied to the assigned catalogue of the credible performing environment of clientUnder;
Using unit is deleted, for former safety applications file to be deleted;
4th applies loading unit, for loading the safety applications in credible performing environment.
A kind of the safety applications collocation method and device that the invention described above proposes, obtain following technique effect:
The safety applications collocation method and device that the application proposes, are employed security protection to TA by each stage and arrangedApply, more believable secure interactive service is provided to the CA in REE.
Brief description of the drawings
, below will be to embodiment or existing in order to illustrate more clearly of the embodiment of the present application or technical scheme of the prior artThere is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only thisSome embodiments described in application, for those of ordinary skill in the art, other can also be obtained according to these accompanying drawingsAccompanying drawing.
Fig. 1 is the structural representation of the application safety applications configuration device;
Fig. 2 is the structural representation of the application deployment module;
Fig. 3 is the structural representation of the application access control module;
Fig. 4 is the structural representation of the application security update module;
Fig. 5 is the structural representation of the preset deployment component of the application;
Fig. 6 is the structural representation that the application bundlees deployment component;
Fig. 7 is the structural representation of the application remote deployment component;
Fig. 8 is the flow chart of the application safety applications collocation method;
Fig. 9 is the application in deployment phase, and safety applications are deployed in into the flow chart in credible performing environment;
Figure 10 is the application in service stage, the flow chart for the control that conducted interviews to safety applications;
Figure 11 is the flow chart that safety applications are preset on mobile phone terminal by the application;
Figure 12, which is the application, by safety applications and some untrusted applications bundle the mode of installation and is attached to mobile phone endFlow chart on end;
Figure 13 is that safety applications are placed in trusted service management system by the application, passes through trusted service management system and handThe mode of machine terminal interaction is attached to the flow chart on mobile phone terminal;
Figure 14 is the application in more new stage, the flow being updated by trusted service management system to safety applicationsFigure.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, completeSite preparation describes.
The application proposes a kind of safety applications configuration device, as shown in figure 1, including:
Deployment module 1, in deployment phase, safety applications to be deployed in credible performing environment;
Wherein, deployment module 1, as shown in Fig. 2 including:
Preset deployment component 11, for safety applications to be preset at into mobile phone terminal;Binding deployment component 12, for that will pacifyThe mode that full application with some untrusted applications bundle installation is attached on mobile phone terminal;Remote deployment component 13, is used forSafety applications are placed in trusted service management system, installed by way of trusted service management system interacts with mobile phone terminalTo mobile phone terminal.
Three of the above module can work or set simultaneously selector, and one is enabled.
Wherein, as shown in figure 5, preset deployment component 11 includes:
Using preset unit 111, for preset safety applications into credible performing environment, preset client application to it is non-canBelieve in performing environment;Module creation unit 112, for creating credible performing environment access modules, it is deployed to untrusted and performs ringIn border;Script compilation unit 113, for writing client application behavior script, store into client application;Communication unit114, access credible performing environment for starting client application;Data transmission unit 115, client is read for client applicationBehavior script is applied at end, and access behavior is sent into credible performing environment access modules;First applies loading unit 116, is used forCredible performing environment access modules load the safety applications in credible performing environment according to client application behavior script.
As shown in fig. 6, binding deployment component 12 includes:
Application bundle unit 121, for safety applications and untrusted application to be bundled;First performs operating unit122, for being installed in untrusted performing environment or upgrading untrusted application;First operation applying unit 123, for it is non-canBelieve and untrusted application is run in performing environment;First file transmission unit 124, applied for untrusted by the safety applications of bindingFile is copied under credible performing environment assigned catalogue;Second applies loading unit 125, for loading in credible performing environmentSafety applications.
The mode specifically bundled is to apply untrusted as the main body application with user mutual or communication with the outside world, credibleIt is automatic using the background application as backstage safe handling, the untrusted application of mobile phone terminal operation when mounted, untrusted applicationTrusted application is discharged into TEE, user can be avoided to directly contact trusted application;When in use, untrusted application receivesTo access request, forward the request in trusted application, trusted application is handled it, then is applied via untrusted by resultReturn, can avoid it is extraneous directly communicated with trusted application caused by potential safety hazard, lift TA safety in utilization.
As shown in fig. 7, remote deployment component 13 includes:
Second performs operating unit 131, for being installed in untrusted performing environment or upgrading untrusted application;Second fortuneRow applying unit 132, for running untrusted application in untrusted performing environment;First file judging unit 133, for non-Trusted application judges whether client has safety applications installation file;First installation kit acquiring unit 134, can convince for connectingManagement system of being engaged in obtains safety applications installation kit;First installation kit execution unit 135, obtained for opening safety applications installation kitSafety applications file;File storage unit 136, for safety applications file to be copied into client;Second file judging unit137, for judging whether there is safety applications file in credible performing environment;Second file transmission unit 138, for safety to be answeredIt is copied to file under credible performing environment assigned catalogue;3rd applies loading unit 139, for loading in credible performing environmentSafety applications.
Access control module 2, in service stage, to conduct interviews control to safety applications;
Wherein described access control module 2 includes as shown in Figure 3:
Risk Monitoring module 21, for when client application sends safety applications access request, safety applications to be to currentUntrusted performing environment is detected, and judges whether risk;
Specifically, first having to verify component, seeing that setting during whether with dispatching from the factory is identical, wind is sent if differentDangerous warning notice, next needs to carry out risk evaluation and test to all clients application, sees with the presence or absence of risk application, also sent out if havingGo out risk warning notice, finally background application detect, see whether the terminal is monitored, risk is sent if monitoredWarning notice.
Authentication module 22, authenticating identity request is sent to client application for safety applications, judge that client shouldSecurity;
Secure communication module 23, escape way is established for safety applications and client application, is carried out by escape wayCommunication.
Specifically, safety applications are poured into identity ID when mounted, while when client application access safety is applied,Public and private secret key pair is generated, public key is sent to client application, client application is sent to peace by the public key encryption communication informationThe communication information is decrypted using private key for full application, safety applications, and such safety applications communicate letter with client application useBreath establishes escape way, and safety applications securely communicate with client application passage safe to use.
Security update module 3, in the more new stage, being updated by trusted service management system to safety applications.
Wherein, the security update module as shown in figure 4, including:
3rd applies running unit 31, for running untrusted application in untrusted performing environment;Application message obtainsUnit 32, the version information for obtaining safety applications by escape way with client application is applied for untrusted;Installation kit is believedAcquiring unit 33 is ceased, the version information of safety applications installation kit is obtained for untrusted application connection trusted service management system;Information comparing unit 34, safety applications and the version information of safety applications installation kit are compared for untrusted application;Second installationBag acquiring unit 35, for obtaining safety applications installation kit from trusted service management system;Second installation kit execution unit 36, useSafety applications file is obtained in opening safety applications installation kit;3rd file transmission unit 37, for safety applications file to be answeredUnder system to the assigned catalogue of the credible performing environment of client;Using unit 38 is deleted, for former safety applications file to be deletedRemove;4th applies loading unit 39, for loading the safety applications in credible performing environment.
A kind of above-mentioned safety applications configuration device that the application proposition is introduced according to Fig. 1-7, is introduced below according to Fig. 8-14A kind of safety applications collocation method that the application proposes.
A kind of safety applications collocation method that the application proposes, as shown in figure 8, including:
Step S1:In deployment phase, safety applications are deployed in credible performing environment;
Wherein, safety applications are deployed in credible performing environment, as shown in figure 9, including:
Safety applications are preset on mobile phone terminal (step S101);Safety applications and some untrusted applications are tiedThe mode for tying up installation is attached on mobile phone terminal (step S102);Safety applications are placed in trusted service management system, passed throughThe mode that trusted service management system interacts with mobile phone terminal is attached on mobile phone terminal (step S103).
Wherein, as shown in figure 11, the safety applications deployment way that safety applications are preset on mobile phone terminal is included:
Step S1011:Preset safety applications are into credible performing environment, preset client application to untrusted performing environmentIn;
Step S1012:Credible performing environment access modules are created, are deployed in untrusted performing environment;
Step S1013:Client application behavior script is write, is stored into client application;
Step S1014:Start client application and access credible performing environment;
Step S1015:Client application reading client application behavior script, credible execution ring is sent to by access behaviorBorder access modules;
Step S1016:Credible performing environment access modules load credible performing environment according to client application behavior scriptIn safety applications.
As shown in figure 12, the mode for safety applications and some untrusted applications bundle to installation is attached to mobile phone terminalOn safety applications deployment way include:
Step S1021:Safety applications and untrusted application are bundled;
The mode specifically bundled is to apply untrusted as the main body application with user mutual or communication with the outside world, credibleIt is automatic using the background application as backstage safe handling, the untrusted application of mobile phone terminal operation when mounted, untrusted applicationTrusted application is discharged into TEE, user can be avoided to directly contact trusted application;When in use, untrusted is applied with connecingAccess request is received, is forwarded the request in trusted application, trusted application is handled it, then is applied via untrusted and tied processingFruit returns, can avoid it is extraneous directly communicated with trusted application caused by potential safety hazard, lift TA safety in utilization.
Step S1022:Installed in untrusted performing environment or upgrade untrusted application;
Step S1023:Untrusted application is run in untrusted performing environment;
Step S1024:Untrusted is applied and copies to the safety applications file of binding under credible performing environment assigned catalogue;
Step S1025:Load the safety applications in credible performing environment.
As shown in figure 13, safety applications are placed in trusted service management system, pass through trusted service management system and handThe safety applications deployment way that the mode of machine terminal interaction is attached on mobile phone terminal includes:
Step S1031:Installed in untrusted performing environment or upgrade untrusted application;
Step S1032:Untrusted application is run in untrusted performing environment;
Step S1033:Untrusted application judges whether client has safety applications installation file, does not continue, has, holdRow step S1035;
Step S1034:System connection trusted service management system obtains safety applications installation kit;
Step S1035:System opens safety applications installation kit and obtains safety applications file;
Step S1036:Safety applications file is copied to client by system;
Step S1037:System judges whether there is safety applications file in credible performing environment, has, and continues, and does not hold thenRow step S1033;
Step S1038:Safety applications file is copied under credible performing environment assigned catalogue by system;
Step S1039:Safety applications in system loads are credible performing environment environment.
Step S2:In service stage, conduct interviews control to safety applications;
Specifically, the control that safety applications are conducted interviews, as shown in Figure 10, including:
Step S201:When client application sends safety applications access request, safety applications perform to current untrustedEnvironment is detected, and judges whether risk;
Specifically, first having to verify component, seeing that setting during whether with dispatching from the factory is identical, wind is sent if differentDangerous warning notice, next needs to carry out risk evaluation and test to all clients application, sees with the presence or absence of risk application, also sent out if havingGo out risk warning notice, finally background application detect, see whether the terminal is monitored, risk is sent if monitoredWarning notice.
Step S202:Safety applications send authenticating identity request to client application, judge the security of client application;
Step S203:Safety applications establish escape way with client application, are communicated by escape way.
Specifically, safety applications are poured into identity ID when mounted, while when client application access safety is applied,Public and private secret key pair is generated, public key is sent to client application, client application is sent to peace by the public key encryption communication informationThe communication information is decrypted using private key for full application, safety applications, and such safety applications communicate letter with client application useBreath establishes escape way, and safety applications securely communicate with client application passage safe to use.
Step S3:In the more new stage, safety applications are updated by trusted service management system;
Specifically, described be updated by trusted service management system to safety applications, as shown in figure 14, including:
Step S301:Untrusted application is run in untrusted performing environment;
Step S302:Untrusted applies the version information for obtaining safety applications by escape way with client application;
Step S303:Untrusted application connection trusted service management system obtains the version information of safety applications installation kit;
Step S304:Untrusted application compares safety applications and the version information of safety applications installation kit, if alwaysThis method is exited, is otherwise continued;
Step S305:Safety applications installation kit is obtained from trusted service management system;
Step S306:Open safety applications installation kit and obtain safety applications file;
Step S307:Safety applications file is copied under the assigned catalogue of the credible performing environment of client;
Step S308:Former safety applications file is deleted;
Step S309:Load the safety applications in credible performing environment environment.
It is described above, only it is presently preferred embodiments of the present invention, any formal limitation not is made to the present invention, although thisInvention is disclosed above with preferred embodiment, but is not limited to the present invention, any person skilled in the art,Do not depart from the range of technical solution of the present invention, when the technology contents using the disclosure above make a little change or are modified to equivalentThe equivalent embodiment of change, as long as being the content without departing from technical solution of the present invention, the technical spirit according to the present invention is to the aboveAny simple modification, equivalent change and modification that embodiment is made, in the range of still falling within technical solution of the present invention.

Claims (8)

CN201610225472.6A2016-04-122016-04-12A kind of safety applications collocation method and deviceActiveCN105843653B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201610225472.6ACN105843653B (en)2016-04-122016-04-12A kind of safety applications collocation method and device

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201610225472.6ACN105843653B (en)2016-04-122016-04-12A kind of safety applications collocation method and device

Publications (2)

Publication NumberPublication Date
CN105843653A CN105843653A (en)2016-08-10
CN105843653Btrue CN105843653B (en)2017-11-24

Family

ID=56597369

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201610225472.6AActiveCN105843653B (en)2016-04-122016-04-12A kind of safety applications collocation method and device

Country Status (1)

CountryLink
CN (1)CN105843653B (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN106547633B (en)*2016-10-192019-12-31沈阳微可信科技有限公司Multi-channel communication system and electronic device
CN107995230B (en)*2016-10-262019-10-18中国移动通信有限公司研究院A kind of method for down loading and terminal
CN106778255A (en)*2016-11-242017-05-31工业和信息化部电信研究院Credible performing environment isolation detection method and device based on internal memory traversal
WO2019010863A1 (en)2017-07-132019-01-17华为技术有限公司Method and terminal for controlling trusted application access
WO2019071650A1 (en)*2017-10-092019-04-18华为技术有限公司Method for upgrading application in security element and related device
CN107679858B (en)*2017-10-242019-12-10恒宝股份有限公司Mobile terminal and mobile payment method
CN108733334B (en)*2018-03-132020-06-09Oppo广东移动通信有限公司 Image quality parameter adjustment method, device, terminal and storage medium
CN108600222B (en)*2018-04-242021-01-29北京握奇智能科技有限公司Communication method, system and terminal of client application and trusted application
CN110933668B (en)*2019-11-202023-01-24江苏恒宝智能系统技术有限公司eSIM card and safety control method thereof
CN111428281B (en)*2020-03-252021-06-18支付宝(杭州)信息技术有限公司Operation method and device of trusted program in TEE
CN112800488A (en)*2021-04-122021-05-14支付宝(杭州)信息技术有限公司Application upgrading method and device and electronic equipment
CN113486411B (en)*2021-07-192024-05-14上海擎昆信息科技有限公司Security chip and design method and initialization method thereof

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9525705B2 (en)*2013-11-152016-12-20Oracle International CorporationSystem and method for managing tokens authorizing on-device operations
CN104683336B (en)*2015-02-122018-11-13中国科学院信息工程研究所A kind of Android private data guard method and system based on security domain

Also Published As

Publication numberPublication date
CN105843653A (en)2016-08-10

Similar Documents

PublicationPublication DateTitle
CN105843653B (en)A kind of safety applications collocation method and device
CN108399329B (en)Method for improving security of trusted application program
CN105791284B (en) A data security transmission device and method
CN112131564B (en)Method, device, equipment and medium for encrypting data communication
CN104009977B (en)A kind of method and system of information protection
CN104717192B (en)Legality identification method and intermediate server
US9348980B2 (en)Methods, systems and application programmable interface for verifying the security level of universal resource identifiers embedded within a mobile application
CN108345632A (en)Call method, device, equipment and the computer readable storage medium of the H5 pages
CN105409264A (en)System and method for securing a credential vault on a trusted computing base
CN104427089B (en)Mobile terminal and mobile terminal authority management method
CN107358114A (en)A kind of method and terminal for preventing user data loss
CN110084064A (en)Big data analysis processing method and system based on terminal
CN105844150A (en)Application program data protection method and device
CN105897696A (en)Terminal, server side, and terminal access management method
CN108334404A (en)The operation method and device of application program
CN108694329B (en)Mobile intelligent terminal security event credible recording system and method based on combination of software and hardware
CN103870761B (en)Divulgence prevention method and device based on local virtual environment
US11228910B2 (en)Mobile communication device and method of determining security status thereof
CN109522683A (en)Software source tracing method, system, computer equipment and storage medium
Hadikusuma et al.Methods of stealing personal data on android using a remote administration tool with social engineering techniques
CN106529297A (en)Method and apparatus for obtaining application state information
CN106878233A (en)The read method of secure data, security server, terminal and system
HK1199774A1 (en)Server-based login system, login server and authentication method for the same
CN105491026B (en)A kind of remote loading method of security strategy
Franken et al.Reading between the lines: An extensive evaluation of the security and privacy implications of epub reading systems

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant
TR01Transfer of patent right
TR01Transfer of patent right

Effective date of registration:20190313

Address after:212355 Hengtang Industrial Zone, Yunyang Town, Danyang City, Zhenjiang City, Jiangsu Province

Patentee after:Jiangsu Hengbao Intelligent System Technology Co. Ltd.

Address before:212355 Hengtang Industrial Zone, Zhenjiang City, Jiangsu Province

Patentee before:Hengbao Corp.


[8]ページ先頭

©2009-2025 Movatter.jp