Trust-zone-based end-to-end security

作者: Pai Peng , Bulent Kasman , Kunal Patel , An Liu , Balakrishna Venkataraman

DOI:

关键词:

摘要: Methods, electronic devices, and systems for exchanging encrypted information. A method information by an device includes generating one or more certificates public private key pairs. The are signed using a unique that is pre-stored on the device. also sending to server of token service provider (TSP). further receiving TSP from server. identifying keys based received certificates. Additionally, transmitting message including identified signature

参考文章(217)
Oleg Makhotin, Igor Karpenko, Erick Wong, John Sheets, Glenn Powell, Kiushan Pirzadeh, Frederick Liu, Methods and systems for provisioning mobile devices with payment credentials ,(2014)
Christopher S. Keohane, Stephen G. Terlecki, Brian H. Mayo, William P. Opet, Anthony Romano, Shawn Matthew Dahlen, Mobile applications platform ,(2013)
Jimmy Tai Kwan Tang, William Wang Graylin, Man Ho Li, Mobile checkout systems and methods ,(2015)
Kenneth G. Mages, Chi Wah Lo, Tai Kwan Jimmy Tang, Kent H. Mages, Apparatus and method for conducting securing financial transactions ,(2008)
Gert Stephanus Herman Maritz, Daniel Jacobus Muller, Albertus Stefanus Van Tonder, Christiaan Johannes Petrus Brand, Batch transaction authorisation ,(2014)
Brett Joseph Wedewer, Mushegh Malkhasyan, Paul C. Roberts, Lei Zhao, Gilbert Wong, Three party attestation of untrusted software on a robot ,(2011)
Julius Schauerhuber, Heinrich Beidl, Erwin Hrdy, Cryptographic authentication and identification method using real-time encryption ,(2013)
Kevin Oliver, John Berkley, William T. Cooper, Matthew D. Ozvat, Systems and Methods for Expedited Automated Merchant Boarding ,(2013)