CN109922056B - 数据安全处理方法及其终端、服务器 - Google Patents
数据安全处理方法及其终端、服务器 Download PDFInfo
- Publication number
- CN109922056B CN109922056B CN201910142774.0A CN201910142774A CN109922056B CN 109922056 B CN109922056 B CN 109922056B CN 201910142774 A CN201910142774 A CN 201910142774A CN 109922056 B CN109922056 B CN 109922056B
- Authority
- CN
- China
- Prior art keywords
- security
- data
- unit
- safety
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Abstract
Description
Claims (15)
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910142774.0A CN109922056B (zh) | 2019-02-26 | 2019-02-26 | 数据安全处理方法及其终端、服务器 |
TW108132765A TW202040403A (zh) | 2019-02-26 | 2019-09-11 | 資料安全處理方法及其終端、伺服器 |
PCT/CN2020/073733 WO2020173272A1 (zh) | 2019-02-26 | 2020-01-22 | 数据安全处理方法及其终端、服务器 |
EP20763256.3A EP3879783B1 (en) | 2019-02-26 | 2020-01-22 | Data security processing method and terminal thereof |
US17/314,893 US11251976B2 (en) | 2019-02-26 | 2021-05-07 | Data security processing method and terminal thereof, and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910142774.0A CN109922056B (zh) | 2019-02-26 | 2019-02-26 | 数据安全处理方法及其终端、服务器 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109922056A CN109922056A (zh) | 2019-06-21 |
CN109922056B true CN109922056B (zh) | 2021-09-10 |
Family
ID=66962364
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910142774.0A Active CN109922056B (zh) | 2019-02-26 | 2019-02-26 | 数据安全处理方法及其终端、服务器 |
Country Status (5)
Country | Link |
---|---|
US (1) | US11251976B2 (zh) |
EP (1) | EP3879783B1 (zh) |
CN (1) | CN109922056B (zh) |
TW (1) | TW202040403A (zh) |
WO (1) | WO2020173272A1 (zh) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109922056B (zh) * | 2019-02-26 | 2021-09-10 | 创新先进技术有限公司 | 数据安全处理方法及其终端、服务器 |
US11848941B2 (en) | 2020-09-02 | 2023-12-19 | Nxp B.V. | Collection of diagnostic information in a device |
Family Cites Families (50)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7530103B2 (en) | 2003-08-07 | 2009-05-05 | Microsoft Corporation | Projection of trustworthiness from a trusted environment to an untrusted environment |
US9177153B1 (en) | 2005-10-07 | 2015-11-03 | Carnegie Mellon University | Verifying integrity and guaranteeing execution of code on untrusted computer platform |
US9274974B1 (en) | 2005-10-21 | 2016-03-01 | Vmware, Inc. | Isolating data within a computer system using private shadow mappings |
GB0707150D0 (en) | 2007-04-13 | 2007-05-23 | Hewlett Packard Development Co | Dynamic trust management |
US8583908B2 (en) | 2007-12-31 | 2013-11-12 | Intel Corporation | Enhanced network and local boot of Unified Extensible Firmware Interface images |
US8950007B1 (en) | 2008-04-07 | 2015-02-03 | Lumension Security, Inc. | Policy-based whitelisting with system change management based on trust framework |
US7984286B2 (en) | 2008-06-25 | 2011-07-19 | Intel Corporation | Apparatus and method for secure boot environment |
US8151349B1 (en) | 2008-07-21 | 2012-04-03 | Google Inc. | Masking mechanism that facilitates safely executing untrusted native code |
US8136158B1 (en) | 2008-07-21 | 2012-03-13 | Google Inc. | User-level segmentation mechanism that facilitates safely executing untrusted native code |
US20100153721A1 (en) * | 2008-12-12 | 2010-06-17 | Anders Mellqvist | Portable Electronic Devices, Systems, Methods and Computer Program Products for Accessing Remote Secure Elements |
US8213618B2 (en) | 2008-12-30 | 2012-07-03 | Intel Corporation | Protecting content on client platforms |
US8627414B1 (en) | 2009-08-04 | 2014-01-07 | Carnegie Mellon University | Methods and apparatuses for user-verifiable execution of security-sensitive code |
US8832452B2 (en) | 2010-12-22 | 2014-09-09 | Intel Corporation | System and method for implementing a trusted dynamic launch and trusted platform module (TPM) using secure enclaves |
US10496824B2 (en) | 2011-06-24 | 2019-12-03 | Microsoft Licensing Technology, LLC | Trusted language runtime on a mobile platform |
CN102857913B (zh) * | 2011-06-28 | 2015-03-11 | 中国移动通信集团公司 | 在建立安全信道时进行鉴权的方法、装置、智能卡及终端 |
WO2013048425A1 (en) | 2011-09-30 | 2013-04-04 | Intel Corporation | Authenticated launch of virtual machines and nested virtual machine managers |
US9389933B2 (en) | 2011-12-12 | 2016-07-12 | Microsoft Technology Licensing, Llc | Facilitating system service request interactions for hardware-protected applications |
US9953310B2 (en) * | 2012-05-10 | 2018-04-24 | Mastercard International Incorporated | Systems and method for providing multiple virtual secure elements in a single physical secure element of a mobile device |
KR101436872B1 (ko) * | 2012-11-29 | 2014-09-02 | 에스케이씨앤씨 주식회사 | 보안 요소 정보 관리 방법 및 시스템 |
US9742559B2 (en) | 2013-01-22 | 2017-08-22 | Qualcomm Incorporated | Inter-module authentication for securing application execution integrity within a computing device |
US8935746B2 (en) | 2013-04-22 | 2015-01-13 | Oracle International Corporation | System with a trusted execution environment component executed on a secure element |
US9395993B2 (en) | 2013-07-29 | 2016-07-19 | Intel Corporation | Execution-aware memory protection |
US9509502B2 (en) | 2014-03-13 | 2016-11-29 | Intel Corporation | Symmetric keying and chain of trust |
US9779224B2 (en) * | 2014-05-05 | 2017-10-03 | Securekey Technologies Inc. | Methods and systems for client-enhanced challenge-response authentication |
US9264410B2 (en) * | 2014-06-05 | 2016-02-16 | Sony Corporation | Dynamic configuration of trusted executed environment resources |
US9785801B2 (en) | 2014-06-27 | 2017-10-10 | Intel Corporation | Management of authenticated variables |
US9705849B2 (en) | 2014-09-30 | 2017-07-11 | Intel Corporation | Technologies for distributed detection of security anomalies |
US9940456B2 (en) | 2014-12-16 | 2018-04-10 | Intel Corporation | Using trusted execution environments for security of code and data |
US9621547B2 (en) * | 2014-12-22 | 2017-04-11 | Mcafee, Inc. | Trust establishment between a trusted execution environment and peripheral devices |
US9832207B2 (en) | 2014-12-23 | 2017-11-28 | Mcafee, Inc. | Input verification |
US9996690B2 (en) | 2014-12-27 | 2018-06-12 | Mcafee, Llc | Binary translation of a trusted binary with input tagging |
US10187363B2 (en) * | 2014-12-31 | 2019-01-22 | Visa International Service Association | Hybrid integration of software development kit with secure execution environment |
RU2673842C1 (ru) * | 2015-03-20 | 2018-11-30 | Ривец Корп. | Автоматическая аттестация сохранности устройства с применением цепочки блоков |
EP3113501A1 (en) * | 2015-06-29 | 2017-01-04 | Nagravision SA | Content protection |
US9904805B2 (en) | 2015-09-23 | 2018-02-27 | Intel Corporation | Cryptographic cache lines for a trusted execution environment |
US10516533B2 (en) | 2016-02-05 | 2019-12-24 | Mohammad Mannan | Password triggered trusted encryption key deletion |
CN109871717A (zh) | 2016-02-29 | 2019-06-11 | 华为技术有限公司 | 一种数据安全传输装置及方法 |
CN106102054A (zh) * | 2016-05-27 | 2016-11-09 | 深圳市雪球科技有限公司 | 一种对安全单元进行安全管理的方法以及通信系统 |
CN105847000A (zh) * | 2016-05-27 | 2016-08-10 | 深圳市雪球科技有限公司 | 令牌产生方法以及基于该令牌产生方法的通信系统 |
US10402566B2 (en) | 2016-08-01 | 2019-09-03 | The Aerospace Corporation | High assurance configuration security processor (HACSP) for computing devices |
US10303899B2 (en) | 2016-08-11 | 2019-05-28 | Intel Corporation | Secure public cloud with protected guest-verified host control |
CN106506472B (zh) | 2016-11-01 | 2019-08-02 | 黄付营 | 一种安全的移动终端电子认证方法及系统 |
US10530777B2 (en) | 2017-01-24 | 2020-01-07 | Microsoft Technology Licensing, Llc | Data unsealing with a sealing enclave |
CN107171814A (zh) * | 2017-07-26 | 2017-09-15 | 恒宝股份有限公司 | 一种数字证书更新方法及装置 |
CN107682159B (zh) * | 2017-10-12 | 2021-02-02 | 北京握奇智能科技有限公司 | 一种智能终端的可信应用管理方法和可信应用管理系统 |
CN108055129B (zh) * | 2017-12-22 | 2019-08-27 | 恒宝股份有限公司 | 一种实现手机盾密钥统一管理的方法、设备及系统 |
CN108282467B (zh) * | 2017-12-29 | 2020-12-18 | 北京握奇智能科技有限公司 | 数字证书的应用方法、系统 |
CN108200078B (zh) * | 2018-01-18 | 2021-01-05 | 中国建设银行股份有限公司 | 签名认证工具的下载安装方法及终端设备 |
CN109040147B (zh) * | 2018-10-30 | 2023-08-15 | 北京握奇智能科技有限公司 | 一种基于tee+se的加解密的方法和系统 |
CN109922056B (zh) * | 2019-02-26 | 2021-09-10 | 创新先进技术有限公司 | 数据安全处理方法及其终端、服务器 |
-
2019
- 2019-02-26 CN CN201910142774.0A patent/CN109922056B/zh active Active
- 2019-09-11 TW TW108132765A patent/TW202040403A/zh unknown
-
2020
- 2020-01-22 EP EP20763256.3A patent/EP3879783B1/en active Active
- 2020-01-22 WO PCT/CN2020/073733 patent/WO2020173272A1/zh unknown
-
2021
- 2021-05-07 US US17/314,893 patent/US11251976B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
EP3879783A1 (en) | 2021-09-15 |
EP3879783B1 (en) | 2023-05-17 |
TW202040403A (zh) | 2020-11-01 |
WO2020173272A1 (zh) | 2020-09-03 |
EP3879783A4 (en) | 2021-12-22 |
US20210266181A1 (en) | 2021-08-26 |
US11251976B2 (en) | 2022-02-15 |
CN109922056A (zh) | 2019-06-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI623853B (zh) | 用以充當驗證器之裝置、用於遠端認證之方法及非暫時性機器可讀儲存媒體(二) | |
US8997230B1 (en) | Hierarchical data security measures for a mobile device | |
CN102624699B (zh) | 一种保护数据的方法和系统 | |
CN202795383U (zh) | 一种保护数据的设备和系统 | |
US10887307B1 (en) | Systems and methods for identifying users | |
EP3084672B1 (en) | Protection system including machine learning snapshot evaluation | |
CN104462965A (zh) | 应用程序完整性验证方法及网络设备 | |
CN110268406B (zh) | 密码安全性 | |
CN104247329A (zh) | 请求云服务的装置的安全补救 | |
CN108347361B (zh) | 应用程序测试方法、装置、计算机设备和存储介质 | |
CN103763331A (zh) | 用于多方验证的基于平台的可信性验证服务的方法和系统 | |
CN106133743A (zh) | 用于优化预安装应用程序的扫描的系统和方法 | |
JP6293133B2 (ja) | 被保護データー集合のネットワーク・ベース管理 | |
US10073980B1 (en) | System for assuring security of sensitive data on a host | |
CN109922056B (zh) | 数据安全处理方法及其终端、服务器 | |
CN107026730B (zh) | 数据处理方法、装置及系统 | |
US11520859B2 (en) | Display of protected content using trusted execution environment | |
CN111182050B (zh) | 一种实现应用与服务器间通信的方法与设备 | |
Kim et al. | An Integrative method of FTA and FMEA for software security analysis of a smart phone | |
CN107247900B (zh) | 一种获取操作系统登录密码的方法及装置 | |
US20190034635A1 (en) | System management audit log snapshot | |
CN114095227A (zh) | 一种数据通信网关可信认证方法、系统及电子设备 | |
US20200174995A1 (en) | Measurement Update Method, Apparatus, System, Storage Media, and Computing Device | |
US11671422B1 (en) | Systems and methods for securing authentication procedures | |
CN111292082B (zh) | 一种块链式账本中的公钥管理方法、装置及设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200924 Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands Applicant after: Innovative advanced technology Co.,Ltd. Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands Applicant before: Advanced innovation technology Co.,Ltd. Effective date of registration: 20200924 Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands Applicant after: Advanced innovation technology Co.,Ltd. Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands Applicant before: Alibaba Group Holding Ltd. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |