CN105760719B - A kind of ciphertext data decryption method and system - Google Patents
A kind of ciphertext data decryption method and system Download PDFInfo
- Publication number
- CN105760719B CN105760719B CN201410805764.8A CN201410805764A CN105760719B CN 105760719 B CN105760719 B CN 105760719B CN 201410805764 A CN201410805764 A CN 201410805764A CN 105760719 B CN105760719 B CN 105760719B
- Authority
- CN
- China
- Prior art keywords
- ciphertext data
- shared drive
- safety operation
- decryption
- subsystem
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 39
- 238000003860 storage Methods 0.000 claims abstract description 62
- 230000006870 function Effects 0.000 abstract description 27
- 238000005516 engineering process Methods 0.000 description 21
- 238000002955 isolation Methods 0.000 description 15
- 238000010586 diagram Methods 0.000 description 14
- 230000015654 memory Effects 0.000 description 14
- 230000008569 process Effects 0.000 description 10
- 238000012545 processing Methods 0.000 description 8
- 238000004590 computer program Methods 0.000 description 7
- 238000004891 communication Methods 0.000 description 5
- 238000000151 deposition Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 244000035744 Hura crepitans Species 0.000 description 1
- 230000003321 amplification Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 230000003139 buffering effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000003550 marker Substances 0.000 description 1
- 238000003199 nucleic acid amplification method Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 description 1
- 238000003786 synthesis reaction Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention discloses a kind of ciphertext data decryption method and systems, this method comprises: non-secure operations subsystem loads ciphertext data to shared drive;Safety operation subsystem certificate according to the pre-stored data key, the ciphertext data loaded in the shared drive are decrypted, obtain clear data simultaneously store to the first unshared storage region.The embodiment of the present invention is by dividing non-security performing environment and secure execution environments, the functions such as secret key downloading are realized in non-security performing environment, the functions such as secret key secure storage, the decryption of ciphertext data safety are realized in secure execution environments, so as to guarantee that ciphertext data and key are not stolen by Malware, and the clear data after decryption is not monitored by malicious application, improves Information Security.
Description
Technical field
The present invention relates to data security arts more particularly to a kind of ciphertext data decryption method and systems.
Background technique
Continuous with various intelligent terminals is popularized, and people more and more advantageously can use intelligent mobile terminal (such as
Mobile phone, tablet computer etc.) by internet mobile Internet even work to learn, entertain.Wherein, most people all can
It is related to the digital product resource (video, music, document etc.) of downloading viewing digital publishing quotient distribution, at the same time, greatly
Amount occurs in succession by the unauthorized download of intelligent terminal, viewing, propagation or even pirate phenomenon, therefore digital rights management
(digital right management, DRM) technology starts to develop to intelligent terminal direction.
The content of DRM technology protection is broadly divided into two classes: one kind is multimedia protection, such as encryption film, music, sound view
Frequently, files in stream media;In addition one kind is encrypted document, such as Word, Excel, PDF etc..In DRM frame, generally comprise interior
Hold operator, network operator, authorization center and these parts of terminal user.Its principle are as follows: terminal user is authorizing first
Corresponding digital rights certificate is bought in center registration, payment, and then content operator is mentioned by network operator to terminal user
For encrypted digital content, terminal user is decrypted after obtaining data using the secret key in digital rights certificate or the key individually provided
Data, last terminal user carry out the broadcasting (watch, listen to or read) of digital product using intelligent terminal.
In order to improve the safety of DRM, the prior art relates generally to improve secret key or data transimission and storage at the terminal
Safety, and be related to improving the safety that plays at the terminal of digital content.But it is based on the prior art, if user
It obtains ciphertext data and obtains key, it is possible to decrypt ciphertext data and propagate clear data, safety is lower;In addition, i.e.
Make user can not ciphertext data broadcasting content is monitored on backstage and (such as is read it is possible to while played file
Data in FrameBuffer), and then obtain clear data by way of copy and propagated, equally it is unfavorable for data
Safety.
Summary of the invention
In view of this, the embodiment of the present invention provides to solve existing technical problem:
The present invention provides a kind of ciphertext data decryption methods, this method comprises:
Non-secure operations subsystem loads ciphertext data to shared drive;
Safety operation subsystem certificate according to the pre-stored data key, to the ciphertext data loaded in the shared drive
It is decrypted, obtains clear data and stores to the first unshared storage region.
Preferably, this method further include:
Non-secure operations subsystem downloadable authentication key and store to shared drive;
Safety operation subsystem from shared drive obtain the certificate key and store to the second unshared storage region,
The safety operation subsystem certificate according to the pre-stored data key, to the ciphertext loaded in the shared drive
Data are decrypted, comprising:
The safety operation subsystem from the described second unshared storage region read certificate key, to it is described it is shared in
The ciphertext data for depositing middle loading are decrypted.
Preferably, after the ciphertext data loaded in shared drive are decrypted in the safety operation subsystem, the party
Method further include:
Determine that non-secure operations subsystem continues to shared drive when not being fully completed to the decryption of current ciphertext data source
Ciphertext data are loaded, so that safety operation subsystem continues to decrypt, until the decryption to current ciphertext data source is all complete
At.
Preferably, this method further include:
According to preset exhibition strategy, in corresponding display location to the plaintext number after safety operation subsystem decryption
According to being shown.
Invention further provides a kind of ciphertext data decryption system, which includes: non-secure operations subsystem, safety behaviour
Make subsystem, shared drive and the first unshared storage region;Wherein,
The non-secure operations subsystem, for loading ciphertext data to shared drive;
The safety operation subsystem, for certificate according to the pre-stored data key, to what is loaded in the shared drive
Ciphertext data are decrypted, and the clear data that will acquire is stored to the first unshared storage region;
The shared drive, the data shared for storing non-secure operations subsystem and safety operation subsystem;
The first unshared storage region, for storing the clear data after the decryption that safety operation subsystem exclusively enjoys.
Preferably, the system further includes the second unshared storage region,
The non-secure operations subsystem, be also used to downloadable authentication key and store to shared drive;
The safety operation subsystem, be also used to obtain from shared drive the certificate key and store to second non-total
Enjoy storage region;
The second unshared storage region, for store certificate that safety operation subsystem exclusively enjoys key,
Correspondingly, the safety operation subsystem specifically from the described second unshared storage region read certificate key, it is right
The ciphertext data loaded in the shared drive are decrypted.
Preferably,
The non-secure operations subsystem is also used in safety operation subsystem to the ciphertext data loaded in shared drive
After being decrypted, judge whether the decryption of current ciphertext data source is fully completed, determines the decryption to current ciphertext data source
When not being fully completed, continue to load ciphertext data to shared drive, so that safety operation subsystem continues to decrypt, until right
The decryption of current ciphertext data source is fully completed.
Preferably, the system further includes display module;Wherein,
The display module is used for according to preset exhibition strategy, in corresponding display location to safety operation
Clear data after system decryption is shown.
Ciphertext data decryption method and system described in the embodiment of the present invention, non-secure operations subsystem fill ciphertext data
It is loaded onto shared drive;Safety operation subsystem certificate according to the pre-stored data key, to the ciphertext loaded in the shared drive
Data are decrypted, and obtain clear data and store to the first unshared storage region.The embodiment of the present invention is by dividing non-peace
Full performing environment and secure execution environments realize the functions such as secret key downloading, in secure execution environments in non-security performing environment
The functions such as middle realization secret key secure storage, the decryption of ciphertext data safety, so as to guarantee ciphertext data and key not by malice
Software is stolen, and the clear data after decryption is not monitored by malicious application, improves Information Security.
Detailed description of the invention
Fig. 1 is a kind of ciphertext data decryption method flow diagram of the embodiment of the present invention;
Fig. 2 is another ciphertext data decryption method flow diagram of the embodiment of the present invention;
Fig. 3 is another ciphertext data decryption method flow diagram of the embodiment of the present invention;
Fig. 4 is a kind of ciphertext data decryption system structural schematic diagram of the embodiment of the present invention;
Fig. 5 is another ciphertext data decryption system structural schematic diagram of the embodiment of the present invention;
Fig. 6 is another ciphertext data decryption system structural schematic diagram of the embodiment of the present invention;
Fig. 7 is ciphertext data decryption system structural schematic diagram in the embodiment of the present invention 1.
Specific embodiment
The birth of processor technology (such as TrustZone technology of ARM) with security isolation function is intelligent terminal
Safety opens brand-new road.Defencive function is integrated into kernel to guarantee to be by the processor technology with security isolation function
The safety of system, and be integrated into the whole design of system.Security software platform is provided simultaneously, makes semiconductor maker, equipment
The security solution of oneself is extended and developed on the frame that manufacturer and operating system partner can share at one.For example,
TrustZone technology has introduced user mode from completely new safe condition to ARM architecture and privileged mode, to determine system
It is to operate under safety or insecure environments.TrustZone technology is thorough by non-security performing environment and secure execution environments
Isolation, and can be converted between safety and insecure environments by security monitor (Monitor).
Based on the processor technology with security isolation function, the embodiment of the present invention proposes a kind of ciphertext data deciphering side
Method, as shown in Figure 1, this method comprises:
Step 11: non-secure operations subsystem loads ciphertext data to shared drive;
Step 12: safety operation subsystem certificate according to the pre-stored data key, it is close to being loaded in the shared drive
Literary data are decrypted, and obtain clear data and store to the first unshared storage region.
In one specific embodiment, as shown in Fig. 2, this method further include:
Step 21: non-secure operations subsystem downloadable authentication key and store to shared drive;
Step 22: safety operation subsystem from shared drive obtain the certificate key and storing to second unshared deposit
Storage area domain.
Correspondingly, the safety operation subsystem certificate according to the pre-stored data key, to being loaded in the shared drive
Ciphertext data be decrypted, comprising:
The safety operation subsystem from the described second unshared storage region read certificate key, to it is described it is shared in
The ciphertext data for depositing middle loading are decrypted.
In one specific embodiment, as shown in figure 3, the safety operation subsystem is to the ciphertext data loaded in shared drive
After being decrypted, this method further include:
Step 31: determine when not being fully completed to the decryption of current ciphertext data source, non-secure operations subsystem continue to
Shared drive loads ciphertext data, so that safety operation subsystem continues to decrypt, until the solution to current ciphertext data source
It is close to be fully completed.
In one specific embodiment, this method further include:
According to preset exhibition strategy, in corresponding display location to the plaintext number after safety operation subsystem decryption
According to being shown.
The embodiment of the present invention also proposed a kind of ciphertext data decryption system, as shown in figure 4, the system includes: non-security
Operational subsystems 41, safety operation subsystem 42, shared drive 43 and the first unshared storage region 44;Wherein,
The non-secure operations subsystem 41, for loading ciphertext data to shared drive;
The safety operation subsystem 42, for certificate according to the pre-stored data key, to being loaded in the shared drive
The ciphertext data clear data that is decrypted, and will acquire store to the first unshared storage region 44;
The shared drive 43, the data shared for storing non-secure operations subsystem and safety operation subsystem;
The first unshared storage region 44, for storing the plaintext number after the decryption that safety operation subsystem exclusively enjoys
According to.
In one specific embodiment, as shown in figure 5, the system further includes the second unshared storage region 51,
The non-secure operations subsystem 41, be also used to downloadable authentication key and store to shared drive;
The safety operation subsystem 42, be also used to obtain from shared drive the certificate key and store to second non-
Shared storage area;
The second unshared storage region 51, for store certificate that safety operation subsystem exclusively enjoys key.
Correspondingly, the safety operation subsystem 42 specifically from the described second unshared storage region 51 read certificate it is close
The ciphertext data loaded in the shared drive are decrypted in key.
In one specific embodiment, the non-secure operations subsystem 41 is also used in safety operation subsystem 42 to shared
After the ciphertext data loaded in memory 43 are decrypted, judge whether the decryption of current ciphertext data source is fully completed, determines
When not being fully completed the decryption of current ciphertext data source, continue to load ciphertext data to shared drive 43, so as to safety operation
Subsystem 42 continues to decrypt, until the decryption to current ciphertext data source is fully completed.
In one specific embodiment, as shown in fig. 6, the system further includes showing mould 61;Wherein,
The display module 61 is used for according to preset exhibition strategy, in corresponding display location to the safety operation
Clear data after subsystem 42 is decrypted is shown.
Technical solution of the present invention is described in further detail below by specific embodiment.
The scheme for improving DRM and playing safety based on intelligent mobile terminal that the present embodiment provides a kind of.For existing
DRM technology there are the problem of, digital product application is divided by using the processor technology with security isolation function non-
Two parts of safety and safety, wherein unsecure parts are responsible for the functions such as secret key deployment, shared-memory management, broadcasting, Ministry of State Security
Divide the functions such as secure storage, the decryption of ciphertext data safety, the safety display of responsible secret key.It therefore, can be by secret key storage and data
Decrypting process is thoroughly isolated with insecure environments, under the premise of not changing existing DRM technology framework, makes content operator can be with
Secret key is deployed on intelligent terminal and can safely play ciphertext data by safety.
Fig. 7 show ciphertext data decryption system structural schematic diagram in the embodiment of the present invention 1, as shown in fig. 7, the system packet
It includes: non-secure operations subsystem 101, digital product applications client 102, non-security Correspondent 103, safety operation subsystem
111, digital product security application 112, safety communication agency 113, shared drive 201, touch screen 202, non-volatile memories 301,
Pacify full frame buffer 302.Wherein, digital product applications client 102 includes cipher key deployment module 104 again, and synchronization module 105 is broadcast
Amplification module 106;It again include secure storage module 114, secure decryption module 115, safety display in digital product security application 112
Module 116, in which:
Non-secure operations subsystem 101 can also claim high level operating system, such as Android, iOS etc., running on has peace
(as the non-security of arm processor with TrustZone technology is held in the non-security performing environment of the processor of full isolation features
In row environment), it is commonly with main operating system on intelligent terminal, various applications are (with the application of system publication, system official
The application of the application of Fang Fabu or third party's publication) generally all operate in the operating system.Non-secure operations subsystem itself
Without hard/software isolation features or only limited authority mechanism (such as sandbox mechanism of Android), can not prevent different soft
Part accesses identical hardware address, so that answering in protected data in volatibility or non-volatile memory cells can not be prevented
Appearance is stolen by third party software.Here by taking Android as an example, digital product applications client 102 is run in the operating system.
Digital product applications client 102 operates in the non-security performing environment of the processor with security isolation function
In, and operate on non-secure operations subsystem, for example, operating in the non-security of the arm processor with TrustZone technology
In performing environment, and operate on non-secure operations subsystem 101.It is the unsecured side with DRM and playing function software
Using, include cipher key deployment module 104, synchronization module 105, playing module 106.
Non-security Correspondent 103, runs under the monitoring environment of the processor with security isolation function, system from
When non-security performing environment is switched to secure execution environments, for saving the context of non-secure operations subsystem, restore safety
The context of operational subsystems finally jumps in safety operation subsystem and executes security application.For example, may operate in tool
Have in the non-security performing environment of the arm processor of TrustZone technology, when unsecured side issues smc instruction, falls into kernel
Enter monitor mode, the context of non-secure operations subsystem 101 is saved in monitor mode, restores safety operation subsystem
The context of system 111, finally jumps in safety operation subsystem and continues to execute.
Cipher key deployment module 104, it acts as from authorization center Xia Zaizhengshu key, and by the digital version warrant of downloading
Book key be transferred to security context, and be stored in secure storage unit in security context.Secure storage unit is non-
It is sightless in security context, therefore unauthorized application can not directly or indirectly obtain the safety and deposit in insecure environments
Content in storage unit.With reference to Fig. 7, cipher key deployment module 104 specifically from authorization center downloadable authentication key, then will downloading
Digital rights certificate key safety operation subsystem 111 is transferred to by non-security Correspondent 103, and notify to deposit safely
Store up module 114 by certificate key storage to nonvolatile safe storage 301 in.Nonvolatile safe storage 301 is in non-security ring
It is sightless in border, therefore unauthorized application can not directly or indirectly obtain nonvolatile safe storage in insecure environments
Content in 301.
Synchronization module 105 obtains decrypted it acts as synchronous with the ciphertext data decrypting process in secure execution environments
Journey state, and the ciphertext data content in shared drive is updated according to the state, with reference to Fig. 7, especially by non-security communication generation
Reason 103 is synchronous with the secure decryption module 115 of safety operation subsystem 111, obtains the shape of 115 decrypting process of secure decryption module
State, and the ciphertext data content in shared drive 201 is updated according to the state.
Playing module 106 constructs player appropriate (such as video player, audio player or reader etc.) boundary
Face, comprising various function buttons (such as start, stop button or page-turning button etc.) in interface, and reserved clear data viewing area
Domain, which is filled by the secure display controller 116 in digital product security application 112, and has finally been shown by touch screen 202
Whole picture.
Safety operation subsystem 111, the safety for operating in the arm processor with TrustZone technology execute ring
In border, be responsible for specially the high special task of processing security level (or application), for example, certificate key secure storage task, close
Literary data deciphering task and safety display task dispatching.Secure execution environments have hard/software isolation features, on the one hand, rely on tool
There is the processor of security isolation function that can realize that insecure environments are isolated with hard/software of security context, on the other hand, safety is grasped
Make subsystem itself and realize isolation mech isolation test, the task (or application) run on safety operation subsystem is made respectively to exclusively enjoy oneself
Volatile and nonvolatile memory space, and forbid accessing mutually between task.
Digital product security application 112 operates in the secure execution environments of the processor with security isolation function, such as
In the secure execution environments of arm processor with TrustZone technology, and operate on safety operation subsystem 111.It is
Secure side application with DRM and playing function software, includes secure storage module 114, and secure decryption module 115 is safe aobvious
Show module 116.
Safety communication agency 113, operates under the monitoring environment of the processor of security isolation function, in system from safety
When performing environment is switched to non-security performing environment, for saving the context of safety operation subsystem, restore non-secure operations
The context of subsystem finally jumps in non-secure operations subsystem and continues to execute unsecured side application.With reference to Fig. 7, peace
Full Correspondent 113 operates in the secure execution environments of the arm processor with TrustZone technology, issues in secure side
When smc is instructed, kernel is made to fall into monitor mode, the context of safety operation subsystem 111 is saved in monitor mode,
The context for restoring non-secure operations subsystem 101, finally jumps in non-secure operations subsystem and continues to execute.
Secure storage module 114, by the certificate in 102 shared drive 201 of digital product applications client key deposit
It stores up in the nonvolatile safe storage 301 that the digital product security application 112 exclusively enjoys.
In 102 shared drive of digital product client 201 ciphertext data are converted to and can be broadcast by secure decryption module 115
The clear data put, and the clear data after conversion is temporarily stored into the peace full frame buffer 302 that security application 112 exclusively enjoys.
Secure display controller 116 can allow touch screen 202 to map institute in the clear data region of the playing module 106
The data in peace full frame buffer 302 are stated, the clear data cannot be covered or be removed to be played in the digital product client 102
The broadcast interface that module 106 is shown, and the broadcast interface shown with playing module 106 in the digital product client 102 closes
At complete display picture.
Shared drive 201 is created by non-secure operations subsystem 101, and is shared to secure execution environments, i.e., non-security
It is in performing environment as it can be seen that also visible in secure execution environments.For the interaction data in two environment.Have in such and is supervised
Depending on risk, need the primary i.e. removing of interaction when in use.In the present embodiment, shared drive 201 is for two aspects: one
Be digital rights certificate close progress secure storage when, disposably by certificate key share to peace from non-security performing environment
Full performing environment is deleted after being finished;Second is that ciphertext data are shared from non-security performing environment to safety when safety plays
Performing environment.
Touch screen 202, it can it operates in non-security performing environment, can also run in security context, it acts as
It read in non-security performing environment first, show the broadcasting that playing module 106 is shown in the digital product client 102
Then the plaintext number in the peace full frame buffer 302 in the digital product security application 112 is read at interface in secure execution environments
According to, by the clear data synthesis in the clear data region of the broadcast interface, finally show complete frame picture.
Nonvolatile safe storage 301 acts on to cache clear data after decrypted.Generally digital product is answered safely
The region exclusively enjoyed in non-volatile memories with 112, will not by non-security performing environment application or secure execution environments in
Other security applications accessed.
Pacify full frame buffer 302, acts on to cache clear data after decrypted.Generally digital product security application 112
One piece distributed on heap or stack exclusively enjoys region of memory, will not by non-security performing environment application or secure execution environments in
Other security applications accessed.
With reference to system shown in Figure 7, ciphertext data decryption method described in the embodiment of the present invention includes:
Step A. user using the digital product applications client downloadable authentication key, and pass through non-security communication
Agency by certificate key be transferred to secure side;
Step B. digital product security application receive certificate key, and by the certificate key storage to the safety answer
With the nonvolatile safe memory space exclusively enjoyed;
Step C. user using the digital product applications client execute playing function (such as click start, stop by
The message sent after button, here by taking user clicks start button as an example, to illustrate working-flow);
It is close to load to create a certain size shared drive for the synchronization module of digital product applications client described in step D.
Literary data;
Step E. synchronization module initiates secure decryption process;
The corresponding peace full frame buffer of step F. secure decryption module creation;
Step G. secure decryption module simultaneously will using the ciphertext data in the decryption shared drive of key described in step B
Clear data after decryption is stored in peace full frame buffer;
After step H. secure decryption module has decrypted a frame buffered data, the secure display controller, the safety are notified
One frame data are incorporated into the clear data display area of the broadcast interface by display module driving touch screen;
After step I. secure decryption module has decrypted all ciphertext data in shared drive, synchronization module is notified;
Step J. synchronization module judges whether the current broadcast point in encryption data source reaches tail portion, if not reaching tail
Portion, return step E continue to decrypt;It is returned if reaching tail portion.
In step A, user using the digital product applications client downloadable authentication key, and by non-security logical
News agency by certificate key be transferred to secure side, may include step in detail below:
A1. guest operation digital product applications client, click installation certificate key button;
A2. digital product applications client connects rights issuer server, by certificate key be downloaded to unsecured side and delay
It deposits;
A3. the cipher key deployment module of digital product applications client by comprising certificate the buffer flag of key be in shared
It deposits;
A4. digital product applications client notifies non-security Correspondent to switch over, and shared drive address is passed through
Processor register is transmitted;
A5. non-security Correspondent saves secure side context, executes smc instruction, processor is made to fall into monitor mould
Formula.
In step B, digital product security application receive certificate key, and by the certificate key storage to the safety
May include step in detail below using the nonvolatile safe memory space exclusively enjoyed:
B1. the address comprising the shared drive is passed to secure side variable under monitor mode by processor, is restored
Secure side context executes digital product security application;
B2. the secure storage module of digital product security application opened up in secure memory space with certificate needed for key
The space of size;
B3. the secure storage module of digital product security application by certificate in shared drive key storage with the safety
In memory space;
B4. digital product security application knows that safety communication agency switches over;
B5. safety communication agency saves secure side context, executes smc instruction, processor is made to fall into monitor mode;
B6. processor restores unsecured side context under monitor mode, and executes digital product applications client.
In step C, user using the digital product applications client execute playing function (such as click start, stop
The message sent after button, here by taking user clicks start button as an example, to illustrate working-flow), it may include following
Process:
C1. user, which clicks, starts broadcast button;
C2. digital product applications client opens corresponding ciphertext digital document.
In step D, the synchronization module of digital product applications client creates a certain size shared drive to load ciphertext
Data may include following below scheme:
D1. the synchronization module of digital product applications client creates one piece of memory according to shared buffer full-size;
D2. the memory marker is shared drive by the synchronization module;
D3. the data copy that the synchronization module starts ciphertext data current location is into shared drive.
In step E, synchronization module initiates secure decryption process, may include following below scheme:
E1. synchronization module notifies non-security Correspondent to switch over, and by shared drive address and executes secure decryption
Order is transmitted by processor register;
E2. non-security Correspondent saves secure side context, executes smc instruction, processor is made to fall into monitor mould
Formula;
E3. the address comprising the shared drive is passed to secure side variable under monitor mode by processor, is restored
Secure side context executes digital product security application.
In step F, the corresponding peace full frame buffer of secure decryption module creation may include following below scheme:
F1. digital product security application obtains the order for executing secure decryption from shared buffer, starts secure decryption mould
Block;
F2. actual size of the secure decryption module according to data in shared drive, the corresponding frame buffering of one piece of creation.
In step G, secure decryption module is using the ciphertext data in the decryption shared drive of key described in step B, simultaneously
Clear data after decryption is stored in peace full frame buffer, may include following below scheme:
G1. secure decryption module from secure storage certificate described in load step B secret key;
G2. secure decryption module using the certificate ciphertext data in secret key pair shared drive be decrypted;
G3. secure decryption module deposits in the ciphertext data after decryption in the peace full frame buffer.
In step H, after secure decryption module has decrypted a frame buffered data, the secure display controller, the peace are notified
One frame data are incorporated into the clear data display area of the broadcast interface by full display module driving touch screen, may include following
Process:
H1. secure decryption module judges whether a frame data decrypt completion, returns to the G2 step relaying if do not completed
It is continuous to execute, if completing to execute below step;
H2. secure display controller obtains safe display position information;
H3. a frame clear data is passed to touch screen driving according to the safe display position information by secure display controller;
H4. result is shown in safe display area of the touch screen driving in broadcast interface.
In step I, after secure decryption module has decrypted all ciphertext data in shared drive, synchronization module is notified, it can
To include following below scheme:
I1. secure decryption module judges whether to complete the decryption work of all ciphertext data in shared drive, if not
It completes, then returns to G2, execute following process if completing;
I2. secure decryption module saves secure side context, executes smc instruction, processor is made to fall into monitor mode;
I3. processor restores unsecured side context under monitor mode, returns to synchronization module and continues to execute.
In step J, synchronization module judges whether the current broadcast point in encryption data source reaches tail portion, if not continuing to hold
Row step E completes to play, may include following below scheme if reaching tail portion:
J1. synchronization module is completed to play, if do not arrived according to arrival ciphertext data trailer is judged whether if reaching
Up to then executing following process;
J2. synchronization module obtains the current location that ciphertext number plays, and return step E is continued to execute.
Compared with prior art, the embodiment of the present invention introduces the processor technology with security isolation function, will count
Word product player (or reader, browser) application is divided into non-security application and two parts of security application, wherein non-peace
All point responsible secret key downloading, shared-memory management and playing function, security are responsible for the secure storage of secret key, ciphertext data
Secure decryption and safe display function.On the one hand, it ensure that the secure storage of key, the digital product client cannot be removed
Other any softwares in addition are stolen;On the other hand, during digital product client plays out, unsecured side only adds
Ciphertext data are carried, and by ciphertext data sharing to secure side, generate final clear data in the peace full frame buffer of secure side,
It ensure that clear data will not be monitored by any application.
In addition, scheme used by the embodiment of the present invention is suitable for the DRM technology framework of current mainstream, have no need to change
Any part in DRM technology framework, with popularizing for the processor technology with security isolation function, which can gradually melt
Enter in DRM framework.
Above-mentioned each unit can by electronic equipment central processing unit (Central Processing Unit, CPU),
Digital signal processor (Digital Signal Processor, DSP) or programmable logic array (Field-
Programmable Gate Array, FPGA) it realizes.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program
Product.Therefore, the shape of hardware embodiment, software implementation or embodiment combining software and hardware aspects can be used in the present invention
Formula.Moreover, the present invention, which can be used, can use storage in the computer that one or more wherein includes computer usable program code
The form for the computer program product implemented on medium (including but not limited to magnetic disk storage and optical memory etc.).
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The system for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of system, the instruction system realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.
Claims (6)
1. a kind of ciphertext data decryption method, which is characterized in that this method comprises:
Non-secure operations subsystem loads ciphertext data to shared drive;
Safety operation subsystem certificate according to the pre-stored data key, the ciphertext data that load in the shared drive are carried out
Decryption obtains clear data and stores to the first unshared storage region;
Wherein, the described first unshared storage region is to be loaded by the safety operation subsystem according in the shared drive
The actual size creation of ciphertext data;
Non-secure operations subsystem downloadable authentication key and store to shared drive;
Safety operation subsystem from shared drive obtain the certificate key and store to the second unshared storage region,
The safety operation subsystem certificate according to the pre-stored data key, to the ciphertext data loaded in the shared drive
It is decrypted, comprising:
The safety operation subsystem from the described second unshared storage region read certificate key, in the shared drive
The ciphertext data of loading are decrypted.
2. the method according to claim 1, wherein the safety operation subsystem in shared drive to loading
After ciphertext data are decrypted, this method further include:
Determine that non-secure operations subsystem continues to load to shared drive when not being fully completed to the decryption of current ciphertext data source
Ciphertext data, so that safety operation subsystem continues to decrypt, until the decryption to current ciphertext data source is fully completed.
3. according to claim 1 to 2 described in any item methods, which is characterized in that this method further include:
According to preset exhibition strategy, corresponding display location to the clear data after safety operation subsystem decryption into
Row is shown.
4. a kind of ciphertext data decryption system, which is characterized in that the system includes: non-secure operations subsystem, safety operation
System, shared drive and the first unshared storage region;Wherein,
The non-secure operations subsystem, for loading ciphertext data to shared drive;
The safety operation subsystem, for certificate according to the pre-stored data key, to the ciphertext loaded in the shared drive
Data are decrypted, and the clear data that will acquire is stored to the first unshared storage region;
The shared drive, the data shared for storing non-secure operations subsystem and safety operation subsystem;
The first unshared storage region, for storing the clear data after the decryption that safety operation subsystem exclusively enjoys;Wherein,
The first unshared storage region is by the safety operation subsystem according to the ciphertext data loaded in the shared drive
Actual size creation;
The system further includes the second unshared storage region,
The non-secure operations subsystem, be also used to downloadable authentication key and store to shared drive;
The safety operation subsystem, be also used to obtain from shared drive the certificate key and storing to second unshared deposit
Storage area domain;
The second unshared storage region, for store certificate that safety operation subsystem exclusively enjoys key,
Correspondingly, the safety operation subsystem specifically from the described second unshared storage region read certificate key, to described
The ciphertext data loaded in shared drive are decrypted.
5. system according to claim 4, which is characterized in that
The non-secure operations subsystem is also used to carry out the ciphertext data loaded in shared drive in safety operation subsystem
After decryption, judge whether the decryption of current ciphertext data source is fully completed, determination is not complete to the decryption of current ciphertext data source
When portion completes, continue to load ciphertext data to shared drive, so that safety operation subsystem continues to decrypt, until to current
The decryption of ciphertext data source is fully completed.
6. according to the described in any item systems of claim 4 to 5, which is characterized in that the system further includes display module;Wherein,
The display module is used for according to preset exhibition strategy, in corresponding display location to the safety operation subsystem
Clear data after decryption is shown.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410805764.8A CN105760719B (en) | 2014-12-19 | 2014-12-19 | A kind of ciphertext data decryption method and system |
PCT/CN2015/083768 WO2016095506A1 (en) | 2014-12-19 | 2015-07-10 | Ciphertext data decryption method, system and computer storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410805764.8A CN105760719B (en) | 2014-12-19 | 2014-12-19 | A kind of ciphertext data decryption method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105760719A CN105760719A (en) | 2016-07-13 |
CN105760719B true CN105760719B (en) | 2019-11-15 |
Family
ID=56125811
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410805764.8A Active CN105760719B (en) | 2014-12-19 | 2014-12-19 | A kind of ciphertext data decryption method and system |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105760719B (en) |
WO (1) | WO2016095506A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107579815B (en) * | 2017-08-18 | 2020-11-20 | 瑞芯微电子股份有限公司 | Method and device for safely programming key |
CN114117460A (en) * | 2020-09-01 | 2022-03-01 | 鸿富锦精密电子(天津)有限公司 | Data protection method and device, electronic equipment and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102985930A (en) * | 2011-05-25 | 2013-03-20 | 松下电器产业株式会社 | Information processing device and information processing method |
CN103701594A (en) * | 2014-01-03 | 2014-04-02 | 天地融科技股份有限公司 | Data transmission method and system |
CN104091135A (en) * | 2014-02-24 | 2014-10-08 | 电子科技大学 | Intelligent terminal safety system and safety storage method |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8868925B2 (en) * | 2008-12-09 | 2014-10-21 | Nvidia Corporation | Method and apparatus for the secure processing of confidential content within a virtual machine of a processor |
US20130054473A1 (en) * | 2011-08-23 | 2013-02-28 | Htc Corporation | Secure Payment Method, Mobile Device and Secure Payment System |
CN103514414A (en) * | 2012-06-26 | 2014-01-15 | 上海盛轩网络科技有限公司 | Encryption method and encryption system based on ARM TrustZone |
KR20140110639A (en) * | 2013-03-08 | 2014-09-17 | 삼성전자주식회사 | Data security method and electronic device implementing the same |
CN104102876A (en) * | 2014-07-17 | 2014-10-15 | 北京握奇智能科技有限公司 | Device for safeguarding operational security of client side |
-
2014
- 2014-12-19 CN CN201410805764.8A patent/CN105760719B/en active Active
-
2015
- 2015-07-10 WO PCT/CN2015/083768 patent/WO2016095506A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102985930A (en) * | 2011-05-25 | 2013-03-20 | 松下电器产业株式会社 | Information processing device and information processing method |
CN103701594A (en) * | 2014-01-03 | 2014-04-02 | 天地融科技股份有限公司 | Data transmission method and system |
CN104091135A (en) * | 2014-02-24 | 2014-10-08 | 电子科技大学 | Intelligent terminal safety system and safety storage method |
Also Published As
Publication number | Publication date |
---|---|
CN105760719A (en) | 2016-07-13 |
WO2016095506A1 (en) | 2016-06-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11651113B2 (en) | Program execution device | |
CN103339957B (en) | Method and apparatus for building a hardware root of trust and providing protected content processing within an open computing platform | |
CN106462718B (en) | Store the rapid data protection of equipment | |
CN103368740B (en) | System for numeral copyright management of the bound content to smart storage device, device and method | |
JP5556895B2 (en) | Content data reproducing apparatus, update management method, and update management program | |
KR101496424B1 (en) | User based content key encryption for a DRM system | |
EP2082199B1 (en) | A data storage device and method | |
US9990473B2 (en) | Method and apparatus for policy-based content sharing in a peer to peer manner using a hardware based root of trust | |
TW201023047A (en) | Method and apparatus for the secure processing of confidential content within a virtual machine of a processor | |
US10303857B2 (en) | Providing access to content | |
US20060155651A1 (en) | Device and method for digital rights management | |
EP3035582B1 (en) | Binding white-box implementation to reduced secure element | |
US20190208276A1 (en) | Protected media decoding system supporting metadata | |
US8245307B1 (en) | Providing secure access to a secret | |
US20100241855A1 (en) | Systems and Methods for Secure Execution of Code Using a Hardware Protection Module | |
CN104246784A (en) | Method, device, and system for protecting and securely delivering media content | |
US8438112B2 (en) | Host device, portable storage device, and method for updating meta information regarding right objects stored in portable storage device | |
TW201234210A (en) | Method for loading a code of at least one software module | |
US8837722B2 (en) | Secure content distribution with distributed hardware | |
WO2015045172A1 (en) | Information processing device and information processing method | |
CN114996666A (en) | Method for encrypting and decrypting neural network model, electronic device and storage medium | |
CN106416172B (en) | Method and apparatus for content management | |
CN105760719B (en) | A kind of ciphertext data decryption method and system | |
CN112805698A (en) | Rendering content protected by multiple DRMs | |
CN103020492A (en) | On-line digital content copyright protection system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210524 Address after: Room j4-02, block J, Zhongxing Industrial Park, No.10, Tangyan South Road, high tech Zone, Xi'an City, Shaanxi Province, 710065 Patentee after: Xi'an Chris Semiconductor Technology Co.,Ltd. Address before: No.1 Factory building, Dameisha, Yantian District, Shenzhen, Guangdong 518085 Patentee before: Sanechips Technology Co.,Ltd. |