CN115640589A - A security protection device, service execution method, device and storage medium - Google Patents
A security protection device, service execution method, device and storage medium Download PDFInfo
- Publication number
- CN115640589A CN115640589A CN202211080913.XA CN202211080913A CN115640589A CN 115640589 A CN115640589 A CN 115640589A CN 202211080913 A CN202211080913 A CN 202211080913A CN 115640589 A CN115640589 A CN 115640589A
- Authority
- CN
- China
- Prior art keywords
- business
- service
- memory
- protection device
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
Description
技术领域technical field
本说明书涉及计算机技术领域,尤其涉及一种安全保护设备以及业务执行方法、装置及存储介质。This specification relates to the field of computer technology, and in particular to a security protection device, a service execution method, device, and storage medium.
背景技术Background technique
目前,随着人们对自身隐私数据的愈发关注以及可穿戴设备在人们生活中的广泛应用,如何在人们使用可穿戴设备执行业务的过程中,保证可穿戴设备中业务客户端的敏感数据不被泄露,已经成为目前需要解决的问题之一。其中,该敏感数据可包含个人隐私数据和企业敏感数据等。At present, as people pay more and more attention to their own private data and wearable devices are widely used in people's lives, how to ensure that the sensitive data of business clients in wearable devices will not be Leakage has become one of the problems that need to be solved at present. Wherein, the sensitive data may include personal privacy data and enterprise sensitive data.
基于此,本说明书提供一种用于保护可穿戴设备安全的安全保护设备。Based on this, this specification provides a safety protection device for protecting the safety of a wearable device.
发明内容Contents of the invention
本说明书提供一种安全保护设备以及业务执行方法、装置及存储介质,以部分的解决现有技术存在的上述问题。This specification provides a security protection device, a service execution method, a device, and a storage medium, so as to partially solve the above-mentioned problems existing in the prior art.
本说明书采用下述技术方案:This manual adopts the following technical solutions:
本说明书提供一种安全保护设备,所述安全保护设备103部署在可穿戴设备中,所述安全保护设备103通过指定管脚与所述可穿戴设备的主控芯片100连接,所述安全保护设备103至少包括:处理器101以及存储器102;其中:This specification provides a security protection device. The
所述存储器102预先固化有用于执行业务的部分业务代码以及运行所述部分业务代码所需的敏感数据;The
所述处理器101,用于接收所述主控芯片100通过所述指定管脚发送的携带业务数据的业务请求,所述业务请求为所述可穿戴设备中安装的用于执行所述业务的业务客户端生成的;根据所述业务请求从所述存储器102获取所述敏感数据以及所述部分业务代码;运行所述部分业务代码,以根据所述业务数据和所述敏感数据执行所述业务,并得到业务执行结果;将所述业务执行结果通过所述指定管脚返回所述主控芯片100,使所述业务客户端基于所述业务执行结果继续执行业务。The
本说明书提供一种业务执行方法,所述业务执行方法应用于安全保护设备,所述安全保护设备部署在可穿戴设备中,所述安全保护设备通过指定管脚与所述可穿戴设备的主控芯片连接,所述安全保护设备中预先固化有业务客户端的部分业务代码以及运行所述部分业务代码所需的敏感数据;所述方法包括:This specification provides a service execution method, which is applied to a security protection device, the security protection device is deployed in a wearable device, and the security protection device communicates with the main controller of the wearable device through a designated pin Chip connection, part of the business code of the business client and sensitive data required to run the part of the business code are pre-cured in the security protection device; the method includes:
接收所述可穿戴设备的主控芯片通过所述指定管脚发送的携带业务数据的业务请求;receiving a service request carrying service data sent by the main control chip of the wearable device through the specified pin;
根据所述业务请求,从预先固化的数据中,获取执行业务所需的敏感数据以及所述部分业务代码;According to the business request, obtain the sensitive data required to execute the business and the part of the business code from the pre-solidified data;
运行所述部分业务代码,根据所述业务数据和所述敏感数据执行所述业务,并确定业务执行结果;Run the part of the business code, execute the business according to the business data and the sensitive data, and determine the business execution result;
将所述业务执行结果通过所述指定管脚返回所述主控芯片。Returning the service execution result to the main control chip through the designated pin.
本说明书提供一种业务执行装置,This manual provides a business execution device,
所述业务执行装置应用于安全保护设备,所述安全保护设备部署在可穿戴设备中,所述安全保护设备通过指定管脚与所述可穿戴设备的主控芯片连接,所述安全保护设备中预先固化有业务客户端的部分业务代码以及运行所述部分业务代码所需的敏感数据;所述装置包括:The service execution device is applied to a security protection device, the security protection device is deployed in a wearable device, the security protection device is connected to the main control chip of the wearable device through a designated pin, and the security protection device Part of the business code of the business client and the sensitive data required to run the part of the business code are pre-cured; the device includes:
接收模块,用于接收所述可穿戴设备的主控芯片通过所述指定管脚发送的携带业务数据的业务请求;A receiving module, configured to receive a service request carrying service data sent by the main control chip of the wearable device through the designated pin;
获取模块,用于根据所述业务请求,从预先固化的数据中,获取执行业务所需的敏感数据以及所述部分业务代码;An acquisition module, configured to acquire the sensitive data required to execute the business and the part of the business code from the pre-cured data according to the business request;
执行模块,用于运行所述部分业务代码,根据所述业务数据和所述敏感数据执行所述业务,并确定业务执行结果;An execution module, configured to run the part of the business code, execute the business according to the business data and the sensitive data, and determine a business execution result;
返回模块,用于将所述业务执行结果通过所述指定管脚返回所述主控芯片。A return module, configured to return the service execution result to the main control chip through the designated pin.
本说明书提供了一种计算机可读存储介质,所述存储介质存储有计算机程序,所述计算机程序被处理器执行时实现上述业务执行方法。This specification provides a computer-readable storage medium, the storage medium stores a computer program, and when the computer program is executed by a processor, the above service execution method is realized.
本说明书采用的上述至少一个技术方案能够达到以下有益效果:The above-mentioned at least one technical solution adopted in this specification can achieve the following beneficial effects:
通过在可穿戴设备中部署和主控芯片通过指定管脚连接的安全保护设备的处理器,在业务客户端需执行业务时,接收业务客户端生成并通过主控芯片发送的业务请求,并根据该业务请求确定执行业务所需的敏感数据,再运行该安全保护设备中的存储器中预先固化的业务代码,根据敏感数据和业务请求中的业务数据执行业务。By deploying the processor of the security protection device connected to the main control chip in the wearable device through designated pins, when the business client needs to perform business, it receives the service request generated by the business client and sent through the main control chip, and according to The service request determines the sensitive data needed to execute the service, and then runs the pre-solidified service code in the memory of the security protection device, and executes the service according to the sensitive data and the service data in the service request.
通过安全保护设备为可穿戴设备提供了安全执行业务的环境,提高了可穿戴设备中业务客户端的代码以及敏感数据的安全性,同时通过提供可部署在可穿戴设备中的安全保护设备,降低了可穿戴设备生产方针对代码以及数据的安全保护方面的开发成本。The security protection device provides wearable devices with a safe business execution environment, which improves the security of business client codes and sensitive data in wearable devices. At the same time, by providing security protection devices that can be deployed in wearable devices, it reduces the The development cost of wearable device manufacturers for code and data security protection.
附图说明Description of drawings
此处所说明的附图用来提供对本说明书的进一步理解,构成本说明书的一部分,本说明书的示意性实施例及其说明用于解释本说明书,并不构成对本说明书的不当限定。在附图中:The drawings described here are used to provide a further understanding of this specification and constitute a part of this specification. The schematic embodiments and descriptions of this specification are used to explain this specification and do not constitute an improper limitation of this specification. In the attached picture:
图1为本说明书提供的安全保护设备的结构示意图;Figure 1 is a schematic structural diagram of the safety protection equipment provided in this manual;
图2为本说明书提供的安全保护设备的结构示意图;Figure 2 is a schematic structural diagram of the safety protection equipment provided in this manual;
图3为本说明书提供的安全保护设备的结构示意图;Figure 3 is a schematic structural diagram of the safety protection equipment provided in this manual;
图4为本说明书提供的业务执行方法的流程示意图;Figure 4 is a schematic flow diagram of the business execution method provided in this specification;
图5为本说明书提供的执行支付的业务流程示意图;Figure 5 is a schematic diagram of the business process for executing payment provided in this specification;
图6为本说明书提供的业务执行装置的结构示意图。Fig. 6 is a schematic structural diagram of a service execution device provided in this specification.
具体实施方式Detailed ways
为使本说明书的目的、技术方案和优点更加清楚,下面将结合本说明书具体实施例及相应的附图对本说明书技术方案进行清楚、完整地描述。显然,所描述的实施例仅是本说明书一部分实施例,而不是全部的实施例。基于本说明书中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本说明书保护的范围。In order to make the purpose, technical solution and advantages of this specification clearer, the technical solution of this specification will be clearly and completely described below in conjunction with specific embodiments of this specification and corresponding drawings. Apparently, the described embodiments are only some of the embodiments in this specification, not all of them. Based on the embodiments in this specification, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this specification.
以下结合附图,详细说明本说明书各实施例提供的技术方案。本说明书实施例将基于一种安全保护设备,来执行相应业务。The technical solutions provided by each embodiment of this specification will be described in detail below in conjunction with the accompanying drawings. The embodiment of this specification will execute corresponding services based on a security protection device.
图1为本说明书提供的安全保护设备的结构示意图。其中,该安全保护设备103可部署在可穿戴设备中。用于为可穿戴设备中安装的业务客户端提供安全执行业务的环境,使得可穿戴设备本身在没有硬件提供安全环境的情况下,通过部署该安全保护设备103,实现安全执行业务的能力,以减少可穿戴设备实现安全执行业务所需的成本。Fig. 1 is a schematic structural diagram of the safety protection equipment provided in this specification. Wherein, the
本说明书提供的一个或多个实施例中,该安全保护设备103具体可通过指定管脚与该可穿戴设备的主控芯片100连接。具体的,该安全保护设备103可部署在该主控芯片100所在的主板上,通过主板上的线路,将自身的指定管脚与主控芯片100的管脚连接。并且,该安全保护设备103至少包括:处理器101和存储器102。In one or more embodiments provided in this specification, the
具体的,该存储器102预先固化有用于执行业务的部分业务代码以及运行所述部分业务代码所需的敏感数据,其中,该部分业务代码具体为可穿戴设备中安装的用于执行业务的业务客户端的部分业务代码。该业务客户端为需要在安全环境中执行至少部分业务步骤的应用,例如,执行基于用户生物特征的业务时,由于用户特征为敏感数据,因此该业务中涉及到针对用户生物特征处理的业务步骤,为需要在安全环境中执行的业务步骤,该存储器102中可预先固化有该业务客户端中实现该业务步骤的部分业务代码。Specifically, the
类似的,由于业务执行过程中也可能涉及到进行业务验证、应用身份验证、设备身份验证等业务步骤,而这类业务步骤还需要相应的敏感数据支持才能够执行,因此该存储器102还可预先固化的运行部分业务代码所需的敏感数据。当然,对于哪些数据为敏感数据,哪些数据需要预先固化至该存储器102,可根据需要设置,本说明书不做限制。例如,假设该安全保护设备103供给某手环使用,该手环只能支持指纹识别,那么敏感数据中可以仅包含执行业务时采用的指纹识别模型的模型参数。Similarly, since the business execution process may also involve business steps such as business verification, application identity verification, and device identity verification, and such business steps need corresponding sensitive data support before they can be executed, the
也就是说,在本说明书一个或多个实施例中,该存储器102可预先固化有需要在安全保护设备103中运行的代码以及运行代码执行业务所需的数据。That is to say, in one or more embodiments of the present specification, the
则当可穿戴设备中安装的该业务客户端,执行业务步骤需要执行存储器102中预先固化的部分业务代码时,该业务客户端可生成业务请求,并由可穿戴设备的主控芯片100通过指定管脚发送至该安全保护设备103的处理器101。当然,该业务请求中还可携带业务数据,例如,支付请求中的订单信息、人脸验证请求中人脸图像等等。由于不同的业务请求所需携带的业务数据不同,且是根据业务需要人为设置的,因此本说明书对于业务数据具体为何种数据不作限制。Then when the business client installed in the wearable device needs to execute some business codes pre-cured in the
而该处理器101在通过指定管脚接收主控芯片100发送的携带业务数据的业务请求后,便可根据业务请求从该存储器102获取敏感数据以及部分业务代码。之后,可通过运行该部分业务代码,以根据该业务数据和该敏感数据执行该业务,并得到业务执行结果。最后,将该业务执行结果通过该指定管脚,再返回该主控芯片100,使该业务客户端可基于该业务执行结果继续执行业务。After the
以业务客户端需执行的业务为支付业务为例,假设支付业务需执行存储器102中存储的业务代码来进行身份验证,且该存储器102中还存储有用户的生物信息(如,指纹、心率等)。若该可穿戴设备为手环,则该手环中安装的业务客户端可生成携带有业务数据的业务请求,其中,该业务数据可为采集到的用户生物信息。Taking the business that the business client needs to execute as a payment business as an example, suppose that the payment business needs to execute the business code stored in the
则该手环中的主控芯片100可通过指定管脚将该业务请求发送至该处理器101中,由处理器101从存储器102中,获取基于用户生物信息进行身份验证的业务代码,以及该存储器102中预先存储的用户生物信息。则在获取待业务代码和预先存储的用户生物信息后,该处理器101可根据该预先存储的用户生物信息和业务数据,运行该身份验证的业务代码进行身份验证。在得到身份验证结果后,该处理器101可将身份验证结果通过指定管脚,返回至主控芯片100中,由业务客户端根据接收到的身份验证结果继续执行支付业务。Then the
其中,上述处理器101可为用于接收业务请求,并执行该业务请求对应的业务,以及将业务执行结果进行返回的芯片,该芯片可以是微控制单元(Microcontroller Unit,MCU)、现场可编程逻辑门阵列(Field Programmable Gate Array,FPGA)芯片、复杂可编程逻辑器件(Complex Programmable Logic Device,CPLD)芯片等。Wherein, the above-mentioned
上述存储器102可为预先将数据进行固化,并当处理器101需要数据时,将数据发送至该处理器101的装置,该装置可以是闪存(Flash Eerrom Memory)芯片、只读存储器(Read Only Memory)芯片等等。Above-mentioned
上述运行业务代码所需的敏感数据可为用户的个人隐私数据,以及企业敏感数据等。如,用户的身份证号码、用户的身份证号码等,企业敏感数据可为企业开发的业务代码、业务客户端执行业务的逻辑等等。The above-mentioned sensitive data required to run the business code can be the user's personal privacy data, and enterprise sensitive data. For example, the user's ID number, the user's ID number, etc., the sensitive data of the enterprise can be the business code developed by the enterprise, the logic of the business client to execute the business, and so on.
在本说明书提供的一个或多个实施例中,该安全保护设备103可对业务客户端对应的业务应用的敏感数据进行保护的基础是:存储器102中存储有用于执行业务的部分业务代码以及运行所述部分业务代码所需的敏感数据,可穿戴设备中安装有业务客户端,该存储器102中的至少部分代码可与该可穿戴设备中的业务客户端所对应的代码进行组合来执行业务。In one or more embodiments provided in this specification, the
也就是说,在本说明书中,将业务客户端执行业务所需的程序分为了两部分,一部分保密度较低,或仅提供业务执行的入口,为业务客户端对应的代码,安装在可穿戴设备中除安全保护设备103外的其他部分中。一部分保密度较高,或具体执行业务,为用于执行业务的至少部分业务代码以及运行该部分业务代码所需的敏感数据,预先固化在存储器102中。That is to say, in this specification, the program required by the business client to execute the business is divided into two parts, one part is less confidential, or only provides the entrance of business execution, which is the code corresponding to the business client, installed on the wearable In other parts of the device except the
于是,当业务客户端需调用存储器102中所存储的部分业务代码来执行业务时,可向处理器101发送业务请求,由处理器101根据接收到的业务请求,执行该业务请求对应的业务,避免了在可穿戴设备通过业务客户端执行业务的过程中,执行业务所需的业务代码和运行业务代码所需的敏感数据被窃取的情况出现,保护了存储在存储器102中的部分业务代码以及执行该部分业务代码所需的敏感数据的信息安全。Therefore, when the service client needs to call part of the service code stored in the
基于图1所示的安全验证设备,通过在可穿戴设备中部署和主控芯片通过指定管脚连接的安全保护设备的处理器,在业务客户端需执行业务时,接收业务客户端生成并通过主控芯片发送的业务请求,并根据该业务请求确定执行业务所需的敏感数据,再运行该安全保护设备中的存储器中预先固化的业务代码,根据敏感数据和业务请求中的业务数据执行业务。通过安全保护设备为可穿戴设备提供了安全执行业务的环境,提高了可穿戴设备中业务客户端的代码以及敏感数据的安全性,同时通过提供可部署在可穿戴设备中的安全保护设备,降低了可穿戴设备生产方针对代码以及数据的安全保护方面的开发成本。Based on the security verification device shown in Figure 1, by deploying the processor of the security protection device connected to the main control chip in the wearable device through designated pins, when the business client needs to execute the business, the service client generates and passes The business request sent by the main control chip, and determine the sensitive data required to execute the business according to the business request, and then run the pre-cured business code in the memory of the security protection device, and execute the business according to the sensitive data and the business data in the business request . The security protection device provides wearable devices with a safe business execution environment, which improves the security of business client codes and sensitive data in wearable devices. At the same time, by providing security protection devices that can be deployed in wearable devices, it reduces the The development cost of wearable device manufacturers for code and data security protection.
进一步的,为了避免部署有该安全保护设备103的可穿戴设备,在生产结束到用户使用这一过程中,存在第三方将安全保护设备103中存储器102所存储的数据进行更改,在该安全保护设备103进行生产时,该安全保护设备103的生产方还可通过烧录形式,将至少部分业务代码以及运行该部分业务代码所需的敏感数据,固化到该安全保护设备103中的存储器102中。以此来避免第三方更改存储器102中的业务代码对用户造成的侵害,进一步保证信息安全。Further, in order to avoid the deployment of the wearable device with the
更进一步的,为了避免第三方将可穿戴设备进行拆卸,并在该安全保护设备103的其他管脚上外挂用于读取数据的装置,来获取该安全保护设备103中存储的数据,影响该安全保护设备103的信息安全。在本说明书中,该安全保护设备103还可禁用除指定管脚外的其他管脚。也就是说,外界能且仅能通过指定管脚来和该安全保护设备103之间传输数据。Furthermore, in order to prevent a third party from disassembling the wearable device and attaching a device for reading data on other pins of the
另外,在本说明书中,该安全保护设备103的供应方与智能穿戴设备的生产方不同,因此只有供应方授权使用安全保护设备103的智能穿戴设备是合法设备。而在实际使用过程中,可能会出现该安全保护设备103被用于未授权使用该安全保护设备103的其他电子设备上,导致存储器102存储的代码以及数据存在泄露风险。在该情况下,使用该可穿戴设备的用户的敏感数据的安全性无法保证。因此,为了避免上述情况的发生,该安全保护设备103还可在对该可穿戴设备进行安全验证后,根据安全验证的结果来执行相应业务。而目前,对可穿戴设备进行安全验证的一种有效方法是将账号与可穿戴设备进行绑定。In addition, in this specification, the supplier of the
具体的,用于执行业务的账号所属的业务平台,可通过可穿戴设备的设备序列号、可穿戴设备生产时预先写入的签约信息等等,对该可穿戴设备进行安全验证,并当安全验证通过后,将账号与该可穿戴设备进行绑定。其中,该安全保护设备103中存储的部分业务代码为该账号所属业务平台具有对应关系。如,该账号所属业务平台的服务提供方与该部分业务代码的服务提供方可为同一服务提供方。Specifically, the business platform to which the account used to execute the business belongs can perform security verification on the wearable device through the device serial number of the wearable device, the contract information written in advance when the wearable device is produced, etc., and when the security After the verification is passed, bind the account with the wearable device. Wherein, some of the service codes stored in the
其中,该业务凭证信息为该可穿戴设备中的业务客户端执行绑定业务时获得的,该业务凭证信息通常包含有该可穿戴设备的设备信息、该可穿戴设备的厂商信息、该可穿戴设备是否为合规设备等等。Wherein, the business credential information is obtained when the business client in the wearable device executes the binding service, and the business credential information usually includes the device information of the wearable device, the manufacturer information of the wearable device, the wearable Whether the device is a compliant device and so on.
该绑定业务可为该可穿戴设备中的业务客户端与用户的终端中的业务客户端进行绑定,还可为将用户在业务客户端中的账号与该可穿戴设备进行绑定,还可为将账号与该业务客户端进行绑定,上述业务客户端执行的绑定业务具体为何种绑定业务,可根据需要进行设置,本说明书对此不做限制。The binding service may be binding the service client in the wearable device with the service client in the user's terminal, or binding the user's account in the service client with the wearable device, or It can be used to bind the account with the service client, and the specific binding service performed by the above service client can be set according to the needs, which is not limited in this manual.
于是,该可穿戴设备在绑定成功后,可通过主控芯片100,向该处理器101发送业务凭证信息。Therefore, after the binding is successful, the wearable device can send service credential information to the
则该处理器101可将该主控芯片100通过指定管脚发送的业务凭证信息进行接收,并将该业务凭证信息发送至存储器102,由存储器102对该业务凭证信息进行存储。Then the
则后续在该处理器101接收到业务请求时,可根据该业务凭证信息,判断该业务请求是否可执行,若是,则该处理器101可继续执行该业务请求对应的业务,若否,则该处理器101可不执行该业务请求对应的业务。Then, when the
更进一步的,为了避免第三方将可穿戴设备进行拆卸,并在该安全保护设备103的指定管脚上外挂用于读取数据的装置,来获取该安全保护设备103中存储的数据,影响该安全保护设备103的信息安全。在本说明书中,该安全保护设备103还可将该存储器102中的数据按照预先设置的加密算法进行存储。Furthermore, in order to prevent a third party from disassembling the wearable device, and attaching a device for reading data on the designated pin of the
具体的,该存储器102中可预先固化有加密算法和该加密算法对应的解密算法。Specifically, an encryption algorithm and a decryption algorithm corresponding to the encryption algorithm may be pre-cured in the
于是,该处理器101可获取该存储器102中预先存储的加密算法,并对该存储器102中存储的至少部分业务代码和运行该部分业务代码所需的敏感数据进行加密,以及将加密后的数据发送至存储器102。Therefore, the
则该存储器102可将加密后的部分业务代码和运行该部分业务代码所需的敏感数据进行存储。Then the
该处理器101可在接收到业务请求时,从该存储器102中获取解密算法,并根据该解密算法将给存储器102中存储的,加密后的部分业务代码和运行该部分业务代码所需的敏感数据进行解密,得到该部分业务代码以及执行业务所需的敏感数据,并根据执行业务所需的敏感数据来执行该部分业务代码,来实现该业务请求对应的业务的执行。The
另外,若对存储器102中存储的业务代码和运行该部分业务代码所需的敏感数据均进行加密,则对其加密解密所需的计算资源和存储资源要求较大。基于此,该存储器102可仅将运行该部分业务代码所需的敏感数据进行加密存储,而并不将该业务代码进行加密。In addition, if both the business code stored in the
当然,该存储器102也可将存储器102中存储的各数据按照敏感程度进行划分,由处理器101根据预设的加密算法对敏感程度较高的数据进行加密,并将加密结果存储到该存储器102中。具体对存储器102中的何种数据进行加密可根据需要进行设置,本说明书对此不做限制。Of course, the
进一步的,由于上述业务凭证信息为业务客户端执行绑定业务时获得的,因此,针对该业务客户端需运行存储器102中存储的业务代码执行的每个业务,其都可基于上述业务凭证信息来执行。如,业务凭证信息为可穿戴设备合规,则该处理器101可基于该业务凭证信息执行业务,若业务凭证信息为可穿戴设备不合规,则该处理器101可基于该业务凭证信息,确定各业务请求分别对应的业务执行结果为执行失败。Further, since the above-mentioned business credential information is obtained when the business client executes the bound business, therefore, for each business executed by the business client that needs to run the business code stored in the
因此,上述存储器102基于加密算法和解密算法来存储敏感数据时,还可将该业务凭证信息通过加密算法进行加密并存储,以及在该处理器101接收到业务请求时,从该存储器102中获取解密算法,对加密后的业务凭证信息进行解密,以基于解密得到的业务凭证信息来执行业务。Therefore, when the above-mentioned
更进一步的,为了避免由于存储器102中的加密算法和解密算法被窃取,而导致存储器102中存储的数据被泄露,在本说明书中,还可通过加密逻辑电路104和解密逻辑电路105,对存储器102中存储的数据进行加密或解密。Furthermore, in order to prevent the data stored in the
具体的,在该处理器101和存储器102之间,可设置有加密逻辑电路104和解密逻辑电路105,于是,该处理器101可将需要进行存储的敏感数据,通过该加密逻辑电路104,发送至该存储器102中。在该处理器101需获取存储器102中存储的敏感数据时,通过该解密逻辑电路105,从该存储器102中获取敏感数据。如图2所示。Specifically, an
图2为本说明书提供的安全保护设备的结构示意图。其中,101为处理器,102为存储器,104为加密逻辑电路,105为解密逻辑电路。其中,该加密逻辑电路104,可对对接收到的数据进行加密,并返回加密数据。该解密逻辑电路105,用于对接收到的加密数据进行解密,并返回解密结果。Fig. 2 is a schematic structural diagram of the safety protection device provided in this specification. Wherein, 101 is a processor, 102 is a memory, 104 is an encryption logic circuit, and 105 is a decryption logic circuit. Wherein, the
于是,该处理器101,可在接收到业务凭证信息后,将业务凭证信息发送至该加密逻辑电路104。Therefore, the
则该加密逻辑电路104可接收该业务凭证信息,并将加密后的业务凭证信息发送至存储器102。该存储器102可将该加密后的业务凭证信息进行存储。Then the
而在接收到业务请求后,该处理器101可从存储器102中,获取加密后的业务凭证信息,并将该加密后的业务凭证信息发送至解密逻辑电路105中,得到该解密逻辑电路105输出的业务凭证信息,并基于该业务凭证信息执行业务。After receiving the service request, the
另外,各电子设备在生产过程中,由于生产过程中的工艺差,会导致各电子设备所对应的电路之间存在细微差异,这也就使得各电子设备的电路特征之间均不相同。因此,针对该可穿戴设备,在该可穿戴设备上电时,对该可穿戴设备的电路特征进行采样,并基于采样结果得到的电路特征来确定该可穿戴设备对应的加密参数,该加密参数第三方无法获取得到。其中,该加密参数可为密钥、也可为编码规则,具体该加密参数对应的类型以及如何基于加密参数进行加密,可根据需要进行设置,本说明书对此不做限制。In addition, in the production process of each electronic device, due to poor craftsmanship in the production process, there will be slight differences between the circuits corresponding to each electronic device, which also makes the circuit characteristics of each electronic device different. Therefore, for the wearable device, when the wearable device is powered on, the circuit characteristics of the wearable device are sampled, and the encryption parameters corresponding to the wearable device are determined based on the circuit characteristics obtained from the sampling results. The encryption parameters Unavailable to third parties. Wherein, the encryption parameter may be a key or an encoding rule. Specifically, the type corresponding to the encryption parameter and how to perform encryption based on the encryption parameter may be set as required, which is not limited in this specification.
因此,在本说明书中,为了进一步保证该安全保护设备103中存储的敏感数据的信息安全,还可将该安全保护设备103中的存储器102设置有物理不可克隆(PhysicallyUnclonable Functions,PUF)存储器。即,采用上述步骤确定加密参数,并基于加密参数对敏感数据进行加密,Therefore, in this specification, in order to further ensure the information security of the sensitive data stored in the
具体的,该存储器102可在可穿戴设备首次上电时,确定该存储器102自身的电路信号特征,并基于确定出的电路信号特征来确定加密参数。Specifically, the
则在确定出加密参数后,该存储器102可根据确定出的加密参数对部分业务代码和敏感数据进行加密,并将加密结果固化在存储器102中。Then, after the encryption parameters are determined, the
于是,在该可穿戴设备后续每次上电的过程中,该存储器102需确定该存储器102自身的电路信号特征,并基于确定出的电路信号特征来确定加密参数。Therefore, during each subsequent power-on process of the wearable device, the
则该处理器101可在接收到业务请求后,从该存储器102中获取加密参数,并确定该解密参数对应的解密参数,以及基于解密参数对该存储器102中存储的数据进行解密,来确定执行业务所需的敏感数据和业务代码。After receiving the service request, the
进一步的,在该处理器101运行业务代码的过程中,还可能会出现中间数据需要进行存储的情况。该中间数据没有具体的物理意义,但该业务代码后续运行时需要该中间数据,而每生成一个中间数据,即将该中间数据进行加密,以及在需要该中间数据来执行业务代码时,将加密的中间数据进行解密,其对计算资源和存储资源的要求较高。Further, during the process of running the business code by the
因此,该安全处理设备中还可设置用于存储中间数据的运行存储器106。Therefore, a running
具体的,可将该安全处理设备中的存储器102,设置为存储处理器101产生的中间数据的运行存储器106,以及存储部分业务代码和运行业务代码所需的敏感数据的安全存储器107。Specifically, the
而在该处理器101接收到业务请求后,可从安全存储器107中获取业务代码和执行业务所需的隐私数据。After the
在处理器101执行业务代码过程中,可将生成的中间数据,发送到运行存储器106中,并在执行业务代码需要中间数据时,可从运行存储器106中获取相应的中间数据。During the execution of the service code by the
运行存储器106可将该中间数据进行存储,且该运行存储器106在存储中间数据时,可不进行加密。The running
其中,该安全存储器107在存储业务代码和运行业务程序所需的敏感数据时,可采用上述通过加密算法对数据进行加密、通过加密逻辑电路104对数据进行加密、通过PUF技术对数据进行加密中的至少一种技术手段。Wherein, when the
更进一步的,为了保证存储器102中存储的数据的信息安全,还可将上述安全存储器107设置为安全闪存Flash存储器。Furthermore, in order to ensure the information security of the data stored in the
具体的,该安全闪存Flash存储器,仅能允许指定应用的代码对其访问。Specifically, the secure flash memory can only be accessed by codes of specified applications.
于是,在该安全存储器107中,可预先固化有部分业务代码和敏感数据,在运行存储器106中,可预先存储有指定应用的代码。Therefore, in the
则该处理器101可在接收到业务请求后,从运行存储器106中获取该指定应用的代码,并根据该业务请求,运行该指定应用的代码,并通过该指定应用的代码,向安全存储器107发送获取请求。After receiving the service request, the
该安全存储器107可接收该获取请求,并根据该获取请求中所携带的应用标识,判断该获取请求是否为指定应用发送的。若是,则该安全存储器107可对该指定应用发送的获取请求进行响应,将该指定应用需获取的部分业务代码和敏感数据发送至该处理器101。若否,则该安全存储器107可不对该获取请求进行响应。The
于是,该处理器101可根据获取到的该安全存储器107发送的部分业务代码和执行业务所需的敏感数据,执行相应业务。如图3所示。Therefore, the
图3为本说明书提供的安全保护设备的结构示意图。其中,101为处理器,106为安全存储器,107为运行存储器,则该处理器101可从该安全存储器106中获取业务代码和执行业务所需的敏感数据,并在处理器101中运行该业务代码,以及将产生的中间数据存储到运行存储器107中。Fig. 3 is a schematic structural diagram of the safety protection device provided in this manual. Wherein, 101 is a processor, 106 is a safety memory, and 107 is a running memory, then the
或者,该处理器101可从运行存储器107中获取指定应用对应的代码,并在该处理器101中运行该指定应用的代码,再通过该指定应用的代码所对应的线程,调用安全存储106中存储的业务代码和执行业务所需的敏感数据,并在处理器101中运行该业务代码,以及将产生的中间数据存储到运行存储器107中。Alternatively, the
另外,在本说明书中,为了进一步保证该存储器102中存储的数据的信息安全,该安全保护设备103还可将存储器102划分为普通存储空间和安全存储空间,在未接收到业务请求时,根据存储在普通存储空间中的数据执行业务,在接收到业务请求后,根据存储在安全存储空间中的数据执行业务。其中,该安全存储空间用于提供可信执行环境(TrustedExecution Environment,TEE),以及存储部分业务代码和敏感数据。In addition, in this specification, in order to further ensure the information security of the data stored in the
具体的,该处理器101可在接收到业务请求后,将自身切换至安全状态。在该安全状态下,乖处理器101可根据该业务请求,分配执行业务的线程,并通过该线程,从该存储器102的安全存储空间中获取数据。Specifically, the
则该存储器102可在该线程对调用自身安全存储空间中存储的数据时,判断该处理器101是否为安全状态,若是,则该存储器102可将自身安全存储空间中的部分业务代码和该敏感数据,通过该线程发送至该处理器101。若否,该存储器102可不允许该线程对该安全存储空间中的数据进行调用。Then the
则该处理器101可在可信执行环境中,将获取到的部分业务代码运行,来根据业务数据和敏感数据执行该业务请求对应的业务,并将业务执行结果返回至主控芯片100。Then the
进一步的,在本说明书中,为了避免第三方在该安全保护设备103的管脚处进行外挂来获取该安全保护设备103中的数据,在生产该安全保护设备103时,还可将该安全保护设备103和该主控芯片100封装在同一物理芯片内。Further, in this specification, in order to prevent third parties from obtaining data in the
基于同样思路,本说明书还提供一种业务执行方法的流程示意图,具体如图4所示。Based on the same idea, this specification also provides a schematic flowchart of a service execution method, as shown in FIG. 4 .
图4为本说明书提供的业务执行方法的流程示意图,所述业务执行方法应用于安全保护设备,所述安全保护设备部署在可穿戴设备中,所述安全保护设备通过指定管脚与所述可穿戴设备的主控芯片连接,所述安全保护设备中预先固化有业务客户端的部分业务代码以及运行所述部分业务代码所需的敏感数据;其中:Fig. 4 is a schematic flow diagram of the service execution method provided in this specification, the service execution method is applied to a security protection device, the security protection device is deployed in a wearable device, and the security protection device communicates with the wearable device through a specified pin The main control chip of the wearable device is connected, and part of the business code of the business client and the sensitive data required to run the part of the business code are pre-cured in the security protection device; wherein:
S200:接收所述可穿戴设备的主控芯片通过所述指定管脚发送的携带业务数据的业务请求。S200: Receive a service request carrying service data sent by the main control chip of the wearable device through the designated pin.
在本说明书一个或多个实施例中,如前述图1~3的安全保护设备所示,该安全保护设备可部署在可穿戴设备中,该可穿戴设备中可安装有业务客户端。而该安全保护设备中预先固化有该业务客户端的部分业务代码以及运行该部分业务代码所需的敏感数据,使得该可穿戴设备,还可通过在该安全保护设备中运行该部分业务代码以及敏感数据,执行业务。In one or more embodiments of this specification, as shown in the aforementioned security protection device in FIGS. 1 to 3 , the security protection device may be deployed in a wearable device, and a service client may be installed in the wearable device. Part of the business code of the business client and the sensitive data required to run the part of the business code are pre-cured in the security protection device, so that the wearable device can also run the part of the business code and sensitive data in the security protection device. Data, perform business.
具体的,业务客户端一般可用于执行至少一种业务,而业务执行过程可细分为不同的业务步骤。例如,以执行支付业务的客户端为例,假设支付业务的业务步骤可包括:确定订单信息、确定用户信息、获取用户输入的支付信息、验证用户身份、对支付信息进行验证、基于验证结果向服务器返回业务信息。其中,获取订单信息、获取用户信息、获取支付信息以及向服务器返回业务信息的过程,涉及的数据敏感度低,因此可视为是非敏感业务步骤。而进行身份验证和支付信息验证的步骤,由于涉及到验证过程,因此可视为是敏感业务步骤。Specifically, a business client can generally be used to execute at least one kind of business, and the business execution process can be subdivided into different business steps. For example, taking the client that executes the payment service as an example, it is assumed that the business steps of the payment service may include: determining order information, determining user information, obtaining payment information input by the user, verifying the user's identity, verifying the payment information, sending The server returns business information. Among them, the process of obtaining order information, obtaining user information, obtaining payment information, and returning business information to the server involves low data sensitivity, so it can be regarded as a non-sensitive business step. The steps of identity verification and payment information verification can be regarded as sensitive business steps because of the verification process involved.
于是,可根据业务涉及的业务步骤的不同,将该业务客户端的代码进行划分为,执行敏感业务的代码和执行非敏感业务的代码。而同样的支持不同业务步骤的代码运行的数据,也可对应的划分为敏感数据以及非敏感数据。该可穿戴设备中安装的业务客户端可包含执行非敏感业务的代码,该可穿戴设备也可存储非敏感数据,而该安全保护设备中预先固化的部分业务代码可包括执行敏感业务的代码,预先固化的敏感数据可包括运行该部分业务代码所需的敏感数据。Therefore, according to the different business steps involved in the business, the code of the business client can be divided into the code for executing sensitive business and the code for executing non-sensitive business. And the same data that supports the code operation of different business steps can also be divided into sensitive data and non-sensitive data correspondingly. The service client installed in the wearable device may contain codes for executing non-sensitive services, and the wearable device may also store non-sensitive data, while part of the service codes pre-cured in the security protection device may include codes for executing sensitive services, The pre-cured sensitive data may include sensitive data required to run the part of the business code.
则当该可穿戴设备中的业务客户端执行业务时,当执行到敏感业务步骤时,由于相应的代码以及数据均固化在该安全保护设备中,于是,该业务客户端可通过该可穿戴设备的主控芯片,向该安全保护设备发送业务请求,该业务请求中携带有业务数据,用于唤起该安全保护设备中固化的部分业务代码,执行对应的敏感业务步骤,而该安全保护设备可将敏感业务步骤执行后的业务执行结果返回可穿戴设备中的业务客户端,使业务客户端可继续执行业务。Then when the business client in the wearable device executes business, when the sensitive business steps are executed, since the corresponding code and data are solidified in the security protection device, the business client can pass through the wearable device The main control chip of the security protection device sends a service request to the security protection device. The service request carries business data and is used to arouse part of the service code solidified in the security protection device to execute the corresponding sensitive business steps. The security protection device can The business execution result after the execution of sensitive business steps is returned to the business client in the wearable device, so that the business client can continue to execute the business.
在本说明书一个或多个实施例中,通过将涉及敏感业务步骤的部分业务代码固化至安全保护设备中,使得通过可穿戴设备的主控芯片无法获取该业务客户端中敏感业务步骤的代码,实现了业务客户端在代码层面的安全隔离。同样的,由于敏感数据也隔离在安全保护设备中,该可穿戴设备无法获取,保护了数据安全。其中,该安全保护设备固化的部分业务代码,具体作用本说明书不做限制,例如,执行业务的采用算法函数的代码、实现业务逻辑的代码,等等。以算法函数是通过机器学习得到的模型为例,由于模型参数是基于训练样本的调整得到,因此该模型参数难免携带有训练样本的特征,而训练样本属于是隐私数据,因此该算法函数属于需要隔离保护的代码。以该业务执行需要基于用户生物特征进行身份验证为例,该部分业务代码需要基于采集的待验证的生物特征,以及预先存储的用户的生物特征,进行匹配验证。那么该安全保护设备中需要存储有该用户的生物特征,显然这属于用户的隐私数据,需隔离在该安全保护设备中存储。In one or more embodiments of this specification, by solidifying some business codes involving sensitive business steps into the security protection device, the main control chip of the wearable device cannot obtain the code of the sensitive business steps in the business client, Realized the security isolation of business clients at the code level. Similarly, since the sensitive data is also isolated in the security protection device, the wearable device cannot be obtained, thus protecting the data security. Among them, the specific function of part of the business code solidified by the security protection device is not limited in this specification, for example, the code that uses the algorithm function to execute the business, the code that realizes the business logic, and so on. Taking the model whose algorithm function is obtained through machine learning as an example, since the model parameters are adjusted based on the training samples, the model parameters inevitably carry the characteristics of the training samples, and the training samples are private data, so the algorithm function is required Code for isolation protection. Taking this business execution as an example that requires identity verification based on the user's biometrics, this part of the business code needs to perform matching verification based on the collected biometrics to be verified and the pre-stored user's biometrics. Then the security protection device needs to store the user's biometric feature, which obviously belongs to the user's private data and needs to be isolated and stored in the security protection device.
S202:根据所述业务请求,从预先固化的数据中,获取执行业务所需的敏感数据以及所述部分业务代码。S202: According to the service request, obtain the sensitive data required to execute the service and the part of the service code from the pre-cured data.
在本说明书一个或多个实施例中,该安全保护设备在接收到业务客户端通过主控芯片发送的业务请求后,便可从预先固化的数据中,获取执行业务所需的敏感数据以及部分业务代码。In one or more embodiments of this specification, after the security protection device receives the service request sent by the service client through the main control chip, it can obtain the sensitive data and some Business code.
具体的,由于该安全保护设备中存储的部分业务代码,可以是用于执行多个敏感业务步骤的代码,这些敏感业务步骤可以对应一个或多个业务的部分业务流程,因此该安全保护设备还可基于业务请求中携带的业务类型标识,确定该业务请求需要执行哪些业务步骤,并获取执行确定出的业务步骤的代码。Specifically, since part of the business codes stored in the security protection device may be codes for executing multiple sensitive business steps, and these sensitive business steps may correspond to part of business processes of one or more businesses, the security protection device also Based on the service type identifier carried in the service request, it can be determined which business steps need to be executed by the service request, and the code for executing the determined business steps can be obtained.
例如,假设该安全保护设备中存储了进行A业务的生物特征验证步骤的代码,以及执行B业务的业务权限验证步骤的代码,则当该安全保护设备接收到携带有A业务类型标识的业务请求时,该安全保护设备可从固化的部分业务代码中,确定该生物特征验证步骤的代码。For example, assuming that the security protection device stores the code for the biometric verification step of A service and the code for the service authority verification step of B service, when the security protection device receives the service request carrying the A service type identification , the security protection device can determine the code of the biometric verification step from part of the solidified business codes.
同理,执行不同业务步骤所需的敏感数据也可能不完全相同,则该安全保护设备还可根据确定出的需要运行的部分业务代码,确定所需的敏感数据。那么该安全保护设备中还可以存储有各业务步骤与各敏感数据的对应关系,在根据业务请求确定需要执行的业务步骤之后,确定对应的敏感数据。Similarly, the sensitive data required to execute different business steps may not be exactly the same, so the security protection device can also determine the required sensitive data according to the determined part of the business code that needs to be run. Then the security protection device may also store the corresponding relationship between each business step and each sensitive data, and determine the corresponding sensitive data after determining the business steps to be executed according to the business request.
在本说明书一个或多个实施例中,由于可穿戴设备中只有业务客户端通过指定管脚,才能向该安全保护设备发送业务请求,而其他第三方客户端是无法向该安全保护设备发送业务请求的,因此通过设置该安全保护设备已经实现了该部分业务代码以及敏感数据的隔离。In one or more embodiments of this specification, only the service client in the wearable device can send a service request to the security protection device through a designated pin, while other third-party clients cannot send services to the security protection device Therefore, the isolation of this part of business code and sensitive data has been realized by setting the security protection device.
进一步地,为了增加该安全保护设备中数据隔离的安全性,该安全保护设备在固化该部分业务代码以及敏感数据时,还可通过预先设置的加密算法对代码以及敏感数据进行加密计算后,将加密结果存储。则在接收到业务请求后,该安全保护设备在确定需要调用的代码以及敏感数据后,可获对应的加密结果,再根据该加密算法对应的解密算法,对加密结果进行解密,得到执行业务所需的敏感数据以及部分业务代码。Further, in order to increase the security of data isolation in the security protection device, when the security protection device solidifies the part of the business code and sensitive data, the code and sensitive data can also be encrypted and calculated by a preset encryption algorithm, and the Encrypted result storage. After receiving the service request, the security protection device can obtain the corresponding encryption result after determining the code and sensitive data that need to be called, and then decrypt the encryption result according to the decryption algorithm corresponding to the encryption algorithm, and obtain the execution service. required sensitive data and some business codes.
其中,该加密算法及其对应的解密算法也是预先固化在该安全保护设备中的,具体采用何种算法本说明并不做限制,可以根据需要设置。Wherein, the encryption algorithm and its corresponding decryption algorithm are also pre-fixed in the security protection device, and the specific algorithm used is not limited in this description, and can be set as required.
更进一步地,由于加密算法和解密算法本质上仍属于需要运行的代码,需要安全保护设备运行加密算法代码实现加密,或运行解密算法代码实现解密。而为了进一步保障存储的代码以及敏感数据的安全,在本说明书一个或多个实施例中,该安全保护设备中还可包括加密逻辑电路以及解密逻辑电路。则当需要进行加密时,可通过该加密逻辑电路得到加密结果,需要解密时,通过该解密逻辑电路进行数据解密。Furthermore, since the encryption algorithm and the decryption algorithm are essentially codes that need to be run, it is necessary for the security protection device to run encryption algorithm codes to implement encryption, or run decryption algorithm codes to implement decryption. In order to further ensure the security of stored codes and sensitive data, in one or more embodiments of this specification, the security protection device may further include an encryption logic circuit and a decryption logic circuit. Then, when encryption is required, the encryption result can be obtained through the encryption logic circuit, and when decryption is required, the data decryption can be performed through the decryption logic circuit.
通过上述两种方式,对部分业务代码以及敏感数据进行加密存储,在需要使用时再解密,提高了安全保护设备中存储的代码以及敏感数据的安全性,进一步增加了数据隔离的强度。Through the above two methods, some business codes and sensitive data are encrypted and stored, and then decrypted when needed, which improves the security of the codes and sensitive data stored in the security protection device, and further increases the strength of data isolation.
另外,在本说明书一个或多个实施例中,该部分业务代码以及敏感数据还可以另外存储在安全存储设备中,该安全存储设备可以是如安全Flash或PUF存储器。其中,该安全Flash中存储的数据只有通过指定应用才可调用,即,安全Flash在接收到调用时,先判断调用发起方是否为该指定应用,若不是,则不响应该调用,若是,才基于调用将存储的部分业务代码以及敏感数据返回。而PUF存储器,则是利用安全保护设备上电时,设备内产生的电路信号特征,确定加密参数,对部分业务代码以及敏感数据进行存储。而由于电子设备生产过程中不可避免产生的公差,使得即使第三方构建了与安全保护设备完全一致的硬件结构,也不可能通过采集电路中的电信号,复原PUF存储器中存储的数据。In addition, in one or more embodiments of this specification, the part of business codes and sensitive data may be additionally stored in a secure storage device, such as secure Flash or PUF memory. Wherein, the data stored in the security Flash can only be called by the specified application, that is, when the security Flash receives the call, it first judges whether the calling initiator is the specified application, if not, it does not respond to the call, and if so, it Part of the business code and sensitive data that will be stored based on the call are returned. The PUF memory uses the circuit signal characteristics generated in the device when the security protection device is powered on to determine the encryption parameters and store some business codes and sensitive data. Due to the inevitable tolerances in the production process of electronic equipment, even if a third party builds a hardware structure that is completely consistent with the security protection equipment, it is impossible to restore the data stored in the PUF memory by collecting electrical signals in the circuit.
S204:运行所述部分业务代码,根据所述业务数据和所述敏感数据执行所述业务,并确定业务执行结果。S204: Run the part of the service code, execute the service according to the service data and the sensitive data, and determine a service execution result.
S206:将所述业务执行结果通过所述指定管脚返回所述主控芯片。S206: Return the service execution result to the main control chip through the specified pin.
在本说明书一个或多个实施例中,该安全保护设备在获取部分业务代码和敏感数据后,便可通过运行代码,根据业务数据以及敏感数据执行业务步骤,并将执行结果,作为业务执行结果,在通过指定管脚返回可穿戴设备的主控芯片,使业务客户端可基于该业务执行结果继续执行业务。In one or more embodiments of this specification, after the security protection device obtains part of the business code and sensitive data, it can execute the business steps according to the business data and sensitive data by running the code, and use the execution result as the business execution result , and return to the main control chip of the wearable device through the specified pin, so that the business client can continue to execute the business based on the business execution result.
在本说明书中的一个或多个实施例中,该业务执行方法的具体步骤可由上述安全保护设备执行,具体流程可参见上述对于安全保护设备的描述,本说明书对此不再赘述。In one or more embodiments in this specification, the specific steps of the service execution method may be executed by the above-mentioned security protection device, and the specific process may refer to the above-mentioned description of the security protection device, which will not be repeated in this specification.
基于上述执行业务流程,为了方便理解,本说明书提供执行支付的业务流程的示意图,如图5所示。Based on the above execution business process, for the convenience of understanding, this manual provides a schematic diagram of the payment execution business process, as shown in FIG. 5 .
S300:业务客户端执行支付业务,确定的待验证数据,将该待验证数据通过指定管脚发送至安全保护设备。S300: The business client executes the payment service, determines the data to be verified, and sends the data to be verified to the security protection device through a designated pin.
具体的,该可穿戴设备中安装的该业务客户端在执行支付业务时,可先确定用于验证用户身份的待验证数据。并将该待验证数据通过指定管脚发送至安全保护设备。通常该待验证数据无需安全隔离,并且也只能在可穿戴设备提供的环境中确定,因此可由业务客户端通过主控芯片执行该业务客户端的代码获取。Specifically, when the service client installed in the wearable device executes the payment service, it may first determine the data to be verified for verifying the identity of the user. And send the data to be verified to the safety protection device through the designated pin. Usually the data to be verified does not need to be securely isolated, and can only be determined in the environment provided by the wearable device, so the business client can execute the code acquisition of the business client through the main control chip.
该业务客户端可基于获取的待验证数据,生成向该安全保护设备发送的业务请求,使安全保护设备可根据业务请求,对待验证数据进行验证,并返回验证结果。The service client can generate a service request to the security protection device based on the acquired data to be verified, so that the security protection device can verify the data to be verified according to the service request and return a verification result.
S302:该安全保护设备根据接收到的该业务请求,确定预先固化加密的该业务客户端的部分业务代码以及用于验证的存证数据。S302: The security protection device determines, according to the received service request, a part of the service code of the service client that is pre-cured and encrypted and certificate data for verification.
该安全保护设备在接收到该业务请求后,可获取加密后的部分业务代码以及加密后的用户指纹特征。通过运行解密算法,得到部分业务代码以及存证数据。该存证数据用于对待验证数据进行验证,因此属于“正确”的数据,例如,用户正确的身份信息、业务执行的凭证信息等等。可见,在安全保护设备中加密存储该存证数据,可以提高数据安全性。After receiving the service request, the security protection device can obtain the encrypted part of the service code and the encrypted user fingerprint feature. By running the decryption algorithm, part of the business code and certificate data are obtained. The certificate data is used to verify the data to be verified, so it belongs to "correct" data, for example, the correct identity information of the user, the credential information of business execution, and so on. It can be seen that encrypting and storing the certificate data in the security protection device can improve data security.
类似的,业务客户端在业务进行验证步骤时,采用何种业务逻辑以及具体如何进行“验证”也属于是业务客户端的敏感信息,因此实现这一过程的代码,也加密存储在安全保护设备中,实现业务逻辑的安全保护。Similarly, what kind of business logic and how to perform "authentication" are also sensitive information of the business client when the business client performs verification steps, so the code to realize this process is also encrypted and stored in the security protection device , to realize the security protection of business logic.
S304:该安全保护设备通过运行该部分业务代码,根据该存证数据对该待验证数据进行验证。S304: The security protection device verifies the data to be verified according to the stored evidence data by running the part of the business code.
该安全保护设备可运行该部分业务代码,对该待验证数据与该存证数据是否匹配进行验证,并确定验证结果。例如,若该验证过程为验证可穿戴设备的业务客户端是否“持有”授权执行该业务的凭证,则该安全保护设备运行该部分业务代码,可以比较自身存储的正确凭证,与业务请求中携带的待验证数据包含的凭证,是否一致,若一致则确定该业务客户端“有权”执行该业务,否则确定该业务客户端不应执行该业务。The security protection device can run the part of the business code to verify whether the data to be verified matches the stored evidence data, and determine the verification result. For example, if the verification process is to verify whether the business client of the wearable device "holds" the certificate authorized to execute the business, then the security protection device runs this part of the business code, and can compare the correct certificate stored by itself with that in the business request. Whether the voucher contained in the data to be verified is consistent, and if it is consistent, it is determined that the service client "has the right" to perform the service, otherwise it is determined that the service client should not perform the service.
S306:确定验证结果,并通过指定管脚将该验证结果返回该业务客户端。S306: Determine the verification result, and return the verification result to the service client through a designated pin.
S308:该业务客户端接收到的该验证结果,若该业务执行结果为验证通过,执行该支付业务,若该业务执行结果为验证不通过,则不执行该支付业务。S308: For the verification result received by the business client, if the business execution result is that the verification is passed, execute the payment service; if the business execution result is that the verification fails, then the payment service is not executed.
该安全保护设备在确定出验证结果后,便可再通过该指定管脚,将该身份验证是否通过的业务执行结果,返回至可穿戴设备的业务客户端。After the security protection device determines the verification result, it can return the service execution result of whether the identity verification is passed to the service client of the wearable device through the specified pin.
而该业务客户端可根据验证通过的结果,确定是否继续执行支付业务。若验证通过,则可继续根据订单信息,执行支付业务。或者,若身份验证未通过,则该业务客户端不执行支付业务。And the service client can determine whether to continue to execute the payment service according to the result of passing the verification. If the verification is passed, the payment business can continue to be executed according to the order information. Or, if the identity verification fails, the service client does not execute the payment service.
其中,可见该部分业务代码包括部分业务逻辑以及算法代码,该敏感数据可包括用户的生物特征以及相似度阈值。Wherein, it can be seen that the part of the business code includes part of the business logic and algorithm code, and the sensitive data may include the user's biological characteristics and similarity threshold.
以图5的支付业务过程为例,假设该业务客户端为基于生物特征执行支付业务的客户端,则在步骤S300中该业务客户端通过可穿戴设备采集的待验证数据。该待验证数据包含有用户的生物特征,该用户具体可为发起支付业务的用户,通常为穿戴该可穿戴设备的用户。例如,该待验证数据可为用户的人脸图像、用户的指纹特征、用户的声纹特征、用户的心律特征等等。Taking the payment business process in FIG. 5 as an example, assuming that the business client is a client that executes the payment business based on biometric features, in step S300 the business client collects the data to be verified by the wearable device. The data to be verified includes the biological characteristics of the user, and the user may specifically be the user who initiates the payment service, usually the user wearing the wearable device. For example, the data to be verified may be the user's face image, the user's fingerprint feature, the user's voiceprint feature, the user's heart rhythm feature, and so on.
若步骤S300中该业务客户端通过可穿戴设备采集指纹图像,将该指纹图像作为待验证数据,则并确定携带该指纹图像的业务请求,将该业务请求通过指定管脚发送至该安全保护设备。If in step S300, the service client collects the fingerprint image through the wearable device, and takes the fingerprint image as the data to be verified, then determines the service request carrying the fingerprint image, and sends the service request to the security protection device through the designated pin .
则在步骤S302~304中,该安全保护设备可通过运行该部分业务代码,从该待验证数据中提取出待验证生物特征,之后再根据预先固化的用户生物特征,对该待验证生物特征进行相似度计算,根据确定出的相似度以及存储的相似度阈值,确定匹配结果。若相似度高于预设阈值,则说明用户身份验证通过,若否则确定用户身份验证未通过。于是在步骤S308中,该业务客户端可根据接收到的验证结果,当确定用户身份验证通过时,继续执行支付业务的后续步骤,例如,根据订单信息通过用户账户进行支付。而当确定用户身份验证未通过时,则可确定无需继续执行支付业务。Then in steps S302-304, the security protection device can extract the biometric feature to be verified from the data to be verified by running the part of the business code, and then perform the biometric feature to be verified according to the pre-solidified user biometric feature. The similarity calculation is to determine the matching result according to the determined similarity and the stored similarity threshold. If the similarity is higher than the preset threshold, it means that the user identity verification is passed; otherwise, it is determined that the user identity verification is not passed. Then in step S308, the service client may continue to perform subsequent steps of the payment service when it is determined that the user identity verification is passed according to the received verification result, for example, payment is made through the user account according to the order information. And when it is determined that the user identity verification fails, it can be determined that there is no need to continue to execute the payment service.
可见,在该安全保护设备中,预先存储的部分业务代码,至少可包含:基于待验证数据提取生物特征的代码、计算两种不同生物特征相似度算法的代码。该在该安全保护设备中,预先存储的存证数据可包括用户生物特征、确定验证结果的相似度阈值等等。It can be seen that in the security protection device, part of the pre-stored business codes may at least include: codes for extracting biometric features based on the data to be verified, and codes for calculating two different biometric similarity algorithms. In the security protection device, the pre-stored evidence data may include user biometric features, similarity thresholds for determining verification results, and the like.
基于同样思路,本说明书还提供一种业务执行装置的结构图,具体如图6所示。Based on the same idea, this specification also provides a structural diagram of a service execution device, as shown in FIG. 6 .
图6为本说明书提供的业务执行装置的结构示意图,其中,所述业务执行装置应用于安全保护设备,所述安全保护设备部署在可穿戴设备中,所述安全保护设备通过指定管脚与所述可穿戴设备的主控芯片连接,所述安全保护设备中预先固化有业务客户端的部分业务代码以及运行所述部分业务代码所需的敏感数据。Figure 6 is a schematic structural diagram of the service execution device provided in this specification, wherein the service execution device is applied to a security protection device, the security protection device is deployed in a wearable device, and the security protection device communicates with the device through a specified pin Part of the business code of the business client and the sensitive data required to run the part of the business code are pre-cured in the security protection device.
接收模块400,用于接收所述可穿戴设备的主控芯片通过所述指定管脚发送的携带业务数据的业务请求。The receiving
获取模块402,用于根据所述业务请求,从预先固化的数据中,获取执行业务所需的敏感数据以及所述部分业务代码。The obtaining
执行模块404,用于运行所述部分业务代码,根据所述业务数据和所述敏感数据执行所述业务,并确定业务执行结果。The
返回模块406,用于将所述业务执行结果通过所述指定管脚返回所述主控芯片。A
在20世纪90年代,对于一个技术的改进可以很明显地区分是硬件上的改进(例如,对二极管、晶体管、开关等电路结构的改进)还是软件上的改进(对于方法流程的改进)。然而,随着技术的发展,当今的很多方法流程的改进已经可以视为硬件电路结构的直接改进。设计人员几乎都通过将改进的方法流程编程到硬件电路中来得到相应的硬件电路结构。因此,不能说一个方法流程的改进就不能用硬件实体模块来实现。例如,可编程逻辑器件(Programmable Logic Device,PLD)(例如现场可编程门阵列(Field Programmable GateArray,FPGA))就是这样一种集成电路,其逻辑功能由用户对器件编程来确定。由设计人员自行编程来把一个数字系统“集成”在一片PLD上,而不需要请芯片制造厂商来设计和制作专用的集成电路芯片。而且,如今,取代手工地制作集成电路芯片,这种编程也多半改用“逻辑编译器(logic compiler)”软件来实现,它与程序开发撰写时所用的软件编译器相类似,而要编译之前的原始代码也得用特定的编程语言来撰写,此称之为硬件描述语言(Hardware Description Language,HDL),而HDL也并非仅有一种,而是有许多种,如ABEL(Advanced Boolean Expression Language)、AHDL(Altera Hardware DescriptionLanguage)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(RubyHardware Description Language)等,目前最普遍使用的是VHDL(Very-High-SpeedIntegrated Circuit Hardware Description Language)与Verilog。本领域技术人员也应该清楚,只需要将方法流程用上述几种硬件描述语言稍作逻辑编程并编程到集成电路中,就可以很容易得到实现该逻辑方法流程的硬件电路。In the 1990s, the improvement of a technology can be clearly distinguished as an improvement in hardware (for example, improvements in circuit structures such as diodes, transistors, and switches) or improvements in software (improvement in method flow). However, with the development of technology, the improvement of many current method flows can be regarded as the direct improvement of the hardware circuit structure. Designers almost always get the corresponding hardware circuit structure by programming the improved method flow into the hardware circuit. Therefore, it cannot be said that the improvement of a method flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (Programmable Logic Device, PLD) (such as a Field Programmable Gate Array (Field Programmable Gate Array, FPGA)) is such an integrated circuit, and its logic function is determined by programming the device by a user. It is programmed by the designer to "integrate" a digital system on a PLD, instead of asking a chip manufacturer to design and make a dedicated integrated circuit chip. Moreover, nowadays, instead of making integrated circuit chips by hand, this kind of programming is mostly realized by "logic compiler (logic compiler)" software, which is similar to the software compiler used when writing programs. The original code of the computer must also be written in a specific programming language, which is called a hardware description language (Hardware Description Language, HDL), and there is not only one kind of HDL, but many kinds, such as ABEL (Advanced Boolean Expression Language) , AHDL (Altera Hardware Description Language), Confluence, CUPL (Cornell University Programming Language), HDCal, JHDL (Java Hardware Description Language), Lava, Lola, MyHDL, PALASM, RHDL (Ruby Hardware Description Language), etc., currently the most commonly used is VHDL (Very-High-Speed Integrated Circuit Hardware Description Language) and Verilog. It should also be clear to those skilled in the art that only a little logical programming of the method flow in the above-mentioned hardware description languages and programming into an integrated circuit can easily obtain a hardware circuit for realizing the logic method flow.
控制器可以按任何适当的方式实现,例如,控制器可以采取例如微处理器或处理器以及存储可由该(微)处理器执行的计算机可读程序代码(例如软件或固件)的计算机可读介质、逻辑门、开关、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑控制器和嵌入微控制器的形式,控制器的例子包括但不限于以下微控制器:ARC625D、Atmel AT91SAM、Microchip PIC18F26K20以及Silicone Labs C8051F320,存储器控制器还可以被实现为存储器的控制逻辑的一部分。本领域技术人员也知道,除了以纯计算机可读程序代码方式实现控制器以外,完全可以通过将方法步骤进行逻辑编程来使得控制器以逻辑门、开关、专用集成电路、可编程逻辑控制器和嵌入微控制器等的形式来实现相同功能。因此这种控制器可以被认为是一种硬件部件,而对其内包括的用于实现各种功能的装置也可以视为硬件部件内的结构。或者甚至,可以将用于实现各种功能的装置视为既可以是实现方法的软件模块又可以是硬件部件内的结构。The controller may be implemented in any suitable way, for example the controller may take the form of a microprocessor or processor and a computer readable medium storing computer readable program code (such as software or firmware) executable by the (micro)processor , logic gates, switches, Application Specific Integrated Circuits (ASICs), programmable logic controllers, and embedded microcontrollers, examples of controllers include but are not limited to the following microcontrollers: ARC625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320, the memory controller can also be implemented as part of the control logic of the memory. Those skilled in the art also know that, in addition to realizing the controller in a purely computer-readable program code mode, it is entirely possible to make the controller use logic gates, switches, application-specific integrated circuits, programmable logic controllers, and embedded The same function can be realized in the form of a microcontroller or the like. Therefore, such a controller can be regarded as a hardware component, and the devices included in it for realizing various functions can also be regarded as structures within the hardware component. Or even, means for realizing various functions can be regarded as a structure within both a software module realizing a method and a hardware component.
上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机。具体的,计算机例如可以为个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任何设备的组合。The systems, devices, modules, or units described in the above embodiments can be specifically implemented by computer chips or entities, or by products with certain functions. A typical implementing device is a computer. Specifically, the computer may be, for example, a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or Combinations of any of these devices.
为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本说明书时可以把各单元的功能在同一个或多个软件和/或硬件中实现。For the convenience of description, when describing the above devices, functions are divided into various units and described separately. Of course, when implementing this specification, the functions of each unit can be implemented in one or more pieces of software and/or hardware.
本领域内的技术人员应明白,本说明书的实施例可提供为方法、系统、或计算机程序产品。因此,本说明书可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本说明书可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art should understand that the embodiments of this specification may be provided as methods, systems, or computer program products. Accordingly, this description may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present description may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
本说明书是参照根据本说明书实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The specification is described with reference to flowcharts and/or block diagrams of methods, devices (systems), and computer program products according to embodiments of the specification. It should be understood that each procedure and/or block in the flowchart and/or block diagram, and a combination of procedures and/or blocks in the flowchart and/or block diagram can be realized by computer program instructions. These computer program instructions may be provided to a general purpose computer, special purpose computer, embedded processor, or processor of other programmable data processing equipment to produce a machine such that the instructions executed by the processor of the computer or other programmable data processing equipment produce a An apparatus for realizing the functions specified in one or more procedures of the flowchart and/or one or more blocks of the block diagram.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to operate in a specific manner, such that the instructions stored in the computer-readable memory produce an article of manufacture comprising instruction means, the instructions The device realizes the function specified in one or more procedures of the flowchart and/or one or more blocks of the block diagram.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded onto a computer or other programmable data processing device, causing a series of operational steps to be performed on the computer or other programmable device to produce a computer-implemented process, thereby The instructions provide steps for implementing the functions specified in the flow chart or blocks of the flowchart and/or the block or blocks of the block diagrams.
在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。Memory may include non-permanent storage in computer readable media, in the form of random access memory (RAM) and/or nonvolatile memory such as read only memory (ROM) or flash RAM. Memory is an example of computer readable media.
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of information. Information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory (ROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Flash memory or other memory technology, Compact Disc Read-Only Memory (CD-ROM), Digital Versatile Disc (DVD) or other optical storage, Magnetic tape cartridge, tape magnetic disk storage or other magnetic storage device or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer-readable media excludes transitory computer-readable media, such as modulated data signals and carrier waves.
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。It should also be noted that the term "comprises", "comprises" or any other variation thereof is intended to cover a non-exclusive inclusion such that a process, method, article, or apparatus comprising a set of elements includes not only those elements, but also includes Other elements not expressly listed, or elements inherent in the process, method, commodity, or apparatus are also included. Without further limitations, an element defined by the phrase "comprising a ..." does not exclude the presence of additional identical elements in the process, method, article or apparatus comprising said element.
本领域技术人员应明白,本说明书的实施例可提供为方法、系统或计算机程序产品。因此,本说明书可采用完全硬件实施例、完全软件实施例或结合软件和硬件方面的实施例的形式。而且,本说明书可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art should understand that the embodiments of this specification may be provided as methods, systems or computer program products. Accordingly, this description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present description may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
本说明书可以在由计算机执行的计算机可执行指令的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可以在分布式计算环境中实践本说明书,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行任务。在分布式计算环境中,程序模块可以位于包括存储设备在内的本地和远程计算机存储介质中。The specification may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The present description may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including storage devices.
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于系统实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。Each embodiment in this specification is described in a progressive manner, the same and similar parts of each embodiment can be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, for the system embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and for relevant parts, refer to part of the description of the method embodiment.
以上所述仅为本说明书的实施例而已,并不用于限制本说明书。对于本领域技术人员来说,本说明书可以有各种更改和变化。凡在本说明书的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本说明书的权利要求范围之内。The above descriptions are only examples of this specification, and are not intended to limit this specification. For those skilled in the art, various modifications and changes may occur in this description. Any modifications, equivalent replacements, improvements, etc. made within the spirit and principles of this specification shall be included within the scope of the claims of this specification.
Claims (12)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211080913.XA CN115640589A (en) | 2022-09-05 | 2022-09-05 | A security protection device, service execution method, device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211080913.XA CN115640589A (en) | 2022-09-05 | 2022-09-05 | A security protection device, service execution method, device and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115640589A true CN115640589A (en) | 2023-01-24 |
Family
ID=84939705
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211080913.XA Pending CN115640589A (en) | 2022-09-05 | 2022-09-05 | A security protection device, service execution method, device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115640589A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115828171A (en) * | 2023-02-13 | 2023-03-21 | 支付宝(杭州)信息技术有限公司 | Method, device, medium and equipment for cooperatively executing business by end cloud |
-
2022
- 2022-09-05 CN CN202211080913.XA patent/CN115640589A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115828171A (en) * | 2023-02-13 | 2023-03-21 | 支付宝(杭州)信息技术有限公司 | Method, device, medium and equipment for cooperatively executing business by end cloud |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI724326B (en) | Method, device and equipment for business authorization | |
CN107743133B (en) | Mobile terminal and access control method and system based on trusted security environment | |
CN110222531B (en) | Method, system and equipment for accessing database | |
WO2017088261A1 (en) | Biometric technology-based mobile payment method, device and apparatus | |
CN107196901B (en) | Identity registration and authentication method and device | |
CN113557703B (en) | Authentication method and device of network camera | |
US10721076B2 (en) | Method, device, terminal, and server for a security check | |
EP3945695B1 (en) | Method, apparatus, and device for processing blockchain data | |
WO2023040451A1 (en) | Resource transfer | |
CN108335105B (en) | Data processing method and related equipment | |
CN113704826A (en) | Privacy protection-based business risk detection method, device and equipment | |
CN116011028B (en) | Electronic signature method, electronic signature device and electronic signature system | |
CN116015627A (en) | A face recognition anti-tampering method and system based on symmetric algorithm | |
CN115640589A (en) | A security protection device, service execution method, device and storage medium | |
EP4525365A1 (en) | Offline identity verification method and apparatus, storage medium, and electronic device | |
CN111600882A (en) | Block chain-based account password management method and device and electronic equipment | |
CN117436875A (en) | Service execution method and device, storage medium and electronic equipment | |
CN115987499B (en) | Method and system for generating private key of user | |
CN113810413B (en) | Method, device and equipment for processing equipment account | |
CN114912131B (en) | Data encryption method, system and electronic equipment | |
CN114091088B (en) | Method and apparatus for improving communication security | |
HK1254025B (en) | Business authorization method, device and apparatus | |
CN115604716A (en) | Method, device storage medium and equipment for service binding and service execution | |
CN115484065A (en) | Identity verification method, device and equipment based on block chain | |
CN120201078A (en) | Micro inter-service calling method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |