TWI791050B - Data transmission method and system - Google Patents

Data transmission method and system Download PDF

Info

Publication number
TWI791050B
TWI791050B TW107135164A TW107135164A TWI791050B TW I791050 B TWI791050 B TW I791050B TW 107135164 A TW107135164 A TW 107135164A TW 107135164 A TW107135164 A TW 107135164A TW I791050 B TWI791050 B TW I791050B
Authority
TW
Taiwan
Prior art keywords
tam
application
server
security application
identity authentication
Prior art date
Application number
TW107135164A
Other languages
Chinese (zh)
Other versions
TW201926943A (en
Inventor
王雪松
Original Assignee
香港商阿里巴巴集團服務有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 香港商阿里巴巴集團服務有限公司 filed Critical 香港商阿里巴巴集團服務有限公司
Publication of TW201926943A publication Critical patent/TW201926943A/en
Application granted granted Critical
Publication of TWI791050B publication Critical patent/TWI791050B/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Abstract

本申請提供了一種資料資料傳輸方法及系統,其中一種方法包括:與終端設備中可信執行環境的TAM安全應用進行雙向認證,在雙向認證通過後協商出會話密鑰;利用所述會話密鑰對待發送至安全應用的資料進行加密操作;發送加密後的資料和所述安全應用的應用標識至終端設備的TAM安全應用。TAM伺服器發送加密後的資料至TAM安全應用的過程,相當於在安全通道傳輸資料。這樣可以防止資料暴露在非可信環境中,從而保護資料。The present application provides a data transmission method and system, wherein a method includes: performing two-way authentication with the TAM security application of the trusted execution environment in the terminal device, negotiating a session key after the two-way authentication is passed; using the session key Encrypting the data to be sent to the security application; sending the encrypted data and the application identification of the security application to the TAM security application of the terminal device. The process of the TAM server sending encrypted data to the TAM security application is equivalent to transmitting data in a secure channel. This protects the data by preventing it from being exposed to untrusted environments.

Description

資料傳輸方法及系統Data transmission method and system

本發明係有關通信技術領域,尤其是一種資料傳輸方法及系統。 The invention relates to the technical field of communication, in particular to a data transmission method and system.

終端設備包括可信執行環境(Trusted Execution Environment,TEE)和豐富執行環境(Rich Execution Environment,REE),豐富執行環境又稱不可信執行環境。 The terminal device includes a trusted execution environment (Trusted Execution Environment, TEE) and a rich execution environment (Rich Execution Environment, REE). The rich execution environment is also called an untrusted execution environment.

通常情況下,終端設備安裝應用的過程中,會在豐富執行環境安裝應用的客戶端(也即業務客戶端),在可信執行環境安裝應用的安全端(業務安全應用)。業務客戶端用於執行使用者操作,業務安全應用用於保護支付、指紋和數位版權等敏感資源。 Usually, in the process of installing an application on a terminal device, a client of the application (that is, a business client) is installed in a rich execution environment, and a secure end of the application (a business security application) is installed in a trusted execution environment. Business clients are used to perform user operations, and business security applications are used to protect sensitive resources such as payment, fingerprints, and digital copyrights.

在實際業務中,應用對應的伺服器(後續稱為應用伺服器)需要發送敏感資源至終端設備的可信執行環境TEE內的業務安全應用;例如,應用伺服器需要更新業務安全應用中數位證書,應用伺服器下發支付二維碼至業務安全應用等。 In actual business, the server corresponding to the application (hereinafter referred to as the application server) needs to send sensitive resources to the business security application in the trusted execution environment TEE of the terminal device; for example, the application server needs to update the digital certificate in the business security application , the application server sends the payment QR code to the business security application, etc.

目前,應用伺服器發送敏感資源至業務安全應用的過 程可以為:應用伺服器可以與終端設備中非可信執行環境的業務客戶端建立安全通道,然後通過安全通道發送加密後的敏感資源至業務客戶端。業務客戶端解密加密後的敏感資源獲得敏感資源,並將敏感資源傳輸到可信執行環境的業務安全應用中。 Currently, the process by which application servers send sensitive resources to business security applications The procedure can be as follows: the application server can establish a secure channel with the business client in the non-trusted execution environment in the terminal device, and then send encrypted sensitive resources to the business client through the secure channel. The business client decrypts the encrypted sensitive resource to obtain the sensitive resource, and transmits the sensitive resource to the business security application of the trusted execution environment.

但是,終端設備中的業務客戶端處於具有開放性的非可信執行環境中,在業務客戶端獲得解密後的敏感資源後,會導致敏感資源暴露在非可信執行環境中,因此存在敏感資源洩露的風險。 However, the business client in the terminal device is in an open non-trusted execution environment. After the business client obtains the decrypted sensitive resource, the sensitive resource will be exposed in the non-trusted execution environment, so there is a sensitive resource risk of leakage.

鑒於此,本申請提供一種資料傳輸方法及系統,可以直接提供端到端的安全通道,即在應用伺服器與業務安全應用之間建立安全通道,從而可以防止敏感資源洩露。 In view of this, the present application provides a data transmission method and system, which can directly provide an end-to-end secure channel, that is, establish a secure channel between an application server and a business security application, thereby preventing leakage of sensitive resources.

為了實現上述目的,本申請提供了以下技術特徵:一種資料傳輸系統,包括:應用伺服器,用於將安全應用的應用標識和待發送至所述安全應用的資料發送至TAM伺服器;TAM伺服器,用於與可信執行環境的TAM安全應用進行雙向認證,並在雙向認證成功後協商出會話密鑰;接收所述應用伺服器發送的應用標識和所述資料,利用所述會話密鑰對所述資料進行加密操作,發送加密後的資料和所述應用標識至終端設備;終端設備,用於控制可信執行環境中的TAM安全應用 與所述TAM伺服器進行雙向認證,並在雙向認證成功後協商出會話密鑰;非可信執行環境的TAM客戶端接收所述TAM伺服器發送的所述加密後的資料和所述應用標識,並傳輸所述加密後的資料和所述應用標識至所述TAM安全應用;所述TAM安全應用利用所述會話密鑰解密所述加密後的資料獲得資料,發送該資料至所述應用標識對應的所述安全應用。 In order to achieve the above object, the present application provides the following technical features: a data transmission system, including: an application server, used to send the application identification of the security application and the data to be sent to the security application to the TAM server; the TAM server The device is used to perform two-way authentication with the TAM security application of the trusted execution environment, and negotiate a session key after the two-way authentication is successful; receive the application identification and the data sent by the application server, and use the session key Perform an encryption operation on the data, and send the encrypted data and the application identification to the terminal device; the terminal device is used to control the TAM security application in the trusted execution environment Perform two-way authentication with the TAM server, and negotiate a session key after the two-way authentication is successful; the TAM client in the non-trusted execution environment receives the encrypted data and the application identifier sent by the TAM server , and transmit the encrypted data and the application ID to the TAM security application; the TAM security application uses the session key to decrypt the encrypted data to obtain the data, and sends the data to the application ID corresponding to the security application.

可選的,所述可信執行環境中的TAM安全應用與所述TAM伺服器進行雙向認證,具體包括:所述TAM伺服器經所述TAM客戶端發送身分認證請求至所述TAM安全應用,所述TAM安全應用產生身分認證憑證,所述TAM安全應用經所述TAM客戶端發送身分認證憑證至所述TAM伺服器,所述TAM伺服器基於所述身分認證請求和所述身分認證憑證對所述TAM安全應用進行身分認證;所述TAM安全應用經所述TAM客戶端發送身分認證請求至所述TAM伺服器,所述TAM伺服器產生身分認證憑證,所述TAM伺服器經所述TAM客戶端發送身分認證憑證至所述TAM安全應用,所述TAM安全應用基於所述身分認證請求和所述身分認證憑證對所述TAM伺服器進行身分認證;所述TAM伺服器與所述TAM安全應用雙向認證成功後,基於所述身分認證請求和所述身分認證憑證確定會話密鑰。 Optionally, the two-way authentication between the TAM security application in the trusted execution environment and the TAM server specifically includes: the TAM server sends an identity authentication request to the TAM security application via the TAM client, The TAM security application generates an identity authentication credential, the TAM security application sends the identity authentication credential to the TAM server via the TAM client, and the TAM server pairs the identity authentication request with the identity authentication credential The TAM security application performs identity authentication; the TAM security application sends an identity authentication request to the TAM server through the TAM client, and the TAM server generates an identity authentication certificate, and the TAM server passes the TAM The client sends the identity authentication credential to the TAM security application, and the TAM security application performs identity authentication on the TAM server based on the identity authentication request and the identity authentication credential; the TAM server and the TAM security After the two-way authentication is applied successfully, a session key is determined based on the identity authentication request and the identity authentication credential.

可選的,所述終端設備執行發送該資料至所述應用標識對應的所述安全應用的過程,具體包括:所述TAM安全應用調用可信執行環境的內部應用程式介面;通過所述內部應用程式介面發送該資料至所述應用標識對應的所述安全應用。 Optionally, the terminal device executes the process of sending the data to the security application corresponding to the application identifier, which specifically includes: the TAM security application calls an internal API of a trusted execution environment; through the internal application The program interface sends the data to the security application corresponding to the application identifier.

一種資料傳輸方法,包括:與終端設備中可信執行環境的TAM安全應用進行雙向認證,在雙向認證通過後協商出會話密鑰;利用所述會話密鑰對待發送至安全應用的資料進行加密操作;發送加密後的資料和所述安全應用的應用標識至終端設備的TAM安全應用。 A data transmission method, comprising: conducting mutual authentication with a TAM security application in a trusted execution environment in a terminal device, and negotiating a session key after the two-way authentication is passed; using the session key to encrypt data to be sent to the security application ; Send the encrypted data and the application identification of the security application to the TAM security application of the terminal device.

可選的,所述與終端設備中可信執行環境的TAM安全應用進行雙向認證,在雙向認證通過後協商出會話密鑰包括:發送身分認證請求至終端設備中非可信執行環境的TAM客戶端,並由所述TAM客戶端傳輸至所述身分認證請求至所述TAM安全應用,獲得所述TAM安全應用發送的身分認證憑證,對所述TAM安全應用進行身分認證;接收所述TAM安全應用經所述TAM客戶端發送的身分認證請求,產生身分認證憑證,經所述TAM客戶端發送所述身分認證憑證至所述TAM安全應用,供所述TAM安全應用對TAM伺服器進行身分認證; 所述TAM伺服器對TAM安全應用對認證成功後,基於所述身分認證請求和所述身分認證憑證確定會話密鑰。 Optionally, performing two-way authentication with the TAM security application in the trusted execution environment in the terminal device, and negotiating a session key after the two-way authentication passes includes: sending an identity authentication request to the TAM client in the non-trusted execution environment in the terminal device end, and the TAM client transmits the identity authentication request to the TAM security application, obtains the identity authentication credential sent by the TAM security application, and performs identity authentication on the TAM security application; receives the TAM security Apply the identity authentication request sent by the TAM client to generate an identity authentication credential, send the identity authentication credential to the TAM security application through the TAM client, for the TAM security application to perform identity authentication on the TAM server ; After the TAM server successfully authenticates the TAM security application pair, it determines a session key based on the identity authentication request and the identity authentication certificate.

可選的,所述發送加密後的資料和所述安全應用的應用標識至終端設備的TAM安全應用,包括:發送所述加密後的資料和所述應用標識至所述TAM客戶端,並經所述TAM客戶端發送所述加密後的資料和所述應用標識至所述TAM安全應用。 Optionally, the sending the encrypted data and the application identification of the security application to the TAM security application of the terminal device includes: sending the encrypted data and the application identification to the TAM client, and The TAM client sends the encrypted data and the application identifier to the TAM security application.

一種資料傳輸方法,包括:可信執行環境中的TAM安全應用與TAM伺服器進行雙向認證,在雙向認證通過後協商出會話密鑰;非可信執行環境的TAM客戶端接收所述TAM伺服器發送的加密後的資料和應用標識,並傳輸所述加密後的資料和所述應用標識至所述TAM安全應用;所述TAM安全應用利用所述會話密鑰解密所述加密後的資料獲得資料,並發送該資料至所述應用標識對應的安全應用。 A data transmission method, comprising: a TAM security application in a trusted execution environment performs mutual authentication with a TAM server, and negotiates a session key after the mutual authentication is passed; a TAM client in a non-trusted execution environment receives the TAM server Send the encrypted data and application ID, and transmit the encrypted data and the application ID to the TAM security application; the TAM security application uses the session key to decrypt the encrypted data to obtain data , and send the data to the security application corresponding to the application identifier.

可選的,可信執行環境中的TAM安全應用與TAM伺服器進行雙向認證,在雙向認證通過後協商出會話密鑰,包括:所述TAM安全應用經所述TAM客戶端接收所述TAM伺服器發送的身分認證請求,產生身分認證憑證,經所述TAM客戶端發送所述身分認證憑證至所述TAM伺服器,供所述TAM伺服器對所述TAM安全應用進行身分認證;所述TAM安全應用經所述TAM客戶端發送身分認證請 求至所述TAM伺服器,並獲取所述TAM伺服器發送的身分認證憑證,對所述TAM伺服器進行身分認證;所述TAM安全應用對所述TAM伺服器認證成功後,基於所述身分認證請求和所述身分認證憑證確定會話密鑰。 Optionally, the TAM security application in the trusted execution environment performs two-way authentication with the TAM server, and negotiates a session key after the two-way authentication passes, including: the TAM security application receives the TAM server via the TAM client The identity authentication request sent by the server generates an identity authentication credential, and the TAM client sends the identity authentication credential to the TAM server for the TAM server to perform identity authentication on the TAM security application; the TAM The security application sends an authentication request via the TAM client Request to the TAM server, and obtain the identity authentication certificate sent by the TAM server, and perform identity authentication on the TAM server; after the TAM security application successfully authenticates the TAM server, based on the identity The authentication request and the authentication credentials determine a session key.

可選的,所述傳輸所述加密後的資料和所述應用標識至所述TAM安全應用,包括:所述TAM客戶端調用可信執行環境的應用程式介面;通過該應用程式介面傳輸所述加密後的資料和所述應用標識至所述TAM安全應用。 Optionally, the transmitting the encrypted data and the application identification to the TAM security application includes: the TAM client invokes an application program interface of a trusted execution environment; The encrypted data and the application are identified to the TAM security application.

可選的,所述傳輸所述加密後的資料和所述應用標識至所述TAM安全應用,包括:所述TAM安全應用調用可信執行環境的內部應用程式介面;通過該應用程式介面發送該資料至所述應用標識對應的安全應用。 Optionally, the transmitting the encrypted data and the application identification to the TAM security application includes: the TAM security application calls an internal API of a trusted execution environment; sends the The information is sent to the security application corresponding to the application identifier.

一種資料傳輸系統,包括:應用伺服器,用於與可信執行環境的業務安全應用進行雙向認證,並在雙向認證成功後協商出會話密鑰;利用所述會話密鑰對資料進行加密操作,發送加密後的資料至終端設備;終端設備,用於控制可信執行環境中的業務安全應用與所述應用伺服器進行雙向認證,並在雙向認證成功後協商出會話密鑰;非可信執行環境的業務客戶端接收所述應用伺服器發送的所述加密後的資料,並傳輸所述加密後的 資料至所述業務安全應用;所述業務安全應用利用所述會話密鑰解密所述加密後的資料獲得資料。 A data transmission system, comprising: an application server, configured to conduct mutual authentication with a business security application in a trusted execution environment, and negotiate a session key after the mutual authentication is successful; use the session key to encrypt data, Send the encrypted data to the terminal device; the terminal device is used to control the business security application in the trusted execution environment to perform two-way authentication with the application server, and negotiate a session key after the two-way authentication is successful; non-trusted execution The business client of the environment receives the encrypted data sent by the application server, and transmits the encrypted data The data is sent to the business security application; the business security application uses the session key to decrypt the encrypted data to obtain the data.

一種資料傳輸方法,包括:與終端設備中可信執行環境的業務安全應用進行雙向認證,在雙向認證通過後協商出會話密鑰;利用所述會話密鑰對待發送至業務安全應用的資料進行加密操作;發送加密後的資料至終端設備的業務安全應用。 A data transmission method, comprising: performing two-way authentication with a business security application in a trusted execution environment in a terminal device, negotiating a session key after passing the two-way authentication; using the session key to encrypt data to be sent to the business security application Operation; send encrypted data to the business security application of the terminal device.

一種資料傳輸方法,包括:可信執行環境中的業務安全應用與應用伺服器進行雙向認證,在雙向認證通過後協商出會話密鑰;非可信執行環境的業務客戶端接收應用伺服器發送的加密後的資料,並傳輸所述加密後的資料至所述業務安全應用;所述安全應用利用所述會話密鑰解密所述加密後的資料獲得資料。 A data transmission method, comprising: a business security application in a trusted execution environment performs mutual authentication with an application server, and negotiates a session key after the two-way authentication passes; a business client in a non-trusted execution environment receives the encrypted data, and transmit the encrypted data to the business security application; the security application uses the session key to decrypt the encrypted data to obtain data.

通過以上技術手段,可以實現以下有益效果: Through the above technical means, the following beneficial effects can be achieved:

本申請直接在TAM伺服器與可信執行環境中的TAM安全應用之間進行雙向認證並協商出會話密鑰,這相當於在TAM伺服器與TAM安全應用之間建立安全通道。TAM伺服器在安全通道發送加密後的資料至TAM安全應用,再由TAM安全應用傳輸至業務安全應用。 This application directly performs two-way authentication and negotiates a session key between the TAM server and the TAM security application in the trusted execution environment, which is equivalent to establishing a secure channel between the TAM server and the TAM security application. The TAM server sends the encrypted data to the TAM security application through the secure channel, and then the TAM security application transmits it to the business security application.

TAM伺服器發送加密後的資料至TAM安全應用的過程,相當於在安全通道傳輸資料。這樣在資料為敏感資源 的情況下,可以防止敏感資源暴露在非可信環境中,從而保護敏感資源。 The process of the TAM server sending encrypted data to the TAM security application is equivalent to transmitting data in a secure channel. so that when the data is a sensitive resource In the case of , it can prevent sensitive resources from being exposed in untrusted environments, thereby protecting sensitive resources.

100:應用伺服器 100: Application server

200:終端設備 200: terminal equipment

300:TAM伺服器 300:TAM server

S201:步驟 S201: step

S202:步驟 S202: step

S203:步驟 S203: step

S401:步驟 S401: step

S402:步驟 S402: step

S403:步驟 S403: step

S404:步驟 S404: step

S405:步驟 S405: step

為了更清楚地說明本申請實施例或現有技術中的技術方案,下面將對實施例或現有技術描述中所需要使用的圖式作簡單地介紹,顯而易見地,下面描述中的圖式僅僅是本申請的一些實施例,對於本領域普通技術人員來講,在不付出進步性勞動的前提下,還可以根據這些圖式獲得其他的圖式。 In order to more clearly illustrate the technical solutions in the embodiments of the present application or the prior art, the drawings that need to be used in the description of the embodiments or the prior art will be briefly introduced below. Obviously, the drawings in the following description are only the present invention. For some embodiments of the application, those skilled in the art can also obtain other drawings based on these drawings without making progressive efforts.

圖1為本申請實施例公開的一種資料傳輸系統的結構示意圖;圖2為本申請實施例公開的一種資料傳輸方法的流程圖;圖3為本申請實施例公開的又一種資料傳輸方法的流程圖;圖4a為本申請實施例公開的一種資料傳輸系統的結構示意圖;圖4b為本申請實施例公開的一種資料傳輸方法的流程圖;圖5為本申請實施例公開的又一種資料傳輸方法的流程圖。 Figure 1 is a schematic structural diagram of a data transmission system disclosed in the embodiment of the application; Figure 2 is a flow chart of a data transmission method disclosed in the embodiment of the application; Figure 3 is a flow chart of another data transmission method disclosed in the embodiment of the application Figure; Figure 4a is a schematic structural diagram of a data transmission system disclosed in the embodiment of the application; Figure 4b is a flow chart of a data transmission method disclosed in the embodiment of the application; Figure 5 is another data transmission method disclosed in the embodiment of the application flow chart.

下面將結合本申請實施例中的圖式,對本申請實施例中的技術方案進行清楚、完整地描述,顯然,所描述的實施例僅僅是本申請一部分實施例,而不是全部的實施例。基於本申請中的實施例,本領域普通技術人員在沒有做出進步性勞動前提下所獲得的所有其他實施例,都屬於本申請保護的範圍。 The technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments are only some of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making progressive efforts belong to the scope of protection of this application.

術語解釋: Explanation of terms:

敏感資源:密鑰、數位證書和重要資料等需要安全保護的資源。 Sensitive resources: resources that require security protection, such as keys, digital certificates, and important materials.

TEE:英文全稱Trusted Execution Environment,中文全稱可信執行環境,TEE具有獨立的操作系統,用於儲存、處理和保護敏感資源。 TEE: The English full name is Trusted Execution Environment, and the Chinese full name is Trusted Execution Environment. TEE has an independent operating system for storing, processing and protecting sensitive resources.

REE:英文全稱Rich Execution Environment,中文全稱豐富執行環境,由於具有開放性所以又稱非可信執行環境。非可信執行環境處理能力較強,安全性較弱。 REE: The English full name is Rich Execution Environment, and the Chinese full name is Rich Execution Environment. Because of its openness, it is also called untrusted execution environment. The untrusted execution environment has stronger processing capability but weaker security.

TAM:英文全稱Trusted Application Manager,中文全稱可信應用管理系統。可信應用管理系統用於管理TEE內部的安全應用。 TAM: The English full name is Trusted Application Manager, and the Chinese full name is Trusted Application Management System. The trusted application management system is used to manage secure applications inside the TEE.

TA:英文全稱Trusted Application,中文全稱安全應用,運行在TEE內部的應用稱為安全應用。 TA: The English full name is Trusted Application, the Chinese full name is Security Application, and the application running inside TEE is called Security Application.

為了便於理解和描述,本申請說明書以敏感資源作為資料的一種示例,進行詳細描述。可以理解的是,在其它應用場景下資料可以為其它實現形式,本申請不限定資料的具體內容和形式。 In order to facilitate understanding and description, this specification uses sensitive resources as an example of information for detailed description. It can be understood that, in other application scenarios, the data may be in other implementation forms, and this application does not limit the specific content and form of the data.

為了便於本領域技術人員瞭解,本申請提供一種資料傳輸系統實施例一。參見圖1,包括:應用伺服器100和終端設備200。終端設備的不可信執行環境包括業務客戶端,終端設備的可信執行環境包括業務安全應用。 For the convenience of those skilled in the art to understand, this application provides Embodiment 1 of a data transmission system. Referring to FIG. 1 , it includes: an application server 100 and a terminal device 200 . The untrusted execution environment of the terminal device includes a business client, and the trusted execution environment of the terminal device includes a business security application.

根據本申請的一個實施例,提供一種資料傳輸方法實施例一。參見圖2,包括以下步驟: According to an embodiment of the present application, Embodiment 1 of a data transmission method is provided. See Figure 2, including the following steps:

步驟S201:應用伺服器100與可信執行環境的業務安全應用進行雙向認證,並在認證成功後協商出會話密鑰。 Step S201: The application server 100 conducts two-way authentication with the business security application of the TEE, and negotiates a session key after successful authentication.

應用伺服器經業務客戶端發送身分認證請求至業務安全應用,業務安全應用產生身分認證憑證,業務安全應用經業務客戶端發送身分認證憑證應用至伺服器。應用伺服器基於身分認證請求和身分認證憑證對業務安全應用進行身分認證。應用伺服器對業務安全應用認證成功後,基於身分認證請求和身分認證憑證確定會話密鑰。 The application server sends an identity authentication request to the business security application through the business client, the business security application generates an identity authentication credential, and the business security application sends the identity authentication credential application to the server through the business client. The application server performs identity authentication on the business security application based on the identity authentication request and the identity authentication certificate. After the application server successfully authenticates the business security application, it determines the session key based on the identity authentication request and the identity authentication certificate.

與此同時,業務安全應用經業務客戶端發送身分認證請求至應用伺服器,應用伺服器產生身分認證憑證,應用伺服器經業務客戶端發送身分認證憑證至業務安全應用。業務安全應用基於身分認證請求和身分認證憑證對應用伺服器進行身分認證。業務安全應用對應用伺服器認證成功後,基於身分認證請求和身分認證憑證確定會話密鑰。 At the same time, the business security application sends an identity authentication request to the application server through the business client, the application server generates an identity authentication credential, and the application server sends the identity authentication credential to the business security application through the business client. The business security application performs identity authentication on the application server based on the identity authentication request and the identity authentication certificate. After the business security application successfully authenticates the application server, it determines the session key based on the identity authentication request and the identity authentication certificate.

參見圖3,以“支付寶”應用為例對本步驟進行舉例說明:“支付寶”應用伺服器經“支付寶”的客戶端與“支付寶”安全應用進行雙向認證,並在認證成功後協商出會話密鑰。 Referring to Figure 3, this step is illustrated by taking the "Alipay" application as an example: the "Alipay" application server performs two-way authentication with the "Alipay" security application through the "Alipay" client, and negotiates a session key after the authentication is successful .

關於雙向認證的具體過程以及協商會話密鑰的具體過程已為成熟技術,在此不再贅述。 The specific process of the two-way authentication and the specific process of negotiating the session key are mature technologies, and will not be repeated here.

本申請直接在應用伺服器與可信執行環境中的業務安全應用之間進行雙向認證並協商出會話密鑰,這相當於在應用伺服器與業務安全應用之間建立安全通道。後續,應用伺服器100與業務安全應用之間可以採用安全通道交互敏感資源。 This application directly performs two-way authentication and negotiates a session key between the application server and the business security application in the trusted execution environment, which is equivalent to establishing a safe channel between the application server and the business security application. Subsequently, the application server 100 and the business security application may use a secure channel to exchange sensitive resources.

步驟S202:應用伺服器100利用會話密鑰對敏感資源進行加密,發送加密後的敏感資源至業務客戶端,業務客戶端傳輸加密後的敏感資源至業務安全應用。 Step S202: The application server 100 encrypts the sensitive resource with the session key, sends the encrypted sensitive resource to the business client, and the business client transmits the encrypted sensitive resource to the business security application.

應用伺服器100利用會話密鑰對敏感資源進行加密,獲得加密後的敏感資源。然後,由於外界設備不能直接與業務安全應用進行交互,所以應用伺服器100發送加密後的敏感資源至業務客戶端。 The application server 100 uses the session key to encrypt the sensitive resource to obtain the encrypted sensitive resource. Then, since the external device cannot directly interact with the business security application, the application server 100 sends the encrypted sensitive resource to the business client.

業務客戶端會調用可信執行環境的應用程式介面TEE Client API,傳輸加密後的敏感資源至業務安全應用。 The business client will call the application programming interface TEE Client API of the trusted execution environment, and transmit encrypted sensitive resources to the business security application.

參見圖3,繼續以“支付寶”應用為例對本步驟進行舉例說明:“支付寶”應用伺服器100利用會話密鑰對敏感資源進行加密,發送加密後的敏感資源至“支付寶”客戶端,“支付寶”客戶端傳輸加密後的敏感資源至“支付寶”安全應用。 Referring to Figure 3, continue to take the "Alipay" application as an example to illustrate this step: the "Alipay" application server 100 encrypts the sensitive resources with the session key, and sends the encrypted sensitive resources to the "Alipay" client, "Alipay "The client transmits encrypted sensitive resources to the "Alipay" security application.

由於在應用伺服器與業務安全應用傳輸過程中,傳輸的為加密後的敏感資源,所以,相當於在安全通道傳輸敏感資源。因此,本申請不存在敏感資源暴露在非可信環境 的問題,所以可以保護敏感資源。 Since encrypted sensitive resources are transmitted during the transmission process between the application server and the business security application, it is equivalent to transmitting sensitive resources in a secure channel. Therefore, this application does not expose sensitive resources to untrusted environments problem, so sensitive resources can be protected.

步驟S203:業務安全應用利用會話密鑰解密加密後的敏感資源。 Step S203: The business security application uses the session key to decrypt the encrypted sensitive resource.

業務安全應用可以利用步驟S101中協商出的會話密鑰,解密加密後的敏感資源,從而獲得並使用敏感資源。 The business security application can use the session key negotiated in step S101 to decrypt the encrypted sensitive resource, so as to obtain and use the sensitive resource.

繼續以“支付寶”應用為例對本步驟進行舉例說明:“支付寶”安全應用利用會話密鑰解密加密後的敏感資源,從而獲得並使用敏感資源。 Continue to use the "Alipay" application as an example to illustrate this step: the "Alipay" security application uses the session key to decrypt the encrypted sensitive resources, thereby obtaining and using the sensitive resources.

通過以上技術手段,可以實現以下有益效果: Through the above technical means, the following beneficial effects can be achieved:

本申請直接在應用伺服器與可信執行環境中的業務安全應用之間進行雙向認證並協商出會話密鑰,這相當於在應用伺服器與業務安全應用之間建立安全通道。 This application directly performs two-way authentication and negotiates a session key between the application server and the business security application in the trusted execution environment, which is equivalent to establishing a safe channel between the application server and the business security application.

應用伺服器發送加密後的敏感資源至業務安全應用的過程,相當於在安全通道傳輸敏感資源。這樣可以防止敏感資源暴露在非可信環境中,從而保護敏感資源。 The process of sending encrypted sensitive resources from the application server to the business security application is equivalent to transmitting sensitive resources through a secure channel. This protects sensitive resources by preventing them from being exposed to untrusted environments.

可以理解的是,終端設備包含很多應用。對於各個應用而言:應用對應的應用伺服器與應用對應的安全應用,均可以採用圖2所示的方案,以便實現應用伺服器發送敏感資源至安全應用的目的。 It can be understood that a terminal device contains many applications. For each application: the application server corresponding to the application and the security application corresponding to the application can adopt the scheme shown in FIG. 2 , so as to achieve the purpose of the application server sending sensitive resources to the security application.

可以理解的是,在終端設備包含很多應用的情況下,各個應用的應用伺服器與業務安全應用均需要進行雙向認證並協商會話密鑰的過程。對終端設備而言,需要花費較多資源在雙向認證並協商會話密鑰的過程。 It can be understood that, when the terminal device includes many applications, the application server and the service security application of each application need to perform two-way authentication and negotiate a session key. For the terminal device, more resources are needed in the process of two-way authentication and session key negotiation.

為了更加簡單方便的實現應用伺服器發送敏感資源至 業務安全應用的方案,根據本申請的另一實施例,提供一種資料傳輸系統實施例二。參見圖4a,包括:多個應用伺服器100、TAM伺服器300和終端設備200。 In order to make it easier and more convenient for the application server to send sensitive resources to For the solution of business security application, according to another embodiment of the present application, Embodiment 2 of a data transmission system is provided. Referring to FIG. 4 a , it includes: a plurality of application servers 100 , a TAM server 300 and a terminal device 200 .

本實施例中在應用伺服器100與終端設備200之間增加TAM伺服器300,並在終端設備的非可信執行環境安裝與TAM伺服器協同工作的TAM客戶端,在可信執行環境安裝與TAM客戶端協同工作的TAM安全應用。 In this embodiment, a TAM server 300 is added between the application server 100 and the terminal device 200, and a TAM client that works in conjunction with the TAM server is installed in the non-trusted execution environment of the terminal device, and installed in the trusted execution environment with the TAM client. A TAM security application that cooperates with TAM clients.

本實施例中,各個應用對應的應用伺服器、業務客戶端和業務安全應用,無需再執行雙向認證和協商密鑰的繁瑣過程,各個應用伺服器僅需將敏感資源和應用標識發送至TAM伺服器。 In this embodiment, the application server, business client, and business security application corresponding to each application do not need to perform the cumbersome process of two-way authentication and key negotiation, and each application server only needs to send sensitive resources and application identifiers to the TAM server. device.

由TAM伺服器、TAM客戶端和TAM安全應用協同工作,由TAM伺服器與TAM安全應用的雙向認證並協商對稱密鑰的過程,代替實施例一中各個應用伺服器與各個業務安全應用的雙向認證並協商對稱密鑰的過程。 The TAM server, the TAM client and the TAM security application work together, and the two-way authentication between the TAM server and the TAM security application and the process of negotiating a symmetric key replace the two-way communication between each application server and each business security application in Embodiment 1. The process of authenticating and negotiating a symmetric key.

本實施例中多個應用伺服器均可以通過資料傳輸系統實施例二來管理敏感資源,不需要再為各個應用伺服器單獨維護資料傳輸系統實施例一,從而可以減少應用開發和維護的工作量。 In this embodiment, multiple application servers can manage sensitive resources through the second embodiment of the data transmission system, and there is no need to separately maintain the first embodiment of the data transmission system for each application server, thereby reducing the workload of application development and maintenance .

根據本申請提供的另一實施例,提供一種資料傳輸方法的實施例二。由於各個應用伺服器的執行過程是一致的,因此以一個應用伺服器為例,對資料傳輸系統實施例二的執行過程進行描述。 According to another embodiment provided in this application, Embodiment 2 of a data transmission method is provided. Since the execution process of each application server is consistent, an application server is taken as an example to describe the execution process of the second embodiment of the data transmission system.

參見圖4b,包括以下步驟: See Figure 4b, including the following steps:

步驟S401:應用伺服器100發送業務安全應用的應用標識和敏感資源至TAM伺服器300。 Step S401 : the application server 100 sends the application identification and sensitive resources of the business security application to the TAM server 300 .

參見圖5,以“支付寶”應用為例,“支付寶”應用對應的應用伺服器100發送“支付寶”的應用標識和需要向“支付寶”的安全應用發送的敏感資源發送至TAM伺服器300。 Referring to FIG. 5 , taking the “Alipay” application as an example, the application server 100 corresponding to the “Alipay” application sends the application identification of “Alipay” and the sensitive resources that need to be sent to the security application of “Alipay” to the TAM server 300 .

步驟S402:TAM伺服器300與可信執行環境的TAM安全應用進行雙向認證,並在雙向認證成功後協商出會話密鑰。 Step S402: The TAM server 300 performs two-way authentication with the TAM security application of the Trusted Execution Environment, and negotiates a session key after the two-way authentication succeeds.

參見圖5a,TAM伺服器經TAM客戶端發送身分認證請求至TAM安全應用,TAM安全應用產生身分認證憑證,TAM安全應用經TAM客戶端發送身分認證憑證至所述TAM伺服器。TAM伺服器基於身分認證請求和身分認證憑證對所述TAM安全應用進行身分認證。TAM伺服器對TAM安全應用認證成功後,基於身分認證請求和身分認證憑證確定會話密鑰。 5a, the TAM server sends an identity authentication request to the TAM security application via the TAM client, the TAM security application generates an identity authentication certificate, and the TAM security application sends the identity authentication certificate to the TAM server via the TAM client. The TAM server performs identity authentication on the TAM security application based on the identity authentication request and the identity authentication certificate. After the TAM server successfully authenticates the TAM security application, it determines the session key based on the identity authentication request and the identity authentication certificate.

參見圖5a,TAM安全應用經TAM客戶端發送身分認證請求至TAM伺服器,TAM伺服器產生身分認證憑證,TAM伺服器經TAM客戶端發送身分認證憑證至TAM安全應用。TAM安全應用基於身分認證請求和身分認證憑證對TAM伺服器進行身分認證;TAM安全應用對TAM伺服器認證成功後,基於身分認證請求和身分認證憑證確定會話密鑰。 Referring to FIG. 5a, the TAM security application sends an identity authentication request to the TAM server through the TAM client, the TAM server generates an identity authentication certificate, and the TAM server sends the identity authentication certificate to the TAM security application through the TAM client. The TAM security application performs identity authentication on the TAM server based on the identity authentication request and the identity authentication certificate; after the TAM security application successfully authenticates the TAM server, it determines the session key based on the identity authentication request and the identity authentication certificate.

關於雙向認證的具體過程以及協商會話密鑰的具體過程已為成熟技術,在此不再贅述。 The specific process of the two-way authentication and the specific process of negotiating the session key are mature technologies, and will not be repeated here.

步驟S403:TAM伺服器300接收所述應用伺服器發送 的應用標識和所述敏感資源,利用所述會話密鑰對所述敏感資源進行加密操作,發送加密後的敏感資源和所述應用標識至終端設備中非可信執行環境的TAM客戶端。 Step S403: TAM server 300 receives the application server sent The application identification and the sensitive resource, use the session key to encrypt the sensitive resource, and send the encrypted sensitive resource and the application identification to the TAM client of the non-trusted execution environment in the terminal device.

步驟S404:非可信執行環境的TAM客戶端接收所述TAM伺服器發送的所述加密後的敏感資源和所述應用標識,並傳輸所述加密後的敏感資源和所述應用標識至所述TAM安全應用。 Step S404: The TAM client of the non-trusted execution environment receives the encrypted sensitive resource and the application identifier sent by the TAM server, and transmits the encrypted sensitive resource and the application identifier to the TAM security application.

TAM客戶端會調用可信執行環境的應用程式介面TEE Client API,傳輸加密後的敏感資源至TAM安全應用。 The TAM client will call the application program interface TEE Client API of the trusted execution environment, and transmit encrypted sensitive resources to the TAM security application.

由於在TAM伺服器與TAM安全應用傳輸過程中,傳輸的為加密後的敏感資源,所以,相當於在安全通道傳輸敏感資源。因此,本申請不存在敏感資源暴露在非可信環境的問題,所以可以保護敏感資源。 Since encrypted sensitive resources are transmitted during the transmission process between the TAM server and the TAM security application, it is equivalent to transmitting sensitive resources in a secure channel. Therefore, this application does not have the problem of sensitive resources being exposed in an untrusted environment, so sensitive resources can be protected.

步驟S405:所述TAM安全應用利用所述會話密鑰解密所述加密後的敏感資源獲得敏感資源,發送該敏感資源至所述應用標識對應的安全應用。 Step S405: The TAM security application uses the session key to decrypt the encrypted sensitive resource to obtain a sensitive resource, and sends the sensitive resource to the security application corresponding to the application identifier.

TAM安全應用解密加密後的敏感資源並獲得敏感資源後,通過調用可信執行環境的內部應用程式介面(TEE Internal API),將敏感資源最終傳輸到應用標識對應的安全應用中。 After the TAM security application decrypts the encrypted sensitive resource and obtains the sensitive resource, it transfers the sensitive resource to the security application corresponding to the application identifier by calling the internal application programming interface (TEE Internal API) of the trusted execution environment.

參見圖5,繼續以“支付寶”應用為例對本步驟進行舉例說明:TAM安全應用通過TEE Internal API,發送加密後的敏感資源至“支付寶”應用標識對應的“支付寶”安全應用。 Referring to Figure 5, continue to take the "Alipay" application as an example to illustrate this step: the TAM security application sends encrypted sensitive resources to the "Alipay" security application corresponding to the "Alipay" application identifier through the TEE Internal API.

通過以上技術手段,可以實現以下有益效果: Through the above technical means, the following beneficial effects can be achieved:

本申請直接在TAM伺服器與可信執行環境中的TAM安全應用之間進行雙向認證並協商出會話密鑰,這相當於在TAM伺服器與TAM安全應用之間建立安全通道。TAM伺服器在安全通道發送加密後的敏感資料至TAM安全應用,再由TAM安全應用傳輸至業務安全應用。 This application directly performs two-way authentication and negotiates a session key between the TAM server and the TAM security application in the trusted execution environment, which is equivalent to establishing a secure channel between the TAM server and the TAM security application. The TAM server sends encrypted sensitive data to the TAM security application through a secure channel, and then the TAM security application transmits it to the business security application.

TAM伺服器發送加密後的敏感資源至TAM安全應用的過程,相當於在安全通道傳輸敏感資源。這樣可以防止敏感資源暴露在非可信環境中,從而保護敏感資源。 The process of the TAM server sending encrypted sensitive resources to the TAM security application is equivalent to transmitting sensitive resources in a secure channel. This protects sensitive resources by preventing them from being exposed to untrusted environments.

並且,本實施例中多個應用伺服器均可以通過資料傳輸系統實施例二來管理敏感資源,不需要再為各個應用伺服器單獨維護資料傳輸系統實施例一,從而可以減少應用開發和維護的工作量。 Moreover, multiple application servers in this embodiment can manage sensitive resources through the second embodiment of the data transmission system, and there is no need to separately maintain the first embodiment of the data transmission system for each application server, thereby reducing the cost of application development and maintenance. workload.

本實施例方法所述的功能如果以軟體功能單元的形式實現並作為獨立的產品銷售或使用時,可以儲存在一個計算設備可讀取儲存媒介中。基於這樣的理解,本申請實施例對現有技術做出貢獻的部分或者該技術方案的部分可以以軟體產品的形式顯示出來,該軟體產品儲存在一個儲存媒介中,包括若干指令用以使得一台計算設備(可以是個人電腦,伺服器,行動計算設備或者網路設備等)執行本申請各個實施例所述方法的全部或部分步驟。而前述的儲存媒介包括:USB隨身碟、行動硬碟、唯讀記憶體(ROM,Read-Only Memory)、隨機存取記憶體(RAM,Random Access Memory)、磁碟或者光碟等各種可以儲存 程式代碼的媒介。 If the functions described in the method of this embodiment are realized in the form of software function units and sold or used as independent products, they can be stored in a computing device-readable storage medium. Based on this understanding, the part of the embodiment of the present application that contributes to the prior art or the part of the technical solution can be displayed in the form of a software product, the software product is stored in a storage medium, and includes several instructions to make a A computing device (which may be a personal computer, a server, a mobile computing device or a network device, etc.) executes all or part of the steps of the methods described in the various embodiments of the present application. The aforementioned storage media include: USB flash drives, mobile hard drives, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disks or optical discs, etc. can store A medium for program code.

本說明書中各個實施例採用遞進的方式描述,每個實施例重點說明的都是與其它實施例的不同之處,各個實施例之間相同或相似部分互相參見即可。 Each embodiment in this specification is described in a progressive manner, each embodiment focuses on the difference from other embodiments, and the same or similar parts of each embodiment can be referred to each other.

對所公開的實施例的上述說明,使本領域專業技術人員能夠實現或使用本申請。對這些實施例的多種修改對本領域的專業技術人員來說將是顯而易見的,本文中所定義的一般原理可以在不脫離本申請的精神或範圍的情況下,在其它實施例中實現。因此,本申請將不會被限制於本文所示的這些實施例,而是要符合與本文所公開的原理和新穎特點相一致的最寬的範圍。 The above description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the general principles defined herein may be implemented in other embodiments without departing from the spirit or scope of the application. Therefore, the present application will not be limited to the embodiments shown herein, but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (3)

一種資料傳輸系統,其特徵在於,包括:應用伺服器,用於將安全應用的應用標識和待發送至所述安全應用的資料發送至TAM伺服器;TAM伺服器,用於與可信執行環境的TAM安全應用進行雙向認證,並在雙向認證成功後協商出會話密鑰;接收所述應用伺服器發送的應用標識和所述資料,利用所述會話密鑰對所述資料進行加密操作,發送加密後的資料和所述應用標識至終端設備;終端設備,用於控制可信執行環境中的TAM安全應用與所述TAM伺服器進行雙向認證,並在雙向認證成功後協商出會話密鑰;非可信執行環境的TAM客戶端接收所述TAM伺服器發送的所述加密後的資料和所述應用標識,並傳輸所述加密後的資料和所述應用標識至所述TAM安全應用;所述TAM安全應用利用所述會話密鑰解密所述加密後的資料獲得資料,發送該資料至所述應用標識對應的所述安全應用。 A data transmission system, characterized in that it includes: an application server, configured to send an application identifier of a secure application and data to be sent to the secure application to a TAM server; a TAM server, configured to communicate with a trusted execution environment The TAM security application of the TAM performs two-way authentication, and negotiates a session key after the two-way authentication is successful; receives the application identification and the data sent by the application server, uses the session key to encrypt the data, and sends The encrypted data and the application identification are sent to the terminal device; the terminal device is used to control the TAM security application in the trusted execution environment to perform two-way authentication with the TAM server, and negotiate a session key after the two-way authentication is successful; The TAM client of the non-trusted execution environment receives the encrypted data and the application identification sent by the TAM server, and transmits the encrypted data and the application identification to the TAM security application; The TAM security application uses the session key to decrypt the encrypted data to obtain data, and sends the data to the security application corresponding to the application identifier. 如請求項1所述的系統,其中,所述可信執行環境中的TAM安全應用與所述TAM伺服器進行雙向認證,具體包括:所述TAM伺服器經所述TAM客戶端發送身分認證請求至所述TAM安全應用,所述TAM安全應用產生身分認證憑 證,所述TAM安全應用經所述TAM客戶端發送身分認證憑證至所述TAM伺服器,所述TAM伺服器基於所述身分認證請求和所述身分認證憑證對所述TAM安全應用進行身分認證;所述TAM安全應用經所述TAM客戶端發送身分認證請求至所述TAM伺服器,所述TAM伺服器產生身分認證憑證,所述TAM伺服器經所述TAM客戶端發送身分認證憑證至所述TAM安全應用,所述TAM安全應用基於所述身分認證請求和所述身分認證憑證對所述TAM伺服器進行身分認證;所述TAM伺服器與所述TAM安全應用雙向認證成功後,基於所述身分認證請求和所述身分認證憑證確定會話密鑰。 The system according to claim 1, wherein the two-way authentication between the TAM security application in the trusted execution environment and the TAM server includes: the TAM server sends an identity authentication request via the TAM client To the TAM security application, the TAM security application generates an identity authentication credential The TAM security application sends the identity authentication certificate to the TAM server through the TAM client, and the TAM server performs identity authentication on the TAM security application based on the identity authentication request and the identity authentication certificate ; The TAM security application sends an identity authentication request to the TAM server through the TAM client, the TAM server generates an identity authentication certificate, and the TAM server sends the identity authentication certificate to the TAM client through the TAM client The TAM security application, the TAM security application performs identity authentication on the TAM server based on the identity authentication request and the identity authentication certificate; after the two-way authentication between the TAM server and the TAM security application succeeds, based on the A session key is determined based on the identity authentication request and the identity authentication credential. 如請求項1所述的系統,其中,所述終端設備執行發送該資料至所述應用標識對應的所述安全應用的過程,具體包括:所述TAM安全應用調用可信執行環境的內部應用程式介面;通過所述內部應用程式介面發送該資料至所述應用標識對應的所述安全應用。The system according to claim 1, wherein the terminal device executes the process of sending the data to the security application corresponding to the application identifier, which specifically includes: the TAM security application calls an internal application program of a trusted execution environment interface; sending the data to the security application corresponding to the application identifier through the internal API.
TW107135164A 2017-12-08 2018-10-05 Data transmission method and system TWI791050B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN201711292803.9A CN109905350B (en) 2017-12-08 2017-12-08 Data transmission method and system
??201711292803.9 2017-12-08
CN201711292803.9 2017-12-08

Publications (2)

Publication Number Publication Date
TW201926943A TW201926943A (en) 2019-07-01
TWI791050B true TWI791050B (en) 2023-02-01

Family

ID=66751323

Family Applications (1)

Application Number Title Priority Date Filing Date
TW107135164A TWI791050B (en) 2017-12-08 2018-10-05 Data transmission method and system

Country Status (3)

Country Link
CN (1) CN109905350B (en)
TW (1) TWI791050B (en)
WO (1) WO2019109852A1 (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109145628B (en) * 2018-09-06 2020-08-25 江苏恒宝智能系统技术有限公司 Data acquisition method and system based on trusted execution environment
CN112422487A (en) * 2019-08-23 2021-02-26 北京小米移动软件有限公司 Data transmission method, device, system and computer readable storage medium
CN113905355A (en) * 2020-07-06 2022-01-07 北京亚华意诺斯新能源科技有限公司 Safety protection system for meter, data transmission method, meter and server
CN114338065A (en) * 2020-09-30 2022-04-12 中兴通讯股份有限公司 Secure communication method, device, server and storage medium
CN112329071A (en) * 2020-12-16 2021-02-05 支付宝(杭州)信息技术有限公司 Privacy data processing method, system, device and equipment
CN112422587B (en) * 2021-01-21 2021-04-13 腾讯科技(深圳)有限公司 Identity verification method and device, computer equipment and storage medium
CN112929169B (en) * 2021-02-07 2022-10-28 成都薯片科技有限公司 Key negotiation method and system
CN112926046B (en) * 2021-03-26 2024-04-19 公安部第三研究所 Mobile terminal equipment anonymous identification information authentication method for protecting equipment identification information
CN116032556A (en) * 2022-12-13 2023-04-28 支付宝(杭州)信息技术有限公司 Key negotiation method and device for applet application

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103856485A (en) * 2014-02-14 2014-06-11 武汉天喻信息产业股份有限公司 System and method for initializing safety indicator of credible user interface
CN104636917A (en) * 2015-02-03 2015-05-20 武汉天喻信息产业股份有限公司 Mobile payment system and method with secure payment function
TW201702951A (en) * 2015-04-23 2017-01-16 China Unionpay Co Ltd Mobile payment device and mobile payment system

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8959331B2 (en) * 2012-11-19 2015-02-17 At&T Intellectual Property I, Lp Systems for provisioning universal integrated circuit cards
CN103873243B (en) * 2012-12-12 2018-06-15 腾讯科技(北京)有限公司 Realize method, system, server and the terminal of data security transmission
CN105101169A (en) * 2014-05-13 2015-11-25 中国移动通信集团公司 Method and apparatus of information processing by trusted execution environment, terminal and SIM card
CN104408371B (en) * 2014-10-14 2017-12-19 中国科学院信息工程研究所 A kind of implementation method based on credible performing environment high safety application system
TWI543014B (en) * 2015-01-20 2016-07-21 動信科技股份有限公司 System and method of rapid deployment trusted execution environment application
CN106453196B (en) * 2015-08-04 2020-01-07 中国移动通信集团公司 Key writing device, system and method for trusted execution environment
CN106454528A (en) * 2015-08-07 2017-02-22 阿里巴巴集团控股有限公司 Service processing method based on trusted execution environment and client side
CN105488679B (en) * 2015-11-23 2019-12-03 北京小米支付技术有限公司 Mobile payment device, method and apparatus based on biological identification technology
CN107426174B (en) * 2017-06-09 2019-12-24 武汉果核科技有限公司 Access control method of trusted execution environment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103856485A (en) * 2014-02-14 2014-06-11 武汉天喻信息产业股份有限公司 System and method for initializing safety indicator of credible user interface
CN104636917A (en) * 2015-02-03 2015-05-20 武汉天喻信息产业股份有限公司 Mobile payment system and method with secure payment function
TW201702951A (en) * 2015-04-23 2017-01-16 China Unionpay Co Ltd Mobile payment device and mobile payment system

Also Published As

Publication number Publication date
TW201926943A (en) 2019-07-01
WO2019109852A1 (en) 2019-06-13
CN109905350B (en) 2022-08-12
CN109905350A (en) 2019-06-18

Similar Documents

Publication Publication Date Title
TWI791050B (en) Data transmission method and system
US11792169B2 (en) Cloud storage using encryption gateway with certificate authority identification
TWI744371B (en) Data storage method, data acquisition method, device and system
US10554420B2 (en) Wireless connections to a wireless access point
US10601801B2 (en) Identity authentication method and apparatus
RU2756048C2 (en) Addressing trusted execution environment using encryption key
WO2017097041A1 (en) Data transmission method and device
CN110214440B (en) Computing system, method for transmitting protected data and readable storage medium
TWI701929B (en) Cryptographic calculation, method for creating working key, cryptographic service platform and equipment
TWI475899B (en) Apparatus and methods for storing electronic access clients
US7321971B2 (en) System and method for secure remote access
KR102489790B1 (en) Addressing scheme of trusted execution environment using signing key
US10887085B2 (en) System and method for controlling usage of cryptographic keys
KR20220086580A (en) Non-custodial tool for building decentralized computer applications
CN112041838A (en) Secure zone interaction
CN110235134B (en) Addressing trusted execution environments using clean room provisioning
TW202231014A (en) Message transmitting system, user device and hardware security module for use therein
US20180357411A1 (en) Authentication Of A Device
US20220014358A1 (en) Private key cloud storage
TWI751433B (en) Secure communication key negotiation method
EP4175219A1 (en) Method to establish a secure channel
KR102086082B1 (en) Method and system for automatic login for legacy system using wearable terminal
Culnane et al. Formalising Application-Driven Authentication & Access-Control based on Users’ Companion Devices
KR20160067547A (en) Improved mobile trusted module-based session and key management method
TW202327313A (en) Message transmitting system, user device and hardware security module for use therein