TW202001661A - Communication device and security service control element and security service control method - Google Patents

Communication device and security service control element and security service control method Download PDF

Info

Publication number
TW202001661A
TW202001661A TW107120758A TW107120758A TW202001661A TW 202001661 A TW202001661 A TW 202001661A TW 107120758 A TW107120758 A TW 107120758A TW 107120758 A TW107120758 A TW 107120758A TW 202001661 A TW202001661 A TW 202001661A
Authority
TW
Taiwan
Prior art keywords
security service
control element
processor
service control
communication device
Prior art date
Application number
TW107120758A
Other languages
Chinese (zh)
Inventor
黃義雄
余俊賢
Original Assignee
互聯安睿資通股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 互聯安睿資通股份有限公司 filed Critical 互聯安睿資通股份有限公司
Priority to TW107120758A priority Critical patent/TW202001661A/en
Publication of TW202001661A publication Critical patent/TW202001661A/en

Links

Images

Abstract

A communication device, a security service control element and a security service control method are disclosed. The security service control element stores a security service operation rule for a security service process between the communication device and the security service control element. The security service control element receives a security service operation instruction related to the security service process from the communication device, and determines whether to admit the security service operation instruction according to the security service operation rule.

Description

通訊裝置、安全服務控制元件與安全服務控制方法 Communication device, safety service control element and safety service control method

本揭露是關於一種通訊裝置、安全服務控制元件與安全服務控制方法。更具體而言,本揭露是關於一種可阻止異常安全服務操作的通訊裝置、安全服務控制元件與安全服務控制方法。 The present disclosure relates to a communication device, a security service control element and a security service control method. More specifically, the present disclosure relates to a communication device, a security service control element, and a security service control method that can prevent abnormal security service operations.

當一通訊裝置的主處理器為攻擊者所破解(compromise)時,攻擊者可任意存取所述主處理器來進行各種攻擊,例如竊取或修改通訊裝置的資料。為了改善,可將與安全服務流程(例如:開機安全檢查、資料加密等等)相關的機敏資料與安全計算(例如:關鍵安全參數(Critical Security Parameters,CSPs)、金鑰、密碼學運算等等)改存放於獨立且無法或難以破解的安全元件中來保護所述機敏資料,使得所述主處理器必須通過與所述安全元件執行所述安全服務流程來獲取所述機敏資料,藉以避免通訊裝置遭受所述攻擊。然而,在此情況下,所述主處理器與所述安全元件間仍屬於主從關係,亦即,所述安全服務流程是由所述主處理器來主導,而所述安全元件只是根據所述主處理器發送的指令被動地提供所述機敏資料。因此,一旦所述主處理器遭攻擊者破解,攻擊者仍可通過控制所述主處理器來主導所述安全服務流程(例如:傳送惡意的或異常的安全服務操作指令),藉此 竊取或修改儲存在所述安全元件中的所述機敏資料。有鑑於此,如何偵測並阻止來自通訊裝置之主處理器的惡意的或異常的安全服務操作,將是本發明所屬技術領域中特別需要被解決的一項技術問題。 When the main processor of a communication device is compromised by an attacker, the attacker can arbitrarily access the main processor to perform various attacks, such as stealing or modifying data of the communication device. For improvement, alert data related to security service processes (such as boot security check, data encryption, etc.) and security calculations (such as: Critical Security Parameters (CSPs), keys, cryptographic operations, etc. ) It is stored in an independent and unbreakable or difficult-to-break secure element to protect the smart data, so that the main processor must obtain the smart data by performing the security service process with the secure element to avoid communication The device suffers from the attack. However, in this case, the master processor and the secure element still belong to the master-slave relationship, that is, the security service process is dominated by the master processor, and the secure element is only based on The instructions sent by the host processor passively provide the alert information. Therefore, once the main processor is hacked by an attacker, the attacker can still control the main processor to lead the security service process (for example: transmit malicious or abnormal security service operation instructions), thereby stealing or Modify the alert data stored in the secure element. In view of this, how to detect and prevent malicious or abnormal security service operations from the main processor of the communication device will be a technical problem that needs to be solved in the technical field to which the present invention belongs.

為了解決至少上述的問題,本發明的實施例提供了一種用於一通訊裝置的安全服務控制元件。所述安全服務控制元件可包含一儲存器、與所述通訊裝置的所述處理器電性連接的一收發器以及與所述儲存器及所述收發器電性連接的一處理器。所述儲存器可用以針對所述安全服務控制元件與所述通訊裝置的一處理器之間的一安全服務流程儲存一安全服務操作規則。所述收發器可用以自所述通訊裝置之所述處理器接收與所述安全服務流程相關的一安全服務操作指令。所述安全服務控制元件的所述處理器則可用以根據所述安全服務操作規則判斷是否允許所述安全服務操作指令。 In order to solve at least the above problems, embodiments of the present invention provide a security service control element for a communication device. The security service control element may include a storage, a transceiver electrically connected to the processor of the communication device, and a processor electrically connected to the storage and the transceiver. The storage can be used to store a security service operation rule for a security service process between the security service control element and a processor of the communication device. The transceiver can be used to receive a security service operation instruction related to the security service process from the processor of the communication device. The processor of the security service control element may be used to determine whether to allow the security service operation instruction according to the security service operation rule.

為了解決至少上述的問題,本發明的實施例還提供了一種通訊裝置。所述通訊裝置可包含一處理器以及與所述處理器電性連接的一安全服務控制元件。所述安全服務控制元件可用以針對所述安全服務控制元件與所述處理器之間的一安全服務流程儲存一安全服務操作規則;自所述處理器接收與所述安全服務流程相關的一安全服務操作指令;以及根據所述安全服務操作規則判斷是否允許所述安全服務操作指令。 In order to solve at least the above problems, embodiments of the present invention also provide a communication device. The communication device may include a processor and a security service control element electrically connected to the processor. The security service control element may be used to store a security service operation rule for a security service flow between the security service control element and the processor; receiving a security related to the security service flow from the processor A service operation instruction; and judging whether to allow the security service operation instruction according to the security service operation rule.

為了解決至少上述的問題,本發明的實施例還提供了一種用於一通訊裝置之安全服務控制方法。所述通訊裝置可包含一安全服務控制元件與一處理器。所述安全服務控制方法可包含以下步驟:所述安全服務控 制元件自所述處理器接收一安全服務操作指令,其中,所述安全服務操作指令與所述安全服務控制元件及所述處理器之間的一安全服務流程相關;以及所述安全服務控制元件根據一預存的安全服務操作規則判斷是否允許所述安全服務操作指令。 In order to solve at least the above problems, the embodiments of the present invention also provide a security service control method for a communication device. The communication device may include a security service control element and a processor. The security service control method may include the following steps: the security service control element receives a security service operation instruction from the processor, wherein the security service operation instruction and the security service control element and the processor Related to a security service process; and the security service control element determines whether to allow the security service operation instruction according to a pre-stored security service operation rule.

在本揭露中,安全服務控制元件可依據預先儲存的安全服務操作規則,判斷來自通訊裝置的處理器的安全服務操作指令是否是異常的或是惡意的。若是所述安全服務操作指令不符合所述安全服務操作規則,則所述安全服務控制元件就會阻止且拒絕執行所述安全服務操作指令。因此,通過預先制定以及預先儲存所述安全服務操作規則,所述安全服務控制元件便可有效地阻止且拒絕執行來自所述通訊裝置的所述處理器的異常的或是惡意的安全服務操作指令。舉例而言,假如攻擊者控制所述處理器在開機安全檢查流程中發送金鑰存取指令,則所述安全服務控制元件即可根據所述安全服務操作規則,判斷所述金鑰存取指令並非所述開機安全檢查所需指令,進而阻止以及拒絕執行所述指令。 In the present disclosure, the security service control element may determine whether the security service operation command from the processor of the communication device is abnormal or malicious according to the pre-stored security service operation rules. If the security service operation instruction does not comply with the security service operation rule, the security service control element will block and refuse to execute the security service operation instruction. Therefore, by pre-setting and pre-storing the security service operation rules, the security service control element can effectively prevent and refuse to execute abnormal or malicious security service operation instructions from the processor of the communication device . For example, if an attacker controls the processor to send a key access command during the power-on security check process, the security service control element can determine the key access command according to the security service operation rules It is not an instruction required for the power-on security check, thereby preventing and refusing to execute the instruction.

以上內容並非為了限制本發明,而只是概括地敘述了本發明可解決的技術問題、可採用的技術手段以及可達到的技術功效,以讓本發明所屬技術領域中具有通常知識者初步地瞭解本發明。根據檢附的圖式及以下的實施方式所記載的內容,本發明所屬技術領域中具有通常知識者將可進一步瞭解本發明的各種實施例。 The above content is not intended to limit the present invention, but only briefly describes the technical problems that can be solved by the present invention, the technical means that can be used, and the technical effects that can be achieved, so that those with ordinary knowledge in the technical field of the present invention can initially understand this invention. Based on the attached drawings and the contents described in the following embodiments, those with ordinary knowledge in the technical field to which the present invention belongs will be able to further understand various embodiments of the present invention.

如下所示: As follows:

1‧‧‧通訊裝置 1‧‧‧Communication device

11‧‧‧安全服務控制元件 11‧‧‧ Security Service Control Element

111‧‧‧處理器 111‧‧‧ processor

113‧‧‧收發器 113‧‧‧Transceiver

115‧‧‧儲存器 115‧‧‧Storage

13‧‧‧處理器 13‧‧‧ processor

2‧‧‧安全服務操作規則 2‧‧‧ Security Service Operation Rules

3‧‧‧安全服務控制方法 3‧‧‧ Security service control method

301、303‧‧‧步驟 301, 303‧‧‧ steps

OP_01、OP_02、OP_0N、OP_11、OP_12‧‧‧指令內容 OP_01, OP_02, OP_0N, OP_11, OP_12‧‧‧‧Content

RQ‧‧‧安全服務流程請求 RQ‧‧‧ Security service process request

SSOI‧‧‧安全服務操作指令 SSOI‧‧‧Security Service Operation Instructions

TK‧‧‧驗證碼 TK‧‧‧Verification code

UUID_0、UUID_1‧‧‧識別碼 UUID_0, UUID_1‧‧‧Identification code

第1圖例示了在本發明的某些實施例中,一種通訊裝置以及其所包含的安全服務控制元件。 Figure 1 illustrates in some embodiments of the invention, a communication device and the security service control element contained therein.

第2圖例示了在本發明的某些實施例中,一種安全服務操作規則的儲存型態。 FIG. 2 illustrates a storage type of a security service operation rule in some embodiments of the present invention.

第3圖例示了在本發明的某些實施例中,一種用在一通訊裝置的安全服務控制方法。 FIG. 3 illustrates a method of security service control used in a communication device in some embodiments of the present invention.

以下將透過多個實施例來說明本發明,惟這些實施例並非用以限制本發明只能根據所述操作、環境、應用、結構、流程或步驟來實施。為了便於說明,於圖式中,與本發明非直接相關的元件皆已省略。於圖式中,各元件的尺寸以及各元件之間的比例僅是範例,而非用以限制本發明。除了特別說明之外,在以下內容中,相同(或實質相同)的元件符號可對應至相同(或實質相同)的元件。 Hereinafter, the present invention will be described through multiple embodiments, but these embodiments are not intended to limit the present invention to implementation based on the operation, environment, application, structure, process, or steps. For ease of explanation, in the drawings, elements not directly related to the present invention have been omitted. In the drawings, the size of each element and the ratio between each element are only examples, not intended to limit the present invention. Unless otherwise specified, in the following, the same (or substantially the same) element symbol may correspond to the same (or substantially the same) element.

第1圖例示了在本發明的某些實施例中,一種通訊裝置以及其所包含的安全服務控制元件。第1圖所示內容僅是為了舉例說明本發明的實施例,而非為了限制本發明。 Figure 1 illustrates in some embodiments of the invention, a communication device and the security service control element contained therein. The content shown in FIG. 1 is only to illustrate the embodiments of the present invention, not to limit the present invention.

參照第1圖,通訊裝置1可包含安全服務控制元件11以及處理器13。在某些實施例中,安全服務控制元件11與處理器13都設置在通訊裝置1之中。安全服務控制元件11可包含處理器111、與處理器111電性連接的收發器113以及與處理器11電性連接的儲存器115。收發器113可與通訊裝置1的處理器13電性連接。須說明者,所述「電性連接」是指相連接的兩者間可以是直接電性連接(即,沒有透過其他元件而彼此連接)或間接電性連接(即,透過其他元件而彼此連接)。 Referring to FIG. 1, the communication device 1 may include a security service control element 11 and a processor 13. In some embodiments, the security service control element 11 and the processor 13 are both provided in the communication device 1. The security service control element 11 may include a processor 111, a transceiver 113 electrically connected to the processor 111, and a storage 115 electrically connected to the processor 11. The transceiver 113 can be electrically connected to the processor 13 of the communication device 1. It should be noted that the "electrical connection" means that the two connected can be a direct electrical connection (that is, not connected to each other through other components) or an indirect electrical connection (that is, connected to each other through other components ).

在某些實施例中,安全服務控制元件11可不設置在通訊裝置 1之中,而是獨立地設置於通訊裝置1之外,但安全服務控制元件11的收發器113仍電性連接至設置在通訊裝置1之中的處理器13。 In some embodiments, the security service control element 11 may not be provided in the communication device 1 but independently provided outside the communication device 1, but the transceiver 113 of the security service control element 11 is still electrically connected to the The processor 13 in the communication device 1.

依據不同的需求,通訊裝置1可以應用至,例如但不限於,物聯網(Internet of Things,IoT)、窄頻物聯網(Narrow Band-IoT,NB-IoT)、增強型機器類型通訊(enhanced Machine-Type Communication,eMTC)、大規模機器型通訊(massive Machine-Type Communications,mMTC)、無線個人網路(Wireless Personal Area Network,WPAN)、無線區域網路(Wireless Local Area Network,WLAN)、無線都會網路(Wireless Metropolitan Area Network,WMAN)、無線廣域網路(Wireless Wide Area Network,WWAN)等通訊系統。通訊裝置1可以是,例如但不限於,行動電話、穿戴式電子裝置、可攜式電腦、物聯網產品、車聯網產品、路由器、中繼集線器(hub)、網路交換器(network switch)、閘道器(gateway)、網路伺服器、桌上型電腦等通訊裝置。舉例而言,假設通訊裝置1應用至物聯網通訊系統,則通訊裝置1可以是一物聯網終端機、一物聯網閘道器或是一管理伺服器。 According to different requirements, the communication device 1 can be applied to, for example but not limited to, Internet of Things (IoT), Narrow Band-IoT (NB-IoT), enhanced machine type communication (enhanced Machine -Type Communication (eMTC), Massive Machine-Type Communications (mMTC), Wireless Personal Area Network (WPAN), Wireless Local Area Network (WLAN), Wireless Metropolis Network (Wireless Metropolitan Area Network, WMAN), wireless wide area network (Wireless Wide Area Network, WWAN) and other communication systems. The communication device 1 may be, for example, but not limited to, a mobile phone, a wearable electronic device, a portable computer, an Internet of Things product, an IoV product, a router, a relay hub (hub), a network switch (network switch), Communication devices such as gateways, network servers, desktop computers, etc. For example, assuming that the communication device 1 is applied to an IoT communication system, the communication device 1 may be an IoT terminal, an IoT gateway, or a management server.

安全服務控制元件11的處理器111以及通訊裝置1的處理器13各自可包含各種處理單元,例如微處理器(microprocessor)或微控制器(microcontroller),以各自在安全服務控制元件11以及通訊裝置1中執行各種運算程序。微處理器或微控制器是一種可程式化的特殊積體電路,其具有運算、儲存、輸出/輸入等能力,且可接受並處理各種編碼指令,藉以進行各種邏輯運算與算術運算,並輸出相應的運算結果。 The processor 111 of the security service control element 11 and the processor 13 of the communication device 1 may each include various processing units, such as a microprocessor or a microcontroller, to control the security service control element 11 and the communication device Perform various calculation programs in 1. The microprocessor or microcontroller is a special programmable integrated circuit, which has the capabilities of operation, storage, output/input, etc., and can accept and process various encoded instructions, so as to perform various logical operations and arithmetic operations, and output The corresponding operation result.

收發器113可以是由一傳送器(transmitter)和一接收器(receiver)所構成。所述傳送器用以傳送指令或資料給處理器13,而所述 接收器用以接收來自於處理器13的指令或資料。收發器113與處理器13之間的通訊界面可以是,例如但不限於,積體電路匯流排(Inter-Integrated Circuit,I2C)、串列週邊介面(Serial Peripheral Interface,SPI)等。 The transceiver 113 may be composed of a transmitter and a receiver. The transmitter is used to transmit instructions or data to the processor 13, and the receiver is used to receive instructions or data from the processor 13. The communication interface between the transceiver 113 and the processor 13 may be, for example but not limited to, an integrated circuit bus (Inter-Integrated Circuit, I 2 C), a serial peripheral interface (SPI), or the like.

儲存器115可為非揮發性記憶體(non-volatile memory,NVM)。非揮發性記憶體可以是,例如但不限於,唯讀記憶體(read-only memory,ROM)、可複寫唯讀記憶體(programmable read-only memory,PROM)、電子可改寫唯讀記憶體(electrically alterable read only memory,EAROM)、抹除式可複寫唯讀記憶體(erasable programmable read only memory,EPROM)、電子抹除式可複寫唯讀記憶體(electrically erasable programmable read only memory,EEPROM)或快閃記憶體(flash memory)等等。 The storage 115 may be a non-volatile memory (NVM). The non-volatile memory may be, for example, but not limited to, read-only memory (ROM), programmable read-only memory (PROM), electronically rewritable read-only memory ( electrically alterable read only memory (EAROM), erasable programmable read only memory (EPROM), electronic erasable programmable read only memory (EEPROM) or fast Flash memory (flash memory) and so on.

在某些實施例中,安全服務控制元件11可以是通訊裝置1的硬體信任錨點(hardware root of trust,HRoT)。換言之,安全服務控制元件11可以是具有硬體防偽功能的一個獨立的積體電路(IC),並用以與通訊裝置1的處理器13一起進行各種安全服務流程。所述安全服務流程可涉及到,例如但不限於,密碼計算、金鑰認證、資料加密以及開機安全檢查等等。 In some embodiments, the security service control element 11 may be a hardware root of trust (HRoT) of the communication device 1. In other words, the security service control element 11 may be an independent integrated circuit (IC) with a hardware anti-counterfeiting function, and is used to perform various security service processes together with the processor 13 of the communication device 1. The security service process may involve, for example, but not limited to, password calculation, key authentication, data encryption, and boot security check.

收發器113可用以自通訊裝置1的處理器13接收與一安全服務流程相關的安全服務操作指令SSOI。所述安全服務流程是指為了在安全服務控制元件11與通訊裝置1的處理器13之間完成某一項安全服務(例如:開機安全檢查、資料加密、或本發明所屬技術領域中可知的各種安全服務)所進行的一或多個安全服務操作。所述安全服務操作指令SSOI是用來指示進行所述一或多個安全服務操作其中之一的指令。 The transceiver 113 can be used to receive the security service operation instruction SSOI related to a security service process from the processor 13 of the communication device 1. The security service process refers to the completion of a certain security service between the security service control element 11 and the processor 13 of the communication device 1 (for example: boot security check, data encryption, or various types known in the technical field to which the present invention belongs Security service) One or more security service operations performed. The security service operation instruction SSOI is an instruction for instructing to perform one of the one or more security service operations.

舉例而言,假設所述安全服務是通訊裝置1的開機安全檢查,則所述安全服務流程可包含,例如但不限於,以下操作:(1)完整性測試(integrity test);(2)簽章驗證初始(signature verify initial);(3)簽章驗證更新(signature verify update);以及(4)簽章驗證終止(signature verify final)。此時,與這個安全服務流程相關的安全服務操作指令SSOI可以是用來指示進行上述操作其中之一的指令。 For example, assuming that the security service is a power-on security check of the communication device 1, the security service process may include, for example, but not limited to, the following operations: (1) integrity test (integrity test); (2) signature Signature verification initial; (3) signature verification update; and (4) signature verification final. At this time, the security service operation instruction SSOI related to this security service process may be an instruction for instructing to perform one of the above operations.

第2圖例示了在本發明的某些實施例中,一種安全服務操作規則的儲存型態。第2圖所示內容僅是為了舉例說明本發明的實施例,而非為了限制本發明。 FIG. 2 illustrates a storage type of a security service operation rule in some embodiments of the present invention. The content shown in FIG. 2 is only to illustrate the embodiments of the present invention, not to limit the present invention.

如第2圖所示,儲存器115是將安全服務操作規則2儲存為表格型態。然而,在某些實施例中,儲存器115也可以將安全服務操作規則2儲存為其他型態,例如但不限於,陣列、字串、鏈結串列等。 As shown in FIG. 2, the storage 115 stores the security service operation rule 2 in the form of a table. However, in some embodiments, the storage 115 may also store the security service operation rule 2 into other types, such as, but not limited to, arrays, strings, chain links, and so on.

參照第1圖及第2圖,儲存器115可用以針對在安全服務控制元件11與通訊裝置1的處理器13之間所進行的一或多個安全服務流程預先儲存一安全服務操作規則2。在收發器113自通訊裝置1的處理器13接收了與某一安全服務流程相關的安全服務操作指令SSOI之後,所述安全服務控制元件11的處理器111即根據安全服務操作規則2來判斷是否允許所述安全服務操作指令SSOI。若不允許,所述安全服務控制元件11的處理器111將阻止且拒絕執行所述安全服務操作指令SSOI。 Referring to FIGS. 1 and 2, the storage 115 may be used to pre-store a security service operation rule 2 for one or more security service processes performed between the security service control element 11 and the processor 13 of the communication device 1. After the transceiver 113 receives the security service operation instruction SSOI related to a certain security service process from the processor 13 of the communication device 1, the processor 111 of the security service control element 11 judges according to the security service operation rule 2 The security service operation instruction SSOI is allowed. If not allowed, the processor 111 of the security service control element 11 will block and refuse to execute the security service operation instruction SSOI.

安全服務操作規則2可以針對通訊裝置1的處理器13所發送的安全服務操作指令SSOI預先建立一或多個限制。舉例而言,安全服務操作規則2可限制通訊裝置1的處理器13所發送的安全服務操作指令SSOI的序 數及/或內容,其中安全服務操作指令SSOI的序數可用來判斷其所對應的安全服務操作在安全服務流程中的順序是否正確,而安全服務操作指令SSOI的內容可用來判斷其是否對應到正確的安全服務操作。在此情況下,處理器111便可根據安全服務操作規則2,判斷安全服務操作指令SSOI的序數及/或內容是否符合安全服務操作規則2,以決定是否允許安全服務操作指令SSOI。除了序數和內容以外,於其他實施例,安全服務操作規則2還可針對通訊裝置1的處理器13所發送的安全服務操作指令SSOI的建立其他限制。 The security service operation rule 2 may pre-establish one or more restrictions on the security service operation instruction SSOI sent by the processor 13 of the communication device 1. For example, the security service operation rule 2 may limit the ordinal number and/or content of the security service operation instruction SSOI sent by the processor 13 of the communication device 1, wherein the ordinal number of the security service operation instruction SSOI can be used to determine the corresponding security service The sequence of operations in the security service process is correct, and the content of the security service operation instruction SSOI can be used to determine whether it corresponds to the correct security service operation. In this case, the processor 111 can determine whether the sequence number and/or content of the security service operation instruction SSOI conforms to the security service operation instruction 2 according to the security service operation rule 2 to decide whether to allow the security service operation instruction SSOI. In addition to the ordinal number and the content, in other embodiments, the security service operation rule 2 may further establish other restrictions on the security service operation instruction SSOI sent by the processor 13 of the communication device 1.

參照第2圖,針對每一個安全服務流程,例如第2圖所示的開機安全檢查流程、資料加密流程等等,安全服務操作規則2可限制收發器113應依序接收N個安全服務操作指令SSOI,且限制這些安全服務操作指令SSOI的內容按1~N的順序應分別為OP_01、OP_02、...、OP_0N。 Referring to FIG. 2, for each security service process, such as the boot security check process and data encryption process shown in FIG. 2, the security service operation rule 2 may restrict the transceiver 113 to receive N security service operation commands in sequence SSOI, and limit the contents of these security service operation instructions SSOI in the order of 1~N should be OP_01, OP_02, ..., OP_0N.

舉例而言,假設通訊裝置1的處理器13欲與安全服務控制元件11進行的安全服務流程是開機安全檢查流程,且處理器13發送至安全服務控制元件11的收發器113的第一個安全服務操作指令SSOI的內容為OP_01,則安全服務控制元件11的處理器111會因所述安全服務操作指令SSOI的內容與序數都符合安全服務操作規則2而允許所述安全服務操作指令SSOI。然而,若所述安全服務操作指令SSOI的內容與序數其中之一不符合安全服務操作規則2,例如處理器13發送至安全服務控制元件11的收發器113的第一個安全服務操作指令SSOI的內容不是OP_01,則安全服務控制元件11的處理器111就會阻止且拒絕執行所述安全服務操作指令SSOI。 For example, assume that the processor 13 of the communication device 1 intends to perform a security service process with the security service control component 11 is a power-on security check process, and the processor 13 sends the first security to the transceiver 113 of the security service control component 11 If the content of the service operation instruction SSOI is OP_01, the processor 111 of the security service control element 11 will allow the security service operation instruction SSOI because the content and ordinal number of the security service operation instruction SSOI conform to the security service operation rule 2. However, if one of the content and ordinal number of the security service operation instruction SSOI does not comply with the security service operation rule 2, for example, the first security service operation instruction SSOI sent by the processor 13 to the transceiver 113 of the security service control element 11 If the content is not OP_01, the processor 111 of the security service control element 11 will block and refuse to execute the security service operation instruction SSOI.

在某些實施例中,每一個安全服務操作指令SSOI的內容(例 如:OP_01、OP_02、...、OP_0N等)的格式可以由指令類型(CLA)、指令代碼(INS)、參數(P1)與參數(P2)這四個項目所組成。於其他實施例中,每一個安全服務操作指令SSOI的內容也可以是其他的格式。 In some embodiments, the format of the content of each security service operation instruction SSOI (for example: OP_01, OP_02, ..., OP_0N, etc.) may be composed of the instruction type (CLA), instruction code (INS), parameter (P1) It consists of four items with parameters (P2). In other embodiments, the content of each security service operation instruction SSOI may also be in other formats.

在某些實施例中,若通訊裝置1的處理器13與安全服務控制元件11進行的安全服務流程超過一種,則需要一種識別機制運作在通訊裝置1的處理器13以及安全服務控制元件11。舉例而言,可針對每一個安全服務流程界定一識別碼,且將每一個安全服務所對應的識別碼儲存到安全服務控制元件11的儲存器115以及通訊裝置1中,以供通訊裝置1的處理器13以及安全服務控制元件11識別目前進行的安全服務流程。在此情況下,處理器13可將相對應的識別碼與安全服務操作指令SSOI一併傳送至安全服務控制元件11的收發器113,而安全服務控制元件11的處理器111便可根據所述識別碼來識別出所述安全服務操作指令SSOI是對應至哪一個安全服務流程。所述識別碼可以是,例如但不限於,通用唯一識別碼(Universally Unique Identifier,UUID)。以第2圖為例,所述識別碼即為UUID_0、UUID_1、...。 In some embodiments, if the processor 13 of the communication device 1 and the security service control element 11 perform more than one security service process, an identification mechanism is required to operate on the processor 13 of the communication device 1 and the security service control element 11. For example, an identification code can be defined for each security service process, and the identification code corresponding to each security service can be stored in the storage 115 of the security service control element 11 and the communication device 1 for the communication device 1 to The processor 13 and the security service control element 11 identify the current security service process. In this case, the processor 13 can transmit the corresponding identification code together with the security service operation instruction SSOI to the transceiver 113 of the security service control element 11, and the processor 111 of the security service control element 11 can The identification code identifies to which security service process the security service operation instruction SSOI corresponds. The identification code may be, for example, but not limited to, a universally unique identification code (Universally Unique Identifier, UUID). Taking Figure 2 as an example, the identification codes are UUID_0, UUID_1, ....

於某些實施例中,安全服務操作規則2可由一特定管理者預先建立並儲存至安全服務控制元件11的儲存器115。所述特定管理者必須使用特定權限由通訊裝置1的處理器13登入至安全服務控制元件11,然後才能針對一或多個安全服務流程建立且儲存安全服務操作規則2至安全服務控制元件11的儲存器115。在所述特定管理者建立且儲存安全服務操作規則2至安全服務控制元件11的儲存器115之後,安全服務操作規則2就無法被新增、刪除、修改。舉例而言,可藉由刪除所述特定權限來限制所有人再次登入所述安全服務控制元件11;或者,可由所述特定管理者將安全服務操作規 則2的所有修改機制移除。在所述特定管理者建立且儲存安全服務操作規則2至安全服務控制元件11的儲存器115之後,安全服務控制元件11的收發器113可發送每一個安全服務所對應的識別碼至通訊裝置1儲存。 In some embodiments, the security service operation rule 2 may be pre-established by a specific administrator and stored in the storage 115 of the security service control element 11. The specific manager must log in to the security service control component 11 with the processor 13 of the communication device 1 using specific permissions, and then the security service operation rules 2 to the security service control component 11 can be created and stored for one or more security service processes Storage 115. After the specific manager establishes and stores the security service operation rule 2 to the storage 115 of the security service control element 11, the security service operation rule 2 cannot be added, deleted, or modified. For example, all the modification mechanisms of the security service operation rule 2 can be removed by the specific administrator by restricting everyone from logging in to the security service control element 11 again by deleting the specific authority. After the specific manager establishes and stores the security service operation rule 2 to the storage 115 of the security service control element 11, the transceiver 113 of the security service control element 11 can send the identification code corresponding to each security service to the communication device 1 store.

繼續參照第1圖,在某些實施例中,當通訊裝置1的處理器13欲與安全服務控制元件11進行某一安全服務流程時,其必須先傳送一安全服務流程請求RQ至安全服務控制元件11的收發器113,而安全服務控制元件11的處理器111可用以因應於所述安全服務流程請求RQ而產生一驗證碼TK,並透過收發器113回傳至處理器13。 Continuing to refer to FIG. 1, in some embodiments, when the processor 13 of the communication device 1 intends to perform a certain security service process with the security service control element 11, it must first transmit a security service process request RQ to the security service control The transceiver 113 of the component 11, and the processor 111 of the security service control component 11 can be used to generate a verification code TK in response to the RQ request of the security service process, and send it back to the processor 13 through the transceiver 113.

接著,通訊裝置1的處理器13必須將驗證碼TK與安全服務操作指令SSOI一併發送至安全服務控制元件11的收發器113。在收發器113接收到的所述驗證碼TK之後,安全服務控制元件11的處理器111會驗證所述驗證碼TK是否有效(即,驗證所述驗證碼TK是否就是處理器111因應所述安全服務流程請求RQ而產生的)。只有在所述驗證碼TK為有效的情況下,處理器111才會根據安全服務操作規則2判斷是否允許相對應的安全服務操作指令SSOI。 Next, the processor 13 of the communication device 1 must send the verification code TK together with the security service operation instruction SSOI to the transceiver 113 of the security service control element 11. After the verification code TK received by the transceiver 113, the processor 111 of the security service control element 11 will verify whether the verification code TK is valid (ie, verify whether the verification code TK is the processor 111 due to the security Service process request RQ). Only when the verification code TK is valid, the processor 111 determines whether to allow the corresponding security service operation instruction SSOI according to the security service operation rule 2.

於某些實施例中,每一個驗證碼TK可以是由處理器111以隨機亂數方式產生的一整數。於某些實施例中,第一個驗證碼TK可以是由處理器111以隨機亂數方式產生的一整數,而後續的驗證碼TK是以所述整數為基礎來變化,例如但不限於,遞增、遞減等等。 In some embodiments, each verification code TK may be an integer generated by the processor 111 in a random random number manner. In some embodiments, the first verification code TK may be an integer generated by the processor 111 in a random random number manner, and the subsequent verification code TK changes based on the integer, for example, but not limited to, Increase, decrease, etc.

第3圖例示了在本發明的某些實施例中,一種用在一通訊裝置的安全服務控制方法。第3圖所示內容僅是為了舉例說明本發明的實施例,而非為了限制本發明。 FIG. 3 illustrates a method of security service control used in a communication device in some embodiments of the present invention. The content shown in FIG. 3 is only to illustrate the embodiments of the present invention, not to limit the present invention.

參照第3圖,一種用在一通訊裝置的安全服務控制方法3被揭露,其中所述通訊裝置可包含一安全服務控制元件與一處理器,且安全服務控制方法3可包含以下步驟:所述安全服務控制元件自所述處理器接收一安全服務操作指令,其中所述安全服務操作指令與所述安全服務控制元件及所述處理器之間的一安全服務流程相關(標示為301);以及所述安全服務控制元件根據一預存的安全服務操作規則判斷是否允許所述安全服務操作指令(標示為303)。 Referring to FIG. 3, a security service control method 3 used in a communication device is disclosed, wherein the communication device may include a security service control element and a processor, and the security service control method 3 may include the following steps: The security service control element receives a security service operation instruction from the processor, wherein the security service operation instruction is related to a security service process between the security service control element and the processor (labeled 301); and The security service control element determines whether to allow the security service operation instruction (marked as 303) according to a pre-stored security service operation rule.

在安全服務控制方法3的某些實施例中,若所述安全服務操作指令的序數與內容符合所述安全服務操作規則,則所述安全服務控制元件可允許所述安全服務操作指令。 In some embodiments of the security service control method 3, if the ordinal number and content of the security service operation instruction comply with the security service operation rule, the security service control element may allow the security service operation instruction.

在安全服務控制方法3的某些實施例中,除了步驟301以及步驟303,安全服務控制方法3還可包含以下步驟:所述安全服務控制元件可根據所述安全服務流程之一識別碼,識別出所述安全服務操作指令。 In some embodiments of the security service control method 3, in addition to steps 301 and 303, the security service control method 3 may further include the following steps: the security service control element may be identified according to an identification code of one of the security service processes The security service operation instruction.

在安全服務控制方法3的某些實施例中,除了步驟301以及步驟303,安全服務控制方法3還可包含以下步驟:所述安全服務控制元件可自所述處理器接收一驗證碼。另外,所述安全服務控制元件是在驗證所述驗證碼有效之後,才根據所述安全服務操作規則判斷是否允許所述安全服務操作指令。 In some embodiments of the security service control method 3, in addition to step 301 and step 303, the security service control method 3 may further include the following step: the security service control element may receive a verification code from the processor. In addition, the security service control element determines whether to permit the security service operation instruction according to the security service operation rule after verifying that the verification code is valid.

在安全服務控制方法3的某些實施例中,除了步驟301以及步驟303,安全服務控制方法3還可包含以下步驟:在接收到所述安全服務操作指令之前,所述安全服務控制元件可自所述處理器接收所述安全服務流程之一請求;以及因應於所述請求,所述安全服務控制元件可產生所述驗證碼 且傳送所述驗證碼至所述處理器。 In some embodiments of the security service control method 3, in addition to step 301 and step 303, the security service control method 3 may further include the following steps: before receiving the security service operation instruction, the security service control element may The processor receives one of the requests for the security service process; and in response to the request, the security service control element may generate the verification code and transmit the verification code to the processor.

在某些實施例中,安全服務控制方法3的上述全部步驟可以由通訊裝置1以及安全服務控制元件11來執行。在某些實施例中,除了上述步驟之外,安全服務控制方法3還可以包含與通訊裝置1以及安全服務控制元件11的上述所有實施例相對應的其他步驟。因本發明所屬技術領域中具有通常知識者可根據上文針對通訊裝置1以及安全服務控制元件11的說明而瞭解安全服務控制方法3的這些其他步驟,故於此將不再贅述。 In some embodiments, all the above steps of the security service control method 3 may be performed by the communication device 1 and the security service control element 11. In some embodiments, in addition to the above steps, the security service control method 3 may further include other steps corresponding to all of the above-described embodiments of the communication device 1 and the security service control element 11. Those with ordinary knowledge in the technical field to which the present invention pertains can understand these other steps of the security service control method 3 according to the above descriptions of the communication device 1 and the security service control element 11, so they will not be repeated here.

上述實施例只是舉例來說明本發明,而非為了限制本發明。任何針對上述實施例進行修飾、改變、調整、整合而產生的其他實施例,只要是本發明所屬技術領域中具有通常知識者不難思及的,都已涵蓋在本發明的保護範圍內。本發明的保護範圍以申請專利範圍為準。 The above embodiments are only examples to illustrate the present invention, not to limit the present invention. Any other embodiments resulting from modifications, changes, adjustments, and integrations to the above-mentioned embodiments, as long as it is not difficult for those with ordinary knowledge in the technical field to which the present invention belongs, are covered within the protection scope of the present invention. The protection scope of the present invention is subject to the scope of patent application.

3‧‧‧安全服務控制方法 3‧‧‧ Security service control method

301、303‧‧‧步驟 301, 303‧‧‧ steps

Claims (15)

一種用於一通訊裝置的安全服務控制元件,包含:一儲存器,用以針對所述安全服務控制元件與所述通訊裝置的一處理器之間的一安全服務流程儲存一安全服務操作規則;一收發器,用以與所述通訊裝置的所述處理器電性連接,且自所述通訊裝置之所述處理器接收與所述安全服務流程相關的一安全服務操作指令;以及一處理器,用以與所述儲存器以及所述收發器電性連接,且用以根據所述安全服務操作規則判斷是否允許所述安全服務操作指令。 A security service control element for a communication device includes: a storage for storing a security service operation rule for a security service flow between the security service control element and a processor of the communication device; A transceiver for electrically connecting with the processor of the communication device, and receiving a security service operation instruction related to the security service process from the processor of the communication device; and a processor , Used to be electrically connected to the storage and the transceiver, and used to determine whether to allow the security service operation instruction according to the security service operation rule. 如請求項1所述的安全服務控制元件,其中若所述安全服務操作指令的序數與內容符合所述安全服務操作規則,則所述安全服務控制元件的所述處理器允許所述安全服務操作指令。 The security service control element according to claim 1, wherein the processor of the security service control element allows the security service operation if the ordinal number and content of the security service operation instruction comply with the security service operation rule instruction. 如請求項1所述的安全服務控制元件,其中所述安全服務控制元件的所述處理器還用以根據所述安全服務流程之一識別碼,識別出所述安全服務操作指令。 The security service control element of claim 1, wherein the processor of the security service control element is further used to identify the security service operation instruction according to an identification code of the security service process. 如請求項1所述的安全服務控制元件,其中所述收發器還用以自所述通訊裝置的所述處理器接收一驗證碼,且所述安全服務控制元件的所述處理器是在驗證所述驗證碼有效之後,才根據所述安全服務操作規則判斷是否允許所述安全服務操作指令。 The security service control element of claim 1, wherein the transceiver is further used to receive a verification code from the processor of the communication device, and the processor of the security service control element is verifying After the verification code is valid, it is determined whether to allow the security service operation instruction according to the security service operation rule. 如請求項4所述的安全服務控制元件,其中在所述收發器接收到所述安全服務操作指令之前,所述收發器還用以自所述通訊裝置的所述處理器接收所述安全服務流程之一請求,且因應於所述請求,所述安全服務控制 元件的所述處理器還用以產生所述驗證碼,且所述收發器還用以傳送所述驗證碼至所述通訊裝置的所述處理器。 The security service control element according to claim 4, wherein the transceiver is further configured to receive the security service from the processor of the communication device before the transceiver receives the security service operation instruction One of the processes requests, and in response to the request, the processor of the security service control element is also used to generate the verification code, and the transceiver is also used to transmit the verification code to the communication device The processor. 一通訊裝置,包含:一處理器;以及一安全服務控制元件,與所述處理器電性連接,並用以:針對所述安全服務控制元件與所述處理器之間的一安全服務流程儲存一安全服務操作規則;自所述處理器接收與所述安全服務流程相關的一安全服務操作指令;以及根據所述安全服務操作規則判斷是否允許所述安全服務操作指令。 A communication device, including: a processor; and a security service control element, electrically connected to the processor, and used to: store a security service process between the security service control element and the processor Security service operation rules; receiving a security service operation instruction related to the security service process from the processor; and judging whether to allow the security service operation instruction according to the security service operation rules. 如請求項6所述的通訊裝置,其中若所述安全服務操作指令的序數與內容符合所述安全服務操作規則,則所述安全服務控制元件允許所述安全服務操作指令。 The communication device according to claim 6, wherein if the ordinal number and content of the security service operation instruction comply with the security service operation rule, the security service control element allows the security service operation instruction. 如請求項6所述的通訊裝置,其中所述安全服務控制元件還用以根據所述安全服務流程之一識別碼,識別出所述安全服務操作指令。 The communication device according to claim 6, wherein the security service control element is further used to identify the security service operation instruction according to an identification code of the security service process. 如請求項6所述的通訊裝置,其中所述安全服務控制元件還用以自所述處理器接收一驗證碼,且所述安全服務控制元件是在驗證所述驗證碼有效之後,才根據所述安全服務操作規則判斷是否允許所述安全服務操作指令。 The communication device according to claim 6, wherein the security service control element is further used to receive a verification code from the processor, and the security service control element does not verify the verification code until it is valid. The security service operation rule determines whether to allow the security service operation instruction. 如請求項9所述的通訊裝置,其中在安全服務控制元件接收到所述安全服務操作指令之前,所述安全服務控制元件還用以自所述處理器接收所述 安全服務流程之一請求,且因應於所述請求,所述安全服務控制元件還用以產生所述驗證碼且傳送所述驗證碼至所述處理器。 The communication device according to claim 9, wherein before the security service control element receives the security service operation instruction, the security service control element is further configured to receive a request from the processor for one of the security service processes, And in response to the request, the security service control element is also used to generate the verification code and transmit the verification code to the processor. 一種用於一通訊裝置之安全服務控制方法,所述通訊裝置包含一安全服務控制元件與一處理器,所述安全服務控制方法包含:所述安全服務控制元件自所述處理器接收一安全服務操作指令,所述安全服務操作指令與所述安全服務控制元件及所述處理器之間的一安全服務流程相關;以及所述安全服務控制元件根據一預存的安全服務操作規則判斷是否允許所述安全服務操作指令。 A security service control method for a communication device, the communication device includes a security service control element and a processor, the security service control method includes: the security service control element receives a security service from the processor Operation instructions, the security service operation instructions are related to a security service process between the security service control element and the processor; and the security service control element determines whether to allow the security service operation rules according to a pre-stored security service operation rule Security service operation instructions. 如請求項11所述的安全服務控制方法,其中若所述安全服務操作指令的序數與內容符合所述安全服務操作規則,則所述安全服務控制元件允許所述安全服務操作指令。 The security service control method according to claim 11, wherein if the ordinal number and content of the security service operation instruction comply with the security service operation rule, the security service control element allows the security service operation instruction. 如請求項11所述的安全服務控制方法,還包含:所述安全服務控制元件根據所述安全服務流程之一識別碼,識別出所述安全服務操作指令。 The security service control method according to claim 11, further comprising: the security service control element identifying the security service operation instruction according to an identification code of one of the security service processes. 如請求項11所述的安全服務控制方法,還包含:所述安全服務控制元件自所述處理器接收一驗證碼;其中所述安全服務控制元件是在驗證所述驗證碼有效之後,才根據所述安全服務操作規則判斷是否允許所述安全服務操作指令。 The security service control method according to claim 11, further comprising: the security service control element receives a verification code from the processor; wherein the security service control element does not verify the verification code until it is valid The security service operation rule determines whether the security service operation instruction is allowed. 如請求項14所述的安全服務控制方法,還包含:在接收到所述安全服務操作指令之前,所述安全服務控制元件自所述處理器接收所述安全服務流程之一請求;以及因應於所述請求,所述安全服務控制元件產生所述驗證碼且傳送所 述驗證碼至所述處理器。 The security service control method according to claim 14, further comprising: before receiving the security service operation instruction, the security service control element receives one request of the security service process from the processor; and responding to In the request, the security service control element generates the verification code and transmits the verification code to the processor.
TW107120758A 2018-06-15 2018-06-15 Communication device and security service control element and security service control method TW202001661A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW107120758A TW202001661A (en) 2018-06-15 2018-06-15 Communication device and security service control element and security service control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW107120758A TW202001661A (en) 2018-06-15 2018-06-15 Communication device and security service control element and security service control method

Publications (1)

Publication Number Publication Date
TW202001661A true TW202001661A (en) 2020-01-01

Family

ID=69941824

Family Applications (1)

Application Number Title Priority Date Filing Date
TW107120758A TW202001661A (en) 2018-06-15 2018-06-15 Communication device and security service control element and security service control method

Country Status (1)

Country Link
TW (1) TW202001661A (en)

Similar Documents

Publication Publication Date Title
CN109937419B (en) Initialization method for security function enhanced device and firmware update method for device
US9660807B2 (en) System and method for verifying changes to UEFI authenticated variables
KR101216306B1 (en) Updating configuration parameters in a mobile terminal
TWI620092B (en) Device for verifying software during loading and method for verifying software during loading within the device
US9164925B2 (en) Method and apparatus for authorizing host to access portable storage device
US7457960B2 (en) Programmable processor supporting secure mode
US11334502B2 (en) Memory protection based on system state
US20180060589A1 (en) Apparatus and associated method for authenticating firmware
US20200026882A1 (en) Methods and systems for activating measurement based on a trusted card
CN110651261A (en) Secure memory device with unique identifier for authentication
US11455399B2 (en) Electronic device, software provisioning server and methods thereof
US11552807B2 (en) Data processing method and apparatus
CN112257086A (en) User privacy data protection method and electronic equipment
US10771462B2 (en) User terminal using cloud service, integrated security management server for user terminal, and integrated security management method for user terminal
WO2021084221A1 (en) Attestation for constrained devices
KR20180092596A (en) METHOD AND SYSTEM FOR SECURE BOOTING OF IoT DEVICE PLATFORM USING EMBEDDED SECURE MODULE
CN111177709A (en) Execution method and device of terminal trusted component and computer equipment
EP3298529B1 (en) Electronic device and method in an electronic device
EP3511858A1 (en) Update of mac security settings in autonomous industrial control devices
WO2021084220A1 (en) Iterative key generation for constrained devices
US20230041769A1 (en) Management system for disk encryption
CN116208353A (en) Method, device, network card, chip system and server for verifying firmware
KR20150089696A (en) Integrity Verification System and the method based on Access Control and Priority Level
AU2022218907A1 (en) Secure module and method for app-to-app mutual trust through app-based identity
TW202001661A (en) Communication device and security service control element and security service control method