Mobile terminal based on cellphone shield and cellphone shield management method
Technical field
This application involves cellphone shield technical field more particularly to a kind of mobile terminal and cellphone shield management methods.
Background technology
With Android platform TEE (Trusted Execution Environment) credible performing environment it is general
And the various financial payments based on TEE environment, the demand of the higher sector application of the security level requireds such as authentication is increasingly
It is more, for example, the bank of tradition PC platforms personal Internet-based banking services start gradually to mobile phone side migrate.Traditional PC platforms are personal
Internet-based banking services need to use the physics shield of the external safety certification of USB interface, ensure the safety of transaction.
Universal with smart mobile phone, user is more likely to personal internet banking operation and the use of mobile phone, but mobile phone
Open system lead to many unsafe loopholes and limitation, the appearance of TEE systems just can be with the online silver of individual of mobile phone
Industry business combines, and provides a kind of safe, efficiently services, since TEE systems support TUI (trusted User
Interface, trusted user interface), it is possible to provide the information of the user interface of security context, the transaction of guarantee is not tampered
It is inputted with the safety of PIN, realizes the two generation Usbkey business of " finding is to be signed " of PC platforms.
The transaction message of the transaction processing system of Mobile banking does not unify format, and trading algorithms are also no to fix specification,
For the cellphone shield business of TEE environment, only increases a kind of new communication meson for bank, will not be situated between because of newly-increased communication
Son and change existing business transaction system, can only be new communication meson adaptation existing system.
The UI modes of operation of the Mobile banking APP of bank, display styles, subject color have very big difference, bank simultaneously
Requirements at the higher level are proposed to the TUI display systems of TEE environment.
For the cellphone shield business demand of the bank of TEE environment, cell phone system side needs to support the business of different bank to need
It asks, corresponding TA (Trusted application, trusted application) side exploitation needs to customize corresponding TA, but due to mobile phone TEE rings
Border resource is limited, it is impossible to which infinite expanding supports multiple TA, multiple TA also to increase maintenance cost simultaneously, be also unfavorable for business and push away
Extensively.
Invention content
The application's be designed to provide a kind of mobile terminal and cellphone shield management method, proposes the exploitation for the sides TA
Configuration management requirement simplifies adaptation of the operation system to TA of different industries user (bank, security, insurance etc.).
In order to achieve the above objectives, the application provides a kind of mobile terminal based on cellphone shield, and mobile terminal includes credible holds
Row environment and rich performing environment;Mobile terminal user's application installation package, mobile terminal user's application peace are installed in rich performing environment
Dress includes at least one end-user application;Cellphone shield trusted application is installed, cellphone shield is credible in credible performing environment
Using including configuration information memory module corresponding with end-user application.
As above, wherein end-user application has unique application identifier;Cellphone shield trusted application further includes
Maps application identifiers table, maps application identifiers table record the corresponding pass between application identifier and configuration information memory module
System.
As above, wherein trusted user interface configuration information is stored in configuration information memory module, trusted user interface is matched
Confidence breath includes that the scheme of colour of trusted user interface, end-user application LOGO, trusted user interface input frame carry
Show content, PIN code input requirement, the Cipher Strength requirement of PIN code, the button location information of particular trusted user interface, mistake
It is one or more in the configuration of prompt message and the transaction message display rule of trusted user interface.
As above, wherein transaction message fonnat configuring information is stored in configuration information memory module, transaction message format is matched
Confidence breath includes the coded format of message and the display rule of key message.
As above, wherein transaction message fonnat configuring information includes message coding mark, message key message extraction mark
Know, message shows content identification, it is one or more in the start of heading signed mark and end of identification to need.
As above, wherein trading algorithms configuration information, trading algorithms configuration information packet are stored in configuration information memory module
It includes one or more in PIN verification algorithms mark, message hash algorithm mark and message signature algorithm identifier.
As above, wherein mobile terminal user's application installation package includes cellphone shield Client application control, and cellphone shield client answers
Include TAM controls with control, TAM controls provide setting for cellphone shield TAM background systems and update trusted application configuration information
Standard interface.
As above, wherein the Android operation system of mobile terminal includes the shield service module being arranged in frame and setting
Shield service driver in kernel, shield service module provide the standard interface communicated between TAM controls and shield service driver,
Shield service driver passes through in the communication agent of rich performing environment and the communication agent of credible performing environment and credible performing environment
Trusted application communicated.
The application also provides a kind of cellphone shield management method based on above-mentioned mobile terminal, includes the following steps:Terminal is used
Family application program calls trusted application configuration information update interface by user interface side;The Android operation system of mobile terminal adds
The trusted application under credible performing environment is carried, and is sent to trusted application and reads version command;The Android operation system of mobile terminal
The version information that trusted application returns is uploaded to cellphone shield TAM background systems by system, and initiates update configuration request;It is mobile
The Android operation system of terminal receives that cellphone shield TAM background systems are different in response to version information and what is issued answer with terminal user
With the corresponding new version trusted application configuration information of program;The Android operation system of mobile terminal configures new version trusted application
Information is sent to trusted application, makes trusted application update configuration information and returns to update result;The Android operation system of mobile terminal
The update result of trusted application is returned to end-user application by system.
As above, wherein further include:Before loading the trusted application under credible performing environment, answered in response to terminal user
With routine call trusted application configuration information update interface, the TAM controls of cellphone shield Client application control are triggered, and TAM
Shield management module of the control into the Android operation system of mobile terminal is initiated to read version request;Also, configuration information more
During new, TAM controls and shield management module are used between end-user application and trusted application and after cellphone shield TAM
Data transmission between platform system and trusted application.
What the application realized has the beneficial effect that:
Relevant configuration management function of the application based on the TA exploitations of cellphone shield business on TEE environment Android systems, makes
The system manufacturer of mobile terminal safeguards that a cellphone shield TA is possibly realized, and simplifies the management of TA;Cellphone shield CA also only safeguards one in side
A TA completes the business demand of different industries user (bank, insurance, security etc.) by configuration information.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments described in application can also be obtained according to these attached drawings other attached for those skilled in the art
Figure.
Fig. 1 is the cellphone shield business general frame figure of mobile terminal;
Fig. 2 is the general frame figure of TEE environment;
Fig. 3 is the flow chart of TA configuration information updates;
Fig. 4 is preferred TA configuration information updates flow chart.
Specific implementation mode
With reference to the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Ground describes, it is clear that described embodiment is some embodiments of the present application, instead of all the embodiments.Based on the application
In embodiment, the every other embodiment that those skilled in the art are obtained without making creative work, all
Belong to the range of the application protection.
Embodiment one
Fig. 1 is the cellphone shield business general frame figure of mobile terminal, and mobile terminal is that the portable terminals such as mobile phone, tablet are set
It is standby.As shown in Figure 1, by taking mobile phone 100 as an example, mobile terminal 100 includes credible performing environment, rich performing environment and embedded peace
Full module (Embedded security module, ESE) 170.Credible performing environment security module driver (ESE
Driver it) 1602 is communicated with ESE170.
Mobile terminal user's application installation package and Android operation system are installed in rich performing environment.
Mobile terminal user's application installation package includes at least one user application (Application, APP).User
Application program can be bank's class user terminal application program, security class user terminal application program or insurance class user terminal application program
Etc. application programs.Here by taking at least one Mobile banking APP (only showing a Mobile banking APP 110 in Fig. 1) as an example.It can be with
Understand that ground, mobile terminal can install the user application of multiple phase same industries and/or user's application of different industries simultaneously
Program.
Preferably, mobile terminal user's application installation package further include cellphone shield Client application (client application,
CA) control 120.Cellphone shield CA controls 120 include trusted service management (Trusted Service Manager, TSM) control
1201, business control 1202 and trusted application management (Trusted Application Manager, TAM) control 1203,
TSM controls 1201 provide for the TSM platforms 210 and ESE170 of cell phone manufacturer and create auxiliary security domain (Auxiliary
Security domain, SSD), download applet (applet) and establishment application example standard interface, business control
1202 provide the standard interface of the finishing service under TEE environment for Mobile banking APP, and TAM controls 1203 are that Mobile banking APP is carried
Standard interface for the configuration information for being arranged and updating cellphone shield trusted application (Trusted application, TA) 150.
Android operation system includes the Android kernel 140 under frame 130 and REE environment.Frame 130 includes TEE shield management
Module (TEEKeyManager) 1301 and TEE shields service module (TEEKey Service) 1302.Shield pipe is equipped in kernel 140
Manage driver (TEEKeyManager Driver) 1401, shield service driver (TEEKeyService Driver) 1402 and richness
The communication agent (REE Communication Agent) 1403 of performing environment.Shield management module 1301 provides TSM controls 1201
The standard interface communicated between shield managing driver 1401, shield managing driver 1401 and ESE170 carry out direct communication.Shield
Service module 1302 provides the standard communicated between business control 1202 and TAM controls 1203 and shield service driver 1402 and connects
Mouthful, shield service driver 1402 passes through the communication agent 1403 of rich performing environment and the communication agent (TEE of credible performing environment
Communication Agent) it 1601 is communicated with the cellphone shield TA150 in TEE environment.
As shown in Fig. 2, installing cellphone shield TA150 in TEE environment, cellphone shield TA150 includes multiple configuration information storage moulds
Block 1501 (Fig. 2 only shows a configuration information memory module 1501), each configuration information memory module 1501 and one of them
User application (such as Mobile banking APP) is corresponding.Under operation, only there are one user applications to access cellphone shield
TA150。
As shown in Fig. 2, storage XML transaction messages fonnat configuring information, trading algorithms in configuration information memory module 1501
Configuration information, TUI interface configuration informations, configuration information read and write and the certificate and signed data of bank's (or security, insurance etc.)
Deng.Wherein, the certificate of bank's (or security, insurance etc.) is obtained by the root certificate signature of cellphone shield TAM background systems.
Wherein, TUI configuration informations include the scheme of colour (such as font color, size) of TUI, the terminal on the interfaces TUI
Suggestion content (for example, " 6-8 bit digitals, letter please be input "), the PIN code of input frame on the interfaces user application LOGO, TUI
Input requirements (for example, whether PIN code includes number, letter or symbol), the Cipher Strength of PIN code require, (such as, if packet
Containing capital and small letter, whether can input the rules such as identical characters, number whether can be continuous), the button position confidence at the specific interfaces TUI
Breath (for example, " confirmation " key in left or right side, whether the " Cancel " button is set), the configuration of TUI miscue information and TUI
It is one or more in transaction message display rule.
Transaction message fonnat configuring information includes the coded format of message, display rule of key message etc..Preferably, it hands over
Easy message format configuration information is standard JSON formats, including message coding mark, the extraction of message key message identify, message is aobvious
Show one or more in start of heading mark and end of identification that content identification, needs are signed etc..
Trading algorithms configuration information is standard JSON formats, and trading algorithms configuration information includes that PIN verification algorithms identify (such as
DES, 3DES), message hash algorithm mark (such as sha1, sha256, SM3) and message signature algorithm identifier (such as RSA,
SM2 one or more in).
Preferably, Mobile banking APP110 have unique application identifier (Application identifier,
AID).Cellphone shield TA150 further includes AID mapping tables 1502, AID mapping tables 1502 record AID and configuration information memory module it
Between correspondence.
Embodiment two
Present invention also provides a kind of cellphone shield management methods based on above-mentioned mobile terminal, including cellphone shield TA to match confidence
The update of breath.
Fig. 3 is TA configuration information update flow charts.As shown in figure 3, by taking Mobile banking APP as an example, update cellphone shield TA's
Configuration information includes the following steps:
S310:Mobile banking APP calls trusted application configuration information update interface by user interface side.
S320:Cellphone shield TA under the Android operation system load TEE environment of mobile terminal, and send and read to cellphone shield TA
Take version command.
S330:After the cellphone shield TA version informations returned are uploaded to cellphone shield TAM by the Android operation system of mobile terminal
Platform system, and initiate update configuration request.
S340:The Android operation system of mobile terminal receive cellphone shield TAM background systems it is different in response to version information and
The new version trusted application configuration information corresponding with Mobile banking APP issued.
S350:New version trusted application configuration information is sent to cellphone shield TA by the Android operation system of mobile terminal, is made
Cellphone shield TA update configuration informations simultaneously return to update result.
S360:The update result of cellphone shield TA is returned to Mobile banking APP by the Android operation system of mobile terminal.
Fig. 4 is preferred TA configuration information updates flow chart.In this embodiment, TAM controls and shield management module are used for
Data transmission between Mobile banking APP and cellphone shield TA and between cellphone shield TAM background systems and cellphone shield TA.Such as Fig. 4
Shown, the configuration information of update cellphone shield TA includes the following steps:
S401:The user interface side of Mobile banking APP calls TA configuration information update interfaces, triggering cellphone shield CA controls
TAM controls, TAM controls obtain the corresponding AID of Mobile banking APP.
S402:TAM controls judge whether installed cellphone shield in mobile phone by the Open interfaces of TeeKeyService
TA, TeeKeyService will determine that result returns to TAM controls.If having installed cellphone shield TA, S403 is executed.Otherwise, it returns
Non- mount message is returned, the flow is terminated.
S403:TAM controls initiate TA external authentication requests to cellphone shield TAM background systems, are wrapped in TA external authentication requests
The corresponding AID of APP containing Mobile banking.
S404:Cellphone shield TAM background systems correspond to the external authentication requests data of bank according to external authentication requests tissue
(including the root certificate public key of request, the sessionID and random number random of session etc.), and by TAM controls and
External authentication requests data are sent to cellphone shield TA by the transmit interfaces of TeeKeyService.
S405:Cellphone shield TA restores certificate according to related algorithm and verifies signed data, and according to session sessionId and
Random generates session key.
S406:Authentication result is returned to TAM controls by cellphone shield TA by the transmit interfaces of TeeKeyService.
S407:TAM controls call the open interface loading mobile phone shield TA of TeeKeyService, and pass through
The transmit interfaces of TeeKeyService send to cellphone shield TA and read TA version commands, include Mobile banking in the instruction
The AID of APP.
S408:Cellphone shield TA determines configuration information memory module corresponding with the bank according to the AID of Mobile banking APP,
TA version informations are returned to TAM controls by the transmit interfaces of TeeKeyService after wherein extracting configuration information.
S409:The cellphone shield TA version informations returned are uploaded to cellphone shield TAM background systems and initiate to configure by TAM controls
Information update is asked.
S410:Cellphone shield TAM background systems compare the existing version and cellphone shield of cellphone shield TA according to request relevant information
The newest version information stored in TAM background systems, determines whether two versions are consistent, to judge whether to need to update TA
Configuration information.If two version differences, need to update, then execute S407.If two versions are consistent, terminate the stream
Journey.
S411:Cellphone shield TAM background systems generate session key according to the S404 sessionId obtained and random, and
After the TA configuration informations of new version being encrypted using the session key be issued to TAM controls.
S412:TAM controls call the transmit of TeekeyService to connect according to the information that the backstages cellphone shield TAM return
Mouthful, the TA configuration informations of new version are sent to cellphone shield TA.
S413:After cellphone shield TA receives configuration request, safety certification is carried out, the session key pair generated using S405
The TA configuration informations of new version are decrypted, and the configuration information update that decryption is obtained is to corresponding with the AID of Mobile banking APP
Configuration information memory module.
S414:Cellphone shield TA is returned to configuration information update result by the transmit interfaces of TeekeyService
TAM controls.
S415:TAM controls call the close interfaces unloading cellphone shield TA of TeeKeyService.
S416:Configuration information update result is returned to Mobile banking APP by TAM controls.
Wherein, in S402, if not installing cellphone shield TA, the flow of installation cellphone shield TA can be initiated.In installation mobile phone
When shield TA, TAM controls call the open interfaces of TeeKeyService to initiate asking for loading mobile phone shield TA to TEE OS systems first
It asks, the file path and file AID of the cellphone shield TA for needing to load is included in open interfaces;TEE OS systems judge the conjunction of file
Method, then TAM controls to cellphone shield TAM background systems initiate TA configuration informations download request, cellphone shield TAM background systems according to
Request issues configuration information, TEE OS systems by the transmit interfaces of TAM controls and TeeKeyService to TEE OS systems
System executes installation operation.
Safety approach based on cellphone shield is not limited to the client application of bank, other industry, for example insures, security
It, all can be corresponding based on the mobile terminal exploitation for providing TEE security contexts etc. the mobile terminal application for being related to user's fund security
TA and CA applications.
What the application realized has the beneficial effect that:
Relevant configuration management function of the application based on the TA exploitations of cellphone shield business on TEE environment Android systems, makes
The system manufacturer of mobile terminal safeguards that a cellphone shield TA is possibly realized, and simplifies the management of TA;Cellphone shield CA also only safeguards one in side
A TA completes the business demand of different industries user (bank, security, insurance etc.) by configuration information.
Although the preferred embodiment of the application has been described, created once a person skilled in the art knows basic
Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as
It selects embodiment and falls into all change and modification of the application range.Obviously, those skilled in the art can be to the application
Various modification and variations are carried out without departing from spirit and scope.If in this way, these modifications and variations of the application
Belong within the scope of the application claim and its equivalent technologies, then the application is also intended to exist comprising these modification and variations
It is interior.