[go: up one dir, main page]

CN104102876A - Device for safeguarding operational security of client side - Google Patents

Device for safeguarding operational security of client side Download PDF

Info

Publication number
CN104102876A
CN104102876A CN201410342446.2A CN201410342446A CN104102876A CN 104102876 A CN104102876 A CN 104102876A CN 201410342446 A CN201410342446 A CN 201410342446A CN 104102876 A CN104102876 A CN 104102876A
Authority
CN
China
Prior art keywords
middleware
operating system
secure
execution environment
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410342446.2A
Other languages
Chinese (zh)
Inventor
江先
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing WatchSmart Technologies Co Ltd
Original Assignee
Beijing WatchSmart Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing WatchSmart Technologies Co Ltd filed Critical Beijing WatchSmart Technologies Co Ltd
Priority to CN201410342446.2A priority Critical patent/CN104102876A/en
Publication of CN104102876A publication Critical patent/CN104102876A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

An embodiment of the invention discloses a device for safeguarding operational security of a client side. The device comprises a security part, an unsecure operating system, a secure operating system, a first middleware proxy, a second middleware proxy and second middleware, wherein the first middleware proxy and the second middleware proxy operate in the unsecure operating system, and the second middleware operates in the secure operating system. Client-side applications are installed on the unsecure operating system and directly call first middleware and call the second middleware through the second middleware proxy. Sensitive data in the client-side applications are stored in the security part, the first middleware is used for completing a part of service functions in the client-side applications in the unsecure operating system, and the second middleware is used for completing another part of service functions of the client-side applications by interacting with the security part in the unsecure operating system. According to the embodiment, potential security hazards of operations completed by the client side are reduced or even avoided.

Description

Device for guaranteeing operation safety of client
Technical Field
The invention relates to the technical field of embedding, in particular to a device for guaranteeing the operation safety of a client.
Background
An application system of an online banking system or an electronic financial system, etc. is generally composed of: the security of the whole application system is ensured by the operation security of the three parts. For example, in an internet banking system, the service end and the middle network layer are guaranteed by a bank to ensure the operation safety, and the client end is guaranteed by an internet banking safety device to ensure the operation safety.
At present, the mainstream internet banking security device is: the internet banking shield (also called as usb key, the shape of which looks like a portable usb disk) has been widely used in various terminal authentication products such as internet banking and electronic finance as a terminal for user identity authentication and transaction signature. Similarly, in other application systems besides the internet banking system, there is also a device for ensuring the operation safety of the client.
The devices for ensuring the operation safety of the client side are integrated with a microprocessor, a memory and a Chip On Sysetem (COS) and form an independent computer system with independent data processing capacity. And, the security of data processing and transmission in the device is guaranteed through the security mechanism of COS.
Since these devices for securing the operation of the client are small in size, the configuration of the on-chip operating system and the hardware thereof are usually not too high. Due to the configuration limitation, only some operations with very high security requirements can be given to the device to execute, and the rest operations with relatively low security requirements can be given to the client to execute, so as to avoid causing too much work pressure on the device.
However, in the process of implementing the present invention, the inventors of the present invention found that at least the following problems exist in the prior art: since the client runs in an open execution environment (the execution environment includes an operating system portion and a corresponding hardware portion), and the open execution environment itself is not secure and trusted, there is a great safety risk to the operations performed by the client. For example, when a user inputs a PIN code of an online banking shield on a client so that the client submits the PIN code to the online banking shield for verification, since an open execution environment cannot prevent attacks of malicious software such as keyboard records, the PIN code may be leaked.
Disclosure of Invention
In order to solve the above technical problem, embodiments of the present invention provide a device for ensuring the operation security of a client, so as to reduce or even avoid the potential safety hazard of operations performed by the client.
The embodiment of the invention discloses the following technical scheme:
an apparatus for securing client operations, comprising: the secure component, the non-secure operating system, the first middleware and the second middleware agent running in the non-secure operating system, and the second middleware running in the secure operating system; wherein,
installing a client application on the non-secure operating system, wherein the client application directly calls the first middleware, and the client application calls the second middleware through the second middleware agent;
the safety component is used for realizing the information safety of the device;
the first middleware is used for completing a first part of service functions preset in the client application in the non-secure operating system;
the second middleware is used for finishing a second part of service functions preset in the client application through interaction with the safety component in the safety operating system.
The secure operating system is located in a secure execution environment, the non-secure operating system is located in a non-secure execution environment, and the secure execution environment and the non-secure execution environment are isolated through a hardware firewall.
The secure execution environment and the insecure execution environment share a same hardware system.
The hardware system is a Trusted Execution Environment (TEE) chip hardware system.
And switching between the secure execution environment and the non-secure execution environment through a secure monitor.
The second middleware interacts with the security component through an application program interface, API.
The second middleware at least comprises input middleware, output middleware, identity authentication middleware, signature middleware and file management middleware.
The second middleware agent includes at least: the system comprises an input middleware agent, an output middleware agent, an identity authentication middleware agent, a signature middleware agent and a file management middleware agent.
The security components include an on-chip operating system COS and a secure element SE chip hardware system.
The COS at least comprises an input subsystem, an output subsystem, an identity authentication subsystem, a signature subsystem and a file management subsystem.
The COS further comprises: and the life cycle subsystem is used for managing each life cycle of the COS.
As can be seen from the above embodiments, compared with the prior art, the present invention has the following advantages:
the device for guaranteeing the operation safety of the client is built in the equipment where the client is located, that is, the client and the device for guaranteeing the operation safety of the client are integrated in the same equipment. In the device, two isolated operating systems are included: the system comprises a secure operating system and a non-secure operating system, wherein the secure execution environment of the secure operating system and the non-secure execution environment of the non-secure operating system share the same hardware system. For operations with no or very low security requirements, the execution may be controlled by a non-secure operating system. And the operation with higher safety requirement can be controlled and executed by the safe execution environment. For example, the input of a PIN code or the like. Thus, the safety risks of the operations performed by the client can be reduced or even avoided.
In addition, because the secure execution environment in which the secure operating system is located and the non-secure execution environment in which the non-secure operating system is located share the same hardware system, the cost is saved, and the complexity and the power consumption are reduced.
Moreover, the device for guaranteeing the operation safety of the client is arranged in the equipment where the client is located, so that the device for guaranteeing the operation safety of the client can be prevented from being pulled out by a user in the service execution process, and the smooth execution of the service is guaranteed.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a structural diagram of an embodiment of an apparatus for securing operation of a client according to the present invention;
fig. 2 is a block diagram of another embodiment of an apparatus for securing client operation according to the present invention;
FIG. 3 is a block diagram of another embodiment of an apparatus for securing client operations according to the present invention;
fig. 4 is a flowchart of a method for implementing signature operation by the device for ensuring the operation security of the client according to the present invention.
Detailed Description
The embodiment of the invention provides a device for guaranteeing the operation safety of a client. The core of the technical scheme of the invention is that stronger hardware and software performance is provided for the device for guaranteeing the operation safety of the client, and the device for guaranteeing the operation safety of the client is built in the equipment where the client is located, namely, the client and the device for guaranteeing the operation safety of the client are integrated in the same equipment. The integrated equipment is the novel device for guaranteeing the operation safety of the client. The device can be a PC, and can also be various mobile terminals (including mobile phones, tablet computers and the like). Wherein, in the apparatus, two parallel execution environments are isolated: an unsecure execution environment and a secure execution environment. Operations with no or very low security requirements may be placed in an unsecure execution environment for execution. And operations with higher safety requirements can be executed in a safe execution environment.
At present, a "secure operating system" (which may also be referred to as a trusted operating system) means that a computer information system meets corresponding security technical requirements in ten aspects of autonomous access control, mandatory access control, tagging, identity authentication, object reuse, auditing, data integrity, covert channel analysis, trusted path, trusted recovery, and the like. The main characteristics of the "secure operating system" are:
1. the least privileged principle, i.e. each privileged user has only the right to do his work.
2. And implementing autonomous access control and mandatory access control, wherein the mandatory access control comprises confidentiality access control and integrity access control.
3. And (6) safety audit.
4. The security domains are isolated.
With these bottom-level security functions, viruses, trojans, network intrusions and human illegal operations mixed as "application software" can be truly resisted, because the viruses, the trojans, the network intrusions and the human illegal operations violate the security rules of the operating system and lose the running basis.
A secure execution environment, for example, a Trusted Execution Environment (TEE) refers to a secure operating system that runs on a terminal device adopting a secure design, so as to provide a Trusted application execution environment on an existing terminal device. Equipment running a TEE may reach EAL2, 3 or higher levels as needed. The security design includes aspects such as the SoC (System On Chip) Chip and the circuit board layout rule. In the aspect of SoC chips, currently, most of application processor cores on mobile terminals use Cortex series chips of ARM corporation, and ARM corporation realizes TrustZone technology on Cortex processors.
The TrustZone technology enables the SoC chip to have a normal state and a safe state, and in the normal state, non-safe operating systems such as Android and the like can be operated, and corresponding application programs can be executed. In the secure state, a secure operating system (Trusted OS) may be run and perform certain operations and services that require greater security, such as user password entry, transaction information display, secure session establishment with a remote server, encryption and decryption of data, preservation of user sensitive information, and the like. When in the secure state, each application under the non-secure operating system has no control right on the whole terminal device, and only the corresponding application under the secure operating system can access the terminal device, such as a display, a keyboard, an SD card, and an NFC (Near Field Communication) device on the terminal device.
The security operating system can resist various remote attacks and local software attacks known at present, and partial hardware attacks, and can not resist various anti-tampering hardware attacks of the smart card.
In addition, in terms of software, the application program can be divided into two parts, one part is the application program running under a non-secure operating system such as Android and the like, the application program provides a friendly interface for a user, and the other part is the secure service running in the secure operating system, and the secure service performs higher-security operations, such as user information input, transaction content confirmation and the like.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below.
Please refer to fig. 1, which is a block diagram of an embodiment of an apparatus for securing client operation according to the present invention, wherein the apparatus 10 includes: the secure component 11, the insecure operating system 12, the secure operating system 13, the first middleware 121 and the second middleware agent 122 running in the insecure operating system 12, and the second middleware 131 running in the secure operating system 13. Wherein,
the client application 20 is installed on the non-secure operating system 12, the client application 20 directly calls the first middleware 121 running in the non-secure operating system 12, and the client application 20 calls the second middleware 131 running in the secure operating system 13 through the second middleware agent 122 running in the non-secure operating system 12.
The security component 11 is used to implement the information security of the device.
The first middleware 121 is configured to complete a first part of service functions preset in the client application 20 in the insecure operating system 12. The second middleware 131 is configured to complete a second part of service functions preset in the client application by interacting with the security component 11 in the secure operating system 13. For example, when the device 10 for securing the operation of the client is applied to an internet banking application, the security component 11 stores sensitive data 21 including, but not limited to, a PIN code and a transaction key.
The preset first part of service functions are preset service functions with low security, that is, the first middleware completes the service functions with low security in the client application. And the preset second part of service functions are preset service functions with high safety, namely, the second middleware completes the service functions with high safety in the client application. For example, high security service functions include, but are not limited to: user information input and transaction signatures, etc.
The security component 11 may be specifically a usb key module (for storing sensitive data), and the second middleware interacts with the usb key module in the secure operating system, so as to implement mathematical operations such as transaction signature, encryption, decryption, and the like.
The middleware is arranged on the upper layers of an operating system, a network and a database and the lower layer of an application program, and is generally used for providing an operation and development environment for the application program on the upper layer of the middleware, and helping a user to develop and integrate the complex application program flexibly and efficiently.
In a preferred embodiment of the present invention, as shown in fig. 2, the secure operating system 12 is located in a secure execution environment, the non-secure operating system 13 is located in a non-secure execution environment, and the secure execution environment is separated from the non-secure execution environment by a hardware firewall.
In another preferred embodiment of the invention, the secure execution environment and the non-secure execution environment share the same hardware system. For example, the hardware system is a Trusted Execution Environment (TEE) chip hardware system.
In another preferred embodiment of the invention, the switching between the secure execution environment and the non-secure execution environment is performed by a security monitor.
Wherein, the switch between two physical address spaces in the safe execution environment and the non-safe execution environment can be realized through the memory attribute. I.e., a secure address space and a non-secure address space, the non-secure execution environment can only access the non-secure address space and not the secure address space.
In another preferred embodiment of the present invention, as shown in fig. 3, the second middleware 131 interacts with the secure element 11 through an Application Programming Interface (API).
In the technical scheme of the invention, the secure operating system provides a secure operating environment for the second middleware, and the second middleware is a secure and trusted middleware. Therefore, the middleware related to the operation with a very high security requirement in the client application can be used as the second middleware to run in the secure operating system, and the middleware related to the operation with a relatively low security requirement in the client application can be used as the first middleware to run in the non-secure operating system. Of course, all of the middleware related to all operations in the client application may be regarded as the second middleware.
In a preferred embodiment of the present invention, the second intermediate member includes at least: the system comprises input middleware, output middleware, identity authentication middleware, signature middleware and file management middleware.
For example, the input middleware may be a keyboard or a middleware of a touch device, and the input middleware is operated in the secure operating system as a second middleware, so that attacks of some malicious software such as keyboard records and the like can be prevented, the problems of PIN code leakage and the like are avoided, and the security is ensured.
In order to achieve secure isolation between the secure operating system and the non-secure operating system, and thereby ensure the security of each second middleware running in the secure operating system, a client application located in the non-secure operating system must invoke the second middleware through an authorized agent (i.e., a second middleware agent). It will be appreciated that the second middleware agent acts as a secure channel between the non-secure operating system and the secure operating system.
In another preferred embodiment of the present invention, corresponding to the second middleware, the second middleware agent includes at least: the system comprises an input middleware agent, an output middleware agent, an identity authentication middleware agent, a signature middleware agent and a file management middleware agent.
In another preferred embodiment of the present invention, the security component 11 includes a COS (Chip Operating System) and a SE (Secure Element) Chip hardware System.
The security mechanism of the COS can ensure the security of data operation and data transmission in the security component 11. The safety unit 11 has a high safety level, all related operations with high safety requirements can be executed in the safety operating system 13 and the safety unit 11, the safety operating system 13 provides high safety operation performance, and the safety unit 11 provides high safety storage and operation performance.
In order to cooperate with the second middleware in the secure operating system to complete the operation with higher security requirement, in another preferred embodiment of the present invention, the COS at least comprises an input subsystem, an output subsystem, an identity authentication subsystem, a signature subsystem and a file management subsystem, corresponding to the second middleware.
It will be appreciated that the input middleware in the second middleware performs input functions in the client application by interacting with the input subsystem in the COS. The output middleware in the second middleware interacts with the output subsystem in the COS to complete the output function in the client application. And the identity authentication middleware in the second middleware interacts with the identity authentication subsystem in the COS to complete the identity authentication function in the client application. And the signature middleware in the second middleware interacts with the signature subsystem in the COS to complete the signature function in the client application. And the file management middleware in the second middleware interacts with the file management subsystem in the COS to complete the file management function in the client application. And, since the second middleware located in the secure operating system initiates the establishment of communication with the COS in the secure element, all operations are completed in the secure operating system, thus guaranteeing high security of the operations.
In another preferred embodiment of the present invention, the above COS further comprises a lifecycle subsystem for managing the individual lifecycle of the COS.
For example, the various life cycles of the COS include, but are not limited to, the development and production stages.
As can be seen from the above embodiments, compared with the prior art, the present invention has the following advantages:
the device for guaranteeing the operation safety of the client is built in the equipment where the client is located, that is, the client and the device for guaranteeing the operation safety of the client are integrated in the same equipment. In the device, two isolated operating systems are included: the system comprises a secure operating system and a non-secure operating system, wherein the secure execution environment of the secure operating system and the non-secure execution environment of the non-secure operating system share the same hardware system. For operations with no or very low security requirements, the execution may be controlled by a non-secure operating system. And the operation with higher safety requirement can be controlled and executed by the safe execution environment. For example, the input of a PIN code or the like. Thus, the safety risks of the operations performed by the client can be reduced or even avoided.
In addition, because the secure execution environment in which the secure operating system is located and the non-secure execution environment in which the non-secure operating system is located share the same hardware system, the cost is saved, and the complexity and the power consumption are reduced.
Moreover, the device for guaranteeing the operation safety of the client is arranged in the equipment where the client is located, so that the device for guaranteeing the operation safety of the client can be prevented from being pulled out by a user in the service execution process, and the smooth execution of the service is guaranteed.
In the internet banking system, for the client application of the internet banking, one of the most important operations in the transaction operations performed between the client application and the server is the signature operation, and the operation has a very high security requirement. The following describes how to implement a signature operation in the device for ensuring the security of client operation according to the present invention, by taking a transaction signature operation as an example. Please refer to fig. 4, which is a flowchart illustrating a method for implementing a signature operation by using the apparatus for ensuring the security of client operation according to the present invention, which specifically includes the following steps:
step 401: and starting the online banking client application in the non-secure operating system.
Step 402: and the online banking client application calls a first middleware in the non-secure operating system.
Step 403: and the online banking client application calls a second middleware agent in the non-secure operating system so as to call second middleware in the secure operating system through the second middleware agent.
Step 404: the security monitor monitors for a switch of the operating system from the non-secure operating system to the secure operating system.
Step 405: in the secure operating system, the secure operating system controls the input middleware to receive the PIN code input by the user.
Step 406: the secure operating system establishes a secure channel between it and the secure element and sends a request message requesting verification of the PIN code to the secure element over the secure channel.
Wherein, the request message carries the PIN code.
Step 407: and the safety component responds to the request message, verifies the PIN code, and sends a response message that the PIN code passes the verification to the safety operating system through the safety channel after the PIN code passes the verification.
Step 408: the secure operating system controls the signature middleware to perform transaction negotiation and check transaction data.
For example, the verification of the transaction data may include verifying whether the total length of the transaction data is consistent with the total number of the transaction data, verifying whether the format of the transaction data meets requirements, and verifying whether the transaction data is complete.
Step 409: and after the transaction negotiation and the transaction data verification are passed, the secure operating system controls the signature middleware to send the transaction data to the secure component.
Meanwhile, the safe operating system can also control the output middleware to display the transaction amount and the related information.
Step 410: the safety component carries out transaction signature on the transaction data and sends the transaction signature data to the safety operating system through the signature middleware.
Step 411: and the secure operating system controls the output middleware to display the transaction signature result.
Step 412: the secure operating system control input middleware receives a transaction confirmation key code input by a user.
Step 413: the security monitor switches the operating system from the secure operating system back to the non-secure operating system.
Step 414: and the non-secure operating system returns the transaction signature result to the online banking client application.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions when the actual implementation is performed, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not performed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some interfaces, and may be in an electrical, mechanical or other form.
The units described as separate parts may be or may be physically separate, and parts displayed as units may be or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can be realized in a form of a software functional unit.
It should be noted that, as will be understood by those skilled in the art, all or part of the processes in the methods of the above embodiments may be implemented by a computer program, which may be stored in a computer-readable storage medium, and when executed, may include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above detailed description is provided for the device for ensuring the operation security of the client, and the principle and the implementation of the present invention are explained in the present document by applying specific embodiments, and the description of the above embodiments is only used to help understanding the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (11)

1. An apparatus for securing client operation, comprising: the secure component, the non-secure operating system, the first middleware and the second middleware agent running in the non-secure operating system, and the second middleware running in the secure operating system; wherein,
installing a client application on the non-secure operating system, wherein the client application directly calls the first middleware, and the client application calls the second middleware through the second middleware agent;
the safety component is used for realizing the information safety of the device;
the first middleware is used for completing a first part of service functions preset in the client application in the non-secure operating system;
the second middleware is used for finishing a second part of service functions preset in the client application through interaction with the safety component in the safety operating system.
2. The apparatus of claim 1, wherein the secure operating system is located in a secure execution environment and the non-secure operating system is located in a non-secure execution environment, and wherein the secure execution environment and the non-secure execution environment are separated by a hardware firewall.
3. The apparatus of claim 2, wherein the secure execution environment and the insecure execution environment share a same hardware system.
4. The apparatus of claim 3, wherein the hardware system is a Trusted Execution Environment (TEE) chip hardware system.
5. The apparatus of claim 2, wherein switching between the secure execution environment and the non-secure execution environment is performed via a security monitor.
6. The apparatus of claim 1, wherein the second middleware interacts with the security component through an Application Program Interface (API).
7. The apparatus of claim 1, wherein the second middleware comprises at least input middleware, output middleware, authentication middleware, signature middleware, and file management middleware.
8. The apparatus of claim 7, wherein the second middleware agent comprises at least: the system comprises an input middleware agent, an output middleware agent, an identity authentication middleware agent, a signature middleware agent and a file management middleware agent.
9. The apparatus of claim 7, wherein the security component comprises an operating system on a Chip (COS) and a Secure Element (SE) chip hardware system.
10. The apparatus as recited in claim 9, wherein the COS includes at least an input subsystem, an output subsystem, an authentication subsystem, a signature subsystem, and a file management subsystem.
11. The apparatus as recited in claim 10, wherein the COS further comprises: and the life cycle subsystem is used for managing each life cycle of the COS.
CN201410342446.2A 2014-07-17 2014-07-17 Device for safeguarding operational security of client side Pending CN104102876A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410342446.2A CN104102876A (en) 2014-07-17 2014-07-17 Device for safeguarding operational security of client side

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410342446.2A CN104102876A (en) 2014-07-17 2014-07-17 Device for safeguarding operational security of client side

Publications (1)

Publication Number Publication Date
CN104102876A true CN104102876A (en) 2014-10-15

Family

ID=51671019

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410342446.2A Pending CN104102876A (en) 2014-07-17 2014-07-17 Device for safeguarding operational security of client side

Country Status (1)

Country Link
CN (1) CN104102876A (en)

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104462935A (en) * 2014-12-24 2015-03-25 宇龙计算机通信科技(深圳)有限公司 Method and terminal for performing safety verification on application program in multi-operation system
CN104598793A (en) * 2015-01-08 2015-05-06 百度在线网络技术(北京)有限公司 Fingerprint authentication method and fingerprint authentication device
CN104866782A (en) * 2015-05-29 2015-08-26 宇龙计算机通信科技(深圳)有限公司 Data processing method and apparatus
CN105205370A (en) * 2015-08-24 2015-12-30 北京恒信安科技有限公司 Safety protection method for mobile terminal, mobile terminal, safety system and application method
CN105260664A (en) * 2015-09-24 2016-01-20 宇龙计算机通信科技(深圳)有限公司 Security protection method and terminal for application among multiple systems
CN105335673A (en) * 2015-12-14 2016-02-17 联想(北京)有限公司 Information safety processing method and device
CN105468980A (en) * 2015-11-16 2016-04-06 华为技术有限公司 Security control method, device and system
CN105574720A (en) * 2015-12-14 2016-05-11 联想(北京)有限公司 Secure information processing method and secure information processing apparatus
CN105630534A (en) * 2015-04-27 2016-06-01 宇龙计算机通信科技(深圳)有限公司 TrustZone framework-based application program execution method and device as well as terminal
WO2016095506A1 (en) * 2014-12-19 2016-06-23 深圳市中兴微电子技术有限公司 Ciphertext data decryption method, system and computer storage medium
WO2016101559A1 (en) * 2014-12-26 2016-06-30 深圳市中兴微电子技术有限公司 Secure data access method and device, and computer storage medium
CN105787353A (en) * 2014-12-17 2016-07-20 联芯科技有限公司 Credible application management system and loading method for credible applications
CN105809419A (en) * 2014-12-29 2016-07-27 北京握奇智能科技有限公司 Online banking transaction system
CN105809441A (en) * 2014-12-29 2016-07-27 北京握奇智能科技有限公司 Online banking transaction method
CN105809433A (en) * 2014-12-29 2016-07-27 北京握奇智能科技有限公司 Online banking transaction method
CN105809536A (en) * 2014-12-29 2016-07-27 北京握奇智能科技有限公司 Online banking transaction system
CN105959287A (en) * 2016-05-20 2016-09-21 中国银联股份有限公司 Biological feature based safety certification method and device
CN106027257A (en) * 2016-05-05 2016-10-12 北京元心科技有限公司 Method and system for securely performing identity authentication
WO2016172944A1 (en) * 2015-04-30 2016-11-03 华为技术有限公司 Interface display method of terminal and terminal
WO2017045497A1 (en) * 2015-09-16 2017-03-23 深圳市中兴微电子技术有限公司 User verification method, client, controller, and computer storage medium
WO2017071546A1 (en) * 2015-10-29 2017-05-04 中国银联股份有限公司 Trusted user interface display method and system
CN106778193A (en) * 2016-11-14 2017-05-31 北京握奇智能科技有限公司 A kind of client and UI exchange methods
CN106845282A (en) * 2017-01-06 2017-06-13 奇酷互联网络科技(深圳)有限公司 Mobile terminal and its method of controlling security and device
CN106897639A (en) * 2017-01-06 2017-06-27 奇酷互联网络科技(深圳)有限公司 The method and apparatus of mobile terminal and its safety verification
CN106940776A (en) * 2016-01-04 2017-07-11 中国移动通信集团公司 A kind of sensitive data operating method and mobile terminal
CN107003889A (en) * 2014-12-24 2017-08-01 英特尔公司 System and method for providing the compatible credible performing environment of global platform
CN107169343A (en) * 2017-04-25 2017-09-15 深圳市金立通信设备有限公司 A kind of method and terminal of control application program
CN107392055A (en) * 2017-07-20 2017-11-24 深圳市金立通信设备有限公司 A kind of dual system safety chip control method, terminal, computer-readable recording medium and the dual system framework based on safety chip
CN108335105A (en) * 2018-01-18 2018-07-27 中国建设银行股份有限公司 Data processing method and relevant device
CN108599938A (en) * 2018-04-23 2018-09-28 北京数字认证股份有限公司 The method and system of mobile terminal private data are protected by credible performing environment
CN111125711A (en) * 2019-12-03 2020-05-08 支付宝(杭州)信息技术有限公司 Safety task processing method, device, electronic device and storage medium
CN111666172A (en) * 2020-06-07 2020-09-15 中信银行股份有限公司 Method and device for protecting online banking environment, electronic equipment and storage medium
CN112305962A (en) * 2020-10-21 2021-02-02 麒麟软件有限公司 Wireless device control method based on ARM platform supporting Trustzone

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102034036A (en) * 2010-09-07 2011-04-27 北京握奇数据系统有限公司 Permission management method and equipment
CN103793629A (en) * 2012-10-26 2014-05-14 三星电子株式会社 System-on-chip processing secure contents and mobile device comprising the same

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102034036A (en) * 2010-09-07 2011-04-27 北京握奇数据系统有限公司 Permission management method and equipment
CN103793629A (en) * 2012-10-26 2014-05-14 三星电子株式会社 System-on-chip processing secure contents and mobile device comprising the same

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王熙友: "ARM TrustZone安全隔离技术研究与应用", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105787353A (en) * 2014-12-17 2016-07-20 联芯科技有限公司 Credible application management system and loading method for credible applications
WO2016095506A1 (en) * 2014-12-19 2016-06-23 深圳市中兴微电子技术有限公司 Ciphertext data decryption method, system and computer storage medium
CN107003889A (en) * 2014-12-24 2017-08-01 英特尔公司 System and method for providing the compatible credible performing environment of global platform
CN104462935A (en) * 2014-12-24 2015-03-25 宇龙计算机通信科技(深圳)有限公司 Method and terminal for performing safety verification on application program in multi-operation system
WO2016101559A1 (en) * 2014-12-26 2016-06-30 深圳市中兴微电子技术有限公司 Secure data access method and device, and computer storage medium
CN105809536A (en) * 2014-12-29 2016-07-27 北京握奇智能科技有限公司 Online banking transaction system
CN105809433A (en) * 2014-12-29 2016-07-27 北京握奇智能科技有限公司 Online banking transaction method
CN105809441A (en) * 2014-12-29 2016-07-27 北京握奇智能科技有限公司 Online banking transaction method
CN105809419A (en) * 2014-12-29 2016-07-27 北京握奇智能科技有限公司 Online banking transaction system
CN104598793A (en) * 2015-01-08 2015-05-06 百度在线网络技术(北京)有限公司 Fingerprint authentication method and fingerprint authentication device
CN105630534A (en) * 2015-04-27 2016-06-01 宇龙计算机通信科技(深圳)有限公司 TrustZone framework-based application program execution method and device as well as terminal
WO2016172944A1 (en) * 2015-04-30 2016-11-03 华为技术有限公司 Interface display method of terminal and terminal
US10891397B2 (en) 2015-04-30 2021-01-12 Huawei Technologies Co., Ltd. User interface display method for terminal, and terminal
CN104866782A (en) * 2015-05-29 2015-08-26 宇龙计算机通信科技(深圳)有限公司 Data processing method and apparatus
CN105205370B (en) * 2015-08-24 2018-12-04 北京恒信安科技有限公司 Mobile terminal safety means of defence and mobile terminal, security system and methods for using them
CN105205370A (en) * 2015-08-24 2015-12-30 北京恒信安科技有限公司 Safety protection method for mobile terminal, mobile terminal, safety system and application method
WO2017045497A1 (en) * 2015-09-16 2017-03-23 深圳市中兴微电子技术有限公司 User verification method, client, controller, and computer storage medium
CN105260664A (en) * 2015-09-24 2016-01-20 宇龙计算机通信科技(深圳)有限公司 Security protection method and terminal for application among multiple systems
WO2017071546A1 (en) * 2015-10-29 2017-05-04 中国银联股份有限公司 Trusted user interface display method and system
CN105468980A (en) * 2015-11-16 2016-04-06 华为技术有限公司 Security control method, device and system
CN105468980B (en) * 2015-11-16 2018-07-03 华为技术有限公司 The method, apparatus and system of a kind of security management and control
CN105574720A (en) * 2015-12-14 2016-05-11 联想(北京)有限公司 Secure information processing method and secure information processing apparatus
CN105335673A (en) * 2015-12-14 2016-02-17 联想(北京)有限公司 Information safety processing method and device
CN106940776A (en) * 2016-01-04 2017-07-11 中国移动通信集团公司 A kind of sensitive data operating method and mobile terminal
CN106027257A (en) * 2016-05-05 2016-10-12 北京元心科技有限公司 Method and system for securely performing identity authentication
CN105959287A (en) * 2016-05-20 2016-09-21 中国银联股份有限公司 Biological feature based safety certification method and device
CN106778193A (en) * 2016-11-14 2017-05-31 北京握奇智能科技有限公司 A kind of client and UI exchange methods
CN106778193B (en) * 2016-11-14 2023-02-03 北京握奇智能科技有限公司 Client and UI interaction method
CN106897639B (en) * 2017-01-06 2020-12-22 奇酷互联网络科技(深圳)有限公司 Mobile terminal and security verification method and device thereof
CN106845282A (en) * 2017-01-06 2017-06-13 奇酷互联网络科技(深圳)有限公司 Mobile terminal and its method of controlling security and device
CN106897639A (en) * 2017-01-06 2017-06-27 奇酷互联网络科技(深圳)有限公司 The method and apparatus of mobile terminal and its safety verification
CN107169343A (en) * 2017-04-25 2017-09-15 深圳市金立通信设备有限公司 A kind of method and terminal of control application program
CN107392055A (en) * 2017-07-20 2017-11-24 深圳市金立通信设备有限公司 A kind of dual system safety chip control method, terminal, computer-readable recording medium and the dual system framework based on safety chip
CN108335105A (en) * 2018-01-18 2018-07-27 中国建设银行股份有限公司 Data processing method and relevant device
CN108599938A (en) * 2018-04-23 2018-09-28 北京数字认证股份有限公司 The method and system of mobile terminal private data are protected by credible performing environment
CN111125711B (en) * 2019-12-03 2021-05-07 支付宝(杭州)信息技术有限公司 Safety task processing method, device, electronic device and storage medium
CN111125711A (en) * 2019-12-03 2020-05-08 支付宝(杭州)信息技术有限公司 Safety task processing method, device, electronic device and storage medium
CN111666172A (en) * 2020-06-07 2020-09-15 中信银行股份有限公司 Method and device for protecting online banking environment, electronic equipment and storage medium
CN112305962A (en) * 2020-10-21 2021-02-02 麒麟软件有限公司 Wireless device control method based on ARM platform supporting Trustzone

Similar Documents

Publication Publication Date Title
CN104102876A (en) Device for safeguarding operational security of client side
US8935746B2 (en) System with a trusted execution environment component executed on a secure element
US10193926B2 (en) Apparatuses, methods and systems for a secure resource access and placement platform
Cooijmans et al. Analysis of secure key storage solutions on android
Ying et al. Truz-droid: Integrating trustzone with mobile operating system
EP3332372B1 (en) Apparatus and method for trusted execution environment based secure payment transactions
JP6293133B2 (en) Network-based management of protected data sets
JP2016535547A (en) Method for authenticating operations performed on a subject computing device
JP2016536713A (en) Mobile communication apparatus and operation method thereof
KR20150106937A (en) Context based switching to a secure operating system environment
CN107077565A (en) The collocation method and equipment of a kind of safe configured information
Ying et al. Truz-view: Developing trustzone user interface for mobile os using delegation integration model
KR20190039603A (en) Security processor chip and terminal device
CN107209884A (en) Store security credential information in different regions
Vasudevan et al. Trustworthy execution on mobile devices
KR101173911B1 (en) Network Separation System with a Switching Type of Selection Between Virtual Machines
KR102540097B1 (en) Device risk-based trusted device verification and remote access processing system
US10904011B2 (en) Configuration updates for access-restricted hosts
CN101047701B (en) System and method for ensuring safety operation of applied program
Song et al. App’s auto-login function security testing via android os-level virtualization
Mannan et al. Unicorn: Two-factor attestation for data security
KR102095114B1 (en) Method for combining trusted execution environments for functional extension and method for applying fido u2f for supporting business process
Fournaris et al. From hardware security tokens to trusted computing and trusted systems
Han Secure solution of trusted Internet of things base on TCM
TW201506670A (en) A secure element for a telecommunications terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20141015