摘要:
The invention discloses a method and terminal device for continuously supplying power to external element. The method comprises the following steps: when a terminal device switches from a first operating system to a second operating system, a proxy external element application is generated in the second operating system so that the proxy external element application is associated with an external element; by means of this proxy external element application, the external element which is associated with the application in the first operating system before the above switch operation is continuously supplied with power after the above switch operation.
摘要:
The invention provides an apparatus used for security information interaction comprising a first system management device for providing an operational environment for routine applications and a second system management device for providing an operational environment in a safe mode for security applications so as to perform a security information interaction process. The apparatus used for security information interaction disclosed by the invention has a high safety and a wide applicability and is low in cost.
摘要:
The invention discloses an authentication method based on mobile. The method comprises the following steps: providing an authentication apparatus in a mobile device; using the authentication apparatus to conduct authentication on an application and/or secure element in the mobile device in a secure operating system of the mobile device.
摘要:
The present disclosure relates to a smart contract-based data transfer method, comprising the steps of: a data source encrypting data to be transferred based on a first mechanism to form encrypted data, and sending the encrypted data to a smart contract terminal; the smart contract terminal decrypting the encrypted data based on a second mechanism corresponding to the first mechanism to form the decrypted data, and processing the decrypted data by using at least one logic unit to form the resulting data; and the smart contract terminal sending the resulting data to a data-related party; wherein the at least one logic unit executes an instruction set to implement a contract logic, and the instruction set is stored in a blockchain.
摘要:
The invention provides communication method and apparatus based on NFC, and in particular, to communication method and apparatus based on NFC in a security element (SE), a communication method based on NFC in a smart terminal, a security element and a smart terminal. The invention proposes a new way of connection with the NFC device so that the TEE applications can have NFC ability.
摘要:
The invention provides communication method and apparatus based on NFC, and in particular, to communication method and apparatus based on NFC in a security element (SE), a communication method based on NFC in a smart terminal, a security element and a smart terminal. The invention proposes a new way of connection with the NFC device so that the TEE applications can have NFC ability.
摘要:
The invention discloses a method and terminal device for continuously supplying power to external element. The method comprises the following steps: when a terminal device switches from a first operating system to a second operating system, a proxy external element application is generated in the second operating system so that the proxy external element application is associated with an external element; by means of this proxy external element application, the external element which is associated with the application in the first operating system before the above switch operation is continuously supplied with power after the above switch operation.
摘要:
The invention proposes a security information interaction system, apparatus and method based on security carrier's active command. The method comprises: an information interaction terminal, based on a user's command, establishes a security dialogue channel between the information interaction terminal and a security carrier so as to perform a security information interaction process, wherein the user's command indicates a target application associated with the security information interaction process; and the security carrier activates the target application during the establishment of the security dialogue channel and then executes the security information interaction process based on the security dialogue channel. In the security information interaction system, apparatus and method based on security carrier active command disclosed in the invention, the security carrier can initiate an active command to the information interaction terminal.
摘要:
The invention provides an apparatus used for security information interaction comprising a first system management device for providing an operational environment for routine applications and a second system management device for providing an operational environment in a safe mode for security applications so as to perform a security information interaction process. The apparatus used for security information interaction disclosed by the invention has a high safety and a wide applicability and is low in cost.
摘要:
The present invention relates to a method for access control of a multimedia system to a secure operating system and a mobile terminal for implementing the method. The method includes the steps of: initiating an application access request for selecting a trusted application from a client application of a multimedia system to a secure operating system; making a decision as to whether the client application is a malicious application, and if not, proceeding to a next step, if yes, returning Selection Failure to the client application and performing an interrupt handling; sending the application access request from the multimedia system to the secure system; and acquiring, at the secure operating system, the trusted application based on the application access request and returning the trusted application to the multimedia system. The malicious accesses initiated by a malicious application to a trusted application in a securing operating system can be prevented without switching between systems, and the problem that a trusted application cannot be accessed due to malicious access can be avoided.