×

System for securely entering particular information and method thereof

  • US 9,891,823 B2
  • Filed: 10/29/2014
  • Issued: 02/13/2018
  • Est. Priority Date: 09/19/2014
  • Status: Active Grant
First Claim
Patent Images

1. A system for securely entering particular information, comprising:

  • a mobile device and a background server,wherein the mobile device comprises a processor, and the processor is configured to implement switching between a non-secure execution environment and a secure execution environment;

    wherein the processor is virtualized into a first processor and a second processor, the first processor is configured to execute a business function application in the non-secure execution environment, and the second processor is configured to execute a particular information entering application and encrypt entered particular information in the secure execution environment;

    wherein the particular information entering application is associated with the business function application; and

    wherein implementing the switching between the non-secure execution environment and the secure execution environment comprises;

    triggering, in a case that a particular information entering is required by the business function application executed by the first processor, the second processor to perform the particular information entering, and returning, to the first processor, an encryption result obtained by encrypting the entered particular information by the second processor;

    wherein the background server is configured to authenticate the encryption result from the first processor;

    wherein the background server is further configured to generate key seed information, the key seed information is for generating a key for encrypting the entered particular information, and the first processor is further configured to acquire, in the non-secure execution environment, the key seed information from the background server; and

    wherein implementing the switching between the non-secure execution environment and the secure execution environment comprises;

    in response to the particular information entering being required by the business function application executed by the first processor, triggering the second processor through the key seed information, to perform the particular information entering, and wherein encrypting the entered particular information in the secure execution environment comprises encrypting the entered particular information by using the key generated from the key seed information.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×