CN105792167A - Method, device and apparatus for initializing trusted execution environment - Google Patents

Method, device and apparatus for initializing trusted execution environment Download PDF

Info

Publication number
CN105792167A
CN105792167A CN201410779238.9A CN201410779238A CN105792167A CN 105792167 A CN105792167 A CN 105792167A CN 201410779238 A CN201410779238 A CN 201410779238A CN 105792167 A CN105792167 A CN 105792167A
Authority
CN
China
Prior art keywords
execution environment
naf
credible execution
management platform
service management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410779238.9A
Other languages
Chinese (zh)
Other versions
CN105792167B (en
Inventor
黄更生
乐祖晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201410779238.9A priority Critical patent/CN105792167B/en
Publication of CN105792167A publication Critical patent/CN105792167A/en
Application granted granted Critical
Publication of CN105792167B publication Critical patent/CN105792167B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a method, a device and an apparatus for initializing a trusted execution environment. The method comprises the steps that a trusted execution server acquires an international mobile subscriber identification number used for representing the identity of a user; the trusted execution environment server determines the address information of a trusted service management platform according to the international mobile subscriber identification number; the trusted execution environment server sends the international mobile subscriber identification number to the trusted service management platform according to the address information of the trusted service management platform, so as to trigger the trusted service management platform to acquire NAF_ID information; and the trusted execution environment server sends the NAF_ID information to a processing unit, so as to trigger the processing unit to generate a first Ks_NAF key, wherein the trusted execution environment is operated on the processing unit.

Description

A kind of method initializing credible execution environment and device, equipment
Technical field
The present invention relates to communication technology, particularly relate to a kind of method initializing credible execution environment and device, equipment.
Background technology
Mobile payment, with its advantage such as mobility and promptness, is developed rapidly.Owing to mobile payment refers to financial transaction, then the safety of mobile payment on the terminal device always by people concern.Existing terminal unit only includes an operating environment, namely by operating systems such as widely known Android (Android) operating system, iOS operating systems, the operating systems such as this kind of Android and iOS are referred to as abundant execution environment (REE, RichExecutionEnvironment), because this type operating system has powerful disposal ability and multimedia function.When carrying out mobile payment on the terminal unit only including abundant execution environment, all of mobile payment operation all completes under abundant execution environment;Such as, when user moves payment by mobile payment application programs such as Alipays on smart mobile phone, including input password, encryption and deciphering etc., relevant mobile payment operation all completes under abundant execution environment.Under abundant execution environment, mobile payment operation is likely to infect wooden horse, intercepted by hacker or attack, thus affecting the safety of mobile payment.
In order to improve the safety of mobile payment, on the basis of existing abundant execution environment, a kind of credible execution environment (TEE is proposed again, TrustedExecutionEnvironment), credible execution environment refers to have secure processing capability and provide the trusted operating system of secure peripheral operation.Application in credible execution environment is all just be downloaded under guaranteeing safe premise and install, and ensures the safety of mobile payment with this.On the terminal device, as Figure 1-1, credible running environment and abundant running environment is mutually isolated, independent operating;For smart mobile phone, credible execution environment and the abundant environment that performs are based on same hardware and run, for instance credible execution environment and the abundant environment that performs are all based on application processor (ApplicationProcessor) and run.As the secure operating environment in terminal unit, the security initialization of credible running environment is particularly important.
Currently for the initialization of credible execution environment, relatively conventional is preset master control key in credible execution environment, follow-up in use creates other key again through master control key.The master control key of credible execution environment is in terminal unit production process, undertaken preset by equipment vendors, and the controlling party of clear and definite master control key is needed when preset master control key, owing to master control key is undertaken preset by equipment vendors, then the controlling party of master control key is exactly equipment vendors.After terminal unit is rendered on market, terminal unit is generally managed by common carrier, in other words, credible execution environment is managed by common carrier, visible, the manager of master control key is not but the controlling party of master control key, and the manager of master control key may exist security risk and trust problem when changing master control key.
Summary of the invention
In view of this, the embodiment of the present invention provides a kind of method initializing credible execution environment and device, equipment for solving at least one problem of existence in prior art, enable to the controlling party without clear and definite master control key in the production process of terminal unit, thus avoiding security risk and trust problem.
The technical scheme of the embodiment of the present invention is achieved in that
First aspect, the embodiment of the present invention provides a kind of method initializing credible execution environment, and described method includes:
Credible execution environment server obtains the international mobile subscriber identity for showing user identity;
Described credible execution environment server is determined according to described international mobile subscriber identity, the address information of trusted service management platform;
Described international mobile subscriber identity, according to the address information of described trusted service management platform, is sent to trusted service management platform by described credible execution environment server, in order to triggers described trusted service management platform and obtains NAF_ID information;
NAF_ID information is sent to processing unit by described credible execution environment server, to trigger described processing unit according to NAF_ID information generation the oneth Ks_NAF key, described processing unit runs and has described credible execution environment.
Second aspect, the embodiment of the present invention provides a kind of method initializing credible execution environment, and described method includes:
Processor obtains the international mobile subscriber identity for showing user identity;
Described international mobile subscriber identity is sent to credible execution environment server by described processor, in order to triggers described credible execution environment server and obtains NAF_ID information;
Described processor receives the acquisition NAF_ID information that described credible execution environment server sends;
Described processor generates a Ks_NAF key according to described NAF_ID information, and utilizes a described Ks_NAF key to complete the initialization procedure of credible execution environment.
The third aspect, the embodiment of the present invention reoffers a kind of method initializing credible execution environment, and described method includes:
Trusted service management platform receives the international mobile subscriber identity that credible execution environment server sends;
Described trusted service management platform verifies the effectiveness of described international mobile subscriber identity;
When verifying described international mobile subscriber identity and being effective, described trusted service management platform obtains NAF_ID information;
Described NAF_ID information and described international mobile subscriber identity are sent to guide service function platform by described trusted service management platform, in order to trigger described guide service function platform and send the 2nd Ks_NAF key to described trusted service management platform;
After described trusted service management platform receives the 2nd Ks_NAF key that guide service function platform sends, send NAF_ID information to described credible execution environment server.
Fourth aspect, a kind of method initializing credible execution environment of the embodiment of the present invention, described method includes:
Processor obtains the international mobile subscriber identity for showing user identity;
Credible execution environment server receives described processor and sends described international mobile subscriber identity;
Described international mobile subscriber identity is sent to credible execution environment server by described processor, in order to triggers described credible execution environment server and obtains NAF_ID information;
Described credible execution environment server is determined according to described international mobile subscriber identity, the address information of trusted service management platform;
Described international mobile subscriber identity, according to the address information of described trusted service management platform, is sent to trusted service management platform by described credible execution environment server, in order to triggers described trusted service management platform and obtains NAF_ID information;
Described trusted service management platform receives the international mobile subscriber identity that credible execution environment server sends;
Described trusted service management platform verifies the effectiveness of described international mobile subscriber identity;
When verifying described international mobile subscriber identity and being effective, described trusted service management platform obtains NAF_ID information;
Described NAF_ID information and described international mobile subscriber identity are sent to guide service function platform by described trusted service management platform, in order to trigger described guide service function platform and send the 2nd Ks_NAF key to described trusted service management platform;
After described trusted service management platform receives the 2nd Ks_NAF key that guide service function platform sends, send NAF_ID information to described credible execution environment server;
NAF_ID information is sent to processing unit by described credible execution environment server, to trigger described processing unit according to NAF_ID information generation the oneth Ks_NAF key;
Described processor receives the acquisition NAF_ID information that described credible execution environment server sends;
Described processor generates a Ks_NAF key according to described NAF_ID information, and utilizes a described Ks_NAF key to complete the initialization procedure of credible execution environment.
5th aspect, the embodiment of the present invention provides a kind of credible execution environment server, and described credible execution environment server includes the first acquiring unit, determines unit, the first transmitting element, first receive unit and the second transmitting element, wherein:
Described first acquiring unit, for obtaining the international mobile subscriber identity for showing user identity;
Described determine unit, for determining according to described international mobile subscriber identity, the address information of trusted service management platform;
Described first transmitting element, for the address information according to described trusted service management platform, is sent to trusted service management platform by described international mobile subscriber identity, in order to triggers described trusted service management platform and obtains NAF_ID information;
Described first receives unit, for receiving the NAF_ID information that described trusted service management platform sends;
Described second transmitting element, for NAF_ID information is sent to processing unit, to trigger described processing unit according to NAF_ID information generation the oneth Ks_NAF key, described processing unit runs and has described credible execution environment.
6th aspect, the embodiment of the present invention provides a kind of processor, and described processor includes second acquisition unit, the 3rd transmitting element, the second reception unit, generates unit and the first initialization unit, wherein:
Described second acquisition unit, for obtaining the international mobile subscriber identity for showing user identity;
Described 3rd transmitting element, for being sent to credible execution environment server by described international mobile subscriber identity, in order to triggers described credible execution environment server and obtains NAF_ID information;
Described second receives unit, for receiving the acquisition NAF_ID information that described credible execution environment server sends;
Described generation unit, for generating a Ks_NAF key according to described NAF_ID information;
Described first initialization unit, for utilizing a described Ks_NAF key to complete the initialization procedure of credible execution environment.
7th aspect, the embodiment of the present invention provides a kind of trusted service management platform, and described trusted service management platform includes the 3rd reception unit, verification unit, the 3rd acquiring unit, the 4th transmitting element and the 5th reception unit, wherein:
Described 3rd receives unit, for receiving the international mobile subscriber identity that credible execution environment server sends;
Described verification unit, for verifying the effectiveness of described international mobile subscriber identity;
Described 3rd acquiring unit, for when verifying described international mobile subscriber identity and being effective, obtaining NAF_ID information;
Described 4th transmitting element, for being sent to guide service function platform by described NAF_ID information and described international mobile subscriber identity, in order to triggers described guide service function platform and sends the 2nd Ks_NAF key to described trusted service management platform;
Described 5th transmitting element, after receiving the 2nd Ks_NAF key that guide service function platform sends, sends NAF_ID information to described credible execution environment server.
Eighth aspect, the embodiment of the present invention provides a kind of device initializing credible execution environment, and described device includes processor, credible execution environment server and trusted service management platform, wherein:
Described processor, for obtaining the international mobile subscriber identity for showing user identity;
Described credible execution environment server, is used for receiving described processor and sends described international mobile subscriber identity;
Described processor, for being sent to credible execution environment server by described international mobile subscriber identity, in order to triggers described credible execution environment server and obtains NAF_ID information;
Described credible execution environment server, for determining according to described international mobile subscriber identity, the address information of trusted service management platform;
Described credible execution environment server, for the address information according to described trusted service management platform, is sent to trusted service management platform by described international mobile subscriber identity, in order to triggers described trusted service management platform and obtains NAF_ID information;
Described trusted service management platform, for receiving the international mobile subscriber identity that credible execution environment server sends;
Described trusted service management platform, for verifying the effectiveness of described international mobile subscriber identity;
When verifying described international mobile subscriber identity and being effective, described trusted service management platform, it is used for obtaining NAF_ID information;
Described trusted service management platform, for being sent to guide service function platform by described NAF_ID information and described international mobile subscriber identity, in order to triggers described guide service function platform and sends the 2nd Ks_NAF key to described trusted service management platform;
Described trusted service management platform, after receiving the 2nd Ks_NAF key that guide service function platform sends, sends NAF_ID information to described credible execution environment server;
Described credible execution environment server, for being sent to processing unit by NAF_ID information, to trigger described processing unit according to NAF_ID information generation the oneth Ks_NAF key;
Described processor, for receiving the acquisition NAF_ID information that described credible execution environment server sends;
Described processor, for generating a Ks_NAF key according to described NAF_ID information, and utilizes a described Ks_NAF key to complete the initialization procedure of credible execution environment.
A kind of method initializing credible execution environment of embodiment of the present invention offer and device, equipment, wherein, credible execution environment server obtains the international mobile subscriber identity for showing user identity;Described credible execution environment server is determined according to described international mobile subscriber identity, the address information of trusted service management platform;Described international mobile subscriber identity, according to the address information of described trusted service management platform, is sent to trusted service management platform by described credible execution environment server, in order to triggers described trusted service management platform and obtains NAF_ID information;NAF_ID information is sent to processing unit by described credible execution environment server, to trigger described processing unit according to NAF_ID information generation the oneth Ks_NAF key, described processing unit runs and has described credible execution environment, so, enable to the controlling party without clear and definite master control key in the production process of terminal unit, thus avoiding security risk and trust problem.
Accompanying drawing explanation
Fig. 1-1 is credible execution environment and the abundant relation schematic diagram performing environment in correlation technique;
Fig. 1-2 initializes the relation schematic diagram between each equipment involved by method of credible execution environment in the embodiment of the present invention;
Fig. 1-3 be the embodiment of the present invention one initialize the method for credible execution environment realize schematic flow sheet;
Fig. 2 be the embodiment of the present invention two initialize the method for credible execution environment realize schematic flow sheet;
Fig. 3 be the embodiment of the present invention three initialize the method for credible execution environment realize schematic flow sheet;
Fig. 4 is the composition structural representation of the credible execution environment server of the embodiment of the present invention four;
Fig. 5 is the composition structural representation of the embodiment of the present invention five processor;
Fig. 6 is the composition structural representation of the embodiment of the present invention six trusted service management platform.
Fig. 7 be the embodiment of the present invention eight initialize the method for credible execution environment realize schematic flow sheet.
Detailed description of the invention
For solving above-mentioned technical problem, the technical scheme that following example of the present invention provide, by generic authentication architecture (GBA, GeneralBootstrappingArchitecture) basis completes the secure initialization operations of credible execution environment, specifically, user inserts after Subscriber Identity Module in terminal unit, generic authentication architecture flow process will be carried out, after generic authentication architecture flow process terminates, Subscriber Identity Module is automatically performed the initialization procedure of credible execution environment by triggering a series of equipment.As shown in Figure 1-2, the technical scheme that following example of the present invention provide, following interactive object will be related to, mainly include Subscriber Identity Module, processor, credible execution environment server, trusted service management platform (TSM, and guide service function platform (BSF TrustedServiceManagement), BootstrappingServiceFunction), wherein: trusted service management platform is as the actual management side of credible execution environment, it is possible to provided by common carrier;Play the part of network application function (NAF, NetworkApplicationFunction) role in a generic authentication architecture, and and hold consultation between guide service platform, in order to obtain Ks_NAF key.Such as cell phone manufacturer of terminal unit provider is preset first key within a processor, and described first key is used for the secure communication and the identification authentication that guarantee between processor and credible execution environment server.By the technical scheme that the embodiment of the present invention provides, enable to provider's controlling party without clear and definite master control key in process of production of terminal unit, and user can be automatically performed the secure initialization procedure of credible execution environment after inserting Subscriber Identity Module in terminal unit.
Here, described guide service function platform can be provided by common carrier, and described credible execution environment server can be provided by the provider of terminal unit.
Here, described first key can be symmetric key, or the PKI of the private/public key of credible execution environment, credible execution environment server (TEEServer);
Here, described processor refers to the processor running described credible execution environment, and when terminal unit is mobile phone, described processor can be application processor.
Here, generic authentication architecture (GBA, GeneralBootstrappingArchitecture), it is third generation partner program (3GPP, a kind of security infrastructure based on mobile communications network, lightweight 3rdGenerationPartnershipProject) defined, unified Security Authentication Service can be provided for application layer business, the relevant criterion of third generation partner program can be consulted about the initialization flow process of generic authentication architecture.
Here, described Subscriber Identity Module includes the Subscriber Identity Module of the second filial generation, the third generation, forth generation etc., wherein the second band Subscriber Identity Module is commonly referred to as subscriber identification module (SIM, SubscriberIdentityModule), third generation Subscriber Identity Module is commonly referred to as universal subscriber identity module (USIM, UniversalSubscriberIdentityModule).
Here, terminal unit can include smart mobile phone, panel computer, point of sale (POS, the PointofSales) equipment such as machine, personal digital assistant.
Below in conjunction with the drawings and specific embodiments, the technical solution of the present invention is further elaborated.
Embodiment one
The embodiment of the present invention one provides a kind of method initializing credible execution environment, Fig. 1-3 be the embodiment of the present invention one initialize the method for credible execution environment realize schematic flow sheet, be applied to credible execution environment server, as Figure 1-3, the method includes:
Step 101, credible execution environment server obtains the international mobile subscriber identity (IMSI, InternationalMobileSubscriberIdentificationNumber) for showing user identity;
Here, described credible execution environment server can be provided by the provider of terminal unit, and described international mobile subscriber identity is the IMSI mark of Subscriber Identity Module.
Step 102, described credible execution environment server is according to described international mobile subscriber identity, it is determined that the address information of trusted service management platform;
Here, when terminal unit is mobile phone, the cell-phone number that described credible execution environment server can also report according to processor, it is determined that the address information of trusted service management platform;Or, cell-phone number that described credible execution environment server can also report according to processor and international mobile subscriber identity, it is determined that the address information of trusted service management platform.
Step 103, described credible execution environment server is according to the address information of described trusted service management platform, described international mobile subscriber identity is sent to trusted service management platform, in order to trigger described trusted service management platform and obtain mark (NAF_ID) information of network application function platform;
Here, owing to network application function platform can be multiple, it is therefore desirable to obtain the identification information of the network application function platform relevant to international mobile subscriber identity.
Step 104, NAF_ID information is sent to processing unit by described credible execution environment server, to trigger described processing unit according to NAF_ID information generation the oneth Ks_NAF key.
Here, on described processing unit, operation has described credible execution environment.
In the embodiment of the present invention, at described credible execution environment server after obtaining the international mobile subscriber identity for showing user identity, described method also includes:
Described credible execution environment server sets up the first escape way, and described first escape way is the escape way between described credible execution environment server and processor;
Accordingly, described credible execution environment server obtains the international mobile subscriber identity for showing user identity, including:
Described credible execution environment server passes through described first escape way, obtains the international mobile subscriber identity for showing user identity;
Accordingly, NAF_ID information is sent to processing unit by described credible execution environment server, including:
Described credible execution environment server passes through described first escape way, and NAF_ID information is sent to processing unit.
In the embodiment of the present invention, determining according to described international mobile subscriber identity at described credible execution environment server, after the address information of trusted service management platform, described method also includes:
Described credible execution environment server sets up the second escape way, and described second escape way is the escape way between described credible execution environment server and described trusted service management platform;
Accordingly, described international mobile subscriber identity, according to the address information of described trusted service management screen, is sent to trusted service management platform by described credible execution environment server, including:
Described international mobile subscriber identity, according to the address information of described trusted service management platform, is sent to trusted service management platform by described second escape way by described credible execution environment server;
Accordingly, described credible execution environment server receives the NAF_ID information that described trusted service management platform sends, including:
Described credible execution environment server receives, by described second escape way, the NAF_ID information that described trusted service management platform sends.
In the embodiment of the present invention, before step 101, the method also includes: after user inserts Subscriber Identity Module in terminal unit, will carry out generic authentication architecture flow process.
A kind of method initializing credible execution environment of embodiment of the present invention offer and device, equipment, wherein, credible execution environment server obtains the international mobile subscriber identity for showing user identity;Described credible execution environment server is determined according to described international mobile subscriber identity, the address information of trusted service management platform;Described international mobile subscriber identity, according to the address information of described trusted service management platform, is sent to trusted service management platform by described credible execution environment server, in order to triggers described trusted service management platform and obtains NAF_ID information;NAF_ID information is sent to processing unit by described credible execution environment server, to trigger described processing unit according to NAF_ID information generation the oneth Ks_NAF key, described processing unit runs and has described credible execution environment, so, enable to the controlling party without clear and definite master control key in the production process of terminal unit, thus avoiding security risk and trust problem.
Embodiment two
The embodiment of the present invention provides a kind of method initializing credible execution environment, is applied in processor, Fig. 2 be the embodiment of the present invention two initialize the method for credible execution environment realize schematic flow sheet, as in figure 2 it is shown, the method includes:
Step 201, processor obtains the international mobile subscriber identity for showing user identity;
Step 202, described international mobile subscriber identity is sent to credible execution environment server by described processor, in order to triggers described credible execution environment server and obtains NAF_ID information;
Step 203, described processor receives the acquisition NAF_ID information that described credible execution environment server sends;
Step 204, described processor generates a Ks_NAF key according to described NAF_ID information, and utilizes a described Ks_NAF key to complete the initialization procedure of credible execution environment.
In the embodiment of the present invention, the described initialization procedure utilizing a described Ks_NAF key to complete credible execution environment, including:
Described processor utilizes a Ks_NAF key to complete the certification between trusted service management platform, thus completing the initialization procedure of credible execution environment.
In the embodiment of the present invention, after the international mobile subscriber identity that described processor obtains for showing user identity, described method also includes:
The first escape way set up by described processor, and described first escape way is the escape way between described processor and described credible execution environment server and processor;
Accordingly, described international mobile subscriber identity is sent to credible execution environment server by described processor, including:
Described international mobile subscriber identity is sent to credible execution environment server by described first escape way by described processor;
Accordingly, described processor receives the acquisition NAF_ID information that described credible execution environment server sends, including:
Described processor receives, by described first escape way, the acquisition NAF_ID information that described credible execution environment server sends.
Embodiment three
The embodiment of the present invention provides a kind of method initializing credible execution environment, is applied to trusted service management platform, Fig. 3 be the embodiment of the present invention three initialize the method for credible execution environment realize schematic flow sheet, as it is shown on figure 3, the method includes:
Step 301, trusted service management platform receives the international mobile subscriber identity that credible execution environment server sends;
Step 302, described trusted service management platform verifies the effectiveness of described international mobile subscriber identity;
Step 303, when verifying described international mobile subscriber identity and being effective, described trusted service management platform obtains NAF_ID information;
Step 304, described NAF_ID information and described international mobile subscriber identity are sent to guide service function platform by described trusted service management platform, in order to trigger described guide service function platform and send the 2nd Ks_NAF key to described trusted service management platform;
Step 305, after described trusted service management platform receives the 2nd Ks_NAF key that guide service function platform sends, sends NAF_ID information to described credible execution environment server.
Step 306, when verifying described international mobile subscriber identity failure, described trusted service management platform is sent to described credible execution environment server by verifying failed information, in order to prompting each side initializes unsuccessfully.
In the embodiment of the present invention, described method also includes:
Described trusted service management platform sets up the second escape way, and described second escape way is the escape way between described trusted service management platform and described credible execution environment server;
Accordingly, described trusted service management platform receives the international mobile subscriber identity that credible execution environment server sends, including:
Described trusted service management platform passes through described second escape way, receives the international mobile subscriber identity that credible execution environment server sends;
Accordingly, after described trusted service management platform receives the 2nd Ks_NAF key that guide service function platform sends, send NAF_ID information to described credible execution environment server, including:
After described trusted service management platform receives the 2nd Ks_NAF key that guide service function platform sends, send NAF_ID information by described second escape way to described credible execution environment server.
In the embodiment of the present invention, described method also includes:
The Ks_NAF key that the haircut of described trusted service management platform receiving area is sent;
Described trusted service management platform judges that whether a described Ks_NAF key is identical with the 2nd Ks_NAF key of self, obtains the first judged result;
When described first judged result shows that a described Ks_NAF key is identical with the 2nd Ks_NAF key of self, complete the initialization procedure of credible execution environment.
When described first judged result shows a described Ks_NAF key and the 2nd Ks_NAF key of self differs, initialize unsuccessfully, and send initialization failure to processor.
Embodiment four
Embodiment of the method based on the present invention, the embodiment of the present invention provides a kind of credible execution environment server, Fig. 4 is the composition structural representation of the credible execution environment server of the embodiment of the present invention four, as shown in Figure 4, this is credible, and execution environment server 400 includes the first acquiring unit 401, determines that unit the 402, first transmitting element 403, first receives unit 404 and the second transmitting element 405, wherein:
Described first acquiring unit 401, for obtaining the international mobile subscriber identity for showing user identity;
Described determine unit 402, for determining according to described international mobile subscriber identity, the address information of trusted service management platform;
Described first transmitting element 403, for the address information according to described trusted service management platform, is sent to trusted service management platform by described international mobile subscriber identity, in order to triggers described trusted service management platform and obtains NAF_ID information;
Described first receives unit 404, for receiving the NAF_ID information that described trusted service management platform sends;
Described second transmitting element 405, for NAF_ID information is sent to processing unit, to trigger described processing unit according to NAF_ID information generation the oneth Ks_NAF key, described processing unit runs and has described credible execution environment.
In the embodiment of the present invention, described credible execution environment server also includes first and sets up unit, is used for setting up the first escape way, and described first escape way is the escape way between described credible execution environment server and processor;
Accordingly, described first acquiring unit, for by described first escape way, obtaining the international mobile subscriber identity for showing user identity;
Described second transmitting element, for being sent to processing unit by described first escape way by NAF_ID information.
In the embodiment of the present invention, described credible execution environment server also includes second and sets up unit, is used for setting up the second escape way, and described second escape way is the escape way between described credible execution environment server and described trusted service management platform;
Accordingly, described first transmitting element, for the address information according to described trusted service management platform, by described second escape way, described international mobile subscriber identity is sent to trusted service management platform;
Accordingly, described first receives unit, for receiving, by described second escape way, the NAF_ID information that described trusted service management platform sends.
Here, the address information of trusted service management platform can be the identification information of trusted service management platform.
Embodiment five
The embodiment of the present invention provides a kind of processor, Fig. 5 is the composition structural representation of the embodiment of the present invention five processor, as shown in Figure 5, this processor 500 includes second acquisition unit the 501, the 3rd transmitting element 502, second and receives unit 503, generates unit 504 and the first initialization unit 505, wherein:
Described second acquisition unit 501, for obtaining the international mobile subscriber identity for showing user identity;
Described 3rd transmitting element 502, for being sent to credible execution environment server by described international mobile subscriber identity, in order to triggers described credible execution environment server and obtains NAF_ID information;
Described second receives unit 503, for receiving the acquisition NAF_ID information that described credible execution environment server sends;
Described generation unit 504, for generating a Ks_NAF key according to described NAF_ID information;
Described first initialization unit 505, for utilizing a described Ks_NAF key to complete the initialization procedure of credible execution environment.
In the embodiment of the present invention, described first initialization unit, for utilizing a Ks_NAF key to complete the certification between trusted service management platform, thus completing the initialization procedure of credible execution environment.
In the embodiment of the present invention, described processor also includes the 3rd and sets up unit, is used for setting up the first escape way, and described first escape way is the escape way between described processor and described credible execution environment server and processor;
Accordingly, described 3rd transmitting element, for being sent to credible execution environment server by described first escape way by described international mobile subscriber identity;
Accordingly, described second receives unit, for receiving, by described first escape way, the acquisition NAF_ID information that described credible execution environment server sends.
Embodiment six
The embodiment of the present invention provides a kind of trusted service management platform, Fig. 6 is the composition structural representation of the embodiment of the present invention six trusted service management platform, as shown in Figure 6, this trusted service management platform 600 includes the 3rd reception unit 601, verification unit the 602, the 3rd acquiring unit the 603, the 4th transmitting element the 604, the 5th receives unit 605 and the 6th transmitting element 606, wherein:
Described 3rd receives unit 601, for receiving the international mobile subscriber identity that credible execution environment server sends;
Described verification unit 602, for verifying the effectiveness of described international mobile subscriber identity;
Described 3rd acquiring unit 603, for when verifying described international mobile subscriber identity and being effective, obtaining NAF_ID information;
Described 4th transmitting element 604, for being sent to guide service function platform by described NAF_ID information and described international mobile subscriber identity, in order to triggers described guide service function platform and sends the 2nd Ks_NAF key to described trusted service management platform;
Described 5th transmitting element 605, after receiving the 2nd Ks_NAF key that guide service function platform sends, sends NAF_ID information to described credible execution environment server.
Described 6th transmitting element 606, for when verifying described international mobile subscriber identity failure, being sent to described credible execution environment server by verifying failed information, in order to prompting each side initializes unsuccessfully.
In the embodiment of the present invention, described trusted service management platform also includes the 4th and sets up unit, is used for setting up the second escape way, and described second escape way is the escape way between described trusted service management platform and described credible execution environment server;
Accordingly, the described 3rd receives unit, for by described second escape way, receiving the international mobile subscriber identity that credible execution environment server sends;
Accordingly, described 5th transmitting element, after receiving the 2nd Ks_NAF key that guide service function platform sends, send NAF_ID information by described second escape way to described credible execution environment server.
The embodiment of the present invention, this trusted service management platform also includes the 4th reception unit, judging unit, the second initialization unit and the 7th transmitting element, wherein:
Described 4th receives unit, for the Ks_NAF key that receiving area's haircut is sent;
Described judging unit, for judging that whether a described Ks_NAF key is identical with the 2nd Ks_NAF key of self, obtains the first judged result;
Described second initialization unit, for when described first judged result shows that a described Ks_NAF key is identical with the 2nd Ks_NAF key of self, completing the initialization procedure of credible execution environment.
Described 7th transmitting element, for when described first judged result shows a described Ks_NAF key and the 2nd Ks_NAF key of self differs, initializing unsuccessfully, and sends initialization failure to processor.
Embodiment seven
Based on above-mentioned processor enforcement, credible execution environment server embodiment and trusted service management platform embodiment, the embodiment of the present invention provides a kind of device initializing credible execution environment, described device includes processor, credible execution environment server and trusted service management platform, wherein:
Described processor, for obtaining the international mobile subscriber identity for showing user identity;
Described credible execution environment server, is used for receiving described processor and sends described international mobile subscriber identity;
Described processor, for being sent to credible execution environment server by described international mobile subscriber identity, in order to triggers described credible execution environment server and obtains NAF_ID information;
Described credible execution environment server, for determining according to described international mobile subscriber identity, the address information of trusted service management platform;
Described credible execution environment server, for the address information according to described trusted service management platform, is sent to trusted service management platform by described international mobile subscriber identity, in order to triggers described trusted service management platform and obtains NAF_ID information;
Described trusted service management platform, for receiving the international mobile subscriber identity that credible execution environment server sends;
Described trusted service management platform, for verifying the effectiveness of described international mobile subscriber identity;
When verifying described international mobile subscriber identity and being effective, described trusted service management platform, it is used for obtaining NAF_ID information;
Described trusted service management platform, for being sent to guide service function platform by described NAF_ID information and described international mobile subscriber identity, in order to triggers described guide service function platform and sends the 2nd Ks_NAF key to described trusted service management platform;
Described trusted service management platform, after receiving the 2nd Ks_NAF key that guide service function platform sends, sends NAF_ID information to described credible execution environment server;
Described credible execution environment server, for being sent to processing unit by NAF_ID information, to trigger described processing unit according to NAF_ID information generation the oneth Ks_NAF key;
Described processor, for receiving the acquisition NAF_ID information that described credible execution environment server sends;
Described processor, for generating a Ks_NAF key according to described NAF_ID information, and utilizes a described Ks_NAF key to complete the initialization procedure of credible execution environment.
Embodiment eight
Based on Fig. 1-2, the embodiment of the present invention provides a kind of method initializing credible execution environment, Fig. 7 be the embodiment of the present invention eight initialize the method for credible execution environment realize schematic flow sheet, as it is shown in fig. 7, the method includes:
Step 701, Subscriber Identity Module is inserted terminal unit by user;
Specifically, Subscriber Identity Module such as SIM is inserted in terminal unit by user, and this terminal unit can run credible execution environment.
Step 702, Subscriber Identity Module and BSF complete GBA flow process;
Specifically, Subscriber Identity Module completes GBA flow process by terminal unit and BSF, may refer to the relevant criterion of 3GPP standard about the detailed process of GBA flow process, repeats no more here.
Step 703, IMSI information is sent to processor by Subscriber Identity Module;
Here, after international mobile subscriber identity is sent to processor by Subscriber Identity Module, namely processor obtains the international mobile subscriber identity of SIM;After processor receives international mobile subscriber identity, whether meeting decision processor is complete the initialization flow process of credible execution environment, when processor is complete the initialization flow process of credible execution environment, then the method flow process just terminates;When processor does not complete the initialization flow process of credible execution environment, then the method flow process enters step 704.
Here, owing to user is when using terminal unit, it is possible to there will be the situation changing Subscriber Identity Module, when user changes Subscriber Identity Module time, be not required to again carry out the initialization flow process of credible execution environment;Only user takes terminal unit first, and when Subscriber Identity Module is inserted into terminal unit, just needs to carry out the initialization flow process of the credible execution environment of embodiment of the present invention offer.
Step 704, sets up the first escape way between processor and credible execution environment server (TEEServer);
Here, the first escape way is set up between processor and credible execution environment server, it is possible to effectively stop the processor of forgery or credible execution environment server.
Step 705, processor sends IMSI information to credible execution environment server;
Here, processor can send IMSI information by the first escape way to credible execution environment server;
Step 706, TEEServer determines the address information of TSM according to IMSI information;
Here, when terminal unit is smart mobile phone, TEEServer can also determine TSM address information according to the cell-phone number information received, or, TEEServer can also determine TSM address information according to IMSI and cell-phone number information.
Step 707, sets up the second escape way between TEEServer and TSM platform;
Here, the second escape way is set up between TEEServer and TSM platform, it is possible to effectively stop TSM or TEEServer forged.
Step 708, TEEServer sends IMSI information to TSM platform;
Step 709, TSM platform verification IMSI information;
Here, the effectiveness of TSM platform verification IMSI information, when verifying IMSI information and being effective, enter step 710, when verifying IMSI information and losing efficacy, the method flow that the embodiment of the present invention provides terminates.
Step 710, TSM platform sends IMSI information and NAF_ID information to BSF platform;
Here, the information of described NAF_ID information to be BSF platform be TSM platform distribution;BSF platform, after receiving IMSI information and NAF_ID information, can obtain the 2nd Ks_NAF key.And.
Step 711, BSF platform sends the 2nd Ks_NAF key to TSM platform;
Here, BSF platform is a kind of safe transfer mode to the 2nd Ks_NAF key that TSM platform returns.
Step 712, TSM platform sends NAF_ID information to TEEServer;
Here, TSM platform, after receiving the 2nd Ks_NAF key that BSF platform sends, can record the 2nd Ks_NAF key, and then TSM platform sends NAF_ID information to TEEServer.
Step 713, TEEServer sends NAF_ID information to processor;
Step 714, processor generates a Ks_NAF key according to NAF_ID information;
Step 715, completes two-way authentication between processor and TSM platform;
Here, two-way authentication is completed between processor and TSM platform, can be undertaken by manner below, the Ks_NAF key generated is sent to TSM platform by such as processor, 2nd Ks_NAF key of the Ks_NAF key received Yu self record is compared by TSM platform, when a Ks_NAF key is identical with the 2nd Ks_NAF key of self record, namely complete two-way authentication;When the 2nd Ks_NAF key of a Ks_NAF key Yu self record differs, TSM platform can to processor return authentication failure.Can be seen that TEEServer realizes transport layer encryption as transfer from above flow process.
Step 716, after certification success, namely TSM platform completes the security initialization of TEE;
Here, owing to processor generates a Ks_NAF key, and a Ks_NAF key and the 2nd Ks_NAF key identical, it can be said that TSM platform writes TEE to processor manages key, namely complete the security initialization of TEE.
It need to be noted that: the description of apparatus above embodiment, describe similar with said method embodiment, there is the beneficial effect that same embodiment of the method is the same, therefore do not repeat.For the ins and outs not disclosed in apparatus of the present invention embodiment, refer to the description of the inventive method embodiment and understand, repeat no more here.
In several embodiments provided herein, it should be understood that disclosed equipment and method, it is possible to realize by another way.Apparatus embodiments described above is merely schematic, such as, the division of described unit, it is only a kind of logic function to divide, actual can have other dividing mode when realizing, and as: multiple unit or assembly can be in conjunction with, or is desirably integrated into another system, or some features can ignore, or do not perform.It addition, the coupling each other of shown or discussed each ingredient or direct-coupling or communication connection can be through INDIRECT COUPLING or the communication connection of some interfaces, equipment or unit, it is possible to be electrical, machinery or other form.
The above-mentioned unit illustrated as separating component can be or may not be physically separate, and the parts shown as unit can be or may not be physical location;Both may be located at a place, it is also possible to be distributed on multiple NE;Part or all of unit therein can be selected according to the actual needs to realize the purpose of the present embodiment scheme.
It addition, each functional unit in various embodiments of the present invention can be fully integrated in a processing unit, it is also possible to be that each unit is individually as a unit, it is also possible to two or more unit are integrated in a unit;Above-mentioned integrated unit both can adopt the form of hardware to realize, it would however also be possible to employ hardware adds the form of SFU software functional unit and realizes.
One of ordinary skill in the art will appreciate that: all or part of step realizing said method embodiment can be completed by the hardware that programmed instruction is relevant, aforesaid program can be stored in computer read/write memory medium, this program upon execution, performs to include the step of said method embodiment;And aforesaid storage medium includes: the various media that can store program code such as movable storage device, read only memory (ReadOnlyMemory, ROM), magnetic disc or CDs.
Or, if the above-mentioned integrated unit of the present invention realizes using the form of software function module and as independent production marketing or when using, it is also possible to be stored in a computer read/write memory medium.Based on such understanding, the part that prior art is contributed by the technical scheme of the embodiment of the present invention substantially in other words can embody with the form of software product, this computer software product is stored in a storage medium, including some instructions with so that a computer equipment (can be personal computer, server or the network equipment etc.) performs all or part of of method described in each embodiment of the present invention.And aforesaid storage medium includes: the various media that can store program code such as movable storage device, ROM, magnetic disc or CDs.
The above; being only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, any those familiar with the art is in the technical scope that the invention discloses; change can be readily occurred in or replace, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with described scope of the claims.

Claims (24)

1. the method initializing credible execution environment, it is characterised in that described method includes:
Credible execution environment server obtains the international mobile subscriber identity for showing user identity;
Described credible execution environment server is determined according to described international mobile subscriber identity, the address information of trusted service management platform;
Described international mobile subscriber identity, according to the address information of described trusted service management platform, is sent to trusted service management platform by described credible execution environment server, in order to triggers described trusted service management platform and obtains NAF_ID information;
NAF_ID information is sent to processing unit by described credible execution environment server, to trigger described processing unit according to NAF_ID information generation the oneth Ks_NAF key, described processing unit runs and has described credible execution environment.
2. method according to claim 1, it is characterised in that at described credible execution environment server after obtaining the international mobile subscriber identity for showing user identity, described method also includes:
Described credible execution environment server sets up the first escape way, and described first escape way is the escape way between described credible execution environment server and processor;
Accordingly, described credible execution environment server obtains the international mobile subscriber identity for showing user identity, including:
Described credible execution environment server passes through described first escape way, obtains the international mobile subscriber identity for showing user identity;
Accordingly, NAF_ID information is sent to processing unit by described credible execution environment server, including:
Described credible execution environment server passes through described first escape way, and NAF_ID information is sent to processing unit.
3. method according to claim 1 and 2, it is characterised in that determining according to described international mobile subscriber identity at described credible execution environment server, after the address information of trusted service management platform, described method also includes:
Described credible execution environment server sets up the second escape way, and described second escape way is the escape way between described credible execution environment server and described trusted service management platform;
Accordingly, described international mobile subscriber identity, according to the address information of described trusted service management platform, is sent to trusted service management platform by described credible execution environment server, including:
Described international mobile subscriber identity, according to the address information of described trusted service management platform, is sent to trusted service management platform by described second escape way by described credible execution environment server;
Accordingly, described credible execution environment server receives the NAF_ID information that described trusted service management platform sends, including:
Described credible execution environment server receives, by described second escape way, the NAF_ID information that described trusted service management platform sends.
4. the method initializing credible execution environment, it is characterised in that described method includes:
Processor obtains the international mobile subscriber identity for showing user identity;
Described international mobile subscriber identity is sent to credible execution environment server by described processor, in order to triggers described credible execution environment server and obtains NAF_ID information;
Described processor receives the acquisition NAF_ID information that described credible execution environment server sends;
Described processor generates a Ks_NAF key according to described NAF_ID information, and utilizes a described Ks_NAF key to complete the initialization procedure of credible execution environment.
5. method according to claim 4, it is characterised in that the described initialization procedure utilizing a described Ks_NAF key to complete credible execution environment, including:
Described processor utilizes a Ks_NAF key to complete the certification between trusted service management platform, thus completing the initialization procedure of credible execution environment.
6. the method according to claim 4 or 5, it is characterised in that after the international mobile subscriber identity that described processor obtains for showing user identity, described method also includes:
The first escape way set up by described processor, and described first escape way is the escape way between described processor and described credible execution environment server and processor;
Accordingly, described international mobile subscriber identity is sent to credible execution environment server by described processor, including:
Described international mobile subscriber identity is sent to credible execution environment server by described first escape way by described processor;
Accordingly, described processor receives the acquisition NAF_ID information that described credible execution environment server sends, including:
Described processor receives, by described first escape way, the acquisition NAF_ID information that described credible execution environment server sends.
7. the method initializing credible execution environment, it is characterised in that described method includes:
Trusted service management platform receives the international mobile subscriber identity that credible execution environment server sends;
Described trusted service management platform verifies the effectiveness of described international mobile subscriber identity;
When verifying described international mobile subscriber identity and being effective, described trusted service management platform obtains NAF_ID information;
Described NAF_ID information and described international mobile subscriber identity are sent to guide service function platform by described trusted service management platform, in order to trigger described guide service function platform and send the 2nd Ks_NAF key to described trusted service management platform;
After described trusted service management platform receives the 2nd Ks_NAF key that guide service function platform sends, send NAF_ID information to described credible execution environment server.
8. method according to claim 7, it is characterized in that, described method also includes: when verifying described international mobile subscriber identity failure, and described trusted service management platform is sent to described credible execution environment server by verifying failed information, in order to prompting each side initializes unsuccessfully.
9. method according to claim 7, it is characterised in that described method also includes:
Described trusted service management platform sets up the second escape way, and described second escape way is the escape way between described trusted service management platform and described credible execution environment server;
Accordingly, described trusted service management platform receives the international mobile subscriber identity that credible execution environment server sends, including:
Described trusted service management platform passes through described second escape way, receives the international mobile subscriber identity that credible execution environment server sends;
Accordingly, after described trusted service management platform receives the 2nd Ks_NAF key that guide service function platform sends, send NAF_ID information to described credible execution environment server, including:
After described trusted service management platform receives the 2nd Ks_NAF key that guide service function platform sends, send NAF_ID information by described second escape way to described credible execution environment server.
10. the method according to any one of claim 7 to 9, it is characterised in that described method also includes:
The Ks_NAF key that the haircut of described trusted service management platform receiving area is sent;
Described trusted service management platform judges that whether a described Ks_NAF key is identical with the 2nd Ks_NAF key of self, obtains the first judged result;
When described first judged result shows that a described Ks_NAF key is identical with the 2nd Ks_NAF key of self, complete the initialization procedure of credible execution environment.
11. method according to claim 11, it is characterized in that, described method also includes: when described first judged result shows a described Ks_NAF key and the 2nd Ks_NAF key of self differs, initialize unsuccessfully, and sends initialization failure to processor.
12. the method initializing credible execution environment, it is characterised in that described method includes:
Processor obtains the international mobile subscriber identity for showing user identity;
Credible execution environment server receives described processor and sends described international mobile subscriber identity;
Described international mobile subscriber identity is sent to credible execution environment server by described processor, in order to triggers described credible execution environment server and obtains NAF_ID information;
Described credible execution environment server is determined according to described international mobile subscriber identity, the address information of trusted service management platform;
Described international mobile subscriber identity, according to the address information of described trusted service management platform, is sent to trusted service management platform by described credible execution environment server, in order to triggers described trusted service management platform and obtains NAF_ID information;
Described trusted service management platform receives the international mobile subscriber identity that credible execution environment server sends;
Described trusted service management platform verifies the effectiveness of described international mobile subscriber identity;
When verifying described international mobile subscriber identity and being effective, described trusted service management platform obtains NAF_ID information;
Described NAF_ID information and described international mobile subscriber identity are sent to guide service function platform by described trusted service management platform, in order to trigger described guide service function platform and send the 2nd Ks_NAF key to described trusted service management platform;
After described trusted service management platform receives the 2nd Ks_NAF key that guide service function platform sends, send NAF_ID information to described credible execution environment server;
NAF_ID information is sent to processing unit by described credible execution environment server, to trigger described processing unit according to NAF_ID information generation the oneth Ks_NAF key;
Described processor receives the acquisition NAF_ID information that described credible execution environment server sends;
Described processor generates a Ks_NAF key according to described NAF_ID information, and utilizes a described Ks_NAF key to complete the initialization procedure of credible execution environment.
13. a credible execution environment server, it is characterised in that described credible execution environment server includes the first acquiring unit, determines unit, the first transmitting element, first receive unit and the second transmitting element, wherein:
Described first acquiring unit, for obtaining the international mobile subscriber identity for showing user identity;
Described determine unit, for determining according to described international mobile subscriber identity, the address information of trusted service management platform;
Described first transmitting element, for the address information according to described trusted service management platform, is sent to trusted service management platform by described international mobile subscriber identity, in order to triggers described trusted service management platform and obtains NAF_ID information;
Described first receives unit, for receiving the NAF_ID information that described trusted service management platform sends;
Described second transmitting element, for NAF_ID information is sent to processing unit, to trigger described processing unit according to NAF_ID information generation the oneth Ks_NAF key, described processing unit runs and has described credible execution environment.
14. credible execution environment server according to claim 13, it is characterized in that, described credible execution environment server also includes first and sets up unit, is used for setting up the first escape way, and described first escape way is the escape way between described credible execution environment server and processor;
Accordingly, described first acquiring unit, for by described first escape way, obtaining the international mobile subscriber identity for showing user identity;
Described second transmitting element, for being sent to processing unit by described first escape way by NAF_ID information.
15. the credible execution environment server according to claim 13 or 14, it is characterized in that, described credible execution environment server also includes second and sets up unit, for setting up the second escape way, described second escape way is the escape way between described credible execution environment server and described trusted service management platform;
Accordingly, described first transmitting element, for the address information according to described trusted service management platform, by described second escape way, described international mobile subscriber identity is sent to trusted service management platform;
Accordingly, described first receives unit, for receiving, by described second escape way, the NAF_ID information that described trusted service management platform sends.
16. a processor, it is characterised in that described processor includes second acquisition unit, the 3rd transmitting element, the second reception unit, generates unit and the first initialization unit, wherein:
Described second acquisition unit, for obtaining the international mobile subscriber identity for showing user identity;
Described 3rd transmitting element, for being sent to credible execution environment server by described international mobile subscriber identity, in order to triggers described credible execution environment server and obtains NAF_ID information;
Described second receives unit, for receiving the acquisition NAF_ID information that described credible execution environment server sends;
Described generation unit, for generating a Ks_NAF key according to described NAF_ID information;
Described first initialization unit, for utilizing a described Ks_NAF key to complete the initialization procedure of credible execution environment.
17. processor according to claim 16, it is characterised in that described first initialization unit, for utilizing a Ks_NAF key to complete the certification between trusted service management platform, thus completing the initialization procedure of credible execution environment.
18. the processor according to claim 16 or 17, it is characterized in that, described processor also includes the 3rd and sets up unit, is used for setting up the first escape way, and described first escape way is the escape way between described processor and described credible execution environment server and processor;
Accordingly, described 3rd transmitting element, for being sent to credible execution environment server by described first escape way by described international mobile subscriber identity;
Accordingly, described second receives unit, for receiving, by described first escape way, the acquisition NAF_ID information that described credible execution environment server sends.
19. a trusted service management platform, it is characterised in that described trusted service management platform includes the 3rd reception unit, verification unit, the 3rd acquiring unit, the 4th transmitting element and the 5th reception unit, wherein:
Described 3rd receives unit, for receiving the international mobile subscriber identity that credible execution environment server sends;
Described verification unit, for verifying the effectiveness of described international mobile subscriber identity;
Described 3rd acquiring unit, for when verifying described international mobile subscriber identity and being effective, obtaining NAF_ID information;
Described 4th transmitting element, for being sent to guide service function platform by described NAF_ID information and described international mobile subscriber identity, in order to triggers described guide service function platform and sends the 2nd Ks_NAF key to described trusted service management platform;
Described 5th transmitting element, after receiving the 2nd Ks_NAF key that guide service function platform sends, sends NAF_ID information to described credible execution environment server.
20. trusted service management platform according to claim 19, it is characterized in that, described trusted service management platform also includes the 6th transmitting element, for when verifying described international mobile subscriber identity failure, it is sent to described credible execution environment server, in order to prompting each side initializes unsuccessfully by verifying failed information.
21. trusted service management platform according to claim 19, it is characterized in that, described trusted service management platform also includes the 4th and sets up unit, for setting up the second escape way, described second escape way is the escape way between described trusted service management platform and described credible execution environment server;
Accordingly, the described 3rd receives unit, for by described second escape way, receiving the international mobile subscriber identity that credible execution environment server sends;
Accordingly, described 5th transmitting element, after receiving the 2nd Ks_NAF key that guide service function platform sends, send NAF_ID information by described second escape way to described credible execution environment server.
22. the trusted service management platform according to any one of claim 19 to 21, it is characterised in that described trusted service management platform also includes the 4th reception unit, judging unit and the second initialization unit, wherein:
Described 4th receives unit, for the Ks_NAF key that receiving area's haircut is sent;
Described judging unit, for judging that whether a described Ks_NAF key is identical with the 2nd Ks_NAF key of self, obtains the first judged result;
Described second initialization unit, for when described first judged result shows that a described Ks_NAF key is identical with the 2nd Ks_NAF key of self, completing the initialization procedure of credible execution environment.
23. method according to claim 22, it is characterized in that, described trusted service management platform also includes the 7th transmitting element, for when described first judged result shows a described Ks_NAF key and the 2nd Ks_NAF key of self differs, initialize unsuccessfully, and send initialization failure to processor.
24. the device initializing credible execution environment, it is characterised in that described device includes processor, credible execution environment server and trusted service management platform, wherein:
Described processor, for obtaining the international mobile subscriber identity for showing user identity;
Described credible execution environment server, is used for receiving described processor and sends described international mobile subscriber identity;
Described processor, for being sent to credible execution environment server by described international mobile subscriber identity, in order to triggers described credible execution environment server and obtains NAF_ID information;
Described credible execution environment server, for determining according to described international mobile subscriber identity, the address information of trusted service management platform;
Described credible execution environment server, for the address information according to described trusted service management platform, is sent to trusted service management platform by described international mobile subscriber identity, in order to triggers described trusted service management platform and obtains NAF_ID information;
Described trusted service management platform, for receiving the international mobile subscriber identity that credible execution environment server sends;
Described trusted service management platform, for verifying the effectiveness of described international mobile subscriber identity;
When verifying described international mobile subscriber identity and being effective, described trusted service management platform, it is used for obtaining NAF_ID information;
Described trusted service management platform, for being sent to guide service function platform by described NAF_ID information and described international mobile subscriber identity, in order to triggers described guide service function platform and sends the 2nd Ks_NAF key to described trusted service management platform;
Described trusted service management platform, after receiving the 2nd Ks_NAF key that guide service function platform sends, sends NAF_ID information to described credible execution environment server;
Described credible execution environment server, for being sent to processing unit by NAF_ID information, to trigger described processing unit according to NAF_ID information generation the oneth Ks_NAF key;
Described processor, for receiving the acquisition NAF_ID information that described credible execution environment server sends;
Described processor, for generating a Ks_NAF key according to described NAF_ID information, and utilizes a described Ks_NAF key to complete the initialization procedure of credible execution environment.
CN201410779238.9A 2014-12-15 2014-12-15 A kind of method and device initializing credible performing environment, equipment Active CN105792167B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410779238.9A CN105792167B (en) 2014-12-15 2014-12-15 A kind of method and device initializing credible performing environment, equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410779238.9A CN105792167B (en) 2014-12-15 2014-12-15 A kind of method and device initializing credible performing environment, equipment

Publications (2)

Publication Number Publication Date
CN105792167A true CN105792167A (en) 2016-07-20
CN105792167B CN105792167B (en) 2019-06-25

Family

ID=56374800

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410779238.9A Active CN105792167B (en) 2014-12-15 2014-12-15 A kind of method and device initializing credible performing environment, equipment

Country Status (1)

Country Link
CN (1) CN105792167B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106954211A (en) * 2017-03-08 2017-07-14 广东欧珀移动通信有限公司 A kind of key wiring method and mobile terminal
CN111034118A (en) * 2017-09-18 2020-04-17 华为技术有限公司 Secure delegation credentials in third party networks
CN113518349A (en) * 2020-10-23 2021-10-19 中国移动通信有限公司研究院 Service management method, device, system and storage medium
CN113572789A (en) * 2021-08-17 2021-10-29 四川启睿克科技有限公司 Secret-free login system and method for Internet of things intelligent equipment application

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110055565A1 (en) * 2008-05-23 2011-03-03 Shingo Murakami Ims user equipment, control method thereof, host device, and control method thereof.
CN102238540A (en) * 2010-04-27 2011-11-09 中国移动通信集团公司 Method, device and system for updating key of general guide architecture
CN102413464A (en) * 2011-11-24 2012-04-11 杭州东信北邮信息技术有限公司 GBA (General Bootstrapping Architecture)-based secret key negotiation system and method of telecommunication capability open platform
CN102934118A (en) * 2010-06-10 2013-02-13 瑞典爱立信有限公司 User equipment and control method therefor
WO2013158977A1 (en) * 2012-04-20 2013-10-24 T-Mobile Usa, Inc. Secure environment for subscriber device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110055565A1 (en) * 2008-05-23 2011-03-03 Shingo Murakami Ims user equipment, control method thereof, host device, and control method thereof.
CN102238540A (en) * 2010-04-27 2011-11-09 中国移动通信集团公司 Method, device and system for updating key of general guide architecture
CN102934118A (en) * 2010-06-10 2013-02-13 瑞典爱立信有限公司 User equipment and control method therefor
CN102413464A (en) * 2011-11-24 2012-04-11 杭州东信北邮信息技术有限公司 GBA (General Bootstrapping Architecture)-based secret key negotiation system and method of telecommunication capability open platform
WO2013158977A1 (en) * 2012-04-20 2013-10-24 T-Mobile Usa, Inc. Secure environment for subscriber device

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106954211A (en) * 2017-03-08 2017-07-14 广东欧珀移动通信有限公司 A kind of key wiring method and mobile terminal
WO2018161538A1 (en) * 2017-03-08 2018-09-13 广东欧珀移动通信有限公司 Encryption key writing method and mobile terminal
CN106954211B (en) * 2017-03-08 2019-08-20 Oppo广东移动通信有限公司 A kind of key wiring method and mobile terminal
CN111034118A (en) * 2017-09-18 2020-04-17 华为技术有限公司 Secure delegation credentials in third party networks
CN111034118B (en) * 2017-09-18 2021-08-31 华为技术有限公司 Secure delegation credentials in third party networks
CN113518349A (en) * 2020-10-23 2021-10-19 中国移动通信有限公司研究院 Service management method, device, system and storage medium
CN113572789A (en) * 2021-08-17 2021-10-29 四川启睿克科技有限公司 Secret-free login system and method for Internet of things intelligent equipment application

Also Published As

Publication number Publication date
CN105792167B (en) 2019-06-25

Similar Documents

Publication Publication Date Title
CN106161359B (en) It authenticates the method and device of user, register the method and device of wearable device
CN108989346B (en) Third-party valid identity escrow agile authentication access method based on account hiding
US7558957B2 (en) Providing fresh session keys
CN108462710B (en) Authentication and authorization method, device, authentication server and machine-readable storage medium
US20170208049A1 (en) Key agreement method and device for verification information
CN106850209A (en) A kind of identity identifying method and device
CN102333072B (en) Network banking trusted transaction system and method based on intelligent terminal
WO2005053263A3 (en) Method for the authentication of applications
CN104199657B (en) The call method and device of open platform
CN105450406A (en) Data processing method and device
CN104199654A (en) Open platform calling method and device
CN111131416A (en) Business service providing method and device, storage medium and electronic device
CN106936774A (en) Authentication method and system in credible performing environment
CN101841525A (en) Secure access method, system and client
KR20190008333A (en) A processing method for preventing a replication attack, and a server and a client
CN102685730B (en) Method for transmitting context information of user equipment (UE) and mobility management entity (MME)
CN105262748A (en) Wide area network user terminal identity authentication method and system
CN103905194A (en) Identity traceability authentication method and system
CN104935435A (en) Login methods, terminal and application server
CN107113613A (en) Server, mobile terminal, real-name network authentication system and method
CN105792167A (en) Method, device and apparatus for initializing trusted execution environment
CN106789024A (en) A kind of remote de-locking method, device and system
CN107204985A (en) Purview certification method based on encryption key, apparatus and system
CN103179176B (en) The call method that web applies under cloud/cluster environment, device and system
CN107277017A (en) Purview certification method, apparatus and system based on encryption key and device-fingerprint

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant