WO2019109852A1 - 一种数据传输方法及*** - Google Patents

一种数据传输方法及*** Download PDF

Info

Publication number
WO2019109852A1
WO2019109852A1 PCT/CN2018/118133 CN2018118133W WO2019109852A1 WO 2019109852 A1 WO2019109852 A1 WO 2019109852A1 CN 2018118133 W CN2018118133 W CN 2018118133W WO 2019109852 A1 WO2019109852 A1 WO 2019109852A1
Authority
WO
WIPO (PCT)
Prior art keywords
tam
application
security application
server
identity authentication
Prior art date
Application number
PCT/CN2018/118133
Other languages
English (en)
French (fr)
Inventor
王雪松
Original Assignee
阿里巴巴集团控股有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 阿里巴巴集团控股有限公司 filed Critical 阿里巴巴集团控股有限公司
Publication of WO2019109852A1 publication Critical patent/WO2019109852A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Definitions

  • the present application relates to the field of communications technologies, and in particular, to a data transmission method and system.
  • the terminal device includes a Trusted Execution Environment (TEE) and a Rich Execution Environment (REE), and the rich execution environment is also called an untrusted execution environment.
  • TEE Trusted Execution Environment
  • REE Rich Execution Environment
  • the client that is, the service client
  • the secure end service security application
  • Business clients are used to perform user operations
  • business security applications are used to protect sensitive resources such as payments, fingerprints, and digital rights.
  • the application server (hereinafter referred to as the application server) needs to send sensitive resources to the service security application in the trusted execution environment TEE of the terminal device; for example, the application server needs to update the digital certificate in the service security application, and the application server Deliver the payment QR code to the business security application.
  • the process of the application server sending the sensitive resource to the service security application may be: the application server may establish a secure channel with the service client of the non-trusted execution environment in the terminal device, and then send the encrypted sensitive resource to the service client through the secure channel. .
  • the service client decrypts the encrypted sensitive resource to obtain the sensitive resource, and transmits the sensitive resource to the service security application in the trusted execution environment.
  • the service client in the terminal device is in an open non-trusted execution environment. After the service client obtains the decrypted sensitive resource, the sensitive resource is exposed to the non-trusted execution environment, so there are sensitive resources. The risk of disclosure.
  • the present application provides a data transmission method and system, which can directly provide an end-to-end secure channel, that is, establish a secure channel between an application server and a service security application, thereby preventing leakage of sensitive resources.
  • a data transmission system comprising:
  • An application server configured to send an application identifier of the security application and data to be sent to the security application to the TAM server;
  • the TAM server is configured to perform bidirectional authentication with the TAM security application of the trusted execution environment, and negotiate a session key after the mutual authentication succeeds; receive the application identifier and the data sent by the application server, and use the session key Performing an encryption operation on the data, and transmitting the encrypted data and the application identifier to the terminal device;
  • a terminal device configured to control a TAM security application in the trusted execution environment to perform mutual authentication with the TAM server, and negotiate a session key after the two-way authentication succeeds;
  • the TAM client of the non-trusted execution environment receives the TAM server Transmitting the encrypted data and the application identifier, and transmitting the encrypted data and the application identifier to the TAM security application;
  • the TAM security application decrypting the encryption by using the session key
  • the data obtains data, and the data is sent to the security application corresponding to the application identifier.
  • the TAM security application in the trusted execution environment performs mutual authentication with the TAM server, specifically:
  • the TAM server sends an identity authentication request to the TAM security application via the TAM client, the TAM security application generates an identity authentication credential, and the TAM security application sends an identity authentication credential to the TAM via the TAM client a server, the TAM server performs identity authentication on the TAM security application based on the identity authentication request and the identity authentication credential;
  • the TAM security application sends an identity authentication request to the TAM server via the TAM client, the TAM server generates an identity authentication credential, and the TAM server sends the identity authentication credential to the TAM security application via the TAM client.
  • the TAM security application performs identity authentication on the TAM server based on the identity authentication request and the identity authentication credential;
  • the session key is determined based on the identity authentication request and the identity authentication credential.
  • the process for the terminal device to send the data to the security application corresponding to the application identifier includes:
  • the TAM security application invokes an internal application interface of the trusted execution environment
  • a data transmission method includes:
  • the TAM security application in the trusted execution environment of the terminal device performs mutual authentication, and the negotiation of the session key after the two-way authentication is passed includes:
  • the session key is determined based on the identity authentication request and the identity authentication credential.
  • the sending the encrypted data and the application identifier of the security application to the TAM security application of the terminal device including:
  • a data transmission method includes:
  • the TAM security application in the trusted execution environment performs mutual authentication with the TAM server, and negotiates the session key after the two-way authentication is passed;
  • the TAM client of the non-trusted execution environment receives the encrypted data and the application identifier sent by the TAM server, and transmits the encrypted data and the application identifier to the TAM security application;
  • the TAM security application decrypts the encrypted data using the session key to obtain data, and sends the data to a security application corresponding to the application identifier.
  • the TAM security application in the trusted execution environment performs mutual authentication with the TAM server, and negotiates the session key after the two-way authentication is passed, including:
  • the TAM security application receives the identity authentication request sent by the TAM server by the TAM client, generates an identity authentication credential, and sends the identity authentication credential to the TAM server via the TAM client for the TAM server. Authenticating the TAM security application;
  • the TAM security application sends an identity authentication request to the TAM server via the TAM client, and obtains an identity authentication credential sent by the TAM server, and performs identity authentication on the TAM server;
  • the session key is determined based on the identity authentication request and the identity authentication credential.
  • the transmitting the encrypted data and the application identifier to the TAM security application including:
  • the TAM client invokes an application program interface of the trusted execution environment
  • the transmitting the encrypted data and the application identifier to the TAM security application including:
  • the TAM security application invokes an internal application interface of the trusted execution environment
  • a data transmission system comprising:
  • An application server configured to perform mutual authentication with the service security application in the trusted execution environment, and negotiate a session key after the mutual authentication succeeds; use the session key to encrypt the data, and send the encrypted data to the terminal device. ;
  • a terminal device configured to control a service security application in the trusted execution environment to perform mutual authentication with the application server, and negotiate a session key after the two-way authentication succeeds;
  • the service client of the non-trusted execution environment receives the application server Transmitting the encrypted data and transmitting the encrypted data to the service security application;
  • the service security application decrypting the encrypted data using the session key to obtain data.
  • a data transmission method includes:
  • a data transmission method includes:
  • the service security application in the trusted execution environment performs mutual authentication with the application server, and negotiates the session key after the two-way authentication is passed;
  • the service client of the non-trusted execution environment receives the encrypted data sent by the application server, and transmits the encrypted data to the service security application;
  • the security application decrypts the encrypted data using the session key to obtain data.
  • This application directly authenticates the session key between the TAM server and the TAM security application in the trusted execution environment, which is equivalent to establishing a secure channel between the TAM server and the TAM security application.
  • the TAM server sends the encrypted data to the TAM security application on the secure channel, and then the TAM security application transmits the data to the service security application.
  • the process of sending the encrypted data to the TAM security application by the TAM server is equivalent to transmitting data in a secure channel. In this way, when the data is sensitive, it can prevent sensitive resources from being exposed in the non-trusted environment, thus protecting sensitive resources.
  • FIG. 1 is a schematic structural diagram of a data transmission system according to an embodiment of the present application.
  • FIG. 2 is a flowchart of a data transmission method according to an embodiment of the present application.
  • FIG. 3 is a flowchart of still another data transmission method according to an embodiment of the present application.
  • 4a is a schematic structural diagram of a data transmission system according to an embodiment of the present application.
  • 4b is a flowchart of a data transmission method according to an embodiment of the present application.
  • FIG. 5 is a flowchart of still another data transmission method disclosed in the embodiment of the present application.
  • Sensitive resources resources that require security, such as keys, digital certificates, and important data.
  • TEE English full name Trusted Execution Environment, Chinese full name trusted execution environment, TEE has a separate operating system for storing, processing and protecting sensitive resources.
  • REE English full name Rich Execution Environment, Chinese full name rich execution environment, because of its openness, it is also called untrusted execution environment.
  • the non-trusted execution environment has strong processing power and weak security.
  • TAM English full name Trusted Application Manager, Chinese full name trusted application management system.
  • the trusted application management system is used to manage security applications inside the TEE.
  • TA English full name Trusted Application, Chinese full name security application, the application running inside TEE is called security application.
  • an application server 100 and a terminal device 200 are included.
  • the untrusted execution environment of the terminal device includes a service client, and the trusted execution environment of the terminal device includes a service security application.
  • a first embodiment of a data transmission method is provided. Referring to Figure 2, the following steps are included:
  • Step S201 The application server 100 performs mutual authentication with the service security application of the trusted execution environment, and negotiates the session key after the authentication succeeds.
  • the application server sends an identity authentication request to the service security application by the service client, and the service security application generates the identity authentication credential, and the service security application sends the identity authentication credential to the server through the service client.
  • the application server authenticates the business security application based on the identity authentication request and the identity authentication credential. After the application server successfully authenticates the service security application, the session key is determined based on the identity authentication request and the identity authentication credential.
  • the service security application sends an identity authentication request to the application server via the service client, and the application server generates an identity authentication credential, and the application server sends the identity authentication credential to the service security application via the service client.
  • the business security application authenticates the application server based on the identity authentication request and the identity authentication credentials. After the service security application successfully authenticates the application server, the session key is determined based on the identity authentication request and the identity authentication credential.
  • the "Alipay” application is taken as an example to illustrate this step: the "Alipay” application server performs mutual authentication with the "Alipay” client and the "Alipay” security application, and negotiates the session key after successful authentication.
  • the application directly performs mutual authentication between the application server and the service security application in the trusted execution environment and negotiates the session key, which is equivalent to establishing a secure channel between the application server and the service security application. Subsequently, the secure channel can be used to exchange sensitive resources between the application server 100 and the service security application.
  • Step S202 The application server 100 encrypts the sensitive resource by using the session key, and sends the encrypted sensitive resource to the service client, and the service client transmits the encrypted sensitive resource to the service security application.
  • the application server 100 encrypts the sensitive resource by using the session key to obtain the encrypted sensitive resource. Then, the application server 100 sends the encrypted sensitive resource to the service client because the external device cannot directly interact with the service security application.
  • the service client invokes the application interface TEE Client API of the trusted execution environment to transmit the encrypted sensitive resources to the service security application.
  • the example of the Alipay application is continued as an example: the Alipay application server 100 encrypts the sensitive resource by using the session key, and sends the encrypted sensitive resource to the Alipay client, Alipay.
  • the client transmits the encrypted sensitive resources to the "Alipay" security application.
  • the encrypted data is transmitted during the transmission process of the application server and the service security application, it is equivalent to transmitting sensitive resources in the secure channel. Therefore, the present application does not have the problem that sensitive resources are exposed to a non-trusted environment, so that sensitive resources can be protected.
  • Step S203 The service security application decrypts the encrypted sensitive resource by using the session key.
  • the service security application can use the session key negotiated in step S101 to decrypt the encrypted sensitive resource, thereby obtaining and using the sensitive resource.
  • "Alipay” security application uses the session key to decrypt the encrypted sensitive resources to obtain and use sensitive resources.
  • the application directly performs mutual authentication between the application server and the service security application in the trusted execution environment and negotiates the session key, which is equivalent to establishing a secure channel between the application server and the service security application.
  • the process of the application server sending the encrypted sensitive resource to the service security application is equivalent to transmitting the sensitive resource in the secure channel. This protects sensitive resources by exposing sensitive resources to non-trusted environments.
  • the terminal device contains many applications.
  • the application server corresponding to the application and the security application corresponding to the application can adopt the scheme shown in FIG. 2, so as to implement the purpose of the application server sending the sensitive resource to the security application.
  • the application server and the service security application of each application need to perform the process of mutual authentication and negotiation of the session key.
  • the terminal device it takes a lot of resources to process the two-way authentication and negotiate the session key.
  • a second embodiment of the data transmission system is provided. Referring to FIG. 4a, a plurality of application servers 100, a TAM server 300, and a terminal device 200 are included.
  • the TAM server 300 is added between the application server 100 and the terminal device 200, and the TAM client working with the TAM server is installed in the non-trusted execution environment of the terminal device, and the TAM client is installed in the trusted execution environment.
  • TAM security applications that work together.
  • the application server, the service client, and the service security application corresponding to each application do not need to perform the two-way authentication and the cumbersome process of negotiating the key, and each application server only needs to send the sensitive resource and the application identifier to the TAM server.
  • the TAM server, the TAM client, and the TAM security application work together, and the process of mutual authentication and negotiation of the symmetric key by the TAM server and the TAM security application replaces the two-way authentication and negotiation between each application server and each service security application in the first embodiment.
  • the process of symmetric keys are used to generate symmetric keys.
  • multiple application servers can manage sensitive resources through the second embodiment of the data transmission system, and the data transmission system embodiment 1 need not be separately maintained for each application server, thereby reducing the workload of application development and maintenance.
  • a second embodiment of a data transmission method is provided. Since the execution process of each application server is consistent, the execution process of the second embodiment of the data transmission system is described by taking an application server as an example.
  • Step S401 The application server 100 sends the application identifier and the sensitive resource of the service security application to the TAM server 300.
  • the application server 100 corresponding to the Alipay application sends the application identifier of the Alipay and the sensitive resource that needs to be sent to the security application of the Alipay to the TAM server 300 .
  • Step S402 The TAM server 300 performs mutual authentication with the TAM security application of the trusted execution environment, and negotiates the session key after the mutual authentication succeeds.
  • the TAM server sends an identity authentication request to the TAM security application via the TAM client, and the TAM security application generates an identity authentication credential, and the TAM security application sends the identity authentication credential to the TAM server via the TAM client.
  • the TAM server authenticates the TAM security application based on the identity authentication request and the identity authentication credential.
  • the session key is determined based on the identity authentication request and the identity authentication credential.
  • the TAM security application sends an identity authentication request to the TAM server via the TAM client, and the TAM server generates an identity authentication credential, and the TAM server sends the identity authentication credential to the TAM security application via the TAM client.
  • the TAM security application authenticates the TAM server based on the identity authentication request and the identity authentication credential; after the TAM security application successfully authenticates the TAM server, the session key is determined based on the identity authentication request and the identity authentication credential.
  • Step S403 The TAM server 300 receives the application identifier and the sensitive resource sent by the application server, encrypts the sensitive resource by using the session key, and sends the encrypted sensitive resource and the application identifier to the terminal device.
  • TAM client for the Central African Trusted Execution Environment.
  • Step S404 The TAM client of the non-trusted execution environment receives the encrypted sensitive resource and the application identifier sent by the TAM server, and transmits the encrypted sensitive resource and the application identifier to the TAM. Security application.
  • the TAM client invokes the application interface TEE Client API of the trusted execution environment to transmit the encrypted sensitive resources to the TAM security application.
  • the present application does not have the problem that sensitive resources are exposed to a non-trusted environment, so that sensitive resources can be protected.
  • Step S405 The TAM security application uses the session key to decrypt the encrypted sensitive resource to obtain a sensitive resource, and sends the sensitive resource to the security application corresponding to the application identifier.
  • the TAM security application decrypts the encrypted sensitive resource and obtains the sensitive resource
  • the sensitive resource is finally transmitted to the security application corresponding to the application identifier by calling the internal application interface (TEE Internal API) of the trusted execution environment.
  • TAE Internal API the internal application interface
  • the example of the Alipay application is used as an example.
  • the TAM security application sends the encrypted sensitive resource to the Alipay security application corresponding to the Alipay application identifier through the TEE Internal API.
  • This application directly authenticates the session key between the TAM server and the TAM security application in the trusted execution environment, which is equivalent to establishing a secure channel between the TAM server and the TAM security application.
  • the TAM server sends the encrypted sensitive data to the TAM security application on the secure channel, and then transmits it to the service security application by the TAM security application.
  • the process of sending the encrypted sensitive resource to the TAM security application by the TAM server is equivalent to transmitting sensitive resources in the secure channel. This protects sensitive resources by exposing sensitive resources to non-trusted environments.
  • multiple application servers can manage sensitive resources through the second embodiment of the data transmission system, and the data transmission system embodiment 1 need not be separately maintained for each application server, thereby reducing the workload of application development and maintenance. .
  • the functions described in the method of the present embodiment can be stored in a computing device readable storage medium if implemented in the form of a software functional unit and sold or used as a standalone product. Based on such understanding, a portion of the embodiments of the present application that contributes to the prior art or a portion of the technical solution may be embodied in the form of a software product stored in a storage medium, including a plurality of instructions for causing a
  • the computing device (which may be a personal computer, server, mobile computing device, or network device, etc.) performs all or part of the steps of the methods described in various embodiments of the present application.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Communication Control (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请提供了一种数据传输方法及***,其中一种方法包括:与终端设备中可信执行环境的TAM安全应用进行双向认证,在双向认证通过后协商出会话密钥;利用所述会话密钥对待发送至安全应用的数据进行加密操作;发送加密后的数据和所述安全应用的应用标识至终端设备的TAM安全应用。TAM服务器发送加密后的数据至TAM安全应用的过程,相当于在安全通道传输数据。这样可以防止数据暴露在非可信环境中,从而保护数据。

Description

一种数据传输方法及***
本申请要求2017年12月08日递交的申请号为201711292803.9、发明名称为“一种数据传输方法及***”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信技术领域,尤其涉及一种数据传输方法及***。
背景技术
终端设备包括可信执行环境(Trusted Execution Environment,TEE)和丰富执行环境(Rich Execution Environment,REE),丰富执行环境又称不可信执行环境。
通常情况下,终端设备安装应用的过程中,会在丰富执行环境安装应用的客户端(也即业务客户端),在可信执行环境安装应用的安全端(业务安全应用)。业务客户端用于执行用户操作,业务安全应用用于保护支付、指纹和数字版权等敏感资源。
在实际业务中,应用对应的服务器(后续称为应用服务器)需要发送敏感资源至终端设备的可信执行环境TEE内的业务安全应用;例如,应用服务器需要更新业务安全应用中数字证书,应用服务器下发支付二维码至业务安全应用等。
目前,应用服务器发送敏感资源至业务安全应用的过程可以为:应用服务器可以与终端设备中非可信执行环境的业务客户端建立安全通道,然后通过安全通道发送加密后的敏感资源至业务客户端。业务客户端解密加密后的敏感资源获得敏感资源,并将敏感资源传输到可信执行环境的业务安全应用中。
但是,终端设备中的业务客户端处于具有开放性的非可信执行环境中,在业务客户端获得解密后的敏感资源后,会导致敏感资源暴露在非可信执行环境中,因此存在敏感资源泄露的风险。
发明内容
鉴于此,本申请提供一种数据传输方法及***,可以直接提供端到端的安全通道,即在应用服务器与业务安全应用之间建立安全通道,从而可以防止敏感资源泄露。
为了实现上述目的,本申请提供了以下技术特征:
一种数据传输***,包括:
应用服务器,用于将安全应用的应用标识和待发送至所述安全应用的数据发送至 TAM服务器;
TAM服务器,用于与可信执行环境的TAM安全应用进行双向认证,并在双向认证成功后协商出会话密钥;接收所述应用服务器发送的应用标识和所述数据,利用所述会话密钥对所述数据进行加密操作,发送加密后的数据和所述应用标识至终端设备;
终端设备,用于控制可信执行环境中的TAM安全应用与所述TAM服务器进行双向认证,并在双向认证成功后协商出会话密钥;非可信执行环境的TAM客户端接收所述TAM服务器发送的所述加密后的数据和所述应用标识,并传输所述加密后的数据和所述应用标识至所述TAM安全应用;所述TAM安全应用利用所述会话密钥解密所述加密后的数据获得数据,发送该数据至所述应用标识对应的所述安全应用。
可选的,所述可信执行环境中的TAM安全应用与所述TAM服务器进行双向认证,具体包括:
所述TAM服务器经所述TAM客户端发送身份认证请求至所述TAM安全应用,所述TAM安全应用生成身份认证凭证,所述TAM安全应用经所述TAM客户端发送身份认证凭证至所述TAM服务器,所述TAM服务器基于所述身份认证请求和所述身份认证凭证对所述TAM安全应用进行身份认证;
所述TAM安全应用经所述TAM客户端发送身份认证请求至所述TAM服务器,所述TAM服务器生成身份认证凭证,所述TAM服务器经所述TAM客户端发送身份认证凭证至所述TAM安全应用,所述TAM安全应用基于所述身份认证请求和所述身份认证凭证对所述TAM服务器进行身份认证;
所述TAM服务器与所述TAM安全应用双向认证成功后,基于所述身份认证请求和所述身份认证凭证确定会话密钥。
可选的,所述终端设备执行发送该数据至所述应用标识对应的所述安全应用的过程,具体包括:
所述TAM安全应用调用可信执行环境的内部应用程序接口;
通过所述内部应用程序接口发送该数据至所述应用标识对应的所述安全应用。
一种数据传输方法,包括:
与终端设备中可信执行环境的TAM安全应用进行双向认证,在双向认证通过后协商出会话密钥;
利用所述会话密钥对待发送至安全应用的数据进行加密操作;
发送加密后的数据和所述安全应用的应用标识至终端设备的TAM安全应用。
可选的,所述与终端设备中可信执行环境的TAM安全应用进行双向认证,在双向认证通过后协商出会话密钥包括:
发送身份认证请求至终端设备中非可信执行环境的TAM客户端,并由所述TAM客户端传输至所述身份认证请求至所述TAM安全应用,获得所述TAM安全应用发送的身份认证凭证,对所述TAM安全应用进行身份认证;
接收所述TAM安全应用经所述TAM客户端发送的身份认证请求,生成身份认证凭证,经所述TAM客户端发送所述身份认证凭证至所述TAM安全应用,供所述TAM安全应用对TAM服务器进行身份认证;
所述TAM服务器对TAM安全应用对认证成功后,基于所述身份认证请求和所述身份认证凭证确定会话密钥。
可选的,所述发送加密后的数据和所述安全应用的应用标识至终端设备的TAM安全应用,包括:
发送所述加密后的数据和所述应用标识至所述TAM客户端,并经所述TAM客户端发送所述加密后的数据和所述应用标识至所述TAM安全应用。
一种数据传输方法,包括:
可信执行环境中的TAM安全应用与TAM服务器进行双向认证,在双向认证通过后协商出会话密钥;
非可信执行环境的TAM客户端接收所述TAM服务器发送的加密后的数据和应用标识,并传输所述加密后的数据和所述应用标识至所述TAM安全应用;
所述TAM安全应用利用所述会话密钥解密所述加密后的数据获得数据,并发送该数据至所述应用标识对应的安全应用。
可选的,可信执行环境中的TAM安全应用与TAM服务器进行双向认证,在双向认证通过后协商出会话密钥,包括:
所述TAM安全应用经所述TAM客户端接收所述TAM服务器发送的身份认证请求,生成身份认证凭证,经所述TAM客户端发送所述身份认证凭证至所述TAM服务器,供所述TAM服务器对所述TAM安全应用进行身份认证;
所述TAM安全应用经所述TAM客户端发送身份认证请求至所述TAM服务器,并获取所述TAM服务器发送的身份认证凭证,对所述TAM服务器进行身份认证;
所述TAM安全应用对所述TAM安全应用验证成功后,基于所述身份认证请求和所述身份认证凭证确定会话密钥。
可选的,所述传输所述加密后的数据和所述应用标识至所述TAM安全应用,包括:
所述TAM客户端调用可信执行环境的应用程序接口;
通过该应用程序接口传输所述加密后的数据和所述应用标识至所述TAM安全应用。
可选的,所述传输所述加密后的数据和所述应用标识至所述TAM安全应用,包括:
所述TAM安全应用调用可信执行环境的内部应用程序接口;
通过该应用程序接口发送该数据至所述应用标识对应的安全应用。
一种数据传输***,包括:
应用服务器,用于与可信执行环境的业务安全应用进行双向认证,并在双向认证成功后协商出会话密钥;利用所述会话密钥对数据进行加密操作,发送加密后的数据至终端设备;
终端设备,用于控制可信执行环境中的业务安全应用与所述应用服务器进行双向认证,并在双向认证成功后协商出会话密钥;非可信执行环境的业务客户端接收所述应用服务器发送的所述加密后的数据,并传输所述加密后的数据至所述业务安全应用;所述业务安全应用利用所述会话密钥解密所述加密后的数据获得数据。
一种数据传输方法,包括:
与终端设备中可信执行环境的业务安全应用进行双向认证,在双向认证通过后协商出会话密钥;
利用所述会话密钥对待发送至业务安全应用的数据进行加密操作;
发送加密后的数据至终端设备的业务安全应用。
一种数据传输方法,包括:
可信执行环境中的业务安全应用与应用服务器进行双向认证,在双向认证通过后协商出会话密钥;
非可信执行环境的业务客户端接收应用服务器发送的加密后的数据,并传输所述加密后的数据至所述业务安全应用;
所述安全应用利用所述会话密钥解密所述加密后的数据获得数据。
通过以上技术手段,可以实现以下有益效果:
本申请直接在TAM服务器与可信执行环境中的TAM安全应用之间进行双向认证并协商出会话密钥,这相当于在TAM服务器与TAM安全应用之间建立安全通道。TAM服务器在安全通道发送加密后的数据至TAM安全应用,再由TAM安全应用传输至业务安全应用。
TAM服务器发送加密后的数据至TAM安全应用的过程,相当于在安全通道传输数据。这样在数据为敏感资源的情况下,可以防止敏感资源暴露在非可信环境中,从而保护敏感资源。
附图说明
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本申请实施例公开的一种数据传输***的结构示意图;
图2为本申请实施例公开的一种数据传输方法的流程图;
图3为本申请实施例公开的又一种数据传输方法的流程图;
图4a为本申请实施例公开的一种数据传输***的结构示意图;
图4b为本申请实施例公开的一种数据传输方法的流程图;
图5为本申请实施例公开的又一种数据传输方法的流程图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
术语解释:
敏感资源:密钥、数字证书和重要数据等需要安全保护的资源。
TEE:英文全称Trusted Execution Environment,中文全称可信执行环境,TEE具有独立的操作***,用于存储、处理和保护敏感资源。
REE:英文全称Rich Execution Environment,中文全称丰富执行环境,由于具有开放性所以又称非可信执行环境。非可信执行环境处理能力较强,安全性较弱。
TAM:英文全称Trusted Application Manager,中文全称可信应用管理***。可信应用管理***用于管理TEE内部的安全应用。
TA:英文全称Trusted Application,中文全称安全应用,运行在TEE内部的应用称 为安全应用。
为了便于理解和描述,本申请说明书以敏感资源作为数据的一种示例,进行详细描述。可以理解的是,在其它应用场景下数据可以为其它实现形式,本申请不限定数据的具体内容和形式。
为了便于本领域技术人员了解,本申请提供一种数据传输***实施例一。参见图1,包括:应用服务器100和终端设备200。终端设备的不可信执行环境包括业务客户端,终端设备的可信执行环境包括业务安全应用。
根据本申请的一个实施例,提供一种数据传输方法实施例一。参见图2,包括以下步骤:
步骤S201:应用服务器100与可信执行环境的业务安全应用进行双向认证,并在认证成功后协商出会话密钥。
应用服务器经业务客户端发送身份认证请求至业务安全应用,业务安全应用生成身份认证凭证,业务安全应用经业务客户端发送身份认证凭证应用至服务器。应用服务器基于身份认证请求和身份认证凭证对业务安全应用进行身份认证。应用服务器对业务安全应用认证成功后,基于身份认证请求和身份认证凭证确定会话密钥。
与此同时,业务安全应用经业务客户端发送身份认证请求至应用服务器,应用服务器生成身份认证凭证,应用服务器经业务客户端发送身份认证凭证至业务安全应用。业务安全应用基于身份认证请求和身份认证凭证对应用服务器进行身份认证。业务安全应用对应用服务器认证成功后,基于身份认证请求和身份认证凭证确定会话密钥。
参见图3,以“支付宝”应用为例对本步骤进行举例说明:“支付宝”应用服务器经“支付宝”的客户端与“支付宝”安全应用进行双向认证,并在认证成功后协商出会话密钥。
关于双向认证的具体过程以及协商会话密钥的具体过程已为成熟技术,在此不再赘述。
本申请直接在应用服务器与可信执行环境中的业务安全应用之间进行双向认证并协商出会话密钥,这相当于在应用服务器与业务安全应用之间建立安全通道。后续,应用服务器100与业务安全应用之间可以采用安全通道交互敏感资源。
步骤S202:应用服务器100利用会话密钥对敏感资源进行加密,发送加密后的敏感资源至业务客户端,业务客户端传输加密后的敏感资源至业务安全应用。
应用服务器100利用会话密钥对敏感资源进行加密,获得加密后的敏感资源。然后,由于外界设备不能直接与业务安全应用进行交互,所以应用服务器100发送加密后的敏感资源至业务客户端。
业务客户端会调用可信执行环境的应用程序接口TEE Client API,传输加密后的敏感资源至业务安全应用。
参见图3,继续以“支付宝”应用为例对本步骤进行举例说明:“支付宝”应用服务器100利用会话密钥对敏感资源进行加密,发送加密后的敏感资源至“支付宝”客户端,“支付宝”客户端传输加密后的敏感资源至“支付宝”安全应用。
由于在应用服务器与业务安全应用传输过程中,传输的为加密后的敏感资源,所以,相当于在安全通道传输敏感资源。因此,本申请不存在敏感资源暴露在非可信环境的问题,所以可以保护敏感资源。
步骤S203:业务安全应用利用会话密钥解密加密后的敏感资源。
业务安全应用可以利用步骤S101中协商出的会话密钥,解密加密后的敏感资源,从而获得并使用敏感资源。
继续以“支付宝”应用为例对本步骤进行举例说明:“支付宝”安全应用利用会话密钥解密加密后的敏感资源,从而获得并使用敏感资源。
通过以上技术手段,可以实现以下有益效果:
本申请直接在应用服务器与可信执行环境中的业务安全应用之间进行双向认证并协商出会话密钥,这相当于在应用服务器与业务安全应用之间建立安全通道。
应用服务器发送加密后的敏感资源至业务安全应用的过程,相当于在安全通道传输敏感资源。这样可以防止敏感资源暴露在非可信环境中,从而保护敏感资源。
可以理解的是,终端设备包含很多应用。对于各个应用而言:应用对应的应用服务器与应用对应的安全应用,均可以采用图2所示的方案,以便实现应用服务器发送敏感资源至安全应用的目的。
可以理解的是,在终端设备包含很多应用的情况下,各个应用的应用服务器与业务安全应用均需要进行双向认证并协商会话密钥的过程。对终端设备而言,需要花费较多资源在双向认证并协商会话密钥的过程。
为了更加简单方便的实现应用服务器发送敏感资源至业务安全应用的方案,根据本 申请的另一实施例,提供一种数据传输***实施例二。参见图4a,包括:多个应用服务器100、TAM服务器300和终端设备200。
本实施例中在应用服务器100与终端设备200之间增加TAM服务器300,并在终端设备的非可信执行环境安装与TAM服务器协同工作的TAM客户端,在可信执行环境安装与TAM客户端协同工作的TAM安全应用。
本实施例中,各个应用对应的应用服务器、业务客户端和业务安全应用,无需再执行双向认证和协商密钥的繁琐过程,各个应用服务器仅需将敏感资源和应用标识发送至TAM服务器。
由TAM服务器、TAM客户端和TAM安全应用协同工作,由TAM服务器与TAM安全应用的双向认证并协商对称密钥的过程,代替实施例一中各个应用服务器与各个业务安全应用的双向认证并协商对称密钥的过程。
本实施例中多个应用服务器均可以通过数据传输***实施例二来管理敏感资源,不需要再为各个应用服务器单独维护数据传输***实施例一,从而可以减少应用开发和维护的工作量。
根据本申请提供的另一实施例,提供一种数据传输方法的实施例二。由于各个应用服务器的执行过程是一致的,因此以一个应用服务器为例,对数据传输***实施例二的执行过程进行描述。
参见图4b,包括以下步骤:
步骤S401:应用服务器100发送业务安全应用的应用标识和敏感资源至TAM服务器300。
参见图5,以“支付宝”应用为例,“支付宝”应用对应的应用服务器100发送“支付宝”的应用标识和需要向“支付宝”的安全应用发送的敏感资源发送至TAM服务器300。
步骤S402:TAM服务器300与可信执行环境的TAM安全应用进行双向认证,并在双向认证成功后协商出会话密钥。
参见图5,TAM服务器经TAM客户端发送身份认证请求至TAM安全应用,TAM安全应用生成身份认证凭证,TAM安全应用经TAM客户端发送身份认证凭证至所述TAM服务器。TAM服务器基于身份认证请求和身份认证凭证对所述TAM安全应用进行身份认证。TAM服务器对TAM安全应用认证成功后,基于身份认证请求和身份认证 凭证确定会话密钥。
参见图5,TAM安全应用经TAM客户端发送身份认证请求至TAM服务器,TAM服务器生成身份认证凭证,TAM服务器经TAM客户端发送身份认证凭证至TAM安全应用。TAM安全应用基于身份认证请求和身份认证凭证对TAM服务器进行身份认证;TAM安全应用对TAM服务器认证成功后,基于身份认证请求和身份认证凭证确定会话密钥。
关于双向认证的具体过程以及协商会话密钥的具体过程已为成熟技术,在此不再赘述。
步骤S403:TAM服务器300接收所述应用服务器发送的应用标识和所述敏感资源,利用所述会话密钥对所述敏感资源进行加密操作,发送加密后的敏感资源和所述应用标识至终端设备中非可信执行环境的TAM客户端。
步骤S404:非可信执行环境的TAM客户端接收所述TAM服务器发送的所述加密后的敏感资源和所述应用标识,并传输所述加密后的敏感资源和所述应用标识至所述TAM安全应用。
TAM客户端会调用可信执行环境的应用程序接口TEE Client API,传输加密后的敏感资源至TAM安全应用。
由于在TAM服务器与TAM安全应用传输过程中,传输的为加密后的敏感资源,所以,相当于在安全通道传输敏感资源。因此,本申请不存在敏感资源暴露在非可信环境的问题,所以可以保护敏感资源。
步骤S405:所述TAM安全应用利用所述会话密钥解密所述加密后的敏感资源获得敏感资源,发送该敏感资源至所述应用标识对应的安全应用。
TAM安全应用解密加密后的敏感资源并获得敏感资源后,通过调用可信执行环境的内部应用程序接口(TEE Internal API),将敏感资源最终传输到应用标识对应的安全应用中。
参见图5,继续以“支付宝”应用为例对本步骤进行举例说明:TAM安全应用通过TEE Internal API,发送加密后的敏感资源至“支付宝”应用标识对应的“支付宝”安全应用。
通过以上技术手段,可以实现以下有益效果:
本申请直接在TAM服务器与可信执行环境中的TAM安全应用之间进行双向认证并协商出会话密钥,这相当于在TAM服务器与TAM安全应用之间建立安全通道。TAM 服务器在安全通道发送加密后的敏感数据至TAM安全应用,再由TAM安全应用传输至业务安全应用。
TAM服务器发送加密后的敏感资源至TAM安全应用的过程,相当于在安全通道传输敏感资源。这样可以防止敏感资源暴露在非可信环境中,从而保护敏感资源。
并且,本实施例中多个应用服务器均可以通过数据传输***实施例二来管理敏感资源,不需要再为各个应用服务器单独维护数据传输***实施例一,从而可以减少应用开发和维护的工作量。
本实施例方法所述的功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算设备可读取存储介质中。基于这样的理解,本申请实施例对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该软件产品存储在一个存储介质中,包括若干指令用以使得一台计算设备(可以是个人计算机,服务器,移动计算设备或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
本说明书中各个实施例采用递进的方式描述,每个实施例重点说明的都是与其它实施例的不同之处,各个实施例之间相同或相似部分互相参见即可。
对所公开的实施例的上述说明,使本领域专业技术人员能够实现或使用本申请。对这些实施例的多种修改对本领域的专业技术人员来说将是显而易见的,本文中所定义的一般原理可以在不脱离本申请的精神或范围的情况下,在其它实施例中实现。因此,本申请将不会被限制于本文所示的这些实施例,而是要符合与本文所公开的原理和新颖特点相一致的最宽的范围。

Claims (13)

  1. 一种数据传输***,其特征在于,包括:
    应用服务器,用于将安全应用的应用标识和待发送至所述安全应用的数据发送至TAM服务器;
    TAM服务器,用于与可信执行环境的TAM安全应用进行双向认证,并在双向认证成功后协商出会话密钥;接收所述应用服务器发送的应用标识和所述数据,利用所述会话密钥对所述数据进行加密操作,发送加密后的数据和所述应用标识至终端设备;
    终端设备,用于控制可信执行环境中的TAM安全应用与所述TAM服务器进行双向认证,并在双向认证成功后协商出会话密钥;非可信执行环境的TAM客户端接收所述TAM服务器发送的所述加密后的数据和所述应用标识,并传输所述加密后的数据和所述应用标识至所述TAM安全应用;所述TAM安全应用利用所述会话密钥解密所述加密后的数据获得数据,发送该数据至所述应用标识对应的所述安全应用。
  2. 如权利要求1所述的***,其特征在于,所述可信执行环境中的TAM安全应用与所述TAM服务器进行双向认证,具体包括:
    所述TAM服务器经所述TAM客户端发送身份认证请求至所述TAM安全应用,所述TAM安全应用生成身份认证凭证,所述TAM安全应用经所述TAM客户端发送身份认证凭证至所述TAM服务器,所述TAM服务器基于所述身份认证请求和所述身份认证凭证对所述TAM安全应用进行身份认证;
    所述TAM安全应用经所述TAM客户端发送身份认证请求至所述TAM服务器,所述TAM服务器生成身份认证凭证,所述TAM服务器经所述TAM客户端发送身份认证凭证至所述TAM安全应用,所述TAM安全应用基于所述身份认证请求和所述身份认证凭证对所述TAM服务器进行身份认证;
    所述TAM服务器与所述TAM安全应用双向认证成功后,基于所述身份认证请求和所述身份认证凭证确定会话密钥。
  3. 如权利要求1所述的***,其特征在于,所述终端设备执行发送该数据至所述应用标识对应的所述安全应用的过程,具体包括:
    所述TAM安全应用调用可信执行环境的内部应用程序接口;
    通过所述内部应用程序接口发送该数据至所述应用标识对应的所述安全应用。
  4. 一种数据传输方法,其特征在于,包括:
    与终端设备中可信执行环境的TAM安全应用进行双向认证,在双向认证通过后协商出会话密钥;
    利用所述会话密钥对待发送至安全应用的数据进行加密操作;
    发送加密后的数据和所述安全应用的应用标识至终端设备的TAM安全应用。
  5. 如权利要求4所述的方法,其特征在于,所述与终端设备中可信执行环境的TAM安全应用进行双向认证,在双向认证通过后协商出会话密钥包括:
    发送身份认证请求至终端设备中非可信执行环境的TAM客户端,并由所述TAM客户端传输至所述身份认证请求至所述TAM安全应用,获得所述TAM安全应用发送的身份认证凭证,对所述TAM安全应用进行身份认证;
    接收所述TAM安全应用经所述TAM客户端发送的身份认证请求,生成身份认证凭证,经所述TAM客户端发送所述身份认证凭证至所述TAM安全应用,供所述TAM安全应用对TAM服务器进行身份认证;
    所述TAM服务器对TAM安全应用对认证成功后,基于所述身份认证请求和所述身份认证凭证确定会话密钥。
  6. 如权利要求4所述的方法,其特征在于,所述发送加密后的数据和所述安全应用的应用标识至终端设备的TAM安全应用,包括:
    发送所述加密后的数据和所述应用标识至所述TAM客户端,并经所述TAM客户端发送所述加密后的数据和所述应用标识至所述TAM安全应用。
  7. 一种数据传输方法,其特征在于,包括:
    可信执行环境中的TAM安全应用与TAM服务器进行双向认证,在双向认证通过后协商出会话密钥;
    非可信执行环境的TAM客户端接收所述TAM服务器发送的加密后的数据和应用标识,并传输所述加密后的数据和所述应用标识至所述TAM安全应用;
    所述TAM安全应用利用所述会话密钥解密所述加密后的数据获得数据,并发送该数据至所述应用标识对应的安全应用。
  8. 如权利要求7所述的方法,其特征在于,可信执行环境中的TAM安全应用与TAM服务器进行双向认证,在双向认证通过后协商出会话密钥,包括:
    所述TAM安全应用经所述TAM客户端接收所述TAM服务器发送的身份认证请求,生成身份认证凭证,经所述TAM客户端发送所述身份认证凭证至所述TAM服务 器,供所述TAM服务器对所述TAM安全应用进行身份认证;
    所述TAM安全应用经所述TAM客户端发送身份认证请求至所述TAM服务器,并获取所述TAM服务器发送的身份认证凭证,对所述TAM服务器进行身份认证;
    所述TAM安全应用对所述TAM安全应用验证成功后,基于所述身份认证请求和所述身份认证凭证确定会话密钥。
  9. 如权利要求7所述的方法,其特征在于,所述传输所述加密后的数据和所述应用标识至所述TAM安全应用,包括:
    所述TAM客户端调用可信执行环境的应用程序接口;
    通过该应用程序接口传输所述加密后的数据和所述应用标识至所述TAM安全应用。
  10. 如权利要求7所述的方法,其特征在于,所述传输所述加密后的数据和所述应用标识至所述TAM安全应用,包括:
    所述TAM安全应用调用可信执行环境的内部应用程序接口;
    通过该应用程序接口发送该数据至所述应用标识对应的安全应用。
  11. 一种数据传输***,其特征在于,包括:
    应用服务器,用于与可信执行环境的业务安全应用进行双向认证,并在双向认证成功后协商出会话密钥;利用所述会话密钥对数据进行加密操作,发送加密后的数据至终端设备;
    终端设备,用于控制可信执行环境中的业务安全应用与所述应用服务器进行双向认证,并在双向认证成功后协商出会话密钥;非可信执行环境的业务客户端接收所述应用服务器发送的所述加密后的数据,并传输所述加密后的数据至所述业务安全应用;所述业务安全应用利用所述会话密钥解密所述加密后的数据获得数据。
  12. 一种数据传输方法,其特征在于,包括:
    与终端设备中可信执行环境的业务安全应用进行双向认证,在双向认证通过后协商出会话密钥;
    利用所述会话密钥对待发送至业务安全应用的数据进行加密操作;
    发送加密后的数据至终端设备的业务安全应用。
  13. 一种数据传输方法,其特征在于,包括:
    可信执行环境中的业务安全应用与应用服务器进行双向认证,在双向认证通过后协 商出会话密钥;
    非可信执行环境的业务客户端接收应用服务器发送的加密后的数据,并传输所述加密后的数据至所述业务安全应用;
    所述安全应用利用所述会话密钥解密所述加密后的数据获得数据。
PCT/CN2018/118133 2017-12-08 2018-11-29 一种数据传输方法及*** WO2019109852A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201711292803.9 2017-12-08
CN201711292803.9A CN109905350B (zh) 2017-12-08 2017-12-08 一种数据传输方法及***

Publications (1)

Publication Number Publication Date
WO2019109852A1 true WO2019109852A1 (zh) 2019-06-13

Family

ID=66751323

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/118133 WO2019109852A1 (zh) 2017-12-08 2018-11-29 一种数据传输方法及***

Country Status (3)

Country Link
CN (1) CN109905350B (zh)
TW (1) TWI791050B (zh)
WO (1) WO2019109852A1 (zh)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112329071A (zh) * 2020-12-16 2021-02-05 支付宝(杭州)信息技术有限公司 一种隐私数据处理方法、***、装置及设备
CN113704826A (zh) * 2021-09-13 2021-11-26 支付宝(杭州)信息技术有限公司 一种基于隐私保护的业务风险检测方法、装置及设备
CN113905355A (zh) * 2020-07-06 2022-01-07 北京亚华意诺斯新能源科技有限公司 一种表具安全防护***、数据传输方法、表具及服务器
CN116032556A (zh) * 2022-12-13 2023-04-28 支付宝(杭州)信息技术有限公司 小程序应用的密钥协商方法及装置

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109145628B (zh) * 2018-09-06 2020-08-25 江苏恒宝智能***技术有限公司 一种基于可信执行环境的数据采集方法及***
CN112422487A (zh) * 2019-08-23 2021-02-26 北京小米移动软件有限公司 数据传输方法、装置、***及计算机可读存储介质
CN114338065A (zh) * 2020-09-30 2022-04-12 中兴通讯股份有限公司 安全通讯方法、装置、服务器及存储介质
CN112422587B (zh) * 2021-01-21 2021-04-13 腾讯科技(深圳)有限公司 身份校验方法、装置、计算机设备及存储介质
CN112929169B (zh) * 2021-02-07 2022-10-28 成都薯片科技有限公司 秘钥协商方法及***
CN112926046B (zh) * 2021-03-26 2024-04-19 公安部第三研究所 保护设备标识信息的移动终端设备匿名标识信息认证方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103856485A (zh) * 2014-02-14 2014-06-11 武汉天喻信息产业股份有限公司 可信用户界面安全指示器的初始化***及方法
CN104408371A (zh) * 2014-10-14 2015-03-11 中国科学院信息工程研究所 一种基于可信执行环境高安全应用***的实现方法
CN104636917A (zh) * 2015-02-03 2015-05-20 武汉天喻信息产业股份有限公司 一种具备安全支付功能的移动支付***及方法
CN105101169A (zh) * 2014-05-13 2015-11-25 ***通信集团公司 可信执行环境处理信息的方法、装置、终端及sim卡
CN105590201A (zh) * 2015-04-23 2016-05-18 ***股份有限公司 移动支付装置及移动支付***

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8959331B2 (en) * 2012-11-19 2015-02-17 At&T Intellectual Property I, Lp Systems for provisioning universal integrated circuit cards
CN103873243B (zh) * 2012-12-12 2018-06-15 腾讯科技(北京)有限公司 实现数据安全传输的方法、***、服务器和终端
TWI543014B (zh) * 2015-01-20 2016-07-21 動信科技股份有限公司 快速佈署可信任執行環境應用的系統與方法
CN106453196B (zh) * 2015-08-04 2020-01-07 ***通信集团公司 一种针对可信执行环境的密钥写入装置、***及方法
CN106454528A (zh) * 2015-08-07 2017-02-22 阿里巴巴集团控股有限公司 基于可信执行环境的业务处理方法和客户端
CN105488679B (zh) * 2015-11-23 2019-12-03 北京小米支付技术有限公司 基于生物识别技术的移动支付设备、方法和装置
CN107426174B (zh) * 2017-06-09 2019-12-24 武汉果核科技有限公司 一种可信执行环境的访问控制方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103856485A (zh) * 2014-02-14 2014-06-11 武汉天喻信息产业股份有限公司 可信用户界面安全指示器的初始化***及方法
CN105101169A (zh) * 2014-05-13 2015-11-25 ***通信集团公司 可信执行环境处理信息的方法、装置、终端及sim卡
CN104408371A (zh) * 2014-10-14 2015-03-11 中国科学院信息工程研究所 一种基于可信执行环境高安全应用***的实现方法
CN104636917A (zh) * 2015-02-03 2015-05-20 武汉天喻信息产业股份有限公司 一种具备安全支付功能的移动支付***及方法
CN105590201A (zh) * 2015-04-23 2016-05-18 ***股份有限公司 移动支付装置及移动支付***

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113905355A (zh) * 2020-07-06 2022-01-07 北京亚华意诺斯新能源科技有限公司 一种表具安全防护***、数据传输方法、表具及服务器
CN112329071A (zh) * 2020-12-16 2021-02-05 支付宝(杭州)信息技术有限公司 一种隐私数据处理方法、***、装置及设备
CN112329071B (zh) * 2020-12-16 2024-06-04 支付宝(杭州)信息技术有限公司 一种隐私数据处理方法、***、装置及设备
CN113704826A (zh) * 2021-09-13 2021-11-26 支付宝(杭州)信息技术有限公司 一种基于隐私保护的业务风险检测方法、装置及设备
CN116032556A (zh) * 2022-12-13 2023-04-28 支付宝(杭州)信息技术有限公司 小程序应用的密钥协商方法及装置

Also Published As

Publication number Publication date
TWI791050B (zh) 2023-02-01
TW201926943A (zh) 2019-07-01
CN109905350A (zh) 2019-06-18
CN109905350B (zh) 2022-08-12

Similar Documents

Publication Publication Date Title
WO2019109852A1 (zh) 一种数据传输方法及***
US11792169B2 (en) Cloud storage using encryption gateway with certificate authority identification
US9465947B2 (en) System and method for encryption and key management in cloud storage
EP2820792B1 (en) Method of operating a computing device, computing device and computer program
CN110249336B (zh) 使用签名密钥对可信执行环境的寻址
US11102191B2 (en) Enabling single sign-on authentication for accessing protected network services
TW201814496A (zh) 資料儲存方法、資料獲取方法、裝置及系統
US20110167263A1 (en) Wireless connections to a wireless access point
US20130227287A1 (en) Method of operating a computing device, computing device and computer program
US11044082B2 (en) Authenticating secure channel establishment messages based on shared-secret
US20200351107A1 (en) Secure authentication of remote equipment
KR20060045440A (ko) 패스워드 보호 비밀 데이터의 노출 없이 통신 네트워크을통해 이 비밀 데이터를 복구하는 방법 및 시스템
US11411731B2 (en) Secure API flow
JP2020533853A (ja) デジタル証明書を管理するための方法および装置
CN110235134B (zh) 使用洁净室供应来寻址可信执行环境
EP4096147A1 (en) Secure enclave implementation of proxied cryptographic keys
US11606193B2 (en) Distributed session resumption
EP4096160A1 (en) Shared secret implementation of proxied cryptographic keys
US20240113885A1 (en) Hub-based token generation and endpoint selection for secure channel establishment
CN111901335B (zh) 基于中台的区块链数据传输管理方法及***
WO2024124924A1 (zh) 小程序应用的密钥协商方法及装置
CN113727059B (zh) 多媒体会议终端入网认证方法、装置、设备及存储介质
CN114553426B (zh) 签名验证方法、密钥管理平台、安全终端及电子设备
US11736461B1 (en) Sharing secrets over one or more computer networks using proxies
EP4395236A1 (en) Sharing secrets over one or more computer networks using proxies

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18886929

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18886929

Country of ref document: EP

Kind code of ref document: A1