CN105095696B - Method, system and the equipment of safety certification are carried out to application program - Google Patents

Method, system and the equipment of safety certification are carried out to application program Download PDF

Info

Publication number
CN105095696B
CN105095696B CN201510357652.5A CN201510357652A CN105095696B CN 105095696 B CN105095696 B CN 105095696B CN 201510357652 A CN201510357652 A CN 201510357652A CN 105095696 B CN105095696 B CN 105095696B
Authority
CN
China
Prior art keywords
application program
trusted application
secret key
trusted
additional information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510357652.5A
Other languages
Chinese (zh)
Other versions
CN105095696A (en
Inventor
叶建隆
成亮
刘明
孙发龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Samsung Electronics China R&D Center
Samsung Electronics Co Ltd
Original Assignee
Samsung Electronics China R&D Center
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Samsung Electronics China R&D Center, Samsung Electronics Co Ltd filed Critical Samsung Electronics China R&D Center
Priority to CN201510357652.5A priority Critical patent/CN105095696B/en
Publication of CN105095696A publication Critical patent/CN105095696A/en
Application granted granted Critical
Publication of CN105095696B publication Critical patent/CN105095696B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
    • G06F21/126Interacting with the operating system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses method, system and equipment that safety certification is carried out to application program, wherein this method includes:Trusted application package is obtained from trusted application program Distributor, is transferred in trusted execution environments, is unpacked in trusted execution environments, obtain trusted application program and additional information;Obtain the decryption secret key of trusted application program and additional information;Using decryption secret key decryption trusted application program and additional information, the trusted application program after being decrypted and additional information;Single input digest algorithm operation is carried out to the trusted application program after decryption, obtains summary info;Using the signing messages in the public key decryptions additional information in additional information, original digest information is obtained;Judge whether the original digest information and the summary info are consistent, if it is, through safety certification, loading and running trusted application program in trusted execution environments.The present invention program can improve the safety of certification.

Description

Method, system and the equipment of safety certification are carried out to application program
Technical field
The present invention relates to secure authentication technologies, more particularly to carry out the method for safety certification, system to application program and set It is standby.
Background technology
With popularizing for the smart machines such as smart mobile phone, tablet computer and smart television, in operation and smart machine Explosive growth is also presented in the quantity of application program.In order to safeguard that the equity of software developer, the distribution of application program are required for By safety certification.Smart machine usually only allows to install application program through safety certification, and existing safety verification mistake Cheng Feichang is simple, only ensures the copyright of the integrality and software developer of application program.
At the same time, the use scope of application program is also increasingly wider, such as audio and video playback, e-payment and equipment Between content it is shared etc..The key algorithm (code segment) and sensitive information (data segment) of application program are under above application scene Belong to sensitive information, cannot distribute publicly, it is necessary to be protected.
And the prior art only carries out simple safety verification to application program, it is not further to application program content itself Safety protection and certification are taken, key algorithm and sensitive information may be caused illegally to be stolen by hacker, causes huge loss.
Invention content
The present invention provides a kind of method carrying out safety certification to application program, this method can improve the safety of certification Property.
The present invention provides a kind of system carrying out safety certification to application program, which can improve the safety of certification Property.
The present invention provides a kind of smart machines carrying out safety certification to application program, which, which can improve, recognizes The safety of card.
A method of safety certification being carried out to application program, this method includes:
Trusted application package is obtained from trusted application program Distributor, trusted application package is shifted It into trusted execution environments, is unpacked in trusted execution environments, obtains trusted application program and additional information;
Obtain the decryption secret key of trusted application program and additional information;
Using decryption secret key decryption trusted application program and additional information, trusted application program after decrypt with Additional information;
Single input digest algorithm operation is carried out to the trusted application program after decryption, obtains summary info;
Using the signing messages in the public key decryptions additional information in additional information, original digest information is obtained;
Judge whether the original digest information and the summary info are consistent, if it is, through safety certification, can Trust and trusted application program is loaded and run in performing environment.
A kind of system carrying out safety certification to application program, the system include smart machine and trusted application program point Server is sent out, the smart machine includes trusted application program management unit and Security Authentication Service unit, safety certification clothes Business unit is located in trusted execution environments;
The trusted application program management unit obtains trusted application journey from trusted application program Distributor Sequence packet is sent to the Security Authentication Service unit;
The Security Authentication Service unit receives the trusted application journey that the trusted application program management unit is sent Sequence packet obtains encrypted trusted application program and additional information after being unpacked to it;Obtain trusted application program and additional letter The decryption secret key of breath;Using decryption secret key decryption trusted application program and additional information, the trusted application after being decrypted Program and additional information;Single input digest algorithm operation is carried out to the trusted application program after decryption, obtains summary info;Profit With the signing messages in the public key decryptions additional information in additional information, original digest information is obtained;Judge the original digest Whether information is consistent with the summary info, if it is, through safety certification, load and operation trusted application program;
The trusted application program Distributor is according to the request of the trusted application program management unit It provides trusted application package.
A kind of smart machine carrying out safety certification to application program, which includes trusted application program management Unit and Security Authentication Service unit, Security Authentication Service unit are located in trusted execution environments;
The trusted application program management unit obtains trusted application journey from trusted application program Distributor Sequence packet is sent to the Security Authentication Service unit;
The Security Authentication Service unit receives the trusted application journey that the trusted application program management unit is sent Sequence packet obtains trusted application program and additional information after being unpacked to it;Obtain the solution of trusted application program and additional information Close secret key;Using decryption secret key decryption trusted application program and additional information, trusted application program after decrypt with Additional information;Single input digest algorithm operation is carried out to the trusted application program after decryption, obtains summary info;Using additional The signing messages in public key decryptions additional information in information, obtains original digest information;Judge the original digest information with Whether the summary info is consistent, if it is, through safety certification, load and operation trusted application program.
From said program as can be seen that in the present invention, trusted application is obtained from trusted application program Distributor Program bag, trusted application package is transferred in trusted execution environments, and trusted application program and attached is obtained after unpacking Add information;Obtain the decryption secret key of trusted application program and additional information;Trusted application program is decrypted using decryption secret key And additional information, the trusted application program after being decrypted and additional information;Trusted application program after decryption is carried out Single input digest algorithm operation, obtains summary info;Using the signing messages in the public key decryptions additional information in additional information, Obtain original digest information;Judge whether the original digest information and the summary info are consistent, if it is, passing through safety Certification loads and runs trusted application program in trusted execution environments.Using the present invention program, to trusted application journey Safety certification, load and the operation of sequence are all completed in trusted execution environments, ensure that the safety of certification.Also, it is credible The transmission of application program and additional information between trusted application program Distributor and intelligent terminal is all to encrypt Mode exist, ensure that the safety of trusted application program;The additional information of trusted application program simultaneously, including signature Information and public key are also encrypted, enhance the integrality of trusted application program;To further improve the safety of certification Property.
Description of the drawings
Fig. 1 is the method schematic flow chart that the present invention carries out application program safety certification;
Fig. 2 is the example flow diagram that trusted application program is submitted at present invention exploitation end;
Fig. 3 is the example flow diagram that smart machine of the present invention carries out trusted application program safety certification;
Fig. 4 is the system structure diagram that the present invention carries out application program safety certification;
Fig. 5 is the system architecture schematic diagram example that the present invention carries out application program complete certification.
Specific implementation mode
To make the objectives, technical solutions, and advantages of the present invention clearer, with reference to embodiment and attached drawing, to this Invention is further described.
In the present invention, ring is executed by trusted is transferred to the safety certification of trusted application program, load and operation Completed in border, also, trusted application and additional information trusted application program Distributor and intelligent terminal it Between transmission be all to exist in a manner of encrypted, to, improve the safety of certification.
Referring to Fig. 1, the method schematic flow chart of safety certification is carried out to application program for the present invention comprising following step Suddenly:
Step 101, trusted application package is obtained from trusted application program Distributor, by trusted application journey Sequence packet is transferred in trusted execution environments, is unpacked in trusted execution environments, and trusted application program and attached is obtained Add information.
Present invention employs carry out safety certification to application program from existing different scheme to adopt to be distinguished It is known as trusted application program with the object that the present invention program is authenticated, the object being authenticated using existing scheme is known as Common applications.
In the present invention, after trusted application program Distributor obtains trusted application package, trusted is answered It is transferred in trusted execution environments with program bag, trusted application program can then be pacified in trusting performing environment Full certification.
Step 102, the decryption secret key of trusted application program and additional information is obtained.
Decryption secret key can be that the arbitrarily decryption arranged between intelligent terminal and trusted application program Distributor is secret Key;When needing, intelligent terminal directly extracts advance scheduled decryption secret key.It is also possible that when needed, according to what is made an appointment Numerical procedure operation obtains required decryption secret key;Such as:
Smart machine obtains local safety and shares secret key;
Smart machine carries out the Universally Unique Identifier (UUID) of trusted application program and the shared secret key of safety how defeated Enter digest algorithm calculating, obtains the decryption secret key of trusted application program and additional information.
Multi input digest algorithm, that is, have multiple input, and digest algorithm operation is carried out to multiple input.It is specific right in the present invention UUID and safety two inputs of shared secret key carry out digest algorithm operation, obtain decryption secret key;The multi input digest algorithm is for example For hash operation message authentication code (HMAC, Hash-based Message Authentication Code) algorithm.
The safety is shared secret key and is stored in the firmware of trusted execution environments with plaintext version, alternatively, being added by hardware It is stored in the firmware of trusted execution environments after close;
If the shared secret key of safety is stored in the firmware of trusted execution environments in such a way that hardware is encrypted, using hard Safety after part decryption engine is decrypted shares secret key, and the safety after decryption is shared secret key and is transported for multi input digest algorithm It calculates;Otherwise safety is directly shared into secret key for multi input digest algorithm operation.
The shared secret key of safety can be present in the form of plaintext in the firmware of trusted execution environments, can also be by hard It is present in the firmware of trusted execution environments after part encryption, the secret key that encryption safe shares secret key is hardware secret key, this hardware Secret key can only be obtained by hardware cryptographic engine.Accordingly even when the firmware of trusted execution environments is illegally cracked by hacker, Hei Keye The shared secret key of safety can not be obtained, the shared secret key safety of safety is improved.
For being related to sharing the situation of secret key safely, the method for the present invention further includes:
Authorization center receives the binding information that production firm provides, and the binding information includes that the safety of smart machine is shared Correspondence between secret key and smart machine model, same type smart machine have unique smart machine model;
Authorization center preserves the binding information received.Correspondingly, distribute from trusted application program described in step 101 and service Device obtains trusted application package, including:
Smart machine sends smart machine model and trusted to be asked to trusted application program Distributor The UUID of application program;
Trusted application program Distributor sends the secret key comprising smart machine model to authorization center and asks;
Authorization center finds out corresponding safety in the binding relationship according to smart machine model and shares secret key, Xiang Ke Trusted application Distributor returns to the shared secret key of safety;
Trusted application program Distributor uses UUID and the shared secret key of safety, to trusted application program and adds Information carries out multi input digest algorithm operation, obtains the encryption secret key for encrypting trusted application program and additional information;
Using encryption secret key encryption trusted application program and additional information, wherein additional information includes signing messages and tests The public key of signed certificate name;
Trusted application program Distributor beats encrypted trusted application program and corresponding additional information It is bundled into trusted application package, trusted application package is returned into smart machine;
Smart machine downloads trusted application package.
Further, can also include UUID in the secret key request;After authorization center receives secret key request, this method is also Including:
Authorization center verifies smart machine model and UUID, after verification effectively, executes described according to smart machine Model finds out the step of corresponding safety shares secret key in the binding relationship.
Step 103, it is answered using decryption secret key decryption trusted application program and additional information, the trusted after being decrypted With program and additional information.
In the present invention, trusted application program and additional information are all encrypted, and need to first calculate decryption secret key, are used Decrypting secret key pair, it is decrypted.
Step 104, single input digest algorithm operation is carried out to the trusted application program after decryption, obtains summary info.
Single input digest algorithm, i.e., only there are one inputs, and digest algorithm operation is carried out to the input.It is specific right in this step This input of trusted application program after decryption carries out digest algorithm operation, obtains decryption secret key;Single input abstract is calculated Method is, for example, hash algorithm.
Step 105, using the signing messages in the public key decryptions additional information in additional information, original digest letter is obtained Breath.
Step 106, judge whether the original digest information and the summary info are consistent, if it is, passing through safety Certification loads and runs trusted application program in trusted execution environments.
In the present invention, trusted application package is obtained from trusted application program Distributor, by trusted application Program bag is transferred in trusted execution environments, and trusted application program and additional information are obtained after unpacking;Trusted is obtained to answer With the decryption secret key of program and additional information;Using decryption secret key decryption trusted application program and additional information, decrypted Trusted application program afterwards and additional information;Single input digest algorithm operation is carried out to the trusted application program after decryption, Obtain summary info;Using the signing messages in the public key decryptions additional information in additional information, original digest information is obtained;Sentence Whether the original digest information of breaking and the summary info are consistent, if it is, through safety certification, ring is executed in trusted Trusted application program is loaded and run in border.Using the present invention program, to the safety certification of trusted application program, load and Operation is all completed in trusted execution environments, ensure that the safety of certification.Also, trusted application and additional information Transmission between trusted application program Distributor and intelligent terminal is existed in a manner of encrypted, ensure that credible Appoint the safety of application program;Simultaneously trusted application program additional information, including signing messages and public key be also it is encrypted, Enhance the integrality of trusted application program;To further improve the safety of certification.
In the present invention, trusted application program Distributor is supplied to the trusted application program of user and additional letter Breath uploads to trusted application program Distributor after the completion of it can in advance write at the beginning.Specifically:
It develops end and asks a UUID from authorization center;
Exploitation end carries out single input digest algorithm operation to the trusted application program write, and obtains summary info;It obtains Random unsymmetrical key pair is encrypted operation to summary info using the private key of unsymmetrical key pair, obtains trusted and answer With the signing messages of program;Additional information is formed by the public key of signing messages and asymmetric secret key;
Trusted application program, additional information and the UUID that ask are submitted into trusted application program and divided in exploitation end Send out server.
The flow for developing end from authorization center acquisition UUID can be specific as follows:
It develops end and sends identification code application request to authorization center;
Authorization center carries out authentication, and the UUID of trusted application program is fed back in certification to exploitation end after passing through, each A trusted application program all corresponds to a UUID.
Below by the flow of Fig. 2-3, safety certifying method of the present invention is illustrated.
Referring to Fig. 2, the example flow diagram of trusted application program is submitted for present invention exploitation end, in figure:
Software developer E100:Software developer is that trusted application code is write, tests, to trusted application journey Sequence authorization center application Universally Unique Identifier, and submit trusted application package to distribute to trusted application program and service The main body of device.
Digital signature service E102:For obtaining the asymmetric secret key pair for generating and verifying signature;Being obtained by Hash calculation can The summary info of trusted application;Signing messages is generated using the private key encryption summary info of asymmetric secret key pair.
Trusted application program authorization center E104 (abbreviation authorization center E104 in figure):It is responsible for software developer's account It issues;The distribution of trusted application program Universally Unique Identifier.
Trusted application program Distributor E106:The trusted application package that software developer submits is received, and And safeguard a Universally Unique Identifier to trusted application package mapping table.
Wherein, software developer E100 and Digital signature service E102, composition exploitation end, it is common complete trusted application program and Additional information is write.
The flow of Fig. 2 includes the following steps:
Step S200:Software developer E100 applies for the exploitation for submitting trusted application program to authorization center E104 Account, and the relevant authentication information for issuing exploitation account is provided.
Step S202:Authorization center E104 examines the account application of software developer E100, according to software development It holds the relevant authentication information provided to E100 to be confirmed whether it is one exploitation account of its distribution to issue if by title examination One exploitation account of hair gives software developer E100, and the account information for developing end is stored in local data base.
Step S204:The exploitation account request authorization center E104 distribution that software developer E100 is obtained according to step S202 One UUID.
Step S206:Software developer E100 to the trusted application program that has write using Digital signature service E102 into Row Hash operation obtains the summary info of trusted application program.
Step S208:Software developer E100 obtains the unsymmetrical key pair randomly generated using Digital signature service E102, non- Private key in symmetrical secret key pair is for generating signing messages, and public key is for verifying signing messages.
Step S210:Software developer E100 is believed using the private key encryption step S206 that step S208 the is generated abstracts obtained Breath generates signing messages, and the public key of this signing messages and step S208 is formed additional information.
Step S212:Software developer E100 carries out the additional information generated in trusted application program and step S210 It is packaged, using the UUID of the step S202 exploitation accounts obtained and step S204 applications, distributes to trusted application program and service Device E106, which is sent, submits request.
Step S214:Trusted application program Distributor E106 receives the submission request of software developer E100, and To the validity of authorization center E104 inquiry exploitation account information and Universally Unique Identifier.
Step S216:Authorization center E104 inquires exploitation account in the database and UUID whether there is, if it is present It is determined as effective information, and query result is replied into trusted application program Distributor E106.
Step S218:After trusted application program Distributor E106 confirms exploitation account and UUID validity, into One step checks whether trusted application program and additional information have malicious code, and software developer is then received by safety inspection The trusted application program and additional information that E100 is submitted, and increase a trusted application package and general unique identification The correspondence of code is to mapping table.
After being checked, if trusted application program and additional information do not contain malicious code, pass through safety inspection.
Further, step S202 is developed in account verification process, and software developer E100 must provide sufficient proof It is legal to need the trusted application program developed, because trusted application program runs on trusted execution environments.Such as Software development end is the member of some standardization body or the employee of some content and service provider.
Further, step S214 first can before developing account and UUID validity to authorization center E104 inquiries It checks whether UUID has existed inside mapping table, if it is present illustrating that the UUID had been submitted, directly returns wrong Mistake gives software developer E100.
Further, malicious code is checked in step S218 by manually carrying out, therefore software developer E100 must Complete trusted application program source code must be provided.Malicious code generally comprises abnormal operation hardware decryption engine, read-write decoding The video memory etc. of device or display module.
In the present embodiment, it is contemplated that the security requirement of trusted application program is very high, it is necessary to software development end Identity information and the trusted application program source code of submission do close inspection, can prevent the trusted application journey of malice in this way Sequence attacks trusted execution environments.
It is the example flow diagram that smart machine of the present invention carries out trusted application program safety certification, packet referring to Fig. 3 Include following steps:
Step S302:Secret key is shared using the safety in the corresponding UUID of trusted application program and trusted execution environments HMAC calculating is carried out, the decryption secret key of decryption trusted application program and additional information is obtained.
Step S304:The decryption secret key decryption trusted application program that is obtained using step S302 and corresponding additional Information, the trusted application program after being decrypted and corresponding additional information.
Step S306:Hash operation is carried out to the trusted application program after decryption and obtains summary info 1.
Step S308:Using the signing messages in the public key decryptions additional information in additional information, summary info 2 is obtained.
Step S310:Comparison step S306 obtains the summary info 2 that summary info 1 and step S308 are obtained, and judges whether It is equal, trusted application program is loaded and activated if equal, otherwise returns to error code.
Further, in step S302, if the shared secret key of safety is present in trusted execution environments in the form of plaintext In, it then be used directly;If being present in trusted execution environments in such a way that hardware is encrypted, pass through hardware decryption engine solution The close cryptographically existing shared secret key of safety, obtains the decryption secret key of decryption trusted application program and additional information.
Further, in step S304, trusted application program can be decrypted in a manner of software or hardware and is added Information, whether this supports hardware decryption engine depending on smart machine, can effectively improving performance using hardware decryption engine.
Further, in step S308, public key and signing messages are extracted from additional information, are carried by software development end A kind of mode of the copyright of the integrality and protection author for checking trusted application program supplied.
Further, in step S310, the trusted application program activated possesses independent address space, and safety is recognized All operation modules are all isolation during card.
Further, the processing procedure of above-mentioned all steps is all completed in trusted execution environments, and pilot process generates Ephemeral data and final trusted application code section and data segment be temporarily stored in secure memory, secure memory can only be by Module read-write in trusted execution environments.
Referring to Fig. 4, the system structure diagram of complete certification is carried out to application program for the present invention, which includes intelligence Equipment and trusted application program Distributor, the smart machine include that trusted application program management unit and safety are recognized Service unit is demonstrate,proved, Security Authentication Service unit is located in trusted execution environments;Trusted application program management unit can be located at In non-trusted performing environment, it may be alternatively located in trusted execution environments;
The trusted application program management unit obtains trusted application journey from trusted application program Distributor Sequence packet is sent to the Security Authentication Service unit;
The Security Authentication Service unit receives the trusted application journey that the trusted application program management unit is sent Sequence packet obtains trusted application program and additional information after being unpacked to it;Obtain the solution of trusted application program and additional information Close secret key;Using decryption secret key decryption trusted application program and additional information, trusted application program after decrypt with Additional information;Single input digest algorithm operation is carried out to the trusted application program after decryption, obtains summary info;Using additional The signing messages in public key decryptions additional information in information, obtains original digest information;Judge the original digest information with Whether the summary info is consistent, if it is, through safety certification, load and operation trusted application program;
The trusted application program Distributor is according to the request of the trusted application program management unit It provides trusted application package.
Further, which further includes authorization center, receives binding information, and the binding information includes smart machine The shared correspondence between secret key and smart machine model of safety, same type smart machine have unique smart machine model; Preserve the binding information received.Some smart machine manufacturer may have multiple and different unit types, unit type can root Formulated according to certain rule, for example, system on chip version, on condition that must assure that all same types of equipment manufacturer are set One and only one standby unique model.
Further, the trusted application program management unit, under being sent to trusted application program Distributor Request is carried, it is described to download UUID of the request comprising smart machine model and trusted application program to be asked;From it is described can After trusted application Distributor downloads trusted application package, it is sent to the Security Authentication Service unit;
The trusted application program Distributor sends the secret key for including smart machine model to the authorization center Request receives the safety that the authorization center returns and shares secret key;Using UUID and the shared secret key of safety, to trusted application journey Sequence and additional information carry out multi input digest algorithm operation, obtain the encryption for encrypting trusted application program and additional information Secret key;Using encryption secret key encryption trusted application program and additional information, wherein additional information includes signing messages and verification The public key of signature;Encrypted trusted application program and corresponding additional information are packaged into trusted application package, Trusted application package is returned into smart machine;
The authorization center receives the secret key request from the trusted application program Distributor, according to intelligence Unit type finds out corresponding safety in the binding relationship and shares secret key, distributes to the trusted application program and services Device returns to the shared secret key of safety.
Further, which further includes exploitation end, and a UUID is asked from authorization center;Trusted application to writing Program carries out single input digest algorithm operation, obtains summary info;Random unsymmetrical key pair is obtained, using unsymmetrical key To private key operation is encrypted to summary info, obtain the signing messages of trusted application program;By signing messages and non-right The public key of secret key is claimed to form additional information;Trusted application program, additional information and the UUID that asks are submitted to credible Appoint application program Distributor.
Further, the trusted application program management unit includes request module and receiving module, and the safety is recognized Card service unit is located in trusted execution environments, including Packet analyzing service module, decryption service module, signature verification service mould Block and process load service module;
The request module sends to trusted application program Distributor and downloads request;
The receiving module is sent to after trusted application program Distributor downloads trusted application package The Packet analyzing service module;
The Packet analyzing service module, is decoded trusted application package, obtains trusted application program and attached Add information, is sent to the decryption service module;
The decryption service module obtains the decryption secret key of trusted application program and additional information;Using decryption secret key Trusted application program and additional information, the trusted application program after being decrypted and additional information are decrypted, is sent to described Signature verification service module;
The signature verification service module carries out single input digest algorithm operation to the trusted application program after decryption, Obtain summary info;Using the signing messages in the public key decryptions additional information in additional information, original digest information is obtained;Sentence Whether the original digest information of breaking and the summary info are consistent, if it is, through safety certification, by trusted application journey Sequence is sent to the process load service module;
The process loads service module, load and operation trusted application program.
Further, the Packet analyzing service module includes secret key submodule, and the decryption service module includes decryption Module;
The secret key submodule obtains local safety and shares secret key, is sent to the decryption submodule;
The Universally Unique Identifier (UUID) of trusted application program and safety are shared secret key by the decryption submodule, Multi input digest algorithm calculating is carried out, the decryption secret key of trusted application program and additional information is obtained.
The present invention program is suitable for the embedded device with security extension, includes but are not limited to smart mobile phone, tablet Computer, smart television, TV set-top box etc..Main body involved by trusted application authentication method includes software development Person, smart machine manufacturer, trusted application program authorization center and trusted application program Distributor.
Using the present invention program, software on the one hand ensure that by encryption to trusted application program and signature verification Safety and integrality;On the other hand the binding that secret key and Universally Unique Identifier are decrypted by trusted application program, increases Isolation between trusted application program, any one is credible appoint program decryption secret key leakage do not interfere with other can The safety of trusted application;The binding that secret key and unit type are decrypted finally by trusted application program, increases intelligence Isolation between equipment, shared cracking for secret key will not spread to other models to some unit type safely, increase safety The robustness of shared secret key.
Referring to Fig. 5, the system architecture schematic diagram example of complete certification, the system architecture are carried out to application program for the present invention Include mainly three functional entitys:Trusted application program authorization center 501 (abbreviation authorization center 501 in Fig. 5), trusted are answered With program distribution server 502 (abbreviation Distributor 502 in Fig. 5) and smart machine 503.Wherein smart machine 503 is transported again Go two kinds of code execution environments:Non-trusted performing environment 504 and trusted execution environments 508, it is corresponding respectively that safety is supported to expand Open up the non-secure states and safe condition of processor.
Trusted application program management unit 505 is operated in non-trusted performing environment, is mainly responsible for and is answered with trusted With the Security Authentication Service list in program distribution server (abbreviation Distributor 502 in Fig. 5) and trusted execution environments Data interaction between member 513, trusted application program management unit 505 include:Request module 506 and receiving module 507.Please The model and the Universally Unique Identifier needed for trusted application program management unit 505 that modulus block 506 collects current device, to Distributor 502 sends the download request of trusted application package;Receiving module 507 is responsible for receiving Distributor 502 The trusted application package of offer, and the Security Authentication Service unit 513 being sent in trusted execution environments.
Security Authentication Service unit 513 operates in trusted execution environments, and main task is:It receives from non-trusted execution The trusted application package that the trusted application program management unit 505 of environment is sent;Parse trusted application package, solution Close trusted application program and additional information;Utilize the signing messages in the public key verifications additional information in additional information;Load And the trusted application program of activation through safety certification.
Security Authentication Service unit 513 with lower module by being formed:Packet analyzing service module 509, decryption service module 510, Signature recognizes validation service module 511 and process load service module 512.Packet analyzing service module 509, which is responsible for receiving, comes from non-letter The trusted application package for appointing the trusted application program management unit 505 of performing environment to send;Parse trusted application journey Sequence packet obtains trusted application program and corresponding additional information;And signing messages and verification label are extracted inside additional information The public key of name.It is secret by HMAC calculating acquisition trusted application program and the decryption of corresponding additional information to decrypt service module 510 Key, and trusted application program and corresponding additional information are decrypted, then by the trusted application program and correspondence after decryption Additional information be sent into signature and recognize validation service module 511 and wait being further processed.It is additional that signature recognizes the verification of validation service module 511 Signing messages in information whether with trusted application-consistent, trusted application program is sent to process if consistent and is added Carry service module 512.Process load service module 512 loads and activates trusted application journey through safety certification Sequence.
Trusted application program management unit 505, for being obtained from trusted application program Distributor with the side of encryption Trusted application package existing for formula;Packet analyzing service module 509, parse trusted application package after obtain it is encrypted can Trust and applies application program and corresponding additional information;Service module 510 is decrypted, for decrypting trusted application program and attached Add information;Signature verification service module 511, the signing messages for verifying trusted application program;Process loads service module 512, the trusted application program that load and operation pass through signature verification.
Trusted application program management unit trusted application program management unit further, the trusted application journey Sequence administrative unit 505 further includes transfer submodule, is sent out the trusted application package after download by non-security shared drive To the Packet analyzing module 509 in trusted execution environments.Non-security shared drive be it is not trusted, can be by non-trusted execution Any module read-write in environment.
Further, the Packet analyzing service module 509 includes unpacking submodule, for parsing trusted application program pipe The trusted application package that unit 505 is submitted is managed, encrypted trusted application program and corresponding additional information are obtained, and Encrypted summary info and signature verification information are extracted inside from additional information.
Further, the Packet analyzing service module 509 further includes secret key submodule, and secret key submodule obtains current device Safety share secret key.If the shared secret key of safety is encrypted, encrypted safety is obtained from trusted execution environments Shared secret key, and the decryption secret key for decrypting trusted application program and additional information is obtained by hardware decryption engine.
Further, the decryption service module 510 includes decryption submodule, for decrypting trusted application program and right The additional information answered.HMAC meters are carried out by the shared secret key of Universally Unique Identifier and safety of current trusted application program It calculates, obtains the decryption secret key of decryption trusted application program and corresponding additional information.Trusted application is decrypted using this secret key Program and corresponding additional information, and then obtain the signing messages in additional information and signature verification public key.
Further, the decryption submodule, by after decryption trusted application program and corresponding additional information store In secure memory, secure memory cannot be read and write by the module in non-trusted performing environment.
Smart machine certification trusted application program detailed process is as follows:
First, during trusted application program management unit 505 starts, the model of current smart machine is obtained. Current smart machine model is that smart machine manufacturer registered before manufacture to authorization center 501, and authorization center safeguards institute There is the model of smart machine manufacturer, if smart machine manufacturer did not register unit type, distribution can not be used The trusted application program download service that server 502 provides.
Secondly, trusted application program management unit 505 inquires institute using the unit type obtained to Distributor 502 There are trusted application name and corresponding Universally Unique Identifier, and is shown to current trusted application program management In the user interface of unit 505, wait for that the user of smart machine selects.
Then, the user of smart machine selects oneself to want the trusted application program downloaded, trusted application program Administrative unit 505 obtains the corresponding Universally Unique Identifier of trusted application name, request module according to the input of user 507 is corresponding with Universally Unique Identifier to the request download of Distributor 502 using Universally Unique Identifier and unit type Trusted application program.
Later, Distributor 502 sends out request to authorization center 501, inquires Universally Unique Identifier and unit type Validity, authorization center 501 inquires current database, is confirmed whether to exist and returns result to Distributor 502.After Distributor 502 confirms that Universally Unique Identifier and unit type are effective, the equipment type is asked to authorization center 501 Number corresponding safety shares secret key, and the corresponding safety of unit type is shared secret key and replies to Distributor by authorization center 501 502。
Later, Distributor 502 using Universally Unique Identifier and authorization center 501 return specific to unit type Safety share secret key carry out HMAC calculating, obtain encryption trusted application package encryption secret key, then utilize this secret key Encrypt trusted application package.Then the download trusted application requests of notice request module 507 are permitted.Wherein It is that smart machine manufacturer is registering unit type that the safety specific to unit type that authorization center 501 returns, which shares secret key, When bind, by smart machine, manufacturer provides.
Later, it is encrypted credible to notify that the reception Distributor 502 of receiving module 506 issues for request module 507 Appoint application package.After receiving module 506 obtains encrypted trusted application package, transmitted by non-security shared drive To the Security Authentication Service unit 513 in trusted execution environments, and by the corresponding general unique knowledge of trusted application package Other code is also passed to Security Authentication Service unit 513.Wherein non-security shared drive is not trusted, can be held by non-trusted Module read-write in row environment.
Later, Security Authentication Service unit 513 receives 505 certification trusted application journey of trusted application program management unit The request of sequence packet.Packet analyzing module 509 receives encrypted trusted application package, and the trusted of encrypted state is obtained after parsing Application program and corresponding additional information.
Later, decryption service module 510 obtains the shared secret key of safety from trusted execution environments, if safety is shared secret Key exists in the form of plaintext, then directly using.If the shared secret key of safety is stored in trusted in such a way that hardware is encrypted In performing environment, then decrypt service module 510 first pass through hardware decryption engine decrypt and the safety after being decrypted share it is secret Key can only be drawn wherein the secret key for decrypting the shared secret key of existing safety in an encrypted form is hardware secret key by hardware decryption It holds up acquisition and uses.
Later, Universally Unique Identifier and safe shared secret key of the decryption service module 510 using the transmission of receiving module 506 Make HMAC calculating, obtains decryption trusted application program and corresponding additional information decrypts secret key.Service module 510 is decrypted to utilize This decryption secret key decryption trusted application program and corresponding additional information, and signing messages and verification are extracted from additional information The public key of signature gives signature and recognizes validation service module 511.
Later, signature recognizes plucking for the trusted application program that the calculating decryption service module 510 of validation service module 511 is sent Information is wanted, and obtains original digest using the signing messages in the public key decryptions additional information in additional information after decryption and believes Breath, and make Hash operation acquisition summary info by it and by trusted application program and compare, if unanimously, by recognizing safely Card sends trusted application program to process and loads service module 512, otherwise returns to error code.
Later, process load service module 512 loads and activates trusted application program through safety certification, And there is independent address space, the two mutually cannot directly visit for trusted application program and Security Authentication Service unit 513 Ask data.
Further, in above-mentioned steps, it is total that smart machine manufacturer cannot reveal the corresponding safety of any unit type Secret key is enjoyed, and safety can only be shared to secret key and be placed in trusted execution environments firmware, if current device supports hardware solution Ciphertext engine, then the shared secret key of safety must be present in the firmware of trusted execution environments in an encrypted form, accordingly even when The firmware of the trusted execution environments of some model is illegally cracked by hacker, and hacker can not also obtain the shared secret key of safety.
Further, in above-mentioned steps, trusted application program can also be used in combination with non-trusted applications, non- Trusted application can send request to trusted application program management unit 505 and download some Universally Unique Identifier correspondence Trusted application program.
Further, in above-mentioned steps, decryption service module 510 decrypts trusted application program and corresponding additional letter The result of breath must be maintained in the secure memory that decryption service module 510 distributes, and secure memory can only be in trusted and hold Module read-write in row environment.And subsequent signature is recognized involved by validation service module 511 and process load service module 512 And to memory be all secure memory.
Further, in above-mentioned steps, the public key of signing messages and verification signature in additional information is also encrypted , safety can be enhanced in this way, hacker can not replace the information of signature verification.
Further, in above-mentioned steps, trusted application program can with a certain item function of complete independently, can also with it is non- A certain item function is completed in trusted application interaction, this depends on the realization mechanism of trusted application program.
Through this embodiment, trusted application and additional information are in Distributor 502 and trusted execution environments Security Authentication Service unit 513 between transmission be all to exist in a manner of encrypted, ensure that the peace of trusted application program Quan Xing;The additional information of trusted application program simultaneously, including the public key of signing messages and verification signature are also encrypted, enhancing The integrality of trusted application program;The smart machine of each unit type has different safety to share secret key, even if Shared secret key is cracked the smart machine of some model safely, will not jeopardize this manufacturer or other manufacturer's different intelligents The safety of the model of equipment shares secret key;Each trusted application program has different Universally Unique Identifiers, therefore every One trusted application program has different decryption secret keys, the decryption secret key of any one of trusted application program to let out Dew does not interfere with other trusted application program decryption secret keys, improves the robustness of safety certification.Support hardware decryption In the smart machine of engine, the shared secret key of safety is to be present in the firmware of trusted execution environments in an encrypted form, in this way Safety shared secret key can not be obtained if even if the firmware of trusted execution environments is by hacker attack hacker, increase trusted The robustness of performing environment.
Through this embodiment, any newly-increased trusted application program and smart machine model, which need not all update, has deposited Trusted execution environments firmware, greatly improve the maintainability of trusted application program management.Trusted is answered simultaneously Directly interaction and communication need not occur for the software developer and smart machine provider being related to the verification process of program, All it is that contact is set up by authorization center and Distributor indirectly, improves the efficiency of trusted application program management.
Using this embodiment scheme, the defect for being unable to security applications program content itself in the prior art is overcome, for Per se with or operational process in using key algorithm and generate sensitive data application program, trusted will be packaged into and answered It is distributed with program bag, the issuing process of trusted application program and common application program are treated respectively.For common Application program, it is only necessary to ensure software integrality itself and the copyright of software developer, not need to protection application program The content of itself, therefore only need to carry out signature verification to application program.And trusted application program itself is also required to be encrypted, Also ensure the integrality of trusted application program and the copyright of software developer with signature verification simultaneously.Trusted application Program runs on trusted execution environments, while the safety certification of trusted application program is also complete in trusted execution environments At.Before trusted application program is activated, it is necessary to which, by the safety certification of trusted execution environments, otherwise activation is lost It loses.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention With within principle, any modification, equivalent substitution, improvement and etc. done should be included within the scope of protection of the invention god.

Claims (9)

1. a kind of method carrying out safety certification to application program, which is characterized in that this method includes:
Trusted application package is obtained from trusted application program Distributor, trusted application package is transferred to can Trust in performing environment, is unpacked in trusted execution environments, obtain trusted application program and additional information;
Obtain the decryption secret key of trusted application program and additional information;
Using decryption secret key decryption trusted application program and additional information, trusted application program after decrypt and add Information;
Single input digest algorithm operation is carried out to the trusted application program after decryption, obtains summary info;
Using the signing messages in the public key decryptions additional information in additional information, original digest information is obtained;
Judge whether the original digest information and the summary info are consistent, if it is, through safety certification, in trusted Trusted application program is loaded and run in performing environment;
Authorization center receives binding information, and the binding information includes that the safety of smart machine shares secret key and smart machine model Between correspondence, same type smart machine has unique smart machine model;
Authorization center preserves the binding information received.
2. the method as described in claim 1, which is characterized in that the decryption for obtaining trusted application program and additional information Secret key includes:
Smart machine obtains local safety and shares secret key;
The Universally Unique Identifier (UUID) of trusted application program and the shared secret key of safety are carried out multi input and plucked by smart machine It wants algorithm to calculate, obtains the decryption secret key of trusted application program and additional information.
3. method as claimed in claim 2, which is characterized in that the shared secret key of the safety is stored in trusted with plaintext version and holds In the firmware of row environment, alternatively, being stored in the firmware of trusted execution environments after being encrypted by hardware;
If the shared secret key of safety is stored in the firmware of trusted execution environments in such a way that hardware is encrypted, hardware solution is used Safety after ciphertext engine is decrypted shares secret key, and the safety after decryption, which is shared secret key, is used for multi input digest algorithm operation; Otherwise safety is directly shared into secret key for multi input digest algorithm operation.
4. the method as described in claim 1, which is characterized in that described credible from the acquisition of trusted application program Distributor Appoint application package, including:
Smart machine sends smart machine model and trusted application to be asked to trusted application program Distributor The UUID of program;
Trusted application program Distributor sends the secret key comprising smart machine model to authorization center and asks;
Authorization center finds out corresponding safety in the binding information according to smart machine model and shares secret key, to trusted Application program Distributor returns to the shared secret key of safety;
Trusted application program Distributor is using UUID and the shared secret key of safety, to trusted application program and additional information Multi input digest algorithm operation is carried out, the encryption secret key for encrypting trusted application program and additional information is obtained;
Using encryption secret key encryption trusted application program and additional information, wherein additional information includes that signing messages and verification are signed The public key of name;
Encrypted trusted application program and corresponding additional information are packaged by trusted application program Distributor Trusted application package is returned to smart machine by trusted application package;
Smart machine downloads trusted application package.
5. method as claimed in claim 4, which is characterized in that also include UUID in the secret key request;Authorization center receives After secret key request, this method further includes:
Authorization center verifies smart machine model and UUID, after verification effectively, executes described according to smart machine model The step of corresponding safety shares secret key is found out in the binding information.
6. the method as described in claim 1, which is characterized in that this method further includes:
It develops end and asks a UUID from authorization center;
Exploitation end carries out single input digest algorithm operation to the trusted application program write, and obtains summary info;It obtains random Unsymmetrical key pair, operation is encrypted to summary info using the private key of unsymmetrical key pair, obtains trusted application journey The signing messages of sequence;Additional information is formed by the public key of signing messages and asymmetric secret key;
Trusted application program, additional information and the UUID that ask are submitted into the distribution of trusted application program and taken in exploitation end Business device.
7. a kind of system carrying out safety certification to application program, which is characterized in that the system includes smart machine and trusted Application program Distributor, the smart machine include trusted application program management unit and Security Authentication Service unit, Security Authentication Service unit is located in trusted execution environments;
The trusted application program management unit obtains trusted application program from trusted application program Distributor Packet, is sent to the Security Authentication Service unit;
The Security Authentication Service unit receives the trusted application program that the trusted application program management unit is sent Packet, obtains encrypted trusted application program and additional information after being unpacked to it;Obtain trusted application program and additional information Decryption secret key;Using decryption secret key decryption trusted application program and additional information, the trusted application journey after being decrypted Sequence and additional information;Single input digest algorithm operation is carried out to the trusted application program after decryption, obtains summary info;It utilizes The signing messages in public key decryptions additional information in additional information, obtains original digest information;Judge the original digest letter Whether breath is consistent with the summary info, if it is, through safety certification, load and operation trusted application program;
The trusted application program Distributor is carried according to the request of the trusted application program management unit for it For trusted application package;
The system further includes authorization center, receives binding information, and the binding information includes that the safety of smart machine shares secret key With the correspondence between smart machine model, same type smart machine has unique smart machine model;Preserve tying up for reception Determine information.
8. system as claimed in claim 7, which is characterized in that the trusted application program management unit is answered to trusted It is sent with program distribution server and downloads request, the download request is answered comprising smart machine model and trusted to be asked With the UUID of program;After the trusted application program Distributor downloads trusted application package, it is sent to described Security Authentication Service unit;
The trusted application program Distributor sends the secret key comprising smart machine model to the authorization center and asks It asks, receives the safety that the authorization center returns and share secret key;Using UUID and the shared secret key of safety, to trusted application program Multi input digest algorithm operation is carried out with additional information, is obtained secret for encrypting the encryption of trusted application program and additional information Key;Using encryption secret key encryption trusted application program and additional information, wherein additional information includes that signing messages and verification are signed The public key of name;Encrypted trusted application program and corresponding additional information are packaged into trusted application package, it will Trusted application package returns to smart machine;
The authorization center receives the secret key request from the trusted application program Distributor, according to smart machine Model finds out corresponding safety in the binding information and shares secret key, is returned to the trusted application program Distributor Return the shared secret key of safety.
9. the system as described in any one of claim 7-8, which is characterized in that the system further includes exploitation end, from mandate The heart asks a UUID;Single input digest algorithm operation is carried out to the trusted application program write, obtains summary info;It obtains Random unsymmetrical key pair is encrypted operation to summary info using the private key of unsymmetrical key pair, obtains trusted and answer With the signing messages of program;Additional information is formed by the public key of signing messages and asymmetric secret key;By trusted application program, attached The UUID for adding information and asking submits to trusted application program Distributor.
CN201510357652.5A 2015-06-25 2015-06-25 Method, system and the equipment of safety certification are carried out to application program Active CN105095696B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510357652.5A CN105095696B (en) 2015-06-25 2015-06-25 Method, system and the equipment of safety certification are carried out to application program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510357652.5A CN105095696B (en) 2015-06-25 2015-06-25 Method, system and the equipment of safety certification are carried out to application program

Publications (2)

Publication Number Publication Date
CN105095696A CN105095696A (en) 2015-11-25
CN105095696B true CN105095696B (en) 2018-10-16

Family

ID=54576113

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510357652.5A Active CN105095696B (en) 2015-06-25 2015-06-25 Method, system and the equipment of safety certification are carried out to application program

Country Status (1)

Country Link
CN (1) CN105095696B (en)

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107689938A (en) * 2016-08-04 2018-02-13 捷而思股份有限公司 Forge instruction automatic filtering system, Collaboration system, examine circuit to related instruction
CN107483523A (en) * 2016-11-02 2017-12-15 深圳市波普安创技术有限公司 Legal the firmware debugging system and its method of information safety devices
CN106709324A (en) 2016-11-10 2017-05-24 京东方科技集团股份有限公司 Method and equipment used for verifying application safety
CN106778102B (en) * 2016-12-27 2023-04-28 上海云间半导体科技有限公司 Android system-based application program encryption method and device
CN106712964A (en) * 2016-12-27 2017-05-24 广州智慧城市发展研究院 Application verification method and application verification system based on Java card
CN107194237B (en) * 2017-04-05 2020-04-03 百富计算机技术(深圳)有限公司 Method and device for application program security authentication, computer equipment and storage medium
CN107908977B (en) * 2017-09-28 2020-02-18 中国船舶重工集团公司第七0九研究所 TrustZone-based intelligent mobile terminal trust chain security transmission method and system
CN107682159B (en) * 2017-10-12 2021-02-02 北京握奇智能科技有限公司 Trusted application management method and trusted application management system of intelligent terminal
CN107919960A (en) * 2017-12-04 2018-04-17 北京深思数盾科技股份有限公司 The authentication method and system of a kind of application program
CN110098933B (en) * 2018-01-29 2021-09-14 卓望数码技术(深圳)有限公司 Automatic identity authentication method and system for mobile phone application
CN108710361B (en) * 2018-05-30 2020-07-28 广州明珞软控信息技术有限公司 Security program checking method and system
CN108769043B (en) * 2018-06-06 2021-02-02 中国联合网络通信集团有限公司 Trusted application authentication system and trusted application authentication method
CN109559796B (en) * 2018-11-30 2020-12-08 苏州东巍网络科技有限公司 Intermittent training data acquisition request and authentication system and method
CN110071924B (en) * 2019-04-24 2020-07-31 武汉武房网信息服务有限公司 Big data analysis method and system based on terminal
CN111193730B (en) * 2019-12-25 2022-06-14 上海沄界信息科技有限公司 IoT trusted scene construction method and device
CN111158771B (en) * 2019-12-30 2021-08-17 联想(北京)有限公司 Processing method and device and computer equipment
CN113381859B (en) * 2020-03-10 2024-02-20 本无链科技(深圳)有限公司 Process mutual sign communication method and system for block chain
US20220114249A1 (en) * 2020-10-09 2022-04-14 Huawei Technologies Co., Ltd. Systems and methods for secure and fast machine learning inference in a trusted execution environment
CN114567425B (en) * 2020-11-27 2024-02-02 中国电信股份有限公司 Internet of things communication method and system, soC Sim and Internet of things terminal
CN112968774B (en) * 2021-02-01 2023-04-07 中国海洋石油集团有限公司 Method, device storage medium and equipment for encrypting and decrypting configuration file
CN112948807A (en) * 2021-02-04 2021-06-11 中国联合网络通信集团有限公司 Application program validity verification method and device
CN116248291B (en) * 2023-01-30 2023-11-17 深圳市盛思达通讯技术有限公司 Signature verification method and system of consumer

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1423766A (en) * 2000-02-17 2003-06-11 通用仪器公司 Method and apparatus for providing secure control of software or firmware code dowloading and secure operation of a computer device receiving dowloaded code
CN102271130A (en) * 2011-07-22 2011-12-07 四川长虹电器股份有限公司 Method for safely delivering and distributing software
CN103685138A (en) * 2012-08-30 2014-03-26 卓望数码技术(深圳)有限公司 Method and system for authenticating application software of Android platform on mobile internet

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1423766A (en) * 2000-02-17 2003-06-11 通用仪器公司 Method and apparatus for providing secure control of software or firmware code dowloading and secure operation of a computer device receiving dowloaded code
CN102271130A (en) * 2011-07-22 2011-12-07 四川长虹电器股份有限公司 Method for safely delivering and distributing software
CN103685138A (en) * 2012-08-30 2014-03-26 卓望数码技术(深圳)有限公司 Method and system for authenticating application software of Android platform on mobile internet

Also Published As

Publication number Publication date
CN105095696A (en) 2015-11-25

Similar Documents

Publication Publication Date Title
CN105095696B (en) Method, system and the equipment of safety certification are carried out to application program
CN110519309B (en) Data transmission method, device, terminal, server and storage medium
CN1985466B (en) Method of delivering direct proof private keys in signed groups to devices using a distribution CD
US8495383B2 (en) Method for the secure storing of program state data in an electronic device
CN112737779B (en) Cryptographic machine service method, device, cryptographic machine and storage medium
US20220114249A1 (en) Systems and methods for secure and fast machine learning inference in a trusted execution environment
CN103731395B (en) The processing method and system of file
JP5136012B2 (en) Data sending method
US20080123843A1 (en) Method for binding a security element to a mobile device
US20210006548A1 (en) Method for authorizing access and apparatus using the method
TW202109320A (en) Trusted execution environment-based application activation method and apparatus
CN102271124A (en) Data processing equipment and data processing method
KR20080065661A (en) A method for controlling access to file systems, related system, sim card and computer program product for use therein
US20220247576A1 (en) Establishing provenance of applications in an offline environment
CN110235134B (en) Addressing trusted execution environments using clean room provisioning
KR20090084545A (en) Ce device management server, method for issuing drm key using ce device management server, and computer readable medium
US8774407B2 (en) System and method for executing encrypted binaries in a cryptographic processor
KR20170019308A (en) Method for providing trusted right information, method for issuing user credential including trusted right information, and method for obtaining user credential
CN111901287B (en) Method and device for providing encryption information for light application and intelligent equipment
JP2004140636A (en) System, server, and program for sign entrustment of electronic document
KR100883442B1 (en) Method of delivering direct proof private keys to devices using an on-line service
CN108243158A (en) A kind of method and apparatus of safety certification
CN112131597A (en) Method and device for generating encrypted information and intelligent equipment
KR100897075B1 (en) Method of delivering direct proof private keys in signed groups to devices using a distribution cd
TWM585941U (en) Account data processing system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant