WO2018068228A1 - 一种验证码处理方法及移动终端 - Google Patents

一种验证码处理方法及移动终端 Download PDF

Info

Publication number
WO2018068228A1
WO2018068228A1 PCT/CN2016/101899 CN2016101899W WO2018068228A1 WO 2018068228 A1 WO2018068228 A1 WO 2018068228A1 CN 2016101899 W CN2016101899 W CN 2016101899W WO 2018068228 A1 WO2018068228 A1 WO 2018068228A1
Authority
WO
WIPO (PCT)
Prior art keywords
verification code
legal
short message
information
tee
Prior art date
Application number
PCT/CN2016/101899
Other languages
English (en)
French (fr)
Inventor
黄洁静
彭峰
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2016/101899 priority Critical patent/WO2018068228A1/zh
Priority to CN201680089629.5A priority patent/CN109792436B/zh
Publication of WO2018068228A1 publication Critical patent/WO2018068228A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a verification code processing method and a mobile terminal.
  • the verification code is sent out without any judgment, so that First, the verification code that should be sensitive information can be sent out at will, resulting in the verification code being unsafe. Therefore, the security of the method of randomly sending the verification code in the prior art is not high.
  • the present invention provides a verification code processing method and a mobile terminal, and aims to solve the problem that the security of the method of randomly transmitting the verification code in the prior art is not high.
  • a first aspect of the present application provides a verification code processing method, including the following steps:
  • the trusted execution environment TEE receives the verification code acquisition request sent by the rich execution environment REE, where the verification code acquisition request carries at least the information of the application to be obtained the verification code; the TEE determines that the verification code is to be obtained in the verification code acquisition request. Whether the information of the application is consistent with the information of the legal application that is saved by itself using the verification code; if so, the verification code is sent to the REE. It can be seen that, after receiving the verification code acquisition request, the terminal does not directly send the verification code, but the information of the application that is to be acquired in the verification code acquisition request sent by the TEE. If the information of the legitimate application using the verification code saved by itself is consistent, the verification code is sent to the REE, which has higher security.
  • the method further includes: the TEE receiving the legal verification code short message sent by the modem Modem; and the TEE extracting the verification code from the legal verification code short message. Since the modem is the underlying system for the terminal to communicate with other devices, the underlying system in the terminal first determines the legal verification code short message, and then sends it to the TEE for processing, thereby ensuring that the verification code short message is recognized at the first time, thereby quickly entering the verification code. Process flow.
  • the obtaining process of the verification code includes: the TEE receives a legal verification code short message sent by the modem Modem; the TEE encrypts and stores the legal verification code short message, and obtains an encrypted verification code short message, where the encryption
  • the verification code short message includes a verification code displayed in a cipher text; the TEE acquires a storage index of the encrypted verification code short message, and the storage index records the storage of the encrypted verification code short message in a storage space.
  • the TEE sends the storage index to the REE; the REE acquires an encrypted verification code short message according to the storage index, and adds the encrypted verification code short message to the verification code acquisition request; the TEE is Extracting the encrypted verification code short message from the verification code acquisition request sent by the REE; the TEE decrypts the encrypted verification code short message, and extracts the verification code from the decrypted verification code short message. Since the TEE stores the encrypted verification code short message and sends the storage index to the REE, it can exit the operation until it receives the verification code acquisition request sent by the REE, and then restarts the operation, thereby saving the running time of the TEE and reducing The resource consumption at runtime. Moreover, compared with REE, TEE is a safe operating environment running in the main processor. The legal verification code text message is encrypted in the TEE, and then decrypted in the TEE, which has higher security.
  • the method before the TEE receives the legal verification code short message sent by the modem Modem, the method further includes: the Modem receiving the verification code short message; the Modem extracting the sender information in the verification code short message; the Modem Determining whether the sender information is legal sender information; if yes, the modem determines that the verification code text message is the legal verification code short message.
  • Modem Before sending the verification code SMS to the TEE, Modem first verifies the legality of the sender of the verification code SMS to further improve security.
  • the Modem determining whether the sender information is a legitimate sender information includes: the Modem determining whether the sender information is stored in a whitelist, and if yes, determining the sender information It is legal sender information, and the white list includes at least: The legal sender information of the verification code SMS. Thereby ensuring the security of the verification code SMS sent to the TEE.
  • the Modem determining whether the sender information is a legal sender information includes: the Modem determining whether the sender information is not stored in a blacklist, and if yes, determining the sender The information is legal sender information, and the blacklist includes at least: illegal sender information of the verification code short message. Thereby ensuring the security of the verification code SMS sent to the TEE.
  • the method further includes: the TEE encrypting the legal verification code short message, and obtaining an encrypted legal verification code short message, where the encryption The legal verification code short message includes the ciphertext of the verification code; the TEE stores the encrypted legal verification code short message in the storage space of the REE; after the REE receives the verification code viewing request, the REE The REE sends the encrypted legal verification code short message stored in the storage space of the REE to the TEE; the TEE decrypts the encrypted legal verification code short message to obtain a decrypted legal verification code short message.
  • TEE After the TEE stores the encrypted verification code SMS in the storage space of the REE, it can exit the operation until it receives the encrypted legal verification code SMS sent by the REE, and then restarts the operation, thereby saving the running time of the TEE and reducing The resource consumption at runtime.
  • TEE is a safe operating environment running in the main processor.
  • the legal verification code text message is encrypted in the TEE, and then decrypted in the TEE, which has higher security.
  • the TEE stores the encrypted legal verification code short message in the storage space of the REE, thereby facilitating saving REE storage space.
  • the method further includes: the TEE storing the legal verification code short message in a storage space of the TEE. Since the TEE is a secure operating environment running in the main processor, the legal verification code short message is stored in the storage space of the TEE, which has higher security.
  • the whitelist list further includes: information that is used by the legal application of the verification code in the legal verification code short message; and the verification code that is carried in the verification code acquisition request by the TEE.
  • the method further includes: determining, by the modem, the legal sender information of the legal verification code message, using the The legal verification code should be legally verified by the verification code.
  • Information used; the information of the legitimate application is sent to the TEE.
  • the TEE verifies the legality of the application that sends the verification code acquisition request according to the information of the legal application, and has higher security.
  • the TEE determines whether the information of the application to be obtained by the verification code acquisition request and the information about the legal application of the verification code that is used by the verification code acquisition request is consistent with:
  • the TEE extracts a PDU field in the legal verification code short message; the TEE determines information of a legitimate application using the verification code from the PDU field. Therefore, according to the information of the legal application, the validity of the application for sending the verification code acquisition request is verified, which has higher security.
  • the TEE determines whether the information of the application to be obtained by the verification code acquisition request and the information about the legal application of the verification code that is used by the verification code acquisition request is consistent with:
  • the TEE extracts the legal sender information in the legal verification code short message;
  • the TEE determines, according to the legal sender information, the legal application using the verification code from the information list of the legal application preset in the TEE.
  • the information, the preset information list of the legal application in the TEE includes at least: a legal sender information of the verification code short message and a legal application information of the verification code in the legal verification code short message. Therefore, according to the information of the legal application, the validity of the application for sending the verification code acquisition request is verified, which has higher security.
  • a second aspect of the present application provides a mobile terminal, including:
  • a verification code acquisition request receiving module configured to receive a verification code acquisition request sent by the rich execution environment REE, where the verification code acquisition request carries at least information of an application to be obtained the verification code; and the information determination module is configured to determine the verification code Obtaining, in the request, whether the information of the application that is to obtain the verification code is consistent with the information of the legal application that is saved by using the verification code; the verification code sending module is configured to determine, in the information verification module, the verification code acquisition request The verification code is sent to the REE if the information of the carried application that is to acquire the verification code is consistent with the information of the legal application that uses the verification code stored by itself.
  • the terminal After receiving the verification code acquisition request, the terminal does not directly send the verification code, but the information of the application that is to be acquired in the verification code acquisition request sent by the TEE. If the information of the legitimate application using the verification code saved by itself is consistent, the verification code is sent to the REE, which has higher security.
  • the method further includes: a first verification code acquiring module, configured to obtain a verification code;
  • the first verification code acquisition module includes: a first legal verification code short message receiving module, configured to receive a legal verification code short message sent by the modem Modem; and a verification code extraction module, configured to extract a verification code from the legal verification code short message. Since the modem is the underlying system for the terminal to communicate with other devices, the underlying system in the terminal first determines the legal verification code short message, and then sends it to the TEE for processing, thereby ensuring that the verification code short message is recognized at the first time, thereby quickly entering the verification code. Process flow.
  • the method further includes: a second verification code acquisition module, configured to obtain a verification code;
  • the second verification code acquisition module includes: a second legal verification code short message receiving module, configured to receive a legal verification sent by the modem Modem a coded short message; an encrypted storage module, configured to encrypt and store the legal verification code short message, and obtain an encrypted verification code short message, where the encrypted verification code short message includes a verification code displayed in a cipher text form; and a storage index acquisition module, a storage index for obtaining the encrypted verification code short message, wherein the storage index records a storage location of the encrypted verification code short message in a storage space; and a storage index sending module, configured to send the storage index to REE; an encryption verification code short message obtaining module, configured to obtain an encrypted verification code short message according to the storage index; and an encryption verification code short message adding module, configured to add the encrypted verification code short message to the verification code acquisition request; a code short message extraction module, configured to extract an encrypted verification from a verification code acquisition request sent by the REE
  • TEE Since the TEE stores the encrypted verification code short message and sends the storage index to the REE, it can exit the operation until it receives the verification code acquisition request sent by the REE, and then restarts the operation, thereby saving the running time of the TEE and reducing The resource consumption at runtime.
  • TEE is a safe operating environment running in the main processor. The legal verification code text message is encrypted in the TEE, and then decrypted in the TEE, which has higher security.
  • the method further includes: a verification code short message receiving module, configured to receive a verification code short message; a sender information extraction module, configured to extract sender information in the verification code short message; and a sender information determination module, configured to: Determining whether the sender information is legal sender information; the legal verification code short message determining module is configured to determine the verification code if the sender information determining module determines that the sender information is legal sender information The short message is the legal verification code short message.
  • the legality of the sender of the verification code SMS is first verified to further improve security.
  • the sender information determining module includes: a first sender information determining sub-module, configured to determine whether the sender information is stored in a whitelist; and the first legal sender information determining module uses When the first sender information determining sub-module determines that the sender information is stored in the whitelist, it is determined that the sender information is legal sender information, and the whitelist includes at least: a verification code short message. Legal sender information. Thereby ensuring the security of the verification code SMS sent to the TEE.
  • the sender information determining module includes: a second sender information determining sub-module, configured to determine whether the sender information is not stored in a blacklist; and a second legal sender information determining module, And in the case that the second sender information determining sub-module determines that the sender information is not stored in the blacklist, determining that the sender information is legal sender information, and the blacklist includes at least: Illegal sender information of the text message. Thereby ensuring the security of the verification code SMS sent to the TEE.
  • the method further includes: a first encryption module, configured to encrypt the legal verification code short message to obtain an encrypted legal verification code short message, where the encrypted legal verification code short message includes the secret of the verification code
  • the first storage module is configured to store the encrypted legal verification code short message in the storage space of the REE; the first sending module is configured to store the REE in the REE after receiving the verification code viewing request
  • the encrypted legal verification code short message in the storage space is sent to the TEE;
  • the first decryption module is configured to decrypt the encrypted legal verification code short message to obtain a decrypted legal verification code short message.
  • TEE After the TEE stores the encrypted verification code SMS in the storage space of the REE, it can exit the operation until it receives the encrypted legal verification code SMS sent by the REE, and then restarts the operation, thereby saving the running time of the TEE and reducing The resource consumption at runtime.
  • TEE is a safe operating environment running in the main processor.
  • the legal verification code text message is encrypted in the TEE, and then decrypted in the TEE, which has higher security.
  • the TEE stores the encrypted legal verification code short message in the storage space of the REE, thereby facilitating saving REE storage space.
  • the method further includes: a second storage module, configured to store the legal verification code short message in a storage space of the TEE. Since the TEE is a secure operating environment running in the main processor, the legal verification code short message is stored in the storage space of the TEE, which has higher security.
  • the method further includes: a first information determining module, configured to determine, according to the legal sender information of the legal verification code short message, a legal application that uses the verification code in the legal verification code short message from the whitelist list
  • the information of the legal application includes the information of the legal application of the verification code in the legal verification code
  • the first information sending module is configured to send the information of the legal application to the TEE.
  • the TEE verifies the legality of the application that sends the verification code acquisition request according to the information of the legal application, and has higher security.
  • the method further includes: a PDU field extraction module, configured to extract a PDU field in the legal verification code short message; and a second information determining module, configured to determine, from the PDU field, a legal use of the verification code Application information. Therefore, according to the information of the legal application, the validity of the application for sending the verification code acquisition request is verified, which has higher security.
  • the method further includes:
  • the legal sender information extraction module is configured to extract the legal sender information in the legal verification code short message
  • the third information determining module is configured to: determine the legal application information in the TEE according to the legal sender information. Determining, in the list, the information of the legal application that uses the verification code, where the preset information list of the legal application in the TEE includes at least: the legal sender information of the verification code short message and the verification in the short message using the legal verification code The legal application of the code. Therefore, according to the information of the legal application, the validity of the application for sending the verification code acquisition request is verified, which has higher security.
  • a third aspect of the present application provides a mobile terminal, including: a communication component, a memory, and a processor; the memory is configured to store information of a legitimate application using the verification code, a verification code, a storage application, and an application running Data generated during the process; the communication component is configured to receive a verification code acquisition request that carries at least information of an application to which the verification code is to be acquired; and the processor is configured to determine an application of the verification code acquisition request to be acquired in the verification code acquisition request The verification code is sent when the information is consistent with the information of the legal application that uses the verification code that is saved by itself; the processor is configured to determine the information of the application that is to be acquired in the verification code acquisition request and that is to obtain the verification code.
  • the communication component in the mobile terminal does not directly send the verification code, but the processor determines that the verification code acquisition request sent by the REE is to be acquired.
  • the information of the application of the verification code is consistent with the information of the legitimate application stored in the self-memory using the verification code, and the verification code is sent to the REE through the communication component, which has higher security.
  • the communication component is specifically configured to: receive a legal verification code short message sent by the modem Modem; and extract a verification code from the legal verification code short message. Since the modem is the underlying system for the terminal to communicate with other devices, the underlying system in the terminal first determines the legal verification code short message, and then sends it to the TEE for processing, thereby ensuring that the verification code short message is recognized at the first time, thereby quickly entering the verification code. Process flow.
  • the communication component is specifically configured to receive a legal verification code short message sent by the modem Modem
  • the processor is further configured to: encrypt and store the legal verification code short message to obtain an encrypted verification code short message, where
  • the encrypted verification code short message includes a verification code displayed in a cipher text; the storage index of the encrypted verification code short message is obtained, and the storage index records the storage location of the encrypted verification code short message in the storage space; And sending the storage index to the REE; acquiring the encrypted verification code short message according to the storage index, and adding the encrypted verification code short message to the verification code acquisition request; and extracting from the verification code acquisition request sent by the REE
  • the encrypted verification code short message decrypting the encrypted verification code short message, and extracting the verification code from the decrypted verification code short message.
  • TEE Since the TEE stores the encrypted verification code short message and sends the storage index to the REE, it can exit the operation until it receives the verification code acquisition request sent by the REE, and then restarts the operation, thereby saving the running time of the TEE and reducing The resource consumption at runtime.
  • TEE is a safe operating environment running in the main processor. The legal verification code text message is encrypted in the TEE, and then decrypted in the TEE, which has higher security.
  • the communication component is further configured to receive a verification code short message; the processor is further configured to: extract the sender information in the verification code short message; and determine whether the sender information is a legitimate sender information; If yes, it is determined that the verification code short message is the legal verification code short message.
  • Modem Before sending the verification code SMS to the TEE, Modem first verifies the legality of the sender of the verification code SMS to further improve security.
  • the processor is specifically configured to:
  • the processor is specifically configured to:
  • the blacklist list includes at least the illegal sender information of the verification code short message.
  • the processor is further configured to encrypt the legal verification code short message to obtain an encrypted legal verification code short message, where the encrypted legal verification code short message includes the ciphertext of the verification code;
  • the encrypted legal verification code short message is stored in the storage space of the REE;
  • the communication component is further configured to: after receiving the verification code viewing request, the encrypted legal verification code stored in the storage space of the REE The short message is sent to the TEE;
  • the processor is further configured to decrypt the encrypted legal verification code short message to obtain a decrypted legal verification code short message.
  • TEE After the TEE stores the encrypted verification code SMS in the storage space of the REE, it can exit the operation until it receives the encrypted legal verification code SMS sent by the REE, and then restarts the operation, thereby saving the running time of the TEE and reducing The resource consumption at runtime.
  • TEE is a safe operating environment running in the main processor.
  • the legal verification code text message is encrypted in the TEE, and then decrypted in the TEE, which has higher security.
  • the TEE stores the encrypted legal verification code short message in the storage space of the REE, thereby facilitating saving REE storage space.
  • the processor is further configured to store the legal verification code short message in a storage space of the TEE. Since the TEE is a secure operating environment running in the main processor, the legal verification code short message is stored in the storage space of the TEE, which has higher security.
  • the processor is further configured to determine, according to the legal sender information of the legal verification code short message, the legal application information of the verification code in the legal verification code short message from the whitelist list;
  • the whitelist list further includes: information about a legitimate application of the verification code in the legal verification code short message;
  • the communication component is further configured to send the information of the legal application to the TEE.
  • the TEE verifies the legality of the application that sends the verification code acquisition request according to the information of the legal application, and has higher security.
  • the processor is further configured to extract a PDU field in the legal verification code short message; and determine, from the PDU field, information of a legitimate application that uses the verification code. Therefore, according to the information of the legal application, the validity of the application for sending the verification code acquisition request is verified, which has higher security.
  • the processor is further configured to: extract legal sender information in the legal verification code short message; and, according to the legal sender information, information from a legal application preset in the TEE Determining, in the list, the information of the legal application that uses the verification code, where the preset information list of the legal application in the TEE includes at least: the legal sender information of the verification code short message and the verification in the short message using the legal verification code The legal application of the code. Therefore, according to the information of the legal application, the validity of the application for sending the verification code acquisition request is verified, which has higher security.
  • FIG. 1 is a schematic structural diagram of a terminal disclosed in the prior art
  • FIG. 2 is a schematic structural diagram of a terminal disclosed in an embodiment of the present invention.
  • FIG. 3 is a signaling flowchart of a verification code processing method disclosed in an embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of a terminal disclosed in an embodiment of the present invention.
  • FIG. 6 is a schematic structural diagram of hardware of a terminal disclosed in an embodiment of the present invention.
  • FIG. 1 is a schematic structural diagram of a terminal disclosed in the prior art, including: a modem (Modulator and Demodulator, Modem) and a Rich Execution Environment (REE).
  • the mobile terminal receives the verification.
  • the code is short message
  • the verification code short message is transmitted to the modem for signal conversion, and then the verification code after the signal conversion is transmitted to the REE for processing.
  • the REE itself has powerful data processing capability, its security is not High, after receiving the copy verification code request in the REE, all the copied content is guaranteed.
  • the REE will present the verification code without any judgment. In this way, the verification code that should be sensitive information can be pasted at random, resulting in the verification code. It is not safe. Therefore, how to improve the security of copying and pasting the verification code has become an urgent problem to be solved.
  • the embodiment of the present invention uses the structure diagram of the terminal disclosed in the embodiment of the present invention shown in FIG. 2 to perform the process of copying and pasting the verification code.
  • the operating system shown in the terminal of FIG. 2 includes: a modem, a Trusted Execution Environment (TEE), and a REE.
  • TEE is an operating environment coexisting with the REE on the mobile terminal, and the TEE is running in the main processor.
  • a safe operating environment, TEE's secure boot process needs to be verified, and its secure boot process is separate from the REE.
  • TEE The applications stored under the TEE are independent of each other, and each application cannot be mutually accessed without authorization, ensuring that the resources and data processing of the application under the TEE are in a trusted environment.
  • TEE has its own execution space, which is higher than the security level of the REE operating system.
  • TEE is not a stand-alone physical security chip, but a security architecture that overlaps with the hardware architecture of the application processor currently in use.
  • the hardware and software resources that TEE can access are separate from the REE operating system and provide hardware-supported isolation. Therefore, TEE is a more secure execution environment than REE.
  • a specific process of a verification code processing method includes the following steps:
  • S101 The modem receives the short message.
  • Modem determines whether the short message is a verification code short message; if yes, execute S103, if not, send the short message to the REE, and process the REE according to a traditional short message processing flow.
  • the modem determines whether the short message is a verification code short message, and can ensure that the verification code short message is recognized at the first time, thereby quickly entering the verification. Code processing flow. It should be noted that, in the embodiment of the present invention, the judgment may be performed in any module before the short message is sent to the REE for processing. Whether the short message is a step of verifying the short message, thereby preventing the verification code short message from being recognized in time, and being sent to the REE for processing according to the traditional short message processing flow.
  • the Modem determines whether the short message content is included in the short message content, and if yes, determines that the short message is a short message of the verification code, and determines whether the short message content includes the verification code information by determining the short message content.
  • whether the number in the short message content has a verification code can also be determined in the embodiment of the present invention, for example, the feature key that identifies the short message as the verification code short message, for example: “the verification code is:” and “the dynamic password is:”.
  • the characteristics of the present invention such as the number of the digits and the combination of the digits, are not specifically limited in the embodiment of the present invention.
  • the modem also determines whether the sender number of the short message is the sender number corresponding to the verification code short message by using the sender number of the short message, and if yes, determining that the short message is a short message of the verification code, which is not in the embodiment of the present invention. Limited to the above judgment method.
  • S103 Modem extracts sender information in the verification code short message.
  • S104 Modem determines whether the sender information is legal sender information, if yes, execute S105, if not, intercept the verification code short message, or send the verification code short message to REE, by REE According to the traditional short message processing flow, the user is prompted that the verification code short message is an illegal verification code short message.
  • a whitelist may be pre-configured in the modem, and at least a legal short message sender information is recorded in the whitelist.
  • the illegal short message sender may be filtered by using a preset whitelist in the modem.
  • the legal short message sender information may be a phone number corresponding to the legal short message sender (for example, the legal short message sender is China Unicom, the legal short message sender corresponding to the phone number is 10010, 10010022, etc.), or legal The sending address corresponding to the sender of the short message, etc., is not limited herein. That is, the modem determines whether the sender information is stored in the whitelist, and if yes, determines that the sender information is legal sender information, and the whitelist includes at least: a legitimate sender of the verification code short message. information;
  • the blacklist may be pre-configured in the modem, and at least the illegal sender of the short message is recorded in the blacklist.
  • the illegal short message sender may be filtered by using the blacklist preset in the modem.
  • the information of the illegal short message sender may be a phone number corresponding to the sender of the illegal short message, or a sending address corresponding to the sender of the illegal short message.
  • the present invention is not limited herein. That is, the Modem determines whether the sender information is not stored in In the blacklist, if yes, it is determined that the sender information is legal sender information, and the blacklist list includes at least: illegal sender information of the verification code short message.
  • Modem determines that the verification code short message is a legal verification code short message, and sends the legal verification code short message to the TEE;
  • the TEE encrypts the legal verification code short message to obtain an encrypted legal verification code short message; and the encrypted legal verification code short message includes a cipher text of the verification code.
  • S107 Send the encrypted legal verification code short message to the REE, and store it in the storage space under the REE;
  • REE sends the encrypted legal verification code short message stored in the storage space of the REE to the TEE;
  • the method further includes: displaying the decrypted legal verification code short message, and displaying the decrypted verification code short message in a clear text display or a cipher text display, the present invention
  • the embodiment is not specifically limited.
  • the TEE stores the encrypted verification code short message in its own storage space, thereby improving the security of the verification code short message.
  • the TEE extracts the verification code from the decrypted legal verification code short message, and determines the information of the legal application using the verification code, and saves the information;
  • the information of the legal application refers to application information of an application that is not malicious and is to use the verification code
  • the application information refers to information that can uniquely identify the non-malicious application that is to use the verification code.
  • the application information may be: the domain name information of the legal application, the installation package name of the legal application, the signature information of the installation package of the legal application, the installation certificate of the legal application, the hash value of the legal application, and the like, which are not limited by the present invention.
  • the TEE stores the verification code and the information of the legal application using the verification code in a storage space under the TEE, and ensures the security of the verification code and the information of the legal application using the verification code.
  • the manner in which the TEE determines the information of the legitimate application using the verification code is:
  • the modem determines the legal application information of the verification code in the legal verification code short message from the whitelist list according to the legal sender information of the legal verification code short message; and sends the legal application information to the TEE;
  • the whitelist list further includes: information about a legitimate application of the verification code in the legal verification code short message;
  • the TEE extracts a Protocol Data Unit (PDU) field in the legal verification code short message; and the TEE determines, from the PDU field, information about a legitimate application that uses the verification code;
  • PDU Protocol Data Unit
  • the TEE extracts the legal sender information in the legal verification code short message; the TEE determines the legal application information using the verification code from the information list of the legal application preset in the TEE according to the legal sender information.
  • the preset information list of the legal application in the TEE includes at least: a legal sender information of the verification code short message and a legal application information of the verification code in the legal verification code short message.
  • the TIE receives a verification code acquisition request sent by the REE, where the verification code acquisition request carries information about an application that is to obtain the verification code;
  • the TEE determines whether the information of the application to be obtained by the verification code acquisition request to be obtained by the verification code is consistent with the information of the legal application that uses the verification code saved by itself; if yes, execute S114; if not, Then, the verification code acquisition request sent under the REE is rejected.
  • the TEE sends the verification code to the REE in a plain text manner or a cipher text.
  • FIG. 4 another specific process of the verification code processing method provided by the embodiment of the present invention includes the following steps:
  • S201 The modem receives the short message.
  • S202 Modem determines whether the short message is a verification code short message; if yes, executing S203, if not, sending the short message to the REE, and processing is performed by the REE according to a traditional short message processing flow.
  • S203 The Modem extracts the sender information in the verification code short message.
  • Modem determines whether the sender information is legal sender information, if yes, execute S205, if not, intercept the verification code short message, or send the verification code short message Sended to REE, processed by REE according to the traditional SMS processing flow, and prompts the user that the verification code SMS is an illegal verification code SMS.
  • the Modem determining whether the sender information is a legitimate sender information includes:
  • the Modem determines whether the sender information is stored in the whitelist, and if yes, determines that the sender information is legal sender information, and the whitelist includes at least: the legal sender information of the verification code short message. ;
  • the Modem determines whether the sender information is not stored in the blacklist, and if yes, determines that the sender information is legal sender information, and the blacklist includes at least: the verification code text message is illegal. Sender information.
  • Modem determines that the verification code short message is a legal verification code short message, and sends the legal verification code short message to the TEE;
  • the TEE encrypts and stores the legal verification code short message to obtain an encrypted verification code short message, where the encrypted verification code short message includes a verification code displayed in a cipher text format;
  • the TEE stores the verification code short message in the storage space under the REE or the storage space under the TEE, which is not specifically limited in the embodiment of the present invention.
  • the TEE acquires a storage index of the encrypted verification code short message, where the storage index records a storage location of the encrypted verification code short message in a storage space.
  • the operation may be exited until the verification code acquisition request sent by the REE is received, and then the operation is restarted, and the encrypted verification code message in the request is obtained according to the verification code. Determining the information of the legitimate application using the verification code can save the running time of the TEE.
  • the REE obtains the encrypted verification code short message in the storage space according to the storage index obtained from the TEE, and generates a verification code acquisition request according to the encrypted verification code short message and the information of the application that is to obtain the verification code;
  • the verification code acquisition request carries at least information of an application to be acquired a verification code and encryption Verification code SMS.
  • the TEE extracts the encrypted verification code short message from the verification code acquisition request, decrypts the encrypted verification code short message, and extracts the verification code from the decrypted verification code short message.
  • the TEE determines information of a legitimate application that uses the verification code, and saves the information
  • the modem determines the legal application information of the verification code in the legal verification code short message from the whitelist list according to the legal sender information of the legal verification code short message; and sends the legal application information to the TEE;
  • the whitelist list further includes: information about a legitimate application of the verification code in the legal verification code short message;
  • the TEE extracts a PDU field in the legal verification code short message; and the TEE determines, from the PDU field, information about a legitimate application that uses the verification code;
  • the TEE extracts the legal sender information in the legal verification code short message; the TEE determines the legal application information using the verification code from the information list of the legal application preset in the TEE according to the legal sender information.
  • the preset information list of the legal application in the TEE includes at least: a legal sender information of the verification code short message and a legal application information of the verification code in the legal verification code short message.
  • the TEE determines whether the information of the application to be acquired the verification code carried in the verification code acquisition request is consistent with the information of the legal application of the verification code that is saved by itself; if yes, execute S215; if not, the TEE The verification code acquisition request sent under the REE is rejected.
  • the TEE sends the verification code to the REE in a plain text manner or a cipher text.
  • the verification code processing apparatus stores the verification code and the information of the legal application using the verification code in a storage space under the TEE, and ensures the verification code and the information of the legal application using the verification code. safety.
  • the information about the legal application of the verification code includes: the domain name information of the legal application, the installation package name of the legal application, the signature information of the installation package of the legal application, the installation certificate of the legal application, the hash value, and the like, and the present invention Not limited.
  • FIG. 5 is a mobile terminal, including a verification code acquisition request receiving mode, according to an embodiment of the present application;
  • a verification code acquisition request receiving module configured to receive a verification code acquisition request sent by the rich execution environment REE, where the verification code acquisition request carries at least information of an application to be obtained the verification code;
  • the information judging module is configured to determine whether the information of the application to be obtained by the verification code acquisition request and the legal application to be used by the verification code is consistent with the information of the legal application to be used by the verification code;
  • a verification code sending module configured to: when the information judging module determines that the information of the application to be acquired the verification code carried in the verification code acquisition request is consistent with the information of the legal application of the verification code that is saved by itself, The verification code is sent to the REE.
  • the method further includes: a first verification code obtaining module, configured to obtain a verification code;
  • the first verification code acquisition module includes:
  • the first legal verification code short message receiving module is configured to receive a legal verification code short message sent by the modem Modem;
  • a verification code extraction module configured to extract a verification code from the legal verification code short message.
  • the method further includes: a second verification code obtaining module, configured to obtain a verification code;
  • the second verification code acquisition module includes:
  • a second legal verification code short message receiving module configured to receive a legal verification code short message sent by the modem Modem
  • An encrypted storage module configured to encrypt and store the legal verification code short message to obtain an encrypted verification code short message, where the encrypted verification code short message includes a verification code displayed in a cipher text format;
  • a storage index obtaining module configured to acquire a storage index of the encrypted verification code short message, where the storage index records a storage location of the encrypted verification code short message in a storage space;
  • a storage index sending module configured to send the storage index to the REE
  • An encryption verification code short message obtaining module configured to obtain an encrypted verification code short message according to the storage index
  • An encryption verification code short message adding module configured to add the encrypted verification code short message to the verification code acquisition request
  • An encryption verification code short message extraction module configured to receive a verification code acquisition request sent by the REE Take the encrypted verification code SMS;
  • the encryption verification code short message decryption module is configured to decrypt the encrypted verification code short message, and extract the verification code from the decrypted verification code short message.
  • a verification code short message receiving module is configured to receive a verification code short message
  • a sender information extraction module configured to extract sender information in the verification code short message
  • a sender information determining module configured to determine whether the sender information is legal sender information
  • the legal verification code short message determining module is configured to determine that the verification code short message is the legal verification code short message if the sender information determining module determines that the sender information is legal sender information.
  • the sender information determining module includes:
  • a first sender information determining submodule configured to determine whether the sender information is stored in a whitelist
  • a first legal sender information determining module configured to determine, in a case where the first sender information determining submodule determines that the sender information is stored in a whitelist, determining that the sender information is legal sender information,
  • the whitelist includes at least: the legal sender information of the verification code SMS.
  • the sender information determining module includes:
  • a second sender information determining submodule configured to determine whether the sender information is not stored in the blacklist
  • a second legal sender information determining module configured to determine, in a case where the second sender information determining submodule determines that the sender information is not stored in the blacklist, determining that the sender information is a legitimate sender information,
  • the blacklist list includes at least: illegal sender information of the verification code short message.
  • a first encryption module configured to encrypt the legal verification code short message to obtain an encrypted legal verification code short message, where the encrypted legal verification code short message includes the ciphertext of the verification code;
  • a first storage module configured to store the encrypted legal verification code short message in a storage space of the REE
  • a first sending module configured to send an encrypted legal verification code short message stored in the storage space of the REE to the TEE after receiving the verification code viewing request
  • the first decryption module is configured to decrypt the encrypted legal verification code short message to obtain a decrypted legal verification code short message.
  • the second storage module is configured to store the legal verification code short message in a storage space of the TEE.
  • the first information determining module is configured to determine, according to the legal sender information of the legal verification code short message, the information of the legal application that uses the verification code in the legal verification code short message from the whitelist list; The method further includes: using the legal application information of the verification code in the legal verification code short message;
  • the first information sending module is configured to send the information of the legal application to the TEE.
  • a PDU field extraction module configured to extract a PDU field in the legal verification code short message
  • a second information determining module configured to determine, from the PDU field, information of a legitimate application that uses the verification code.
  • a legal sender information extraction module configured to extract legal sender information in the legal verification code short message
  • a third information determining module configured to determine, according to the legal sender information, information of a legal application that uses the verification code from a list of information of a legal application preset in the TEE, where the preset is legal in the TEE
  • the information list of the application includes at least: the legal sender information of the verification code short message and the legal application information of the verification code in the legal verification code short message.
  • FIG. 6 is a mobile terminal according to an embodiment of the present application, including a communication component, a memory, and a processor.
  • the memory is configured to store information of a legitimate application using the verification code, a verification code, a storage application, and data generated during an operation of the application;
  • the communication component is configured to receive a verification code acquisition request that carries information of at least an application that is to acquire a verification code; and the processor determines, by the processor, the information of the application to be acquired the verification code carried in the verification code acquisition request, and the use of the self-storing If the information of the legal application of the verification code is consistent, Sending the verification code;
  • the processor is configured to determine whether the information of the application to be obtained by the verification code acquisition request and the legal application that uses the verification code is consistent with the information of the application that is to be obtained by using the verification code.
  • the communication component is configured to: receive a legal verification code short message sent by the modem Modem; and extract a verification code from the legal verification code short message.
  • the communication component is configured to receive a legal verification code short message sent by the modem modem
  • the processor is further configured to encrypt and store the legal verification code short message to obtain an encrypted verification code short message
  • the encrypted verification code includes a verification code displayed in cipher text; a storage index of the encrypted verification code short message is obtained, and the storage index records the storage location of the encrypted verification code short message in the storage space; Sending an index to the REE; obtaining an encrypted verification code short message according to the storage index, and adding the encrypted verification code short message to the verification code acquisition request; and extracting the encrypted verification code from the verification code acquisition request sent by the REE a short message; decrypting the encrypted verification code short message, and extracting the verification code from the decrypted verification code short message.
  • the communication component is further configured to receive a verification code short message; the processor is further configured to: extract the sender information in the verification code short message; and determine whether the sender information is a legitimate sender information; if yes, Then determining that the verification code short message is the legal verification code short message.
  • the processor is configured to:
  • the processor is configured to:
  • the processor is further configured to encrypt the legal verification code short message to obtain an encrypted legal verification code short message, where the encrypted legal verification code short message includes the ciphertext of the verification code;
  • the legal verification code short message is stored in the storage space of the REE;
  • the communication component is further configured to: after receiving the verification code viewing request, send the encrypted legal verification code short message stored in the storage space of the REE to The TEE;
  • the processor is further configured to use the encrypted legal verification code The short message is decrypted, and the decrypted legal verification code short message is obtained.
  • the processor is further configured to store the legal verification code short message in a storage space of the TEE.
  • the processor is further configured to determine, according to the legal sender information of the legal verification code short message, the legal application information of the verification code in the legal verification code short message from the white list; the white list The list further includes: information of a legitimate application using the verification code in the legal verification code short message; the communication component is further configured to send the information of the legal application to the TEE.
  • the processor is further configured to extract a PDU field in the legal verification code short message; and determine, from the PDU field, information of a legitimate application that uses the verification code.
  • the processor is further configured to: extract the legal sender information in the legal verification code short message; and determine, according to the legal sender information, the use of the verification from the information list of the legal application preset in the TEE.
  • the information of the legal application of the code includes: the legal sender information of the verification code short message and the legal application information of the verification code in the legal verification code short message.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

一种验证码处理方法及移动终端,通过可信执行环境TEE接收富执行环境REE发送的验证码获取请求,所述验证码获取请求中至少携带将要获取验证码的应用的信息;TEE判断所述验证码获取请求中携带的将要获取验证码的应用的信息与自身保存的使用所述验证码的合法应用的信息是否一致;如果是,则将所述验证码发送至所述REE。可见,与现有技术相比,终端在接收到验证码获取请求后,不是直接将验证码发送出去,而是在TEE判断REE发送的验证码获取请求中携带的将要获取验证码的应用的信息,与自身保存的使用所述验证码的合法应用的信息一致的情况下,才将验证码发送至所述REE,具有更高的安全性。

Description

一种验证码处理方法及移动终端 技术领域
本发明涉及通信技术领域,尤其涉及一种验证码处理方法及移动终端。
背景技术
随着移动终端的普及及其功能的丰富,移动终端的开放性越来越高,相对来说,移动终端中信息的安全问题也越来越受到重视,比如说,目前往移动终端上发送验证码验证用户权限的方式,已被广泛用于很多移动支付和登录的场景中。
然而现有技术在使用验证码的过程中,系统复制验证码之后,不管接收到任何类型的验证码获取请求(如验证码粘贴请求等),不经过任何判断都会将该验证码发送出去,这样一来,本应是敏感信息的验证码便可随意发送出去,导致验证码不安全,因此,现有技术中随意将验证码发送出去的方式的安全性不高。
发明内容
有鉴于此,本发明提供一种验证码处理方法及移动终端,目的在于解决现有技术中随意将验证码发送出去的方式的安全性不高的问题。
为了实现上述目的,本申请提供了以下技术方案:
本申请的第一方面提供了一种验证码处理方法,包括以下步骤:
可信执行环境TEE接收富执行环境REE发送的验证码获取请求,所述验证码获取请求中至少携带将要获取验证码的应用的信息;TEE判断所述验证码获取请求中携带的将要获取验证码的应用的信息与自身保存的使用所述验证码的合法应用的信息是否一致;如果是,则将所述验证码发送至所述REE。可见,与现有技术相比,终端在接收到验证码获取请求后,不是直接将验证码发送出去,而是在TEE判断REE发送的验证码获取请求中携带的将要获取验证码的应用的信息,与自身保存的使用所述验证码的合法应用的信息一致的情况下,才将验证码发送至所述REE,具有更高的安全性。
在一个实现方式中,在所述TEE接收富执行环境REE发送的验证码获取请求之后,还包括:TEE接收调制解调器Modem发送的合法验证码短信;TEE从所述合法验证码短信中提取验证码。由于Modem为终端与其它设备通信的底层系统,通过终端中的底层系统首先确定合法验证码短信之后,再发给TEE进行处理,能够保证第一时间对验证码短信进行识别,从而快速进入验证码处理流程。
在一个实现方式中,所述验证码的获取过程包括:TEE接收调制解调器Modem发送的合法验证码短信;所述TEE将所述合法验证码短信进行加密存储,获得加密的验证码短信,所述加密的验证码短信中包含以密文形式显示的验证码;所述TEE获取所述加密的验证码短信的存储索引,所述存储索引中记录有所述加密的验证码短信在存储空间中的存储位置;所述TEE将所述存储索引发送至REE;所述REE依据所述存储索引获取加密的验证码短信,并将所述加密的验证码短信添加到验证码获取请求中;所述TEE从所述REE发送的验证码获取请求中提取加密的验证码短信;所述TEE对所述加密的验证码短信进行解密,并从解密后的验证码短信中提取验证码。由于TEE将加密的验证码短信进行存储并将存储索引发送至REE之后,便可退出运行,直到接收到REE发送的验证码获取请求之后,再重新启动运行,从而节省了TEE的运行时间,减少了运行时的资源消耗。而且,TEE与REE相比,是运行在主处理器中的一种安全运行环境,将合法验证码短信在TEE中进行加密,再在TEE中进行解密,具有更高的安全性。
在一个实现方式中,在所述TEE接收调制解调器Modem发送的合法验证码短信之前,还包括:所述Modem接收验证码短信;所述Modem提取所述验证码短信中的发送方信息;所述Modem判断所述发送方信息是否是合法发送方信息;如果是,则所述Modem确定所述验证码短信为所述合法验证码短信。Modem在将验证码短信发送至TEE之前,首先对验证码短信的发送方的合法性进行验证,以进一步提高安全性。
在一个实现方式中,所述Modem判断所述发送方信息是否是合法发送方信息包括:所述Modem判断所述发送方信息是否存储在白名单列表中,如果是,则判定所述发送方信息是合法发送方信息,所述白名单列表中至少包括: 验证码短信的合法发送方信息。从而保证发送至TEE中的验证码短信的安全性。
在一个实现方式中,所述Modem判断所述发送方信息是否是合法发送方信息包括:所述Modem判断所述发送方信息是否未存储在黑名单列表中,如果是,则判定所述发送方信息是合法发送方信息,所述黑名单列表中至少包括:验证码短信的非法发送方信息。从而保证发送至TEE中的验证码短信的安全性。
在一个实现方式中,在所述TEE从所述合法验证码短信中提取验证码之前,还包括:所述TEE将所述合法验证码短信进行加密,得到加密的合法验证码短信,所述加密的合法验证码短信中包含所述验证码的密文;所述TEE将所述加密的合法验证码短信存储在所述REE的存储空间中;当所述REE接收到验证码查看请求之后,所述REE将储在所述REE的存储空间中的加密的合法验证码短信发送至所述TEE;所述TEE对所述加密的合法验证码短信进行解密,得到解密的合法验证码短信。由于TEE将加密的验证码短信存储在REE的存储空间中之后,便可退出运行,直到接收到REE发送的加密的合法验证码短信之后,再重新启动运行,从而节省了TEE的运行时间,减少了运行时的资源消耗。而且,TEE与REE相比,是运行在主处理器中的一种安全运行环境,将合法验证码短信在TEE中进行加密,再在TEE中进行解密,具有更高的安全性。另外,所述TEE将所述加密的合法验证码短信存储在所述REE的存储空间中,便于节省REE的存储空间。
在一个实现方式中,在所述TEE从所述合法验证码短信中提取验证码之前,还包括:所述TEE将所述合法验证码短信存储在所述TEE的存储空间中。由于TEE是运行在主处理器中的一种安全运行环境,将所述合法验证码短信存储在所述TEE的存储空间中,具有更高的安全性。
在一个实现方式中,所述白名单列表中还包括:使用所述合法验证码短信中的验证码的合法应用的信息;在所述TEE判断所述验证码获取请求中携带的将要获取验证码的应用的信息与自身保存的使用所述验证码的合法应用的信息是否一致之前,还包括:所述Modem依据合法验证码短信的合法发送方信息,从所述白名单列表中确定使用所述合法验证码短信中的验证码的合法应 用的信息;将所述合法应用的信息发送至TEE。使TEE依据此合法应用的信息,对发送验证码获取请求的应用的合法性进行验证,具有更高的安全性。
在一个实现方式中,在所述TEE判断所述验证码获取请求中携带的将要获取验证码的应用的信息与自身保存的使用所述验证码的合法应用的信息是否一致之前,还包括:所述TEE提取所述合法验证码短信中的PDU字段;所述TEE从所述PDU字段中确定使用所述验证码的合法应用的信息。从而依据此合法应用的信息,对发送验证码获取请求的应用的合法性进行验证,具有更高的安全性。
在一个实现方式中,在所述TEE判断所述验证码获取请求中携带的将要获取验证码的应用的信息与自身保存的使用所述验证码的合法应用的信息是否一致之前,还包括:所述TEE提取所述合法验证码短信中的合法发送方信息;所述TEE依据所述合法发送方信息,从预设在TEE中的合法应用的信息列表中确定使用所述验证码的合法应用的信息,所述预设在TEE中的合法应用的信息列表中至少包括:验证码短信的合法发送方信息与使用所述合法验证码短信中的验证码的合法应用的信息。从而依据此合法应用的信息,对发送验证码获取请求的应用的合法性进行验证,具有更高的安全性。
本申请的第二方面提供了一种移动终端,包括:
验证码获取请求接收模块,用于接收富执行环境REE发送的验证码获取请求,所述验证码获取请求中至少携带将要获取验证码的应用的信息;信息判断模块,用于判断所述验证码获取请求中携带的将要获取验证码的应用的信息与自身保存的使用所述验证码的合法应用的信息是否一致;验证码发送模块,用于在信息判断模块判断出所述验证码获取请求中携带的将要获取验证码的应用的信息与自身保存的使用所述验证码的合法应用的信息一致的情况下,将所述验证码发送至所述REE。可见,与现有技术相比,终端在接收到验证码获取请求后,不是直接将验证码发送出去,而是在TEE判断REE发送的验证码获取请求中携带的将要获取验证码的应用的信息,与自身保存的使用所述验证码的合法应用的信息一致的情况下,才将验证码发送至所述REE,具有更高的安全性。
在一个实现方式中,还包括:第一验证码获取模块,用于获取验证码;所 述第一验证码获取模块包括:第一合法验证码短信接收模块,用于接收调制解调器Modem发送的合法验证码短信;验证码提取模块,用于从所述合法验证码短信中提取验证码。由于Modem为终端与其它设备通信的底层系统,通过终端中的底层系统首先确定合法验证码短信之后,再发给TEE进行处理,能够保证第一时间对验证码短信进行识别,从而快速进入验证码处理流程。
在一个实现方式中,还包括:第二验证码获取模块,用于获取验证码;所述第二验证码获取模块包括:第二合法验证码短信接收模块,用于接收调制解调器Modem发送的合法验证码短信;加密存储模块,用于将所述合法验证码短信进行加密存储,获得加密的验证码短信,所述加密的验证码短信中包含以密文形式显示的验证码;存储索引获取模块,用于获取所述加密的验证码短信的存储索引,所述存储索引中记录有所述加密的验证码短信在存储空间中的存储位置;存储索引发送模块,用于将所述存储索引发送至REE;加密验证码短信获取模块,用于依据所述存储索引获取加密的验证码短信;加密验证码短信添加模块,用于将所述加密的验证码短信添加到验证码获取请求中;加密验证码短信提取模块,用于从所述REE发送的验证码获取请求中提取加密的验证码短信;加密验证码短信解密模块,用于对所述加密的验证码短信进行解密,并从解密后的验证码短信中提取验证码。由于TEE将加密的验证码短信进行存储并将存储索引发送至REE之后,便可退出运行,直到接收到REE发送的验证码获取请求之后,再重新启动运行,从而节省了TEE的运行时间,减少了运行时的资源消耗。而且,TEE与REE相比,是运行在主处理器中的一种安全运行环境,将合法验证码短信在TEE中进行加密,再在TEE中进行解密,具有更高的安全性。
在一个实现方式中,还包括:验证码短信接收模块,用于接收验证码短信;发送方信息提取模块,用于提取所述验证码短信中的发送方信息;发送方信息判断模块,用于判断所述发送方信息是否是合法发送方信息;合法验证码短信确定模块,用于在所述发送方信息判断模块判断所述发送方信息是合法发送方信息的情况下,确定所述验证码短信为所述合法验证码短信。在将验证码短信发送至TEE之前,首先对验证码短信的发送方的合法性进行验证,以进一步提高安全性。
在一个实现方式中,所述发送方信息判断模块包括:第一发送方信息判断子模块,用于判断所述发送方信息是否存储在白名单列表中;第一合法发送方信息判定模块,用于在第一发送方信息判断子模块判断所述发送方信息存储在白名单列表中的情况下,判定所述发送方信息是合法发送方信息,所述白名单列表中至少包括:验证码短信的合法发送方信息。从而保证发送至TEE中的验证码短信的安全性。
在一个实现方式中,所述发送方信息判断模块包括:第二发送方信息判断子模块,用于判断所述发送方信息是否未存储在黑名单列表中;第二合法发送方信息判定模块,用于在第二发送方信息判断子模块判断所述发送方信息未存储在黑名单列表中的情况下,判定所述发送方信息是合法发送方信息,所述黑名单列表中至少包括:验证码短信的非法发送方信息。从而保证发送至TEE中的验证码短信的安全性。
在一个实现方式中,还包括:第一加密模块,用于将所述合法验证码短信进行加密,得到加密的合法验证码短信,所述加密的合法验证码短信中包含所述验证码的密文;第一存储模块,用于将所述加密的合法验证码短信存储在所述REE的存储空间中;第一发送模块,用于当接收到验证码查看请求之后,将储在所述REE的存储空间中的加密的合法验证码短信发送至所述TEE;第一解密模块,用于对所述加密的合法验证码短信进行解密,得到解密的合法验证码短信。由于TEE将加密的验证码短信存储在REE的存储空间中之后,便可退出运行,直到接收到REE发送的加密的合法验证码短信之后,再重新启动运行,从而节省了TEE的运行时间,减少了运行时的资源消耗。而且,TEE与REE相比,是运行在主处理器中的一种安全运行环境,将合法验证码短信在TEE中进行加密,再在TEE中进行解密,具有更高的安全性。另外,所述TEE将所述加密的合法验证码短信存储在所述REE的存储空间中,便于节省REE的存储空间。
在一个实现方式中,还包括:第二存储模块,用于将所述合法验证码短信存储在所述TEE的存储空间中。由于TEE是运行在主处理器中的一种安全运行环境,将所述合法验证码短信存储在所述TEE的存储空间中,具有更高的安全性。
在一个实现方式中,还包括:第一信息确定模块,用于依据合法验证码短信的合法发送方信息,从所述白名单列表中确定使用所述合法验证码短信中的验证码的合法应用的信息;所述白名单列表中还包括:使用所述合法验证码短信中的验证码的合法应用的信息;第一信息发送模块,用于将所述合法应用的信息发送至TEE。使TEE依据此合法应用的信息,对发送验证码获取请求的应用的合法性进行验证,具有更高的安全性。
在一个实现方式中,还包括:PDU字段提取模块,用于提取所述合法验证码短信中的PDU字段;第二信息确定模块,用于从所述PDU字段中确定使用所述验证码的合法应用的信息。从而依据此合法应用的信息,对发送验证码获取请求的应用的合法性进行验证,具有更高的安全性。
在一个实现方式中,还包括:
合法发送方信息提取模块,用于提取所述合法验证码短信中的合法发送方信息;第三信息确定模块,用于依据所述合法发送方信息,从预设在TEE中的合法应用的信息列表中确定使用所述验证码的合法应用的信息,所述预设在TEE中的合法应用的信息列表中至少包括:验证码短信的合法发送方信息与使用所述合法验证码短信中的验证码的合法应用的信息。从而依据此合法应用的信息,对发送验证码获取请求的应用的合法性进行验证,具有更高的安全性。
本申请的第三方面提供了一种移动终端,包括:通信组件、存储器和处理器;所述存储器用于存储使用所述验证码的合法应用的信息、验证码、存储应用程序以及应用程序运行过程中产生的数据;所述通信组件用于接收至少携带将要获取验证码的应用的信息的验证码获取请求;以及在处理器判断所述验证码获取请求中携带的将要获取验证码的应用的信息与自身保存的使用所述验证码的合法应用的信息一致的情况下,发送所述验证码;所述处理器用于判断所述验证码获取请求中携带的将要获取验证码的应用的信息与自身保存的使用所述验证码的合法应用的信息是否一致。可见,与现有技术相比,移动终端中的通信组件在接收到验证码获取请求后,不是直接将验证码发送出去,而是通过处理器判断REE发送的验证码获取请求中携带的将要获取验证码的应用的信息,与自身存储器中保存的使用所述验证码的合法应用的信息一致的情况下,才通过通信组件将验证码发送至所述REE,具有更高的安全性。
在一个实现方式中,所述通信组件具体用于:接收调制解调器Modem发送的合法验证码短信;从所述合法验证码短信中提取验证码。由于Modem为终端与其它设备通信的底层系统,通过终端中的底层系统首先确定合法验证码短信之后,再发给TEE进行处理,能够保证第一时间对验证码短信进行识别,从而快速进入验证码处理流程。
在一个实现方式中,所述通信组件具体用于接收调制解调器Modem发送的合法验证码短信;所述处理器还用于将所述合法验证码短信进行加密存储,获得加密的验证码短信,所述加密的验证码短信中包含以密文形式显示的验证码;获取所述加密的验证码短信的存储索引,所述存储索引中记录有所述加密的验证码短信在存储空间中的存储位置;将所述存储索引发送至REE;依据所述存储索引获取加密的验证码短信,并将所述加密的验证码短信添加到验证码获取请求中;从所述REE发送的验证码获取请求中提取加密的验证码短信;对所述加密的验证码短信进行解密,并从解密后的验证码短信中提取验证码。由于TEE将加密的验证码短信进行存储并将存储索引发送至REE之后,便可退出运行,直到接收到REE发送的验证码获取请求之后,再重新启动运行,从而节省了TEE的运行时间,减少了运行时的资源消耗。而且,TEE与REE相比,是运行在主处理器中的一种安全运行环境,将合法验证码短信在TEE中进行加密,再在TEE中进行解密,具有更高的安全性。
在一个实现方式中,所述通信组件还用于接收验证码短信;所述处理器还用于提取所述验证码短信中的发送方信息;判断所述发送方信息是否是合法发送方信息;如果是,则确定所述验证码短信为所述合法验证码短信。Modem在将验证码短信发送至TEE之前,首先对验证码短信的发送方的合法性进行验证,以进一步提高安全性。
在一个实现方式中,所述处理器具体用于:
判断所述发送方信息是否存储在白名单列表中,如果是,则判定所述发送方信息是合法发送方信息,所述白名单列表中至少包括:验证码短信的合法发送方信息。从而保证发送至TEE中的验证码短信的安全性。
在一个实现方式中,所述处理器具体用于:
判断所述发送方信息是否未存储在黑名单列表中,如果是,则判定所述发 送方信息是合法发送方信息,所述黑名单列表中至少包括:验证码短信的非法发送方信息。从而保证发送至TEE中的验证码短信的安全性。
在一个实现方式中,所述处理器还用于将所述合法验证码短信进行加密,得到加密的合法验证码短信,所述加密的合法验证码短信中包含所述验证码的密文;将所述加密的合法验证码短信存储在所述REE的存储空间中;所述通信组件还用于当接收到验证码查看请求之后,将储在所述REE的存储空间中的加密的合法验证码短信发送至所述TEE;所述处理器还用于对所述加密的合法验证码短信进行解密,得到解密的合法验证码短信。由于TEE将加密的验证码短信存储在REE的存储空间中之后,便可退出运行,直到接收到REE发送的加密的合法验证码短信之后,再重新启动运行,从而节省了TEE的运行时间,减少了运行时的资源消耗。而且,TEE与REE相比,是运行在主处理器中的一种安全运行环境,将合法验证码短信在TEE中进行加密,再在TEE中进行解密,具有更高的安全性。另外,所述TEE将所述加密的合法验证码短信存储在所述REE的存储空间中,便于节省REE的存储空间。
在一个实现方式中,所述处理器还用于将所述合法验证码短信存储在所述TEE的存储空间中。由于TEE是运行在主处理器中的一种安全运行环境,将所述合法验证码短信存储在所述TEE的存储空间中,具有更高的安全性。
在一个实现方式中,所述处理器还用于依据合法验证码短信的合法发送方信息,从所述白名单列表中确定使用所述合法验证码短信中的验证码的合法应用的信息;所述白名单列表中还包括:使用所述合法验证码短信中的验证码的合法应用的信息;所述通信组件还用于将所述合法应用的信息发送至TEE。使TEE依据此合法应用的信息,对发送验证码获取请求的应用的合法性进行验证,具有更高的安全性。
在一个实现方式中,所述处理器还用于提取所述合法验证码短信中的PDU字段;从所述PDU字段中确定使用所述验证码的合法应用的信息。从而依据此合法应用的信息,对发送验证码获取请求的应用的合法性进行验证,具有更高的安全性。
在一个实现方式中,所述处理器还用于提取所述合法验证码短信中的合法发送方信息;依据所述合法发送方信息,从预设在TEE中的合法应用的信息 列表中确定使用所述验证码的合法应用的信息,所述预设在TEE中的合法应用的信息列表中至少包括:验证码短信的合法发送方信息与使用所述合法验证码短信中的验证码的合法应用的信息。从而依据此合法应用的信息,对发送验证码获取请求的应用的合法性进行验证,具有更高的安全性。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1所示为现有技术中公开的终端的结构示意图;
图2所示为本发明实施例中公开的终端的结构示意图;
图3所示为本发明实施例中公开的验证码处理方法的信令流程图;
图4所示为本发明实施例中公开的另一种验证码处理方法的信令流程图;
图5所示为本发明实施例中公开的终端的结构示意图;
图6所示为本发明实施例中公开的终端的硬件结构示意图。
具体实施方式
随着移动终端的普及及其功能的丰富,移动终端的开放性越来越高,相对来说,移动终端中信息的安全问题也越来越受到重视,比如说,目前往移动终端上发送验证码验证用户权限的方式,已被广泛用于很多移动支付和登录的场景中。由于移动支付和登录场景涉及很多用户的个人财产和隐私数据,故保护好验证码是一项非常值得重视的事。
图1所示为现有技术中公开的终端的结构示意图,包括:调制解调器(Modulator与Demodulator,Modem)以及丰富执行环境(Rich Execution Environment,REE),在现有技术中,移动终端在接收到验证码短信的时候,将所述验证码短信传递到调制解调器中进行信号转换,然后将经过信号转换之后的验证码传递到REE中进行处理,由于REE本身具有强大的数据处理能力,但是其安全性不高,在REE中接收到复制验证码请求之后,所有复制内容都保 存在剪贴板的缓存中,REE在接收到任何类型的粘贴请求后,不经过任何判断都会将该验证码呈现出来,这样一来,本应是敏感信息的验证码便可随意粘贴,导致验证码不安全,因此,如何提高对验证码进行复制粘贴过程的安全性,成为目前亟待解决的问题。
而本发明实施例为了解决上述现有技术中存在的问题,采用图2所示的本发明实施例中公开的终端的结构示意图,来执行对验证码的复制粘贴过程。图2终端中所示的操作系统中包括:调制解调器、可信执行环境(Trusted Execution Environment,TEE)以及REE,TEE是移动终端上与REE并存的运行环境,并且,TEE是运行在主处理器中的一种安全运行环境,TEE的安全启动过程是需要通过验证的,并且它的安全启动过程是与REE分离的。存储在TEE下的各个应用程序之间是相互独立的,而且各个应用程序之间不能在未授权的情况下互相访问,保证TEE下的应用程序的资源和数据的处理过程是在一个可信环境下执行的,从而为REE操作系统提供安全服务。TEE具有其自身的执行空间,比REE操作系统的安全级别更高。TEE并不是独立的物理安全芯片,而是与目前使用的应用处理器的硬件架构重叠在一起的安全架构。TEE所能访问的软硬件资源是与REE操作系统分离的,提供硬件支持的隔离。因此,与REE相比,TEE是一种安全性更高的执行环境。
下面将结合本发明实施例中的附图,对本发明实施例中的在TEE下执行的验证码复制粘贴的技术方案进行清楚、完整地描述。
如图3所示,为本发明实施例提供的一种验证码处理方法的具体过程,包括以下步骤:
S101:Modem接收短信;
S102:Modem判断所述短信是否是验证码短信;如果是,则执行S103,如果否,则将所述短信发给REE中,由REE中按照传统的短信处理流程进行处理。
需要说明的是,由于移动终端接收到的短信首先是要经由Modem进行处理,通过Modem判断所述短信是否是验证码短信的方式,能够保证第一时间对验证码短信进行识别,从而快速进入验证码处理流程。需要说明的是,本发明实施例中还可以在短信被发送至REE中进行处理之前的任意模块中执行判断 所述短信是否是验证码短信的步骤,从而避免验证码短信不能被及时识别出,而被发送至REE中按照传统的短信处理流程进行处理。
Modem通过提取短信内容,判断所述短信内容中是否包含验证码信息,如果是,则确定所述短信为验证码短息,判断所述短信内容中是否包含验证码信息的方式可以通过判断短信内容中是否包含标识该短信为验证码短信的特征关键字,例如:“验证码为:”、“动态密码为:”等,本发明实施例中还可以通过判断短信内容中的数字是否具有验证码特性,例如数字的个数以及数字的组合特性是否符合预设的验证码特性等,本发明实施例不做具体限定。
Modem还通过提取短信的发送方号码,判断所述短信的发送方号码是否为验证码短信对应的发送方号码,如果是,则确定所述短信为验证码短息,本发明实施例中并不限于以上判断方式。
S103:Modem提取所述验证码短信中的发送方信息;
S104:Modem判断所述发送方信息是否是合法发送方信息,如果是,则执行S105,如果否,则将所述验证码短信进行拦截,或者,将所述验证码短信发给REE,由REE中按照传统的短信处理流程进行处理,同时向用户提示该验证码短信是一条非法验证码短信。
可选的,所述Modem中可以预设有白名单,所述白名单中至少记录有合法的短信发送方信息,本发明实施例可以通过Modem中预设的白名单过滤掉非法的短信发送方发送过来的短信。所述合法的短信发送方信息可以为合法的短信发送方对应的电话号码(例如:合法的短信发送方为中国联通,则合法的短信发送方对应的电话号码为10010,10010022等),或者合法的短信发送方对应的发送地址等,本发明在此不做限定。即所述Modem判断所述发送方信息是否存储在白名单列表中,如果是,则判定所述发送方信息是合法发送方信息,所述白名单列表中至少包括:验证码短信的合法发送方信息;
可选的,所述Modem中可以预设有黑名单,所述黑名单中至少记录有非法的短信发送方信息,本发明实施例可以通过Modem中预设的黑名单过滤掉非法的短信发送方发送过来的验证码短信。所述非法的短信发送方信息可以为非法的短信发送方对应的电话号码,或者非法的短信发送方对应的发送地址等,本发明在此不做限定。即所述Modem判断所述发送方信息是否未存储在 黑名单列表中,如果是,则判定所述发送方信息是合法发送方信息,所述黑名单列表中至少包括:验证码短信的非法发送方信息。
S105:Modem确定所述验证码短信为合法验证码短信,并将所述合法验证码短信发送至TEE;
S106:TEE将所述合法验证码短信进行加密,得到加密的合法验证码短信;所述加密的合法验证码短信中包含验证码的密文。
S107:并将加密的合法验证码短信发送至REE,存储在REE下的存储空间中;
S108:REE接收到查看验证码请求;
S109:REE将存储在REE的存储空间中的加密的合法验证码短信发送给TEE;
S110:TEE对所述加密的合法验证码短信进行解密,得到解密的合法验证码短信;
需要说明的是,在得到解密的合法验证码短信之后,还包括:对解密的合法验证码短信进行显示,将解密后的验证码短信进行显示的方式可以为明文显示或者密文显示,本发明实施例不做具体限定。
可选的,TEE将加密的验证码短信存储在自身的存储空间中,从而提高验证码短信的安全性。
S111:TEE从所述解密的合法验证码短信中提取验证码,并确定使用所述验证码的合法应用的信息,并进行保存;
其中,所述合法应用的信息指的是非恶意并且是要使用该验证码的应用的应用信息,所述应用信息指的是能够唯一标识该非恶意并且是要使用该验证码的应用的信息。所述应用信息可以为:合法应用的域名信息、合法应用的安装包名、合法应用的安装包的签名信息、合法应用的安装证书、合法应用的哈希值等,本发明不做限定。
可选的,所述TEE将所述验证码和使用所述验证码的合法应用的信息存储在TEE下的存储空间中,保证验证码和使用所述验证码的合法应用的信息的安全性。
可选的,TEE确定使用所述验证码的合法应用的信息的方式为:
所述Modem依据合法验证码短信的合法发送方信息,从所述白名单列表中确定使用所述合法验证码短信中的验证码的合法应用的信息;将所述合法应用的信息发送至TEE;所述白名单列表中还包括:使用所述合法验证码短信中的验证码的合法应用的信息;
或者;TEE提取所述合法验证码短信中的协议数据单元(Protocol Data Unit,PDU)字段;TEE从所述PDU字段中确定使用所述验证码的合法应用的信息;
或者,TEE提取所述合法验证码短信中的合法发送方信息;TEE依据所述合法发送方信息,从预设在TEE中的合法应用的信息列表中确定使用所述验证码的合法应用的信息,所述预设在TEE中的合法应用的信息列表中至少包括:验证码短信的合法发送方信息与使用所述合法验证码短信中的验证码的合法应用的信息。
S112:TEE接收REE下发送的验证码获取请求,所述验证码获取请求中携带将要获取所述验证码的应用的信息;
S113:TEE判断所述验证码获取请求中携带的将要获取所述验证码的应用的信息与自身保存的使用所述验证码的合法应用的信息是否一致;如果是,则执行S114;如果否,则拒绝REE下发送的验证码获取请求。
S114:TEE将所述验证码发送至REE。
可选的,本发明实施例中,TEE是将所述验证码以明文的方式或者密文的方式发送至REE。
如图4所示,为本发明实施例提供的另一种验证码处理方法的具体过程,包括以下步骤:
S201:Modem接收短信;
S202:Modem判断所述短信是否是验证码短信;如果是,则执行S203,如果否,则将所述短信发给REE中,由REE中按照传统的短信处理流程进行处理。
S203:Modem提取所述验证码短信中的发送方信息;
S204:Modem判断所述发送方信息是否是合法发送方信息,如果是,则执行S205,如果否,则将所述验证码短信进行拦截,或者,将所述验证码短信 发给REE,由REE中按照传统的短信处理流程进行处理,同时向用户提示该验证码短信是一条非法验证码短信。
需要说明的是,所述Modem判断所述发送方信息是否是合法发送方信息包括:
所述Modem判断所述发送方信息是否存储在白名单列表中,如果是,则判定所述发送方信息是合法发送方信息,所述白名单列表中至少包括:验证码短信的合法发送方信息;
或者,所述Modem判断所述发送方信息是否未存储在黑名单列表中,如果是,则判定所述发送方信息是合法发送方信息,所述黑名单列表中至少包括:验证码短信的非法发送方信息。
S205:Modem确定所述验证码短信为合法验证码短信,并将所述合法验证码短信发送至TEE;
S206:所述TEE将所述合法验证码短信进行加密存储,获得加密的验证码短信,所述加密的验证码短信中包含以密文形式显示的验证码;
本发明实施例中,TEE将验证码短信存储在REE下的存储空间中或者TEE下的存储空间中,本发明实施例不做具体限定。
S207:所述TEE获取所述加密的验证码短信的存储索引,所述存储索引中记录有所述加密的验证码短信在存储空间中的存储位置;
S208:所述TEE将所述存储索引发送至REE;
需要说明的是,TEE将所述存储索引发送至REE之后,可以退出运行,直到接收到REE下发送的验证码获取请求之后,再重新启动运行,依据验证码获取请求中的加密的验证码短信确定使用所述验证码的合法应用的信息,可以节省TEE的运行时间。
S209:REE接收查看验证码请求;
S210:REE依据从TEE中获取的存储索引,在存储空间中获取加密的验证码短信,并依据加密的验证码短信以及将要获取验证码的应用的信息生成验证码获取请求;
S211:REE将验证码获取请求发送至TEE;
所述验证码获取请求中至少携带将要获取验证码的应用的信息以及加密 的验证码短信。
S212:TEE从验证码获取请求中提取加密的验证码短信,并对所述加密的验证码短信进行解密,从解密后的验证码短信中提取验证码;
S213:TEE确定使用所述验证码的合法应用的信息,并进行保存;
其中,TEE确定使用所述验证码的合法应用的信息的方式为:
所述Modem依据合法验证码短信的合法发送方信息,从所述白名单列表中确定使用所述合法验证码短信中的验证码的合法应用的信息;将所述合法应用的信息发送至TEE;所述白名单列表中还包括:使用所述合法验证码短信中的验证码的合法应用的信息;
或者;TEE提取所述合法验证码短信中的PDU字段;TEE从所述PDU字段中确定使用所述验证码的合法应用的信息;
或者,TEE提取所述合法验证码短信中的合法发送方信息;TEE依据所述合法发送方信息,从预设在TEE中的合法应用的信息列表中确定使用所述验证码的合法应用的信息,所述预设在TEE中的合法应用的信息列表中至少包括:验证码短信的合法发送方信息与使用所述合法验证码短信中的验证码的合法应用的信息。
S214:TEE判断所述验证码获取请求中携带的将要获取验证码的应用的信息与自身保存的使用所述验证码的合法应用的信息是否一致;如果是,则执行S215;如果否,则TEE拒绝REE下发送的验证码获取请求。
S215:将所述验证码发送至所述REE;
可选的,本发明实施例中,TEE是将所述验证码以明文的方式或者密文的方式发送至REE。
可选的,所述验证码处理装置将所述验证码和使用所述验证码的合法应用的信息存储在TEE下的存储空间中,保证验证码和使用所述验证码的合法应用的信息的安全性。
可选的,所述验证码的合法应用的信息包括:合法应用的域名信息、合法应用的安装包名、合法应用的安装包的签名信息、合法应用的安装证书、哈希值等,本发明不做限定。
图5为本申请的实施例公开的一种移动终端,包括验证码获取请求接收模 块、信息判断模块以及验证码发送模块;具体的,信息判断模块可以设置在TEE中,验证码获取请求接收模块和验证码发送模块可以设置在终端的基带通信系统中。
验证码获取请求接收模块,用于接收富执行环境REE发送的验证码获取请求,所述验证码获取请求中至少携带将要获取验证码的应用的信息;
信息判断模块,用于判断所述验证码获取请求中携带的将要获取验证码的应用的信息与自身保存的使用所述验证码的合法应用的信息是否一致;
验证码发送模块,用于在信息判断模块判断出所述验证码获取请求中携带的将要获取验证码的应用的信息与自身保存的使用所述验证码的合法应用的信息一致的情况下,将所述验证码发送至所述REE。
还包括:第一验证码获取模块,用于获取验证码;
所述第一验证码获取模块包括:
第一合法验证码短信接收模块,用于接收调制解调器Modem发送的合法验证码短信;
验证码提取模块,用于从所述合法验证码短信中提取验证码。
还包括:第二验证码获取模块,用于获取验证码;
所述第二验证码获取模块包括:
第二合法验证码短信接收模块,用于接收调制解调器Modem发送的合法验证码短信;
加密存储模块,用于将所述合法验证码短信进行加密存储,获得加密的验证码短信,所述加密的验证码短信中包含以密文形式显示的验证码;
存储索引获取模块,用于获取所述加密的验证码短信的存储索引,所述存储索引中记录有所述加密的验证码短信在存储空间中的存储位置;
存储索引发送模块,用于将所述存储索引发送至REE;
加密验证码短信获取模块,用于依据所述存储索引获取加密的验证码短信;
加密验证码短信添加模块,用于将所述加密的验证码短信添加到验证码获取请求中;
加密验证码短信提取模块,用于从所述REE发送的验证码获取请求中提 取加密的验证码短信;
加密验证码短信解密模块,用于对所述加密的验证码短信进行解密,并从解密后的验证码短信中提取验证码。
还包括:
验证码短信接收模块,用于接收验证码短信;
发送方信息提取模块,用于提取所述验证码短信中的发送方信息;
发送方信息判断模块,用于判断所述发送方信息是否是合法发送方信息;
合法验证码短信确定模块,用于在所述发送方信息判断模块判断所述发送方信息是合法发送方信息的情况下,确定所述验证码短信为所述合法验证码短信。
所述发送方信息判断模块包括:
第一发送方信息判断子模块,用于判断所述发送方信息是否存储在白名单列表中;
第一合法发送方信息判定模块,用于在第一发送方信息判断子模块判断所述发送方信息存储在白名单列表中的情况下,判定所述发送方信息是合法发送方信息,所述白名单列表中至少包括:验证码短信的合法发送方信息。
所述发送方信息判断模块包括:
第二发送方信息判断子模块,用于判断所述发送方信息是否未存储在黑名单列表中;
第二合法发送方信息判定模块,用于在第二发送方信息判断子模块判断所述发送方信息未存储在黑名单列表中的情况下,判定所述发送方信息是合法发送方信息,所述黑名单列表中至少包括:验证码短信的非法发送方信息。
还包括:
第一加密模块,用于将所述合法验证码短信进行加密,得到加密的合法验证码短信,所述加密的合法验证码短信中包含所述验证码的密文;
第一存储模块,用于将所述加密的合法验证码短信存储在所述REE的存储空间中;
第一发送模块,用于当接收到验证码查看请求之后,将储在所述REE的存储空间中的加密的合法验证码短信发送至所述TEE;
第一解密模块,用于对所述加密的合法验证码短信进行解密,得到解密的合法验证码短信。
还包括:
第二存储模块,用于将所述合法验证码短信存储在所述TEE的存储空间中。
还包括:
第一信息确定模块,用于依据合法验证码短信的合法发送方信息,从所述白名单列表中确定使用所述合法验证码短信中的验证码的合法应用的信息;所述白名单列表中还包括:使用所述合法验证码短信中的验证码的合法应用的信息;
第一信息发送模块,用于将所述合法应用的信息发送至TEE。
还包括:
PDU字段提取模块,用于提取所述合法验证码短信中的PDU字段;
第二信息确定模块,用于从所述PDU字段中确定使用所述验证码的合法应用的信息。
还包括:
合法发送方信息提取模块,用于提取所述合法验证码短信中的合法发送方信息;
第三信息确定模块,用于依据所述合法发送方信息,从预设在TEE中的合法应用的信息列表中确定使用所述验证码的合法应用的信息,所述预设在TEE中的合法应用的信息列表中至少包括:验证码短信的合法发送方信息与使用所述合法验证码短信中的验证码的合法应用的信息。
图6为本申请的实施例公开的一种移动终端,包括通信组件、存储器和处理器。
所述存储器用于存储使用所述验证码的合法应用的信息、验证码、存储应用程序以及应用程序运行过程中产生的数据;
所述通信组件用于接收至少携带将要获取验证码的应用的信息的验证码获取请求;以及在处理器判断所述验证码获取请求中携带的将要获取验证码的应用的信息与自身保存的使用所述验证码的合法应用的信息一致的情况下,发 送所述验证码;
所述处理器用于判断所述验证码获取请求中携带的将要获取验证码的应用的信息与自身保存的使用所述验证码的合法应用的信息是否一致。
具体的,所述通信组件用于:接收调制解调器Modem发送的合法验证码短信;从所述合法验证码短信中提取验证码。
具体的,所述通信组件用于接收调制解调器Modem发送的合法验证码短信;所述处理器还用于将所述合法验证码短信进行加密存储,获得加密的验证码短信,所述加密的验证码短信中包含以密文形式显示的验证码;获取所述加密的验证码短信的存储索引,所述存储索引中记录有所述加密的验证码短信在存储空间中的存储位置;将所述存储索引发送至REE;依据所述存储索引获取加密的验证码短信,并将所述加密的验证码短信添加到验证码获取请求中;从所述REE发送的验证码获取请求中提取加密的验证码短信;对所述加密的验证码短信进行解密,并从解密后的验证码短信中提取验证码。
进一步的,所述通信组件还用于接收验证码短信;所述处理器还用于提取所述验证码短信中的发送方信息;判断所述发送方信息是否是合法发送方信息;如果是,则确定所述验证码短信为所述合法验证码短信。
具体的,所述处理器用于:
判断所述发送方信息是否存储在白名单列表中,如果是,则判定所述发送方信息是合法发送方信息,所述白名单列表中至少包括:验证码短信的合法发送方信息。
具体的,所述处理器用于:
判断所述发送方信息是否未存储在黑名单列表中,如果是,则判定所述发送方信息是合法发送方信息,所述黑名单列表中至少包括:验证码短信的非法发送方信息。
进一步的,所述处理器还用于将所述合法验证码短信进行加密,得到加密的合法验证码短信,所述加密的合法验证码短信中包含所述验证码的密文;将所述加密的合法验证码短信存储在所述REE的存储空间中;所述通信组件还用于当接收到验证码查看请求之后,将储在所述REE的存储空间中的加密的合法验证码短信发送至所述TEE;所述处理器还用于对所述加密的合法验证码 短信进行解密,得到解密的合法验证码短信。
进一步的,所述处理器还用于将所述合法验证码短信存储在所述TEE的存储空间中。
进一步的,所述处理器还用于依据合法验证码短信的合法发送方信息,从所述白名单列表中确定使用所述合法验证码短信中的验证码的合法应用的信息;所述白名单列表中还包括:使用所述合法验证码短信中的验证码的合法应用的信息;所述通信组件还用于将所述合法应用的信息发送至TEE。
进一步的,所述处理器还用于提取所述合法验证码短信中的PDU字段;从所述PDU字段中确定使用所述验证码的合法应用的信息。
进一步的,所述处理器还用于提取所述合法验证码短信中的合法发送方信息;依据所述合法发送方信息,从预设在TEE中的合法应用的信息列表中确定使用所述验证码的合法应用的信息,所述预设在TEE中的合法应用的信息列表中至少包括:验证码短信的合法发送方信息与使用所述合法验证码短信中的验证码的合法应用的信息。
以上功能的具体实现过程可以参见图3与图4。
本说明书中各个实施例采用递进的方式描述,每个实施例重点说明的都是与其它实施例的不同之处,各个实施例之间相同或相似部分互相参见即可。
对所公开的实施例的上述说明,使本领域专业技术人员能够实现或使用本发明。对这些实施例的多种修改对本领域的专业技术人员来说将是显而易见的,本文中所定义的一般原理可以在不脱离本发明的范围的情况下,在其它实施例中实现。因此,本发明将不会被限制于本文所示的这些实施例,而是要符合与本文所公开的原理和新颖特点相一致的最宽的范围。

Claims (33)

  1. 一种验证码处理方法,其特征在于,包括:
    可信执行环境TEE接收富执行环境REE发送的验证码获取请求,所述验证码获取请求中至少携带将要获取验证码的应用的信息;
    TEE判断所述验证码获取请求中携带的将要获取验证码的应用的信息与自身保存的使用所述验证码的合法应用的信息是否一致;
    如果是,则将所述验证码发送至所述REE。
  2. 根据权利要求1所述的方法,其特征在于,在所述TEE接收富执行环境REE发送的验证码获取请求之后,还包括:
    TEE接收调制解调器Modem发送的合法验证码短信;
    TEE从所述合法验证码短信中提取验证码。
  3. 根据权利要求1所述的方法,其特征在于,所述验证码的获取过程包括:
    TEE接收调制解调器Modem发送的合法验证码短信;
    所述TEE将所述合法验证码短信进行加密存储,获得加密的验证码短信,所述加密的验证码短信中包含以密文形式显示的验证码;
    所述TEE获取所述加密的验证码短信的存储索引,所述存储索引中记录有所述加密的验证码短信在存储空间中的存储位置;
    所述TEE将所述存储索引发送至REE;
    所述REE依据所述存储索引获取加密的验证码短信,并将所述加密的验证码短信添加到验证码获取请求中;
    所述TEE从所述REE发送的验证码获取请求中提取加密的验证码短信;
    所述TEE对所述加密的验证码短信进行解密,并从解密后的验证码短信中提取验证码。
  4. 根据权利要求2或3所述的方法,其特征在于,在所述TEE接收调制解调器Modem发送的合法验证码短信之前,还包括:
    所述Modem接收验证码短信;
    所述Modem提取所述验证码短信中的发送方信息;
    所述Modem判断所述发送方信息是否是合法发送方信息;
    如果是,则所述Modem确定所述验证码短信为所述合法验证码短信。
  5. 根据权利要求4所述的方法,其特征在于,所述Modem判断所述发送方信息是否是合法发送方信息包括:
    所述Modem判断所述发送方信息是否存储在白名单列表中,如果是,则判定所述发送方信息是合法发送方信息,所述白名单列表中至少包括:验证码短信的合法发送方信息。
  6. 根据权利要求4所述的方法,其特征在于,所述Modem判断所述发送方信息是否是合法发送方信息包括:
    所述Modem判断所述发送方信息是否未存储在黑名单列表中,如果是,则判定所述发送方信息是合法发送方信息,所述黑名单列表中至少包括:验证码短信的非法发送方信息。
  7. 根据权利要求2所述的方法,其特征在于,在所述TEE从所述合法验证码短信中提取验证码之前,还包括:
    所述TEE将所述合法验证码短信进行加密,得到加密的合法验证码短信,所述加密的合法验证码短信中包含所述验证码的密文;
    所述TEE将所述加密的合法验证码短信存储在所述REE的存储空间中;
    当所述REE接收到验证码查看请求之后,所述REE将储在所述REE的存储空间中的加密的合法验证码短信发送至所述TEE;
    所述TEE对所述加密的合法验证码短信进行解密,得到解密的合法验证码短信。
  8. 根据权利要求2所述的方法,其特征在于,在所述TEE从所述合法验证码短信中提取验证码之前,还包括:
    所述TEE将所述合法验证码短信存储在所述TEE的存储空间中。
  9. 根据权利要求1-3任意一项所述的方法,其特征在于,所述白名单列表中还包括:使用所述合法验证码短信中的验证码的合法应用的信息;
    在所述TEE判断所述验证码获取请求中携带的将要获取验证码的应用的信息与自身保存的使用所述验证码的合法应用的信息是否一致之前,还包括:
    所述Modem依据合法验证码短信的合法发送方信息,从所述白名单列表 中确定使用所述合法验证码短信中的验证码的合法应用的信息;
    将所述合法应用的信息发送至TEE。
  10. 根据权利要求1-3任意一项所述的方法,其特征在于,在所述TEE判断所述验证码获取请求中携带的将要获取验证码的应用的信息与自身保存的使用所述验证码的合法应用的信息是否一致之前,还包括:
    所述TEE提取所述合法验证码短信中的协议数据单元PDU字段;
    所述TEE从所述PDU字段中确定使用所述验证码的合法应用的信息。
  11. 根据权利要求1-3任意一项所述的方法,其特征在于,在所述TEE判断所述验证码获取请求中携带的将要获取验证码的应用的信息与自身保存的使用所述验证码的合法应用的信息是否一致之前,还包括:
    所述TEE提取所述合法验证码短信中的合法发送方信息;
    所述TEE依据所述合法发送方信息,从预设在TEE中的合法应用的信息列表中确定使用所述验证码的合法应用的信息,所述预设在TEE中的合法应用的信息列表中至少包括:验证码短信的合法发送方信息与使用所述合法验证码短信中的验证码的合法应用的信息。
  12. 一种移动终端,其特征在于,包括:
    验证码获取请求接收模块,用于接收富执行环境REE发送的验证码获取请求,所述验证码获取请求中至少携带将要获取验证码的应用的信息;
    信息判断模块,用于判断所述验证码获取请求中携带的将要获取验证码的应用的信息与自身保存的使用所述验证码的合法应用的信息是否一致;
    验证码发送模块,用于在信息判断模块判断出所述验证码获取请求中携带的将要获取验证码的应用的信息与自身保存的使用所述验证码的合法应用的信息一致的情况下,将所述验证码发送至所述REE。
  13. 根据权利要求12所述的移动终端,其特征在于,还包括:第一验证码获取模块,用于获取验证码;
    所述第一验证码获取模块包括:
    第一合法验证码短信接收模块,用于接收调制解调器Modem发送的合法验证码短信;
    验证码提取模块,用于从所述合法验证码短信中提取验证码。
  14. 根据权利要求12所述的移动终端,其特征在于,还包括:第二验证码获取模块,用于获取验证码;
    所述第二验证码获取模块包括:
    第二合法验证码短信接收模块,用于接收调制解调器Modem发送的合法验证码短信;
    加密存储模块,用于将所述合法验证码短信进行加密存储,获得加密的验证码短信,所述加密的验证码短信中包含以密文形式显示的验证码;
    存储索引获取模块,用于获取所述加密的验证码短信的存储索引,所述存储索引中记录有所述加密的验证码短信在存储空间中的存储位置;
    存储索引发送模块,用于将所述存储索引发送至REE;
    加密验证码短信获取模块,用于依据所述存储索引获取加密的验证码短信;
    加密验证码短信添加模块,用于将所述加密的验证码短信添加到验证码获取请求中;
    加密验证码短信提取模块,用于从所述REE发送的验证码获取请求中提取加密的验证码短信;
    加密验证码短信解密模块,用于对所述加密的验证码短信进行解密,并从解密后的验证码短信中提取验证码。
  15. 根据权利要求13或14所述的移动终端,其特征在于,还包括:
    验证码短信接收模块,用于接收验证码短信;
    发送方信息提取模块,用于提取所述验证码短信中的发送方信息;
    发送方信息判断模块,用于判断所述发送方信息是否是合法发送方信息;
    合法验证码短信确定模块,用于在所述发送方信息判断模块判断所述发送方信息是合法发送方信息的情况下,确定所述验证码短信为所述合法验证码短信。
  16. 根据权利要求15所述的移动终端,其特征在于,所述发送方信息判断模块包括:
    第一发送方信息判断子模块,用于判断所述发送方信息是否存储在白名单列表中;
    第一合法发送方信息判定模块,用于在第一发送方信息判断子模块判断所述发送方信息存储在白名单列表中的情况下,判定所述发送方信息是合法发送方信息,所述白名单列表中至少包括:验证码短信的合法发送方信息。
  17. 根据权利要求15所述的移动终端,其特征在于,所述发送方信息判断模块包括:
    第二发送方信息判断子模块,用于判断所述发送方信息是否未存储在黑名单列表中;
    第二合法发送方信息判定模块,用于在第二发送方信息判断子模块判断所述发送方信息未存储在黑名单列表中的情况下,判定所述发送方信息是合法发送方信息,所述黑名单列表中至少包括:验证码短信的非法发送方信息。
  18. 根据权利要求13所述的移动终端,其特征在于,还包括:
    第一加密模块,用于将所述合法验证码短信进行加密,得到加密的合法验证码短信,所述加密的合法验证码短信中包含所述验证码的密文;
    第一存储模块,用于将所述加密的合法验证码短信存储在所述REE的存储空间中;
    第一发送模块,用于当接收到验证码查看请求之后,将储在所述REE的存储空间中的加密的合法验证码短信发送至所述TEE;
    第一解密模块,用于对所述加密的合法验证码短信进行解密,得到解密的合法验证码短信。
  19. 根据权利要求13所述的移动终端,其特征在于,还包括:
    第二存储模块,用于将所述合法验证码短信存储在所述TEE的存储空间中。
  20. 根据权利要求12-14任一项所述的移动终端,其特征在于,还包括:
    第一信息确定模块,用于依据合法验证码短信的合法发送方信息,从所述白名单列表中确定使用所述合法验证码短信中的验证码的合法应用的信息;所述白名单列表中还包括:使用所述合法验证码短信中的验证码的合法应用的信息;
    第一信息发送模块,用于将所述合法应用的信息发送至TEE。
  21. 根据权利要求12-14任一项所述的移动终端,其特征在于,还包括:
    PDU字段提取模块,用于提取所述合法验证码短信中的PDU字段;
    第二信息确定模块,用于从所述PDU字段中确定使用所述验证码的合法应用的信息。
  22. 根据权利要求12-14任一项所述的移动终端,其特征在于,还包括:
    合法发送方信息提取模块,用于提取所述合法验证码短信中的合法发送方信息;
    第三信息确定模块,用于依据所述合法发送方信息,从预设在TEE中的合法应用的信息列表中确定使用所述验证码的合法应用的信息,所述预设在TEE中的合法应用的信息列表中至少包括:验证码短信的合法发送方信息与使用所述合法验证码短信中的验证码的合法应用的信息。
  23. 一种移动终端,其特征在于,包括:通信组件、存储器和处理器;
    所述存储器用于存储使用所述验证码的合法应用的信息、验证码、存储应用程序以及应用程序运行过程中产生的数据;
    所述通信组件用于接收至少携带将要获取验证码的应用的信息的验证码获取请求;以及在处理器判断所述验证码获取请求中携带的将要获取验证码的应用的信息与自身保存的使用所述验证码的合法应用的信息一致的情况下,发送所述验证码;
    所述处理器用于判断所述验证码获取请求中携带的将要获取验证码的应用的信息与自身保存的使用所述验证码的合法应用的信息是否一致。
  24. 根据权利要求23所述的移动终端,其特征在于,所述通信组件具体用于:接收调制解调器Modem发送的合法验证码短信;从所述合法验证码短信中提取验证码。
  25. 根据权利要求23所述的移动终端,其特征在于,所述通信组件具体用于接收调制解调器Modem发送的合法验证码短信;所述处理器还用于将所述合法验证码短信进行加密存储,获得加密的验证码短信,所述加密的验证码短信中包含以密文形式显示的验证码;获取所述加密的验证码短信的存储索引,所述存储索引中记录有所述加密的验证码短信在存储空间中的存储位置;将所述存储索引发送至REE;依据所述存储索引获取加密的验证码短信,并将所述加密的验证码短信添加到验证码获取请求中;从所述REE发送的验证 码获取请求中提取加密的验证码短信;对所述加密的验证码短信进行解密,并从解密后的验证码短信中提取验证码。
  26. 根据权利要求24或25所述的移动终端,其特征在于,所述通信组件还用于接收验证码短信;所述处理器还用于提取所述验证码短信中的发送方信息;判断所述发送方信息是否是合法发送方信息;如果是,则确定所述验证码短信为所述合法验证码短信。
  27. 根据权利要求26所述的移动终端,其特征在于,所述处理器具体用于:
    判断所述发送方信息是否存储在白名单列表中,如果是,则判定所述发送方信息是合法发送方信息,所述白名单列表中至少包括:验证码短信的合法发送方信息。
  28. 根据权利要求26所述的移动终端,其特征在于,所述处理器具体用于:
    判断所述发送方信息是否未存储在黑名单列表中,如果是,则判定所述发送方信息是合法发送方信息,所述黑名单列表中至少包括:验证码短信的非法发送方信息。
  29. 根据权利要求24所述的移动终端,其特征在于,
    所述处理器还用于将所述合法验证码短信进行加密,得到加密的合法验证码短信,所述加密的合法验证码短信中包含所述验证码的密文;将所述加密的合法验证码短信存储在所述REE的存储空间中;所述通信组件还用于当接收到验证码查看请求之后,将储在所述REE的存储空间中的加密的合法验证码短信发送至所述TEE;所述处理器还用于对所述加密的合法验证码短信进行解密,得到解密的合法验证码短信。
  30. 根据权利要求24所述的移动终端,其特征在于,所述处理器还用于将所述合法验证码短信存储在所述TEE的存储空间中。
  31. 根据权利要求23-25任一项所述的移动终端,其特征在于,
    所述处理器还用于依据合法验证码短信的合法发送方信息,从所述白名单列表中确定使用所述合法验证码短信中的验证码的合法应用的信息;所述白名单列表中还包括:使用所述合法验证码短信中的验证码的合法应用的信息;所 述通信组件还用于将所述合法应用的信息发送至TEE。
  32. 根据权利要求23-25任一项所述的移动终端,其特征在于,
    所述处理器还用于提取所述合法验证码短信中的PDU字段;从所述PDU字段中确定使用所述验证码的合法应用的信息。
  33. 根据权利要求23-25任一项所述的移动终端,其特征在于,
    所述处理器还用于提取所述合法验证码短信中的合法发送方信息;依据所述合法发送方信息,从预设在TEE中的合法应用的信息列表中确定使用所述验证码的合法应用的信息,所述预设在TEE中的合法应用的信息列表中至少包括:验证码短信的合法发送方信息与使用所述合法验证码短信中的验证码的合法应用的信息。
PCT/CN2016/101899 2016-10-12 2016-10-12 一种验证码处理方法及移动终端 WO2018068228A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2016/101899 WO2018068228A1 (zh) 2016-10-12 2016-10-12 一种验证码处理方法及移动终端
CN201680089629.5A CN109792436B (zh) 2016-10-12 2016-10-12 一种验证码处理方法及移动终端

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/101899 WO2018068228A1 (zh) 2016-10-12 2016-10-12 一种验证码处理方法及移动终端

Publications (1)

Publication Number Publication Date
WO2018068228A1 true WO2018068228A1 (zh) 2018-04-19

Family

ID=61905080

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/101899 WO2018068228A1 (zh) 2016-10-12 2016-10-12 一种验证码处理方法及移动终端

Country Status (2)

Country Link
CN (1) CN109792436B (zh)
WO (1) WO2018068228A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113407959B (zh) * 2021-06-11 2023-04-14 维沃移动通信(杭州)有限公司 操作执行方法、装置及电子设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100269149A1 (en) * 2007-12-18 2010-10-21 Electronics And Telecommunications Research Institute Method of web service and its apparatus
CN105307137A (zh) * 2015-09-18 2016-02-03 小米科技有限责任公司 短信读取方法及装置
CN105376204A (zh) * 2014-08-28 2016-03-02 宇龙计算机通信科技(深圳)有限公司 用户终端和权限授予方法及其系统
CN105429760A (zh) * 2015-12-01 2016-03-23 神州融安科技(北京)有限公司 一种基于tee的数字证书的身份验证方法及系统

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140075502A1 (en) * 2012-09-11 2014-03-13 Selim Aissi Resource management of execution environments
CN103856485B (zh) * 2014-02-14 2017-05-10 武汉天喻信息产业股份有限公司 可信用户界面安全指示器的初始化系统及方法
CN104700268B (zh) * 2015-03-30 2018-10-16 中科创达软件股份有限公司 一种移动支付方法及移动设备
CN105512576A (zh) * 2015-12-14 2016-04-20 联想(北京)有限公司 一种数据安全存储的方法及电子设备
CN105975867B (zh) * 2016-04-28 2018-06-12 东莞市华睿电子科技有限公司 一种数据处理方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100269149A1 (en) * 2007-12-18 2010-10-21 Electronics And Telecommunications Research Institute Method of web service and its apparatus
CN105376204A (zh) * 2014-08-28 2016-03-02 宇龙计算机通信科技(深圳)有限公司 用户终端和权限授予方法及其系统
CN105307137A (zh) * 2015-09-18 2016-02-03 小米科技有限责任公司 短信读取方法及装置
CN105429760A (zh) * 2015-12-01 2016-03-23 神州融安科技(北京)有限公司 一种基于tee的数字证书的身份验证方法及系统

Also Published As

Publication number Publication date
CN109792436A (zh) 2019-05-21
CN109792436B (zh) 2021-08-03

Similar Documents

Publication Publication Date Title
CN107743133B (zh) 移动终端及其基于可信安全环境的访问控制方法和系统
CN109361668B (zh) 一种数据可信传输方法
WO2016011778A1 (zh) 数据处理的方法和装置
WO2015180691A1 (zh) 验证信息的密钥协商方法及装置
WO2021114891A1 (zh) 密钥加密方法、解密方法及数据加密方法、解密方法
US9762567B2 (en) Wireless communication of a user identifier and encrypted time-sensitive data
WO2019085531A1 (zh) 一种终端联网认证的方法和装置
US20110252229A1 (en) Securing passwords against dictionary attacks
CN106899571B (zh) 信息交互方法及装置
US20040098591A1 (en) Secure hardware device authentication method
WO2015180689A1 (zh) 验证信息的获取方法及装置
WO2017147890A1 (zh) 一种验证码短信显示方法及移动终端
US20240031129A1 (en) Data encryption method, data decryption method, terminal, and storage medium
WO2021051941A1 (zh) 一种信息处理方法及装置
WO2022111187A1 (zh) 终端认证方法、装置、计算机设备及存储介质
CN105704690A (zh) 基于手机数字指纹验证的短信隐密通信的方法及系统
WO2015117523A1 (zh) 访问控制方法及装置
WO2015158228A1 (zh) 一种服务器、用户设备以及用户设备与服务器的交互方法
US11288381B2 (en) Calculation device, calculation method, calculation program and calculation system
WO2008053279A1 (en) Logging on a user device to a server
KR101358375B1 (ko) 스미싱 방지를 위한 문자메시지 보안 시스템 및 방법
CN111241492A (zh) 一种产品多租户安全授信方法、系统及电子设备
CN112995204B (zh) ProtonMail加密邮件的安全读取方法、装置、设备及存储介质
CN112328415A (zh) 接口调用方法、装置、计算机设备和可读存储介质
CN117040857A (zh) 一种增强授权码安全性的用户身份验证方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16918813

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16918813

Country of ref document: EP

Kind code of ref document: A1