CN104102876A - Device for safeguarding operational security of client side - Google Patents
Device for safeguarding operational security of client side Download PDFInfo
- Publication number
- CN104102876A CN104102876A CN201410342446.2A CN201410342446A CN104102876A CN 104102876 A CN104102876 A CN 104102876A CN 201410342446 A CN201410342446 A CN 201410342446A CN 104102876 A CN104102876 A CN 104102876A
- Authority
- CN
- China
- Prior art keywords
- middleware
- operating system
- secure
- execution environment
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
An embodiment of the invention discloses a device for safeguarding operational security of a client side. The device comprises a security part, an unsecure operating system, a secure operating system, a first middleware proxy, a second middleware proxy and second middleware, wherein the first middleware proxy and the second middleware proxy operate in the unsecure operating system, and the second middleware operates in the secure operating system. Client-side applications are installed on the unsecure operating system and directly call first middleware and call the second middleware through the second middleware proxy. Sensitive data in the client-side applications are stored in the security part, the first middleware is used for completing a part of service functions in the client-side applications in the unsecure operating system, and the second middleware is used for completing another part of service functions of the client-side applications by interacting with the security part in the unsecure operating system. According to the embodiment, potential security hazards of operations completed by the client side are reduced or even avoided.
Description
Technical Field
The invention relates to the technical field of embedding, in particular to a device for guaranteeing the operation safety of a client.
Background
An application system of an online banking system or an electronic financial system, etc. is generally composed of: the security of the whole application system is ensured by the operation security of the three parts. For example, in an internet banking system, the service end and the middle network layer are guaranteed by a bank to ensure the operation safety, and the client end is guaranteed by an internet banking safety device to ensure the operation safety.
At present, the mainstream internet banking security device is: the internet banking shield (also called as usb key, the shape of which looks like a portable usb disk) has been widely used in various terminal authentication products such as internet banking and electronic finance as a terminal for user identity authentication and transaction signature. Similarly, in other application systems besides the internet banking system, there is also a device for ensuring the operation safety of the client.
The devices for ensuring the operation safety of the client side are integrated with a microprocessor, a memory and a Chip On Sysetem (COS) and form an independent computer system with independent data processing capacity. And, the security of data processing and transmission in the device is guaranteed through the security mechanism of COS.
Since these devices for securing the operation of the client are small in size, the configuration of the on-chip operating system and the hardware thereof are usually not too high. Due to the configuration limitation, only some operations with very high security requirements can be given to the device to execute, and the rest operations with relatively low security requirements can be given to the client to execute, so as to avoid causing too much work pressure on the device.
However, in the process of implementing the present invention, the inventors of the present invention found that at least the following problems exist in the prior art: since the client runs in an open execution environment (the execution environment includes an operating system portion and a corresponding hardware portion), and the open execution environment itself is not secure and trusted, there is a great safety risk to the operations performed by the client. For example, when a user inputs a PIN code of an online banking shield on a client so that the client submits the PIN code to the online banking shield for verification, since an open execution environment cannot prevent attacks of malicious software such as keyboard records, the PIN code may be leaked.
Disclosure of Invention
In order to solve the above technical problem, embodiments of the present invention provide a device for ensuring the operation security of a client, so as to reduce or even avoid the potential safety hazard of operations performed by the client.
The embodiment of the invention discloses the following technical scheme:
an apparatus for securing client operations, comprising: the secure component, the non-secure operating system, the first middleware and the second middleware agent running in the non-secure operating system, and the second middleware running in the secure operating system; wherein,
installing a client application on the non-secure operating system, wherein the client application directly calls the first middleware, and the client application calls the second middleware through the second middleware agent;
the safety component is used for realizing the information safety of the device;
the first middleware is used for completing a first part of service functions preset in the client application in the non-secure operating system;
the second middleware is used for finishing a second part of service functions preset in the client application through interaction with the safety component in the safety operating system.
The secure operating system is located in a secure execution environment, the non-secure operating system is located in a non-secure execution environment, and the secure execution environment and the non-secure execution environment are isolated through a hardware firewall.
The secure execution environment and the insecure execution environment share a same hardware system.
The hardware system is a Trusted Execution Environment (TEE) chip hardware system.
And switching between the secure execution environment and the non-secure execution environment through a secure monitor.
The second middleware interacts with the security component through an application program interface, API.
The second middleware at least comprises input middleware, output middleware, identity authentication middleware, signature middleware and file management middleware.
The second middleware agent includes at least: the system comprises an input middleware agent, an output middleware agent, an identity authentication middleware agent, a signature middleware agent and a file management middleware agent.
The security components include an on-chip operating system COS and a secure element SE chip hardware system.
The COS at least comprises an input subsystem, an output subsystem, an identity authentication subsystem, a signature subsystem and a file management subsystem.
The COS further comprises: and the life cycle subsystem is used for managing each life cycle of the COS.
As can be seen from the above embodiments, compared with the prior art, the present invention has the following advantages:
the device for guaranteeing the operation safety of the client is built in the equipment where the client is located, that is, the client and the device for guaranteeing the operation safety of the client are integrated in the same equipment. In the device, two isolated operating systems are included: the system comprises a secure operating system and a non-secure operating system, wherein the secure execution environment of the secure operating system and the non-secure execution environment of the non-secure operating system share the same hardware system. For operations with no or very low security requirements, the execution may be controlled by a non-secure operating system. And the operation with higher safety requirement can be controlled and executed by the safe execution environment. For example, the input of a PIN code or the like. Thus, the safety risks of the operations performed by the client can be reduced or even avoided.
In addition, because the secure execution environment in which the secure operating system is located and the non-secure execution environment in which the non-secure operating system is located share the same hardware system, the cost is saved, and the complexity and the power consumption are reduced.
Moreover, the device for guaranteeing the operation safety of the client is arranged in the equipment where the client is located, so that the device for guaranteeing the operation safety of the client can be prevented from being pulled out by a user in the service execution process, and the smooth execution of the service is guaranteed.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a structural diagram of an embodiment of an apparatus for securing operation of a client according to the present invention;
fig. 2 is a block diagram of another embodiment of an apparatus for securing client operation according to the present invention;
FIG. 3 is a block diagram of another embodiment of an apparatus for securing client operations according to the present invention;
fig. 4 is a flowchart of a method for implementing signature operation by the device for ensuring the operation security of the client according to the present invention.
Detailed Description
The embodiment of the invention provides a device for guaranteeing the operation safety of a client. The core of the technical scheme of the invention is that stronger hardware and software performance is provided for the device for guaranteeing the operation safety of the client, and the device for guaranteeing the operation safety of the client is built in the equipment where the client is located, namely, the client and the device for guaranteeing the operation safety of the client are integrated in the same equipment. The integrated equipment is the novel device for guaranteeing the operation safety of the client. The device can be a PC, and can also be various mobile terminals (including mobile phones, tablet computers and the like). Wherein, in the apparatus, two parallel execution environments are isolated: an unsecure execution environment and a secure execution environment. Operations with no or very low security requirements may be placed in an unsecure execution environment for execution. And operations with higher safety requirements can be executed in a safe execution environment.
At present, a "secure operating system" (which may also be referred to as a trusted operating system) means that a computer information system meets corresponding security technical requirements in ten aspects of autonomous access control, mandatory access control, tagging, identity authentication, object reuse, auditing, data integrity, covert channel analysis, trusted path, trusted recovery, and the like. The main characteristics of the "secure operating system" are:
1. the least privileged principle, i.e. each privileged user has only the right to do his work.
2. And implementing autonomous access control and mandatory access control, wherein the mandatory access control comprises confidentiality access control and integrity access control.
3. And (6) safety audit.
4. The security domains are isolated.
With these bottom-level security functions, viruses, trojans, network intrusions and human illegal operations mixed as "application software" can be truly resisted, because the viruses, the trojans, the network intrusions and the human illegal operations violate the security rules of the operating system and lose the running basis.
A secure execution environment, for example, a Trusted Execution Environment (TEE) refers to a secure operating system that runs on a terminal device adopting a secure design, so as to provide a Trusted application execution environment on an existing terminal device. Equipment running a TEE may reach EAL2, 3 or higher levels as needed. The security design includes aspects such as the SoC (System On Chip) Chip and the circuit board layout rule. In the aspect of SoC chips, currently, most of application processor cores on mobile terminals use Cortex series chips of ARM corporation, and ARM corporation realizes TrustZone technology on Cortex processors.
The TrustZone technology enables the SoC chip to have a normal state and a safe state, and in the normal state, non-safe operating systems such as Android and the like can be operated, and corresponding application programs can be executed. In the secure state, a secure operating system (Trusted OS) may be run and perform certain operations and services that require greater security, such as user password entry, transaction information display, secure session establishment with a remote server, encryption and decryption of data, preservation of user sensitive information, and the like. When in the secure state, each application under the non-secure operating system has no control right on the whole terminal device, and only the corresponding application under the secure operating system can access the terminal device, such as a display, a keyboard, an SD card, and an NFC (Near Field Communication) device on the terminal device.
The security operating system can resist various remote attacks and local software attacks known at present, and partial hardware attacks, and can not resist various anti-tampering hardware attacks of the smart card.
In addition, in terms of software, the application program can be divided into two parts, one part is the application program running under a non-secure operating system such as Android and the like, the application program provides a friendly interface for a user, and the other part is the secure service running in the secure operating system, and the secure service performs higher-security operations, such as user information input, transaction content confirmation and the like.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below.
Please refer to fig. 1, which is a block diagram of an embodiment of an apparatus for securing client operation according to the present invention, wherein the apparatus 10 includes: the secure component 11, the insecure operating system 12, the secure operating system 13, the first middleware 121 and the second middleware agent 122 running in the insecure operating system 12, and the second middleware 131 running in the secure operating system 13. Wherein,
the client application 20 is installed on the non-secure operating system 12, the client application 20 directly calls the first middleware 121 running in the non-secure operating system 12, and the client application 20 calls the second middleware 131 running in the secure operating system 13 through the second middleware agent 122 running in the non-secure operating system 12.
The security component 11 is used to implement the information security of the device.
The first middleware 121 is configured to complete a first part of service functions preset in the client application 20 in the insecure operating system 12. The second middleware 131 is configured to complete a second part of service functions preset in the client application by interacting with the security component 11 in the secure operating system 13. For example, when the device 10 for securing the operation of the client is applied to an internet banking application, the security component 11 stores sensitive data 21 including, but not limited to, a PIN code and a transaction key.
The preset first part of service functions are preset service functions with low security, that is, the first middleware completes the service functions with low security in the client application. And the preset second part of service functions are preset service functions with high safety, namely, the second middleware completes the service functions with high safety in the client application. For example, high security service functions include, but are not limited to: user information input and transaction signatures, etc.
The security component 11 may be specifically a usb key module (for storing sensitive data), and the second middleware interacts with the usb key module in the secure operating system, so as to implement mathematical operations such as transaction signature, encryption, decryption, and the like.
The middleware is arranged on the upper layers of an operating system, a network and a database and the lower layer of an application program, and is generally used for providing an operation and development environment for the application program on the upper layer of the middleware, and helping a user to develop and integrate the complex application program flexibly and efficiently.
In a preferred embodiment of the present invention, as shown in fig. 2, the secure operating system 12 is located in a secure execution environment, the non-secure operating system 13 is located in a non-secure execution environment, and the secure execution environment is separated from the non-secure execution environment by a hardware firewall.
In another preferred embodiment of the invention, the secure execution environment and the non-secure execution environment share the same hardware system. For example, the hardware system is a Trusted Execution Environment (TEE) chip hardware system.
In another preferred embodiment of the invention, the switching between the secure execution environment and the non-secure execution environment is performed by a security monitor.
Wherein, the switch between two physical address spaces in the safe execution environment and the non-safe execution environment can be realized through the memory attribute. I.e., a secure address space and a non-secure address space, the non-secure execution environment can only access the non-secure address space and not the secure address space.
In another preferred embodiment of the present invention, as shown in fig. 3, the second middleware 131 interacts with the secure element 11 through an Application Programming Interface (API).
In the technical scheme of the invention, the secure operating system provides a secure operating environment for the second middleware, and the second middleware is a secure and trusted middleware. Therefore, the middleware related to the operation with a very high security requirement in the client application can be used as the second middleware to run in the secure operating system, and the middleware related to the operation with a relatively low security requirement in the client application can be used as the first middleware to run in the non-secure operating system. Of course, all of the middleware related to all operations in the client application may be regarded as the second middleware.
In a preferred embodiment of the present invention, the second intermediate member includes at least: the system comprises input middleware, output middleware, identity authentication middleware, signature middleware and file management middleware.
For example, the input middleware may be a keyboard or a middleware of a touch device, and the input middleware is operated in the secure operating system as a second middleware, so that attacks of some malicious software such as keyboard records and the like can be prevented, the problems of PIN code leakage and the like are avoided, and the security is ensured.
In order to achieve secure isolation between the secure operating system and the non-secure operating system, and thereby ensure the security of each second middleware running in the secure operating system, a client application located in the non-secure operating system must invoke the second middleware through an authorized agent (i.e., a second middleware agent). It will be appreciated that the second middleware agent acts as a secure channel between the non-secure operating system and the secure operating system.
In another preferred embodiment of the present invention, corresponding to the second middleware, the second middleware agent includes at least: the system comprises an input middleware agent, an output middleware agent, an identity authentication middleware agent, a signature middleware agent and a file management middleware agent.
In another preferred embodiment of the present invention, the security component 11 includes a COS (Chip Operating System) and a SE (Secure Element) Chip hardware System.
The security mechanism of the COS can ensure the security of data operation and data transmission in the security component 11. The safety unit 11 has a high safety level, all related operations with high safety requirements can be executed in the safety operating system 13 and the safety unit 11, the safety operating system 13 provides high safety operation performance, and the safety unit 11 provides high safety storage and operation performance.
In order to cooperate with the second middleware in the secure operating system to complete the operation with higher security requirement, in another preferred embodiment of the present invention, the COS at least comprises an input subsystem, an output subsystem, an identity authentication subsystem, a signature subsystem and a file management subsystem, corresponding to the second middleware.
It will be appreciated that the input middleware in the second middleware performs input functions in the client application by interacting with the input subsystem in the COS. The output middleware in the second middleware interacts with the output subsystem in the COS to complete the output function in the client application. And the identity authentication middleware in the second middleware interacts with the identity authentication subsystem in the COS to complete the identity authentication function in the client application. And the signature middleware in the second middleware interacts with the signature subsystem in the COS to complete the signature function in the client application. And the file management middleware in the second middleware interacts with the file management subsystem in the COS to complete the file management function in the client application. And, since the second middleware located in the secure operating system initiates the establishment of communication with the COS in the secure element, all operations are completed in the secure operating system, thus guaranteeing high security of the operations.
In another preferred embodiment of the present invention, the above COS further comprises a lifecycle subsystem for managing the individual lifecycle of the COS.
For example, the various life cycles of the COS include, but are not limited to, the development and production stages.
As can be seen from the above embodiments, compared with the prior art, the present invention has the following advantages:
the device for guaranteeing the operation safety of the client is built in the equipment where the client is located, that is, the client and the device for guaranteeing the operation safety of the client are integrated in the same equipment. In the device, two isolated operating systems are included: the system comprises a secure operating system and a non-secure operating system, wherein the secure execution environment of the secure operating system and the non-secure execution environment of the non-secure operating system share the same hardware system. For operations with no or very low security requirements, the execution may be controlled by a non-secure operating system. And the operation with higher safety requirement can be controlled and executed by the safe execution environment. For example, the input of a PIN code or the like. Thus, the safety risks of the operations performed by the client can be reduced or even avoided.
In addition, because the secure execution environment in which the secure operating system is located and the non-secure execution environment in which the non-secure operating system is located share the same hardware system, the cost is saved, and the complexity and the power consumption are reduced.
Moreover, the device for guaranteeing the operation safety of the client is arranged in the equipment where the client is located, so that the device for guaranteeing the operation safety of the client can be prevented from being pulled out by a user in the service execution process, and the smooth execution of the service is guaranteed.
In the internet banking system, for the client application of the internet banking, one of the most important operations in the transaction operations performed between the client application and the server is the signature operation, and the operation has a very high security requirement. The following describes how to implement a signature operation in the device for ensuring the security of client operation according to the present invention, by taking a transaction signature operation as an example. Please refer to fig. 4, which is a flowchart illustrating a method for implementing a signature operation by using the apparatus for ensuring the security of client operation according to the present invention, which specifically includes the following steps:
step 401: and starting the online banking client application in the non-secure operating system.
Step 402: and the online banking client application calls a first middleware in the non-secure operating system.
Step 403: and the online banking client application calls a second middleware agent in the non-secure operating system so as to call second middleware in the secure operating system through the second middleware agent.
Step 404: the security monitor monitors for a switch of the operating system from the non-secure operating system to the secure operating system.
Step 405: in the secure operating system, the secure operating system controls the input middleware to receive the PIN code input by the user.
Step 406: the secure operating system establishes a secure channel between it and the secure element and sends a request message requesting verification of the PIN code to the secure element over the secure channel.
Wherein, the request message carries the PIN code.
Step 407: and the safety component responds to the request message, verifies the PIN code, and sends a response message that the PIN code passes the verification to the safety operating system through the safety channel after the PIN code passes the verification.
Step 408: the secure operating system controls the signature middleware to perform transaction negotiation and check transaction data.
For example, the verification of the transaction data may include verifying whether the total length of the transaction data is consistent with the total number of the transaction data, verifying whether the format of the transaction data meets requirements, and verifying whether the transaction data is complete.
Step 409: and after the transaction negotiation and the transaction data verification are passed, the secure operating system controls the signature middleware to send the transaction data to the secure component.
Meanwhile, the safe operating system can also control the output middleware to display the transaction amount and the related information.
Step 410: the safety component carries out transaction signature on the transaction data and sends the transaction signature data to the safety operating system through the signature middleware.
Step 411: and the secure operating system controls the output middleware to display the transaction signature result.
Step 412: the secure operating system control input middleware receives a transaction confirmation key code input by a user.
Step 413: the security monitor switches the operating system from the secure operating system back to the non-secure operating system.
Step 414: and the non-secure operating system returns the transaction signature result to the online banking client application.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions when the actual implementation is performed, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not performed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some interfaces, and may be in an electrical, mechanical or other form.
The units described as separate parts may be or may be physically separate, and parts displayed as units may be or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can be realized in a form of a software functional unit.
It should be noted that, as will be understood by those skilled in the art, all or part of the processes in the methods of the above embodiments may be implemented by a computer program, which may be stored in a computer-readable storage medium, and when executed, may include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above detailed description is provided for the device for ensuring the operation security of the client, and the principle and the implementation of the present invention are explained in the present document by applying specific embodiments, and the description of the above embodiments is only used to help understanding the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.
Claims (11)
1. An apparatus for securing client operation, comprising: the secure component, the non-secure operating system, the first middleware and the second middleware agent running in the non-secure operating system, and the second middleware running in the secure operating system; wherein,
installing a client application on the non-secure operating system, wherein the client application directly calls the first middleware, and the client application calls the second middleware through the second middleware agent;
the safety component is used for realizing the information safety of the device;
the first middleware is used for completing a first part of service functions preset in the client application in the non-secure operating system;
the second middleware is used for finishing a second part of service functions preset in the client application through interaction with the safety component in the safety operating system.
2. The apparatus of claim 1, wherein the secure operating system is located in a secure execution environment and the non-secure operating system is located in a non-secure execution environment, and wherein the secure execution environment and the non-secure execution environment are separated by a hardware firewall.
3. The apparatus of claim 2, wherein the secure execution environment and the insecure execution environment share a same hardware system.
4. The apparatus of claim 3, wherein the hardware system is a Trusted Execution Environment (TEE) chip hardware system.
5. The apparatus of claim 2, wherein switching between the secure execution environment and the non-secure execution environment is performed via a security monitor.
6. The apparatus of claim 1, wherein the second middleware interacts with the security component through an Application Program Interface (API).
7. The apparatus of claim 1, wherein the second middleware comprises at least input middleware, output middleware, authentication middleware, signature middleware, and file management middleware.
8. The apparatus of claim 7, wherein the second middleware agent comprises at least: the system comprises an input middleware agent, an output middleware agent, an identity authentication middleware agent, a signature middleware agent and a file management middleware agent.
9. The apparatus of claim 7, wherein the security component comprises an operating system on a Chip (COS) and a Secure Element (SE) chip hardware system.
10. The apparatus as recited in claim 9, wherein the COS includes at least an input subsystem, an output subsystem, an authentication subsystem, a signature subsystem, and a file management subsystem.
11. The apparatus as recited in claim 10, wherein the COS further comprises: and the life cycle subsystem is used for managing each life cycle of the COS.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201410342446.2A CN104102876A (en) | 2014-07-17 | 2014-07-17 | Device for safeguarding operational security of client side |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201410342446.2A CN104102876A (en) | 2014-07-17 | 2014-07-17 | Device for safeguarding operational security of client side |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN104102876A true CN104102876A (en) | 2014-10-15 |
Family
ID=51671019
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201410342446.2A Pending CN104102876A (en) | 2014-07-17 | 2014-07-17 | Device for safeguarding operational security of client side |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN104102876A (en) |
Cited By (33)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104462935A (en) * | 2014-12-24 | 2015-03-25 | 宇龙计算机通信科技(深圳)有限公司 | Method and terminal for performing safety verification on application program in multi-operation system |
| CN104598793A (en) * | 2015-01-08 | 2015-05-06 | 百度在线网络技术(北京)有限公司 | Fingerprint authentication method and fingerprint authentication device |
| CN104866782A (en) * | 2015-05-29 | 2015-08-26 | 宇龙计算机通信科技(深圳)有限公司 | Data processing method and apparatus |
| CN105205370A (en) * | 2015-08-24 | 2015-12-30 | 北京恒信安科技有限公司 | Safety protection method for mobile terminal, mobile terminal, safety system and application method |
| CN105260664A (en) * | 2015-09-24 | 2016-01-20 | 宇龙计算机通信科技(深圳)有限公司 | Security protection method and terminal for application among multiple systems |
| CN105335673A (en) * | 2015-12-14 | 2016-02-17 | 联想(北京)有限公司 | Information safety processing method and device |
| CN105468980A (en) * | 2015-11-16 | 2016-04-06 | 华为技术有限公司 | Security control method, device and system |
| CN105574720A (en) * | 2015-12-14 | 2016-05-11 | 联想(北京)有限公司 | Secure information processing method and secure information processing apparatus |
| CN105630534A (en) * | 2015-04-27 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | TrustZone framework-based application program execution method and device as well as terminal |
| WO2016095506A1 (en) * | 2014-12-19 | 2016-06-23 | 深圳市中兴微电子技术有限公司 | Ciphertext data decryption method, system and computer storage medium |
| WO2016101559A1 (en) * | 2014-12-26 | 2016-06-30 | 深圳市中兴微电子技术有限公司 | Secure data access method and device, and computer storage medium |
| CN105787353A (en) * | 2014-12-17 | 2016-07-20 | 联芯科技有限公司 | Credible application management system and loading method for credible applications |
| CN105809419A (en) * | 2014-12-29 | 2016-07-27 | 北京握奇智能科技有限公司 | Online banking transaction system |
| CN105809441A (en) * | 2014-12-29 | 2016-07-27 | 北京握奇智能科技有限公司 | Online banking transaction method |
| CN105809433A (en) * | 2014-12-29 | 2016-07-27 | 北京握奇智能科技有限公司 | Online banking transaction method |
| CN105809536A (en) * | 2014-12-29 | 2016-07-27 | 北京握奇智能科技有限公司 | Online banking transaction system |
| CN105959287A (en) * | 2016-05-20 | 2016-09-21 | 中国银联股份有限公司 | Biological feature based safety certification method and device |
| CN106027257A (en) * | 2016-05-05 | 2016-10-12 | 北京元心科技有限公司 | Method and system for securely performing identity authentication |
| WO2016172944A1 (en) * | 2015-04-30 | 2016-11-03 | 华为技术有限公司 | Interface display method of terminal and terminal |
| WO2017045497A1 (en) * | 2015-09-16 | 2017-03-23 | 深圳市中兴微电子技术有限公司 | User verification method, client, controller, and computer storage medium |
| WO2017071546A1 (en) * | 2015-10-29 | 2017-05-04 | 中国银联股份有限公司 | Trusted user interface display method and system |
| CN106778193A (en) * | 2016-11-14 | 2017-05-31 | 北京握奇智能科技有限公司 | A kind of client and UI exchange methods |
| CN106845282A (en) * | 2017-01-06 | 2017-06-13 | 奇酷互联网络科技(深圳)有限公司 | Mobile terminal and its method of controlling security and device |
| CN106897639A (en) * | 2017-01-06 | 2017-06-27 | 奇酷互联网络科技(深圳)有限公司 | The method and apparatus of mobile terminal and its safety verification |
| CN106940776A (en) * | 2016-01-04 | 2017-07-11 | 中国移动通信集团公司 | A kind of sensitive data operating method and mobile terminal |
| CN107003889A (en) * | 2014-12-24 | 2017-08-01 | 英特尔公司 | System and method for providing the compatible credible performing environment of global platform |
| CN107169343A (en) * | 2017-04-25 | 2017-09-15 | 深圳市金立通信设备有限公司 | A kind of method and terminal of control application program |
| CN107392055A (en) * | 2017-07-20 | 2017-11-24 | 深圳市金立通信设备有限公司 | A kind of dual system safety chip control method, terminal, computer-readable recording medium and the dual system framework based on safety chip |
| CN108335105A (en) * | 2018-01-18 | 2018-07-27 | 中国建设银行股份有限公司 | Data processing method and relevant device |
| CN108599938A (en) * | 2018-04-23 | 2018-09-28 | 北京数字认证股份有限公司 | The method and system of mobile terminal private data are protected by credible performing environment |
| CN111125711A (en) * | 2019-12-03 | 2020-05-08 | 支付宝(杭州)信息技术有限公司 | Safety task processing method, device, electronic device and storage medium |
| CN111666172A (en) * | 2020-06-07 | 2020-09-15 | 中信银行股份有限公司 | Method and device for protecting online banking environment, electronic equipment and storage medium |
| CN112305962A (en) * | 2020-10-21 | 2021-02-02 | 麒麟软件有限公司 | Wireless device control method based on ARM platform supporting Trustzone |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102034036A (en) * | 2010-09-07 | 2011-04-27 | 北京握奇数据系统有限公司 | Permission management method and equipment |
| CN103793629A (en) * | 2012-10-26 | 2014-05-14 | 三星电子株式会社 | System-on-chip processing secure contents and mobile device comprising the same |
-
2014
- 2014-07-17 CN CN201410342446.2A patent/CN104102876A/en active Pending
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102034036A (en) * | 2010-09-07 | 2011-04-27 | 北京握奇数据系统有限公司 | Permission management method and equipment |
| CN103793629A (en) * | 2012-10-26 | 2014-05-14 | 三星电子株式会社 | System-on-chip processing secure contents and mobile device comprising the same |
Non-Patent Citations (1)
| Title |
|---|
| 王熙友: "ARM TrustZone安全隔离技术研究与应用", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Cited By (39)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN105787353A (en) * | 2014-12-17 | 2016-07-20 | 联芯科技有限公司 | Credible application management system and loading method for credible applications |
| WO2016095506A1 (en) * | 2014-12-19 | 2016-06-23 | 深圳市中兴微电子技术有限公司 | Ciphertext data decryption method, system and computer storage medium |
| CN107003889A (en) * | 2014-12-24 | 2017-08-01 | 英特尔公司 | System and method for providing the compatible credible performing environment of global platform |
| CN104462935A (en) * | 2014-12-24 | 2015-03-25 | 宇龙计算机通信科技(深圳)有限公司 | Method and terminal for performing safety verification on application program in multi-operation system |
| WO2016101559A1 (en) * | 2014-12-26 | 2016-06-30 | 深圳市中兴微电子技术有限公司 | Secure data access method and device, and computer storage medium |
| CN105809536A (en) * | 2014-12-29 | 2016-07-27 | 北京握奇智能科技有限公司 | Online banking transaction system |
| CN105809433A (en) * | 2014-12-29 | 2016-07-27 | 北京握奇智能科技有限公司 | Online banking transaction method |
| CN105809441A (en) * | 2014-12-29 | 2016-07-27 | 北京握奇智能科技有限公司 | Online banking transaction method |
| CN105809419A (en) * | 2014-12-29 | 2016-07-27 | 北京握奇智能科技有限公司 | Online banking transaction system |
| CN104598793A (en) * | 2015-01-08 | 2015-05-06 | 百度在线网络技术(北京)有限公司 | Fingerprint authentication method and fingerprint authentication device |
| CN105630534A (en) * | 2015-04-27 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | TrustZone framework-based application program execution method and device as well as terminal |
| WO2016172944A1 (en) * | 2015-04-30 | 2016-11-03 | 华为技术有限公司 | Interface display method of terminal and terminal |
| US10891397B2 (en) | 2015-04-30 | 2021-01-12 | Huawei Technologies Co., Ltd. | User interface display method for terminal, and terminal |
| CN104866782A (en) * | 2015-05-29 | 2015-08-26 | 宇龙计算机通信科技(深圳)有限公司 | Data processing method and apparatus |
| CN105205370B (en) * | 2015-08-24 | 2018-12-04 | 北京恒信安科技有限公司 | Mobile terminal safety means of defence and mobile terminal, security system and methods for using them |
| CN105205370A (en) * | 2015-08-24 | 2015-12-30 | 北京恒信安科技有限公司 | Safety protection method for mobile terminal, mobile terminal, safety system and application method |
| WO2017045497A1 (en) * | 2015-09-16 | 2017-03-23 | 深圳市中兴微电子技术有限公司 | User verification method, client, controller, and computer storage medium |
| CN105260664A (en) * | 2015-09-24 | 2016-01-20 | 宇龙计算机通信科技(深圳)有限公司 | Security protection method and terminal for application among multiple systems |
| WO2017071546A1 (en) * | 2015-10-29 | 2017-05-04 | 中国银联股份有限公司 | Trusted user interface display method and system |
| CN105468980A (en) * | 2015-11-16 | 2016-04-06 | 华为技术有限公司 | Security control method, device and system |
| CN105468980B (en) * | 2015-11-16 | 2018-07-03 | 华为技术有限公司 | The method, apparatus and system of a kind of security management and control |
| CN105574720A (en) * | 2015-12-14 | 2016-05-11 | 联想(北京)有限公司 | Secure information processing method and secure information processing apparatus |
| CN105335673A (en) * | 2015-12-14 | 2016-02-17 | 联想(北京)有限公司 | Information safety processing method and device |
| CN106940776A (en) * | 2016-01-04 | 2017-07-11 | 中国移动通信集团公司 | A kind of sensitive data operating method and mobile terminal |
| CN106027257A (en) * | 2016-05-05 | 2016-10-12 | 北京元心科技有限公司 | Method and system for securely performing identity authentication |
| CN105959287A (en) * | 2016-05-20 | 2016-09-21 | 中国银联股份有限公司 | Biological feature based safety certification method and device |
| CN106778193A (en) * | 2016-11-14 | 2017-05-31 | 北京握奇智能科技有限公司 | A kind of client and UI exchange methods |
| CN106778193B (en) * | 2016-11-14 | 2023-02-03 | 北京握奇智能科技有限公司 | Client and UI interaction method |
| CN106897639B (en) * | 2017-01-06 | 2020-12-22 | 奇酷互联网络科技(深圳)有限公司 | Mobile terminal and security verification method and device thereof |
| CN106845282A (en) * | 2017-01-06 | 2017-06-13 | 奇酷互联网络科技(深圳)有限公司 | Mobile terminal and its method of controlling security and device |
| CN106897639A (en) * | 2017-01-06 | 2017-06-27 | 奇酷互联网络科技(深圳)有限公司 | The method and apparatus of mobile terminal and its safety verification |
| CN107169343A (en) * | 2017-04-25 | 2017-09-15 | 深圳市金立通信设备有限公司 | A kind of method and terminal of control application program |
| CN107392055A (en) * | 2017-07-20 | 2017-11-24 | 深圳市金立通信设备有限公司 | A kind of dual system safety chip control method, terminal, computer-readable recording medium and the dual system framework based on safety chip |
| CN108335105A (en) * | 2018-01-18 | 2018-07-27 | 中国建设银行股份有限公司 | Data processing method and relevant device |
| CN108599938A (en) * | 2018-04-23 | 2018-09-28 | 北京数字认证股份有限公司 | The method and system of mobile terminal private data are protected by credible performing environment |
| CN111125711B (en) * | 2019-12-03 | 2021-05-07 | 支付宝(杭州)信息技术有限公司 | Safety task processing method, device, electronic device and storage medium |
| CN111125711A (en) * | 2019-12-03 | 2020-05-08 | 支付宝(杭州)信息技术有限公司 | Safety task processing method, device, electronic device and storage medium |
| CN111666172A (en) * | 2020-06-07 | 2020-09-15 | 中信银行股份有限公司 | Method and device for protecting online banking environment, electronic equipment and storage medium |
| CN112305962A (en) * | 2020-10-21 | 2021-02-02 | 麒麟软件有限公司 | Wireless device control method based on ARM platform supporting Trustzone |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN104102876A (en) | Device for safeguarding operational security of client side | |
| US8935746B2 (en) | System with a trusted execution environment component executed on a secure element | |
| US10193926B2 (en) | Apparatuses, methods and systems for a secure resource access and placement platform | |
| Cooijmans et al. | Analysis of secure key storage solutions on android | |
| Ying et al. | Truz-droid: Integrating trustzone with mobile operating system | |
| EP3332372B1 (en) | Apparatus and method for trusted execution environment based secure payment transactions | |
| JP6293133B2 (en) | Network-based management of protected data sets | |
| JP2016535547A (en) | Method for authenticating operations performed on a subject computing device | |
| JP2016536713A (en) | Mobile communication apparatus and operation method thereof | |
| KR20150106937A (en) | Context based switching to a secure operating system environment | |
| CN107077565A (en) | The collocation method and equipment of a kind of safe configured information | |
| Ying et al. | Truz-view: Developing trustzone user interface for mobile os using delegation integration model | |
| KR20190039603A (en) | Security processor chip and terminal device | |
| CN107209884A (en) | Store security credential information in different regions | |
| Vasudevan et al. | Trustworthy execution on mobile devices | |
| KR101173911B1 (en) | Network Separation System with a Switching Type of Selection Between Virtual Machines | |
| KR102540097B1 (en) | Device risk-based trusted device verification and remote access processing system | |
| US10904011B2 (en) | Configuration updates for access-restricted hosts | |
| CN101047701B (en) | System and method for ensuring safety operation of applied program | |
| Song et al. | App’s auto-login function security testing via android os-level virtualization | |
| Mannan et al. | Unicorn: Two-factor attestation for data security | |
| KR102095114B1 (en) | Method for combining trusted execution environments for functional extension and method for applying fido u2f for supporting business process | |
| Fournaris et al. | From hardware security tokens to trusted computing and trusted systems | |
| Han | Secure solution of trusted Internet of things base on TCM | |
| TW201506670A (en) | A secure element for a telecommunications terminal |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20141015 |