License security agent method and platform based on hardware trusted trust chain
Technical Field
The invention relates to the technical field of License agents, in particular to a License security agent method and platform based on a hardware trusted trust chain.
Background
For large complex service systems or service clusters with numerous clients, license distribution usually requires the use of an authorization proxy mechanism, i.e. an authorization center issues a quota set composed of the entire service system or numerous application terminals to a License authorization proxy, which distributes the quota to a specific service module or application terminal.
Typical scenarios are: 1. a large service system is provided with a plurality of service subsystems such as A/B/C/D, and for each specific market item, each service subsystem has own authorization specification requirement, and for convenience in management, license authorization centers uniformly execute authorization management. 2. If each set of software and hardware respectively executes independent License management, license agents are usually deployed in the enterprise internal environment, the whole amount of authorization is issued to the agents at one time, and a single terminal applies for authorization to the License agents.
In practical application, in proxy mode, a secure bidirectional authentication mechanism is needed between the License proxy server and the service module or the application terminal. The proxy service needs to verify the legitimacy of the application terminal, so that the authorization is prevented from being abused; the terminal application verifies the validity of the proxy service, and prevents the intermediate from forging proxy counterfeit authorization. However, since many large business systems are deployed in isolated local area networks or closed environments, there is no internet authentication condition. The common authorization management scheme only performs security verification when the authorization is imported into the License proxy service, and does not perform strict security authentication on the authorization behavior of the service module or the software and hardware terminal. Leading to the following drawbacks and deficiencies with existing License authorization proxy mechanisms: 1. when the fake terminal applies for authorization, the agency cannot identify; 2. when the counterfeit agent provides authorization capability, the terminal application cannot be identified; 3. the scheme of storing certificates and private keys through software has the risk of leakage and tampering.
Therefore, how to provide a method for further improving the security of License authorization agents is a technical problem to be solved.
Disclosure of Invention
In view of this, the present invention mainly solves the problem of simplifying the authentication complexity between the proxy and the terminal while enhancing the security of the License proxy.
In one aspect, the present invention provides a License security agent method based on a hardware trusted trust chain, including:
step S1: generating a certificate and a private key required by License verification through a hardware encryptor, and presetting the generated certificate and private key;
step S2: applying for a License authorization file from a License authorization issuing system;
step S3: importing the License authorization file obtained by the application to a License authorization agent module;
step S4: the License authorization agent module applies for authorization quota from the License authorization agent module through the service terminal module, and after the License authorization agent module and the service terminal module complete bidirectional verification, the License authorization agent module allocates authorization resources for the service terminal module.
Further, step S1 of the License security agent method based on the hardware trusted trust chain of the present invention includes:
step S11: generating a root certificate/root private key through the hardware encryptor, and storing the root private key to the hardware encryptor;
step S12: generating a secondary certificate/private key for the License authorization agent module through a hardware encryptor, recording identity information of the License authorization agent module in a generated secondary certificate CN field, and storing the secondary certificate/private key and the root certificate generated in the step S11 into a trusted hardware environment unit in the License authorization agent module;
step S13: and generating a secondary certificate/private key for the service terminal module through a hardware encryptor, recording the identity information of the service terminal module in a generated secondary certificate CN field, and storing the secondary certificate/private key and the root certificate generated in the step S11 into a trusted hardware environment unit of the service terminal module.
Further, step S2 of the License security agent method based on the hardware trusted trust chain of the present invention includes:
step S21: acquiring client environment information from a License authorization agent module, and applying for a License authorization file from an authorization issuing service module of a License issuing system;
step S22: the authorization issuing service module acquires authorization item contents according to the item order information, adds client environment information to the authorization item contents and generates License authorization file contents;
step S23: the authorization issuing service module generates a signature private key/signature certificate by using a root private key through a hardware encryptor, performs signature on License authorization file content by using the signature private key, performs encryption on the signed License authorization file content, and adds the signature certificate into the License authorization file content obtained by encryption to generate a License authorization file.
Further, step S3 of the License security agent method based on the hardware trusted trust chain of the present invention includes:
step S31: a License authorization agent module of a client service environment system is logged in, and a License authorization file generated by a License authorization issuing system is imported through a License management service unit;
step S32: reading the encrypted License file content and the signature certificate from the imported License authorization file, and decrypting the encrypted License authorization file content to obtain a plaintext License file content;
step S33: verifying the legitimacy of the content of the License file and the signature certificate in a local trusted hardware environment unit through the License management service unit;
step S34: verifying the legitimacy of the authorization item content in the plaintext License file content by the License management service unit, and adding the authorization item content which passes the verification into the allocatable authorization resource.
Further, step S33 of the License security agent method based on the hardware trusted trust chain of the present invention includes: and verifying the validity of a certificate chain of the signature certificate by utilizing a root certificate built in the trusted hardware environment unit, and verifying whether the signature of the License authorization file content is correct or not by utilizing the signature certificate.
Further, step S4 of the License security agent method based on the hardware trusted trust chain of the present invention includes:
step S41: establishing connection to a terminal management service unit of a License authorization agent module through an authorization management service unit of a service terminal module, and initiating an authorization allocation application;
step S42: the terminal management service unit of the License authorization agent module is used for verifying the validity of the secondary certificate of the service terminal module in the local trusted hardware environment unit by utilizing the built-in root certificate;
step S43: verifying the validity of a second-level certificate of the License authorization agent module by using a built-in root certificate in a local trusted hardware environment unit through an authorization management service unit of the service terminal module;
step S44: after the bidirectional verification is confirmed to pass through the terminal management service unit of the License authorization agent module, the License management service unit allocates authorized resources for the service terminal module and updates the remaining authorized resources.
Further, in step S42 of the License security proxy method based on the hardware trusted trust chain, the method for verifying the validity of the secondary certificate of the service terminal module includes: and verifying the validity of the secondary certificate trust chain and the validity of the identity information of the terminal module recorded in the secondary certificate CN field.
Further, in step S43 of the License security agent method based on the hardware trusted trust chain, the verification of the validity of the License authorization agent module secondary certificate includes: and verifying the validity of the secondary certificate trust chain and the validity of the identity information of the License authorization agent module recorded in the CN field of the secondary certificate.
In another aspect, the present invention provides a License security agent platform based on a hardware trusted trust chain, including:
the client service environment system comprises a License authorization agent module and a service terminal module, and is used for importing License authorization files from a License authorization issuing system, checking the legality of the License authorization files, checking the legality of the License authorization agent module and the service terminal module, and distributing resources for the service terminal from the successfully imported authorized resources;
the License authorization issuing system comprises an authorization issuing service module and a hardware encryption machine, wherein the authorization issuing service module is used for receiving a request for applying for a License authorization file, acquiring authorization item content according to item order information, adding client environment information into the authorization item content to generate License authorization file content, generating a signature private key/signature certificate by using a root private key through the hardware encryption machine, signing the License authorization file content by using the signature private key, encrypting the signed License authorization file content, adding a signature certificate into the encrypted License authorization file content, and generating a License authorization file.
Further, in the License security agent platform based on the trusted trust chain, the License authorization agent module comprises a License management service unit, a terminal management service unit and a trusted hardware environment unit, wherein the License management service unit is used for importing a License authorization file generated by a License authorization issuing system, verifying the legality of the content of a License file with a text and a signature certificate in a local trusted hardware environment unit, verifying the legality of the content of an authorization item in the content of the License file with the text, adding the content of the authorization item which passes the verification into an allocatable authorization resource, allocating the authorization resource for a service terminal module, and updating the rest of the allocatable resource; the terminal management service unit is used for establishing connection with the authorization management service unit, receiving an authorization allocation application initiated by the authorization management service unit, and verifying the validity of the secondary certificate of the service terminal module by using the built-in root certificate in the local trusted hardware environment unit; the service terminal module comprises an authorization management service unit and a trusted hardware environment unit, wherein the authorization management service unit is used for establishing connection with the terminal management service unit of the License authorization proxy module, initiating an authorization allocation application, and verifying the validity of the secondary certificate of the License authorization proxy module by using a built-in root certificate in the local trusted hardware environment unit.
The License security agent method and platform based on the hardware trusted trust chain have the following beneficial effects:
1. by internally arranging the root certificate, the certificate trust chain management mode is adopted, the validity can be verified by checking the certificate trust chain, and the complexity of bidirectional authentication between the proxy and the terminal is reduced;
2. and a unified hardware encryptor distributes a secondary certificate for the agent and the terminal, wherein the secondary certificate respectively carries the identity information of the agent and the terminal, and the root private key cannot go out of the encryptor, so that absolute confidentiality is ensured. The terminal information carried by the secondary certificate can ensure that the leakage of the terminal certificate can be immediately identified, and the leakage certificate cannot be abused, so that the safety is improved;
3. the secondary certificate used by the proxy and the terminal is stored in the trusted hardware of the server, encryption and decryption operations are completed by the trusted hardware, and the secondary certificate and the private key are stored safely and cannot be stolen by a program, so that the safety is further improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a License security agent method based on a hardware trusted trust chain according to an exemplary first embodiment of the present invention.
FIG. 2 is a flow chart of a License security agent method based on a hardware trusted trust chain according to an exemplary second embodiment of the present invention.
FIG. 3 is a flow chart of a License security agent method based on a hardware trusted trust chain according to a third exemplary embodiment of the present invention.
Fig. 4 is a flowchart of a License security agent method based on a hardware trusted trust chain according to an exemplary fourth embodiment of the present invention.
Fig. 5 is a flowchart of a License security agent method based on a hardware trusted trust chain according to an exemplary fifth embodiment of the present invention.
Fig. 6 is a schematic diagram of a License security agent platform based on a hardware trusted trust chain according to a sixth embodiment of the present invention.
Detailed Description
Embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
It should be noted that, without conflict, the following embodiments and features in the embodiments may be combined with each other; and, based on the embodiments in this disclosure, all other embodiments that may be made by one of ordinary skill in the art without inventive effort are within the scope of the present disclosure.
It is noted that various aspects of the embodiments are described below within the scope of the following claims. It should be apparent that the aspects described herein may be embodied in a wide variety of forms and that any specific structure and/or function described herein is merely illustrative. Based on the present disclosure, one skilled in the art will appreciate that one aspect described herein may be implemented independently of any other aspect, and that two or more of these aspects may be combined in various ways. For example, an apparatus may be implemented and/or a method practiced using any number of the aspects set forth herein. In addition, such apparatus may be implemented and/or such methods practiced using other structure and/or functionality in addition to one or more of the aspects set forth herein.
Fig. 1 is a flowchart of a License security agent method based on a hardware trusted trust chain according to an exemplary first embodiment of the present invention, as shown in fig. 1, the method of this embodiment includes:
step S1: generating a certificate and a private key required by License verification through a hardware encryptor, and presetting the generated certificate and private key;
step S2: applying for a License authorization file from a License authorization issuing system;
step S3: importing the License authorization file obtained by the application to a License authorization agent module;
step S4: the License authorization agent module applies for authorization quota from the License authorization agent module through the service terminal module, and after the License authorization agent module and the service terminal module complete bidirectional verification, the License authorization agent module allocates authorization resources for the service terminal module.
Fig. 2 is a flowchart of a License security agent method based on a hardware trusted trust chain according to a second exemplary embodiment of the present invention, which is a preferred embodiment of the method shown in fig. 1, as shown in fig. 2, and step S1 of the method of the present embodiment includes:
step S11: generating a root certificate/root private key through the hardware encryptor, and storing the root private key to the hardware encryptor;
step S12: generating a secondary certificate/private key for the License authorization agent module through a hardware encryptor, and storing the secondary certificate/private key and the root certificate generated in the step S11 to a trusted hardware environment unit in the License authorization agent module;
step S13: and generating a secondary certificate/private key for the service terminal module through a hardware encryptor, and storing the secondary certificate/private key and the root certificate generated in the step S11 into a trusted hardware environment unit of the service terminal module.
In step S12 of the method of the present embodiment, generating, by the hardware encryptor, a secondary certificate/private key for the License authorization agent module includes: and recording the identity information of the License authorization agent module in the generated secondary certificate CN field.
In step S13 of the method of the present embodiment, generating, by the hardware encryptor, a secondary certificate/private key for the service terminal module includes: and recording the identity information of the service terminal module in the generated secondary certificate CN field.
Fig. 3 is a flowchart of a License security agent method based on a hardware trusted trust chain according to a third embodiment of the present invention, which is a preferred embodiment of the method shown in fig. 1, as shown in fig. 3, and step S2 of the method of the present embodiment includes:
step S21: acquiring client environment information from a License authorization agent module, and applying for a License authorization file from an authorization issuing service module of a License issuing system;
step S22: the authorization issuing service module acquires authorization item contents according to the item order information, adds client environment information to the authorization item contents and generates License authorization file contents;
step S23: the authorization issuing service module generates a signature private key/signature certificate by using a root private key through a hardware encryptor, performs signature on License authorization file content by using the signature private key, performs encryption on the signed License authorization file content, and adds the signature certificate into the License authorization file content obtained by encryption to generate a License authorization file.
Fig. 4 is a flowchart of a License security agent method based on a hardware trusted trust chain according to a fourth embodiment of the present invention, which is a preferred embodiment of the method shown in fig. 1, as shown in fig. 4, and step S3 of the method of the present embodiment includes:
step S31: a License authorization agent module of a client service environment system is logged in, and a License authorization file generated by a License authorization issuing system is imported through a License management service unit;
step S32: reading the encrypted License file content and the signature certificate from the imported License authorization file, and decrypting the encrypted License authorization file content to obtain a plaintext License file content;
step S33: verifying the legitimacy of the content of the License file and the signature certificate in a local trusted hardware environment unit through the License management service unit;
step S34: verifying the legitimacy of the authorization item content in the plaintext License file content by the License management service unit, and adding the authorization item content which passes the verification into the allocatable authorization resource.
Step S33 of the method of the present embodiment includes: and verifying the validity of a certificate chain of the signature certificate by utilizing a root certificate built in the trusted hardware environment unit, and verifying whether the signature of the License authorization file content is correct or not by utilizing the signature certificate.
Fig. 5 is a flowchart of a License security agent method based on a hardware trusted trust chain according to a fifth exemplary embodiment of the present invention, which is a preferred embodiment of the method shown in fig. 1, as shown in fig. 5, and step S4 of the method of the present embodiment includes:
step S41: establishing connection to a terminal management service unit of a License authorization agent module through an authorization management service unit of a service terminal module, and initiating an authorization allocation application;
step S42: the terminal management service unit of the License authorization agent module is used for verifying the validity of the secondary certificate of the service terminal module in the local trusted hardware environment unit by utilizing the built-in root certificate;
step S43: verifying the validity of a second-level certificate of the License authorization agent module by using a built-in root certificate in a local trusted hardware environment unit through an authorization management service unit of the service terminal module;
step S44: after the bidirectional verification is confirmed to pass through the terminal management service unit of the License authorization agent module, the License management service unit allocates authorized resources for the service terminal module and updates the remaining authorized resources.
In step S42 of the method of the present embodiment, verifying the validity of the secondary certificate of the service terminal module includes: and verifying the validity of the secondary certificate trust chain and the validity of the identity information of the terminal module recorded in the secondary certificate CN field.
In step S43 of the method of the present embodiment, verifying the validity of the License authorization agent module secondary certificate includes: and verifying the validity of the secondary certificate trust chain and the validity of the identity information of the License authorization agent module recorded in the CN field of the secondary certificate.
Fig. 6 is a schematic diagram of a License security agent platform based on a hardware trusted trust chain according to a sixth embodiment of the present invention, as shown in fig. 6, the platform of this embodiment includes:
the client service environment system comprises a License authorization agent module and a service terminal module, and is used for importing License authorization files from a License authorization issuing system, checking the legality of the License authorization files, checking the legality of the License authorization agent module and the service terminal module, and distributing resources for the service terminal from the successfully imported authorized resources;
the License authorization issuing system comprises an authorization issuing service module and a hardware encryption machine, wherein the authorization issuing service module is used for receiving a request for applying for a License authorization file, acquiring authorization item content according to item order information, adding client environment information into the authorization item content to generate License authorization file content, generating a signature private key/signature certificate by using a root private key through the hardware encryption machine, signing the License authorization file content by using the signature private key, encrypting the signed License authorization file content, adding a signature certificate into the encrypted License authorization file content, and generating a License authorization file.
In practical application, in the License security agent platform based on a trusted trust chain, a License authorization agent module comprises a License management service unit, a terminal management service unit and a trusted hardware environment unit, wherein the License management service unit is used for importing a License authorization file generated by a License authorization issuing system, verifying the legitimacy of the content of a plaintext License file and a signature certificate in a local trusted hardware environment unit, verifying the legitimacy of the content of an authorization item in the content of the plaintext License file, adding the content of the authorization item which passes the verification into an allocatable authorization resource, allocating the authorization resource for a service terminal module, and updating the rest of the allocatable resource; the terminal management service unit is used for establishing connection with the authorization management service unit, receiving an authorization allocation application initiated by the authorization management service unit, and verifying the validity of the secondary certificate of the service terminal module by using the built-in root certificate in the local trusted hardware environment unit; the service terminal module comprises an authorization management service unit and a trusted hardware environment unit, wherein the authorization management service unit is used for establishing connection with the terminal management service unit of the License authorization proxy module, initiating an authorization allocation application, and verifying the validity of the secondary certificate of the License authorization proxy module by using a built-in root certificate in the local trusted hardware environment unit.
The foregoing is merely illustrative of the present invention, and the present invention is not limited thereto, and any changes or substitutions easily contemplated by those skilled in the art within the scope of the present invention should be included in the present invention. Therefore, the protection scope of the invention is subject to the protection scope of the claims.