[go: up one dir, main page]

HK1261951B - Data key protection method, device and system - Google Patents

Data key protection method, device and system Download PDF

Info

Publication number
HK1261951B
HK1261951B HK19121795.9A HK19121795A HK1261951B HK 1261951 B HK1261951 B HK 1261951B HK 19121795 A HK19121795 A HK 19121795A HK 1261951 B HK1261951 B HK 1261951B
Authority
HK
Hong Kong
Prior art keywords
key
user
acquisition request
management subsystem
information
Prior art date
Application number
HK19121795.9A
Other languages
Chinese (zh)
Other versions
HK1261951A1 (en
Inventor
付颖芳
Original Assignee
阿里巴巴集团控股有限公司
Filing date
Publication date
Application filed by 阿里巴巴集团控股有限公司 filed Critical 阿里巴巴集团控股有限公司
Publication of HK1261951A1 publication Critical patent/HK1261951A1/en
Publication of HK1261951B publication Critical patent/HK1261951B/en

Links

Description

数据密钥的保护方法、装置和系统Data key protection method, device and system

技术领域Technical Field

本发明涉及可信计算技术领域,具体而言,涉及一种数据密钥的保护方法、装置和系统。The present invention relates to the field of trusted computing technology, and in particular to a method, device and system for protecting a data key.

背景技术Background Art

可信计算能够在计算运算的同时进行安全防护,使计算结果总是与预期一致,计算全程可测可控,不被干扰。Trusted computing can provide security protection while performing calculations, so that the calculation results are always consistent with expectations, and the entire calculation process is measurable and controllable without interference.

目前可信计算有国内可信平台控制模块(Trusted Platform Control Module,简称 TPCM)和国际可信计算(Trusted Computing Group,简称TCG)标准组织的可信平台模块(Trusted Platform Module,简称TPM)两种技术路线。Currently, trusted computing has two technical routes: the domestic Trusted Platform Control Module (TPCM) and the Trusted Platform Module (TPM) of the international Trusted Computing Group (TCG) standard organization.

可信计算的核心要素是可信链与可信根,TCG规范中的可信平台模块(TrustedPlatform Module,简称TPM)是可信计算平台的硬件可信根,TPM是提供受保护的安全存储、密码运算能力的安全芯片。TPM通过物理方式与计算平台相连并通过外部总线连接到CPU上,例如PC机平台上采取直接固化在主板上的方式并通过线性预测编码(LinearPredictive Coding,简称LPC)总线连接。The core elements of trusted computing are the trusted chain and the root of trust. The Trusted Platform Module (TPM), as defined in the TCG specification, is the hardware root of trust for the trusted computing platform. The TPM is a security chip that provides protected secure storage and cryptographic computing capabilities. The TPM is physically connected to the computing platform and to the CPU via an external bus. For example, on a PC, it is directly embedded in the motherboard and connected via the Linear Predictive Coding (LPC) bus.

TCG规范中给出了对可信(trusted)的定义:一个实体一直以一种可预期的方式为特定的目标运行。可信计算的核心机制是通过信任链机制构建可信计算环境,目前运行实体是否可信是建立系统前一运行过程是否可信的基础上。基于这种信任关系,如果系统从一个初始的信任根出发,在平台计算环境的每一次转换时,这种信任可以通过传递的方式维持下去,从而在计算平台上建立了一级验证一级,一级信任一级的可信链,该计算环境就始终是可信的,它就能够被本地用户或远程实体信任,如图1 所示,图1是TCG信任链的结构示意图。The TCG specification defines trusted as: an entity that consistently operates in a predictable manner for a specific purpose. The core mechanism of trusted computing is to build a trusted computing environment through a trust chain mechanism. The trustworthiness of a currently operating entity is based on the trustworthiness of the system's previous operating processes. Based on this trust relationship, if the system starts from an initial root of trust, this trust can be maintained through a transitive process with each transition in the platform computing environment, thereby establishing a trust chain of verification and trust on the computing platform. This ensures that the computing environment remains trustworthy and can be trusted by local users or remote entities. Figure 1 shows the structure of the TCG trust chain.

可信计算的关键技术包括可信度量,可信报告,可信存储和可信网络连接等几部分。The key technologies of trusted computing include trusted measurement, trusted reporting, trusted storage, and trusted network connections.

可信平台控制模块TPCM实现了可信平台模块的基本功能,其功能组成和与TPM 基本相同,但由于TPM的核心度量根(Core Root of Trust for Measurement,简称CRTM) 处于基本输入输出系统(Basic Input Output System,简称BIOS)中,不受TPM的保护,因此,TPCM提出新的可信度量根设计,解决了可信度量根的起始度量点问题,改变了启动和度量顺序,在此基础上,建立了以该芯片为信任根的信任链度量流程,实现了由该芯片控制整个系统的启动,I/O接口控制以及系统配置等,体现了该芯片对系统可信性的控制作用。The Trusted Platform Control Module (TPCM) implements the basic functions of a Trusted Platform Module (TPM). Its functional components are essentially the same as those of a TPM. However, because the TPM's Core Root of Trust for Measurement (CRTM) resides in the Basic Input Output System (BIOS) and is not protected by the TPM, the TPCM proposes a new trusted measurement root design that addresses the starting measurement point of the trusted measurement root and changes the startup and measurement sequence. This establishes a trust chain measurement process with the chip as the trust root, enabling the chip to control the entire system's startup, I/O interface control, and system configuration, demonstrating its control over system trustworthiness.

在计算平台的运行控制传递过程中,可信根TPCM判断其下一级执行代码的真实性和完整性是否被篡改,如果没有,系统将运行控制权传递到下一级可信执行代码,系统的可信范围因扩大到下一级功能代码;同理,这种系统控制权不断传递,就可以实现信任链的建立和传递过程,最终实现系统范围可信构建。一个完整的系统可信传递过程要从可信根开始,系统控制权顺序由可信平台控制模块传递到可信的BIOS,再传递到可信的操作系统装载器,从可信的操作系统装载器传递到可信的操作系统,再从可信的操作系统传递到可信的应用。During the computing platform's operational control transfer process, the trusted root (TPCM) determines whether the authenticity and integrity of its next-level execution code have been tampered with. If not, the system transfers operational control to the next-level trusted execution code, expanding the system's trusted scope to the next-level functional code. Similarly, this continuous transfer of system control enables the establishment and transfer of a trust chain, ultimately achieving system-wide trust. A complete system trust transfer process begins with the trusted root. System control is sequentially transferred from the trusted platform control module to the trusted BIOS, then to the trusted operating system loader, from the trusted operating system loader to the trusted operating system, and finally from the trusted operating system to the trusted application.

其中,在现有的金融加密机保护数据密钥方法中:Among them, in the existing financial encryption machine data key protection method:

银行业使用标准为:ansi x9.17,为三层密钥体系,对不同密钥(特别是工作密钥)的功能做了严格的使用限制,专钥专用限定。密钥分层体系图,图2是密钥体系结构图,如图2所示;The banking industry uses the standard ANSI X9.17, which is a three-tiered key system. It places strict restrictions on the functions of different keys (especially working keys), and specifies that specific keys are used for specific purposes. Figure 2 shows a diagram of the key hierarchy.

第一层是加密机主密钥(Master Key,简称MK或LMK),第二层是银行主密钥(BankMaster Key,简称BMK或ZMK),第三层是工作密钥包括信息完整性密钥(MAK)、 PIN保护密钥(PI K)、终端密钥(TMK)。The first layer is the encryption machine master key (Master Key, abbreviated as MK or LMK), the second layer is the bank master key (BankMaster Key, abbreviated as BMK or ZMK), and the third layer is the working key including the message integrity key (MAK), PIN protection key (PI K), and terminal key (TMK).

第一层,MK为加密机主密钥,由三个成分组成,采用双倍标准的3DES密钥(长达128),存放在硬件加密机内。它的作用保护存储在加密机外的各种密钥和关键数据的加密密钥。The first layer, MK, is the encryption machine master key. It consists of three components and uses a double standard 3DES key (up to 128 characters). It is stored in the hardware encryption machine. Its role is to protect the encryption keys of various keys and critical data stored outside the encryption machine.

第二层,BMK通常称为密钥加密密钥(Kev—encrypting Key)或密钥交换密钥(KeyExchange Key)。它的作用是采用对称(DES算法)或非对称(RSA算法)加密在通讯线路上需要传递的工作密钥,从而实现工作密钥的自动分配。在本地或共享网络中,不同的两个通讯网点使用不同的密钥加密密钥,从而实现密钥的分工管理,它在本地存放时,处于本地MK的加密之下或直接保存在硬件加密机中。The second layer, the BMK, is often called a key encryption key (Kev) or key exchange key. It encrypts the working key transmitted over the communication line using either a symmetric (DES) algorithm or an asymmetric (RSA) algorithm, thereby enabling automatic distribution of working keys. In a local or shared network, different communication nodes use different Kev encryption keys, thus achieving a division of labor for key management. When stored locally, the key is encrypted by the local MK or stored directly in a hardware encryption device.

第三层,通常称为工作密钥或数据密钥。包括PIK、MAK、TM K(包括TPK、TAK)等密钥。它的作用是加密各种不同的数据,从而实现数据的保密、信息的认证,以及数字签名等功能,这些数据密钥在本地存放时,处于BMK的加密之下或直接保存在硬件加密机中。The third layer, commonly referred to as working keys or data keys, includes PIK, MAK, TMK (including TPK and TAK), and other keys. Its function is to encrypt various data, thereby achieving data confidentiality, information authentication, and digital signatures. When these data keys are stored locally, they are encrypted by the BMK or directly stored in a hardware encryption device.

如图3所示,图3是加密机典型部署结构示意图,典型部署包括加密机、用户终端、系统应用主机,可以将一台应用主机专门用来安装授权系统,当用户使用数据密钥时,从客户端上传证书及口令,以传输密钥加密的方式,传到授权系统,授权系统鉴别为合法用户后,才允许从加密机以明文的方式调用数据密钥至应用主机进行数据加解密服务。As shown in Figure 3, Figure 3 is a schematic diagram of the typical deployment structure of the encryption machine. The typical deployment includes the encryption machine, the user terminal, and the system application host. An application host can be used specifically to install the authorization system. When the user uses the data key, the certificate and password are uploaded from the client and transmitted to the authorization system in an encrypted form using the transmission key. Only after the authorization system identifies the user as a legitimate user will it allow the data key to be called from the encryption machine in plain text to the application host for data encryption and decryption services.

但是该方案缺陷在于加密机将数据密钥传输到加密机相连的服务器,其数据密钥是明文传输,这存在一定风险;凭证证书及口令的鉴权方式,其证书需生成及管理维护成本;需要有额外新增一个专门保存口令的设备,如果没有该设备,记在脑子中,存在失忆数据密钥无法使用的风险。However, the drawback of this solution is that the encryption machine transmits the data key to the server connected to the encryption machine, and the data key is transmitted in plain text, which poses certain risks; the authentication method of the credential certificate and password requires the generation and management and maintenance costs of the certificate; an additional device is required to store the password. If this device is not available, and the password is memorized in the mind, there is a risk that the data key cannot be used due to amnesia.

除上述方案外,可信计算中密钥的保护还包括:可信芯片保护数据密钥方法,其中,可信芯片保护数据密钥方法通过将用户数据密钥存在可信芯片里,当需要使用该密钥的时候,凭借用户口令获取使用数据密钥权限。In addition to the above schemes, the protection of keys in trusted computing also includes: the trusted chip protection data key method, in which the trusted chip protection data key method stores the user data key in the trusted chip. When the key is needed, the user password is used to obtain the permission to use the data key.

但是该方案的缺陷在于需要额外新增一个专门保存口令的设备,如果没有该设备,记在脑子中,存在失忆,以致数据密钥无法使用的风险。However, the drawback of this solution is that it requires an additional device dedicated to storing passwords. Without this device, if the password is memorized in the brain, there is a risk of amnesia, making the data key unusable.

针对上述由于现有技术中存在的密钥容易泄密的问题,目前尚未提出有效的解决方案。With respect to the above-mentioned problem of easy leakage of keys in the prior art, no effective solution has been proposed yet.

发明内容Summary of the Invention

本发明实施例提供了一种数据密钥的保护方法、装置和系统,以至少解决由于现有技术中存在的密钥容易泄密的技术问题。The embodiments of the present invention provide a method, device and system for protecting a data key, so as to at least solve the technical problem in the prior art that keys are easily leaked.

根据本发明实施例的一个方面,提供了一种数据密钥的保护方法,包括:用户身份管理子系统服务器接收用户终端发送的第一密钥获取请求,其中,第一密钥获取请求包括用户的身份验证信息;用户身份管理子系统服务器依据第一密钥获取请求向用户终端返回待验证语音信息;用户身份管理子系统服务器接收用户终端依据待验证语音信息上传的用户语音;用户身份管理子系统服务器提取用户语音的声纹特征,并依据声纹特征和身份验证信息生成第二密钥获取请求;用户身份管理子系统服务器将第二密钥获取请求发送至可信芯片。According to one aspect of an embodiment of the present invention, a method for protecting a data key is provided, including: a user identity management subsystem server receives a first key acquisition request sent by a user terminal, wherein the first key acquisition request includes the user's identity authentication information; the user identity management subsystem server returns voice information to be verified to the user terminal based on the first key acquisition request; the user identity management subsystem server receives the user voice uploaded by the user terminal based on the voice information to be verified; the user identity management subsystem server extracts the voiceprint features of the user voice, and generates a second key acquisition request based on the voiceprint features and the identity authentication information; the user identity management subsystem server sends the second key acquisition request to the trusted chip.

可选的,在身份验证信息包括身份信息标识和密钥句柄的情况下,用户身份管理子系统服务器提取用户语音的声纹特征,并依据声纹特征和身份验证信息生成第二密钥获取请求包括:用户身份管理子系统服务器提取用户语音中的声纹特征;用户身份管理子系统服务器通过可信芯片的公钥加密声纹特征、身份信息标识和密钥句柄,生成第二密钥获取请求。Optionally, when the authentication information includes an identity information identifier and a key handle, the user identity management subsystem server extracts the voiceprint features of the user's voice, and generates a second key acquisition request based on the voiceprint features and the authentication information, including: the user identity management subsystem server extracts the voiceprint features in the user's voice; the user identity management subsystem server encrypts the voiceprint features, identity information identifier and key handle through the public key of the trusted chip to generate a second key acquisition request.

可选的,在身份验证信息包括可信证书、身份信息标识和密钥句柄的情况下,用户身份管理子系统服务器依据第一密钥获取请求向用户终端返回待验证语音信息包括:用户身份管理子系统服务器依据用户身份管理子系统私钥解密第一密钥获取请求,其中,第一密钥获取请求通过用户身份管理子系统公钥加密;用户身份管理子系统私钥与用户身份管理子系统公钥对应;用户身份管理子系统服务器解析解密后的第一密钥获取请求,获取第一密钥获取请求中的可信证书;用户身份管理子系统服务器判断可信证书是否满足预设验证条件;在判断结果为是的情况下,用户身份管理子系统服务器向用户终端返回待验证声音信息,其中,待验证声音信息包括:用户身份管理子系统证书和待验证语音。Optionally, when the identity authentication information includes a trusted certificate, an identity information identifier and a key handle, the user identity management subsystem server returns the voice information to be verified to the user terminal based on the first key acquisition request, including: the user identity management subsystem server decrypts the first key acquisition request based on the user identity management subsystem private key, wherein the first key acquisition request is encrypted by the user identity management subsystem public key; the user identity management subsystem private key corresponds to the user identity management subsystem public key; the user identity management subsystem server parses the decrypted first key acquisition request and obtains the trusted certificate in the first key acquisition request; the user identity management subsystem server determines whether the trusted certificate meets the preset verification conditions; if the judgment result is yes, the user identity management subsystem server returns the voice information to be verified to the user terminal, wherein the voice information to be verified includes: the user identity management subsystem certificate and the voice to be verified.

进一步地,可选的,用户身份管理子系统服务器提取用户语音的声纹特征,并依据声纹特征和身份验证信息生成第二密钥获取请求包括:用户身份管理子系统服务器依据用户身份管理子系统私钥解密用户语音,得到随机数、待加密或解密数据和待验证声音;用户身份管理子系统服务器提取待验证声音的声纹特征;用户身份管理子系统服务器通过可信芯片的公钥加密声纹特征、随机数、待加密或解密数据、身份信息标识和密钥句柄,生成第二密钥获取请求。Further, optionally, the user identity management subsystem server extracts the voiceprint features of the user's voice, and generates a second key acquisition request based on the voiceprint features and identity authentication information, including: the user identity management subsystem server decrypts the user's voice based on the user identity management subsystem private key to obtain a random number, data to be encrypted or decrypted, and a sound to be verified; the user identity management subsystem server extracts the voiceprint features of the sound to be verified; the user identity management subsystem server encrypts the voiceprint features, random numbers, data to be encrypted or decrypted, identity information identifier, and key handle through the public key of the trusted chip to generate a second key acquisition request.

根据本发明实施例的一个方面,提供了另一种数据密钥的保护方法,包括:可信芯片接收密钥获取请求,其中,密钥获取请求包括:声纹特征;其中,可信芯片为通过内置独立处理器和存储器执行加密或解密计算的数据处理芯片;可信芯片解析密钥获取请求,并将密钥获取请求中的声纹特征与预存声纹特征进行对比;若密钥获取请求中的声纹特征与预存声纹特征匹配,则可信芯片向用户终端返回密钥响应信息。According to one aspect of an embodiment of the present invention, another method for protecting data keys is provided, including: a trusted chip receiving a key acquisition request, wherein the key acquisition request includes: a voiceprint feature; wherein the trusted chip is a data processing chip that performs encryption or decryption calculations through a built-in independent processor and memory; the trusted chip parses the key acquisition request, and compares the voiceprint feature in the key acquisition request with a pre-stored voiceprint feature; if the voiceprint feature in the key acquisition request matches the pre-stored voiceprint feature, the trusted chip returns a key response information to the user terminal.

可选的,在密钥获取请求包括声纹特征、身份信息标识和密钥句柄的情况下,可信芯片解析密钥获取请求,并将密钥获取请求中的声纹特征与预存声纹特征进行对比包括:可信芯片通过可信芯片的私钥解密密钥获取请求,提取声纹特征,其中,密钥获取请求通过可信芯片的公钥加密;可信芯片的公钥与可信芯片的私钥对应;可信芯片将声纹特征与预存声纹特征进行对比,判断声纹特征是否与预存声纹特征相同。Optionally, when the key acquisition request includes voiceprint features, identity information identifier and key handle, the trusted chip parses the key acquisition request and compares the voiceprint features in the key acquisition request with the pre-stored voiceprint features, including: the trusted chip decrypts the key acquisition request through the private key of the trusted chip and extracts the voiceprint features, wherein the key acquisition request is encrypted through the public key of the trusted chip; the public key of the trusted chip corresponds to the private key of the trusted chip; the trusted chip compares the voiceprint features with the pre-stored voiceprint features to determine whether the voiceprint features are the same as the pre-stored voiceprint features.

进一步地,可选的,若密钥获取请求中的声纹特征与预存声纹特征匹配,则可信芯片向用户终端返回密钥响应信息包括:若密钥获取请求中的声纹特征与预存声纹特征匹配,则可信芯片依据声纹特征提取对应的数据密钥;可信芯片通过用户终端的公钥加密数据密钥,生成密钥响应信息;可信芯片将密钥响应信息返回用户终端。Furthermore, optionally, if the voiceprint feature in the key acquisition request matches the pre-stored voiceprint feature, the trusted chip returns key response information to the user terminal, including: if the voiceprint feature in the key acquisition request matches the pre-stored voiceprint feature, the trusted chip extracts the corresponding data key based on the voiceprint feature; the trusted chip encrypts the data key through the public key of the user terminal to generate key response information; the trusted chip returns the key response information to the user terminal.

可选的,在密钥获取请求包括声纹特征、随机数、待加密或解密数据、身份信息标识和密钥句柄的情况下,可信芯片解析密钥获取请求,并将密钥获取请求中的声纹特征与预存声纹特征进行对比包括:可信芯片通过可信芯片的私钥解密密钥获取请求,得到声纹特征,其中,密钥获取请求通过可信芯片的公钥加密;可信芯片的公钥与可信芯片的私钥对应;可信芯片将声纹特征与预存声纹特征进行对比,判断声纹特征是否与预存声纹特征相同。Optionally, when the key acquisition request includes voiceprint features, random numbers, data to be encrypted or decrypted, identity information identifier and key handle, the trusted chip parses the key acquisition request and compares the voiceprint features in the key acquisition request with pre-stored voiceprint features, including: the trusted chip decrypts the key acquisition request through the private key of the trusted chip to obtain the voiceprint features, wherein the key acquisition request is encrypted through the public key of the trusted chip; the public key of the trusted chip corresponds to the private key of the trusted chip; the trusted chip compares the voiceprint features with the pre-stored voiceprint features to determine whether the voiceprint features are the same as the pre-stored voiceprint features.

进一步地,可选的,若密钥获取请求中的声纹特征与预存声纹特征匹配,则可信芯片向用户终端返回密钥响应信息包括:若密钥获取请求中的声纹特征与预存声纹特征匹配,则可信芯片依据声纹特征提取对应的数据密钥;可信芯片依据数据密钥对待加密或解密数据进行加密或解密,得到加密信息或解密信息;可信芯片将随机数与加密信息或解密信息进行预设计算,得到运算结果;可信芯片通过用户终端的公钥加密运算结果,生成密钥响应信息;可信芯片将密钥响应信息返回用户终端。Further, optionally, if the voiceprint feature in the key acquisition request matches the pre-stored voiceprint feature, the trusted chip returns key response information to the user terminal, including: if the voiceprint feature in the key acquisition request matches the pre-stored voiceprint feature, the trusted chip extracts the corresponding data key based on the voiceprint feature; the trusted chip encrypts or decrypts the data to be encrypted or decrypted based on the data key to obtain encrypted information or decrypted information; the trusted chip performs a preset calculation on the random number and the encrypted information or decrypted information to obtain the calculation result; the trusted chip encrypts the calculation result through the public key of the user terminal to generate key response information; the trusted chip returns the key response information to the user terminal.

根据本发明实施例的一个方面,提供了又一种数据密钥的保护方法,包括:用户终端向用户身份管理子系统服务器发送的密钥获取请求,其中,密钥获取请求包括用户的身份验证信息;用户终端接收用户身份管理子系统服务器返回的待验证语音信息;用户终端向用户身份管理子系统服务器上传用户语音,其中,用户语音对应待验证语音信息;用户终端接收可信芯片返回的密钥响应信息,其中,密钥响应信息对应向用户身份管理子系统服务器上传的用户语音。According to one aspect of an embodiment of the present invention, another method for protecting a data key is provided, including: a user terminal sends a key acquisition request to a user identity management subsystem server, wherein the key acquisition request includes the user's identity authentication information; the user terminal receives voice information to be verified returned by the user identity management subsystem server; the user terminal uploads user voice to the user identity management subsystem server, wherein the user voice corresponds to the voice information to be verified; the user terminal receives key response information returned by the trusted chip, wherein the key response information corresponds to the user voice uploaded to the user identity management subsystem server.

可选的,在身份验证信息包括身份信息标识和密钥句柄的情况下,用户终端向用户身份管理子系统服务器发送的密钥获取请求包括:用户终端依据身份信息标识和密钥句柄生成密钥获取请求;用户终端将密钥获取请求发送至用户身份管理子系统服务器。Optionally, when the identity authentication information includes an identity information identifier and a key handle, the key acquisition request sent by the user terminal to the user identity management subsystem server includes: the user terminal generates a key acquisition request based on the identity information identifier and the key handle; the user terminal sends the key acquisition request to the user identity management subsystem server.

进一步地,可选的,在用户终端接收可信芯片返回的密钥响应信息之后,该方法还包括:用户终端依据用户终端的私钥解密密钥响应信息,获取密钥响应信息携带的数据密钥,其中,密钥响应信息通过用户终端的公钥加密,用户终端的公钥与用户终端的私钥对应;用户终端依据数据密钥对待加密或待解密数据进行加密或解密,得到加密数据信息或解密信息。Further, optionally, after the user terminal receives the key response information returned by the trusted chip, the method also includes: the user terminal decrypts the key response information based on the user terminal's private key to obtain the data key carried by the key response information, wherein the key response information is encrypted by the user terminal's public key, and the user terminal's public key corresponds to the user terminal's private key; the user terminal encrypts or decrypts the data to be encrypted or decrypted based on the data key to obtain encrypted data information or decrypted information.

可选的,在身份验证信息包括可信证书、身份信息标识和密钥句柄的情况下,用户终端向用户身份管理子系统服务器发送的密钥获取请求包括:用户终端通过用户身份管理子系统公钥对可信证书、身份信息标识和密钥句柄进行加密,生成密钥获取请求;用户终端将密钥获取请求发送至用户身份管理子系统服务器。Optionally, when the identity authentication information includes a trusted certificate, an identity information identifier and a key handle, the key acquisition request sent by the user terminal to the user identity management subsystem server includes: the user terminal encrypts the trusted certificate, identity information identifier and key handle through the user identity management subsystem public key to generate a key acquisition request; the user terminal sends the key acquisition request to the user identity management subsystem server.

进一步地,可选的,在用户终端接收用户身份管理子系统服务器返回的待验证语音信息之后,该方法还包括:用户终端解析待验证语音信息,得到用户身份管理子系统证书和待验证语音;用户终端判断用户身份管理子系统证书是否满足预设验证条件;在判断结果为是的情况下,用户终端接收用户朗读的待验证语音的声音信号;用户终端将随机数、声音信号和待加密或解密数据通过用户身份管理子系统公钥进行加密,得到用户语音;用户终端向用户身份管理子系统服务器上传用户语音。Further, optionally, after the user terminal receives the voice information to be verified returned by the user identity management subsystem server, the method also includes: the user terminal parses the voice information to be verified to obtain the user identity management subsystem certificate and the voice to be verified; the user terminal determines whether the user identity management subsystem certificate meets the preset verification conditions; if the judgment result is yes, the user terminal receives the sound signal of the voice to be verified read aloud by the user; the user terminal encrypts the random number, the sound signal and the data to be encrypted or decrypted using the user identity management subsystem public key to obtain the user voice; the user terminal uploads the user voice to the user identity management subsystem server.

可选的,在用户终端接收可信芯片返回的密钥响应信息之后,该方法还包括:用户终端通过用户终端的私钥解密密钥响应信息,得到密钥响应信息中的运算结果;用户终端依据随机数结合预设算法校验运算结果,判断运输结果是否满足预设校验标准;在判断结果为是的情况下,用户终端使用运算结果。Optionally, after the user terminal receives the key response information returned by the trusted chip, the method also includes: the user terminal decrypts the key response information using the user terminal's private key to obtain the calculation result in the key response information; the user terminal verifies the calculation result based on a random number combined with a preset algorithm to determine whether the transportation result meets the preset verification standard; if the judgment result is yes, the user terminal uses the calculation result.

根据本发明实施例的一个方面,提供了再一种数据密钥的保护方法,包括:用户终端向用户身份管理子系统服务器发送的密钥获取请求,其中,密钥获取请求包括用户的身份验证信息;用户终端接收用户身份管理子系统服务器返回的待验证语音信息;用户终端向用户身份管理子系统服务器上传用户语音,其中,用户语音对应待验证语音信息;用户终端接收用户身份管理子系统服务器从用户语音提取的声纹特征;用户终端中的可信芯片将声纹特征与预存声纹特征进行比对;若声纹特征与预存声纹特征匹配,则用户终端中的可信芯片提取与声纹特征对应的数据密钥;用户终端依据数据密钥执行对应操作。According to one aspect of an embodiment of the present invention, another method for protecting a data key is provided, comprising: a user terminal sends a key acquisition request to a user identity management subsystem server, wherein the key acquisition request includes the user's identity authentication information; the user terminal receives the voice information to be verified returned by the user identity management subsystem server; the user terminal uploads the user voice to the user identity management subsystem server, wherein the user voice corresponds to the voice information to be verified; the user terminal receives the voiceprint feature extracted from the user voice by the user identity management subsystem server; the trusted chip in the user terminal compares the voiceprint feature with the pre-stored voiceprint feature; if the voiceprint feature matches the pre-stored voiceprint feature, the trusted chip in the user terminal extracts the data key corresponding to the voiceprint feature; the user terminal performs corresponding operations based on the data key.

可选的,在用户终端向用户身份管理子系统服务器发送的密钥获取请求之前,方法还包括:用户终端中的可信芯片导入预先获取的身份信息标识和声纹特征;用户终端中的可信芯片依据可信存储根密钥对声纹特征进行加密,并存储加密后的声纹特征;用户终端中的可信芯片依据预设加密算法和身份信息标识,生成数据密钥,并将数据密钥的密钥句柄返回用户终端;用户终端中的可信芯片将数据密钥、身份信息标识和声纹特征进行映射,得到数据密钥、身份信息标识和声纹特征的映射关系,并存储映射关系和数据密钥。Optionally, before the user terminal sends a key acquisition request to the user identity management subsystem server, the method also includes: the trusted chip in the user terminal imports the pre-acquired identity information identifier and voiceprint feature; the trusted chip in the user terminal encrypts the voiceprint feature based on the trusted storage root key, and stores the encrypted voiceprint feature; the trusted chip in the user terminal generates a data key based on a preset encryption algorithm and identity information identifier, and returns the key handle of the data key to the user terminal; the trusted chip in the user terminal maps the data key, identity information identifier and voiceprint feature to obtain a mapping relationship among the data key, identity information identifier and voiceprint feature, and stores the mapping relationship and the data key.

根据本发明另一实施例的一个方面,提供了一种数据密钥的保护方法,包括:获取用户登录信息,并触发密钥获取请求,其中,密钥获取请求包括用户的身份验证信息;依据密钥获取请求获取对应待验证语音信息;接收用户依据待验证语音信息录入的用户语音;依据用户语音提取用户的声纹特征;通过可信芯片将声纹特征与预存声纹特征进行比对;若声纹特征与预存声纹特征匹配,则通过可信芯片提取与声纹特征对应的数据密钥;依据数据密钥执行对应操作。According to an aspect of another embodiment of the present invention, a method for protecting a data key is provided, comprising: obtaining user login information and triggering a key acquisition request, wherein the key acquisition request includes the user's identity authentication information; obtaining corresponding voice information to be verified based on the key acquisition request; receiving user voice input by the user based on the voice information to be verified; extracting the user's voiceprint features based on the user voice; comparing the voiceprint features with pre-stored voiceprint features through a trusted chip; if the voiceprint features match the pre-stored voiceprint features, extracting the data key corresponding to the voiceprint features through the trusted chip; and performing corresponding operations based on the data key.

根据本发明实施例的另一方面,还提供了一种数据密钥的保护装置,包括:第一接收模块,用于接收用户终端发送的第一密钥获取请求,其中,第一密钥获取请求包括用户的身份验证信息;第一发送模块,用于依据第一密钥获取请求向用户终端返回待验证语音信息;第二接收模块,用于接收用户终端依据待验证语音信息上传的用户语音;请求生成模块,用于提取用户语音的声纹特征,并依据声纹特征和身份验证信息生成第二密钥获取请求;第二发送模块,用于将第二密钥获取请求发送至可信芯片。According to another aspect of an embodiment of the present invention, a data key protection device is also provided, including: a first receiving module for receiving a first key acquisition request sent by a user terminal, wherein the first key acquisition request includes the user's identity authentication information; a first sending module for returning voice information to be verified to the user terminal based on the first key acquisition request; a second receiving module for receiving the user voice uploaded by the user terminal based on the voice information to be verified; a request generating module for extracting the voiceprint features of the user voice, and generating a second key acquisition request based on the voiceprint features and the identity authentication information; a second sending module for sending the second key acquisition request to the trusted chip.

根据本发明实施例的另一方面,还提供了另一种数据密钥的保护装置,包括:第三接收模块,用于接收密钥获取请求,其中,密钥获取请求包括:声纹特征;解析模块,用于解析密钥获取请求,并将密钥获取请求中的声纹特征与预存声纹特征进行对比;第三发送模块,用于若密钥获取请求中的声纹特征与预存声纹特征匹配,则向用户终端返回密钥响应信息。According to another aspect of an embodiment of the present invention, another data key protection device is provided, including: a third receiving module for receiving a key acquisition request, wherein the key acquisition request includes: a voiceprint feature; a parsing module for parsing the key acquisition request and comparing the voiceprint feature in the key acquisition request with the pre-stored voiceprint feature; a third sending module for returning key response information to the user terminal if the voiceprint feature in the key acquisition request matches the pre-stored voiceprint feature.

根据本发明实施例的另一方面,还提供了又一种数据密钥的保护装置,包括:第四发送模块,用于向用户身份管理子系统服务器发送的密钥获取请求,其中,密钥获取请求包括用户的身份验证信息;第四接收模块,用于接收用户身份管理子系统服务器返回的待验证语音信息;第五发送模块,用于向用户身份管理子系统服务器上传用户语音,其中,用户语音对应待验证语音信息;第五接收模块,用于接收可信芯片返回的密钥响应信息,其中,密钥响应信息对应向用户身份管理子系统服务器上传的用户语音。According to another aspect of an embodiment of the present invention, another data key protection device is provided, including: a fourth sending module, used to send a key acquisition request to the user identity management subsystem server, wherein the key acquisition request includes the user's identity authentication information; a fourth receiving module, used to receive the voice information to be verified returned by the user identity management subsystem server; a fifth sending module, used to upload the user voice to the user identity management subsystem server, wherein the user voice corresponds to the voice information to be verified; a fifth receiving module, used to receive the key response information returned by the trusted chip, wherein the key response information corresponds to the user voice uploaded to the user identity management subsystem server.

根据本发明实施例的另一方面,还提供了再一种数据密钥的保护装置,包括:第六发送模块,用于向用户身份管理子系统服务器发送的密钥获取请求,其中,密钥获取请求包括用户的身份验证信息;第六接收模块,用于接收用户身份管理子系统服务器返回的待验证语音信息;第七发送模块,用于向用户身份管理子系统服务器上传用户语音,其中,用户语音对应待验证语音信息;第七接收模块,用于接收用户身份管理子系统服务器从用户语音提取的声纹特征;特征对比模块,用于将声纹特征与预存声纹特征进行比对;密钥提取模块,用于若声纹特征与预存声纹特征匹配,则用户终端中的可信芯片提取与声纹特征对应的数据密钥;数据保护模块,用于依据数据密钥执行对应操作。According to another aspect of an embodiment of the present invention, there is provided another data key protection device, including: a sixth sending module, used to send a key acquisition request to the user identity management subsystem server, wherein the key acquisition request includes the user's identity authentication information; a sixth receiving module, used to receive the voice information to be verified returned by the user identity management subsystem server; a seventh sending module, used to upload the user voice to the user identity management subsystem server, wherein the user voice corresponds to the voice information to be verified; a seventh receiving module, used to receive the voiceprint features extracted from the user voice by the user identity management subsystem server; a feature comparison module, used to compare the voiceprint features with pre-stored voiceprint features; a key extraction module, used to extract the data key corresponding to the voiceprint features by the trusted chip in the user terminal if the voiceprint features match the pre-stored voiceprint features; and a data protection module, used to perform corresponding operations based on the data key.

根据本发明另一实施例的一方面,还提供了一种数据密钥的保护装置,包括:信息获取模块,用于获取用户登录信息,并触发密钥获取请求,其中,密钥获取请求包括用户的身份验证信息;待验证信息获取模块,用于依据密钥获取请求获取对应待验证语音信息;接收模块,用于接收用户依据待验证语音信息录入的用户语音;提取模块,用于依据用户语音提取用户的声纹特征;特征比对模块,用于通过可信芯片将声纹特征与预存声纹特征进行比对;密钥提取模块,用于若声纹特征与预存声纹特征匹配,则通过可信芯片提取与声纹特征对应的数据密钥;数据保护模块,用于依据数据密钥执行对应操作。According to one aspect of another embodiment of the present invention, a data key protection device is also provided, including: an information acquisition module, used to obtain user login information and trigger a key acquisition request, wherein the key acquisition request includes the user's identity authentication information; an information acquisition module to be verified, used to obtain corresponding voice information to be verified based on the key acquisition request; a receiving module, used to receive the user voice entered by the user based on the voice information to be verified; an extraction module, used to extract the user's voiceprint features based on the user voice; a feature comparison module, used to compare the voiceprint features with pre-stored voiceprint features through a trusted chip; a key extraction module, used to extract the data key corresponding to the voiceprint features through the trusted chip if the voiceprint features match the pre-stored voiceprint features; and a data protection module, used to perform corresponding operations based on the data key.

根据本发明实施例的又一方面,还提供了一种数据密钥的保护系统,包括:用户声纹身份管理子系统和可信芯片管理子系统,其中,用户声纹身份管理子系统,用于获取每个用户身份信息和声纹特征;可信芯片管理子系统,用于依据每个用户身份信息和声纹特征生成对应的密钥。According to another aspect of an embodiment of the present invention, a data key protection system is also provided, including: a user voiceprint identity management subsystem and a trusted chip management subsystem, wherein the user voiceprint identity management subsystem is used to obtain each user's identity information and voiceprint characteristics; the trusted chip management subsystem is used to generate a corresponding key based on each user's identity information and voiceprint characteristics.

可选的,用户声纹身份管理子系统包括:用户身份注册模块、声纹身份注册模块、声纹特征模型建立模块和声纹特征提取模块,其中,用户身份注册模块,用于接收用户终端提交的用户身份信息,并依据用户身份信息生成身份信息标识,将身份信息标识返回用户终端;声纹身份注册模块,用于接收用户终端提交的声纹注册请求,向用户终端返回声纹响应信息,并接收用户终端依据声纹响应信息上传的用户语音;其中,声纹响应信息包括待验证的文本信息,文本信息用于指示用户终端收录用户语音;声纹特征提取模块,用于提取用户语音的声纹特征;声纹特征模型建立模块,用于依据声纹特征建立声纹特征模型。Optionally, the user voiceprint identity management subsystem includes: a user identity registration module, a voiceprint identity registration module, a voiceprint feature model establishment module and a voiceprint feature extraction module, wherein the user identity registration module is used to receive user identity information submitted by the user terminal, generate an identity information identifier based on the user identity information, and return the identity information identifier to the user terminal; the voiceprint identity registration module is used to receive a voiceprint registration request submitted by the user terminal, return voiceprint response information to the user terminal, and receive user voice uploaded by the user terminal based on the voiceprint response information; wherein the voiceprint response information includes text information to be verified, and the text information is used to instruct the user terminal to collect the user voice; the voiceprint feature extraction module is used to extract the voiceprint features of the user voice; and the voiceprint feature model establishment module is used to establish a voiceprint feature model based on the voiceprint features.

进一步地,可选的,可信芯片管理子系统包括:用户信息导入模块、声纹特征存储模块、用户数据密钥创建模块、用户数据密钥存储模块、声纹特征比对模块和数据密钥使用模块,其中,用户信息导入模块,用于在用户信息包括身份信息标识和声纹特征的情况下,将身份信息标识和声纹特征导入可信芯片;声纹特征存储模块,用于依据可信存储根密钥对声纹特征进行加密,并存储加密后的声纹特征;用户数据密钥创建模块,用于依据预设加密算法和身份信息标识,生成数据密钥,并将数据密钥的密钥句柄返回用户终端;用户数据密钥存储模块,用于将数据密钥、身份信息标识和声纹特征进行映射,得到数据密钥、身份信息标识和声纹特征的映射关系,存储映射关系和数据密钥;声纹特征比对模块,用于在用户终端请求获取数据密钥时,提取用户终端上传的用户语音,通过提取用户语音的声纹特征,与用户数据密钥存储模块中映射关系中的声纹特征进行比对;数据密钥使用模块,用于在比对通过后,向用户终端反馈数据密钥,以使得用户终端依据数据密钥执行加密/解密操作。Furthermore, optionally, the trusted chip management subsystem includes: a user information import module, a voiceprint feature storage module, a user data key creation module, a user data key storage module, a voiceprint feature comparison module and a data key usage module, wherein the user information import module is used to import the identity information identifier and the voiceprint feature into the trusted chip when the user information includes the identity information identifier and the voiceprint feature; the voiceprint feature storage module is used to encrypt the voiceprint feature according to the trusted storage root key and store the encrypted voiceprint feature; the user data key creation module is used to generate a data key according to a preset encryption algorithm and the identity information identifier, and store the data key. The key handle of the key is returned to the user terminal; the user data key storage module is used to map the data key, identity information identifier and voiceprint feature, obtain the mapping relationship between the data key, identity information identifier and voiceprint feature, and store the mapping relationship and the data key; the voiceprint feature comparison module is used to extract the user voice uploaded by the user terminal when the user terminal requests to obtain the data key, and compare the extracted voiceprint features of the user voice with the voiceprint features in the mapping relationship in the user data key storage module; the data key usage module is used to feedback the data key to the user terminal after the comparison is passed, so that the user terminal performs encryption/decryption operations based on the data key.

根据本发明实施例的再一方面,还提供了一种存储介质,存储介质包括存储的程序,其中,在程序运行时控制存储介质所在设备执行上述数据密钥的保护方法。According to another aspect of an embodiment of the present invention, a storage medium is provided. The storage medium includes a stored program, wherein when the program is running, the device where the storage medium is located is controlled to execute the above-mentioned data key protection method.

根据本发明实施例的再一方面,还提供了一种处理器,处理器用于运行程序,其中,程序运行时执行上述数据密钥的保护方法。According to yet another aspect of an embodiment of the present invention, a processor is provided, which is configured to run a program, wherein the above-mentioned data key protection method is executed when the program is running.

根据本发明实施例的再一方面,还提供了一种计算设备,包括处理器、存储器,存储器上存储有程序,处理器用于运行程序,其中,程序运行时适于使处理器执行上述数据密钥的保护方法。According to another aspect of an embodiment of the present invention, a computing device is provided, including a processor and a memory, wherein a program is stored in the memory and the processor is used to run the program, wherein when the program is run, the processor is adapted to execute the above-mentioned data key protection method.

在本发明实施例中,通过用户身份管理子系统服务器接收用户终端发送的第一密钥获取请求,其中,第一密钥获取请求包括用户的身份验证信息;用户身份管理子系统服务器依据第一密钥获取请求向用户终端返回待验证语音信息;用户身份管理子系统服务器接收用户终端依据待验证语音信息上传的用户语音;用户身份管理子系统服务器提取用户语音的声纹特征,并依据声纹特征和身份验证信息生成第二密钥获取请求;用户身份管理子系统服务器将第二密钥获取请求发送至可信芯片,达到了密钥的安全获取的目的,从而实现了安全获取密钥的技术效果,进而解决了由于现有技术中存在的密钥容易泄密的技术问题。In an embodiment of the present invention, a first key acquisition request sent by a user terminal is received by a user identity management subsystem server, wherein the first key acquisition request includes the user's identity authentication information; the user identity management subsystem server returns the voice information to be verified to the user terminal based on the first key acquisition request; the user identity management subsystem server receives the user voice uploaded by the user terminal based on the voice information to be verified; the user identity management subsystem server extracts the voiceprint features of the user voice, and generates a second key acquisition request based on the voiceprint features and the identity authentication information; the user identity management subsystem server sends the second key acquisition request to the trusted chip, thereby achieving the purpose of securely obtaining the key, thereby realizing the technical effect of securely obtaining the key, and further solving the technical problem of easy leakage of the key in the existing technology.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:The drawings described herein are used to provide a further understanding of the present invention and constitute a part of this application. The exemplary embodiments of the present invention and their descriptions are used to explain the present invention and do not constitute an improper limitation of the present invention. In the drawings:

图1是TCG信任链的结构示意图;Figure 1 is a schematic diagram of the structure of the TCG trust chain;

图2是密钥体系结构图;Figure 2 is a diagram of the key system architecture;

图3是加密机典型部署结构示意图;Figure 3 is a schematic diagram of a typical deployment structure of an encryption machine;

图4是根据本发明实施例一的数据密钥的保护方法的流程图;FIG4 is a flow chart of a method for protecting a data key according to a first embodiment of the present invention;

图5是根据本发明实施例二的数据密钥的保护方法的流程图;FIG5 is a flow chart of a method for protecting a data key according to a second embodiment of the present invention;

图6是本发明实施例三的一种数据密钥的保护方法的计算机终端的硬件结构框图;6 is a hardware structure block diagram of a computer terminal of a data key protection method according to a third embodiment of the present invention;

图7a是根据本发明实施例三的数据密钥的保护方法的流程图;FIG7 a is a flow chart of a method for protecting a data key according to a third embodiment of the present invention;

图7b是根据本发明实施例三的数据密钥的保护方法中用户身份管理子系统服务器内嵌可信芯片与用户终端连接的示意图;7b is a schematic diagram showing the connection between the embedded trusted chip in the user identity management subsystem server and the user terminal in the data key protection method according to the third embodiment of the present invention;

图8是根据本发明实施例四的数据密钥的保护方法的流程图;FIG8 is a flowchart of a method for protecting a data key according to a fourth embodiment of the present invention;

图9a是根据本发明实施例中的一种数据密钥的保护方法中的用户身份管理子系统服务器与用户终端内嵌可信芯片连接的示意图;9a is a schematic diagram showing the connection between a user identity management subsystem server and a trusted chip embedded in a user terminal in a method for protecting a data key according to an embodiment of the present invention;

图9b是根据本发明实施例中的一种数据密钥的保护方法中的用户身份管理子系统服务器、可信芯片和用户终端的交互示意图;9b is a schematic diagram of the interaction between the user identity management subsystem server, the trusted chip, and the user terminal in a data key protection method according to an embodiment of the present invention;

图10是根据本发明实施例中的另一种数据密钥的保护方法中的用户身份管理子系统服务器、可信芯片和用户终端的交互示意图;10 is a schematic diagram of the interaction between the user identity management subsystem server, the trusted chip and the user terminal in another data key protection method according to an embodiment of the present invention;

图11a是根据本发明实施例五的数据密钥的保护方法的流程图;FIG11a is a flow chart of a method for protecting a data key according to a fifth embodiment of the present invention;

图11b是根据本发明实施例五的数据密钥的保护方法中用户终端内嵌可信芯片的示意图;FIG11b is a schematic diagram of a trusted chip embedded in a user terminal in a method for protecting a data key according to a fifth embodiment of the present invention;

图12是根据本发明实施例六的数据密钥的保护装置的结构示意图;FIG12 is a schematic structural diagram of a data key protection device according to Embodiment 6 of the present invention;

图13是根据本发明实施例七的数据密钥的保护装置的结构示意图;FIG13 is a schematic structural diagram of a data key protection device according to Embodiment 7 of the present invention;

图14是根据本发明实施例八的数据密钥的保护装置的结构示意图;FIG14 is a schematic structural diagram of a data key protection device according to Embodiment 8 of the present invention;

图15是根据本发明实施例九的数据密钥的保护装置的结构示意图;FIG15 is a schematic structural diagram of a data key protection device according to Embodiment 9 of the present invention;

图16是根据本发明实施例十的数据密钥的保护装置的结构示意图;FIG16 is a schematic structural diagram of a data key protection device according to Embodiment 10 of the present invention;

图17是根据本发明实施例十一的数据密钥的保护系统的结构示意图;FIG17 is a schematic structural diagram of a data key protection system according to an eleventh embodiment of the present invention;

图18是根据本发明实施例十一的一种数据密钥的保护系统的结构示意图。FIG18 is a schematic structural diagram of a data key protection system according to an eleventh embodiment of the present invention.

具体实施方式DETAILED DESCRIPTION

为了使本技术领域的人员更好地理解本发明方案,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分的实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都应当属于本发明保护的范围。In order to enable those skilled in the art to better understand the solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the embodiments described are only part of the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by ordinary technicians in this field without making creative efforts should fall within the scope of protection of the present invention.

需要说明的是,本发明的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的本发明的实施例能够以除了在这里图示或描述的那些以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。It should be noted that the terms "first", "second", etc. in the description and claims of the present invention and the above-mentioned drawings are used to distinguish similar objects and are not necessarily used to describe a specific order or sequence. It should be understood that the numbers used in this way can be interchanged where appropriate, so that the embodiments of the present invention described herein can be implemented in an order other than those illustrated or described herein. In addition, the terms "including" and "having" and any variations thereof are intended to cover non-exclusive inclusions. For example, a process, method, system, product or device that includes a series of steps or units is not necessarily limited to those steps or units clearly listed, but may include other steps or units that are not clearly listed or inherent to these processes, methods, products or devices.

实施例1Example 1

本申请提供了如图4所示的数据密钥的保护方法。在用户身份管理子系统服务器侧,图4是根据本发明实施例一的数据密钥的保护方法的流程图。The present application provides a data key protection method as shown in Figure 4. On the user identity management subsystem server side, Figure 4 is a flow chart of a data key protection method according to embodiment 1 of the present invention.

根据本发明实施例的一个方面,提供了一种数据密钥的保护方法,包括:According to one aspect of an embodiment of the present invention, a method for protecting a data key is provided, comprising:

步骤S402,用户身份管理子系统服务器接收用户终端发送的第一密钥获取请求,其中,第一密钥获取请求包括用户的身份验证信息;Step S402: The user identity management subsystem server receives a first key acquisition request sent by a user terminal, wherein the first key acquisition request includes the user's identity authentication information;

本申请上述步骤S402中,本实施例提供的数据密钥的保护方法可以适用于可信计算,其中,用户身份管理子系统服务器可以用于与用户所使用的移动终端进行交互,通过用户使用的移动终端,接收用户的各类请求以及向用户反馈依据各类请求反馈的响应。In the above step S402 of the present application, the data key protection method provided in this embodiment can be applied to trusted computing, wherein the user identity management subsystem server can be used to interact with the mobile terminal used by the user, receive various requests from the user through the mobile terminal used by the user, and feedback responses based on the various requests to the user.

具体的,本实施例提供的数据密钥的保护方法具体可适用于互联网技术应用,特别是用户在线执行身份验证、信息加密和解密时所需的可信计算,以网上银行为例,当用户在线交易时,用户身份管理子系统接收用户终端发送的第一密钥获取请求,该第一密钥获取请求可以用于引导用户进入自己账户,获取在线支付所需密钥,避免了现有技术中人为记忆密钥或加密机存储密钥带来的不可靠问题,该不可靠问题可以体现在:人为记忆密钥会导致密钥遗忘;加密机传输密钥报文导致的密钥泄露。Specifically, the data key protection method provided in this embodiment can be specifically applied to Internet technology applications, especially the trusted computing required when users perform online identity authentication, information encryption and decryption. Taking online banking as an example, when a user conducts online transactions, the user identity management subsystem receives a first key acquisition request sent by the user terminal. The first key acquisition request can be used to guide the user to enter his or her own account and obtain the key required for online payment, avoiding the unreliability problem caused by manual key memorization or encryption machine storage in the existing technology. This unreliability problem can be reflected in: manual key memorization will lead to key forgetting; encryption machine transmission of key messages will cause key leakage.

在验证初期,用户身份管理子系统服务器接收用户终端发送的第一密钥获取请求,该请求会包括用户的身份验证信息,其中,用户终端可以包括:智能手机、笔记本电脑、平板电脑、台式电脑、掌上商务以及智能穿戴设备。At the beginning of verification, the user identity management subsystem server receives a first key acquisition request sent by the user terminal, which includes the user's identity authentication information. The user terminal may include: smartphones, laptops, tablets, desktop computers, handheld businesses, and smart wearable devices.

步骤S404,用户身份管理子系统服务器依据第一密钥获取请求向用户终端返回待验证语音信息;Step S404: The user identity management subsystem server returns the voice information to be verified to the user terminal according to the first key acquisition request;

本申请上述步骤S404中,基于步骤S402中用户身份管理子系统服务器接收的第一密钥获取请求,用户身份管理子系统服务器解析该第一密钥获取请求,验证该第一密钥获取请求中的用户的身份验证信息,若验证成功,则向用户终端反馈待验证语音信息,该待验证语音信息可以包括:一连串由数字;或数字及字符随机组成的没变形处理的字符。In the above-mentioned step S404 of the present application, based on the first key acquisition request received by the user identity management subsystem server in step S402, the user identity management subsystem server parses the first key acquisition request and verifies the user's identity authentication information in the first key acquisition request. If the verification is successful, the voice information to be verified is fed back to the user terminal. The voice information to be verified may include: a series of numbers; or characters randomly composed of numbers and characters without deformation.

步骤S406,用户身份管理子系统服务器接收用户终端依据待验证语音信息上传的用户语音;Step S406: The user identity management subsystem server receives the user voice uploaded by the user terminal based on the voice information to be verified;

本申请上述步骤S406中,基于步骤S404中用户身份管理子系统服务器向用户终端返回的待验证语音信息,用户身份管理子系统服务器接收用户终端上传的用户语音,其中,该用户语音为用户终端的收音装置获取的用户朗读待验证语音信息时产生的声音信息,该声音信息以音频的形式上传至用户身份管理子系统服务器,其中,该上传过程可以为通过用户终端将模拟信号转换为数字信号,通过对数字信号进行编码以报文的形式发送至用户身份管理子系统服务器,进而在用户身份管理子系统服务器侧进行解码,获取该数字信号,该数字信号可对应用户在朗读过程中的声纹。In the above-mentioned step S406 of the present application, based on the voice information to be verified returned by the user identity management subsystem server to the user terminal in step S404, the user identity management subsystem server receives the user voice uploaded by the user terminal, wherein the user voice is the sound information generated when the user reads the voice information to be verified and obtained by the sound receiving device of the user terminal, and the sound information is uploaded to the user identity management subsystem server in the form of audio, wherein the uploading process can be to convert the analog signal into a digital signal through the user terminal, encode the digital signal and send it to the user identity management subsystem server in the form of a message, and then decode it on the user identity management subsystem server side to obtain the digital signal, which can correspond to the voiceprint of the user during the reading process.

步骤S408,用户身份管理子系统服务器提取用户语音的声纹特征,并依据声纹特征和身份验证信息生成第二密钥获取请求;Step S408: The user identity management subsystem server extracts the voiceprint features of the user's voice and generates a second key acquisition request based on the voiceprint features and the identity verification information;

本申请上述步骤S408中,基于步骤S406中用户身份管理子系统服务器接收的用户语音,对该用户语音进行声纹特征提取,并依据该声纹特征和步骤S402中接收第一密钥获取请求时获取到的用户的身份验证信息生成第二密钥获取请求。In the above-mentioned step S408 of the present application, based on the user voice received by the user identity management subsystem server in step S406, the voiceprint feature of the user voice is extracted, and a second key acquisition request is generated based on the voiceprint feature and the user's identity authentication information obtained when the first key acquisition request is received in step S402.

步骤S410,用户身份管理子系统服务器将第二密钥获取请求发送至可信芯片。In step S410 , the user identity management subsystem server sends a second key acquisition request to the trusted chip.

本申请上述步骤S410中,基于步骤S408中用户身份管理子系统服务器生成的第二密钥获取请求,用户身份管理子系统服务器将该第二密钥获取请求发送至可信芯片。In the above step S410 of the present application, based on the second key acquisition request generated by the user identity management subsystem server in step S408, the user identity management subsystem server sends the second key acquisition request to the trusted chip.

在本申请实施例提供的数据密钥的保护方法中,通过用户身份管理子系统服务器接收用户终端发送的第一密钥获取请求,其中,第一密钥获取请求包括用户的身份验证信息;用户身份管理子系统服务器依据第一密钥获取请求向用户终端返回待验证语音信息;用户身份管理子系统服务器接收用户终端依据待验证语音信息上传的用户语音;用户身份管理子系统服务器提取用户语音的声纹特征,并依据声纹特征和身份验证信息生成第二密钥获取请求;用户身份管理子系统服务器将第二密钥获取请求发送至可信芯片,达到了密钥的安全获取的目的,从而实现了安全获取密钥的技术效果,进而解决了由于现有技术中存在的密钥容易泄密的技术问题。In the data key protection method provided in the embodiment of the present application, a first key acquisition request sent by a user terminal is received by a user identity management subsystem server, wherein the first key acquisition request includes the user's identity authentication information; the user identity management subsystem server returns the voice information to be verified to the user terminal based on the first key acquisition request; the user identity management subsystem server receives the user voice uploaded by the user terminal based on the voice information to be verified; the user identity management subsystem server extracts the voiceprint features of the user voice, and generates a second key acquisition request based on the voiceprint features and the identity authentication information; the user identity management subsystem server sends the second key acquisition request to the trusted chip, thereby achieving the purpose of securely obtaining the key, thereby realizing the technical effect of securely obtaining the key, and thus solving the technical problem of easy leakage of the key in the existing technology.

具体的,基于上述步骤S402至步骤S410,本实施例提供的数据密钥的保护方法有两种实现方式,具体实现方式如下:Specifically, based on the above steps S402 to S410, the data key protection method provided in this embodiment has two implementation methods, which are specifically implemented as follows:

方式一:身份验证信息包括:身份信息标识和密钥句柄。Method 1: Authentication information includes: identity information identifier and key handle.

可选的,在身份验证信息包括身份信息标识和密钥句柄的情况下,步骤S408中用户身份管理子系统服务器提取用户语音的声纹特征,并依据声纹特征和身份验证信息生成第二密钥获取请求包括:Optionally, when the identity authentication information includes an identity information identifier and a key handle, the user identity management subsystem server extracts the voiceprint features of the user's voice in step S408, and generates a second key acquisition request based on the voiceprint features and the identity authentication information, including:

Step1,用户身份管理子系统服务器提取用户语音中的声纹特征;Step 1: The user identity management subsystem server extracts the voiceprint features from the user's voice;

本申请上述Step1中,在身份验证信息包括身份信息标识和密钥句柄的情况下,基于步骤S402至步骤S406,用户身份管理子系统服务器接收用户终端发送的携带身份信息标识和密钥句柄的第一密钥获取请求,并向用户终端反馈待验证语音信息,用户身份管理子系统服务器通过接收用户终端上传的依据待验证语音信息返回的用户语音,用户身份管理子系统服务器提取该用户语音中的声纹特征。In the above-mentioned Step 1 of the present application, when the identity authentication information includes an identity information identifier and a key handle, based on steps S402 to S406, the user identity management subsystem server receives a first key acquisition request carrying the identity information identifier and the key handle sent by the user terminal, and feeds back the voice information to be verified to the user terminal. The user identity management subsystem server receives the user voice uploaded by the user terminal based on the voice information to be verified, and the user identity management subsystem server extracts the voiceprint features in the user voice.

Step2,用户身份管理子系统服务器通过可信芯片的公钥加密声纹特征、身份信息标识和密钥句柄,生成第二密钥获取请求。Step 2: The user identity management subsystem server encrypts the voiceprint feature, identity information identifier and key handle through the public key of the trusted chip to generate a second key acquisition request.

本申请上述Step2中,基于Step1提取的声纹特征,用户身份管理子系统服务器根据预先获取的可信芯片的公钥,对声纹特征、身份信息标识和密钥句柄进行加密,从而生成第二密钥获取请求。In the above Step 2 of the present application, based on the voiceprint features extracted in Step 1, the user identity management subsystem server encrypts the voiceprint features, identity information identifier and key handle according to the public key of the trusted chip obtained in advance, thereby generating a second key acquisition request.

方式二:身份验证信息包括:可信证书、身份信息标识和密钥句柄。Method 2: Authentication information includes: trusted certificate, identity information identifier and key handle.

可选的,在身份验证信息包括可信证书、身份信息标识和密钥句柄的情况下,步骤S404中用户身份管理子系统服务器依据第一密钥获取请求向用户终端返回待验证语音信息包括:Optionally, when the identity authentication information includes a trusted certificate, an identity information identifier, and a key handle, the user identity management subsystem server returns the voice information to be verified to the user terminal according to the first key acquisition request in step S404, including:

Step1,用户身份管理子系统服务器依据用户身份管理子系统私钥解密第一密钥获取请求,其中,第一密钥获取请求通过用户身份管理子系统公钥加密;用户身份管理子系统私钥与用户身份管理子系统公钥对应;Step 1: The user identity management subsystem server decrypts the first key acquisition request using the user identity management subsystem private key, wherein the first key acquisition request is encrypted using the user identity management subsystem public key; the user identity management subsystem private key corresponds to the user identity management subsystem public key;

本申请上述Step1中,区别于方式一实现本实施例提供的数据密钥的保护方法的方式,在方式二中,在步骤S402用户身份管理子系统服务器接收第一密钥获取请求之后,该第一密钥获取请求为通过用户身份管理子系统公钥加密,且携带可信证书的请求,在传输上区别于方式一,由于通过用户身份管理子系统公钥加密以及携带了可信证书,从而使得在传输上保障了即使报文泄露,也不会泄密,且通过验证可信证书更安全。In the above Step 1 of the present application, different from the method of implementing the data key protection method provided in this embodiment in method 1, in method 2, after the user identity management subsystem server receives the first key acquisition request in step S402, the first key acquisition request is encrypted by the user identity management subsystem public key and carries a trusted certificate. It is different from method 1 in transmission. Since it is encrypted by the user identity management subsystem public key and carries a trusted certificate, it is guaranteed in transmission that even if the message is leaked, it will not be leaked, and it is more secure by verifying the trusted certificate.

Step2,用户身份管理子系统服务器解析解密后的第一密钥获取请求,获取第一密钥获取请求中的可信证书;Step 2: The user identity management subsystem server parses the decrypted first key acquisition request and obtains the trusted certificate in the first key acquisition request;

本申请上述Step2中,基于用户身份管理子系统服务器解密第一密钥获取请求,用户身份管理子系统服务器获取该第一密钥获取请求中的可信证书。In the above-mentioned Step 2 of the present application, based on the decryption of the first key acquisition request by the user identity management subsystem server, the user identity management subsystem server obtains the trusted certificate in the first key acquisition request.

Step3,用户身份管理子系统服务器判断可信证书是否满足预设验证条件;Step 3: The user identity management subsystem server determines whether the trusted certificate meets the preset verification conditions;

本申请上述Step3中,基于Step2获取的可信证书,用户身份管理子系统服务器判断该可信证书是否满足预设验证条件,即,判断该可信证书的真伪,如果不是用户身份管理子系统服务器存储的可信证书,则判断该可信证书为非法,停止该用户的密钥获取流程。若是,则执行Step4。In Step 3 of the present application, based on the trusted certificate obtained in Step 2, the user identity management subsystem server determines whether the trusted certificate meets the preset verification conditions, that is, determines the authenticity of the trusted certificate. If it is not a trusted certificate stored by the user identity management subsystem server, it is determined that the trusted certificate is illegal and the key acquisition process for the user is stopped. If so, Step 4 is executed.

Step4,在判断结果为是的情况下,用户身份管理子系统服务器向用户终端返回待验证声音信息,其中,待验证声音信息包括:用户身份管理子系统证书和待验证语音。Step 4: If the judgment result is yes, the user identity management subsystem server returns the voice information to be verified to the user terminal, wherein the voice information to be verified includes: the user identity management subsystem certificate and the voice to be verified.

本申请上述Step4中,在判断结果为是的情况下,即,可信证书满足预设验证条件,用户身份管理子系统服务器向用户终端返回待验证声音信息,其中,该待验证声音信息区别于方式一,除了待验证语音,在方式二中还需添加用户身份管理子系统证书。In the above Step 4 of the present application, if the judgment result is yes, that is, the trusted certificate meets the preset verification conditions, the user identity management subsystem server returns the sound information to be verified to the user terminal, wherein the sound information to be verified is different from method one. In addition to the voice to be verified, the user identity management subsystem certificate must also be added in method two.

进一步地,可选的,步骤S408中用户身份管理子系统服务器提取用户语音的声纹特征,并依据声纹特征和身份验证信息生成第二密钥获取请求包括:Furthermore, optionally, in step S408, the user identity management subsystem server extracts the voiceprint features of the user's voice, and generates a second key acquisition request based on the voiceprint features and the identity verification information, including:

Step1,用户身份管理子系统服务器依据用户身份管理子系统私钥解密用户语音,得到随机数、待加密或解密数据和待验证声音;Step 1: The user identity management subsystem server decrypts the user's voice using the user identity management subsystem private key to obtain a random number, the data to be encrypted or decrypted, and the voice to be verified.

本申请上述Step1中,在用户身份管理子系统服务器向用户终端返回待验证声音信息之后,在用户身份管理子系统服务器接收用户终端上传的用户语音,该用户语音不同于方式一的地方在于,除了用户的声音外,还携带了用户终端上传的随机数,以及待加密或解密数据。In the above-mentioned Step 1 of the present application, after the user identity management subsystem server returns the sound information to be verified to the user terminal, the user identity management subsystem server receives the user voice uploaded by the user terminal. The difference between this user voice and method one is that, in addition to the user's voice, it also carries a random number uploaded by the user terminal and data to be encrypted or decrypted.

Step2,用户身份管理子系统服务器提取待验证声音的声纹特征;Step 2: The user identity management subsystem server extracts the voiceprint features of the voice to be verified;

本申请上述Step2中,基于Step 1对用户语音的解密,用户身份管理子系统服务器提取待验证声音的声纹特征。In the above Step 2 of the present application, based on the decryption of the user's voice in Step 1, the user identity management subsystem server extracts the voiceprint features of the sound to be verified.

Step3,用户身份管理子系统服务器通过可信芯片的公钥加密声纹特征、随机数、待加密或解密数据、身份信息标识和密钥句柄,生成第二密钥获取请求。Step 3: The user identity management subsystem server encrypts the voiceprint feature, random number, data to be encrypted or decrypted, identity information identifier and key handle through the public key of the trusted chip to generate a second key acquisition request.

本申请上述Step3中,用户身份管理子系统服务器依据预先获取的可信芯片的公钥加密声纹特征、随机数、待加密或解密数据、身份信息标识和密钥句柄,生成第二密钥获取请求。In the above Step 3 of the present application, the user identity management subsystem server encrypts the voiceprint feature, random number, data to be encrypted or decrypted, identity information identifier and key handle based on the pre-acquired public key of the trusted chip to generate a second key acquisition request.

综上,本申请实施例提供的数据密钥的保护方法中,用户通过用户终端,经由用户身份管理子系统服务器向可信芯片获取密钥的过程中,在用户身份管理子系统服务器侧,即为上述实施例一,需要说明的是,在实现上述流程的过程中用户身份管理子系统服务器包括以下功能:In summary, in the data key protection method provided in the embodiment of the present application, the user obtains the key from the trusted chip through the user terminal via the user identity management subsystem server. On the user identity management subsystem server side, this is the above-mentioned embodiment 1. It should be noted that in the process of implementing the above process, the user identity management subsystem server includes the following functions:

用户身份注册:用户终端向用户身份管理子系统服务器中的用户声纹身份管理系统提交用户身份相关信息,用户声纹身份管理系统向用户声纹身份管理系统反馈用户身份标识UID。User identity registration: The user terminal submits user identity related information to the user voiceprint identity management system in the user identity management subsystem server, and the user voiceprint identity management system feeds back the user identity identifier UID to the user voiceprint identity management system.

声纹身份注册:用户终端向声纹验证服务器提出以声纹特征登录方式提出身份注册请求,声纹验证服务器响应请求,推送一连串由数字及字符随机组成的没变形处理的字符;Voiceprint identity registration: The user terminal submits an identity registration request to the voiceprint verification server using voiceprint feature login. The voiceprint verification server responds to the request and pushes a series of random numbers and letters without distortion.

声纹特征模型建立:在提取用户声纹特征基础上,建立用户声纹特征模型;Voiceprint feature model establishment: Based on the extracted user voiceprint features, a user voiceprint feature model is established;

声纹特征提取:用户终端口述声纹验证服务器推送的字符,声纹验证服务器采样用户语音,提取其声纹特征。Voiceprint feature extraction: The user terminal orally speaks the characters pushed by the voiceprint verification server, and the voiceprint verification server samples the user's voice and extracts its voiceprint features.

实施例2Example 2

本申请提供了如图5所示的数据密钥的保护方法。在可信芯片侧,图5是根据本发明实施例二的数据密钥的保护方法的流程图。The present application provides a data key protection method as shown in Figure 5. On the trusted chip side, Figure 5 is a flow chart of a data key protection method according to a second embodiment of the present invention.

步骤S502,可信芯片接收密钥获取请求,其中,密钥获取请求包括:声纹特征;其中,可信芯片为通过内置独立处理器和存储器执行加密或解密计算的数据处理芯片;Step S502: The trusted chip receives a key acquisition request, wherein the key acquisition request includes a voiceprint feature; wherein the trusted chip is a data processing chip that performs encryption or decryption calculations through a built-in independent processor and memory;

本申请上述S502中,区别于实施例1,本实施例提供的数据密钥的保护方法可以适用于可信芯片,其中,可信芯片可以位于用户身份管理子系统服务器中,还可以独立于用户身份管理子系统服务器,成立一套独立的可信芯片中声纹特征及数据密钥管理子系统。In the above S502 of the present application, different from Example 1, the data key protection method provided in this embodiment can be applied to a trusted chip, wherein the trusted chip can be located in the user identity management subsystem server, or can be independent of the user identity management subsystem server to establish an independent trusted chip voiceprint feature and data key management subsystem.

具体的,在用户通过用户终端,经由用户身份管理子系统服务器向可信芯片获取密钥的过程中,可信芯片接收用户身份管理子系统服务器发送的密钥获取请求,以使得可信芯片通过验证密钥获取请求中的信息,决定是否对用户分配对应的密钥,其中,在本实施例中,可信芯片通过声纹特征对用户的密钥请求进行验证,具体步骤见步骤 S504和S506。Specifically, when a user obtains a key from a trusted chip through a user terminal via a user identity management subsystem server, the trusted chip receives a key acquisition request sent by the user identity management subsystem server, so that the trusted chip determines whether to allocate a corresponding key to the user by verifying the information in the key acquisition request. In this embodiment, the trusted chip verifies the user's key request through voiceprint features. The specific steps are shown in steps S504 and S506.

步骤S504,可信芯片解析密钥获取请求,并将密钥获取请求中的声纹特征与预存声纹特征进行对比;Step S504: The trusted chip parses the key acquisition request and compares the voiceprint features in the key acquisition request with pre-stored voiceprint features;

本申请上述S504中,基于步骤S502中可信芯片接收到的密钥获取请求,可信芯片解析密钥获取请求获取该密钥获取请求中的声纹特征,并将密钥获取请求中的声纹特征与预存声纹特征进行对比。In the above S504 of the present application, based on the key acquisition request received by the trusted chip in step S502, the trusted chip parses the key acquisition request to obtain the voiceprint features in the key acquisition request, and compares the voiceprint features in the key acquisition request with the pre-stored voiceprint features.

具体的,每个在用户身份管理子系统服务器注册成功的用户,都会在可信芯片中存储身份信息标识和对应该身份信息标识的声纹特征,以及对应的密钥,因此若要获取密钥,则需要对用户身份进行验证,通过将用户发送的身份信息标识和对应该身份信息标识的声纹特征与预先存储的身份信息标识和对应该身份信息标识的声纹特征进行对比,可信芯片可以判断是否将该密钥反馈至该用户。Specifically, each user who successfully registers on the user identity management subsystem server will have the identity information identifier and the voiceprint feature corresponding to the identity information identifier, as well as the corresponding key, stored in the trusted chip. Therefore, if the key is to be obtained, the user's identity needs to be verified. By comparing the identity information identifier and the voiceprint feature corresponding to the identity information identifier sent by the user with the pre-stored identity information identifier and the voiceprint feature corresponding to the identity information identifier, the trusted chip can determine whether to feed the key back to the user.

步骤S506,若密钥获取请求中的声纹特征与预存声纹特征匹配,则可信芯片向用户终端返回密钥响应信息。Step S506: If the voiceprint feature in the key acquisition request matches the pre-stored voiceprint feature, the trusted chip returns key response information to the user terminal.

本申请上述S506中,若密钥获取请求中的声纹特征与预存声纹特征匹配,则可信芯片向用户终端返回密钥响应信息。In the above S506 of the present application, if the voiceprint feature in the key acquisition request matches the pre-stored voiceprint feature, the trusted chip returns key response information to the user terminal.

在本申请实施例提供的数据密钥的保护方法中,通过可信芯片接收用户身份管理子系统服务器发送的密钥获取请求,其中,密钥获取请求包括:声纹特征;可信芯片解析密钥获取请求,并将密钥获取请求中的声纹特征与预存声纹特征进行对比;若密钥获取请求中的声纹特征与预存声纹特征匹配,则可信芯片向用户终端返回密钥响应信息,达到了密钥的安全获取的目的,从而实现了安全获取密钥的技术效果,进而解决了由于现有技术中存在的密钥容易泄密的技术问题。In the data key protection method provided in the embodiment of the present application, a key acquisition request sent by a user identity management subsystem server is received through a trusted chip, wherein the key acquisition request includes: voiceprint features; the trusted chip parses the key acquisition request and compares the voiceprint features in the key acquisition request with the pre-stored voiceprint features; if the voiceprint features in the key acquisition request match the pre-stored voiceprint features, the trusted chip returns key response information to the user terminal, thereby achieving the purpose of secure key acquisition, thereby realizing the technical effect of secure key acquisition, and further solving the technical problem of easy key leakage in the existing technology.

具体的,基于上述步骤S502至步骤S506,本实施例提供的数据密钥的保护方法有两种实现方式,具体实现方式如下:Specifically, based on the above steps S502 to S506, the data key protection method provided in this embodiment has two implementation methods, which are specifically implemented as follows:

方式一:密钥获取请求包括声纹特征、身份信息标识和密钥句柄。Method 1: The key acquisition request includes voiceprint features, identity information identifier and key handle.

可选的,在密钥获取请求包括声纹特征、身份信息标识和密钥句柄的情况下,步骤S504中可信芯片解析密钥获取请求,并将密钥获取请求中的声纹特征与预存声纹特征进行对比包括:Optionally, when the key acquisition request includes a voiceprint feature, an identity information identifier, and a key handle, the trusted chip in step S504 parses the key acquisition request and compares the voiceprint feature in the key acquisition request with a pre-stored voiceprint feature, including:

Step1,可信芯片通过可信芯片的私钥解密密钥获取请求,提取声纹特征,其中,密钥获取请求通过可信芯片的公钥加密;可信芯片的公钥与可信芯片的私钥对应;Step 1: The trusted chip decrypts the key acquisition request using its private key to extract the voiceprint feature. The key acquisition request is encrypted using the public key of the trusted chip; the public key of the trusted chip corresponds to the private key of the trusted chip.

本申请上述Step1中,对应实施例1中用户身份管理子系统服务器的方式一中的步骤S408中的Step1和Step2。由于用户身份管理子系统服务器通过可信芯片的公钥加密密钥获取请求,对应于可信芯片的公钥,可信芯片通过可信芯片的私钥解密密钥获取请求,提取该密钥获取请求中的声纹特征。The above-mentioned Step 1 of the present application corresponds to Step 1 and Step 2 of Step S408 in Method 1 of the user identity management subsystem server in Example 1. Since the user identity management subsystem server encrypts the key acquisition request using the public key of the trusted chip, corresponding to the public key of the trusted chip, the trusted chip decrypts the key acquisition request using the private key of the trusted chip, and extracts the voiceprint features in the key acquisition request.

Step2,可信芯片将声纹特征与预存声纹特征进行对比,判断声纹特征是否与预存声纹特征相同。In step 2, the trusted chip compares the voiceprint features with the pre-stored voiceprint features to determine whether the voiceprint features are the same as the pre-stored voiceprint features.

本申请上述Step2中,基于Step 1对密钥获取请求的解密,获取密钥获取请求中的身份信息标识,依据身份信息标识查询是否与可信芯片中预先存储的身份信息标识相同,如果相同,依据预先存储的身份信息标识获取对应的声纹特征,将密钥获取请求中的声纹特征与预存声纹特征进行对比,判断声纹特征是否与预存声纹特征相同,在判断结果为是的情况下执行步骤S506;在判断结果为否的情况下,用户获取密钥的流程终止。In the above-mentioned Step 2 of the present application, based on the decryption of the key acquisition request in Step 1, the identity information identifier in the key acquisition request is obtained, and a query is made based on the identity information identifier to determine whether it is the same as the identity information identifier pre-stored in the trusted chip. If they are the same, the corresponding voiceprint feature is obtained based on the pre-stored identity information identifier, and the voiceprint feature in the key acquisition request is compared with the pre-stored voiceprint feature to determine whether the voiceprint feature is the same as the pre-stored voiceprint feature. If the judgment result is yes, step S506 is executed; if the judgment result is no, the process of the user obtaining the key is terminated.

进一步地,可选的,步骤S506中若密钥获取请求中的声纹特征与预存声纹特征匹配,则可信芯片向用户终端返回密钥响应信息包括:Furthermore, optionally, in step S506, if the voiceprint feature in the key acquisition request matches the pre-stored voiceprint feature, the trusted chip returns key response information to the user terminal including:

Step1,若密钥获取请求中的声纹特征与预存声纹特征匹配,则可信芯片依据声纹特征提取对应的数据密钥;Step 1: If the voiceprint feature in the key acquisition request matches the pre-stored voiceprint feature, the trusted chip extracts the corresponding data key based on the voiceprint feature;

本申请上述Step1中,基于步骤S504的判断,若密钥获取请求中的声纹特征与预存声纹特征匹配,则可信芯片依据声纹特征提取对应的数据密钥。In the above Step 1 of the present application, based on the judgment of step S504, if the voiceprint feature in the key acquisition request matches the pre-stored voiceprint feature, the trusted chip extracts the corresponding data key based on the voiceprint feature.

Step2,可信芯片通过用户终端的公钥加密数据密钥,生成密钥响应信息;Step 2: The trusted chip encrypts the data key using the public key of the user terminal and generates a key response message.

本申请上述Step2中,基于上述Step1可信芯片获取到的数据密钥,可信芯片通过用户终端的公钥加密数据密钥,生成密钥响应信息,其中,该密钥响应信息可以包括:用户通过用户终端请求可信芯片分配的密钥。In the above Step 2 of the present application, based on the data key obtained by the trusted chip in the above Step 1, the trusted chip encrypts the data key through the public key of the user terminal and generates key response information, wherein the key response information may include: the key assigned by the user requesting the trusted chip through the user terminal.

Step3,可信芯片将密钥响应信息返回用户终端。Step 3: The trusted chip returns the key response information to the user terminal.

方式二:密钥获取请求包括声纹特征、随机数、待加密或解密数据、身份信息标识和密钥句柄。Method 2: The key acquisition request includes voiceprint features, random numbers, data to be encrypted or decrypted, identity information identifier and key handle.

可选的,在密钥获取请求包括声纹特征、随机数、待加密或解密数据、身份信息标识和密钥句柄的情况下,步骤S504中可信芯片解析密钥获取请求,并将密钥获取请求中的声纹特征与预存声纹特征进行对比包括:Optionally, when the key acquisition request includes a voiceprint feature, a random number, data to be encrypted or decrypted, an identity information identifier, and a key handle, the trusted chip parses the key acquisition request in step S504 and compares the voiceprint feature in the key acquisition request with a pre-stored voiceprint feature, including:

Step1,可信芯片通过可信芯片的私钥解密密钥获取请求,得到声纹特征,其中,密钥获取请求通过可信芯片的公钥加密;可信芯片的公钥与可信芯片的私钥对应;Step 1: The trusted chip decrypts the key acquisition request using its private key to obtain the voiceprint feature. The key acquisition request is encrypted using the public key of the trusted chip; the public key of the trusted chip corresponds to the private key of the trusted chip.

本申请上述Step1中,对应实施例1中用户身份管理子系统服务器的方式二中的步骤S408中的Step1至Step3。由于用户身份管理子系统服务器通过可信芯片的公钥加密密钥获取请求,对应可信芯片的公钥,可信芯片通过可信芯片的私钥解密密钥获取请求,提取该密钥获取请求中的声纹特征。The above-mentioned Step 1 of the present application corresponds to Step 1 to Step 3 of Step S408 in the second method of the user identity management subsystem server in Example 1. Since the user identity management subsystem server encrypts the key acquisition request using the public key of the trusted chip, corresponding to the public key of the trusted chip, the trusted chip decrypts the key acquisition request using the private key of the trusted chip, and extracts the voiceprint features in the key acquisition request.

Step2,可信芯片将声纹特征与预存声纹特征进行对比,判断声纹特征是否与预存声纹特征相同。In step 2, the trusted chip compares the voiceprint features with the pre-stored voiceprint features to determine whether the voiceprint features are the same as the pre-stored voiceprint features.

本申请上述Step2中,基于Step 1对密钥获取请求的解密,获取密钥获取请求中的身份信息标识,依据身份信息标识查询是否与可信芯片中预先存储的身份信息标识相同,如果相同,依据预先存储的身份信息标识获取对应的声纹特征,将密钥获取请求中的声纹特征与预存声纹特征进行对比,判断声纹特征是否与预存声纹特征相同,在判断结果为是的情况下执行步骤S506;在判断结果为否的情况下,用户获取密钥的流程终止。In the above-mentioned Step 2 of the present application, based on the decryption of the key acquisition request in Step 1, the identity information identifier in the key acquisition request is obtained, and a query is made based on the identity information identifier to determine whether it is the same as the identity information identifier pre-stored in the trusted chip. If they are the same, the corresponding voiceprint feature is obtained based on the pre-stored identity information identifier, and the voiceprint feature in the key acquisition request is compared with the pre-stored voiceprint feature to determine whether the voiceprint feature is the same as the pre-stored voiceprint feature. If the judgment result is yes, step S506 is executed; if the judgment result is no, the process of the user obtaining the key is terminated.

进一步地,可选的,步骤S506若密钥获取请求中的声纹特征与预存声纹特征匹配,则可信芯片向用户终端返回密钥响应信息包括:Furthermore, optionally, in step S506, if the voiceprint feature in the key acquisition request matches the pre-stored voiceprint feature, the trusted chip returns key response information to the user terminal including:

Step1,若密钥获取请求中的声纹特征与预存声纹特征匹配,则可信芯片依据声纹特征提取对应的数据密钥;Step 1: If the voiceprint feature in the key acquisition request matches the pre-stored voiceprint feature, the trusted chip extracts the corresponding data key based on the voiceprint feature;

本申请上述Step1中,基于步骤S504的判断,若密钥获取请求中的声纹特征与预存声纹特征匹配,则可信芯片依据声纹特征提取对应的数据密钥。In the above Step 1 of the present application, based on the judgment of step S504, if the voiceprint feature in the key acquisition request matches the pre-stored voiceprint feature, the trusted chip extracts the corresponding data key based on the voiceprint feature.

Step2,可信芯片依据数据密钥对待加密或解密数据进行加密或解密,得到加密信息或解密信息;Step 2: The trusted chip encrypts or decrypts the data to be encrypted or decrypted based on the data key to obtain the encrypted information or decrypted information;

本申请上述Step2中,基于Step1提取的数据密钥,可信芯片依据数据密钥对待加密或解密数据进行加密或解密,得到加密信息或解密信息。In the above Step 2 of the present application, based on the data key extracted in Step 1, the trusted chip encrypts or decrypts the data to be encrypted or decrypted according to the data key to obtain encrypted information or decrypted information.

Step3,可信芯片将随机数与加密信息或解密信息进行预设计算,得到运算结果;Step 3: The trusted chip performs a preset calculation on the random number and the encrypted or decrypted information to obtain the calculation result;

本申请上述Step3中,基于步骤Step2中可信芯片得到的加密信息或解密信息,在密钥获取请求包括随机数的情况下,可信芯片依据随机数对加密信息或解密信息进行预设计算,得到运算结果;其中,在本实施例中,优选的以可信芯片依据随机数对加密信息或解密信息通过哈希算法进行计算,得到运算结果。In the above-mentioned Step 3 of the present application, based on the encrypted information or decrypted information obtained by the trusted chip in step Step 2, when the key acquisition request includes a random number, the trusted chip performs a preset calculation on the encrypted information or decrypted information according to the random number to obtain the calculation result; wherein, in this embodiment, it is preferred that the trusted chip calculates the encrypted information or decrypted information according to the random number through a hash algorithm to obtain the calculation result.

Step4,可信芯片通过用户终端的公钥加密运算结果,生成密钥响应信息;Step 4: The trusted chip encrypts the result of the operation using the public key of the user terminal and generates a key response message.

本申请上述Step4中,基于上述Step3得到的运算结果,为保障密钥在传输过程中的安全,以加密的形式对数据密钥处理后的运算结果进行加密,其中,加密形式为:可信芯片通过用户终端的公钥加密运算结果,生成密钥响应信息。In the above Step 4 of the present application, based on the calculation result obtained in the above Step 3, in order to ensure the security of the key during transmission, the calculation result after the data key processing is encrypted in an encrypted form, wherein the encryption form is: the trusted chip encrypts the calculation result through the public key of the user terminal to generate a key response information.

Step5,可信芯片将密钥响应信息返回用户终端。Step 5: The trusted chip returns the key response information to the user terminal.

区别于方式一,在方式二中,用户终端直接将待加密或解密数据发送至可信芯片,由可信芯片在对用户身份验证无误后,依据用户的数据密钥对待加密或解密数据进行对应的加密或解密操作,进而得到加密或解密后的数据,并将加密或解密后的数据返回用户终端,省略了用户终端运算的过程,减轻了用户终端的运算压力,并且最重要的是,数据密钥不出可信芯片,避免了在报文传输过程中密钥的泄露,保障了数据密钥的安全。Different from method one, in method two, the user terminal directly sends the data to be encrypted or decrypted to the trusted chip. After the trusted chip verifies the user's identity, it performs corresponding encryption or decryption operations on the data to be encrypted or decrypted based on the user's data key, and then obtains the encrypted or decrypted data, and returns the encrypted or decrypted data to the user terminal, omitting the user terminal's calculation process and reducing the user terminal's calculation pressure. Most importantly, the data key does not leave the trusted chip, avoiding the leakage of the key during message transmission and ensuring the security of the data key.

综上,本申请实施例提供的数据密钥的保护方法中,用户通过用户终端,经由用户身份管理子系统服务器向可信芯片获取密钥的过程中,在可信芯片侧,即为上述实施例二,需要说明的是,在实现上述流程的过程中可信芯片包括以下功能:In summary, in the data key protection method provided in the embodiment of the present application, the process in which the user obtains the key from the trusted chip via the user identity management subsystem server through the user terminal is the above-mentioned embodiment 2. It should be noted that in the process of implementing the above-mentioned process, the trusted chip includes the following functions:

用户身份及声纹特征导入:将用户声纹管理子系统服务器中用户UID、该用户的声纹特征导入到可信芯片的非易失空间中,导入过程中,保证每个用户的声纹特征与其UID是一一映射关系;Importing user identity and voiceprint features: Importing the user UID and the user's voiceprint features from the user voiceprint management subsystem server into the non-volatile space of the trusted chip. During the import process, ensure that each user's voiceprint features are mapped one-to-one with their UID;

声纹特征存储:导入到可信芯片的声纹特征用可信存储根密钥加密保存,以保证声纹特征数据的安全;Voiceprint feature storage: The voiceprint features imported into the trusted chip are encrypted and stored using the trusted storage root key to ensure the security of the voiceprint feature data;

用户数据密钥创建:可信芯片按TCG可信标准,可以为每个唯一标识的用户创建用来加密数据的数据密钥,并将密钥的句柄keyID反馈给用户终端,存储过程中,保证每个用户UID、用户的声纹特征、用户的数据密钥是一一映射关系;User data key creation: The trusted chip, in accordance with the TCG trust standard, can create a data key for each uniquely identified user to encrypt data, and feed the key handle keyID back to the user terminal. During the storage process, it ensures that each user UID, user voiceprint feature, and user data key are mapped one to one.

用户数据密钥的存储:用户的数据密钥,可以用可信芯片的存储根密钥加密保护;Storage of user data keys: User data keys can be encrypted and protected with the storage root key of the trusted chip;

声纹特征比对:实时提取的用户声纹特征,与先前初始化存储的用户声纹特征做比对;Voiceprint feature comparison: The user's voiceprint features extracted in real time are compared with the previously initialized and stored user's voiceprint features;

数据密钥使用:当用户声纹特征比对通过后,用户就有权限使用该数据密钥对数据进行加解密操作。Data key usage: Once the user's voiceprint feature comparison passes, the user has the right to use the data key to encrypt and decrypt the data.

本实施例提供的数据密钥的保护方法中的可信芯片用于执行可信计算,其中,可信计算包括5个关键技术概念,该可信芯片将遵从TCG(Trusted Comput ing Group) 规范:The trusted chip in the data key protection method provided in this embodiment is used to perform trusted computing. Trusted computing includes five key technical concepts. The trusted chip will comply with the TCG (Trusted Computing Group) specifications:

技术一:可信计算Endorsement key签注密钥Technology 1: Trusted Computing Endorsement Key

签注密钥是一个2048位的RSA公共和私有密钥对,它在芯片出厂时随机生成并且不能改变。这个私有密钥永远在芯片里,而公共密钥用来认证及加密发送到该芯片的敏感数据。The endorsement key is a 2048-bit RSA public and private key pair that is randomly generated when the chip leaves the factory and cannot be changed. This private key is always in the chip, while the public key is used to authenticate and encrypt sensitive data sent to the chip.

即,本实施例中用户终端与可信芯片用于加密或解密过程中的可信芯片的公钥和可信芯片的私钥。That is, in this embodiment, the user terminal and the trusted chip use the public key of the trusted chip and the private key of the trusted chip in the encryption or decryption process.

技术二:可信计算Secure input and output安全输入输出Technology 2: Trusted Computing Secure input and output

安全输入输出是指电脑用户和用户与之交互的软件间受保护的路径。当前,电脑系统上恶意软件有许多方式来拦截用户和软件进程间传送的数据。例如键盘监听和截屏。Secure I/O refers to the protected paths between computer users and the software they interact with. Currently, malware on computer systems uses a variety of methods to intercept data transmitted between users and software processes, including keyboard sniffing and screenshot capture.

由于可信芯片的独立存储和运算能力,在本申请中若可信芯片内嵌入于用户使用的终端中,将可以保护数据的私密性和安全性。Due to the independent storage and computing capabilities of the trusted chip, in this application, if the trusted chip is embedded in the terminal used by the user, the privacy and security of the data can be protected.

技术三:可信计算Memory curtaining储存器屏蔽Technology 3: Trusted Computing Memory Curtaining

储存器屏蔽拓展了一般的储存保护技术,提供了完全独立的储存区域。例如,包含密钥的位置。即使操作系统自身也没有被屏蔽储存的完全访问权限,所以入侵者即便控制了操作系统信息也是安全的。Storage shielding extends conventional storage protection techniques by providing completely isolated storage areas, such as those containing encryption keys. Even the operating system itself doesn't have full access to shielded storage, so even if an intruder gains control of the operating system's information, it remains secure.

即,基于上述技术二中提到的可信芯片的独立存储,不仅存储独立,并且存储的数据中可通过加密的方式保存,在存储数据的同时更增加了一套安全保障。That is, based on the independent storage of the trusted chip mentioned in the above-mentioned technology 2, not only is the storage independent, but the stored data can also be saved in an encrypted manner, which adds a set of security guarantees while storing data.

技术四:可信计算Sealed storage密封储存Technology 4: Trusted Computing Sealed Storage

密封存储通过把私有信息和使用的软硬件平台配置信息捆绑在一起来保护私有信息。意味着该数据只能在相同的软硬件组合环境下读取。例如,某个用户在他们的电脑上保存一首歌曲,而他们的电脑没有播放这首歌的许可证,他们就不能播放这首歌。Sealed storage protects private information by tying it to the hardware and software platform configuration used. This means the data can only be read by users with the same hardware and software combination. For example, if a user saves a song to their computer and their computer doesn't have a license to play it, they can't play it.

即,基于技术三中提到的,本实施例中提到的可信证书正是可以用于可信芯片验证,在可信证书合法的情况下,可信芯片才会基于声纹特征做匹配,并执行后续提取数据密钥的过程。That is, based on what is mentioned in Technology 3, the trusted certificate mentioned in this embodiment can be used for trusted chip verification. When the trusted certificate is legitimate, the trusted chip will match based on the voiceprint features and execute the subsequent process of extracting the data key.

技术五:可信计算Remote attestat ion远程认证Technology 5: Trusted Computing Remote Authentication

远程认证准许用户电脑上的改变被授权方感知。例如,软件公司可以避免用户干扰他们的软件以规避技术保护措施。它通过让硬件生成当前软件的证明书。随后电脑将这个证明书传送给远程被授权方来显示该软件公司的软件尚未被干扰(尝试破解)。Remote authentication allows changes made to a user's computer to be visible to authorized parties. For example, software companies can prevent users from tampering with their software to circumvent technical protection measures. This works by having the hardware generate a certificate of the current software. The computer then transmits this certificate to the remote authorized party to show the software company that the software has not been tampered with (in an attempt to crack it).

即,可以与技术四中提到的可信证书相同,用于对终端设备或使用用户进行验证。That is, it can be the same as the trusted certificate mentioned in Technology 4, used to verify the terminal device or user.

实施例3Example 3

根据本发明实施例,还提供了一种数据密钥的保护方法实施例,需要说明的是,在附图的流程图示出的步骤可以在诸如一组计算机可执行指令的计算机系统中执行,并且,虽然在流程图中示出了逻辑顺序,但是在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤。According to an embodiment of the present invention, an embodiment of a method for protecting a data key is also provided. It should be noted that the steps shown in the flowchart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and although a logical order is shown in the flowchart, in some cases, the steps shown or described can be executed in an order different from that shown here.

本申请实施例三所提供的方法实施例可以在移动终端、计算机终端或者类似的运算装置中执行。以运行在计算机终端上为例,图6是本发明实施例的一种数据密钥的保护方法的计算机终端的硬件结构框图。如图6所示,计算机终端60可以包括一个或多个(图中仅示出一个)处理器602(处理器602可以包括但不限于微处理器MCU或可编程逻辑器件FPGA等的处理装置)、用于存储数据的存储器604、以及用于通信功能的传输模块606。本领域普通技术人员可以理解,图6所示的结构仅为示意,其并不对上述电子装置的结构造成限定。例如,计算机终端60还可包括比图6中所示更多或者更少的组件,或者具有与图6所示不同的配置。The method embodiment provided in Example 3 of the present application can be executed in a mobile terminal, a computer terminal or a similar computing device. Taking operation on a computer terminal as an example, Figure 6 is a hardware structure block diagram of a computer terminal of a data key protection method according to an embodiment of the present invention. As shown in Figure 6, the computer terminal 60 may include one or more (only one is shown in the figure) processors 602 (the processor 602 may include but is not limited to a processing device such as a microprocessor MCU or a programmable logic device FPGA), a memory 604 for storing data, and a transmission module 606 for communication functions. It can be understood by those skilled in the art that the structure shown in Figure 6 is only for illustration and does not limit the structure of the above-mentioned electronic device. For example, the computer terminal 60 may also include more or fewer components than those shown in Figure 6, or have a configuration different from that shown in Figure 6.

存储器604可用于存储应用软件的软件程序以及模块,如本发明实施例中的数据密钥的保护方法对应的程序指令/模块,处理器602通过运行存储在存储器604内的软件程序以及模块,从而执行各种功能应用以及数据处理,即实现上述的应用程序的漏洞检测方法。存储器604可包括高速随机存储器,还可包括非易失性存储器,如一个或者多个磁性存储装置、闪存、或者其他非易失性固态存储器。在一些实例中,存储器604可进一步包括相对于处理器602远程设置的存储器,这些远程存储器可以通过网络连接至计算机终端60。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。The memory 604 can be used to store software programs and modules of application software, such as the program instructions/modules corresponding to the data key protection method in the embodiment of the present invention. The processor 602 executes various functional applications and data processing by running the software programs and modules stored in the memory 604, that is, implementing the vulnerability detection method of the above-mentioned application. The memory 604 may include a high-speed random access memory and may also include a non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 604 may further include a memory remotely located relative to the processor 602, and these remote memories may be connected to the computer terminal 60 via a network. Examples of the above-mentioned network include, but are not limited to, the Internet, an intranet, a local area network, a mobile communication network, and combinations thereof.

传输模块606用于经由一个网络接收或者发送数据。上述的网络具体实例可包括计算机终端60的通信供应商提供的无线网络。在一个实例中,传输模块606包括一个网络适配器(Network Interface Controller,NIC),其可通过基站与其他网络设备相连从而可与互联网进行通讯。在一个实例中,传输模块606可以为射频(Radio Frequency,RF)模块,其用于通过无线方式与互联网进行通讯。The transmission module 606 is configured to receive or transmit data via a network. A specific example of the aforementioned network may include a wireless network provided by the communications provider of the computer terminal 60. In one embodiment, the transmission module 606 includes a network interface controller (NIC), which can be connected to other network devices via a base station to enable communication with the Internet. In another embodiment, the transmission module 606 may be a radio frequency (RF) module, which is configured to communicate with the Internet wirelessly.

在上述运行环境下,本申请提供了如图7所示的数据密钥的保护方法。在用户终端侧,图7a是根据本发明实施例三的数据密钥的保护方法的流程图。In the above operating environment, the present application provides a data key protection method as shown in Figure 7. On the user terminal side, Figure 7a is a flow chart of a data key protection method according to embodiment 3 of the present invention.

步骤S702,用户终端向用户身份管理子系统服务器发送的密钥获取请求,其中,密钥获取请求包括用户的身份验证信息;Step S702: The user terminal sends a key acquisition request to the user identity management subsystem server, wherein the key acquisition request includes the user's identity authentication information;

本申请上述步骤S702中,区别于实施例1和实施例2,本实施例提供的数据密钥的保护方法可以适用于用户终端,其中,该用户终端可以包括:智能手机、笔记本电脑、平板电脑、台式电脑、掌上商务以及智能穿戴设备。In the above step S702 of the present application, different from Example 1 and Example 2, the data key protection method provided in this embodiment can be applied to user terminals, wherein the user terminals may include: smart phones, laptops, tablet computers, desktop computers, handheld businesses and smart wearable devices.

具体的,在用户通过用户终端获取数据密钥时,用户终端向用户身份管理子系统服务器发送的密钥获取请求,该过程可以表现为:登陆关联至用户身份管理子系统服务器的网页,用户通过用户终端在该网页输入自己的身份验证信息。Specifically, when a user obtains a data key through a user terminal, the user terminal sends a key acquisition request to the user identity management subsystem server. The process can be performed as follows: logging into a web page associated with the user identity management subsystem server, and the user enters his or her own identity authentication information on the web page through the user terminal.

步骤S704,用户终端接收用户身份管理子系统服务器返回的待验证语音信息;Step S704: The user terminal receives the voice information to be verified returned by the user identity management subsystem server;

本申请上述步骤S704中,基于步骤S702发送的密钥获取请求,用户终端接收用户身份管理子系统服务器返回的待验证语音信息,在接到用户身份管理子系统服务器返回的待验证语音信息后,用户终端通过收音装置获取用户朗读待验证语音信息的声音,该待验证语音信息可以为一连串由数字及字符随机组成的没变形处理的字符。In the above-mentioned step S704 of the present application, based on the key acquisition request sent in step S702, the user terminal receives the voice information to be verified returned by the user identity management subsystem server. After receiving the voice information to be verified returned by the user identity management subsystem server, the user terminal obtains the sound of the user reading the voice information to be verified through the audio receiving device. The voice information to be verified can be a series of characters randomly composed of numbers and characters without deformation processing.

步骤S706,用户终端向用户身份管理子系统服务器上传用户语音,其中,用户语音对应待验证语音信息;Step S706: The user terminal uploads the user voice to the user identity management subsystem server, where the user voice corresponds to the voice information to be verified;

本申请上述步骤S706中,基于步骤S704接收到的待验证语音信息,用户终端向用户身份管理子系统服务器上传用户语音。In the above step S706 of the present application, based on the voice information to be verified received in step S704, the user terminal uploads the user voice to the user identity management subsystem server.

步骤S708,用户终端接收可信芯片返回的密钥响应信息,其中,密钥响应信息对应向用户身份管理子系统服务器上传的用户语音。Step S708: The user terminal receives the key response information returned by the trusted chip, wherein the key response information corresponds to the user voice uploaded to the user identity management subsystem server.

本申请上述步骤S708中,在用户终端向用户身份管理子系统服务器上传用户语音之后,可信芯片会依据用户语音中的声纹特征反馈对应的数据密钥,其中,数据密钥在传输的过程中以密钥响应信息的形式返回用户终端。In the above step S708 of the present application, after the user terminal uploads the user voice to the user identity management subsystem server, the trusted chip will feedback the corresponding data key based on the voiceprint features in the user voice, wherein the data key is returned to the user terminal in the form of key response information during the transmission process.

在本发明实施例中,通过用户终端向用户身份管理子系统服务器发送的密钥获取请求,其中,密钥获取请求包括用户的身份验证信息;用户终端接收用户身份管理子系统服务器返回的待验证语音信息;用户终端向用户身份管理子系统服务器上传用户语音,其中,用户语音对应待验证语音信息;用户终端接收可信芯片返回的密钥响应信息,其中,密钥响应信息对应向用户身份管理子系统服务器上传的用户语音,达到了密钥的安全获取的目的,从而实现了安全获取密钥的技术效果,进而解决了由于现有技术中存在的密钥容易泄密的技术问题。In an embodiment of the present invention, a key acquisition request is sent by a user terminal to a user identity management subsystem server, wherein the key acquisition request includes the user's identity authentication information; the user terminal receives the voice information to be verified returned by the user identity management subsystem server; the user terminal uploads the user voice to the user identity management subsystem server, wherein the user voice corresponds to the voice information to be verified; the user terminal receives the key response information returned by the trusted chip, wherein the key response information corresponds to the user voice uploaded to the user identity management subsystem server, thereby achieving the purpose of securely acquiring the key, thereby realizing the technical effect of securely acquiring the key, and further solving the technical problem of easy leakage of the key in the prior art.

具体的,基于上述步骤S702至步骤S708,本实施例提供的数据密钥的保护方法有两种实现方式,具体实现方式如下:Specifically, based on the above steps S702 to S708, the data key protection method provided in this embodiment has two implementation methods, which are specifically implemented as follows:

方式一:身份验证信息包括:身份信息标识和密钥句柄。Method 1: Authentication information includes: identity information identifier and key handle.

可选的,在身份验证信息包括身份信息标识和密钥句柄的情况下,步骤S702 中用户终端向用户身份管理子系统服务器发送的密钥获取请求包括:Optionally, when the identity authentication information includes an identity information identifier and a key handle, the key acquisition request sent by the user terminal to the user identity management subsystem server in step S702 includes:

Step1,用户终端依据身份信息标识和密钥句柄生成密钥获取请求;Step 1: The user terminal generates a key acquisition request based on the identity information identifier and key handle;

本申请上述步骤Step1中,对应实施例1中用户身份管理子系统服务器的方式一和实施例2中可信芯片的方式一。用户终端将用户的身份信息标识和密钥句柄进行封装,得到密钥获取请求。The above step 1 of the present application corresponds to the method 1 of the user identity management subsystem server in Example 1 and the method 1 of the trusted chip in Example 2. The user terminal encapsulates the user's identity information identifier and the key handle to obtain a key acquisition request.

Step2,用户终端将密钥获取请求发送至用户身份管理子系统服务器。Step 2: The user terminal sends a key acquisition request to the user identity management subsystem server.

进一步地,可选的,在步骤S708中用户终端接收可信芯片返回的密钥响应信息之后,本实施例提供的数据密钥的保护方法还包括:Furthermore, optionally, after the user terminal receives the key response information returned by the trusted chip in step S708, the data key protection method provided in this embodiment further includes:

Step1,用户终端依据用户终端的私钥解密密钥响应信息,获取密钥响应信息携带的数据密钥,其中,密钥响应信息通过用户终端的公钥加密,用户终端的公钥与用户终端的私钥对应;Step 1: The user terminal decrypts the key response message using its private key to obtain the data key carried in the key response message. The key response message is encrypted using the user terminal's public key, which corresponds to the user terminal's private key.

本申请上述步骤Step1中,对应实施例2中可信芯片方式一中步骤S506中的Step1至Step3,由于可信芯片通过用户终端的公钥加密数据密钥,在用户终端侧通过用户终端的私钥解密密钥响应信息,获取密钥响应信息携带的数据密钥。In the above-mentioned Step 1 of the present application, corresponding to Step 1 to Step 3 in Step S506 of the trusted chip method 1 in Example 2, since the trusted chip encrypts the data key through the public key of the user terminal, the key response information is decrypted through the private key of the user terminal on the user terminal side to obtain the data key carried by the key response information.

Step2,用户终端依据数据密钥对待加密或待解密数据进行加密或解密,得到加密数据信息或解密信息。Step 2: The user terminal encrypts or decrypts the data to be encrypted or decrypted based on the data key to obtain encrypted data information or decrypted information.

本申请上述步骤Step2中,基于上述Step1获取的数据密钥,用户终端依据数据密钥对待加密或待解密数据进行加密或解密,得到加密后的数据信息或解密信息。In the above step 2 of the present application, based on the data key obtained in the above step 1, the user terminal encrypts or decrypts the data to be encrypted or decrypted according to the data key to obtain the encrypted data information or decrypted information.

方式二:身份验证信息包括:可信证书、身份信息标识和密钥句柄。Method 2: Authentication information includes: trusted certificate, identity information identifier and key handle.

可选的,在身份验证信息包括可信证书、身份信息标识和密钥句柄的情况下,步骤S702中用户终端向用户身份管理子系统服务器发送的密钥获取请求包括:Optionally, when the identity authentication information includes a trusted certificate, an identity information identifier, and a key handle, the key acquisition request sent by the user terminal to the user identity management subsystem server in step S702 includes:

Step1,用户终端通过用户身份管理子系统公钥对可信证书、身份信息标识和密钥句柄进行加密,生成密钥获取请求;Step 1: The user terminal encrypts the trusted certificate, identity information identifier, and key handle using the public key of the user identity management subsystem to generate a key acquisition request.

本申请上述步骤Step1中,区别于方式一,本实施例的方式二在生成密钥获取请求的过程中通过添加可信证书,以及依据用户身份管理子系统公钥对可信证书、身份信息标识和密钥句柄进行加密,保障了用户的身份验证信息的安全。In the above-mentioned Step 1 of the present application, different from Method 1, Method 2 of this embodiment ensures the security of the user's identity authentication information by adding a trusted certificate and encrypting the trusted certificate, identity information identifier and key handle based on the public key of the user identity management subsystem during the process of generating a key acquisition request.

需要说明的是,可信证书可以用于验证当前用户终端是否有权限发起获取数据密钥流程,其中,可信证书可以是用户从第三方获得的数据安全证书。It should be noted that the trusted certificate can be used to verify whether the current user terminal has the authority to initiate the process of obtaining the data key, wherein the trusted certificate can be a data security certificate obtained by the user from a third party.

Step2,用户终端将密钥获取请求发送至用户身份管理子系统服务器。Step 2: The user terminal sends a key acquisition request to the user identity management subsystem server.

进一步地,可选的,在步骤S704中用户终端接收用户身份管理子系统服务器返回的待验证语音信息之后,本实施例提供的数据密钥的保护方法还包括:Furthermore, optionally, after the user terminal receives the voice information to be verified returned by the user identity management subsystem server in step S704, the data key protection method provided in this embodiment further includes:

Step1,用户终端解析待验证语音信息,得到用户身份管理子系统证书和待验证语音;Step 1: The user terminal parses the voice information to be verified and obtains the user identity management subsystem certificate and the voice information to be verified;

本申请上述步骤Step1中,在方式二中,在用户终端接收用户身份管理子系统服务器返回的待验证语音信息之后,用户终端接收到的待验证语音信息中包括用户身份管理子系统证书和待验证语音,在提示用户朗读待验证语音之前,需要对用户身份管理子系统证书进行验证,验证步骤执行Step2,验证成功执行Step3至Step5。In the above-mentioned step Step 1 of the present application, in method 2, after the user terminal receives the voice information to be verified returned by the user identity management subsystem server, the voice information to be verified received by the user terminal includes the user identity management subsystem certificate and the voice to be verified. Before prompting the user to read the voice to be verified, the user identity management subsystem certificate needs to be verified, and the verification step executes Step 2. If the verification is successful, execute Step 3 to Step 5.

Step2,用户终端判断用户身份管理子系统证书是否满足预设验证条件;Step 2: The user terminal determines whether the user identity management subsystem certificate meets the preset verification conditions;

本申请上述步骤Step2中,在验证用户身份管理子系统证书的过程中,需判断用户身份管理子系统证书是否能够与用户终端的验证条件对应上,若是执行Step3。In the above step Step 2 of this application, during the process of verifying the user identity management subsystem certificate, it is necessary to determine whether the user identity management subsystem certificate can correspond to the verification conditions of the user terminal. If so, execute Step 3.

Step3,在判断结果为是的情况下,用户终端接收用户朗读的待验证语音的声音信号;Step 3: If the judgment result is yes, the user terminal receives the sound signal of the voice to be verified read aloud by the user;

本申请上述步骤Step3中,基于Step2的判断,在判断结果为是的情况下,用户终端通过自身的收音装置接收用户朗读的待验证语音的声音信号,其中,该收音装置可以为移动终端上的麦克接口,例如,智能手机中的话筒。In the above-mentioned step Step 3 of the present application, based on the judgment of Step 2, if the judgment result is yes, the user terminal receives the sound signal of the voice to be verified read by the user through its own sound receiving device, wherein the sound receiving device can be a microphone interface on the mobile terminal, for example, a microphone in a smartphone.

Step4,用户终端将随机数、声音信号和待加密或解密数据通过用户身份管理子系统公钥进行加密,得到用户语音;Step 4: The user terminal encrypts the random number, the sound signal, and the data to be encrypted or decrypted using the public key of the user identity management subsystem to obtain the user's voice.

本申请上述步骤Step4中,基于Step3得到的声音信号,为保障信息传输的安全,用户终端将随机数、声音信号和待加密或解密数据通过用户身份管理子系统公钥进行加密,得到用户语音。In the above step 4 of the present application, based on the sound signal obtained in Step 3, in order to ensure the security of information transmission, the user terminal encrypts the random number, sound signal and data to be encrypted or decrypted using the public key of the user identity management subsystem to obtain the user voice.

Step5,用户终端向用户身份管理子系统服务器上传用户语音。Step 5: The user terminal uploads the user voice to the user identity management subsystem server.

可选的,在步骤S708中用户终端接收可信芯片返回的密钥响应信息之后,本实施例提供的数据密钥的保护方法还包括:Optionally, after the user terminal receives the key response information returned by the trusted chip in step S708, the data key protection method provided in this embodiment further includes:

Step1,用户终端通过用户终端的私钥解密密钥响应信息,得到密钥响应信息中的运算结果;Step 1: The user terminal decrypts the key response information using the user terminal's private key to obtain the calculation result in the key response information;

本申请上述步骤Step1中,对应实施例2中方式二中步骤S506中的Step1至Step5。用户终端接收可信芯片返回的密钥响应信息之后,由于可信芯片通过用户终端的公钥加密密钥响应信息,对应的用户终端通过用户终端的私钥解密密钥响应信息,得到密钥响应信息中的运算结果。The above-mentioned step 1 of the present application corresponds to Step 1 to Step 5 of step S506 in the second method in Example 2. After the user terminal receives the key response information returned by the trusted chip, since the trusted chip encrypts the key response information using the public key of the user terminal, the corresponding user terminal decrypts the key response information using the private key of the user terminal to obtain the operation result in the key response information.

Step2,用户终端依据随机数结合预设算法校验运算结果,判断运输结果是否满足预设校验标准;Step 2: The user terminal verifies the calculation result based on the random number and the preset algorithm to determine whether the transportation result meets the preset verification standard;

本申请上述步骤Step2中,基于Step1中得到的运算结果,为保障数据的完整,需要在使用该运算结果之前对该运算结果进行验证,该验证方式为:用户终端依据随机数依据预设算法校验运算结果,判断运输结果是否满足预设校验标准,其中,本实施例中优选的,该预设算法为哈希算法,即,用户终端依据随机数结合哈希算法校验运算结果,判断运输结果是否满足预设校验标准。In the above-mentioned step Step 2 of the present application, based on the calculation result obtained in Step 1, in order to ensure the integrity of the data, the calculation result needs to be verified before using the calculation result. The verification method is: the user terminal verifies the calculation result according to the random number and the preset algorithm to determine whether the transportation result meets the preset verification standard. Among them, in this embodiment, preferably, the preset algorithm is a hash algorithm, that is, the user terminal verifies the calculation result according to the random number combined with the hash algorithm to determine whether the transportation result meets the preset verification standard.

Step3,在判断结果为是的情况下,用户终端使用运算结果。Step 3: If the judgment result is yes, the user terminal uses the calculation result.

本申请上述步骤Step3中,基于Step2的判断,在判断结果为是的情况下,用户终端使用运算结果,其中,该运算结果可以为通过数据密钥加密后的数据信息或通过数据密钥解密后的解密信息。如图7b所示,图7b是根据本发明实施例三的数据密钥的保护方法中用户身份管理子系统服务器内嵌可信芯片与用户终端连接的示意图。In Step 3 of the present application, based on the judgment in Step 2, if the judgment result is yes, the user terminal uses the calculation result, where the calculation result can be data information encrypted with the data key or decrypted information decrypted with the data key. As shown in Figure 7b, Figure 7b is a schematic diagram of the connection between the embedded trusted chip in the user identity management subsystem server and the user terminal in the data key protection method according to Example 3 of the present invention.

实施例4Example 4

本申请提供了如图8所示的数据密钥的保护方法。在用户终端侧,图8是根据本发明实施例四的数据密钥的保护方法的流程图。The present application provides a data key protection method as shown in Figure 8. On the user terminal side, Figure 8 is a flow chart of a data key protection method according to a fourth embodiment of the present invention.

步骤S802,用户终端向用户身份管理子系统服务器发送的密钥获取请求,其中,密钥获取请求包括用户的身份验证信息;Step S802: The user terminal sends a key acquisition request to the user identity management subsystem server, wherein the key acquisition request includes the user's identity authentication information;

步骤S804,用户终端接收用户身份管理子系统服务器返回的待验证语音信息;Step S804: The user terminal receives the voice information to be verified returned by the user identity management subsystem server;

步骤S806,用户终端向用户身份管理子系统服务器上传用户语音,其中,用户语音对应待验证语音信息;Step S806: The user terminal uploads the user voice to the user identity management subsystem server, where the user voice corresponds to the voice information to be verified;

步骤S808,用户终端接收用户身份管理子系统服务器从用户语音提取的声纹特征;Step S808: The user terminal receives the voiceprint feature extracted from the user's voice by the user identity management subsystem server;

步骤S810,用户终端中的可信芯片将声纹特征与预存声纹特征进行比对;Step S810: The trusted chip in the user terminal compares the voiceprint features with pre-stored voiceprint features;

步骤S812,若声纹特征与预存声纹特征匹配,则用户终端中的可信芯片提取与声纹特征对应的数据密钥;Step S812: If the voiceprint feature matches the pre-stored voiceprint feature, the trusted chip in the user terminal extracts the data key corresponding to the voiceprint feature;

步骤S814,用户终端依据数据密钥执行对应操作。Step S814: The user terminal performs corresponding operations based on the data key.

综上,结合步骤S802至步骤S814,本实施例提供的数据密钥的保护方法可以适用于用户终端侧,与实施例3所提供的用户终端不同的地方在于,本实施例提供的数据密钥的保护方法可以适用于内嵌有可信芯片的用户终端。如图9a所示,图9a是根据本发明实施例中的一种数据密钥的保护方法中的用户身份管理子系统服务器与用户终端内嵌可信芯片连接的示意图。In summary, in conjunction with steps S802 to S814, the data key protection method provided in this embodiment can be applied to the user terminal side. Unlike the user terminal provided in Example 3, the data key protection method provided in this embodiment can be applied to user terminals with embedded trusted chips. As shown in Figure 9a, Figure 9a is a schematic diagram of the connection between the user identity management subsystem server and the embedded trusted chip in the user terminal in a data key protection method according to an embodiment of the present invention.

具体的,用户终端在需要数据密钥时,向用户身份管理子系统服务器发送密钥获取请求,其中密钥获取请求携带有用户的身份验证信息,用户身份管理子系统服务器在验证该身份验证信息成功之后向用户终端返回一段待验证语音信息,用户终端通过收音装置采集用户在朗读该待验证语音信息时的用户声音,并将该用户声音上传至用户身份管理子系统服务器,待用户身份管理子系统服务器返回提取该用户声音的声纹特征后,在用户终端中通过可信芯片将该声纹特征与预存声纹特征进行比对,若该声纹特征与预存声纹特征匹配,则提取数据密钥;进而用户终端可以依据该数据密钥执行数据传输时的加密或解密。Specifically, when the user terminal needs a data key, it sends a key acquisition request to the user identity management subsystem server, where the key acquisition request carries the user's identity authentication information. After successfully verifying the identity authentication information, the user identity management subsystem server returns a voice message to be verified to the user terminal. The user terminal collects the user's voice when the user reads the voice message to be verified through a sound receiving device, and uploads the user's voice to the user identity management subsystem server. After the user identity management subsystem server returns the voiceprint feature of the user's voice, the voiceprint feature is compared with the pre-stored voiceprint feature through the trusted chip in the user terminal. If the voiceprint feature matches the pre-stored voiceprint feature, the data key is extracted; then the user terminal can perform encryption or decryption during data transmission based on the data key.

其中,以访问网上银行为例,当用户初次注册账号时,对应该用户,网上银行系统会对应生成一串身份标识,例如,账号,在依据该账号注册声纹验证时,在用户终端侧对应该用户的声纹特征以及身份标识生成对应的数据密钥,其中,该数据密钥存储在可信芯片中,在可信芯片中通过对该数据密钥进行可信计算加密,提升数据密钥的安全性。在用户通过用户终端访问网上银行时,用户终端通过向网上银行的用户身份管理子系统服务器发送密钥获取请求,在用户身份管理子系统服务器返回待验证语音信息后,用户终端通过收音装置采集用户朗读该待验证语音信息的用户语音;并上传该用户语音至用户身份管理子系统服务器;在接收用户身份管理子系统服务器返回的提取的用户语音的声纹特征后,用户终端中的可信芯片依据该声纹特征与预存声纹特征进行比对,若该声纹特征与预存声纹特征匹配,则提取数据密钥。Taking online banking as an example, when a user first registers an account, the online banking system generates a string of identity identifiers for the user, such as an account number. When registering for voiceprint verification based on this account number, a corresponding data key is generated on the user terminal side based on the user's voiceprint characteristics and identity identifier. This data key is stored in a trusted chip, where trusted computing and encryption are performed on the data key to enhance its security. When a user accesses online banking through a user terminal, the user terminal sends a key acquisition request to the online bank's user identity management subsystem server. After the user identity management subsystem server returns the voice information to be verified, the user terminal uses a sound receiving device to capture the user's voice reading the voice information to be verified and uploads the user's voice to the user identity management subsystem server. After receiving the voiceprint characteristics of the extracted user voice returned by the user identity management subsystem server, the trusted chip in the user terminal compares the voiceprint characteristics with pre-stored voiceprint characteristics. If the voiceprint characteristics match the pre-stored voiceprint characteristics, the data key is extracted.

需要说明的是,在可信芯片内嵌于用户终端侧的情况下,减少了用户终端与用户身份管理子系统服务器之间的信令交互,避免了在信令交互过程中数据密钥的泄漏;并且由于可信芯片位于用户终端内,在获取数据密钥的过程中数据密钥始终位于用户终端内,降低了数据密钥泄漏的风险,并且解决了从可信芯片获取数据密钥的口令密钥难记问题。It should be noted that when the trusted chip is embedded in the user terminal side, the signaling interaction between the user terminal and the user identity management subsystem server is reduced, thereby avoiding the leakage of data keys during the signaling interaction process; and since the trusted chip is located in the user terminal, the data key is always located in the user terminal during the process of obtaining the data key, which reduces the risk of data key leakage and solves the problem of difficult to remember password keys for obtaining data keys from the trusted chip.

在本发明实施例中,通过用户终端向用户身份管理子系统服务器发送的密钥获取请求,其中,密钥获取请求包括用户的身份验证信息;用户终端接收用户身份管理子系统服务器返回的待验证语音信息;用户终端向用户身份管理子系统服务器上传用户语音,其中,用户语音对应待验证语音信息;用户终端接收用户身份管理子系统服务器从用户语音提取的声纹特征;用户终端中的可信芯片将声纹特征与预存声纹特征进行比对;若声纹特征与预存声纹特征匹配,则用户终端中的可信芯片提取与声纹特征对应的数据密钥;用户终端依据数据密钥执行对应操作。达到了密钥的安全获取的目的,从而实现了安全获取密钥的技术效果,进而解决了由于现有技术中存在的密钥容易泄密的技术问题。In an embodiment of the present invention, a user terminal sends a key acquisition request to a user identity management subsystem server, wherein the key acquisition request includes the user's identity authentication information; the user terminal receives the voice information to be verified returned by the user identity management subsystem server; the user terminal uploads the user voice to the user identity management subsystem server, wherein the user voice corresponds to the voice information to be verified; the user terminal receives the voiceprint features extracted from the user voice by the user identity management subsystem server; the trusted chip in the user terminal compares the voiceprint features with pre-stored voiceprint features; if the voiceprint features match the pre-stored voiceprint features, the trusted chip in the user terminal extracts the data key corresponding to the voiceprint features; and the user terminal performs corresponding operations based on the data key. This achieves the purpose of secure key acquisition, thereby achieving the technical effect of secure key acquisition and solving the technical problem of easy key leakage in the prior art.

可选的,在步骤S802中用户终端向用户身份管理子系统服务器发送的密钥获取请求之前,本实施例提供的数据密钥的保护方法还包括:Optionally, before the user terminal sends the key acquisition request to the user identity management subsystem server in step S802, the data key protection method provided in this embodiment further includes:

步骤S797,用户终端中的可信芯片导入预先获取的身份信息标识和声纹特征;Step S797: The trusted chip in the user terminal imports the pre-acquired identity information and voiceprint features;

步骤S798,用户终端中的可信芯片依据可信存储根密钥对声纹特征进行加密,并存储加密后的声纹特征;Step S798: The trusted chip in the user terminal encrypts the voiceprint feature according to the trusted storage root key and stores the encrypted voiceprint feature;

步骤S799,用户终端中的可信芯片依据预设加密算法和身份信息标识,生成数据密钥,并将数据密钥的密钥句柄返回用户终端;Step S799: The trusted chip in the user terminal generates a data key based on the preset encryption algorithm and the identity information identifier, and returns the key handle of the data key to the user terminal;

步骤S800,用户终端中的可信芯片将数据密钥、身份信息标识和声纹特征进行映射,得到数据密钥、身份信息标识和声纹特征的映射关系,并存储映射关系和数据密钥。In step S800, the trusted chip in the user terminal maps the data key, the identity information identifier and the voiceprint feature to obtain a mapping relationship among the data key, the identity information identifier and the voiceprint feature, and stores the mapping relationship and the data key.

具体的,结合步骤S797至步骤S800,用户终端中的可信芯片在用户获取数据密钥之前,将先针对用户生成对应的数据密钥。其中,生成数据密钥的过程如下:Specifically, in combination with step S797 to step S800, the trusted chip in the user terminal will first generate a corresponding data key for the user before the user obtains the data key. The process of generating the data key is as follows:

第一,将用户声纹管理子系统服务器中用户UID、该用户的声纹特征导入到可信芯片的非易失空间中,导入过程中,保证每个用户的声纹特征与其UID是一一映射关系;First, the user UID and the user's voiceprint features in the user voiceprint management subsystem server are imported into the non-volatile space of the trusted chip. During the import process, it is ensured that each user's voiceprint features are mapped one-to-one with their UID.

第二,导入到可信芯片的声纹特征用可信存储根密钥加密保存,以保证声纹特征数据的安全;Second, the voiceprint features imported into the trusted chip are encrypted and stored using the trusted storage root key to ensure the security of the voiceprint feature data;

第三,可信芯片按TCG可信标准,可以为每个唯一标识的用户创建用来加密数据的数据密钥,并将密钥的句柄keyID反馈给用户终端,存储过程中,保证每个用户UID、用户的声纹特征、用户的数据密钥是一一映射关系;Third, the trusted chip, in accordance with the TCG trust standard, can create a data key for each uniquely identified user to encrypt data, and feed the key handle keyID back to the user terminal. During the storage process, it ensures that each user UID, user voiceprint feature, and user data key are in a one-to-one mapping relationship;

第四,用户的数据密钥,可以用可信芯片的存储根密钥加密保护。Fourth, the user's data key can be encrypted and protected with the storage root key of the trusted chip.

需要说明的是,对于前述的各方法实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本发明并不受所描述的动作顺序的限制,因为依据本发明,某些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作和模块并不一定是本发明所必须的。It should be noted that for the aforementioned method embodiments, for simplicity of description, they are all expressed as a series of action combinations. However, those skilled in the art should be aware that the present invention is not limited by the order of the actions described, because according to the present invention, certain steps can be performed in other orders or simultaneously. Secondly, those skilled in the art should also be aware that the embodiments described in this specification are all preferred embodiments, and the actions and modules involved are not necessarily required by the present invention.

通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到根据上述实施例的数据密钥的保护方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本发明各个实施例的方法。Through the description of the above implementation methods, those skilled in the art can clearly understand that the data key protection method according to the above embodiment can be implemented by means of software plus the necessary general hardware platform. Of course, it can also be implemented by hardware, but in many cases the former is a better implementation method. Based on this understanding, the technical solution of the present invention, or the part that contributes to the prior art, can be embodied in the form of a software product. The computer software product is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk), and includes a number of instructions for enabling a terminal device (which can be a mobile phone, computer, server, or network device, etc.) to execute the methods of various embodiments of the present invention.

综上,结合上述实施例1至4,基于用户身份管理子系统服务器、可信芯片和用户终端的两种实现方式(方式一和方式二),本申请实施例提供的数据密钥的保护方法具体如下:In summary, in combination with the above embodiments 1 to 4, based on the two implementation methods (method 1 and method 2) of the user identity management subsystem server, the trusted chip and the user terminal, the data key protection method provided in the embodiment of the present application is as follows:

场景一:Scenario 1:

假设可信芯片为用户UID(即,本实施例中的身份信息标识)已创建其平台身份公私钥对UPK和USK、数据密钥Data_Key,该用户的声纹特征及数据密钥安全保存在可信芯片中,局限可信芯片计算能力的有限,现用户欲获取可信芯片中数据密钥,在本地对某敏感数据Data进行加密或解密,交互过程中,对用户端实现身份验证,图9b 是根据本发明实施例中的一种数据密钥的保护方法中的用户身份管理子系统服务器、可信芯片和用户终端的交互示意图,该流程如图9b所示:Assume that the trusted chip has created the platform identity public-private key pair UPK and USK and the data key Data_Key for the user UID (i.e., the identity information identifier in this embodiment). The user's voiceprint characteristics and data key are securely stored in the trusted chip. Due to the limited computing power of the trusted chip, the user now wants to obtain the data key in the trusted chip to encrypt or decrypt certain sensitive data Data locally. During the interaction, the user terminal is authenticated. Figure 9b is a schematic diagram of the interaction between the user identity management subsystem server, the trusted chip, and the user terminal in a data key protection method according to an embodiment of the present invention. The process is shown in Figure 9b:

步骤1,用户终端向用户身份管理子系统服务器提交{UID,keyID}(即,本申请中的第一密钥获取请求);Step 1: The user terminal submits {U ID , key ID } (i.e., the first key acquisition request in this application) to the user identity management subsystem server;

步骤2,用户身份管理子系统服务器响应用户终端请求,并要求用户终端传输一段语音(即,本申请中的待验证语音信息);Step 2: The user identity management subsystem server responds to the user terminal's request and requires the user terminal to transmit a voice message (i.e., the voice message to be verified in this application);

步骤3,用户终端借助语音通信装置,回传一段语音(即,本申请中的用户语音);Step 3: The user terminal transmits a voice message (i.e., the user voice message in this application) via a voice communication device.

步骤4,用户身份管理子系统服务器对用户终端传过来的语音进行特征提取,生成声纹特征信息msg(即,本申请中的第二密钥获取请求);Step 4: The user identity management subsystem server extracts features from the voice transmitted by the user terminal and generates voiceprint feature information msg (i.e., the second key acquisition request in this application);

步骤5,用户身份管理子系统服务器用可信芯片声纹特征及数据密钥管理子系统公钥M_PK加密声纹特征信息msg得到{Msg,UID,keyID}M_PK(即,本申请中的第二密钥获取请求),并将{Msg,UID,keyID}M_PK回传给可信芯片声纹特征及数据密钥管理子系统(即,本申请中的可信芯片);Step 5: The user identity management subsystem server encrypts the voiceprint feature information msg with the trusted chip voiceprint feature and the data key management subsystem public key M_PK to obtain {Msg, U ID , key ID }M_PK (i.e., the second key acquisition request in this application), and sends {Msg, U ID , key ID }M_PK back to the trusted chip voiceprint feature and data key management subsystem (i.e., the trusted chip in this application);

步骤6,可信芯片声纹特征及数据密钥管理子系统收到声纹特征密文信息(即,本申请中的第二密钥获取请求)后,先用用户身份管理子系统私钥M_SK解密,获得 Msg明文后,与用户注册时存储的声纹特征信息做比对,如果比对通过,则继续第(7) 步,否则停止;Step 6: After the trusted chip voiceprint feature and data key management subsystem receives the voiceprint feature ciphertext information (i.e., the second key acquisition request in this application), it first decrypts it with the user identity management subsystem private key M_SK, obtains the Msg plaintext, and compares it with the voiceprint feature information stored when the user registered. If the comparison passes, it proceeds to step (7), otherwise it stops;

步骤7,可信芯片声纹特征系统用用户平台身份公钥(即,本申请中的用户终端的公钥)加密其数据密钥回传给用户终端,即回传的信息为{Data_Key}U_pk(即,本申请中的密钥响应信息);Step 7: The trusted chip voiceprint feature system encrypts its data key with the user platform identity public key (i.e., the public key of the user terminal in this application) and sends it back to the user terminal. The returned information is {Data_Key}U_pk (i.e., the key response information in this application);

步骤8,用户终端收到信息后,用其平台身份私钥U_SK(即,本申请中的用户终端的私钥)解密,获得数据密钥Data_Key后,就可利用数据密钥Data_Key对敏感数据进行加密操作,或用Data_Key对敏感数据密文进行解密操作。In step 8, after receiving the information, the user terminal uses its platform identity private key U_SK (i.e., the private key of the user terminal in this application) to decrypt it. After obtaining the data key Data_Key, the data key Data_Key can be used to encrypt sensitive data, or the Data_Key can be used to decrypt sensitive data ciphertext.

场景二:Scenario 2:

假设可信芯片为用户UID(即,本实施例中的身份信息标识)已创建其平台身份公私钥对UPK和USK(即,本申请中的用户终端的公钥和私钥)、数据密钥Data_Key;用户从第三方那获得可信证书Cert_U;用户身份管理子系统公钥为I_PK,私钥为I_SK;声纹特征和数目密钥管理子系统公钥为M_PK,私钥为M_SK(即,本申请中的可信芯片的公钥和私钥);其用户的声纹特征及数据密钥安全保存在可信芯片中,现用户欲获取可信芯片中数据密钥使用权限,声纹特征及数据密钥管理子系统在可信芯片内部对用户敏感数据Data进行加密或解密后返回给用户,且交互过程中能实现双向身份认证,图10是根据本发明实施例中的另一种数据密钥的保护方法中的用户身份管理子系统服务器、可信芯片和用户终端的交互示意图,该流程如图10所示:Assume that the trusted chip is the user UID (i.e., the identity information identifier in this embodiment) and has created its platform identity public-private key pair UPK and USK (i.e., the public key and private key of the user terminal in this application), and the data key Data_Key; the user obtains a trusted certificate Cert_U from a third party; the public key of the user identity management subsystem is I_PK, and the private key is I_SK; the public key of the voiceprint feature and number key management subsystem is M_PK, and the private key is M_SK (i.e., the public key and private key of the trusted chip in this application); the user's voiceprint feature and data key are securely stored in the trusted chip. Now the user wants to obtain the right to use the data key in the trusted chip. The voiceprint feature and data key management subsystem encrypts or decrypts the user's sensitive data Data inside the trusted chip and returns it to the user, and two-way identity authentication can be achieved during the interaction process. Figure 10 is a schematic diagram of the interaction between the user identity management subsystem server, the trusted chip and the user terminal in another data key protection method according to an embodiment of the present invention. The process is shown in Figure 10:

步骤1,用户终端向用户身份管理子系统服务器提交{Cert_U,UID,keyID}I_PK(即,本申请中的第一密钥获取请求),其中I_PK是用户身份管理子系统公钥,Cert_U是用户从第三方那获得的可信证书;keyID表示用户数据密钥句柄(即,本申请中的密钥句柄),{Cert_U,UID,keyID}I_PK,表示用用户身份管理子系统的公钥对用户标识 UID,用户数据密钥句柄标识keyID,及用户Cert_U进行加密;Step 1: The user terminal submits {Cert_U, U ID , key ID } I_PK (i.e., the first key acquisition request in this application) to the user identity management subsystem server, where I_PK is the user identity management subsystem public key, Cert_U is the trusted certificate obtained by the user from a third party; keyID represents the user data key handle (i.e., the key handle in this application), and {Cert_U, UID, keyID} I_PK indicates that the user identifier UID, the user data key handle identifier keyID, and the user Cert_U are encrypted using the public key of the user identity management subsystem;

步骤2,用户身份管理子系统服务器接收到信息(即,本申请中的第一密钥获取请求)后,首先验证可信证书的合法性,不合法则流程终止,否则响应用户终端请求,反馈信息{Cert_I,请回传一段语音}(即,本申请中的待验证语音信息),即反馈的信息包含了自己证书(即,本申请中的用户身份管理子系统证书),并要求用户终端回传语音(即,本申请中的用户语音);Step 2: After receiving the information (i.e., the first key acquisition request in this application), the user identity management subsystem server first verifies the legitimacy of the trusted certificate. If it is illegal, the process terminates. Otherwise, it responds to the user terminal request and feedback information {Cert_I, please send back a voice message} (i.e., the voice information to be verified in this application). That is, the feedback information contains its own certificate (i.e., the user identity management subsystem certificate in this application) and requires the user terminal to send back a voice message (i.e., the user voice in this application);

步骤3,用户终端接到信息(即,本申请中的待验证语音信息)后,验证用户身份管理子系统证书的合法性,不合法则终止,否则产生一随机数N1,借助语音通信装置(即,本申请中的语音装置),回传一段语音信息Sound,要加密的原数据Data,或要解密的数据密文cipher,并用用户身份管理子系统公钥加密,即传输的信息为 {Sound,N1,Data/cipher}I_pk,其中(“/”表示数据明文,或者数据密文,或者这两者均有)(即,本申请中的待加密或解密数据);其中,N1是为了后续用其来验证回传数据的完整性。Step 3. After the user terminal receives the information (i.e., the voice information to be verified in this application), it verifies the legitimacy of the user identity management subsystem certificate. If it is illegal, it terminates. Otherwise, it generates a random number N1, and uses the voice communication device (i.e., the voice device in this application) to return a voice message Sound, the original data to be encrypted Data, or the data cipher to be decrypted cipher, and encrypts it with the public key of the user identity management subsystem, that is, the transmitted information is {Sound, N1, Data/cipher}I_pk, where ("/" represents plaintext data, or ciphertext data, or both) (i.e., the data to be encrypted or decrypted in this application); wherein, N1 is used to verify the integrity of the returned data later.

步骤4,用户身份管理子系统服务器对用户终端传过来的语音进行特征提取,生成声纹特征信息Msg(即,本申请中的第二密钥获取请求);Step 4: The user identity management subsystem server extracts features from the voice transmitted by the user terminal and generates voiceprint feature information Msg (i.e., the second key acquisition request in this application);

步骤5,用户身份管理子系统服务器用可信芯片声纹特征及数据密钥管理子系统公钥M_PK(即,本申请中可信芯片的公钥)加密声纹特征信息msg(即,本申请中的第二密钥获取请求),随机数N1,Data/Cipher,用户UID,用户数据密钥句柄keyID 得到{N1,Msg,Data/Cipher,UID,keyID}M_PK,并将{Msg,UID,keyID}M_PK回传给可信芯片声纹特征及数据密钥管理子系统;Step 5: The user identity management subsystem server uses the trusted chip voiceprint feature and the data key management subsystem public key M_PK (i.e., the public key of the trusted chip in this application) to encrypt the voiceprint feature information msg (i.e., the second key acquisition request in this application), the random number N1, Data/Cipher, the user UID, and the user data key handle keyID to obtain {N1, Msg, Data/Cipher, UID, keyID}M_PK, and returns {Msg, UID, keyID}M_PK to the trusted chip voiceprint feature and data key management subsystem;

步骤6,可信芯片声纹特征及数据密钥管理子系统收到信息后,做如下工作:Step 6: After receiving the information, the trusted chip voiceprint feature and data key management subsystem performs the following tasks:

a、先用其私钥M_SK(即,本申请中可信芯片的私钥)解密;a. First decrypt using its private key M_SK (i.e., the private key of the trusted chip in this application);

b、将解密后获得的Msg信息,将该信息与用户注册时存储的声纹特征信息做比对,如果比对通过,则继续第(c)步,否则停止;b. Compare the decrypted Msg information with the voiceprint feature information stored during user registration. If the comparison passes, continue to step (c), otherwise stop;

c、依据解密后的UID,keyID找到相应的数据密钥Data_Key;c. Find the corresponding data key Data_Key based on the decrypted UID, keyID;

d、用数据密钥Data_Key对解密后的信息Data/Cipher进行加密或者解密,获得信息Cipher/Data(即,本实施例中的运算结果);d. Encrypt or decrypt the decrypted information Data/Cipher using the data key Data_Key to obtain the information Cipher/Data (i.e., the calculation result in this embodiment);

步骤7,可信芯片声纹特征系统用用户平台身份公钥加密其数据明文或其密文,同时将明文或密文与随机数进行哈希运算,再将这些信息回传给用户终端,即回传的信息为{hash(cipher/Data,N1),{cipher/Data}U_pk}(即,本申请中的密钥响应信息);Step 7: The trusted chip voiceprint feature system encrypts the data plaintext or ciphertext with the user platform identity public key, performs a hash operation on the plaintext or ciphertext with a random number, and then sends this information back to the user terminal. The returned information is {hash(cipher/Data, N1), {cipher/Data}U_pk} (i.e., the key response information in this application);

步骤8,用户终端收到信息后,用其平台身份私钥U_SK(即,用户终端的私钥) 解密,获得信息cipher/Data,再利用本地储备好的N1对其进行哈希运算,合法则说明其传输的数据完整的。Step 8: After receiving the information, the user terminal decrypts it with its platform identity private key U_SK (i.e., the user terminal's private key) to obtain the information cipher/Data, and then performs a hash operation on it using the locally stored N1. If it is legal, it means that the transmitted data is complete.

本实施例提出一种数据密钥的保护方法,即利用声纹特征作为获取使用数据密钥权限的凭证,不需要额外保护口令的设备,避免了口令失忆,致使数据密钥无法使用的风险。This embodiment proposes a method for protecting data keys, which uses voiceprint features as credentials to obtain permission to use data keys. It does not require additional password protection equipment, thus avoiding the risk of password forgetting that makes the data key unusable.

需要说明的是,本申请实施例提供的数据密钥的保护方法中,可信芯片的位置至少包括以下两种:内嵌于用户终端或内嵌于服务器中,其中,可信芯片可以与用户身份管理子系统位于同一服务器;对应上述两种实现方式,在可信芯片位于不同设备位置处,在实现上述方式一和方式二中区别仅在于,在可信芯片内嵌于用户终端的情况下,用户终端在向用户身份管理子系统服务器上传用户语音之后,用户身份管理子系统服务器返回该用户语音的声纹特征,在用户终端中可信芯片依据该声纹特征提前预存声纹特征,在匹配成功的情况下提取数据密钥;It should be noted that in the data key protection method provided in the embodiment of the present application, the location of the trusted chip includes at least the following two options: embedded in the user terminal or embedded in the server, wherein the trusted chip can be located on the same server as the user identity management subsystem; corresponding to the above two implementation methods, when the trusted chip is located in different device locations, the only difference between the above implementation methods one and two is that, when the trusted chip is embedded in the user terminal, after the user terminal uploads the user voice to the user identity management subsystem server, the user identity management subsystem server returns the voiceprint features of the user voice, and the trusted chip in the user terminal pre-stores the voiceprint features based on the voiceprint features and extracts the data key if a match is successful;

在可信芯片内嵌于服务的情况下,可信芯片可认为与用户身份管理子系统服务器位于同一服务器,用户终端在发出第一密钥获取请求后,用户身份管理子系统服务器与用户终端交互,获取用户终端上传的用户语音,并通过提取该用户语音的声纹特征,将该声纹特征以第二密钥获取请求的形式发送至位于同一服务器的可信芯片,由可信芯片对该声纹特征进行验证,并在验证成功后提取该声纹特征对应的数据密钥,并将该数据密钥返回用户终端,或,依据用户终端在发送第一密钥获取请求时携带的需要加/解密的数据,可信芯片依据数据密钥对该加/解密的数据执行对应的加/解密操作。具体实现方式见实施例1,或上述实现方式的方式一和方式二。When the trusted chip is embedded in the service, the trusted chip can be considered to be located on the same server as the user identity management subsystem server. After the user terminal issues a first key acquisition request, the user identity management subsystem server interacts with the user terminal to obtain the user voice uploaded by the user terminal, extracts the voiceprint features of the user voice, and sends the voiceprint features to the trusted chip located on the same server in the form of a second key acquisition request. The trusted chip verifies the voiceprint features and, upon successful verification, extracts the data key corresponding to the voiceprint features and returns the data key to the user terminal. Alternatively, based on the data to be encrypted/decrypted carried by the user terminal when sending the first key acquisition request, the trusted chip performs corresponding encryption/decryption operations on the encrypted/decrypted data using the data key. For specific implementation methods, see Example 1, or Methods 1 and 2 of the aforementioned implementation methods.

实施例5Example 5

本申请提供了如图11a所示的数据密钥的保护方法。在用户终端侧,图11a是根据本发明实施例五的数据密钥的保护方法的流程图。The present application provides a data key protection method as shown in Figure 11a. On the user terminal side, Figure 11a is a flow chart of a data key protection method according to embodiment 5 of the present invention.

步骤S1101,获取用户登录信息,并触发密钥获取请求,其中,密钥获取请求包括用户的身份验证信息;Step S1101: Obtain user login information and trigger a key acquisition request, wherein the key acquisition request includes the user's identity authentication information;

步骤S1102,依据密钥获取请求获取对应待验证语音信息;Step S1102: obtaining the corresponding voice information to be verified according to the key acquisition request;

步骤S1103,接收用户依据待验证语音信息录入的用户语音;Step S1103, receiving the user's voice input based on the voice information to be verified;

步骤S1104,依据用户语音提取用户的声纹特征;Step S1104, extracting the user's voiceprint features based on the user's voice;

步骤S1105,通过可信芯片将声纹特征与预存声纹特征进行比对;Step S1105: Compare the voiceprint features with pre-stored voiceprint features through the trusted chip;

步骤S1106,若声纹特征与预存声纹特征匹配,则通过可信芯片提取与声纹特征对应的数据密钥;Step S1106: If the voiceprint feature matches the pre-stored voiceprint feature, the data key corresponding to the voiceprint feature is extracted through the trusted chip;

步骤S1107,依据数据密钥执行对应操作。Step S1107, perform corresponding operations based on the data key.

综上,结合步骤S1101至步骤S1107,区别于实施例4中的用户终端,在本实施例中用户终端内嵌可信芯片,并集成了用户身份管理子系统服务器提供待验证语音信息以及声纹特征提取的功能,强化了用户终端的数据处理功能,并且,由于所有的数据处理依据密钥提取均在用户终端侧完成,从而在信息安全中保障了用户私人信息不会通过用户终端泄露至外界,保障了用户的信息安全。如图11b所示,图11b是根据本发明实施例五的数据密钥的保护方法中用户终端内嵌可信芯片的示意图。In summary, combined with steps S1101 to S1107, unlike the user terminal in Example 4, in this embodiment, the user terminal has a built-in trusted chip and integrates the user identity management subsystem server to provide voice information to be verified and voiceprint feature extraction functions, thereby strengthening the data processing function of the user terminal. Moreover, since all data processing based on key extraction is completed on the user terminal side, the user's private information is guaranteed not to be leaked to the outside world through the user terminal, thereby ensuring the user's information security. As shown in Figure 11b, Figure 11b is a schematic diagram of the user terminal embedded with a trusted chip in the data key protection method according to Example 5 of the present invention.

在本发明实施例中,通过获取用户登录信息,并触发密钥获取请求,其中,密钥获取请求包括用户的身份验证信息;依据密钥获取请求获取对应待验证语音信息;接收用户依据待验证语音信息录入的用户语音;依据用户语音提取用户的声纹特征;通过可信芯片将声纹特征与预存声纹特征进行比对;若声纹特征与预存声纹特征匹配,则通过可信芯片提取与声纹特征对应的数据密钥;依据数据密钥执行对应操作。达到了密钥的安全获取的目的,从而实现了安全获取密钥的技术效果,进而解决了由于现有技术中存在的密钥容易泄密的技术问题。In an embodiment of the present invention, user login information is obtained and a key acquisition request is triggered, wherein the key acquisition request includes the user's identity authentication information; corresponding voice information to be verified is obtained based on the key acquisition request; user voice input based on the voice information to be verified is received; the user's voiceprint features are extracted based on the user voice; the voiceprint features are compared with pre-stored voiceprint features via a trusted chip; if the voiceprint features match the pre-stored voiceprint features, the data key corresponding to the voiceprint features is extracted via the trusted chip; and corresponding operations are performed based on the data key. The purpose of secure key acquisition is achieved, thereby realizing the technical effect of secure key acquisition and solving the technical problem of easy key leakage in the prior art.

实施例6Example 6

根据本发明实施例,还提供了一种用于实施上述数据密钥的保护方法的装置,在用户身份管理子系统服务器侧,如图12所示,该装置包括:According to an embodiment of the present invention, a device for implementing the above-mentioned data key protection method is also provided. On the user identity management subsystem server side, as shown in FIG12 , the device includes:

图12是根据本发明实施例六的数据密钥的保护装置的结构示意图。FIG12 is a schematic structural diagram of a data key protection device according to a sixth embodiment of the present invention.

如图12所示,该数据密钥的保护装置可以包括:第一接收模块1201、第一发送模块1202、第二接收模块1203、请求生成模块1204和第二发送模块1205。As shown in FIG12 , the data key protection device may include: a first receiving module 1201 , a first sending module 1202 , a second receiving module 1203 , a request generating module 1204 and a second sending module 1205 .

其中,第一接收模块1201,用于接收用户终端发送的第一密钥获取请求,其中,第一密钥获取请求包括用户的身份验证信息;第一发送模块1202,用于依据第一密钥获取请求向用户终端返回待验证语音信息;第二接收模块1203,用于接收用户终端依据待验证语音信息上传的用户语音;请求生成模块1204,用于提取用户语音的声纹特征,并依据声纹特征和身份验证信息生成第二密钥获取请求;第二发送模块1205,用于将第二密钥获取请求发送至可信芯片。Among them, the first receiving module 1201 is used to receive a first key acquisition request sent by a user terminal, wherein the first key acquisition request includes the user's identity authentication information; the first sending module 1202 is used to return the voice information to be verified to the user terminal based on the first key acquisition request; the second receiving module 1203 is used to receive the user voice uploaded by the user terminal based on the voice information to be verified; the request generating module 1204 is used to extract the voiceprint features of the user voice, and generate a second key acquisition request based on the voiceprint features and the identity authentication information; the second sending module 1205 is used to send the second key acquisition request to the trusted chip.

在本发明实施例中,通过用户身份管理子系统服务器接收用户终端发送的第一密钥获取请求,其中,第一密钥获取请求包括用户的身份验证信息;用户身份管理子系统服务器依据第一密钥获取请求向用户终端返回待验证语音信息;用户身份管理子系统服务器接收用户终端依据待验证语音信息上传的用户语音;用户身份管理子系统服务器提取用户语音的声纹特征,并依据声纹特征和身份验证信息生成第二密钥获取请求;用户身份管理子系统服务器将第二密钥获取请求发送至可信芯片,达到了密钥的安全获取的目的,从而实现了安全获取密钥的技术效果,进而解决了由于现有技术中存在的密钥容易泄密的技术问题。In an embodiment of the present invention, a first key acquisition request sent by a user terminal is received by a user identity management subsystem server, wherein the first key acquisition request includes the user's identity authentication information; the user identity management subsystem server returns the voice information to be verified to the user terminal based on the first key acquisition request; the user identity management subsystem server receives the user voice uploaded by the user terminal based on the voice information to be verified; the user identity management subsystem server extracts the voiceprint features of the user voice, and generates a second key acquisition request based on the voiceprint features and the identity authentication information; the user identity management subsystem server sends the second key acquisition request to the trusted chip, thereby achieving the purpose of securely obtaining the key, thereby realizing the technical effect of securely obtaining the key, and further solving the technical problem of easy leakage of the key in the existing technology.

此处需要说明的是,上述第一接收模块1201、第一发送模块1202、第二接收模块1203、请求生成模块1204和第二发送模块1205对应于实施例一中的步骤S402至步骤 S410,五个模块与对应的步骤所实现的示例和应用场景相同,但不限于上述实施例一所公开的内容。需要说明的是,上述模块作为装置的一部分可以运行在实施例一提供的用户身份管理子系统服务器中,可以通过软件实现,也可以通过硬件实现。It should be noted that the first receiving module 1201, the first sending module 1202, the second receiving module 1203, the request generating module 1204, and the second sending module 1205 described above correspond to steps S402 to S410 in Example 1. The examples and application scenarios implemented by the five modules and the corresponding steps are the same, but are not limited to the contents disclosed in Example 1. It should be noted that the above modules, as part of the device, can run in the user identity management subsystem server provided in Example 1 and can be implemented via software or hardware.

实施例7Example 7

根据本发明实施例,还提供了一种用于实施上述数据密钥的保护方法的装置,在可信芯片侧,如图13所示,该装置包括:According to an embodiment of the present invention, a device for implementing the above-mentioned data key protection method is also provided. On the trusted chip side, as shown in FIG13 , the device includes:

图13是根据本发明实施例七的数据密钥的保护装置的结构示意图。FIG13 is a schematic structural diagram of a data key protection device according to a seventh embodiment of the present invention.

如图13所示,该数据密钥的保护装置可以包括:第三接收模块1302、解析模块1304和第三发送模块1306。As shown in FIG. 13 , the data key protection device may include: a third receiving module 1302 , a parsing module 1304 and a third sending module 1306 .

其中,第三接收模块1302,用于接收密钥获取请求,其中,密钥获取请求包括:声纹特征;解析模块1304,用于解析密钥获取请求,并将密钥获取请求中的声纹特征与预存声纹特征进行对比;第三发送模块1306,用于若密钥获取请求中的声纹特征与预存声纹特征匹配,则向用户终端返回密钥响应信息。Among them, the third receiving module 1302 is used to receive a key acquisition request, wherein the key acquisition request includes: voiceprint features; the parsing module 1304 is used to parse the key acquisition request and compare the voiceprint features in the key acquisition request with the pre-stored voiceprint features; the third sending module 1306 is used to return key response information to the user terminal if the voiceprint features in the key acquisition request match the pre-stored voiceprint features.

在本发明实施例中,通过可信芯片接收用户身份管理子系统服务器发送的密钥获取请求,其中,密钥获取请求包括:声纹特征;可信芯片解析密钥获取请求,并将密钥获取请求中的声纹特征与预存声纹特征进行对比;若密钥获取请求中的声纹特征与预存声纹特征匹配,则可信芯片向用户终端返回密钥响应信息,达到了密钥的安全获取的目的,从而实现了安全获取密钥的技术效果,进而解决了由于现有技术中存在的密钥容易泄密的技术问题。In an embodiment of the present invention, a key acquisition request sent by a user identity management subsystem server is received through a trusted chip, wherein the key acquisition request includes: a voiceprint feature; the trusted chip parses the key acquisition request and compares the voiceprint feature in the key acquisition request with the pre-stored voiceprint feature; if the voiceprint feature in the key acquisition request matches the pre-stored voiceprint feature, the trusted chip returns a key response message to the user terminal, thereby achieving the purpose of securely acquiring the key, thereby realizing the technical effect of securely acquiring the key, and further solving the technical problem of easy leakage of the key in the prior art.

此处需要说明的是,上述第三接收模块1302、解析模块1304和第三发送模块1306对应于实施例一中的步骤S502至步骤S506,三个模块与对应的步骤所实现的示例和应用场景相同,但不限于上述实施例二所公开的内容。需要说明的是,上述模块作为装置的一部分可以运行在实施例二提供的可信芯片中,可以通过软件实现,也可以通过硬件实现。It should be noted that the third receiving module 1302, parsing module 1304, and third sending module 1306 correspond to steps S502 to S506 in Example 1. The examples and application scenarios implemented by the three modules and the corresponding steps are the same, but are not limited to the contents disclosed in Example 2. It should be noted that the above modules, as part of the device, can run in the trusted chip provided in Example 2 and can be implemented through software or hardware.

实施例8Example 8

根据本发明实施例,还提供了一种用于实施上述数据密钥的保护方法的装置,在用户终端侧,如图14所示,该装置包括:According to an embodiment of the present invention, a device for implementing the above-mentioned data key protection method is also provided. On the user terminal side, as shown in FIG14 , the device includes:

图14是根据本发明实施例八的数据密钥的保护装置的结构示意图。FIG14 is a schematic structural diagram of a data key protection device according to an eighth embodiment of the present invention.

如图14所示,该数据密钥的保护装置可以包括:第四发送模块1402、第四接收模块1404、第五发送模块1406和第五接收模块1408。As shown in FIG. 14 , the data key protection device may include: a fourth sending module 1402 , a fourth receiving module 1404 , a fifth sending module 1406 and a fifth receiving module 1408 .

其中,第四发送模块1402,用于向用户身份管理子系统服务器发送的密钥获取请求,其中,密钥获取请求包括用户的身份验证信息;第四接收模块1404,用于接收用户身份管理子系统服务器返回的待验证语音信息;第五发送模块1406,用于向用户身份管理子系统服务器上传用户语音,其中,用户语音对应待验证语音信息;第五接收模块1408,用于接收可信芯片返回的密钥响应信息,其中,密钥响应信息对应向用户身份管理子系统服务器上传的用户语音。Among them, the fourth sending module 1402 is used to send a key acquisition request to the user identity management subsystem server, wherein the key acquisition request includes the user's identity authentication information; the fourth receiving module 1404 is used to receive the voice information to be verified returned by the user identity management subsystem server; the fifth sending module 1406 is used to upload the user voice to the user identity management subsystem server, wherein the user voice corresponds to the voice information to be verified; the fifth receiving module 1408 is used to receive the key response information returned by the trusted chip, wherein the key response information corresponds to the user voice uploaded to the user identity management subsystem server.

在本发明实施例中,通过用户终端向用户身份管理子系统服务器发送的密钥获取请求,其中,密钥获取请求包括用户的身份验证信息;用户终端接收用户身份管理子系统服务器返回的待验证语音信息;用户终端向用户身份管理子系统服务器上传用户语音,其中,用户语音对应待验证语音信息;用户终端接收可信芯片返回的密钥响应信息,其中,密钥响应信息对应向用户身份管理子系统服务器上传的用户语音,达到了密钥的安全获取的目的,从而实现了安全获取密钥的技术效果,进而解决了由于现有技术中存在的密钥容易泄密的技术问题。In an embodiment of the present invention, a key acquisition request is sent by a user terminal to a user identity management subsystem server, wherein the key acquisition request includes the user's identity authentication information; the user terminal receives the voice information to be verified returned by the user identity management subsystem server; the user terminal uploads the user voice to the user identity management subsystem server, wherein the user voice corresponds to the voice information to be verified; the user terminal receives the key response information returned by the trusted chip, wherein the key response information corresponds to the user voice uploaded to the user identity management subsystem server, thereby achieving the purpose of securely acquiring the key, thereby realizing the technical effect of securely acquiring the key, and further solving the technical problem of easy leakage of the key in the prior art.

此处需要说明的是,上述第四发送模块1402、第四接收模块1404、第五发送模块1406和第五接收模块1408对应于实施例三中的步骤S702至步骤S708,四个模块与对应的步骤所实现的示例和应用场景相同,但不限于上述实施例三所公开的内容。需要说明的是,上述模块作为装置的一部分可以运行在实施例三提供的用户终端中,可以通过软件实现,也可以通过硬件实现。It should be noted that the fourth sending module 1402, the fourth receiving module 1404, the fifth sending module 1406, and the fifth receiving module 1408 correspond to steps S702 to S708 in Example 3. The examples and application scenarios implemented by the four modules and the corresponding steps are the same, but are not limited to the contents disclosed in Example 3. It should be noted that the above modules, as part of the device, can run in the user terminal provided in Example 3 and can be implemented by software or hardware.

实施例9Example 9

根据本发明实施例,还提供了一种用于实施上述数据密钥的保护方法的装置,在用户终端侧,如图15所示,该装置包括:According to an embodiment of the present invention, a device for implementing the above-mentioned data key protection method is also provided. On the user terminal side, as shown in FIG15 , the device includes:

图15是根据本发明实施例九的数据密钥的保护装置的结构示意图。FIG15 is a schematic structural diagram of a data key protection device according to a ninth embodiment of the present invention.

如图15所示,该数据密钥的保护装置可以包括:第六发送模块1502、第六接收模块1504、第七发送模块1506、第七接收模块1508、特征对比模块1510、密钥提取模块1512和数据保护模块1514 。As shown in FIG15 , the data key protection device may include: a sixth sending module 1502 , a sixth receiving module 1504 , a seventh sending module 1506 , a seventh receiving module 1508 , a feature comparison module 1510 , a key extraction module 1512 and a data protection module 1514 .

其中,第六发送模块1502,用于向用户身份管理子系统服务器发送的密钥获取请求,其中,密钥获取请求包括用户的身份验证信息;第六接收模块1504,用于接收用户身份管理子系统服务器返回的待验证语音信息;第七发送模块1506,用于向用户身份管理子系统服务器上传用户语音,其中,用户语音对应待验证语音信息;第七接收模块1508,用于接收用户身份管理子系统服务器从用户语音提取的声纹特征;特征对比模块1510,用于将声纹特征与预存声纹特征进行比对;密钥提取模块1512,用于若声纹特征与预存声纹特征匹配,则用户终端中的可信芯片提取与声纹特征对应的数据密钥;数据保护模块1514 ,用于依据数据密钥执行对应操作。Among them, the sixth sending module 1502 is used to send a key acquisition request to the user identity management subsystem server, wherein the key acquisition request includes the user's identity authentication information; the sixth receiving module 1504 is used to receive the voice information to be verified returned by the user identity management subsystem server; the seventh sending module 1506 is used to upload the user voice to the user identity management subsystem server, wherein the user voice corresponds to the voice information to be verified; the seventh receiving module 1508 is used to receive the voiceprint features extracted from the user voice by the user identity management subsystem server; the feature comparison module 1510 is used to compare the voiceprint features with the pre-stored voiceprint features; the key extraction module 1512 is used to extract the data key corresponding to the voiceprint features by the trusted chip in the user terminal if the voiceprint features match the pre-stored voiceprint features; the data protection module 1514 is used to perform corresponding operations based on the data key.

在本发明实施例中,通过用户终端向用户身份管理子系统服务器发送的密钥获取请求,其中,密钥获取请求包括用户的身份验证信息;用户终端接收用户身份管理子系统服务器返回的待验证语音信息;用户终端向用户身份管理子系统服务器上传用户语音,其中,用户语音对应待验证语音信息;用户终端接收用户身份管理子系统服务器从用户语音提取的声纹特征;用户终端中的可信芯片将声纹特征与预存声纹特征进行比对;若声纹特征与预存声纹特征匹配,则用户终端中的可信芯片提取与声纹特征对应的数据密钥;用户终端依据数据密钥执行对应操作。达到了密钥的安全获取的目的,从而实现了安全获取密钥的技术效果,进而解决了由于现有技术中存在的密钥容易泄密的技术问题。In an embodiment of the present invention, a user terminal sends a key acquisition request to a user identity management subsystem server, wherein the key acquisition request includes the user's identity authentication information; the user terminal receives the voice information to be verified returned by the user identity management subsystem server; the user terminal uploads the user voice to the user identity management subsystem server, wherein the user voice corresponds to the voice information to be verified; the user terminal receives the voiceprint features extracted from the user voice by the user identity management subsystem server; the trusted chip in the user terminal compares the voiceprint features with pre-stored voiceprint features; if the voiceprint features match the pre-stored voiceprint features, the trusted chip in the user terminal extracts the data key corresponding to the voiceprint features; and the user terminal performs corresponding operations based on the data key. This achieves the purpose of secure key acquisition, thereby achieving the technical effect of secure key acquisition and solving the technical problem of easy key leakage in the prior art.

此处需要说明的是,上述第六发送模块1502、第六接收模块1504、第七发送模块1506、第七接收模块1508、特征对比模块1510、密钥提取模块1512和数据保护模块1514 对应于实施例四中的步骤S802至步骤S814 ,七个模块与对应的步骤所实现的示例和应用场景相同,但不限于上述实施例四所公开的内容。需要说明的是,上述模块作为装置的一部分可以运行在实施例四提供的用户终端中,可以通过软件实现,也可以通过硬件实现。It should be noted that the sixth sending module 1502, the sixth receiving module 1504, the seventh sending module 1506, the seventh receiving module 1508, the feature comparison module 1510, the key extraction module 1512, and the data protection module 1514 correspond to steps S802 to S814 in the fourth embodiment. The examples and application scenarios implemented by these seven modules and the corresponding steps are the same, but are not limited to the contents disclosed in the fourth embodiment. It should be noted that the above modules, as part of the apparatus, can run in the user terminal provided in the fourth embodiment and can be implemented via software or hardware.

实施例10Example 10

根据本发明实施例,还提供了一种用于实施上述数据密钥的保护方法的装置,在用户终端侧,如图16所示,该装置包括:According to an embodiment of the present invention, a device for implementing the above-mentioned data key protection method is also provided. On the user terminal side, as shown in FIG16 , the device includes:

图16是根据本发明实施例十的数据密钥的保护装置的结构示意图。FIG16 is a schematic structural diagram of a data key protection device according to a tenth embodiment of the present invention.

如图16所示,该数据密钥的保护装置可以包括:信息获取模块1601、待验证信息获取模块1602、接收模块1603、提取模块1604、特征比对模块1605、密钥提取模块1606和数据保护模块1607。As shown in Figure 16, the data key protection device may include: an information acquisition module 1601, a verification information acquisition module 1602, a receiving module 1603, an extraction module 1604, a feature comparison module 1605, a key extraction module 1606 and a data protection module 1607.

其中,信息获取模块1601,用于获取用户登录信息,并触发密钥获取请求,其中,密钥获取请求包括用户的身份验证信息;待验证信息获取模块1602,用于依据密钥获取请求获取对应待验证语音信息;接收模块1603,用于接收用户依据待验证语音信息录入的用户语音;提取模块1604,用于依据用户语音提取用户的声纹特征;特征比对模块1605,用于通过可信芯片将声纹特征与预存声纹特征进行比对;密钥提取模块 1606,用于若声纹特征与预存声纹特征匹配,则通过可信芯片提取与声纹特征对应的数据密钥;数据保护模块1607,用于依据数据密钥执行对应操作。Among them, the information acquisition module 1601 is used to obtain user login information and trigger a key acquisition request, wherein the key acquisition request includes the user's identity authentication information; the information acquisition module 1602 to be verified is used to obtain the corresponding voice information to be verified based on the key acquisition request; the receiving module 1603 is used to receive the user voice entered by the user based on the voice information to be verified; the extraction module 1604 is used to extract the user's voiceprint features based on the user voice; the feature comparison module 1605 is used to compare the voiceprint features with the pre-stored voiceprint features through the trusted chip; the key extraction module 1606 is used to extract the data key corresponding to the voiceprint features through the trusted chip if the voiceprint features match the pre-stored voiceprint features; the data protection module 1607 is used to perform corresponding operations based on the data key.

在本发明实施例中,通过获取用户登录信息,并触发密钥获取请求,其中,密钥获取请求包括用户的身份验证信息;依据密钥获取请求获取对应待验证语音信息;接收用户依据待验证语音信息录入的用户语音;依据用户语音提取用户的声纹特征;通过可信芯片将声纹特征与预存声纹特征进行比对;若声纹特征与预存声纹特征匹配,则通过可信芯片提取与声纹特征对应的数据密钥;依据数据密钥执行对应操作。达到了密钥的安全获取的目的,从而实现了安全获取密钥的技术效果,进而解决了由于现有技术中存在的密钥容易泄密的技术问题。In an embodiment of the present invention, user login information is obtained and a key acquisition request is triggered, wherein the key acquisition request includes the user's identity authentication information; corresponding voice information to be verified is obtained based on the key acquisition request; user voice input based on the voice information to be verified is received; the user's voiceprint features are extracted based on the user voice; the voiceprint features are compared with pre-stored voiceprint features via a trusted chip; if the voiceprint features match the pre-stored voiceprint features, the data key corresponding to the voiceprint features is extracted via the trusted chip; and corresponding operations are performed based on the data key. The purpose of secure key acquisition is achieved, thereby realizing the technical effect of secure key acquisition and solving the technical problem of easy key leakage in the prior art.

此处需要说明的是,上述信息获取模块1601、待验证信息获取模块1602、接收模块1603、提取模块1604、特征比对模块1605、密钥提取模块1606和数据保护模块1607 对应于实施例五中的步骤S1101至步骤S1107,七个模块与对应的步骤所实现的示例和应用场景相同,但不限于上述实施例五所公开的内容。需要说明的是,上述模块作为装置的一部分可以运行在实施例五提供的用户终端中,可以通过软件实现,也可以通过硬件实现。It should be noted that the information acquisition module 1601, the information to be verified acquisition module 1602, the receiving module 1603, the extraction module 1604, the feature comparison module 1605, the key extraction module 1606, and the data protection module 1607 correspond to steps S1101 to S1107 in Example 5. The examples and application scenarios implemented by these seven modules and the corresponding steps are the same, but are not limited to the contents disclosed in Example 5. It should be noted that the above modules, as part of the device, can run in the user terminal provided in Example 5 and can be implemented via software or hardware.

实施例11Example 11

根据本发明实施例,还提供了一种数据密钥的保护系统,如图17所示,该数据密钥的保护系统包括:According to an embodiment of the present invention, a data key protection system is also provided, as shown in FIG17 , and the data key protection system includes:

图17是根据本发明实施例十一的数据密钥的保护系统的结构示意图。FIG17 is a schematic structural diagram of a data key protection system according to an eleventh embodiment of the present invention.

如图17所示,该数据密钥的保护系统可以包括:用户声纹身份管理子系统171 和可信芯片管理子系统172。As shown in FIG17 , the data key protection system may include: a user voiceprint identity management subsystem 171 and a trusted chip management subsystem 172 .

其中,用户声纹身份管理子系统171,用于获取每个用户身份信息和声纹特征;可信芯片管理子系统172,用于依据每个用户身份信息和声纹特征生成对应的密钥。Among them, the user voiceprint identity management subsystem 171 is used to obtain each user's identity information and voiceprint characteristics; the trusted chip management subsystem 172 is used to generate a corresponding key based on each user's identity information and voiceprint characteristics.

其中,本申请实施例提供的数据密钥的保护系统中的用户声纹身份管理子系统171可以为实施例1和实施4中提到的用户身份管理子系统服务器;可信芯片管理子系统172可以为实施例2和实施5中提到的可信芯片。Among them, the user voiceprint identity management subsystem 171 in the data key protection system provided in the embodiment of the present application can be the user identity management subsystem server mentioned in Example 1 and Implementation 4; the trusted chip management subsystem 172 can be the trusted chip mentioned in Example 2 and Implementation 5.

具体的,图18是根据本发明实施例十一的一种数据密钥的保护系统的结构示意图,如图18所示,其中,图18中可信芯片中声纹特征及数据密钥管理子系统(即,本申请中的可信芯片管理子系统172),本申请实施例提供的数据密钥的保护系统具体如下:Specifically, FIG18 is a schematic diagram of the structure of a data key protection system according to an eleventh embodiment of the present invention. As shown in FIG18 , the voiceprint feature and data key management subsystem in the trusted chip in FIG18 (i.e., the trusted chip management subsystem 172 in this application) and the data key protection system provided by this embodiment of the present application are specifically as follows:

可选的,用户声纹身份管理子系统171包括:用户身份注册模块1711、声纹身份注册模块1712、声纹特征模型建立模块1713和声纹特征提取模块1714,其中,用户身份注册模块1711,用于接收用户终端提交的用户身份信息,并依据用户身份信息生成身份信息标识,将身份信息标识返回用户终端;声纹身份注册模块1712,用于接收用户终端提交的声纹注册请求,向用户终端返回声纹响应信息,并接收用户终端依据声纹响应信息上传的用户语音;其中,声纹响应信息包括待验证的文本信息,文本信息用于指示用户终端收录用户语音;声纹特征提取模块1714,用于提取用户语音的声纹特征;声纹特征模型建立模块1713,用于依据声纹特征建立声纹特征模型。Optionally, the user voiceprint identity management subsystem 171 includes: a user identity registration module 1711, a voiceprint identity registration module 1712, a voiceprint feature model establishment module 1713 and a voiceprint feature extraction module 1714, wherein the user identity registration module 1711 is used to receive the user identity information submitted by the user terminal, generate an identity information identifier based on the user identity information, and return the identity information identifier to the user terminal; the voiceprint identity registration module 1712 is used to receive the voiceprint registration request submitted by the user terminal, return the voiceprint response information to the user terminal, and receive the user voice uploaded by the user terminal based on the voiceprint response information; wherein the voiceprint response information includes text information to be verified, and the text information is used to instruct the user terminal to collect the user voice; the voiceprint feature extraction module 1714 is used to extract the voiceprint features of the user voice; the voiceprint feature model establishment module 1713 is used to establish a voiceprint feature model based on the voiceprint features.

进一步地,可选的,可信芯片管理子系统172包括:用户信息导入模块1721、声纹特征存储模块1722、用户数据密钥创建模块1723、用户数据密钥存储模块1724、声纹特征比对模块1725和数据密钥使用模块1726,其中,用户信息导入模块1721,用于在用户信息包括身份信息标识和声纹特征的情况下,将身份信息标识和声纹特征导入可信芯片;声纹特征存储模块1722,用于依据可信存储根密钥对声纹特征进行加密,并存储加密后的声纹特征;用户数据密钥创建模块1723,用于依据预设加密算法和身份信息标识,生成数据密钥,并将数据密钥的密钥句柄返回用户终端;用户数据密钥存储模块1724,用于将数据密钥、身份信息标识和声纹特征进行映射,得到数据密钥、身份信息标识和声纹特征的映射关系,存储映射关系和数据密钥,其中,数据密钥为依据可信存储根密钥对数据密钥进行加密的密钥;声纹特征比对模块1725,用于在用户终端请求获取数据密钥时,提取用户终端上传的用户语音,通过提取用户语音的声纹特征,与用户数据密钥存储模块中映射关系中的声纹特征进行比对;数据密钥使用模块1726,用于在比对通过后,向用户终端反馈数据密钥,以使得用户终端依据数据密钥执行加密/解密操作。Furthermore, optionally, the trusted chip management subsystem 172 includes: a user information import module 1721, a voiceprint feature storage module 1722, a user data key creation module 1723, a user data key storage module 1724, a voiceprint feature comparison module 1725 and a data key usage module 1726, wherein the user information import module 1721 is used to import the identity information identifier and the voiceprint feature into the trusted chip when the user information includes the identity information identifier and the voiceprint feature; the voiceprint feature storage module 1722 is used to encrypt the voiceprint feature according to the trusted storage root key and store the encrypted voiceprint feature; the user data key creation module 1723 is used to generate a data key according to a preset encryption algorithm and the identity information identifier, and store the data key The key handle is returned to the user terminal; the user data key storage module 1724 is used to map the data key, identity information identifier and voiceprint feature to obtain a mapping relationship between the data key, identity information identifier and voiceprint feature, and store the mapping relationship and the data key, wherein the data key is a key used to encrypt the data key based on the trusted storage root key; the voiceprint feature comparison module 1725 is used to extract the user voice uploaded by the user terminal when the user terminal requests to obtain the data key, and compare the extracted voiceprint features of the user voice with the voiceprint features in the mapping relationship in the user data key storage module; the data key use module 1726 is used to feedback the data key to the user terminal after the comparison is passed, so that the user terminal performs encryption/decryption operations based on the data key.

综上,实施例1至5中提供的数据密钥的保护方法可以适用于本申请实施例提供的数据密钥的保护系统。In summary, the data key protection methods provided in Examples 1 to 5 can be applied to the data key protection system provided in the embodiments of the present application.

实施例12Example 12

根据本发明实施例的再一方面,还提供了一种存储介质,存储介质包括存储的程序,其中,在程序运行时控制存储介质所在设备执行上述实施例1至实施例5中的数据密钥的保护方法。According to another aspect of an embodiment of the present invention, a storage medium is further provided, which includes a stored program, wherein when the program is running, the device where the storage medium is located is controlled to execute the data key protection method in the above-mentioned embodiments 1 to 5.

实施例13Example 13

根据本发明实施例的再一方面,还提供了一种处理器,处理器用于运行程序,其中,程序运行时执行上述实施例1至实施例5中的数据密钥的保护方法。According to another aspect of an embodiment of the present invention, a processor is provided, which is used to run a program, wherein the data key protection method in the above-mentioned embodiments 1 to 5 is executed when the program is running.

实施例14Example 14

根据本发明实施例的再一方面,还提供了一种计算设备,包括处理器、存储器,所述存储器上存储有程序,处理器用于运行程序,其中,程序运行时适于使所述处理器执行上述实施例1至实施例5中的数据密钥的保护方法。According to another aspect of an embodiment of the present invention, a computing device is provided, including a processor and a memory, wherein a program is stored on the memory, and the processor is used to run the program, wherein when the program is running, it is suitable for the processor to execute the data key protection method in the above-mentioned embodiments 1 to 5.

实施例15Example 15

本发明的实施例还提供了一种存储介质。可选地,在本实施例中,上述存储介质可以用于保存上述实施例一所提供的数据密钥的保护方法所执行的程序代码。The embodiment of the present invention further provides a storage medium. Optionally, in this embodiment, the storage medium can be used to store the program code executed by the data key protection method provided in the first embodiment.

可选地,在本实施例中,上述存储介质可以位于计算机网络中计算机终端群中的任意一个计算机终端中,或者位于移动终端群中的任意一个移动终端中。Optionally, in this embodiment, the above-mentioned storage medium may be located in any computer terminal in a computer terminal group in a computer network, or in any mobile terminal in a mobile terminal group.

可选地,在本实施例中,存储介质被设置为存储用于执行以下步骤的程序代码:用户身份管理子系统服务器接收用户终端发送的第一密钥获取请求,其中,第一密钥获取请求包括用户的身份验证信息;用户身份管理子系统服务器依据第一密钥获取请求向用户终端返回待验证语音信息;用户身份管理子系统服务器接收用户终端依据待验证语音信息上传的用户语音;用户身份管理子系统服务器提取用户语音的声纹特征,并依据声纹特征和身份验证信息生成第二密钥获取请求;用户身份管理子系统服务器将第二密钥获取请求发送至可信芯片。Optionally, in this embodiment, the storage medium is configured to store program code for executing the following steps: the user identity management subsystem server receives a first key acquisition request sent by the user terminal, wherein the first key acquisition request includes the user's identity authentication information; the user identity management subsystem server returns the voice information to be verified to the user terminal based on the first key acquisition request; the user identity management subsystem server receives the user voice uploaded by the user terminal based on the voice information to be verified; the user identity management subsystem server extracts the voiceprint features of the user voice, and generates a second key acquisition request based on the voiceprint features and the identity authentication information; the user identity management subsystem server sends the second key acquisition request to the trusted chip.

可选地,在本实施例中,存储介质被设置为存储用于执行以下步骤的程序代码:在身份验证信息包括身份信息标识和密钥句柄的情况下,用户身份管理子系统服务器提取用户语音的声纹特征,并依据声纹特征和身份验证信息生成第二密钥获取请求包括:用户身份管理子系统服务器提取用户语音中的声纹特征;用户身份管理子系统服务器通过可信芯片的公钥加密声纹特征、身份信息标识和密钥句柄,生成第二密钥获取请求。Optionally, in this embodiment, the storage medium is configured to store program code for executing the following steps: when the identity authentication information includes an identity information identifier and a key handle, the user identity management subsystem server extracts the voiceprint features of the user's voice, and generates a second key acquisition request based on the voiceprint features and the identity authentication information, including: the user identity management subsystem server extracts the voiceprint features in the user's voice; the user identity management subsystem server encrypts the voiceprint features, identity information identifier and key handle through the public key of the trusted chip to generate a second key acquisition request.

可选地,在本实施例中,存储介质被设置为存储用于执行以下步骤的程序代码:在身份验证信息包括可信证书、身份信息标识和密钥句柄的情况下,用户身份管理子系统服务器依据第一密钥获取请求向用户终端返回待验证语音信息包括:用户身份管理子系统服务器依据用户身份管理子系统私钥解密第一密钥获取请求,其中,第一密钥获取请求通过用户身份管理子系统公钥加密;用户身份管理子系统私钥与用户身份管理子系统公钥对应;用户身份管理子系统服务器解析解密后的第一密钥获取请求,获取第一密钥获取请求中的可信证书;用户身份管理子系统服务器判断可信证书是否满足预设验证条件;在判断结果为是的情况下,用户身份管理子系统服务器向用户终端返回待验证声音信息,其中,待验证声音信息包括:用户身份管理子系统证书和待验证语音。Optionally, in this embodiment, the storage medium is configured to store program code for executing the following steps: when the identity authentication information includes a trusted certificate, an identity information identifier and a key handle, the user identity management subsystem server returns the voice information to be verified to the user terminal based on the first key acquisition request, including: the user identity management subsystem server decrypts the first key acquisition request based on the user identity management subsystem private key, wherein the first key acquisition request is encrypted by the user identity management subsystem public key; the user identity management subsystem private key corresponds to the user identity management subsystem public key; the user identity management subsystem server parses the decrypted first key acquisition request and obtains the trusted certificate in the first key acquisition request; the user identity management subsystem server determines whether the trusted certificate meets the preset verification conditions; if the judgment result is yes, the user identity management subsystem server returns the voice information to be verified to the user terminal, wherein the voice information to be verified includes: the user identity management subsystem certificate and the voice to be verified.

进一步地,可选地,在本实施例中,存储介质被设置为存储用于执行以下步骤的程序代码:用户身份管理子系统服务器提取用户语音的声纹特征,并依据声纹特征和身份验证信息生成第二密钥获取请求包括:用户身份管理子系统服务器依据用户身份管理子系统私钥解密用户语音,得到随机数、待加密或解密数据和待验证声音;用户身份管理子系统服务器提取待验证声音的声纹特征;用户身份管理子系统服务器通过可信芯片的公钥加密声纹特征、随机数、待加密或解密数据、身份信息标识和密钥句柄,生成第二密钥获取请求。Further, optionally, in this embodiment, the storage medium is configured to store program code for executing the following steps: the user identity management subsystem server extracts the voiceprint features of the user's voice, and generates a second key acquisition request based on the voiceprint features and the identity authentication information, including: the user identity management subsystem server decrypts the user's voice based on the user identity management subsystem private key to obtain a random number, data to be encrypted or decrypted, and a sound to be verified; the user identity management subsystem server extracts the voiceprint features of the sound to be verified; the user identity management subsystem server encrypts the voiceprint features, random numbers, data to be encrypted or decrypted, identity information identifier, and key handle through the public key of the trusted chip to generate a second key acquisition request.

上述本发明实施例序号仅仅为了描述,不代表实施例的优劣。The serial numbers of the above embodiments of the present invention are for description only and do not represent the advantages or disadvantages of the embodiments.

在本发明的上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。In the above embodiments of the present invention, the description of each embodiment has its own focus. For parts that are not described in detail in a certain embodiment, reference can be made to the relevant descriptions of other embodiments.

在本申请所提供的几个实施例中,应该理解到,所揭露的技术内容,可通过其它的方式实现。其中,以上所描述的装置实施例仅仅是示意性的,例如所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,单元或模块的间接耦合或通信连接,可以是电性或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed technical content can be implemented in other ways. Among them, the device embodiments described above are only schematic. For example, the division of the units is only a logical function division. In actual implementation, there may be other division methods, such as multiple units or components can be combined or integrated into another system, or some features can be ignored or not executed. Another point is that the mutual coupling or direct coupling or communication connection shown or discussed can be through some interfaces, indirect coupling or communication connection of units or modules, which can be electrical or other forms.

所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separate, and the components shown as units may or may not be physical units, that is, they may be located in one place or distributed across multiple network units. Some or all of these units may be selected to achieve the purpose of this embodiment according to actual needs.

另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, the functional units in the various embodiments of the present invention may be integrated into a single processing unit, each unit may exist physically separately, or two or more units may be integrated into a single unit. The aforementioned integrated units may be implemented in the form of hardware or software functional units.

所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可为个人计算机、服务器或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。If the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present invention, or the part that contributes to the prior art, or all or part of the technical solution can be embodied in the form of a software product. The computer software product is stored in a storage medium and includes several instructions for enabling a computer device (which can be a personal computer, server or network device, etc.) to perform all or part of the steps of the method described in each embodiment of the present invention. The aforementioned storage medium includes: U disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, magnetic disk or optical disk, etc. Various media that can store program codes.

以上所述仅是本发明的优选实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为本发明的保护范围。The above is only a preferred embodiment of the present invention. It should be pointed out that for ordinary technicians in this technical field, several improvements and modifications can be made without departing from the principles of the present invention. These improvements and modifications should also be regarded as the scope of protection of the present invention.

Claims (23)

1.一种数据密钥的保护方法,其特征在于,包括:1. A method for protecting a data key, characterized in that it comprises: 用户身份管理子系统服务器接收用户终端发送的第一密钥获取请求,其中,所述第一密钥获取请求包括用户的身份验证信息;The user identity management subsystem server receives a first key acquisition request sent by a user terminal, wherein the first key acquisition request includes the user's authentication information; 所述用户身份管理子系统服务器依据所述第一密钥获取请求向所述用户终端返回待验证语音信息;The user identity management subsystem server returns voice information to be verified to the user terminal based on the first key acquisition request; 所述用户身份管理子系统服务器接收所述用户终端依据所述待验证语音信息上传的用户语音;The user identity management subsystem server receives the user's voice uploaded by the user terminal based on the voice information to be verified. 所述用户身份管理子系统服务器提取所述用户语音的声纹特征,并依据所述声纹特征和所述身份验证信息生成第二密钥获取请求;The user identity management subsystem server extracts the voiceprint features of the user's voice and generates a second key acquisition request based on the voiceprint features and the authentication information; 所述用户身份管理子系统服务器将所述第二密钥获取请求发送至可信芯片;The user identity management subsystem server sends the second key acquisition request to the trusted chip; 在所述身份验证信息包括可信证书、身份信息标识和密钥句柄的情况下,所述用户身份管理子系统服务器依据所述第一密钥获取请求向所述用户终端返回待验证语音信息包括:所述用户身份管理子系统服务器依据用户身份管理子系统私钥解密所述第一密钥获取请求,其中,所述第一密钥获取请求通过用户身份管理子系统公钥加密;所述用户身份管理子系统私钥与所述用户身份管理子系统公钥对应;所述用户身份管理子系统服务器解析解密后的所述第一密钥获取请求,获取所述第一密钥获取请求中的所述可信证书;所述用户身份管理子系统服务器判断所述可信证书是否满足预设验证条件;在判断结果为是的情况下,所述用户身份管理子系统服务器向所述用户终端返回所述待验证语音信息,其中,所述待验证语音信息包括:用户身份管理子系统证书和待验证语音。When the authentication information includes a trusted certificate, an identity information identifier, and a key handle, the user identity management subsystem server returns voice information to be verified to the user terminal based on the first key acquisition request, including: the user identity management subsystem server decrypting the first key acquisition request using the user identity management subsystem private key, wherein the first key acquisition request is encrypted using the user identity management subsystem public key; the user identity management subsystem private key corresponds to the user identity management subsystem public key; the user identity management subsystem server parses the decrypted first key acquisition request to obtain the trusted certificate in the first key acquisition request; the user identity management subsystem server determines whether the trusted certificate meets preset verification conditions; if the determination result is yes, the user identity management subsystem server returns the voice information to be verified to the user terminal, wherein the voice information to be verified includes: the user identity management subsystem certificate and the voice to be verified. 2.根据权利要求1所述的数据密钥的保护方法,其特征在于,在所述身份验证信息包括身份信息标识和密钥句柄的情况下,所述用户身份管理子系统服务器提取所述用户语音的声纹特征,并依据所述声纹特征和所述身份验证信息生成第二密钥获取请求包括:2. The data key protection method according to claim 1, characterized in that, when the authentication information includes an identity information identifier and a key handle, the user identity management subsystem server extracts the voiceprint features of the user's voice and generates a second key acquisition request based on the voiceprint features and the authentication information, including: 所述用户身份管理子系统服务器提取所述用户语音中的声纹特征;The user identity management subsystem server extracts the voiceprint features from the user's voice. 所述用户身份管理子系统服务器通过所述可信芯片的公钥加密所述声纹特征、所述身份信息标识和所述密钥句柄,生成第二密钥获取请求。The user identity management subsystem server encrypts the voiceprint feature, the identity information identifier, and the key handle using the public key of the trusted chip, and generates a second key acquisition request. 3.根据权利要求1所述的数据密钥的保护方法,其特征在于,所述用户身份管理子系统服务器提取所述用户语音的声纹特征,并依据所述声纹特征和所述身份验证信息生成第二密钥获取请求包括:3. The data key protection method according to claim 1, characterized in that, the user identity management subsystem server extracts the voiceprint features of the user's voice and generates a second key acquisition request based on the voiceprint features and the authentication information, including: 所述用户身份管理子系统服务器依据所述用户身份管理子系统私钥解密所述用户语音,得到随机数、待加密或解密数据和待验证声音;The user identity management subsystem server decrypts the user's voice based on the user identity management subsystem private key to obtain a random number, data to be encrypted or decrypted, and sound to be verified. 所述用户身份管理子系统服务器提取所述待验证声音的声纹特征;The user identity management subsystem server extracts the voiceprint features of the voice to be verified; 所述用户身份管理子系统服务器通过可信芯片的公钥加密所述声纹特征、所述随机数、所述待加密或解密数据、所述身份信息标识和所述密钥句柄,生成所述第二密钥获取请求。The user identity management subsystem server encrypts the voiceprint feature, the random number, the data to be encrypted or decrypted, the identity information identifier, and the key handle using the public key of the trusted chip, and generates the second key acquisition request. 4.一种数据密钥的保护方法,其特征在于,包括:4. A method for protecting a data key, characterized in that it includes: 可信芯片接收密钥获取请求,其中,所述密钥获取请求包括:声纹特征;其中,所述可信芯片为通过内置独立处理器和存储器执行加密或解密计算的数据处理芯片;A trusted chip receives a key acquisition request, wherein the key acquisition request includes: voiceprint features; wherein the trusted chip is a data processing chip that performs encryption or decryption calculations through a built-in independent processor and memory; 所述可信芯片解析所述密钥获取请求,并将所述密钥获取请求中的所述声纹特征与预存声纹特征进行对比;The trusted chip parses the key acquisition request and compares the voiceprint features in the key acquisition request with the pre-stored voiceprint features; 若所述密钥获取请求中的所述声纹特征与所述预存声纹特征匹配,则所述可信芯片向用户终端返回密钥响应信息;If the voiceprint feature in the key acquisition request matches the pre-stored voiceprint feature, the trusted chip returns key response information to the user terminal; 所述若所述密钥获取请求中的所述声纹特征与所述预存声纹特征匹配,则所述可信芯片向用户终端返回密钥响应信息包括:若所述密钥获取请求中的所述声纹特征与所述预存声纹特征匹配,则所述可信芯片依据所述声纹特征提取对应的数据密钥;所述可信芯片依据所述数据密钥对待加密或解密数据进行加密或解密,得到加密信息或解密信息;所述可信芯片将随机数与所述加密信息或解密信息进行预设计算,得到运算结果;所述可信芯片通过所述用户终端的公钥加密所述运算结果,生成所述密钥响应信息;所述可信芯片将所述密钥响应信息返回所述用户终端。The step of the trusted chip returning key response information to the user terminal if the voiceprint feature in the key acquisition request matches the pre-stored voiceprint feature includes: if the voiceprint feature in the key acquisition request matches the pre-stored voiceprint feature, the trusted chip extracts the corresponding data key based on the voiceprint feature; the trusted chip encrypts or decrypts the data to be encrypted or decrypted based on the data key to obtain encrypted information or decrypted information; the trusted chip performs a preset calculation on a random number and the encrypted information or decrypted information to obtain a calculation result; the trusted chip encrypts the calculation result using the public key of the user terminal to generate the key response information; and the trusted chip returns the key response information to the user terminal. 5.根据权利要求4所述的数据密钥的保护方法,其特征在于,在所述密钥获取请求包括所述声纹特征、身份信息标识和密钥句柄的情况下,所述可信芯片解析所述密钥获取请求,并将所述密钥获取请求中的所述声纹特征与预存声纹特征进行对比包括:5. The data key protection method according to claim 4, characterized in that, when the key acquisition request includes the voiceprint feature, identity information identifier, and key handle, the trusted chip parses the key acquisition request and compares the voiceprint feature in the key acquisition request with the pre-stored voiceprint feature, including: 所述可信芯片通过可信芯片的私钥解密所述密钥获取请求,提取所述声纹特征,其中,所述密钥获取请求通过所述可信芯片的公钥加密;所述可信芯片的公钥与可信芯片的私钥对应;The trusted chip decrypts the key acquisition request using its private key and extracts the voiceprint feature, wherein the key acquisition request is encrypted using the trusted chip's public key; the trusted chip's public key corresponds to its private key. 所述可信芯片将所述声纹特征与预存声纹特征进行对比,判断所述声纹特征是否与所述预存声纹特征相同。The trusted chip compares the voiceprint feature with the pre-stored voiceprint feature to determine whether the voiceprint feature is the same as the pre-stored voiceprint feature. 6.根据权利要求5所述的数据密钥的保护方法,其特征在于,所述若所述密钥获取请求中的所述声纹特征与所述预存声纹特征匹配,则所述可信芯片向用户终端返回密钥响应信息包括:6. The data key protection method according to claim 5, characterized in that, if the voiceprint feature in the key acquisition request matches the pre-stored voiceprint feature, the trusted chip returns key response information to the user terminal including: 若所述密钥获取请求中的所述声纹特征与所述预存声纹特征匹配,则所述可信芯片依据所述声纹特征提取对应的数据密钥;If the voiceprint feature in the key acquisition request matches the pre-stored voiceprint feature, the trusted chip extracts the corresponding data key based on the voiceprint feature. 所述可信芯片通过所述用户终端的公钥加密所述数据密钥,生成所述密钥响应信息;The trusted chip encrypts the data key using the public key of the user terminal and generates the key response information; 所述可信芯片将所述密钥响应信息返回所述用户终端。The trusted chip returns the key response information to the user terminal. 7.根据权利要求4所述的数据密钥的保护方法,其特征在于,在所述密钥获取请求包括所述声纹特征、随机数、待加密或解密数据、身份信息标识和密钥句柄的情况下,所述可信芯片解析所述密钥获取请求,并将所述密钥获取请求中的所述声纹特征与预存声纹特征进行对比包括:7. The data key protection method according to claim 4, characterized in that, when the key acquisition request includes the voiceprint feature, random number, data to be encrypted or decrypted, identity information identifier, and key handle, the trusted chip parses the key acquisition request and compares the voiceprint feature in the key acquisition request with the pre-stored voiceprint feature, including: 所述可信芯片通过可信芯片的私钥解密所述密钥获取请求,得到所述声纹特征,其中,所述密钥获取请求通过所述可信芯片的公钥加密;所述可信芯片的公钥与可信芯片的私钥对应;The trusted chip decrypts the key acquisition request using its private key to obtain the voiceprint feature, wherein the key acquisition request is encrypted using the trusted chip's public key; the trusted chip's public key corresponds to its private key. 所述可信芯片将所述声纹特征与预存声纹特征进行对比,判断所述声纹特征是否与所述预存声纹特征相同。The trusted chip compares the voiceprint feature with the pre-stored voiceprint feature to determine whether the voiceprint feature is the same as the pre-stored voiceprint feature. 8.一种数据密钥的保护方法,其特征在于,包括:8. A method for protecting a data key, characterized in that it includes: 用户终端向用户身份管理子系统服务器发送的密钥获取请求,其中,所述密钥获取请求包括用户的身份验证信息;A key acquisition request sent by a user terminal to the user identity management subsystem server, wherein the key acquisition request includes the user's authentication information; 所述用户终端接收所述用户身份管理子系统服务器返回的待验证语音信息;The user terminal receives the voice information to be verified returned by the user identity management subsystem server; 所述用户终端向所述用户身份管理子系统服务器上传用户语音,其中,所述用户语音对应所述待验证语音信息;The user terminal uploads user voice to the user identity management subsystem server, wherein the user voice corresponds to the voice information to be verified; 所述用户终端接收可信芯片返回的密钥响应信息,其中,所述密钥响应信息对应向所述用户身份管理子系统服务器上传的用户语音;The user terminal receives key response information returned by the trusted chip, wherein the key response information corresponds to the user's voice uploaded to the user identity management subsystem server; 在所述用户终端接收所述用户身份管理子系统服务器返回的待验证语音信息之后,所述方法还包括:所述用户终端解析待验证语音信息,得到用户身份管理子系统证书和待验证语音;所述用户终端判断所述用户身份管理子系统证书是否满足预设验证条件;在判断结果为是的情况下,所述用户终端接收用户朗读的所述待验证语音的声音信号;所述用户终端将随机数、所述声音信号和待加密或解密数据通过所述用户身份管理子系统公钥进行加密,得到所述用户语音;所述用户终端向所述用户身份管理子系统服务器上传所述用户语音。After the user terminal receives the voice information to be verified returned by the user identity management subsystem server, the method further includes: the user terminal parsing the voice information to be verified to obtain the user identity management subsystem certificate and the voice to be verified; the user terminal determining whether the user identity management subsystem certificate meets preset verification conditions; if the determination result is yes, the user terminal receiving the sound signal of the voice to be verified read aloud by the user; the user terminal encrypting the random number, the sound signal, and the data to be encrypted or decrypted using the public key of the user identity management subsystem to obtain the user voice; and the user terminal uploading the user voice to the user identity management subsystem server. 9.根据权利要求8所述的数据密钥的保护方法,其特征在于,在所述身份验证信息包括身份信息标识和密钥句柄的情况下,所述用户终端向用户身份管理子系统服务器发送的密钥获取请求包括:9. The data key protection method according to claim 8, characterized in that, when the authentication information includes an identity information identifier and a key handle, the key acquisition request sent by the user terminal to the user identity management subsystem server includes: 所述用户终端依据所述身份信息标识和所述密钥句柄生成所述密钥获取请求;The user terminal generates the key acquisition request based on the identity information identifier and the key handle; 所述用户终端将所述密钥获取请求发送至所述用户身份管理子系统服务器。The user terminal sends the key acquisition request to the user identity management subsystem server. 10.根据权利要求9所述的数据密钥的保护方法,其特征在于,在所述用户终端接收可信芯片返回的密钥响应信息之后,所述方法还包括:10. The data key protection method according to claim 9, characterized in that, after the user terminal receives the key response information returned by the trusted chip, the method further includes: 所述用户终端依据用户终端的私钥解密所述密钥响应信息,获取所述密钥响应信息携带的数据密钥,其中,所述密钥响应信息通过用户终端的公钥加密,所述用户终端的公钥与所述用户终端的私钥对应;The user terminal decrypts the key response information based on its private key to obtain the data key carried in the key response information. The key response information is encrypted using the user terminal's public key, and the user terminal's public key corresponds to its private key. 所述用户终端依据所述数据密钥对待加密或待解密数据进行加密或解密,得到加密数据信息或解密信息。The user terminal encrypts or decrypts the data to be encrypted or decrypted based on the data key to obtain encrypted data information or decrypted information. 11.根据权利要求8所述的数据密钥的保护方法,其特征在于,在所述身份验证信息包括可信证书、身份信息标识和密钥句柄的情况下,所述用户终端向用户身份管理子系统服务器发送的第一密钥获取请求包括:11. The data key protection method according to claim 8, characterized in that, when the authentication information includes a trusted certificate, an identity information identifier, and a key handle, the first key acquisition request sent by the user terminal to the user identity management subsystem server includes: 所述用户终端通过用户身份管理子系统公钥对所述可信证书、所述身份信息标识和所述密钥句柄进行加密,生成所述密钥获取请求;The user terminal encrypts the trusted certificate, the identity information identifier, and the key handle using the public key of the user identity management subsystem, and generates the key acquisition request; 所述用户终端将所述密钥获取请求发送至所述用户身份管理子系统服务器。The user terminal sends the key acquisition request to the user identity management subsystem server. 12.根据权利要求8所述的数据密钥的保护方法,其特征在于,在所述用户终端接收可信芯片返回的密钥响应信息之后,所述方法还包括:12. The data key protection method according to claim 8, characterized in that, after the user terminal receives the key response information returned by the trusted chip, the method further includes: 所述用户终端通过用户终端的私钥解密所述密钥响应信息,得到所述密钥响应信息中的运算结果;The user terminal decrypts the key response information using its private key to obtain the calculation result in the key response information; 所述用户终端依据所述随机数结合预设算法校验所述运算结果,判断所述运算结果是否满足预设校验标准;The user terminal verifies the calculation result based on the random number and a preset algorithm, and determines whether the calculation result meets the preset verification standard. 在判断结果为是的情况下,所述用户终端使用所述运算结果。If the determination result is yes, the user terminal uses the calculation result. 13.一种数据密钥的保护方法,其特征在于,包括:13. A method for protecting a data key, characterized in that it includes: 用户终端向用户身份管理子系统服务器发送的密钥获取请求,其中,所述密钥获取请求包括用户的身份验证信息;A key acquisition request sent by a user terminal to the user identity management subsystem server, wherein the key acquisition request includes the user's authentication information; 所述用户终端接收所述用户身份管理子系统服务器返回的待验证语音信息;The user terminal receives the voice information to be verified returned by the user identity management subsystem server; 所述用户终端向所述用户身份管理子系统服务器上传用户语音,其中,所述用户语音对应所述待验证语音信息;The user terminal uploads user voice to the user identity management subsystem server, wherein the user voice corresponds to the voice information to be verified; 所述用户终端接收所述用户身份管理子系统服务器从所述用户语音提取的声纹特征;The user terminal receives the voiceprint features extracted from the user's voice by the user identity management subsystem server; 所述用户终端中的可信芯片将所述声纹特征与预存声纹特征进行比对;The trusted chip in the user terminal compares the voiceprint features with pre-stored voiceprint features; 若所述声纹特征与所述预存声纹特征匹配,则所述用户终端中的可信芯片提取与所述声纹特征对应的数据密钥;If the voiceprint feature matches the pre-stored voiceprint feature, the trusted chip in the user terminal extracts the data key corresponding to the voiceprint feature; 所述用户终端依据所述数据密钥执行对应操作;The user terminal performs a corresponding operation based on the data key. 在所述用户终端向用户身份管理子系统服务器发送的密钥获取请求之前,所述方法还包括:Before the user terminal sends a key acquisition request to the user identity management subsystem server, the method further includes: 所述用户终端中的可信芯片导入预先获取的身份信息标识和声纹特征;The trusted chip in the user terminal imports pre-acquired identity information and voiceprint features; 所述用户终端中的可信芯片依据可信存储根密钥对所述声纹特征进行加密,并存储加密后的所述声纹特征;The trusted chip in the user terminal encrypts the voiceprint feature based on the trusted storage root key and stores the encrypted voiceprint feature. 所述用户终端中的可信芯片依据预设加密算法和所述身份信息标识,生成数据密钥,并将所述数据密钥的密钥句柄返回所述用户终端;The trusted chip in the user terminal generates a data key based on a preset encryption algorithm and the identity information identifier, and returns the key handle of the data key to the user terminal. 所述用户终端中的可信芯片将所述数据密钥、所述身份信息标识和所述声纹特征进行映射,得到所述数据密钥、所述身份信息标识和所述声纹特征的映射关系,并存储所述映射关系和所述数据密钥。The trusted chip in the user terminal maps the data key, the identity information identifier, and the voiceprint feature to obtain the mapping relationship between the data key, the identity information identifier, and the voiceprint feature, and stores the mapping relationship and the data key. 14.一种数据密钥的保护方法,其特征在于,包括:14. A method for protecting a data key, characterized in that it includes: 获取用户登录信息,并触发密钥获取请求,其中,所述密钥获取请求包括用户的身份验证信息;Obtain user login information and trigger a key acquisition request, wherein the key acquisition request includes the user's authentication information; 依据所述密钥获取请求获取对应待验证语音信息;Obtain the corresponding voice information to be verified based on the key acquisition request; 接收所述用户依据所述待验证语音信息录入的用户语音;Receive user voice input by the user based on the voice information to be verified; 依据所述用户语音提取所述用户的声纹特征;Extract the user's voiceprint features based on the user's speech; 通过可信芯片将所述声纹特征与预存声纹特征进行比对;The voiceprint features are compared with pre-stored voiceprint features using a trusted chip; 若所述声纹特征与所述预存声纹特征匹配,则通过所述可信芯片提取与所述声纹特征对应的数据密钥;If the voiceprint feature matches the pre-stored voiceprint feature, the data key corresponding to the voiceprint feature is extracted through the trusted chip; 依据所述数据密钥执行对应操作;Perform the corresponding operation based on the data key; 在所述身份验证信息包括可信证书、身份信息标识和密钥句柄的情况下,依据所述密钥获取请求获取对应待验证语音信息包括:依据用户身份管理子系统私钥解密所述密钥获取请求,其中,所述密钥获取请求通过用户身份管理子系统公钥加密;所述用户身份管理子系统私钥与所述用户身份管理子系统公钥对应;解析解密后的所述密钥获取请求,获取所述密钥获取请求中的所述可信证书;判断所述可信证书是否满足预设验证条件;在判断结果为是的情况下,获取所述待验证语音信息,其中,所述待验证语音信息包括:用户身份管理子系统证书和待验证语音。When the authentication information includes a trusted certificate, an identity information identifier, and a key handle, obtaining the corresponding voice information to be verified based on the key acquisition request includes: decrypting the key acquisition request using the private key of the user identity management subsystem, wherein the key acquisition request is encrypted using the public key of the user identity management subsystem; the private key of the user identity management subsystem corresponds to the public key of the user identity management subsystem; parsing the decrypted key acquisition request to obtain the trusted certificate in the key acquisition request; determining whether the trusted certificate meets the preset verification conditions; and if the determination result is yes, obtaining the voice information to be verified, wherein the voice information to be verified includes: the user identity management subsystem certificate and the voice to be verified. 15.一种数据密钥的保护装置,其特征在于,包括:15. A data key protection device, characterized in that it comprises: 第一接收模块,用于接收用户终端发送的第一密钥获取请求,其中,所述第一密钥获取请求包括用户的身份验证信息;The first receiving module is configured to receive a first key acquisition request sent by a user terminal, wherein the first key acquisition request includes the user's authentication information; 第一发送模块,用于依据所述第一密钥获取请求向所述用户终端返回待验证语音信息;The first sending module is used to return voice information to be verified to the user terminal based on the first key acquisition request. 第二接收模块,用于接收所述用户终端依据所述待验证语音信息上传的用户语音;The second receiving module is used to receive user voice uploaded by the user terminal based on the voice information to be verified. 请求生成模块,用于提取所述用户语音的声纹特征,并依据所述声纹特征和所述身份验证信息生成第二密钥获取请求;The request generation module is used to extract the voiceprint features of the user's voice and generate a second key acquisition request based on the voiceprint features and the authentication information. 第二发送模块,用于将所述第二密钥获取请求发送至可信芯片;The second sending module is used to send the second key acquisition request to the trusted chip; 在所述身份验证信息包括可信证书、身份信息标识和密钥句柄的情况下,依据所述第一密钥获取请求向所述用户终端返回待验证语音信息包括:依据用户身份管理子系统私钥解密所述第一密钥获取请求,其中,所述第一密钥获取请求通过用户身份管理子系统公钥加密;所述用户身份管理子系统私钥与所述用户身份管理子系统公钥对应;解析解密后的所述第一密钥获取请求,获取所述第一密钥获取请求中的所述可信证书;判断所述可信证书是否满足预设验证条件;在判断结果为是的情况下,向所述用户终端返回所述待验证语音信息,其中,所述待验证语音信息包括:用户身份管理子系统证书和待验证语音。When the authentication information includes a trusted certificate, an identity information identifier, and a key handle, returning the voice information to be verified to the user terminal based on the first key acquisition request includes: decrypting the first key acquisition request using the private key of the user identity management subsystem, wherein the first key acquisition request is encrypted using the public key of the user identity management subsystem; the private key of the user identity management subsystem corresponds to the public key of the user identity management subsystem; parsing the decrypted first key acquisition request to obtain the trusted certificate in the first key acquisition request; determining whether the trusted certificate meets the preset verification conditions; and if the determination result is yes, returning the voice information to be verified to the user terminal, wherein the voice information to be verified includes: the user identity management subsystem certificate and the voice to be verified. 16.一种数据密钥的保护装置,其特征在于,包括:16. A data key protection device, characterized in that it comprises: 第三接收模块,用于接收密钥获取请求,其中,所述密钥获取请求包括:声纹特征;The third receiving module is used to receive a key acquisition request, wherein the key acquisition request includes: voiceprint features; 解析模块,用于解析所述密钥获取请求,并将所述密钥获取请求中的所述声纹特征与预存声纹特征进行对比;The parsing module is used to parse the key acquisition request and compare the voiceprint features in the key acquisition request with the pre-stored voiceprint features; 第三发送模块,用于若所述密钥获取请求中的所述声纹特征与所述预存声纹特征匹配,则向用户终端返回密钥响应信息;The third sending module is used to return key response information to the user terminal if the voiceprint feature in the key acquisition request matches the pre-stored voiceprint feature; 所述若所述密钥获取请求中的所述声纹特征与所述预存声纹特征匹配,则向用户终端返回密钥响应信息包括:若所述密钥获取请求中的所述声纹特征与所述预存声纹特征匹配,则依据所述声纹特征提取对应的数据密钥;依据所述数据密钥对待加密或解密数据进行加密或解密,得到加密信息或解密信息;将随机数与所述加密信息或解密信息进行预设计算,得到运算结果;通过所述用户终端的公钥加密所述运算结果,生成所述密钥响应信息;将所述密钥响应信息返回所述用户终端。The step of returning key response information to the user terminal if the voiceprint feature in the key acquisition request matches the pre-stored voiceprint feature includes: extracting the corresponding data key based on the voiceprint feature; encrypting or decrypting the data to be encrypted or decrypted based on the data key to obtain encrypted or decrypted information; performing a preset calculation on the random number and the encrypted or decrypted information to obtain a calculation result; encrypting the calculation result using the public key of the user terminal to generate the key response information; and returning the key response information to the user terminal. 17.一种数据密钥的保护装置,其特征在于,包括:17. A data key protection device, characterized in that it comprises: 第四发送模块,用于向用户身份管理子系统服务器发送的密钥获取请求,其中,所述密钥获取请求包括用户的身份验证信息;The fourth sending module is used to send a key acquisition request to the user identity management subsystem server, wherein the key acquisition request includes the user's authentication information; 第四接收模块,用于接收所述用户身份管理子系统服务器返回的待验证语音信息;The fourth receiving module is used to receive the voice information to be verified returned by the user identity management subsystem server; 第五发送模块,用于向所述用户身份管理子系统服务器上传用户语音,其中,所述用户语音对应所述待验证语音信息;The fifth sending module is used to upload user voice to the user identity management subsystem server, wherein the user voice corresponds to the voice information to be verified; 第五接收模块,用于接收可信芯片返回的密钥响应信息,其中,所述密钥响应信息对应向所述用户身份管理子系统服务器上传的用户语音;The fifth receiving module is used to receive key response information returned by the trusted chip, wherein the key response information corresponds to the user voice uploaded to the user identity management subsystem server; 在接收所述用户身份管理子系统服务器返回的待验证语音信息之后,解析待验证语音信息,得到用户身份管理子系统证书和待验证语音;判断所述用户身份管理子系统证书是否满足预设验证条件;在判断结果为是的情况下,接收用户朗读的所述待验证语音的声音信号;将随机数、所述声音信号和待加密或解密数据通过所述用户身份管理子系统公钥进行加密,得到所述用户语音;向所述用户身份管理子系统服务器上传所述用户语音。After receiving the voice information to be verified returned by the user identity management subsystem server, the system parses the voice information to obtain the user identity management subsystem certificate and the voice to be verified; it determines whether the user identity management subsystem certificate meets the preset verification conditions; if the determination result is yes, it receives the sound signal of the voice to be verified read by the user; it encrypts the random number, the sound signal, and the data to be encrypted or decrypted using the public key of the user identity management subsystem to obtain the user's voice; and it uploads the user's voice to the user identity management subsystem server. 18.一种数据密钥的保护装置,其特征在于,包括:18. A data key protection device, characterized in that it comprises: 第六发送模块,用于向用户身份管理子系统服务器发送的密钥获取请求,其中,所述密钥获取请求包括用户的身份验证信息;The sixth sending module is used to send a key acquisition request to the user identity management subsystem server, wherein the key acquisition request includes the user's authentication information; 第六接收模块,用于接收所述用户身份管理子系统服务器返回的待验证语音信息;The sixth receiving module is used to receive the voice information to be verified returned by the user identity management subsystem server; 第七发送模块,用于向所述用户身份管理子系统服务器上传用户语音,其中,所述用户语音对应所述待验证语音信息;The seventh sending module is used to upload user voice to the user identity management subsystem server, wherein the user voice corresponds to the voice information to be verified; 第七接收模块,用于接收所述用户身份管理子系统服务器从所述用户语音提取的声纹特征;The seventh receiving module is used to receive the voiceprint features extracted from the user's voice by the user identity management subsystem server; 特征对比模块,用于将所述声纹特征与预存声纹特征进行比对;The feature comparison module is used to compare the voiceprint features with pre-stored voiceprint features; 密钥提取模块,用于若所述声纹特征与所述预存声纹特征匹配,则用户终端中的可信芯片提取与所述声纹特征对应的数据密钥;A key extraction module is used to extract the data key corresponding to the voiceprint feature if the voiceprint feature matches the pre-stored voiceprint feature; 数据保护模块,用于依据所述数据密钥执行对应操作;The data protection module is used to perform corresponding operations based on the data key; 在向用户身份管理子系统服务器发送的密钥获取请求之前,用户终端中的可信芯片导入预先获取的身份信息标识和声纹特征;所述用户终端中的可信芯片依据可信存储根密钥对所述声纹特征进行加密,并存储加密后的所述声纹特征;所述用户终端中的可信芯片依据预设加密算法和所述身份信息标识,生成数据密钥,并将所述数据密钥的密钥句柄返回所述用户终端;所述用户终端中的可信芯片将所述数据密钥、所述身份信息标识和所述声纹特征进行映射,得到所述数据密钥、所述身份信息标识和所述声纹特征的映射关系,并存储所述映射关系和所述数据密钥。Before sending a key acquisition request to the user identity management subsystem server, the trusted chip in the user terminal imports pre-acquired identity information identifiers and voiceprint features; the trusted chip in the user terminal encrypts the voiceprint features according to the trusted storage root key and stores the encrypted voiceprint features; the trusted chip in the user terminal generates a data key according to a preset encryption algorithm and the identity information identifiers, and returns the key handle of the data key to the user terminal; the trusted chip in the user terminal maps the data key, the identity information identifiers, and the voiceprint features to obtain a mapping relationship between the data key, the identity information identifiers, and the voiceprint features, and stores the mapping relationship and the data key. 19.一种数据密钥的保护装置,其特征在于,包括:19. A data key protection device, characterized in that it comprises: 信息获取模块,用于获取用户登录信息,并触发密钥获取请求,其中,所述密钥获取请求包括用户的身份验证信息;The information acquisition module is used to acquire user login information and trigger a key acquisition request, wherein the key acquisition request includes the user's authentication information; 待验证信息获取模块,用于依据所述密钥获取请求获取对应待验证语音信息;The verification information acquisition module is used to acquire the corresponding voice information to be verified based on the key acquisition request; 接收模块,用于接收所述用户依据所述待验证语音信息录入的用户语音;The receiving module is used to receive user voice input by the user based on the voice information to be verified; 提取模块,用于依据所述用户语音提取所述用户的声纹特征;The extraction module is used to extract the user's voiceprint features based on the user's voice. 特征比对模块,用于通过可信芯片将所述声纹特征与预存声纹特征进行比对;The feature comparison module is used to compare the voiceprint features with pre-stored voiceprint features through a trusted chip; 密钥提取模块,用于若所述声纹特征与所述预存声纹特征匹配,则通过所述可信芯片提取与所述声纹特征对应的数据密钥;A key extraction module is used to extract the data key corresponding to the voiceprint feature through the trusted chip if the voiceprint feature matches the pre-stored voiceprint feature. 数据保护模块,用于依据所述数据密钥执行对应操作;The data protection module is used to perform corresponding operations based on the data key; 在所述身份验证信息包括可信证书、身份信息标识和密钥句柄的情况下,依据所述密钥获取请求获取对应待验证语音信息包括:依据用户身份管理子系统私钥解密所述密钥获取请求,其中,所述密钥获取请求通过用户身份管理子系统公钥加密;所述用户身份管理子系统私钥与所述用户身份管理子系统公钥对应;解析解密后的所述密钥获取请求,获取所述密钥获取请求中的所述可信证书;判断所述可信证书是否满足预设验证条件;在判断结果为是的情况下,获取所述待验证语音信息,其中,所述待验证语音信息包括:用户身份管理子系统证书和待验证语音。When the authentication information includes a trusted certificate, an identity information identifier, and a key handle, obtaining the corresponding voice information to be verified based on the key acquisition request includes: decrypting the key acquisition request using the private key of the user identity management subsystem, wherein the key acquisition request is encrypted using the public key of the user identity management subsystem; the private key of the user identity management subsystem corresponds to the public key of the user identity management subsystem; parsing the decrypted key acquisition request to obtain the trusted certificate in the key acquisition request; determining whether the trusted certificate meets the preset verification conditions; and if the determination result is yes, obtaining the voice information to be verified, wherein the voice information to be verified includes: the user identity management subsystem certificate and the voice to be verified. 20.一种数据密钥的保护系统,其特征在于,包括:用户声纹身份管理子系统和可信芯片管理子系统,其中,20. A data key protection system, characterized in that it comprises: a user voiceprint identity management subsystem and a trusted chip management subsystem, wherein, 所述用户声纹身份管理子系统,用于获取每个用户身份信息和声纹特征;The user voiceprint identity management subsystem is used to obtain each user's identity information and voiceprint features; 所述可信芯片管理子系统,用于依据所述每个用户身份信息和所述声纹特征生成对应的密钥;The trusted chip management subsystem is used to generate a corresponding key based on each user's identity information and the voiceprint feature; 所述用户声纹身份管理子系统包括:用户身份注册模块、声纹身份注册模块、声纹特征模型建立模块和声纹特征提取模块,其中,The user voiceprint identity management subsystem includes: a user identity registration module, a voiceprint identity registration module, a voiceprint feature model establishment module, and a voiceprint feature extraction module. 所述用户身份注册模块,用于接收用户终端提交的用户身份信息,并依据所述用户身份信息生成身份信息标识,将所述身份信息标识返回所述用户终端;The user identity registration module is used to receive user identity information submitted by the user terminal, generate an identity information identifier based on the user identity information, and return the identity information identifier to the user terminal. 所述声纹身份注册模块,用于接收所述用户终端提交的声纹注册请求,向所述用户终端返回声纹响应信息,并接收所述用户终端依据所述声纹响应信息上传的用户语音;其中,所述声纹响应信息包括待验证的文本信息,所述文本信息用于指示所述用户终端收录所述用户语音;The voiceprint identity registration module is used to receive a voiceprint registration request submitted by the user terminal, return voiceprint response information to the user terminal, and receive user voice uploaded by the user terminal based on the voiceprint response information; wherein, the voiceprint response information includes text information to be verified, and the text information is used to instruct the user terminal to record the user voice. 所述声纹特征提取模块,用于提取所述用户语音的声纹特征;The voiceprint feature extraction module is used to extract the voiceprint features of the user's speech; 所述声纹特征模型建立模块,用于依据所述声纹特征建立声纹特征模型。The voiceprint feature model building module is used to build a voiceprint feature model based on the voiceprint features. 21.根据权利要求20所述的数据密钥的保护系统,其特征在于,所述可信芯片管理子系统包括:用户信息导入模块、声纹特征存储模块、用户数据密钥创建模块、用户数据密钥存储模块、声纹特征比对模块和数据密钥使用模块,其中,21. The data key protection system according to claim 20, characterized in that the trusted chip management subsystem comprises: a user information import module, a voiceprint feature storage module, a user data key creation module, a user data key storage module, a voiceprint feature comparison module, and a data key usage module, wherein, 所述用户信息导入模块,用于在用户信息包括所述身份信息标识和所述声纹特征的情况下,将所述身份信息标识和所述声纹特征导入可信芯片;The user information import module is used to import the identity information identifier and the voiceprint feature into the trusted chip when the user information includes the identity information identifier and the voiceprint feature; 所述声纹特征存储模块,用于依据可信存储根密钥对所述声纹特征进行加密,并存储加密后的所述声纹特征;The voiceprint feature storage module is used to encrypt the voiceprint feature according to the trusted storage root key and store the encrypted voiceprint feature. 所述用户数据密钥创建模块,用于依据预设加密算法和所述身份信息标识,生成数据密钥,并将所述数据密钥的密钥句柄返回所述用户终端;The user data key creation module is used to generate a data key based on a preset encryption algorithm and the identity information identifier, and return the key handle of the data key to the user terminal; 所述用户数据密钥存储模块,用于将所述数据密钥、所述身份信息标识和所述声纹特征进行映射,得到所述数据密钥、所述身份信息标识和所述声纹特征的映射关系,存储所述映射关系和所述数据密钥;The user data key storage module is used to map the data key, the identity information identifier, and the voiceprint feature to obtain the mapping relationship between the data key, the identity information identifier, and the voiceprint feature, and to store the mapping relationship and the data key. 所述声纹特征比对模块,用于在所述用户终端请求获取所述数据密钥时,提取所述用户终端上传的用户语音,通过提取所述用户语音的声纹特征,与所述用户数据密钥存储模块中所述映射关系中的声纹特征进行比对;The voiceprint feature comparison module is used to extract the user's voice uploaded by the user terminal when the user terminal requests to obtain the data key, and compare the voiceprint features of the extracted user voice with the voiceprint features in the mapping relationship in the user data key storage module. 所述数据密钥使用模块,用于在比对通过后,向所述用户终端反馈所述数据密钥,以使得所述用户终端依据所述数据密钥执行加密/解密操作。The data key usage module is used to feed back the data key to the user terminal after the comparison is successful, so that the user terminal can perform encryption/decryption operations based on the data key. 22.一种存储介质,其特征在于,所述存储介质包括存储的程序,其中,在所述程序运行时控制所述存储介质所在设备执行权利要求1至14中任意一项所述的数据密钥的保护方法。22. A storage medium, characterized in that the storage medium includes a stored program, wherein, when the program is executed, it controls the device where the storage medium is located to perform the data key protection method according to any one of claims 1 to 14. 23.一种计算设备,其特征在于,包括处理器、存储器,所述存储器上存储有程序,所述处理器用于运行程序,其中,所述程序运行时适于使所述处理器执行权利要求1至14中任意一项所述的数据密钥的保护方法。23. A computing device, characterized in that it comprises a processor and a memory, wherein the memory stores a program, and the processor is configured to run the program, wherein the program, when running, is adapted to cause the processor to perform the data key protection method according to any one of claims 1 to 14.
HK19121795.9A 2019-04-02 Data key protection method, device and system HK1261951B (en)

Publications (2)

Publication Number Publication Date
HK1261951A1 HK1261951A1 (en) 2020-01-10
HK1261951B true HK1261951B (en) 2022-01-21

Family

ID=

Similar Documents

Publication Publication Date Title
TWI735691B (en) Data key protection method, device and system
JP6370722B2 (en) Inclusive verification of platform to data center
US9838205B2 (en) Network authentication method for secure electronic transactions
EP2999189B1 (en) Network authentication method for secure electronic transactions
JP5852265B2 (en) COMPUTER DEVICE, COMPUTER PROGRAM, AND ACCESS Permission Judgment Method
WO2021022701A1 (en) Information transmission method and apparatus, client terminal, server, and storage medium
CN108924147B (en) Communication terminal digital certificate issuing method, server and communication terminal
CN107079036A (en) Registration and authorization method, device and system
CN111401901B (en) Authentication method and device of biological payment device, computer device and storage medium
CN109361508B (en) Data transmission method, electronic device and computer readable storage medium
US8397281B2 (en) Service assisted secret provisioning
EP3080946A2 (en) Near field communication authentication mechanism
KR102013983B1 (en) Method and server for authenticating an application integrity
WO2019051839A1 (en) Method and device for data processing
CN112948789B (en) Identity authentication method and device, storage medium and electronic equipment
JP6378424B1 (en) User authentication method with enhanced integrity and security
CN111901304B (en) Registration method and device of mobile security equipment, storage medium and electronic device
CN103532961A (en) Method and system for authenticating identity of power grid website based on trusted crypto modules
WO2023145240A1 (en) Information processing device and information processing system
CN116938467A (en) Communication method, system, device and storage medium
HK1261951B (en) Data key protection method, device and system
US20220407843A1 (en) Communication system and communication method
HK1261951A1 (en) Data key protection method, device and system
KR20170117682A (en) Method and System for certificating electronic machines
CN119210877A (en) Identity authentication method, device, terminal equipment and storage medium