CN105760719B - A kind of ciphertext data decryption method and system - Google Patents

A kind of ciphertext data decryption method and system Download PDF

Info

Publication number
CN105760719B
CN105760719B CN201410805764.8A CN201410805764A CN105760719B CN 105760719 B CN105760719 B CN 105760719B CN 201410805764 A CN201410805764 A CN 201410805764A CN 105760719 B CN105760719 B CN 105760719B
Authority
CN
China
Prior art keywords
ciphertext data
shared drive
safety operation
decryption
subsystem
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410805764.8A
Other languages
Chinese (zh)
Other versions
CN105760719A (en
Inventor
曹炜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Chris Semiconductor Technology Co.,Ltd.
Original Assignee
Shenzhen ZTE Microelectronics Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen ZTE Microelectronics Technology Co Ltd filed Critical Shenzhen ZTE Microelectronics Technology Co Ltd
Priority to CN201410805764.8A priority Critical patent/CN105760719B/en
Priority to PCT/CN2015/083768 priority patent/WO2016095506A1/en
Publication of CN105760719A publication Critical patent/CN105760719A/en
Application granted granted Critical
Publication of CN105760719B publication Critical patent/CN105760719B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a kind of ciphertext data decryption method and systems, this method comprises: non-secure operations subsystem loads ciphertext data to shared drive;Safety operation subsystem certificate according to the pre-stored data key, the ciphertext data loaded in the shared drive are decrypted, obtain clear data simultaneously store to the first unshared storage region.The embodiment of the present invention is by dividing non-security performing environment and secure execution environments, the functions such as secret key downloading are realized in non-security performing environment, the functions such as secret key secure storage, the decryption of ciphertext data safety are realized in secure execution environments, so as to guarantee that ciphertext data and key are not stolen by Malware, and the clear data after decryption is not monitored by malicious application, improves Information Security.

Description

A kind of ciphertext data decryption method and system
Technical field
The present invention relates to data security arts more particularly to a kind of ciphertext data decryption method and systems.
Background technique
Continuous with various intelligent terminals is popularized, and people more and more advantageously can use intelligent mobile terminal (such as Mobile phone, tablet computer etc.) by internet mobile Internet even work to learn, entertain.Wherein, most people all can It is related to the digital product resource (video, music, document etc.) of downloading viewing digital publishing quotient distribution, at the same time, greatly Amount occurs in succession by the unauthorized download of intelligent terminal, viewing, propagation or even pirate phenomenon, therefore digital rights management (digital right management, DRM) technology starts to develop to intelligent terminal direction.
The content of DRM technology protection is broadly divided into two classes: one kind is multimedia protection, such as encryption film, music, sound view Frequently, files in stream media;In addition one kind is encrypted document, such as Word, Excel, PDF etc..In DRM frame, generally comprise interior Hold operator, network operator, authorization center and these parts of terminal user.Its principle are as follows: terminal user is authorizing first Corresponding digital rights certificate is bought in center registration, payment, and then content operator is mentioned by network operator to terminal user For encrypted digital content, terminal user is decrypted after obtaining data using the secret key in digital rights certificate or the key individually provided Data, last terminal user carry out the broadcasting (watch, listen to or read) of digital product using intelligent terminal.
In order to improve the safety of DRM, the prior art relates generally to improve secret key or data transimission and storage at the terminal Safety, and be related to improving the safety that plays at the terminal of digital content.But it is based on the prior art, if user It obtains ciphertext data and obtains key, it is possible to decrypt ciphertext data and propagate clear data, safety is lower;In addition, i.e. Make user can not ciphertext data broadcasting content is monitored on backstage and (such as is read it is possible to while played file Data in FrameBuffer), and then obtain clear data by way of copy and propagated, equally it is unfavorable for data Safety.
Summary of the invention
In view of this, the embodiment of the present invention provides to solve existing technical problem:
The present invention provides a kind of ciphertext data decryption methods, this method comprises:
Non-secure operations subsystem loads ciphertext data to shared drive;
Safety operation subsystem certificate according to the pre-stored data key, to the ciphertext data loaded in the shared drive It is decrypted, obtains clear data and stores to the first unshared storage region.
Preferably, this method further include:
Non-secure operations subsystem downloadable authentication key and store to shared drive;
Safety operation subsystem from shared drive obtain the certificate key and store to the second unshared storage region,
The safety operation subsystem certificate according to the pre-stored data key, to the ciphertext loaded in the shared drive Data are decrypted, comprising:
The safety operation subsystem from the described second unshared storage region read certificate key, to it is described it is shared in The ciphertext data for depositing middle loading are decrypted.
Preferably, after the ciphertext data loaded in shared drive are decrypted in the safety operation subsystem, the party Method further include:
Determine that non-secure operations subsystem continues to shared drive when not being fully completed to the decryption of current ciphertext data source Ciphertext data are loaded, so that safety operation subsystem continues to decrypt, until the decryption to current ciphertext data source is all complete At.
Preferably, this method further include:
According to preset exhibition strategy, in corresponding display location to the plaintext number after safety operation subsystem decryption According to being shown.
Invention further provides a kind of ciphertext data decryption system, which includes: non-secure operations subsystem, safety behaviour Make subsystem, shared drive and the first unshared storage region;Wherein,
The non-secure operations subsystem, for loading ciphertext data to shared drive;
The safety operation subsystem, for certificate according to the pre-stored data key, to what is loaded in the shared drive Ciphertext data are decrypted, and the clear data that will acquire is stored to the first unshared storage region;
The shared drive, the data shared for storing non-secure operations subsystem and safety operation subsystem;
The first unshared storage region, for storing the clear data after the decryption that safety operation subsystem exclusively enjoys.
Preferably, the system further includes the second unshared storage region,
The non-secure operations subsystem, be also used to downloadable authentication key and store to shared drive;
The safety operation subsystem, be also used to obtain from shared drive the certificate key and store to second non-total Enjoy storage region;
The second unshared storage region, for store certificate that safety operation subsystem exclusively enjoys key,
Correspondingly, the safety operation subsystem specifically from the described second unshared storage region read certificate key, it is right The ciphertext data loaded in the shared drive are decrypted.
Preferably,
The non-secure operations subsystem is also used in safety operation subsystem to the ciphertext data loaded in shared drive After being decrypted, judge whether the decryption of current ciphertext data source is fully completed, determines the decryption to current ciphertext data source When not being fully completed, continue to load ciphertext data to shared drive, so that safety operation subsystem continues to decrypt, until right The decryption of current ciphertext data source is fully completed.
Preferably, the system further includes display module;Wherein,
The display module is used for according to preset exhibition strategy, in corresponding display location to safety operation Clear data after system decryption is shown.
Ciphertext data decryption method and system described in the embodiment of the present invention, non-secure operations subsystem fill ciphertext data It is loaded onto shared drive;Safety operation subsystem certificate according to the pre-stored data key, to the ciphertext loaded in the shared drive Data are decrypted, and obtain clear data and store to the first unshared storage region.The embodiment of the present invention is by dividing non-peace Full performing environment and secure execution environments realize the functions such as secret key downloading, in secure execution environments in non-security performing environment The functions such as middle realization secret key secure storage, the decryption of ciphertext data safety, so as to guarantee ciphertext data and key not by malice Software is stolen, and the clear data after decryption is not monitored by malicious application, improves Information Security.
Detailed description of the invention
Fig. 1 is a kind of ciphertext data decryption method flow diagram of the embodiment of the present invention;
Fig. 2 is another ciphertext data decryption method flow diagram of the embodiment of the present invention;
Fig. 3 is another ciphertext data decryption method flow diagram of the embodiment of the present invention;
Fig. 4 is a kind of ciphertext data decryption system structural schematic diagram of the embodiment of the present invention;
Fig. 5 is another ciphertext data decryption system structural schematic diagram of the embodiment of the present invention;
Fig. 6 is another ciphertext data decryption system structural schematic diagram of the embodiment of the present invention;
Fig. 7 is ciphertext data decryption system structural schematic diagram in the embodiment of the present invention 1.
Specific embodiment
The birth of processor technology (such as TrustZone technology of ARM) with security isolation function is intelligent terminal Safety opens brand-new road.Defencive function is integrated into kernel to guarantee to be by the processor technology with security isolation function The safety of system, and be integrated into the whole design of system.Security software platform is provided simultaneously, makes semiconductor maker, equipment The security solution of oneself is extended and developed on the frame that manufacturer and operating system partner can share at one.For example, TrustZone technology has introduced user mode from completely new safe condition to ARM architecture and privileged mode, to determine system It is to operate under safety or insecure environments.TrustZone technology is thorough by non-security performing environment and secure execution environments Isolation, and can be converted between safety and insecure environments by security monitor (Monitor).
Based on the processor technology with security isolation function, the embodiment of the present invention proposes a kind of ciphertext data deciphering side Method, as shown in Figure 1, this method comprises:
Step 11: non-secure operations subsystem loads ciphertext data to shared drive;
Step 12: safety operation subsystem certificate according to the pre-stored data key, it is close to being loaded in the shared drive Literary data are decrypted, and obtain clear data and store to the first unshared storage region.
In one specific embodiment, as shown in Fig. 2, this method further include:
Step 21: non-secure operations subsystem downloadable authentication key and store to shared drive;
Step 22: safety operation subsystem from shared drive obtain the certificate key and storing to second unshared deposit Storage area domain.
Correspondingly, the safety operation subsystem certificate according to the pre-stored data key, to being loaded in the shared drive Ciphertext data be decrypted, comprising:
The safety operation subsystem from the described second unshared storage region read certificate key, to it is described it is shared in The ciphertext data for depositing middle loading are decrypted.
In one specific embodiment, as shown in figure 3, the safety operation subsystem is to the ciphertext data loaded in shared drive After being decrypted, this method further include:
Step 31: determine when not being fully completed to the decryption of current ciphertext data source, non-secure operations subsystem continue to Shared drive loads ciphertext data, so that safety operation subsystem continues to decrypt, until the solution to current ciphertext data source It is close to be fully completed.
In one specific embodiment, this method further include:
According to preset exhibition strategy, in corresponding display location to the plaintext number after safety operation subsystem decryption According to being shown.
The embodiment of the present invention also proposed a kind of ciphertext data decryption system, as shown in figure 4, the system includes: non-security Operational subsystems 41, safety operation subsystem 42, shared drive 43 and the first unshared storage region 44;Wherein,
The non-secure operations subsystem 41, for loading ciphertext data to shared drive;
The safety operation subsystem 42, for certificate according to the pre-stored data key, to being loaded in the shared drive The ciphertext data clear data that is decrypted, and will acquire store to the first unshared storage region 44;
The shared drive 43, the data shared for storing non-secure operations subsystem and safety operation subsystem;
The first unshared storage region 44, for storing the plaintext number after the decryption that safety operation subsystem exclusively enjoys According to.
In one specific embodiment, as shown in figure 5, the system further includes the second unshared storage region 51,
The non-secure operations subsystem 41, be also used to downloadable authentication key and store to shared drive;
The safety operation subsystem 42, be also used to obtain from shared drive the certificate key and store to second non- Shared storage area;
The second unshared storage region 51, for store certificate that safety operation subsystem exclusively enjoys key.
Correspondingly, the safety operation subsystem 42 specifically from the described second unshared storage region 51 read certificate it is close The ciphertext data loaded in the shared drive are decrypted in key.
In one specific embodiment, the non-secure operations subsystem 41 is also used in safety operation subsystem 42 to shared After the ciphertext data loaded in memory 43 are decrypted, judge whether the decryption of current ciphertext data source is fully completed, determines When not being fully completed the decryption of current ciphertext data source, continue to load ciphertext data to shared drive 43, so as to safety operation Subsystem 42 continues to decrypt, until the decryption to current ciphertext data source is fully completed.
In one specific embodiment, as shown in fig. 6, the system further includes showing mould 61;Wherein,
The display module 61 is used for according to preset exhibition strategy, in corresponding display location to the safety operation Clear data after subsystem 42 is decrypted is shown.
Technical solution of the present invention is described in further detail below by specific embodiment.
The scheme for improving DRM and playing safety based on intelligent mobile terminal that the present embodiment provides a kind of.For existing DRM technology there are the problem of, digital product application is divided by using the processor technology with security isolation function non- Two parts of safety and safety, wherein unsecure parts are responsible for the functions such as secret key deployment, shared-memory management, broadcasting, Ministry of State Security Divide the functions such as secure storage, the decryption of ciphertext data safety, the safety display of responsible secret key.It therefore, can be by secret key storage and data Decrypting process is thoroughly isolated with insecure environments, under the premise of not changing existing DRM technology framework, makes content operator can be with Secret key is deployed on intelligent terminal and can safely play ciphertext data by safety.
Fig. 7 show ciphertext data decryption system structural schematic diagram in the embodiment of the present invention 1, as shown in fig. 7, the system packet It includes: non-secure operations subsystem 101, digital product applications client 102, non-security Correspondent 103, safety operation subsystem 111, digital product security application 112, safety communication agency 113, shared drive 201, touch screen 202, non-volatile memories 301, Pacify full frame buffer 302.Wherein, digital product applications client 102 includes cipher key deployment module 104 again, and synchronization module 105 is broadcast Amplification module 106;It again include secure storage module 114, secure decryption module 115, safety display in digital product security application 112 Module 116, in which:
Non-secure operations subsystem 101 can also claim high level operating system, such as Android, iOS etc., running on has peace (as the non-security of arm processor with TrustZone technology is held in the non-security performing environment of the processor of full isolation features In row environment), it is commonly with main operating system on intelligent terminal, various applications are (with the application of system publication, system official The application of the application of Fang Fabu or third party's publication) generally all operate in the operating system.Non-secure operations subsystem itself Without hard/software isolation features or only limited authority mechanism (such as sandbox mechanism of Android), can not prevent different soft Part accesses identical hardware address, so that answering in protected data in volatibility or non-volatile memory cells can not be prevented Appearance is stolen by third party software.Here by taking Android as an example, digital product applications client 102 is run in the operating system.
Digital product applications client 102 operates in the non-security performing environment of the processor with security isolation function In, and operate on non-secure operations subsystem, for example, operating in the non-security of the arm processor with TrustZone technology In performing environment, and operate on non-secure operations subsystem 101.It is the unsecured side with DRM and playing function software Using, include cipher key deployment module 104, synchronization module 105, playing module 106.
Non-security Correspondent 103, runs under the monitoring environment of the processor with security isolation function, system from When non-security performing environment is switched to secure execution environments, for saving the context of non-secure operations subsystem, restore safety The context of operational subsystems finally jumps in safety operation subsystem and executes security application.For example, may operate in tool Have in the non-security performing environment of the arm processor of TrustZone technology, when unsecured side issues smc instruction, falls into kernel Enter monitor mode, the context of non-secure operations subsystem 101 is saved in monitor mode, restores safety operation subsystem The context of system 111, finally jumps in safety operation subsystem and continues to execute.
Cipher key deployment module 104, it acts as from authorization center Xia Zaizhengshu key, and by the digital version warrant of downloading Book key be transferred to security context, and be stored in secure storage unit in security context.Secure storage unit is non- It is sightless in security context, therefore unauthorized application can not directly or indirectly obtain the safety and deposit in insecure environments Content in storage unit.With reference to Fig. 7, cipher key deployment module 104 specifically from authorization center downloadable authentication key, then will downloading Digital rights certificate key safety operation subsystem 111 is transferred to by non-security Correspondent 103, and notify to deposit safely Store up module 114 by certificate key storage to nonvolatile safe storage 301 in.Nonvolatile safe storage 301 is in non-security ring It is sightless in border, therefore unauthorized application can not directly or indirectly obtain nonvolatile safe storage in insecure environments Content in 301.
Synchronization module 105 obtains decrypted it acts as synchronous with the ciphertext data decrypting process in secure execution environments Journey state, and the ciphertext data content in shared drive is updated according to the state, with reference to Fig. 7, especially by non-security communication generation Reason 103 is synchronous with the secure decryption module 115 of safety operation subsystem 111, obtains the shape of 115 decrypting process of secure decryption module State, and the ciphertext data content in shared drive 201 is updated according to the state.
Playing module 106 constructs player appropriate (such as video player, audio player or reader etc.) boundary Face, comprising various function buttons (such as start, stop button or page-turning button etc.) in interface, and reserved clear data viewing area Domain, which is filled by the secure display controller 116 in digital product security application 112, and has finally been shown by touch screen 202 Whole picture.
Safety operation subsystem 111, the safety for operating in the arm processor with TrustZone technology execute ring In border, be responsible for specially the high special task of processing security level (or application), for example, certificate key secure storage task, close Literary data deciphering task and safety display task dispatching.Secure execution environments have hard/software isolation features, on the one hand, rely on tool There is the processor of security isolation function that can realize that insecure environments are isolated with hard/software of security context, on the other hand, safety is grasped Make subsystem itself and realize isolation mech isolation test, the task (or application) run on safety operation subsystem is made respectively to exclusively enjoy oneself Volatile and nonvolatile memory space, and forbid accessing mutually between task.
Digital product security application 112 operates in the secure execution environments of the processor with security isolation function, such as In the secure execution environments of arm processor with TrustZone technology, and operate on safety operation subsystem 111.It is Secure side application with DRM and playing function software, includes secure storage module 114, and secure decryption module 115 is safe aobvious Show module 116.
Safety communication agency 113, operates under the monitoring environment of the processor of security isolation function, in system from safety When performing environment is switched to non-security performing environment, for saving the context of safety operation subsystem, restore non-secure operations The context of subsystem finally jumps in non-secure operations subsystem and continues to execute unsecured side application.With reference to Fig. 7, peace Full Correspondent 113 operates in the secure execution environments of the arm processor with TrustZone technology, issues in secure side When smc is instructed, kernel is made to fall into monitor mode, the context of safety operation subsystem 111 is saved in monitor mode, The context for restoring non-secure operations subsystem 101, finally jumps in non-secure operations subsystem and continues to execute.
Secure storage module 114, by the certificate in 102 shared drive 201 of digital product applications client key deposit It stores up in the nonvolatile safe storage 301 that the digital product security application 112 exclusively enjoys.
In 102 shared drive of digital product client 201 ciphertext data are converted to and can be broadcast by secure decryption module 115 The clear data put, and the clear data after conversion is temporarily stored into the peace full frame buffer 302 that security application 112 exclusively enjoys.
Secure display controller 116 can allow touch screen 202 to map institute in the clear data region of the playing module 106 The data in peace full frame buffer 302 are stated, the clear data cannot be covered or be removed to be played in the digital product client 102 The broadcast interface that module 106 is shown, and the broadcast interface shown with playing module 106 in the digital product client 102 closes At complete display picture.
Shared drive 201 is created by non-secure operations subsystem 101, and is shared to secure execution environments, i.e., non-security It is in performing environment as it can be seen that also visible in secure execution environments.For the interaction data in two environment.Have in such and is supervised Depending on risk, need the primary i.e. removing of interaction when in use.In the present embodiment, shared drive 201 is for two aspects: one Be digital rights certificate close progress secure storage when, disposably by certificate key share to peace from non-security performing environment Full performing environment is deleted after being finished;Second is that ciphertext data are shared from non-security performing environment to safety when safety plays Performing environment.
Touch screen 202, it can it operates in non-security performing environment, can also run in security context, it acts as It read in non-security performing environment first, show the broadcasting that playing module 106 is shown in the digital product client 102 Then the plaintext number in the peace full frame buffer 302 in the digital product security application 112 is read at interface in secure execution environments According to, by the clear data synthesis in the clear data region of the broadcast interface, finally show complete frame picture.
Nonvolatile safe storage 301 acts on to cache clear data after decrypted.Generally digital product is answered safely The region exclusively enjoyed in non-volatile memories with 112, will not by non-security performing environment application or secure execution environments in Other security applications accessed.
Pacify full frame buffer 302, acts on to cache clear data after decrypted.Generally digital product security application 112 One piece distributed on heap or stack exclusively enjoys region of memory, will not by non-security performing environment application or secure execution environments in Other security applications accessed.
With reference to system shown in Figure 7, ciphertext data decryption method described in the embodiment of the present invention includes:
Step A. user using the digital product applications client downloadable authentication key, and pass through non-security communication Agency by certificate key be transferred to secure side;
Step B. digital product security application receive certificate key, and by the certificate key storage to the safety answer With the nonvolatile safe memory space exclusively enjoyed;
Step C. user using the digital product applications client execute playing function (such as click start, stop by The message sent after button, here by taking user clicks start button as an example, to illustrate working-flow);
It is close to load to create a certain size shared drive for the synchronization module of digital product applications client described in step D. Literary data;
Step E. synchronization module initiates secure decryption process;
The corresponding peace full frame buffer of step F. secure decryption module creation;
Step G. secure decryption module simultaneously will using the ciphertext data in the decryption shared drive of key described in step B Clear data after decryption is stored in peace full frame buffer;
After step H. secure decryption module has decrypted a frame buffered data, the secure display controller, the safety are notified One frame data are incorporated into the clear data display area of the broadcast interface by display module driving touch screen;
After step I. secure decryption module has decrypted all ciphertext data in shared drive, synchronization module is notified;
Step J. synchronization module judges whether the current broadcast point in encryption data source reaches tail portion, if not reaching tail Portion, return step E continue to decrypt;It is returned if reaching tail portion.
In step A, user using the digital product applications client downloadable authentication key, and by non-security logical News agency by certificate key be transferred to secure side, may include step in detail below:
A1. guest operation digital product applications client, click installation certificate key button;
A2. digital product applications client connects rights issuer server, by certificate key be downloaded to unsecured side and delay It deposits;
A3. the cipher key deployment module of digital product applications client by comprising certificate the buffer flag of key be in shared It deposits;
A4. digital product applications client notifies non-security Correspondent to switch over, and shared drive address is passed through Processor register is transmitted;
A5. non-security Correspondent saves secure side context, executes smc instruction, processor is made to fall into monitor mould Formula.
In step B, digital product security application receive certificate key, and by the certificate key storage to the safety May include step in detail below using the nonvolatile safe memory space exclusively enjoyed:
B1. the address comprising the shared drive is passed to secure side variable under monitor mode by processor, is restored Secure side context executes digital product security application;
B2. the secure storage module of digital product security application opened up in secure memory space with certificate needed for key The space of size;
B3. the secure storage module of digital product security application by certificate in shared drive key storage with the safety In memory space;
B4. digital product security application knows that safety communication agency switches over;
B5. safety communication agency saves secure side context, executes smc instruction, processor is made to fall into monitor mode;
B6. processor restores unsecured side context under monitor mode, and executes digital product applications client.
In step C, user using the digital product applications client execute playing function (such as click start, stop The message sent after button, here by taking user clicks start button as an example, to illustrate working-flow), it may include following Process:
C1. user, which clicks, starts broadcast button;
C2. digital product applications client opens corresponding ciphertext digital document.
In step D, the synchronization module of digital product applications client creates a certain size shared drive to load ciphertext Data may include following below scheme:
D1. the synchronization module of digital product applications client creates one piece of memory according to shared buffer full-size;
D2. the memory marker is shared drive by the synchronization module;
D3. the data copy that the synchronization module starts ciphertext data current location is into shared drive.
In step E, synchronization module initiates secure decryption process, may include following below scheme:
E1. synchronization module notifies non-security Correspondent to switch over, and by shared drive address and executes secure decryption Order is transmitted by processor register;
E2. non-security Correspondent saves secure side context, executes smc instruction, processor is made to fall into monitor mould Formula;
E3. the address comprising the shared drive is passed to secure side variable under monitor mode by processor, is restored Secure side context executes digital product security application.
In step F, the corresponding peace full frame buffer of secure decryption module creation may include following below scheme:
F1. digital product security application obtains the order for executing secure decryption from shared buffer, starts secure decryption mould Block;
F2. actual size of the secure decryption module according to data in shared drive, the corresponding frame buffering of one piece of creation.
In step G, secure decryption module is using the ciphertext data in the decryption shared drive of key described in step B, simultaneously Clear data after decryption is stored in peace full frame buffer, may include following below scheme:
G1. secure decryption module from secure storage certificate described in load step B secret key;
G2. secure decryption module using the certificate ciphertext data in secret key pair shared drive be decrypted;
G3. secure decryption module deposits in the ciphertext data after decryption in the peace full frame buffer.
In step H, after secure decryption module has decrypted a frame buffered data, the secure display controller, the peace are notified One frame data are incorporated into the clear data display area of the broadcast interface by full display module driving touch screen, may include following Process:
H1. secure decryption module judges whether a frame data decrypt completion, returns to the G2 step relaying if do not completed It is continuous to execute, if completing to execute below step;
H2. secure display controller obtains safe display position information;
H3. a frame clear data is passed to touch screen driving according to the safe display position information by secure display controller;
H4. result is shown in safe display area of the touch screen driving in broadcast interface.
In step I, after secure decryption module has decrypted all ciphertext data in shared drive, synchronization module is notified, it can To include following below scheme:
I1. secure decryption module judges whether to complete the decryption work of all ciphertext data in shared drive, if not It completes, then returns to G2, execute following process if completing;
I2. secure decryption module saves secure side context, executes smc instruction, processor is made to fall into monitor mode;
I3. processor restores unsecured side context under monitor mode, returns to synchronization module and continues to execute.
In step J, synchronization module judges whether the current broadcast point in encryption data source reaches tail portion, if not continuing to hold Row step E completes to play, may include following below scheme if reaching tail portion:
J1. synchronization module is completed to play, if do not arrived according to arrival ciphertext data trailer is judged whether if reaching Up to then executing following process;
J2. synchronization module obtains the current location that ciphertext number plays, and return step E is continued to execute.
Compared with prior art, the embodiment of the present invention introduces the processor technology with security isolation function, will count Word product player (or reader, browser) application is divided into non-security application and two parts of security application, wherein non-peace All point responsible secret key downloading, shared-memory management and playing function, security are responsible for the secure storage of secret key, ciphertext data Secure decryption and safe display function.On the one hand, it ensure that the secure storage of key, the digital product client cannot be removed Other any softwares in addition are stolen;On the other hand, during digital product client plays out, unsecured side only adds Ciphertext data are carried, and by ciphertext data sharing to secure side, generate final clear data in the peace full frame buffer of secure side, It ensure that clear data will not be monitored by any application.
In addition, scheme used by the embodiment of the present invention is suitable for the DRM technology framework of current mainstream, have no need to change Any part in DRM technology framework, with popularizing for the processor technology with security isolation function, which can gradually melt Enter in DRM framework.
Above-mentioned each unit can by electronic equipment central processing unit (Central Processing Unit, CPU), Digital signal processor (Digital Signal Processor, DSP) or programmable logic array (Field- Programmable Gate Array, FPGA) it realizes.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program Product.Therefore, the shape of hardware embodiment, software implementation or embodiment combining software and hardware aspects can be used in the present invention Formula.Moreover, the present invention, which can be used, can use storage in the computer that one or more wherein includes computer usable program code The form for the computer program product implemented on medium (including but not limited to magnetic disk storage and optical memory etc.).
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The system for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of system, the instruction system realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.

Claims (6)

1. a kind of ciphertext data decryption method, which is characterized in that this method comprises:
Non-secure operations subsystem loads ciphertext data to shared drive;
Safety operation subsystem certificate according to the pre-stored data key, the ciphertext data that load in the shared drive are carried out Decryption obtains clear data and stores to the first unshared storage region;
Wherein, the described first unshared storage region is to be loaded by the safety operation subsystem according in the shared drive The actual size creation of ciphertext data;
Non-secure operations subsystem downloadable authentication key and store to shared drive;
Safety operation subsystem from shared drive obtain the certificate key and store to the second unshared storage region,
The safety operation subsystem certificate according to the pre-stored data key, to the ciphertext data loaded in the shared drive It is decrypted, comprising:
The safety operation subsystem from the described second unshared storage region read certificate key, in the shared drive The ciphertext data of loading are decrypted.
2. the method according to claim 1, wherein the safety operation subsystem in shared drive to loading After ciphertext data are decrypted, this method further include:
Determine that non-secure operations subsystem continues to load to shared drive when not being fully completed to the decryption of current ciphertext data source Ciphertext data, so that safety operation subsystem continues to decrypt, until the decryption to current ciphertext data source is fully completed.
3. according to claim 1 to 2 described in any item methods, which is characterized in that this method further include:
According to preset exhibition strategy, corresponding display location to the clear data after safety operation subsystem decryption into Row is shown.
4. a kind of ciphertext data decryption system, which is characterized in that the system includes: non-secure operations subsystem, safety operation System, shared drive and the first unshared storage region;Wherein,
The non-secure operations subsystem, for loading ciphertext data to shared drive;
The safety operation subsystem, for certificate according to the pre-stored data key, to the ciphertext loaded in the shared drive Data are decrypted, and the clear data that will acquire is stored to the first unshared storage region;
The shared drive, the data shared for storing non-secure operations subsystem and safety operation subsystem;
The first unshared storage region, for storing the clear data after the decryption that safety operation subsystem exclusively enjoys;Wherein, The first unshared storage region is by the safety operation subsystem according to the ciphertext data loaded in the shared drive Actual size creation;
The system further includes the second unshared storage region,
The non-secure operations subsystem, be also used to downloadable authentication key and store to shared drive;
The safety operation subsystem, be also used to obtain from shared drive the certificate key and storing to second unshared deposit Storage area domain;
The second unshared storage region, for store certificate that safety operation subsystem exclusively enjoys key,
Correspondingly, the safety operation subsystem specifically from the described second unshared storage region read certificate key, to described The ciphertext data loaded in shared drive are decrypted.
5. system according to claim 4, which is characterized in that
The non-secure operations subsystem is also used to carry out the ciphertext data loaded in shared drive in safety operation subsystem After decryption, judge whether the decryption of current ciphertext data source is fully completed, determination is not complete to the decryption of current ciphertext data source When portion completes, continue to load ciphertext data to shared drive, so that safety operation subsystem continues to decrypt, until to current The decryption of ciphertext data source is fully completed.
6. according to the described in any item systems of claim 4 to 5, which is characterized in that the system further includes display module;Wherein,
The display module is used for according to preset exhibition strategy, in corresponding display location to the safety operation subsystem Clear data after decryption is shown.
CN201410805764.8A 2014-12-19 2014-12-19 A kind of ciphertext data decryption method and system Active CN105760719B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410805764.8A CN105760719B (en) 2014-12-19 2014-12-19 A kind of ciphertext data decryption method and system
PCT/CN2015/083768 WO2016095506A1 (en) 2014-12-19 2015-07-10 Ciphertext data decryption method, system and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410805764.8A CN105760719B (en) 2014-12-19 2014-12-19 A kind of ciphertext data decryption method and system

Publications (2)

Publication Number Publication Date
CN105760719A CN105760719A (en) 2016-07-13
CN105760719B true CN105760719B (en) 2019-11-15

Family

ID=56125811

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410805764.8A Active CN105760719B (en) 2014-12-19 2014-12-19 A kind of ciphertext data decryption method and system

Country Status (2)

Country Link
CN (1) CN105760719B (en)
WO (1) WO2016095506A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107579815B (en) * 2017-08-18 2020-11-20 瑞芯微电子股份有限公司 Method and device for safely programming key
CN114117460A (en) * 2020-09-01 2022-03-01 鸿富锦精密电子(天津)有限公司 Data protection method and device, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102985930A (en) * 2011-05-25 2013-03-20 松下电器产业株式会社 Information processing device and information processing method
CN103701594A (en) * 2014-01-03 2014-04-02 天地融科技股份有限公司 Data transmission method and system
CN104091135A (en) * 2014-02-24 2014-10-08 电子科技大学 Intelligent terminal safety system and safety storage method

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8868925B2 (en) * 2008-12-09 2014-10-21 Nvidia Corporation Method and apparatus for the secure processing of confidential content within a virtual machine of a processor
US20130054473A1 (en) * 2011-08-23 2013-02-28 Htc Corporation Secure Payment Method, Mobile Device and Secure Payment System
CN103514414A (en) * 2012-06-26 2014-01-15 上海盛轩网络科技有限公司 Encryption method and encryption system based on ARM TrustZone
KR20140110639A (en) * 2013-03-08 2014-09-17 삼성전자주식회사 Data security method and electronic device implementing the same
CN104102876A (en) * 2014-07-17 2014-10-15 北京握奇智能科技有限公司 Device for safeguarding operational security of client side

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102985930A (en) * 2011-05-25 2013-03-20 松下电器产业株式会社 Information processing device and information processing method
CN103701594A (en) * 2014-01-03 2014-04-02 天地融科技股份有限公司 Data transmission method and system
CN104091135A (en) * 2014-02-24 2014-10-08 电子科技大学 Intelligent terminal safety system and safety storage method

Also Published As

Publication number Publication date
CN105760719A (en) 2016-07-13
WO2016095506A1 (en) 2016-06-23

Similar Documents

Publication Publication Date Title
US11651113B2 (en) Program execution device
CN103339957B (en) Method and apparatus for building a hardware root of trust and providing protected content processing within an open computing platform
CN106462718B (en) Store the rapid data protection of equipment
CN103368740B (en) System for numeral copyright management of the bound content to smart storage device, device and method
JP5556895B2 (en) Content data reproducing apparatus, update management method, and update management program
KR101496424B1 (en) User based content key encryption for a DRM system
EP2082199B1 (en) A data storage device and method
US9990473B2 (en) Method and apparatus for policy-based content sharing in a peer to peer manner using a hardware based root of trust
TW201023047A (en) Method and apparatus for the secure processing of confidential content within a virtual machine of a processor
US10303857B2 (en) Providing access to content
US20060155651A1 (en) Device and method for digital rights management
EP3035582B1 (en) Binding white-box implementation to reduced secure element
US20190208276A1 (en) Protected media decoding system supporting metadata
US8245307B1 (en) Providing secure access to a secret
US20100241855A1 (en) Systems and Methods for Secure Execution of Code Using a Hardware Protection Module
CN104246784A (en) Method, device, and system for protecting and securely delivering media content
US8438112B2 (en) Host device, portable storage device, and method for updating meta information regarding right objects stored in portable storage device
TW201234210A (en) Method for loading a code of at least one software module
US8837722B2 (en) Secure content distribution with distributed hardware
WO2015045172A1 (en) Information processing device and information processing method
CN114996666A (en) Method for encrypting and decrypting neural network model, electronic device and storage medium
CN106416172B (en) Method and apparatus for content management
CN105760719B (en) A kind of ciphertext data decryption method and system
CN112805698A (en) Rendering content protected by multiple DRMs
CN103020492A (en) On-line digital content copyright protection system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210524

Address after: Room j4-02, block J, Zhongxing Industrial Park, No.10, Tangyan South Road, high tech Zone, Xi'an City, Shaanxi Province, 710065

Patentee after: Xi'an Chris Semiconductor Technology Co.,Ltd.

Address before: No.1 Factory building, Dameisha, Yantian District, Shenzhen, Guangdong 518085

Patentee before: Sanechips Technology Co.,Ltd.