METHOD FOR SECURE CONNECTION
The invention relates a method involving calling of hardware components (i.e. memory, keyboard, microphone, user interface, etc.) being controlled by software units from trusted execution environment [102]; and encryption of the input from these elements within the trusted execution environment [102...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The invention relates a method involving calling of hardware components (i.e. memory, keyboard, microphone, user interface, etc.) being controlled by software units from trusted execution environment [102]; and encryption of the input from these elements within the trusted execution environment [102]; and transmission of the said encrypted data preferably normalized methods to the application in the rich environment [103]; transmission of the said encrypted data to the receiver via the application in the rich environment [103] via the methods of the application of the rich environment [103]; transmission of the said encrypted data using protocols/methods of the application running in the rich environment [103]; and at the receiving device being opened at the trusted execution environment [102] and being displayed to the user as such. |
---|