WO2021168652A1 - Terminal device information transmission method, device fingerprint generation method, and related product - Google Patents

Terminal device information transmission method, device fingerprint generation method, and related product Download PDF

Info

Publication number
WO2021168652A1
WO2021168652A1 PCT/CN2020/076605 CN2020076605W WO2021168652A1 WO 2021168652 A1 WO2021168652 A1 WO 2021168652A1 CN 2020076605 W CN2020076605 W CN 2020076605W WO 2021168652 A1 WO2021168652 A1 WO 2021168652A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal device
asymmetric encryption
key
probe server
data
Prior art date
Application number
PCT/CN2020/076605
Other languages
French (fr)
Chinese (zh)
Inventor
郭子亮
Original Assignee
深圳市欢太科技有限公司
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市欢太科技有限公司, Oppo广东移动通信有限公司 filed Critical 深圳市欢太科技有限公司
Priority to PCT/CN2020/076605 priority Critical patent/WO2021168652A1/en
Priority to CN202080095150.9A priority patent/CN115039376A/en
Publication of WO2021168652A1 publication Critical patent/WO2021168652A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • This application relates to the field of terminal technology, and in particular to a method for transmitting terminal device information, a method for generating device fingerprints, and related products.
  • fingerprint generation refers to the process of creating unique identifiers for various types of electronic data. And when we need to implement a certain technology to identify a single user or device, we call them device fingerprints. Essentially, the process involves collecting information about smartphones, computers, or other devices. Sometimes, even if the user hides the Internet Protocol (IP) address or changes the browser, the device can be identified through fingerprint recognition.
  • IP Internet Protocol
  • terminal equipment has evaluated equipment risks through a risk probe system, analyzed legitimate network traffic, and detected potential fraud.
  • the risk probe system is deployed in a private cloud.
  • the business side client triggers the risk probe to collect device information and upload it to the back end of the business side; the back end of the business side parses, cleans, and filters the reported data, and then forwards the agreed data to the risk probe Needle back end;
  • the risk probe back end receives and parses data, and generates device fingerprints;
  • the risk probe back end performs equipment risk assessment based on the existing equipment information database, and returns the assessment results to the business side back end.
  • the embodiments of the present application provide a terminal device information transmission method, a device fingerprint generation method, and related products, which can improve the security of terminal device information transmission.
  • the first aspect of the embodiments of the present application provides a method for transmitting terminal device information, including:
  • the terminal device obtains the data signature and the device identification signature from the hardware security zone;
  • the terminal device generates a symmetric encryption key, collects terminal device information, and uses the symmetric encryption key to perform symmetric encryption on the terminal device information, the data signature, and the device identification signature to obtain encrypted data;
  • the terminal device uses an asymmetric encryption public key to perform asymmetric encryption processing on the symmetric encryption key to obtain an asymmetric encryption key; the asymmetric encryption public key is obtained by the terminal device from the risk probe server;
  • the terminal device reports asymmetric encrypted data to the risk probe server;
  • the asymmetric encrypted data includes the encrypted data, the asymmetric encryption key, and the asymmetric encryption public key;
  • the terminal device receives the token sent by the risk probe server, and stores the token at the local end, where the token is the risk probe server according to the encrypted data and the asymmetric encryption
  • the secret key and the token corresponding to the device fingerprint generated by the asymmetric encryption public key are the secret key and the token corresponding to the device fingerprint generated by the asymmetric encryption public key.
  • the second aspect of the embodiments of the present application provides a device fingerprint generation method, including:
  • the risk probe server receives the secret key acquisition request sent by the terminal device, and sends an asymmetric encryption public key to the terminal device; the asymmetric encryption public key is used for the terminal device to encrypt using an asymmetric encryption method;
  • the risk probe server receives the asymmetric encryption data sent by the terminal device, and decrypts the asymmetric encryption data with the asymmetric encryption private key corresponding to the asymmetric encryption public key to obtain terminal device information;
  • the risk probe server generates a device fingerprint and a token corresponding to the device fingerprint based on the terminal device information.
  • a third aspect of the embodiments of the present application provides a terminal device information transmission apparatus, including:
  • the obtaining unit is used to obtain the data signature and the device identification signature from the hardware security zone;
  • the first generating unit is used to generate a symmetric encryption key
  • the collection unit is used to collect terminal equipment information
  • the first encryption unit is configured to use the symmetric encryption key to perform symmetric encryption on the terminal device information, the data signature, and the device identification signature to obtain encrypted data;
  • the first encryption unit is further configured to use an asymmetric encryption public key to perform asymmetric encryption processing on the symmetric encryption key to obtain an asymmetric encryption key; the asymmetric encryption public key is obtained from the risk probe server ;
  • the first communication unit is configured to report asymmetric encrypted data to the risk probe server;
  • the asymmetric encrypted data includes the encrypted data, the asymmetric encryption key, and the asymmetric encryption public key;
  • the first communication unit is further configured to receive a token sent by the risk probe server;
  • the storage unit is configured to store the token at the local end, and the token is generated by the risk probe server according to the encrypted data, the asymmetric encryption key, and the asymmetric encryption public key The token corresponding to the device fingerprint.
  • the fourth aspect of the embodiments of the present application provides a device fingerprint generation device, including:
  • the second communication unit is configured to receive a secret key acquisition request sent by a terminal device, and send an asymmetric encryption public key to the terminal device; the asymmetric encryption public key is used for the terminal device to perform encryption in an asymmetric encryption manner;
  • the second communication unit is further configured to receive asymmetric encrypted data sent by the terminal device
  • the second encryption unit is configured to use the asymmetric encryption private key corresponding to the asymmetric encryption public key to decrypt the asymmetric encryption data to obtain terminal device information;
  • the second generating unit is configured to generate a device fingerprint and a token corresponding to the device fingerprint based on the terminal device information.
  • a fifth aspect of the embodiments of the present application provides a terminal device, including a processor and a memory, the memory is used to store a computer program, the computer program includes program instructions, and the processor is configured to call the program The instruction executes the step instruction in the first aspect of the embodiment of the present application.
  • a sixth aspect of the embodiments of the present application provides a server, including a processor and a memory, the memory is used to store a computer program, the computer program includes program instructions, and the processor is configured to call the program instructions , Execute the step instructions in the second aspect of the embodiment of the present application.
  • a seventh aspect of the embodiments of the present application provides a computer-readable storage medium, wherein the above-mentioned computer-readable storage medium stores a computer program for electronic data exchange, wherein the above-mentioned computer program causes a computer to execute Some or all of the steps described in one aspect.
  • An eighth aspect of the embodiments of the present application provides a computer-readable storage medium, wherein the above-mentioned computer-readable storage medium stores a computer program for electronic data exchange, wherein the above-mentioned computer program enables a computer to execute Part or all of the steps described in the two aspects.
  • the ninth aspect of the embodiments of the present application provides a computer program product, wherein the computer program product includes a non-transitory computer-readable storage medium storing a computer program, and the computer program is operable to cause a computer to execute as implemented in this application.
  • the computer program product may be a software installation package.
  • the tenth aspect of the embodiments of the present application provides a computer program product, wherein the computer program product includes a non-transitory computer-readable storage medium storing a computer program, and the computer program is operable to make a computer execute Examples of part or all of the steps described in the second aspect.
  • the computer program product may be a software installation package.
  • the terminal device obtains the data signature and the device identification signature from the hardware security zone; the terminal device generates a symmetric encryption key, collects terminal device information, and uses the symmetric encryption key to pair the terminal device information , The data signature and the device identification signature are symmetrically encrypted to obtain encrypted data; the terminal device uses an asymmetric encryption public key to perform asymmetric encryption on the symmetric encryption key to obtain an asymmetric encryption key; The asymmetric encryption public key is obtained by the terminal device from the risk probe server; the terminal device reports the asymmetric encryption data to the risk probe server; the asymmetric encryption data includes the encrypted data, The asymmetric encryption key and the asymmetric encryption public key; the terminal device receives the token sent by the risk probe server, stores the token at the local end, and the token is the The token corresponding to the device fingerprint generated by the risk probe server according to the encrypted data, the asymmetric encryption key, and the asymmetric encryption public key.
  • the terminal device sends asymmetric encrypted data containing terminal device information to the risk probe server. Since the data signature and the device identification signature are obtained from the hardware security zone, the security of the data signature and the device identification signature is ensured, and the security of the data sent by the terminal device is ensured. Since a symmetric encryption key is used to symmetrically encrypt the terminal device information, the data signature, and the device identification signature, an asymmetric encryption public key is used to perform asymmetric encryption on the symmetric encryption key to obtain asymmetric encryption The key ensures the security of the asymmetric encrypted data sent by the terminal device to the risk probe server, and ensures the security of the data received by the risk probe server. In the process of terminal device information transmission, both the data sending end and the data receiving end ensure the security of the transmitted data, so that the security of terminal device information transmission can be improved.
  • FIG. 1 is a schematic structural diagram of a risk probe system provided by an embodiment of the present application
  • FIG. 2 is a schematic flowchart of a method for transmitting terminal device information according to an embodiment of the present application
  • FIG. 3 is a schematic flowchart of a method for generating device fingerprints according to an embodiment of the present application
  • FIG. 4 is a schematic flowchart of another method for generating device fingerprints according to an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of another method for generating device fingerprints according to an embodiment of the present application.
  • FIG. 6 is a schematic flowchart of another device fingerprint generation method provided by an embodiment of the present application.
  • FIG. 7 is a schematic flowchart of another device fingerprint generation method provided by an embodiment of the present application.
  • FIG. 8 is a schematic diagram of a service access process provided by an embodiment of the present application.
  • FIG. 9 is a schematic structural diagram of a terminal device information transmission apparatus provided by an embodiment of the application.
  • FIG. 10 is a schematic structural diagram of an apparatus for generating device fingerprints according to an embodiment of this application.
  • FIG. 11 is a schematic structural diagram of a terminal device provided by an embodiment of the present application.
  • FIG. 12 is a schematic structural diagram of a server provided by an embodiment of the present application.
  • the terminal devices involved in the embodiments of the present application may include various handheld devices with wireless communication functions, vehicle-mounted devices, wearable devices, computing devices or other processing devices connected to wireless modems, as well as various forms of user equipment (user equipment).
  • equipment UE
  • mobile station mobile station
  • terminal device terminal device
  • FIG. 1 is a schematic structural diagram of a risk probe system provided by an embodiment of the present application, which includes a risk probe server 100 and at least one terminal device 101 communicatively connected with the risk probe server 100.
  • a client may be installed on the terminal device 101, and a risk probe server may be installed on the risk probe server 100.
  • the client refers to the program that corresponds to the risk probe server and provides customers with local services.
  • the risk probe server is also a program installed on the risk probe server.
  • the risk probe server serves the client.
  • the content of the service is such as providing computing or application services to the client, providing resources to the client, and saving the client. Terminal data, etc., for example, the risk probe server can provide the client with risk assessment services for terminal devices.
  • the risk probe server 100 can directly establish a communication connection with the terminal device 101 via the Internet, and the risk probe server 100 can also establish a communication connection with the terminal device 101 via other servers via the Internet.
  • the embodiments of this application do not make limitations.
  • the risk detection server in the embodiment of the present application may have the following functions: (1) Generate a unique identification of the terminal device: a fingerprint of the terminal device. (2) Based on big data, classify the business type tendency of terminal equipment, and conduct risk assessment of terminal equipment.
  • FIG. 2 is a schematic flowchart of a method for transmitting terminal device information according to an embodiment of the present application.
  • the terminal device information transmission method may include the following steps.
  • the terminal device obtains a data signature and a device identification signature from the hardware security zone.
  • the terminal device can support REE operation, for example, general OS: REE such as Android, iOS, Linux.
  • REE can provide all the functions of the device for the upper application (App).
  • App is open, extensible and universal.
  • the application provided by REE is RA.
  • the terminal device can also support trusted execution environment (TEE) operation.
  • TEE is protected by hardware mechanism, and TEE is isolated from REE.
  • the application provided by TEE is Trusted Application (TA).
  • TA Trusted Application
  • the REE can only communicate with the TA in the TEE through a specific entrance.
  • the TEE has hardware exclusivity. When the TEE is running, the TEE can use all the performance of the central processing unit (CPU) of the terminal device.
  • TEE also has a fast communication mechanism.
  • TEE can access the memory of REE, but REE cannot access the memory of TEE protected by hardware. Multiple TAs can run simultaneously in TEE.
  • TEE is an application in TEE.
  • TEE belongs to an independent hardware security zone. Even if Android OS is rooted or ROM is flashed, it will not affect the security of TEE.
  • RA in REE can obtain data signature SIGN1 and equipment identification signature SIGN2 from TA.
  • the data signature SIGN1 is the signature of the key field set (KeyFieldSet, KeyFieldSet) data of the terminal device information
  • the KeyFieldSet is a subset of the terminal device information (InformationSet, InfoSet).
  • the equipment identification signature SIGN2 is the signature of the unique identification of the terminal equipment. Since the device identification at the software layer is unreliable and there is a risk of being tampered with, the device identification in the embodiment of the present application is generated in the hardware security zone, and a unique device identification is maintained in the hardware security zone.
  • the RA in REE can guarantee the security of its preset key, signature and uniqueness of device fingerprint.
  • the data signature and the device identification signature are obtained by encrypting the hardware security zone using a message digest algorithm.
  • the TA in the hardware security zone generates a random number TRAN through the hardware in the hardware security zone, and signs (KeyFieldSet+TRAN) and (sk_2) respectively to obtain the data signature SIGN1 and the device identification signature SIGN2; then, the (SIGN1+SIGN2+ TRAN) does asymmetric encryption (the secret key is pk_1) to get EncSign; TA returns the encryption result EncSign to the RA end of the terminal device.
  • sk_2 is the unique identifier of the terminal device.
  • sk_2 can be considered as the private key in the key pair
  • pk_2 is the public key corresponding to sk_2 in the key pair.
  • TA separately signs (KeyFieldSet+TRAN) and (sk_2), which can be signed by MD5 encryption.
  • the terminal device collects and generates a symmetric encryption key and terminal device information, and uses the symmetric encryption key to perform symmetric encryption on the terminal device information, data signature, and device identification signature to obtain encrypted data.
  • the terminal device can randomly generate a symmetric encryption key (key) through software.
  • the terminal device can randomly generate a symmetric encryption key through a rich application (Rich Application, RA) provided by a rich execution environment (REE) using a random number generation method.
  • the RA in the REE can generate a symmetric encryption key.
  • the terminal device may collect terminal device information through the RA in the TEE.
  • Terminal device information may include terminal device hardware information, system information, operating environment information, network information, and so on.
  • the symmetric encryption key (key) is generated by the terminal device in step 201.
  • a symmetric encryption key (key) When encrypting, use a symmetric encryption key (key) to symmetrically encrypt the terminal device information InfoSet, data signature SIGN1, and device identification signature SIGN2 to obtain encrypted data (EnData); when decrypting, you need to use a symmetric encryption key (key)
  • the encrypted data (EnData) is decrypted, and the terminal device information InfoSet, the data signature SIGN1 and the device identification signature SIGN2 are obtained.
  • the terminal device uses the asymmetric encryption public key to perform asymmetric encryption processing on the symmetric encryption key to obtain the asymmetric encryption key; the asymmetric encryption public key is obtained by the terminal device from the risk probe server.
  • the embodiment of the present application uses the asymmetric encryption public key (pk_1) to perform asymmetric encryption processing on the symmetric encryption key (key) to obtain the asymmetric encryption key (Enkey).
  • the asymmetric encryption public key is then used to encrypt the symmetric encryption key, which can further improve the security of data transmission.
  • the asymmetric encryption public key is obtained by the terminal device from the risk probe server.
  • the risk probe server can generate the asymmetric encryption public key (pk_1) and the asymmetric encryption private key (sk_1), and the terminal device requests the risk probe server to obtain the asymmetric encryption public key.
  • Asymmetric encryption public key (pk_1) and asymmetric encryption private key (sk_1) are key pairs, which are used for encryption and decryption, respectively.
  • step 201 the following steps may also be performed:
  • the terminal device sends a secret key acquisition request to the risk probe server, and obtains the asymmetric encryption public key from the risk probe server.
  • the terminal device reports the asymmetric encryption data to the risk probe server; the asymmetric encryption data includes the encrypted data, the asymmetric encryption key, and the asymmetric encryption public key.
  • the risk probe server can use the asymmetric encryption private key (sk_1) corresponding to the asymmetric encryption public key (pk_1) to counter the non-symmetric encryption data.
  • the symmetric encryption key (Enkey) is decrypted to obtain the symmetric encryption key (key).
  • the risk probe server can generate a device fingerprint and a token corresponding to the device fingerprint based on the terminal device information InfoSet.
  • the risk probe server can verify the data signature SIGN1. Specifically, MD5 signature is performed on KeyFieldSet+TRAN and compared with SIGN1. If they are consistent, the signature verification is passed (KeyFieldSet is a subset of InfoSet).
  • the risk probe server can generate the back-end verification element VerCode according to the device identification signatures SIGN2 and TAND.
  • TAND is a random number generated by the risk probe server.
  • the risk probe server can generate a back-end check factor according to the back-end check element VerCode. Specifically, verify whether SIGN2 exists in the device identification signature library of the risk probe server. If it exists, then the public key pk_2 corresponding to sk_2 in the key pair can be obtained (the device identification signature library has a mapping of device identification signatures SIGN2 and pk_2 ). The risk probe server can use the public key pk_2 to perform asymmetric encryption on the back-end verification element VerCode to obtain the back-end verification factor EnVerCode.
  • the terminal device receives the token sent by the risk probe server, and stores the token on the local end.
  • the token is the device fingerprint generated by the risk probe server according to the encrypted data, asymmetric encryption key, and asymmetric encryption public key. The corresponding token.
  • the risk probe server decrypts the asymmetric encrypted data to obtain the terminal device information, and generates the device fingerprint and contact information based on the terminal device information. For the token corresponding to the device fingerprint, the risk probe server can send the token to the terminal device, and the terminal device can store the token on its own. For example, the terminal device can persistently store the token in the non-volatile memory of the terminal device.
  • Token is an object representing the right to perform certain operations. Token, as an alias for device fingerprints, spreads between networks, which can effectively prevent the risk of malicious collection of device fingerprints during the spreading process. At the same time, the token Token has timeliness to prevent malicious users from forging and cheating on the Token.
  • the risk probe server may send the back-end check factor to the terminal device, and the terminal device may check the back-end check factor through the hardware security zone, based on the back-end check factor Generating a front-end check factor and sending the front-end check factor to the risk probe server, where the front-end check factor is used by the risk probe server to perform security verification;
  • the terminal device executes step 205.
  • the terminal device may decrypt the back-end verification factor EnVerCode through the TA in the hardware security zone to obtain the back-end verification element VerCode.
  • the terminal device can use the asymmetric encryption public key (pk_1) to perform asymmetric encryption on the back-end verification element VerCode and the device identification signature SIGN2 through the TA in the hardware security zone to obtain the front-end verification factor EnSIGN2.
  • the terminal equipment sends the front-end check factor EnSIGN2 to the risk probe server through the RA, and the risk probe server performs a security check on the front-end check factor EnSIGN2.
  • the risk probe server uses the asymmetric encryption private key (sk_1) to decrypt the front-end verification factor EnSIGN2 to obtain the back-end verification element VerCode and the device identification signature SIGN2.
  • the risk probe server verifies the back-end verification element VerCode and equipment identification signature SIGN2 are verified.
  • the risk probe server When the risk probe server successfully verifies the front-end check factor, the risk probe server sends a token to the terminal device.
  • the back-end verification of the risk probe server can be enhanced, the back-end verification factor after asymmetric encryption is generated on the risk probe server, and the front-end verification of the terminal device can also be enhanced.
  • the terminal equipment and the risk probe server can be mutually verified, which can increase the cheating cost of the terminal equipment and make up for the lack of untrustworthiness and insecurity of RA.
  • the terminal device sends asymmetric encrypted data containing terminal device information to the risk probe server. Since the data signature and the device identification signature are obtained from the hardware security zone, the security of the data signature and the device identification signature is ensured, and the security of the data sent by the terminal device is ensured. Since a symmetric encryption key is used to symmetrically encrypt the terminal device information, the data signature, and the device identification signature, an asymmetric encryption public key is used to perform asymmetric encryption on the symmetric encryption key to obtain asymmetric encryption The key ensures the security of the asymmetric encrypted data sent by the terminal device to the risk probe server, and ensures the security of the data received by the risk probe server. In the process of terminal device information transmission, both the data sending end and the data receiving end ensure the security of the transmitted data, so that the security of terminal device information transmission can be improved.
  • FIG. 3 is a schematic flowchart of a method for generating device fingerprints according to an embodiment of the present application.
  • the device fingerprint generation method may include the following steps.
  • the risk probe server receives a secret key acquisition request sent by the terminal device, and sends an asymmetric encryption public key to the terminal device; the asymmetric encryption public key is used for the terminal device to encrypt using an asymmetric encryption method.
  • the risk probe server can generate the asymmetric encryption public key (pk_1) and the asymmetric encryption private key (sk_1). After receiving the secret key acquisition request sent by the terminal device, the risk probe server can Send the asymmetric encryption public key (pk_1) to the terminal device. After the terminal device receives the asymmetric encryption public key (pk_1), the terminal device uses the asymmetric encryption public key (pk_1) to perform asymmetric encryption on the symmetric encryption key (key) to obtain the asymmetric encryption key (Enkey).
  • the symmetric encryption key (key) is generated by the terminal device, and the symmetric encryption key (key) is used by the terminal device to symmetrically encrypt the terminal device information InfoSet, the data signature SIGN1, and the device identification signature SIGN2.
  • the data signature SIGN1 and the device identification signature SIGN2 are obtained by the terminal device from the TA in the hardware security zone.
  • Terminal equipment can collect terminal equipment information through RA in TEE (terminal equipment information can include terminal equipment hardware information, system information, operating environment information, network information, etc.), terminal equipment can use a symmetric encryption key (key) to terminal equipment Information InfoSet, data signature SIGN1 and equipment identification signature SIGN2 are symmetrically encrypted to obtain encrypted data (EnData).
  • terminal equipment information can include terminal equipment hardware information, system information, operating environment information, network information, etc.
  • terminal equipment can use a symmetric encryption key (key) to terminal equipment Information InfoSet
  • data signature SIGN1 and equipment identification signature SIGN2 are symmetrically encrypted to obtain encrypted data (EnData).
  • the terminal device can use the asymmetric encryption public key (pk_1) to perform asymmetric encryption processing on the symmetric encryption key (key) to obtain the asymmetric encryption key (Enkey).
  • pk_1 asymmetric encryption public key
  • Enkey asymmetric encryption key
  • the risk probe server receives the asymmetric encryption data sent by the terminal device, and decrypts the asymmetric encryption data with the asymmetric encryption private key corresponding to the asymmetric encryption public key to obtain terminal device information.
  • the asymmetric encryption data includes encrypted data, an asymmetric encryption key, and an asymmetric encryption public key; in step 302, the risk probe server uses an asymmetric encryption corresponding to the asymmetric encryption public key.
  • the encryption private key decrypts the asymmetric encrypted data to obtain terminal device information, including the following steps:
  • the risk probe server uses the asymmetric encryption private key corresponding to the asymmetric encryption public key to decrypt the asymmetric encryption key to obtain the symmetric encryption key;
  • the risk probe server uses the symmetric encryption key to decrypt the encrypted data to obtain the terminal device information.
  • the asymmetric encryption data includes encrypted data (EnData), asymmetric encryption key (Enkey), and asymmetric encryption public key (pk_1).
  • the risk probe server can use the asymmetric encryption private key (sk_1) corresponding to the asymmetric encryption public key (pk_1) to pair the asymmetric encryption key (Enkey ) Is decrypted to obtain a symmetric encryption key (key).
  • the risk probe server generates a device fingerprint and a token corresponding to the device fingerprint based on the terminal device information.
  • a device fingerprint refers to a device feature or a unique device identifier that can be used to uniquely identify the device.
  • the terminal device information of each terminal device is unique, so the generated device fingerprint is also unique.
  • step 303 the following steps may be performed:
  • the risk probe server sends the token to the terminal device.
  • step 303 the following steps may be performed:
  • the risk probe server generates a back-end check factor, and sends the back-end check factor to the terminal device, where the back-end check factor is used by the terminal device to perform a security check through the hardware security zone .
  • the risk probe server can generate the back-end verification element VerCode according to the device identification signature SIGN2 and TAND.
  • TAND is a random number generated by the risk probe server.
  • the risk probe server can generate a back-end verification factor based on the back-end verification element VerCode.
  • the public key pk_2 corresponding to sk_2 in the key pair can be obtained.
  • the risk probe server can use the public key pk_2 to perform asymmetric encryption on the back-end verification element VerCode to obtain the back-end verification factor EnVerCode.
  • the risk probe server receives the front-end check factor sent by the terminal device;
  • the risk probe server performs a security check on the front-end check factor
  • the risk probe server executes the step of sending the token to the terminal device.
  • the terminal device may decrypt the back-end verification factor EnVerCode through the TA in the hardware security zone to obtain the back-end verification element VerCode, and verify the device identification signature SIGN2.
  • the terminal device can use the asymmetric encryption public key (pk_1) to perform asymmetric encryption on the back-end verification element VerCode and the device identification signature SIGN2 through the TA in the hardware security zone to obtain the front-end verification factor EnSIGN2.
  • the terminal equipment sends the front-end check factor EnSIGN2 to the risk probe server through the RA, and the risk probe server performs a security check on the front-end check factor EnSIGN2.
  • the risk probe server uses the asymmetric encryption private key (sk_1) to decrypt the front-end verification factor EnSIGN2 to obtain the back-end verification element VerCode and the device identification signature SIGN2.
  • the risk probe server verifies the back-end verification element VerCode and equipment identification signature SIGN2 are verified.
  • the risk probe server sends a token to the terminal device.
  • the back-end verification of the risk probe server can be enhanced, the back-end verification factor after asymmetric encryption is generated on the risk probe server, and the front-end verification of the terminal device can also be enhanced.
  • the terminal equipment and the risk probe server can be mutually verified, which can increase the cheating cost of the terminal equipment and make up for the lack of untrustworthiness and insecurity of RA.
  • the risk probe server receives the asymmetric encryption data sent by the terminal device, and decrypts the asymmetric encryption data with the asymmetric encryption private key corresponding to the asymmetric encryption public key to obtain terminal device information. Since the asymmetric encrypted data is encrypted by the terminal device using a symmetric encryption key, the security of the asymmetric encrypted data received from the terminal device by the risk probe server is ensured, and the security of the data received by the risk probe server is guaranteed. Thereby ensuring the security of device fingerprint generation.
  • FIG. 4 is a schematic flowchart of another device fingerprint generation method provided by an embodiment of the present application.
  • the device fingerprint generation method may include the following steps.
  • the risk probe server receives a secret key acquisition request sent by a terminal device, and sends an asymmetric encryption public key to the terminal device; the asymmetric encryption public key is used for the terminal device to encrypt using an asymmetric encryption method.
  • the risk probe server receives the asymmetric encryption data sent by the terminal device, and uses the asymmetric encryption private key corresponding to the asymmetric encryption public key to decrypt the asymmetric encryption data to obtain terminal device information.
  • the risk probe server generates a device fingerprint and a token corresponding to the device fingerprint based on the terminal device information.
  • step 401 to step 403 in the embodiment of the present application can participate in step 301 to step 303 shown in FIG. 3, which will not be repeated here.
  • the risk probe server performs big data calculations based on terminal device information, historical reported data, and business risk control data, identifies the business tendency classification of the terminal device, and identifies the equipment risk level of the terminal device.
  • the risk probe server can construct a terminal device portrait library.
  • the risk probe server can clean the terminal device information Infoset reported by the terminal device, and combine the historical reported data and business risk control data to perform big data calculations, and perform business tendency classification and risk marking on device fingerprints to build a terminal device profile Library.
  • step 404 the following steps may be performed:
  • the risk probe server sends the device risk level identifier of the terminal device to the terminal device.
  • the risk probe server of the embodiment of this application can combine terminal equipment information (such as operating environment, system status, etc.), business data, and risk control information, and use big data technology and machine learning to identify equipment risk levels, thereby Obtain equipment risk levels quickly and accurately, and provide risk early warning services for terminal equipment.
  • terminal equipment information such as operating environment, system status, etc.
  • business data such as operating environment, system status, etc.
  • risk control information such as business data, and risk control information
  • FIG. 5 is a schematic flowchart of another device fingerprint generation method provided by an embodiment of the present application.
  • the terminal equipment may include the terminal equipment RA, and the risk probe server may be the OPPO Risk Probe (ORP) backend.
  • ORP OPPO Risk Probe
  • the device fingerprint generation method may include the following steps.
  • the terminal device RA sends a secret key acquisition request to the ORP back end, and obtains the asymmetric encryption public key from the ORP back end.
  • the ORP backend can generate a secret key pair (asymmetric encryption public key pk_1 and asymmetric encryption private key sk_1).
  • the terminal device RA requests the terminal device TA in the hardware security zone to obtain a data signature and a device identification signature.
  • the specific method for the terminal device TA in the hardware security zone to generate the data signature and the device identification signature is as follows:
  • the terminal device TA in the hardware security zone generates a random number TRAN through the hardware in the hardware security zone, and signs (KeyFieldSet+TRAN) and (sk_2) respectively to obtain the data signature SIGN1 and the device identification signature SIGN2; then, the (SIGN1+ SIGN2+TRAN) do asymmetric encryption (the secret key is pk_1) to get EncSign; the terminal device TA returns the encryption result EncSign to the RA end of the terminal device.
  • sk_2 is the unique identifier of the terminal device.
  • sk_2 can be considered as the private key in the key pair
  • pk_2 is the public key corresponding to sk_2 in the key pair.
  • the terminal device TA separately signs (KeyFieldSet+TRAN) and (sk_2), specifically, MD5 encryption method can be used to sign.
  • the terminal device RA generates a symmetric encryption key, and the terminal device RA collects terminal device information, and uses the symmetric encryption key to perform symmetric encryption on the terminal device information, data signature, and device identification signature to obtain encrypted data.
  • step 503 For the specific implementation of step 503, refer to the description of step 202, which will not be repeated here.
  • the terminal device RA uses the asymmetric encryption public key to perform asymmetric encryption processing on the symmetric encryption key to obtain the asymmetric encryption key.
  • step 504 For the specific implementation of step 504, refer to the description of step 203, which will not be repeated here.
  • the terminal device RA reports the asymmetric encryption data to the ORP backend; the asymmetric encryption data includes the encrypted data, the asymmetric encryption key, and the asymmetric encryption public key.
  • step 505 For the specific implementation of step 505, refer to the description of step 204, which will not be repeated here.
  • the ORP back-end receives the asymmetric encryption data sent by the terminal device RA, and decrypts the asymmetric encryption data with the asymmetric encryption private key corresponding to the asymmetric encryption public key to obtain terminal device information.
  • step 506 For the specific implementation of step 506, refer to the description of step 302, which will not be repeated here.
  • the ORP backend generates a device fingerprint and a token corresponding to the device fingerprint based on the terminal device information.
  • step 507 For the specific implementation of step 507, refer to the description of step 303, which will not be repeated here.
  • the terminal device RA receives the token sent by the ORP backend, and stores the token on the local end.
  • step 508 For the specific implementation of step 508, refer to the description of step 205, which will not be repeated here.
  • the terminal device sends asymmetric encrypted data containing terminal device information to the risk probe server. Since the data signature and the device identification signature are obtained from the hardware security zone, the security of the data signature and the device identification signature is ensured, and the security of the data sent by the terminal device is ensured. Since a symmetric encryption key is used to symmetrically encrypt the terminal device information, the data signature, and the device identification signature, an asymmetric encryption public key is used to perform asymmetric encryption on the symmetric encryption key to obtain asymmetric encryption The key ensures the security of the asymmetric encrypted data sent by the terminal device to the risk probe server, and ensures the security of the data received by the risk probe server.
  • both the data sending end and the data receiving end ensure the security of the transmitted data, so that the security of terminal device information transmission can be improved.
  • the risk probe server receives the asymmetric encryption data sent by the terminal device, and decrypts the asymmetric encryption data with the asymmetric encryption private key corresponding to the asymmetric encryption public key to obtain terminal device information. Since the asymmetric encrypted data is encrypted by the terminal device using a symmetric encryption key, the security of the asymmetric encrypted data received from the terminal device by the risk probe server is ensured, and the security of the data received by the risk probe server is guaranteed. Thereby ensuring the security of device fingerprint generation.
  • FIG. 6 is a schematic flowchart of another device fingerprint generation method provided by an embodiment of the present application.
  • the terminal equipment may include the terminal equipment RA, and the risk probe server may be the OPPO Risk Probe (ORP) backend.
  • ORP OPPO Risk Probe
  • the device fingerprint generation method may include the following steps.
  • the terminal device RA sends a secret key acquisition request to the ORP backend, and acquires the asymmetric encryption public key from the ORP backend.
  • the terminal device RA requests the terminal device TA in the hardware security zone to obtain a data signature and a device identification signature.
  • the terminal device RA generates a symmetric encryption key, and the terminal device RA collects terminal device information, and uses the symmetric encryption key to perform symmetric encryption on the terminal device information, data signature, and device identification signature to obtain encrypted data.
  • the terminal equipment RA uses the asymmetric encryption public key to perform asymmetric encryption processing on the symmetric encryption key to obtain the asymmetric encryption key.
  • the terminal device RA reports the asymmetric encryption data to the ORP backend; the asymmetric encryption data includes the encrypted data, the asymmetric encryption key, and the asymmetric encryption public key.
  • the ORP back-end receives the asymmetric encryption data sent by the terminal device RA, and decrypts the asymmetric encryption data with the asymmetric encryption private key corresponding to the asymmetric encryption public key to obtain terminal device information.
  • step 601 to step 606 can participate in step 501 to step 506 shown in FIG. 5, which will not be repeated here.
  • the ORP back-end generates a back-end check factor, and sends the back-end check factor to the terminal device TA through the terminal device RA.
  • the terminal device TA checks the back-end check factor.
  • the terminal device TA If the verification is successful, the terminal device TA generates a front-end check factor, and sends the front-end check factor to the ORP back end through the terminal device RA.
  • the ORP back-end performs a security check on the front-end check factor.
  • the ORP backend may generate the backend verification element VerCode according to the device identification signature SIGN2 and TAND.
  • TAND is a random number generated by the ORP backend.
  • the ORP back-end can generate a back-end verification factor based on the back-end verification element VerCode.
  • the ORP backend can use MD5 decryption to obtain sk_2, and then obtain the public key pk_2 corresponding to sk_2 in the key pair.
  • the ORP backend can use the public key pk_2 to perform asymmetric encryption on the backend verification element VerCode to obtain the backend verification factor EnVerCode.
  • the terminal device TA decrypts the back-end verification factor EnVerCode to obtain the back-end verification element VerCode, and verifies the device identification signature SIGN2. After the verification is passed, the terminal device TA uses the asymmetric encryption public key (pk_1) to perform asymmetric encryption on the back-end verification element VerCode and the device identification signature SIGN2 to obtain the front-end verification factor EnSIGN2.
  • the terminal device TA sends the front-end check factor EnSIGN2 to the ORP back-end through the terminal device RA, and the ORP back-end performs a security check on the front-end check factor EnSIGN2.
  • the ORP back-end decrypts the front-end verification factor EnSIGN2 through the asymmetric encryption private key (sk_1) to obtain the back-end verification element VerCode and the device identification signature SIGN2, and the ORP back-end verifies the back-end verification element VerCode and the device identification. Sign SIGN2 for verification.
  • step 611 is executed.
  • the ORP backend If the verification is successful, the ORP backend generates a device fingerprint and a token corresponding to the device fingerprint based on the terminal device information.
  • the terminal device RA receives the token sent by the ORP backend, and stores the token on the local end.
  • step 611 to step 612 can participate in step 507 to step 508 shown in FIG. 5, which will not be repeated here.
  • the back-end verification of the risk probe server can be enhanced, the back-end verification factor after asymmetric encryption is generated on the risk probe server, and the front-end verification of the terminal device can also be enhanced.
  • the terminal equipment and the risk probe server can be mutually verified, which can increase the cheating cost of the terminal equipment and make up for the lack of untrustworthiness and insecurity of RA.
  • FIG. 7 is a schematic flowchart of another device fingerprint generation method provided by an embodiment of the present application.
  • the terminal equipment may include the terminal equipment RA and the terminal equipment TA, and the risk probe server may be the OPPO Risk Probe (ORP) backend.
  • Figure 7 is the specific implementation process of Figure 6.
  • the device fingerprint generation method may include the following steps.
  • RA requests pk_1 from the ORP backend
  • the ORP backend generates a secret key pair (pk_1, sk_1);
  • RA requests identity information (KeyFieldSet, pk_1) from TA;
  • RA uploads data EnData, Enkey and pk_1 to the ORP backend;
  • the ORP backend uses sk_1 to decrypt Enkey to obtain the key, uses key to decrypt EnData to obtain Infoset+EnSign, and uses sk_1 to decrypt EnSign to obtain SIGN1 and SIGN2;
  • RA returns EnVerCode to TA
  • the ORP backend uses sk_1 to decrypt EnSIGN2 to obtain SIGN2+VerCode;
  • ORP backend verifies SIGN2 and VerCode
  • ORP backend generates Token
  • ORP returns Token to RA.
  • FIG. 8 is a schematic diagram of a service access process provided by an embodiment of the present application.
  • SDK software development kit
  • the request information includes the token Token and the key field set of terminal device information.
  • KeyFieldSet after the business backend adds the application identity document (APPID) to the request information, the request information is sent to the ORP backend, and the ORP backend returns the risk assessment result to the business backend.
  • APPID application identity document
  • the service deployment is simple, and the service client only needs to access the lightweight SDK to obtain the persistently stored Token and KeyFieldSet in the terminal device and upload the data to the service back end; the service back end only needs to access An interface on the ORP backend can obtain the terminal device risk label.
  • the business client only needs to access the lightweight SDK, and the business client accesses the lightweight SDK, collecting very little terminal device information, requiring very few permissions, and negligible impact on the business client.
  • TA is built into the hardware of the terminal device, and RA follows the operating system of the terminal device, that is, the risk probe client is bound to the terminal device to provide unified services for all services on the terminal device.
  • the security of the risk probe SDK can be improved, and the lightweight SDK can be reinforced, effectively improving the difficulty of SDK reverse engineering and cracking.
  • the terminal device includes a hardware structure and/or software module corresponding to each function.
  • this application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is executed by hardware or computer software-driven hardware depends on the specific application and design constraint conditions of the technical solution. Professionals and technicians can use different methods for each specific application to implement the described functions, but such implementation should not be considered beyond the scope of this application.
  • the embodiment of the present application may divide the terminal device into functional units according to the foregoing method examples.
  • each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit.
  • the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit. It should be noted that the division of units in the embodiments of the present application is illustrative, and is only a logical function division, and there may be other division methods in actual implementation.
  • FIG. 9 is a schematic structural diagram of a terminal equipment information transmission apparatus provided by an embodiment of the application.
  • the terminal equipment information transmission apparatus 900 is applied to terminal equipment, and the terminal equipment information transmission apparatus 900 may It includes an acquisition unit 901, a first generation unit 902, an acquisition unit 903, a first encryption unit 904, a first communication unit 905, and a storage unit 906, wherein:
  • the obtaining unit 901 is configured to obtain a data signature and a device identification signature from the hardware security zone;
  • the first generating unit 902 is configured to generate a symmetric encryption key
  • the collection unit 903 is used to collect terminal device information
  • the first encryption unit 904 is configured to use the symmetric encryption key to perform symmetric encryption on the terminal device information, the data signature, and the device identification signature to obtain encrypted data;
  • the first encryption unit 904 is further configured to use an asymmetric encryption public key to perform asymmetric encryption processing on the symmetric encryption key to obtain an asymmetric encryption key; the asymmetric encryption public key is obtained from the risk probe server Obtain;
  • the first communication unit 905 is configured to report asymmetric encrypted data to the risk probe server; the asymmetric encrypted data includes the encrypted data, the asymmetric encryption key, and the asymmetric encryption Public key
  • the first communication unit 905 is further configured to receive a token sent by the risk probe server;
  • the storage unit 906 is configured to store the token at the local end, and the token is the risk probe server based on the encrypted data, the asymmetric encryption key, and the asymmetric encryption public.
  • the token corresponding to the device fingerprint generated by the key.
  • the terminal device information transmission apparatus 900 may further include a first verification unit 907;
  • the first communication unit 905 is further configured to receive the backend check factor sent by the risk probe server after reporting the asymmetric encrypted data to the risk probe server;
  • the first check unit 907 is configured to check the back-end check factor through the hardware security zone
  • the first generating unit 902 is further configured to generate a front-end check factor based on the back-end check factor;
  • the first communication unit 905 is further configured to send the front-end check factor to the risk probe server, where the front-end check factor is used by the risk probe server to perform security verification; and In the case that the front-end check factor is successfully verified by the risk probe server, the token sent by the risk probe server is received.
  • the acquisition unit 901, the first generation unit 902, the acquisition unit 903, the first encryption unit 904, and the first verification unit 907 in the embodiment of the present application may be processors in the terminal device, and the first communication unit 905 may be For the communication interface in the terminal device, the storage unit 906 may be a memory in the terminal device (for example, a non-volatile memory).
  • the terminal device sends asymmetric encrypted data containing terminal device information to the risk probe server. Since the data signature and the device identification signature are obtained from the hardware security zone, the security of the data signature and the device identification signature is ensured, and the security of the data sent by the terminal device is ensured. Since a symmetric encryption key is used to symmetrically encrypt the terminal device information, the data signature, and the device identification signature, an asymmetric encryption public key is used to perform asymmetric encryption on the symmetric encryption key to obtain asymmetric encryption The key ensures the security of the asymmetric encrypted data sent by the terminal device to the risk probe server, and ensures the security of the data received by the risk probe server. In the process of terminal device information transmission, both the data sending end and the data receiving end ensure the security of the transmitted data, which can improve the security of terminal device information transmission.
  • FIG. 10 is a schematic structural diagram of a device fingerprint generating apparatus according to an embodiment of the present application.
  • the device fingerprint generating apparatus 1000 is applied to a risk probe server.
  • the device fingerprint generation device 1000 may include a second communication unit 1001, a decryption unit 1002, and a second generation unit 1003, wherein:
  • the second communication unit 1001 is configured to receive a secret key acquisition request sent by a terminal device, and send an asymmetric encryption public key to the terminal device; the asymmetric encryption public key is used for encryption by the terminal device in an asymmetric encryption manner ;
  • the second communication unit 1001 is further configured to receive asymmetric encrypted data sent by the terminal device;
  • the decryption unit 1002 is configured to use the asymmetric encryption private key corresponding to the asymmetric encryption public key to decrypt the asymmetric encryption data to obtain terminal device information;
  • the second generating unit 1003 is configured to generate a device fingerprint and a token corresponding to the device fingerprint based on the terminal device information.
  • the device 1000 for generating fingerprints may include an identification unit 1004.
  • the identification unit 1004 is configured to, after the second generating unit 1003 generates a device fingerprint and a token corresponding to the device fingerprint based on the terminal device information, according to the terminal device information, historical reported data, and business style
  • the control data performs big data calculation, identifies the business tendency classification of the terminal device, and identifies the equipment risk level of the terminal device.
  • the asymmetric encryption data includes encrypted data, an asymmetric encryption key, and an asymmetric encryption public key; the decryption unit 1002 uses an asymmetric encryption private key corresponding to the asymmetric encryption public key to pair the Asymmetrically encrypted data is decrypted to obtain terminal device information, specifically:
  • the second communication unit 1001 is further configured to send to the terminal device after the second generating unit 1003 generates a device fingerprint and a token corresponding to the device fingerprint based on the terminal device information The token.
  • the second generating unit 1003 is further configured to generate a back-end check factor after the second generating unit 1003 generates a device fingerprint and a token corresponding to the device fingerprint based on the terminal device information ;
  • the second communication unit 1001 is further configured to send the back-end check factor to the terminal device, where the back-end check factor is used by the terminal device to perform security verification through the hardware security zone.
  • the device 1000 for generating fingerprints may include a second verification unit 1005.
  • the second communication unit 1001 is further configured to receive the front-end check factor sent by the terminal device when the terminal device successfully checks the back-end check factor through the hardware security zone;
  • the second verification unit 1005 is configured to perform security verification on the front-end verification factor
  • the second communication unit 1001 is further configured to send the token to the terminal device when the second check unit 1005 successfully checks the front-end check factor.
  • the risk probe server receives the asymmetric encryption data sent by the terminal device, and decrypts the asymmetric encryption data with the asymmetric encryption private key corresponding to the asymmetric encryption public key to obtain terminal device information. Since the asymmetric encrypted data is encrypted by the terminal device using a symmetric encryption key, the security of the asymmetric encrypted data received from the terminal device by the risk probe server is ensured, and the security of the data received by the risk probe server is guaranteed. Thereby ensuring the security of device fingerprint generation.
  • FIG. 11 is a schematic structural diagram of a terminal device provided by an embodiment of the present application.
  • the terminal device 1100 includes a processor 1101 and a memory 1102. 1103 are connected to each other.
  • the communication bus 1103 may be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) bus, etc.
  • the communication bus 1103 can be divided into an address bus, a data bus, a control bus, and so on. For ease of representation, only one thick line is used to represent in FIG. 11, but it does not mean that there is only one bus or one type of bus.
  • the memory 1102 is used to store a computer program, the computer program includes program instructions, the processor 1101 is configured to call the program instructions, and the above program includes a method for executing the method shown in FIG. 2.
  • the processor 1101 may be a general-purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more integrated circuits for controlling the execution of the above program programs.
  • CPU central processing unit
  • ASIC application-specific integrated circuit
  • the memory 1102 may be a read-only memory (ROM) or other types of static storage devices that can store static information and instructions, random access memory (RAM), or other types that can store information and instructions
  • the dynamic storage device can also be electrically erasable programmable read-only memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), CD-ROM (Compact Disc Read-Only Memory, CD-ROM) or other optical disc storage, optical disc storage (Including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to carry or store desired program codes in the form of instructions or data structures and can be used by a computer Any other media accessed, but not limited to this.
  • the memory can exist independently and is connected to the processor through a bus.
  • the memory can also be integrated with the processor.
  • the terminal device 1100 may also include general components such as a communication interface and an antenna, which are not described in detail here.
  • the terminal device sends asymmetric encrypted data containing terminal device information to the risk probe server. Since the data signature and the device identification signature are obtained from the hardware security zone, the security of the data signature and the device identification signature is ensured, and the security of the data sent by the terminal device is ensured. Since a symmetric encryption key is used to symmetrically encrypt the terminal device information, the data signature, and the device identification signature, an asymmetric encryption public key is used to perform asymmetric encryption on the symmetric encryption key to obtain asymmetric encryption The key ensures the security of the asymmetric encrypted data sent by the terminal device to the risk probe server, and ensures the security of the data received by the risk probe server. In the process of terminal device information transmission, both the data sending end and the data receiving end ensure the security of the transmitted data, so that the security of terminal device information transmission can be improved.
  • FIG. 12 is a schematic structural diagram of a server provided by an embodiment of the present application.
  • the server 1200 includes a processor 1201 and a memory 1202.
  • the processor 1201 and the memory 1202 can communicate with each other through a communication bus 1203. connect.
  • the communication bus 1203 may be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) bus, etc.
  • the communication bus 1203 can be divided into an address bus, a data bus, a control bus, and so on. For ease of presentation, only one thick line is used to represent in FIG. 12, but it does not mean that there is only one bus or one type of bus.
  • the memory 1202 is used to store a computer program.
  • the computer program includes program instructions.
  • the processor 1201 is configured to call the program instructions.
  • the above program includes methods for executing the methods shown in FIGS. 2 to 4.
  • the processor 1201 may be a general-purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more integrated circuits for controlling the execution of the above program programs.
  • CPU central processing unit
  • ASIC application-specific integrated circuit
  • the memory 1202 may be a read-only memory (ROM) or other types of static storage devices that can store static information and instructions, random access memory (RAM), or other types that can store information and instructions
  • the dynamic storage device can also be electrically erasable programmable read-only memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), CD-ROM (Compact Disc Read-Only Memory, CD-ROM) or other optical disc storage, optical disc storage (Including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to carry or store desired program codes in the form of instructions or data structures and can be used by a computer Any other media accessed, but not limited to this.
  • the memory can exist independently and is connected to the processor through a bus.
  • the memory can also be integrated with the processor.
  • server 1200 may also include general components such as a communication interface and an antenna, which are not described in detail here.
  • the server 1200 may be a risk probe server.
  • the risk probe server receives the asymmetric encryption data sent by the terminal device, and uses the asymmetric encryption private key corresponding to the asymmetric encryption public key to decrypt the asymmetric encryption data to obtain the terminal device information. Since the asymmetric encrypted data is encrypted by the terminal device using a symmetric encryption key, the security of the asymmetric encrypted data received by the risk probe server from the terminal device is ensured, and the security of the data received by the risk probe server is guaranteed. Thereby ensuring the security of device fingerprint generation.
  • An embodiment of the present application also provides a computer-readable storage medium, wherein the computer-readable storage medium stores a computer program for electronic data exchange, and the computer program enables a computer to execute any network described in the above method embodiments. Part or all of the steps of the standard switching method.
  • the embodiments of the present application also provide a computer program product.
  • the computer program product includes a non-transitory computer-readable storage medium storing a computer program.
  • the computer program enables a computer to execute any network described in the above method embodiments. Part or all of the steps of the standard switching method.
  • the disclosed device may be implemented in other ways.
  • the device embodiments described above are merely illustrative, for example, the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or may be Integrate into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • each functional unit in each embodiment may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the above-mentioned integrated unit can be implemented in the form of hardware or in the form of software program modules.
  • the integrated unit is implemented in the form of a software program module and sold or used as an independent product, it can be stored in a computer readable memory.
  • the technical solution of the present application essentially or the part that contributes to the existing technology or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a memory.
  • a number of instructions are included to enable a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned memory includes: U disk, read-only memory (read-only memory, ROM), random access memory (random access memory, RAM), mobile hard disk, magnetic disk, or optical disk and other media that can store program codes.
  • the program can be stored in a computer-readable memory, and the memory can include: a flash disk , Read-only memory, random access device, magnetic or optical disk, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Provided in embodiments of the present application are a terminal device information transmission method, a device fingerprint generation method, and a related product, the terminal device information transmission method comprising: a terminal device acquires a data signature and a device identification signature from a hardware security area; the terminal device generates a symmetric encryption key, collects information, uses the symmetric encryption key to perform symmetric encryption on the information, the data signature, and the device identification signature, so as to obtain encrypted data; the terminal device uses an asymmetric encryption public key to perform asymmetric encryption on the symmetric encryption key, so as to obtain an asymmetric encryption key; the terminal device reports asymmetric encryption data to a risk probe server, the asymmetric encryption data comprising the encrypted data, the asymmetric encryption key, and the asymmetric encryption public key; and the terminal device receives a token sent by the risk probe server, and stores the token at a local end, the token being a token that corresponds to a device fingerprint and that is generated by the risk probe server according to the encrypted data, the asymmetric encryption key, and the asymmetric encryption public key.

Description

终端设备信息传输方法、设备指纹生成方法及相关产品Terminal equipment information transmission method, equipment fingerprint generation method and related products 技术领域Technical field
本申请涉及终端技术领域,具体涉及一种终端设备信息传输方法、设备指纹生成方法及相关产品。This application relates to the field of terminal technology, and in particular to a method for transmitting terminal device information, a method for generating device fingerprints, and related products.
背景技术Background technique
在计算机科学领域中,指纹生成是指为各类电子数据创建唯一标识符的过程。而当我们需要实施某项技术来识别出单个用户或设备时,我们将它们称为设备指纹。本质上,该过程包括了收集有关智能手机、计算机或其他设备的信息。有时,即使用户隐藏了网际协议(Internet Protocol,IP)地址或者更换了浏览器,通过指纹识别也是可以识别到该设备的。In the field of computer science, fingerprint generation refers to the process of creating unique identifiers for various types of electronic data. And when we need to implement a certain technology to identify a single user or device, we call them device fingerprints. Essentially, the process involves collecting information about smartphones, computers, or other devices. Sometimes, even if the user hides the Internet Protocol (IP) address or changes the browser, the device can be identified through fingerprint recognition.
多年来,终端设备通过风险探针系统对设备风险进行评估,分析合法的网络流量并检测潜在的欺诈行为。风险探针系统为私有云部署,业务侧客户端触发风险探针采集设备信息,并上传到业务侧后端;业务侧后端对上报数据进行解析、清洗、过滤,然后转发约定数据到风险探针后端;风险探针后端接收、解析数据,并生成设备指纹;风险探针后端依据已有的设备情报库进行设备风险评估,并将评估结果返回给业务侧后端。For many years, terminal equipment has evaluated equipment risks through a risk probe system, analyzed legitimate network traffic, and detected potential fraud. The risk probe system is deployed in a private cloud. The business side client triggers the risk probe to collect device information and upload it to the back end of the business side; the back end of the business side parses, cleans, and filters the reported data, and then forwards the agreed data to the risk probe Needle back end; The risk probe back end receives and parses data, and generates device fingerprints; The risk probe back end performs equipment risk assessment based on the existing equipment information database, and returns the assessment results to the business side back end.
目前的风险探针系统中,数据的上报过程中没有加密,采用明文传输,存在传输劫持、数据被篡改的风险。In the current risk probe system, there is no encryption in the process of data reporting, and plaintext transmission is used, and there is a risk of transmission hijacking and data tampering.
发明内容Summary of the invention
本申请实施例提供一种终端设备信息传输方法、设备指纹生成方法及相关产品,可以提高终端设备信息传输的安全性。The embodiments of the present application provide a terminal device information transmission method, a device fingerprint generation method, and related products, which can improve the security of terminal device information transmission.
本申请实施例的第一方面提供了一种终端设备信息传输方法,包括:The first aspect of the embodiments of the present application provides a method for transmitting terminal device information, including:
所述终端设备从硬件安全区获取数据签名和设备标识签名;The terminal device obtains the data signature and the device identification signature from the hardware security zone;
所述终端设备生成对称加密密钥,采集终端设备信息,采用所述对称加密密钥对所述终端设备信息、所述数据签名和所述设备标识签名做对称加密,得到加密数据;The terminal device generates a symmetric encryption key, collects terminal device information, and uses the symmetric encryption key to perform symmetric encryption on the terminal device information, the data signature, and the device identification signature to obtain encrypted data;
所述终端设备采用非对称加密公钥对所述对称加密密钥做非对称加密处理,得到非对称加密密钥;所述非对称加密公钥为所述终端设备从风险探针服务端获取;The terminal device uses an asymmetric encryption public key to perform asymmetric encryption processing on the symmetric encryption key to obtain an asymmetric encryption key; the asymmetric encryption public key is obtained by the terminal device from the risk probe server;
所述终端设备将非对称加密数据上报至所述风险探针服务端;所述非对称加密数据包括所述加密数据、所述非对称加密密钥和所述非对称加密公钥;The terminal device reports asymmetric encrypted data to the risk probe server; the asymmetric encrypted data includes the encrypted data, the asymmetric encryption key, and the asymmetric encryption public key;
所述终端设备接收所述风险探针服务端发送的令牌,将所述令牌存储在本端,所述令牌为所述风险探针服务端根据所述加密数据、所述非对称加密密钥和所述非对称加密公钥生成的设备指纹对应的令牌。The terminal device receives the token sent by the risk probe server, and stores the token at the local end, where the token is the risk probe server according to the encrypted data and the asymmetric encryption The secret key and the token corresponding to the device fingerprint generated by the asymmetric encryption public key.
本申请实施例的第二方面提供了一种设备指纹生成方法,包括:The second aspect of the embodiments of the present application provides a device fingerprint generation method, including:
风险探针服务端接收终端设备发送的秘钥获取请求,向所述终端设备发送非对称加密公钥;所述非对称加密公钥用于所述终端设备采用非对称加密方式进行加密;The risk probe server receives the secret key acquisition request sent by the terminal device, and sends an asymmetric encryption public key to the terminal device; the asymmetric encryption public key is used for the terminal device to encrypt using an asymmetric encryption method;
所述风险探针服务端接收所述终端设备发送的非对称加密数据,采用与所述非对称加密公钥对应的非对称加密私钥对所述非对称加密数据进行解密,得到终端设备信息;The risk probe server receives the asymmetric encryption data sent by the terminal device, and decrypts the asymmetric encryption data with the asymmetric encryption private key corresponding to the asymmetric encryption public key to obtain terminal device information;
所述风险探针服务端基于所述终端设备信息生成设备指纹以及与所述设备指纹对应的令牌。The risk probe server generates a device fingerprint and a token corresponding to the device fingerprint based on the terminal device information.
本申请实施例的第三方面提供了一种终端设备信息传输装置,包括:A third aspect of the embodiments of the present application provides a terminal device information transmission apparatus, including:
获取单元,用于从硬件安全区获取数据签名和设备标识签名;The obtaining unit is used to obtain the data signature and the device identification signature from the hardware security zone;
第一生成单元,用于生成对称加密密钥;The first generating unit is used to generate a symmetric encryption key;
采集单元,用于采集终端设备信息;The collection unit is used to collect terminal equipment information;
第一加密单元,用于采用所述对称加密密钥对所述终端设备信息、所述数据签名和所述设备标识签名做对称加密,得到加密数据;The first encryption unit is configured to use the symmetric encryption key to perform symmetric encryption on the terminal device information, the data signature, and the device identification signature to obtain encrypted data;
所述第一加密单元,还用于采用非对称加密公钥对所述对称加密密钥做非对称加密处理,得到非对称加密密钥;所述非对称加密公钥从风险探针服务端获取;The first encryption unit is further configured to use an asymmetric encryption public key to perform asymmetric encryption processing on the symmetric encryption key to obtain an asymmetric encryption key; the asymmetric encryption public key is obtained from the risk probe server ;
第一通信单元,用于将非对称加密数据上报至所述风险探针服务端;所述非对称加密数据包括所述加密数据、所述非对称加密密钥和所述非对称加密公钥;The first communication unit is configured to report asymmetric encrypted data to the risk probe server; the asymmetric encrypted data includes the encrypted data, the asymmetric encryption key, and the asymmetric encryption public key;
所述第一通信单元,还用于接收所述风险探针服务端发送的令牌;The first communication unit is further configured to receive a token sent by the risk probe server;
存储单元,用于将所述令牌存储在本端,所述令牌为所述风险探针服务端根据所述加密数据、所述非对称加密密钥和所述非对称加密公钥生成的设备指纹对应的令牌。The storage unit is configured to store the token at the local end, and the token is generated by the risk probe server according to the encrypted data, the asymmetric encryption key, and the asymmetric encryption public key The token corresponding to the device fingerprint.
本申请实施例的第四方面提供了一种设备指纹生成装置,包括:The fourth aspect of the embodiments of the present application provides a device fingerprint generation device, including:
第二通信单元,用于接收终端设备发送的秘钥获取请求,向所述终端设备发送非对称加密公钥;所述非对称加密公钥用于所述终端设备采用非对称加密方式进行加密;The second communication unit is configured to receive a secret key acquisition request sent by a terminal device, and send an asymmetric encryption public key to the terminal device; the asymmetric encryption public key is used for the terminal device to perform encryption in an asymmetric encryption manner;
所述第二通信单元,还用于接收所述终端设备发送的非对称加密数据;The second communication unit is further configured to receive asymmetric encrypted data sent by the terminal device;
第二加密单元,用于采用与所述非对称加密公钥对应的非对称加密私钥对所述非对称加密数据进行解密,得到终端设备信息;The second encryption unit is configured to use the asymmetric encryption private key corresponding to the asymmetric encryption public key to decrypt the asymmetric encryption data to obtain terminal device information;
第二生成单元,用于基于所述终端设备信息生成设备指纹以及与所述设备指纹对应的令牌。The second generating unit is configured to generate a device fingerprint and a token corresponding to the device fingerprint based on the terminal device information.
本申请实施例的第五方面提供了一种终端设备,包括处理器和存储器,所述存储器用于存储计算机程序,所述计算机程序包括程序指令,所述处理器被配置用于调用所述程序指令,执行如本申请实施例第一方面中的步骤指令。A fifth aspect of the embodiments of the present application provides a terminal device, including a processor and a memory, the memory is used to store a computer program, the computer program includes program instructions, and the processor is configured to call the program The instruction executes the step instruction in the first aspect of the embodiment of the present application.
本申请实施例的第六方面提供了一种服务器,包括处理器和存储器,所述存储器用于存储计算机程序,所述计算机程序包括程序指令,所述处理器被配置用于调用所述程序指令,执行如本申请实施例第二方面中的步骤指令。A sixth aspect of the embodiments of the present application provides a server, including a processor and a memory, the memory is used to store a computer program, the computer program includes program instructions, and the processor is configured to call the program instructions , Execute the step instructions in the second aspect of the embodiment of the present application.
本申请实施例的第七方面提供了一种计算机可读存储介质,其中,上述计算机可读存储介质存储用于电子数据交换的计算机程序,其中,上述计算机程序使得计算机执行如本申请实施例第一方面中所描述的部分或全部步骤。A seventh aspect of the embodiments of the present application provides a computer-readable storage medium, wherein the above-mentioned computer-readable storage medium stores a computer program for electronic data exchange, wherein the above-mentioned computer program causes a computer to execute Some or all of the steps described in one aspect.
本申请实施例的第八方面提供了一种计算机可读存储介质,其中,上述计算机可读存储介质存储用于电子数据交换的计算机程序,其中,上述计算机程序使得计算机执行如本申请实施例第二方面中所描述的部分或全部步骤。An eighth aspect of the embodiments of the present application provides a computer-readable storage medium, wherein the above-mentioned computer-readable storage medium stores a computer program for electronic data exchange, wherein the above-mentioned computer program enables a computer to execute Part or all of the steps described in the two aspects.
本申请实施例的第九方面提供了一种计算机程序产品,其中,上述计算机程序产品包括存储了计算机程序的非瞬时性计算机可读存储介质,上述计算机程序可操作来使计算机执行如本申请实施例第一方面中所描述的部分或全部步骤。该计算机程序产品可以为一个软件安装包。The ninth aspect of the embodiments of the present application provides a computer program product, wherein the computer program product includes a non-transitory computer-readable storage medium storing a computer program, and the computer program is operable to cause a computer to execute as implemented in this application. Example part or all of the steps described in the first aspect. The computer program product may be a software installation package.
本申请实施例的第十方面提供了一种计算机程序产品,其中,上述计算机程序产品包括存储了计算机程序的非瞬时性计算机可读存储介质,上述计算机程序可操作来使计算机执行如本申请实施例第二方面中所描述的部分或全部步骤。该计算机程序产品可以为一个软件安装包。The tenth aspect of the embodiments of the present application provides a computer program product, wherein the computer program product includes a non-transitory computer-readable storage medium storing a computer program, and the computer program is operable to make a computer execute Examples of part or all of the steps described in the second aspect. The computer program product may be a software installation package.
本申请实施例中,所述终端设备从硬件安全区获取数据签名和设备标识签名;所述终端设备生成对称加密密钥,采集终端设备信息,采用所述对称加密密钥对所述终端设备信息、所述数据签名和所述设备标识签名做对称加密,得到加密数据;所述终端设备采用非对称加密公钥对所述对称加密密钥做非对称加密处理,得到非对称加密密钥;所述非对称加密公钥为所述终端设备从风险探针服务端获取;所述终端设备将非对称加密数据上报至所述风险探针服务端;所述非对称加密数据包括所述加密数据、所述非对称加密密钥和所述非对称加密公钥;所述终端设备接收所述风险探针服务端发送的令牌,将所述令牌存储 在本端,所述令牌为所述风险探针服务端根据所述加密数据、所述非对称加密密钥和所述非对称加密公钥生成的设备指纹对应的令牌。In the embodiment of this application, the terminal device obtains the data signature and the device identification signature from the hardware security zone; the terminal device generates a symmetric encryption key, collects terminal device information, and uses the symmetric encryption key to pair the terminal device information , The data signature and the device identification signature are symmetrically encrypted to obtain encrypted data; the terminal device uses an asymmetric encryption public key to perform asymmetric encryption on the symmetric encryption key to obtain an asymmetric encryption key; The asymmetric encryption public key is obtained by the terminal device from the risk probe server; the terminal device reports the asymmetric encryption data to the risk probe server; the asymmetric encryption data includes the encrypted data, The asymmetric encryption key and the asymmetric encryption public key; the terminal device receives the token sent by the risk probe server, stores the token at the local end, and the token is the The token corresponding to the device fingerprint generated by the risk probe server according to the encrypted data, the asymmetric encryption key, and the asymmetric encryption public key.
本申请实施例中,终端设备向风险探针服务端发送包含终端设备信息的非对称加密数据。由于数据签名和设备标识签名是从硬件安全区获取的,保证了数据签名和设备标识签名的安全性,保证了终端设备发送的数据的安全性。由于采用对称加密密钥对所述终端设备信息、所述数据签名和所述设备标识签名做对称加密,采用非对称加密公钥对所述对称加密密钥做非对称加密处理,得到非对称加密密钥,保证终端设备向风险探针服务端发送的非对称加密数据的安全性,保证了风险探针服务端接收的数据的安全性。在终端设备信息传输的过程中,从数据发送端和数据接收端都保证了传输的数据的安全性,从而可以提高终端设备信息传输的安全性。In this embodiment of the application, the terminal device sends asymmetric encrypted data containing terminal device information to the risk probe server. Since the data signature and the device identification signature are obtained from the hardware security zone, the security of the data signature and the device identification signature is ensured, and the security of the data sent by the terminal device is ensured. Since a symmetric encryption key is used to symmetrically encrypt the terminal device information, the data signature, and the device identification signature, an asymmetric encryption public key is used to perform asymmetric encryption on the symmetric encryption key to obtain asymmetric encryption The key ensures the security of the asymmetric encrypted data sent by the terminal device to the risk probe server, and ensures the security of the data received by the risk probe server. In the process of terminal device information transmission, both the data sending end and the data receiving end ensure the security of the transmitted data, so that the security of terminal device information transmission can be improved.
附图说明Description of the drawings
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly describe the technical solutions in the embodiments of the present application or the prior art, the following will briefly introduce the drawings that need to be used in the description of the embodiments or the prior art. Obviously, the drawings in the following description are only These are some embodiments of the present application. For those of ordinary skill in the art, other drawings can be obtained based on these drawings without creative work.
图1是本申请实施例提供的一种风险探针系统的结构示意图;FIG. 1 is a schematic structural diagram of a risk probe system provided by an embodiment of the present application;
图2是本申请实施例提供的一种终端设备信息传输方法的流程示意图;2 is a schematic flowchart of a method for transmitting terminal device information according to an embodiment of the present application;
图3是本申请实施例提供的一种设备指纹生成方法的流程示意图;FIG. 3 is a schematic flowchart of a method for generating device fingerprints according to an embodiment of the present application;
图4是本申请实施例提供的另一种设备指纹生成方法的流程示意图;4 is a schematic flowchart of another method for generating device fingerprints according to an embodiment of the present application;
图5是本申请实施例提供的另一种设备指纹生成方法的流程示意图;FIG. 5 is a schematic flowchart of another method for generating device fingerprints according to an embodiment of the present application;
图6是本申请实施例提供的另一种设备指纹生成方法的流程示意图;FIG. 6 is a schematic flowchart of another device fingerprint generation method provided by an embodiment of the present application;
图7是本申请实施例提供的另一种设备指纹生成方法的流程示意图;FIG. 7 is a schematic flowchart of another device fingerprint generation method provided by an embodiment of the present application;
图8是本申请实施例提供的一种业务接入流程示意图;FIG. 8 is a schematic diagram of a service access process provided by an embodiment of the present application;
图9为本申请实施例提供的一种终端设备信息传输装置的结构示意图;FIG. 9 is a schematic structural diagram of a terminal device information transmission apparatus provided by an embodiment of the application;
图10为本申请实施例提供的一种设备指纹生成装置的结构示意图;FIG. 10 is a schematic structural diagram of an apparatus for generating device fingerprints according to an embodiment of this application;
图11是本申请实施例提供的一种终端设备的结构示意图;FIG. 11 is a schematic structural diagram of a terminal device provided by an embodiment of the present application;
图12是本申请实施例提供的一种服务器的结构示意图。FIG. 12 is a schematic structural diagram of a server provided by an embodiment of the present application.
具体实施方式Detailed ways
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。The technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of this application.
本申请的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别不同对象,而不是用于描述特定顺序。此外,术语“包括”和“具有”以及它们任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、系统、产品或设备没有限定于已列出的步骤或单元,而是可选地还包括没有列出的步骤或单元,或可选地还包括对于这些过程、方法、产品或设备固有的其他步骤或单元。The terms "first", "second", etc. in the specification and claims of this application and the above-mentioned drawings are used to distinguish different objects, rather than to describe a specific sequence. In addition, the terms "including" and "having" and any variations of them are intended to cover non-exclusive inclusions. For example, a process, method, system, product, or device that includes a series of steps or units is not limited to the listed steps or units, but optionally includes unlisted steps or units, or optionally also includes Other steps or units inherent to these processes, methods, products or equipment.
在本申请中提及“实施例”意味着,结合实施例描述的特定特征、结构或特性可以包含在本申请的至少一个实施例中。在说明书中的各个位置出现该短语并不一定均是指相同的实施例,也不是与其它实施例互斥的独立的或备选的实施例。本领域技术人员显式地和隐式地理解的是,本申请所描述的实施例可以与其它实施例相结合。The reference to "embodiments" in this application means that a specific feature, structure, or characteristic described in conjunction with the embodiments may be included in at least one embodiment of the present application. The appearance of the phrase in various places in the specification does not necessarily refer to the same embodiment, nor is it an independent or alternative embodiment mutually exclusive with other embodiments. Those skilled in the art clearly and implicitly understand that the embodiments described in this application can be combined with other embodiments.
本申请实施例所涉及到的终端设备可以包括各种具有无线通信功能的手持设备、车载 设备、可穿戴设备、计算设备或连接到无线调制解调器的其他处理设备,以及各种形式的用户设备(user equipment,UE),移动台(mobile station,MS),终端设备(terminal device)等等。为方便描述,上面提到的设备统称为终端设备。The terminal devices involved in the embodiments of the present application may include various handheld devices with wireless communication functions, vehicle-mounted devices, wearable devices, computing devices or other processing devices connected to wireless modems, as well as various forms of user equipment (user equipment). equipment, UE), mobile station (mobile station, MS), terminal device (terminal device), and so on. For ease of description, the devices mentioned above are collectively referred to as terminal devices.
请参阅图1,图1是本申请实施例提供的一种风险探针系统的结构示意图,包括风险探针服务器100和与风险探针服务器100通信连接的至少一个终端设备101。终端设备101上可以安装有客户端,风险探针服务器100上可以安装有风险探针服务端。客户端是指与风险探针服务器相对应,为客户提供本地服务的程序。风险探针服务端也是在风险探针服务器上安装的一段程序,风险探针服务端是为客户端服务的,服务的内容诸如向客户端提供计算或者应用服务,向客户端提供资源,保存客户端数据等,比如,风险探针服务端可以向客户端提供针对终端设备的风险评估服务。风险探针服务器100可以直接与终端设备101通过互联网建立通信连接,风险探针服务端100也可以通过其他服务器与终端设备101通过互联网建立通信连接。本申请实施例不做限定。Please refer to FIG. 1. FIG. 1 is a schematic structural diagram of a risk probe system provided by an embodiment of the present application, which includes a risk probe server 100 and at least one terminal device 101 communicatively connected with the risk probe server 100. A client may be installed on the terminal device 101, and a risk probe server may be installed on the risk probe server 100. The client refers to the program that corresponds to the risk probe server and provides customers with local services. The risk probe server is also a program installed on the risk probe server. The risk probe server serves the client. The content of the service is such as providing computing or application services to the client, providing resources to the client, and saving the client. Terminal data, etc., for example, the risk probe server can provide the client with risk assessment services for terminal devices. The risk probe server 100 can directly establish a communication connection with the terminal device 101 via the Internet, and the risk probe server 100 can also establish a communication connection with the terminal device 101 via other servers via the Internet. The embodiments of this application do not make limitations.
本申请实施例中的风险探测服务器可以具备如下功能:(1)生成终端设备的唯一标识:终端设备指纹。(2)基于大数据对终端设备的业务类型倾向进行分类,对终端设备进行风险评估。The risk detection server in the embodiment of the present application may have the following functions: (1) Generate a unique identification of the terminal device: a fingerprint of the terminal device. (2) Based on big data, classify the business type tendency of terminal equipment, and conduct risk assessment of terminal equipment.
请参阅图2,图2是本申请实施例提供的一种终端设备信息传输方法的流程示意图。如图2所示,该终端设备信息传输方法可以包括如下步骤。Please refer to FIG. 2, which is a schematic flowchart of a method for transmitting terminal device information according to an embodiment of the present application. As shown in FIG. 2, the terminal device information transmission method may include the following steps.
201,终端设备从硬件安全区获取数据签名和设备标识签名。201. The terminal device obtains a data signature and a device identification signature from the hardware security zone.
终端设备可以支持REE运行,比如,通用OS:Android、iOS、Linux等REE。REE可以为上层应用(App)提供设备的所有功能。REE是开放的、可扩展的且通用的。REE提供的应用为RA。The terminal device can support REE operation, for example, general OS: REE such as Android, iOS, Linux. REE can provide all the functions of the device for the upper application (App). REE is open, extensible and universal. The application provided by REE is RA.
终端设备还可以支持可信执行环境(trusted execution environment,TEE)运行。TEE受硬件机制保护,TEE隔离于REE。TEE提供的应用为可信应用(Trusted Application,TA)。REE只能通过特定的入口与TEE中的TA通信。TEE具有硬件独占性,在TEE运行时,TEE可以使用终端设备的中央处理器(central processing unit,CPU)的全部性能。TEE还具有快速通信机制,TEE可以访问REE的内存,REE无法访问受硬件保护的TEE的内存。TEE中可以同时运行多个TA。The terminal device can also support trusted execution environment (TEE) operation. TEE is protected by hardware mechanism, and TEE is isolated from REE. The application provided by TEE is Trusted Application (TA). The REE can only communicate with the TA in the TEE through a specific entrance. The TEE has hardware exclusivity. When the TEE is running, the TEE can use all the performance of the central processing unit (CPU) of the terminal device. TEE also has a fast communication mechanism. TEE can access the memory of REE, but REE cannot access the memory of TEE protected by hardware. Multiple TAs can run simultaneously in TEE.
TA为TEE中的应用,TEE属于独立的硬件安全区,即使Android OS被root或刷ROM,也不会影响TEE的安全性。TA is an application in TEE. TEE belongs to an independent hardware security zone. Even if Android OS is rooted or ROM is flashed, it will not affect the security of TEE.
REE中的RA可以从TA中获取数据签名SIGN1和设备标识签名SIGN2。RA in REE can obtain data signature SIGN1 and equipment identification signature SIGN2 from TA.
数据签名SIGN1是终端设备信息关键字段集(Key Field Set,KeyFieldSet)数据的签名,KeyFieldSet是终端设备信息(Information Set,InfoSet)的子集。设备标识签名SIGN2是终端设备唯一标识的签名。由于软件层的设备标识不可靠,存在被篡改的风险,因此本申请实施例中的设备标识在硬件安全区中生成,并在硬件安全区维护唯一的设备标识。REE中的RA可以保证其内预置密钥、签名的安全性和设备指纹的唯一性。The data signature SIGN1 is the signature of the key field set (KeyFieldSet, KeyFieldSet) data of the terminal device information, and the KeyFieldSet is a subset of the terminal device information (InformationSet, InfoSet). The equipment identification signature SIGN2 is the signature of the unique identification of the terminal equipment. Since the device identification at the software layer is unreliable and there is a risk of being tampered with, the device identification in the embodiment of the present application is generated in the hardware security zone, and a unique device identification is maintained in the hardware security zone. The RA in REE can guarantee the security of its preset key, signature and uniqueness of device fingerprint.
其中,所述数据签名和设备标识签名为所述硬件安全区采用消息摘要算法加密得到。Wherein, the data signature and the device identification signature are obtained by encrypting the hardware security zone using a message digest algorithm.
硬件安全区生成数据签名和设备标识签名的方式具体为:The specific methods for generating data signatures and device identification signatures in the hardware security zone are as follows:
硬件安全区中的TA通过硬件安全区中的硬件生成随机数TRAN,并分别对(KeyFieldSet+TRAN)和(sk_2)做签名,得到数据签名SIGN1和设备标识签名SIGN2;然后对(SIGN1+SIGN2+TRAN)做非对称加密(秘钥为pk_1),得到EncSign;TA返回加密结果EncSign给终端设备的RA端。其中,sk_2是终端设备唯一标识。这里的sk_2可以认为是密钥对中的私钥,pk_2是密钥对中与sk_2对应的公钥。The TA in the hardware security zone generates a random number TRAN through the hardware in the hardware security zone, and signs (KeyFieldSet+TRAN) and (sk_2) respectively to obtain the data signature SIGN1 and the device identification signature SIGN2; then, the (SIGN1+SIGN2+ TRAN) does asymmetric encryption (the secret key is pk_1) to get EncSign; TA returns the encryption result EncSign to the RA end of the terminal device. Among them, sk_2 is the unique identifier of the terminal device. Here sk_2 can be considered as the private key in the key pair, and pk_2 is the public key corresponding to sk_2 in the key pair.
TA分别对(KeyFieldSet+TRAN)和(sk_2)做签名具体可以采用MD5加密方式进行签名。TA separately signs (KeyFieldSet+TRAN) and (sk_2), which can be signed by MD5 encryption.
具体的,SIGN1=MD5(KeyFieldSet+TRAN);SIGN2=MD5(sk_2)。Specifically, SIGN1=MD5(KeyFieldSet+TRAN); SIGN2=MD5(sk_2).
202,终端设备采集生成对称加密密钥,终端设备信息,采用对称加密密钥对终端设备信息、数据签名和设备标识签名做对称加密,得到加密数据。202. The terminal device collects and generates a symmetric encryption key and terminal device information, and uses the symmetric encryption key to perform symmetric encryption on the terminal device information, data signature, and device identification signature to obtain encrypted data.
本申请实施例中,终端设备可以通过软件随机生成对称加密密钥(key)。比如,终端设备可以通过富执行环境(rich execution environment,REE)提供的富应用(Rich Application,RA)采用随机数生成方式随机生成对称加密密钥。REE中的RA可以生成对称加密密钥。In the embodiment of the present application, the terminal device can randomly generate a symmetric encryption key (key) through software. For example, the terminal device can randomly generate a symmetric encryption key through a rich application (Rich Application, RA) provided by a rich execution environment (REE) using a random number generation method. The RA in the REE can generate a symmetric encryption key.
本申请实施例中,终端设备可以通过TEE中的RA采集终端设备信息。终端设备信息可以包括终端设备的硬件信息、系统信息、运行环境信息、网络信息等。In the embodiment of the present application, the terminal device may collect terminal device information through the RA in the TEE. Terminal device information may include terminal device hardware information, system information, operating environment information, network information, and so on.
其中,对称加密密钥(key)是步骤201中终端设备生成的。在加密时,采用对称加密密钥(key)对终端设备信息InfoSet、数据签名SIGN1和设备标识签名SIGN2做对称加密,得到加密数据(EnData);在解密时,需要采用对称加密密钥(key)对加密数据(EnData)进行解密,得到终端设备信息InfoSet、数据签名SIGN1和设备标识签名SIGN2。Among them, the symmetric encryption key (key) is generated by the terminal device in step 201. When encrypting, use a symmetric encryption key (key) to symmetrically encrypt the terminal device information InfoSet, data signature SIGN1, and device identification signature SIGN2 to obtain encrypted data (EnData); when decrypting, you need to use a symmetric encryption key (key) The encrypted data (EnData) is decrypted, and the terminal device information InfoSet, the data signature SIGN1 and the device identification signature SIGN2 are obtained.
203,终端设备采用非对称加密公钥对对称加密密钥做非对称加密处理,得到非对称加密密钥;非对称加密公钥为终端设备从风险探针服务端获取。203. The terminal device uses the asymmetric encryption public key to perform asymmetric encryption processing on the symmetric encryption key to obtain the asymmetric encryption key; the asymmetric encryption public key is obtained by the terminal device from the risk probe server.
对称加密密钥加密后,一旦对称加密密钥被破解,破解者可以直接采用对称加密密钥则进行解密,会造成信息的泄露。因此,本申请实施例采用非对称加密公钥(pk_1)对对称加密密钥(key)做非对称加密处理,得到非对称加密密钥(Enkey)。在对称加密密钥加密的前提下,再用非对称加密公钥对对称加密密钥进行加密,可以进一步提高数据传输的安全性。After the symmetric encryption key is encrypted, once the symmetric encryption key is cracked, the cracker can directly use the symmetric encryption key to decrypt, which will cause information leakage. Therefore, the embodiment of the present application uses the asymmetric encryption public key (pk_1) to perform asymmetric encryption processing on the symmetric encryption key (key) to obtain the asymmetric encryption key (Enkey). Under the premise of symmetric encryption key encryption, the asymmetric encryption public key is then used to encrypt the symmetric encryption key, which can further improve the security of data transmission.
其中,非对称加密公钥为终端设备从风险探针服务端获取。具体的,风险探针服务端可以生成非对称加密公钥(pk_1)和非对称加密私钥(sk_1),终端设备向风险探针服务端请求获取非对称加密公钥。非对称加密公钥(pk_1)和非对称加密私钥(sk_1)是密钥对,分别用来加密和解密。Among them, the asymmetric encryption public key is obtained by the terminal device from the risk probe server. Specifically, the risk probe server can generate the asymmetric encryption public key (pk_1) and the asymmetric encryption private key (sk_1), and the terminal device requests the risk probe server to obtain the asymmetric encryption public key. Asymmetric encryption public key (pk_1) and asymmetric encryption private key (sk_1) are key pairs, which are used for encryption and decryption, respectively.
可选的,在执行步骤201之前,还可以执行如下步骤:Optionally, before step 201 is performed, the following steps may also be performed:
终端设备向风险探针服务端发送秘钥获取请求,从所述风险探针服务端获取非对称加密公钥。The terminal device sends a secret key acquisition request to the risk probe server, and obtains the asymmetric encryption public key from the risk probe server.
204,终端设备将非对称加密数据上报至风险探针服务端;非对称加密数据包括加密数据、非对称加密密钥和非对称加密公钥。204. The terminal device reports the asymmetric encryption data to the risk probe server; the asymmetric encryption data includes the encrypted data, the asymmetric encryption key, and the asymmetric encryption public key.
本申请实施例中,终端设备将非对称加密数据上报至风险探针服务端之后,风险探针服务端可以通过与非对称加密公钥(pk_1)对应的非对称加密私钥(sk_1)对非对称加密密钥(Enkey)进行解密,得到对称加密密钥(key)。采用对称加密密钥(key)对加密数据(EnData)进行解密,得到终端设备信息InfoSet、数据签名SIGN1和设备标识签名SIGN2以及TRAN。In the embodiment of this application, after the terminal device reports the asymmetric encryption data to the risk probe server, the risk probe server can use the asymmetric encryption private key (sk_1) corresponding to the asymmetric encryption public key (pk_1) to counter the non-symmetric encryption data. The symmetric encryption key (Enkey) is decrypted to obtain the symmetric encryption key (key). Use a symmetric encryption key (key) to decrypt the encrypted data (EnData) to obtain terminal device information InfoSet, data signature SIGN1, device identification signature SIGN2, and TRAN.
风险探针服务端可以基于终端设备信息InfoSet生成设备指纹以及与所述设备指纹对应的令牌Token。The risk probe server can generate a device fingerprint and a token corresponding to the device fingerprint based on the terminal device information InfoSet.
可选的,风险探针服务端可以验签数据签名SIGN1。具体的,对KeyFieldSet+TRAN进行MD5签名并与SIGN1进行比对,若一致,则验签通过(KeyFieldSet是InfoSet的子集)。Optionally, the risk probe server can verify the data signature SIGN1. Specifically, MD5 signature is performed on KeyFieldSet+TRAN and compared with SIGN1. If they are consistent, the signature verification is passed (KeyFieldSet is a subset of InfoSet).
可选的,风险探针服务端可以根据设备标识签名SIGN2和TAND生成后端校验元素VerCode。其中,TAND为风险探针服务端生成的随机数。Optionally, the risk probe server can generate the back-end verification element VerCode according to the device identification signatures SIGN2 and TAND. Among them, TAND is a random number generated by the risk probe server.
可选的,风险探针服务端可以根据后端校验元素VerCode生成后端校验因子。具体的,验证SIGN2是否存在风险探针服务端的设备标识签名库中,若存在,进而可以得到密钥对中与sk_2对应的公钥pk_2(设备标识签名库中存在设备标识签名SIGN2与pk_2的映射)。风险探针服务端可以采用公钥pk_2对后端校验元素VerCode进行非对称加密,得到后端校验因子EnVerCode。Optionally, the risk probe server can generate a back-end check factor according to the back-end check element VerCode. Specifically, verify whether SIGN2 exists in the device identification signature library of the risk probe server. If it exists, then the public key pk_2 corresponding to sk_2 in the key pair can be obtained (the device identification signature library has a mapping of device identification signatures SIGN2 and pk_2 ). The risk probe server can use the public key pk_2 to perform asymmetric encryption on the back-end verification element VerCode to obtain the back-end verification factor EnVerCode.
205,终端设备接收风险探针服务端发送的令牌,将令牌存储在本端,令牌为风险探针服务端根据加密数据、非对称加密密钥和非对称加密公钥生成的设备指纹对应的令牌。205. The terminal device receives the token sent by the risk probe server, and stores the token on the local end. The token is the device fingerprint generated by the risk probe server according to the encrypted data, asymmetric encryption key, and asymmetric encryption public key. The corresponding token.
本申请实施例中,终端设备将非对称加密数据上报至风险探针服务端后,风险探针服务端对非对称加密数据进行解密,得到终端设备信息,根据终端设备信息生成设备指纹以及与所述设备指纹对应的令牌,风险探针服务端可以向终端设备发送令牌,终端设备可以将令牌存储在本端。比如,终端设备可以将令牌持久化存储在终端设备的非易失性存储器中。In the embodiment of this application, after the terminal device reports the asymmetric encrypted data to the risk probe server, the risk probe server decrypts the asymmetric encrypted data to obtain the terminal device information, and generates the device fingerprint and contact information based on the terminal device information. For the token corresponding to the device fingerprint, the risk probe server can send the token to the terminal device, and the terminal device can store the token on its own. For example, the terminal device can persistently store the token in the non-volatile memory of the terminal device.
其中,令牌Token是代表执行某些操作的权利的对象。令牌Token作为设备指纹的别名,在网络间传播,可以有效防止设备指纹在传播过程中存在恶意收集的风险。同时,令牌Token具有时效性,防止恶意用户对Token的伪造和作弊。Among them, Token is an object representing the right to perform certain operations. Token, as an alias for device fingerprints, spreads between networks, which can effectively prevent the risk of malicious collection of device fingerprints during the spreading process. At the same time, the token Token has timeliness to prevent malicious users from forging and cheating on the Token.
可选的,风险探针服务端可以将后端校验因子发送至终端设备,终端设备可以通过所述硬件安全区对所述后端校验因子进行校验,基于所述后端校验因子生成前端校验因子,将所述前端校验因子发送至所述风险探针服务端,所述前端校验因子用于所述风险探针服务端进行安全校验;Optionally, the risk probe server may send the back-end check factor to the terminal device, and the terminal device may check the back-end check factor through the hardware security zone, based on the back-end check factor Generating a front-end check factor and sending the front-end check factor to the risk probe server, where the front-end check factor is used by the risk probe server to perform security verification;
在所述风险探针服务端对所述前端校验因子校验成功的情况下,所述终端设备执行步骤205。When the risk probe server successfully verifies the front-end check factor, the terminal device executes step 205.
本申请实施例中,终端设备可以通过所述硬件安全区中的TA对所述后端校验因子EnVerCode进行解密,得到后端校验元素VerCode。终端设备可以通过所述硬件安全区中的TA采用非对称加密公钥(pk_1)对后端校验元素VerCode和设备标识签名SIGN2进行非对称加密,得到前端校验因子EnSIGN2。终端设备通过RA将前端校验因子EnSIGN2发送至风险探针服务端,风险探针服务端对前端校验因子EnSIGN2进行安全校验。具体的,风险探针服务端通过非对称加密私钥(sk_1)对前端校验因子EnSIGN2进行解密,得到后端校验元素VerCode和设备标识签名SIGN2,风险探针服务端对后端校验元素VerCode和设备标识签名SIGN2进行校验。In the embodiment of the present application, the terminal device may decrypt the back-end verification factor EnVerCode through the TA in the hardware security zone to obtain the back-end verification element VerCode. The terminal device can use the asymmetric encryption public key (pk_1) to perform asymmetric encryption on the back-end verification element VerCode and the device identification signature SIGN2 through the TA in the hardware security zone to obtain the front-end verification factor EnSIGN2. The terminal equipment sends the front-end check factor EnSIGN2 to the risk probe server through the RA, and the risk probe server performs a security check on the front-end check factor EnSIGN2. Specifically, the risk probe server uses the asymmetric encryption private key (sk_1) to decrypt the front-end verification factor EnSIGN2 to obtain the back-end verification element VerCode and the device identification signature SIGN2. The risk probe server verifies the back-end verification element VerCode and equipment identification signature SIGN2 are verified.
在所述风险探针服务端对所述前端校验因子校验成功的情况下,风险探针服务端向所述终端设备发送令牌Token。When the risk probe server successfully verifies the front-end check factor, the risk probe server sends a token to the terminal device.
本申请实施例中,可以增强风险探针服务端的后端校验,在风险探针服务端生成经过非对称加密的后端校验因子,还可以增强终端设备的前端校验。终端设备与风险探针服务端可以交互验证,可以增加终端设备作弊成本,弥补RA的不可信和不安全的不足。In the embodiment of the present application, the back-end verification of the risk probe server can be enhanced, the back-end verification factor after asymmetric encryption is generated on the risk probe server, and the front-end verification of the terminal device can also be enhanced. The terminal equipment and the risk probe server can be mutually verified, which can increase the cheating cost of the terminal equipment and make up for the lack of untrustworthiness and insecurity of RA.
本申请实施例中,终端设备向风险探针服务端发送包含终端设备信息的非对称加密数据。由于数据签名和设备标识签名是从硬件安全区获取的,保证了数据签名和设备标识签名的安全性,保证了终端设备发送的数据的安全性。由于采用对称加密密钥对所述终端设备信息、所述数据签名和所述设备标识签名做对称加密,采用非对称加密公钥对所述对称加密密钥做非对称加密处理,得到非对称加密密钥,保证终端设备向风险探针服务端发送的非对称加密数据的安全性,保证了风险探针服务端接收的数据的安全性。在终端设备信息传输的过程中,从数据发送端和数据接收端都保证了传输的数据的安全性,从而可以提高终端设备信息传输的安全性。In this embodiment of the application, the terminal device sends asymmetric encrypted data containing terminal device information to the risk probe server. Since the data signature and the device identification signature are obtained from the hardware security zone, the security of the data signature and the device identification signature is ensured, and the security of the data sent by the terminal device is ensured. Since a symmetric encryption key is used to symmetrically encrypt the terminal device information, the data signature, and the device identification signature, an asymmetric encryption public key is used to perform asymmetric encryption on the symmetric encryption key to obtain asymmetric encryption The key ensures the security of the asymmetric encrypted data sent by the terminal device to the risk probe server, and ensures the security of the data received by the risk probe server. In the process of terminal device information transmission, both the data sending end and the data receiving end ensure the security of the transmitted data, so that the security of terminal device information transmission can be improved.
请参阅图3,图3是本申请实施例提供的一种设备指纹生成方法的流程示意图。如图3所示,该设备指纹生成方法可以包括如下步骤。Please refer to FIG. 3, which is a schematic flowchart of a method for generating device fingerprints according to an embodiment of the present application. As shown in Figure 3, the device fingerprint generation method may include the following steps.
301,风险探针服务端接收终端设备发送的秘钥获取请求,向终端设备发送非对称加密公钥;非对称加密公钥用于终端设备采用非对称加密方式进行加密。301. The risk probe server receives a secret key acquisition request sent by the terminal device, and sends an asymmetric encryption public key to the terminal device; the asymmetric encryption public key is used for the terminal device to encrypt using an asymmetric encryption method.
本申请实施例中,风险探针服务端可以生成非对称加密公钥(pk_1)和非对称加密私钥(sk_1),在接收到终端设备发送的秘钥获取请求后,风险探针服务端可以向终端设备发送非对称加密公钥(pk_1)。终端设备接收到非对称加密公钥(pk_1)后,终端设备采用非 对称加密公钥(pk_1)对对称加密密钥(key)做非对称加密处理,得到非对称加密密钥(Enkey)。In the embodiment of this application, the risk probe server can generate the asymmetric encryption public key (pk_1) and the asymmetric encryption private key (sk_1). After receiving the secret key acquisition request sent by the terminal device, the risk probe server can Send the asymmetric encryption public key (pk_1) to the terminal device. After the terminal device receives the asymmetric encryption public key (pk_1), the terminal device uses the asymmetric encryption public key (pk_1) to perform asymmetric encryption on the symmetric encryption key (key) to obtain the asymmetric encryption key (Enkey).
其中,对称加密密钥(key)是终端设备生成的,对称加密密钥(key)是终端设备用来对终端设备信息InfoSet、数据签名SIGN1和设备标识签名SIGN2做对称加密的。数据签名SIGN1和设备标识签名SIGN2是终端设备从硬件安全区中的TA中获取的。Among them, the symmetric encryption key (key) is generated by the terminal device, and the symmetric encryption key (key) is used by the terminal device to symmetrically encrypt the terminal device information InfoSet, the data signature SIGN1, and the device identification signature SIGN2. The data signature SIGN1 and the device identification signature SIGN2 are obtained by the terminal device from the TA in the hardware security zone.
终端设备可以通过TEE中的RA采集终端设备信息(终端设备信息可以包括终端设备的硬件信息、系统信息、运行环境信息、网络信息等),终端设备可以采用对称加密密钥(key)对终端设备信息InfoSet、数据签名SIGN1和设备标识签名SIGN2做对称加密,得到加密数据(EnData)。Terminal equipment can collect terminal equipment information through RA in TEE (terminal equipment information can include terminal equipment hardware information, system information, operating environment information, network information, etc.), terminal equipment can use a symmetric encryption key (key) to terminal equipment Information InfoSet, data signature SIGN1 and equipment identification signature SIGN2 are symmetrically encrypted to obtain encrypted data (EnData).
终端设备可以采用非对称加密公钥(pk_1)对对称加密密钥(key)做非对称加密处理,得到非对称加密密钥(Enkey)。The terminal device can use the asymmetric encryption public key (pk_1) to perform asymmetric encryption processing on the symmetric encryption key (key) to obtain the asymmetric encryption key (Enkey).
302,风险探针服务端接收终端设备发送的非对称加密数据,采用与非对称加密公钥对应的非对称加密私钥对非对称加密数据进行解密,得到终端设备信息。302. The risk probe server receives the asymmetric encryption data sent by the terminal device, and decrypts the asymmetric encryption data with the asymmetric encryption private key corresponding to the asymmetric encryption public key to obtain terminal device information.
可选的,所述非对称加密数据包括加密数据、非对称加密密钥和非对称加密公钥;步骤302中,所述风险探针服务端采用与所述非对称加密公钥对应的非对称加密私钥对所述非对称加密数据进行解密,得到终端设备信息,包括如下步骤:Optionally, the asymmetric encryption data includes encrypted data, an asymmetric encryption key, and an asymmetric encryption public key; in step 302, the risk probe server uses an asymmetric encryption corresponding to the asymmetric encryption public key. The encryption private key decrypts the asymmetric encrypted data to obtain terminal device information, including the following steps:
(11)所述风险探针服务端采用与所述非对称加密公钥对应的非对称加密私钥对所述非对称加密密钥进行解密,得到对称加密密钥;(11) The risk probe server uses the asymmetric encryption private key corresponding to the asymmetric encryption public key to decrypt the asymmetric encryption key to obtain the symmetric encryption key;
(12)所述风险探针服务端采用所述对称加密密钥对加密数据进行解密,得到所述终端设备信息。(12) The risk probe server uses the symmetric encryption key to decrypt the encrypted data to obtain the terminal device information.
本申请实施例中,非对称加密数据包括加密数据(EnData)、非对称加密密钥(Enkey)和非对称加密公钥(pk_1)。风险探针服务端接收终端设备发送的非对称加密数据后,风险探针服务端可以通过与非对称加密公钥(pk_1)对应的非对称加密私钥(sk_1)对非对称加密密钥(Enkey)进行解密,得到对称加密密钥(key)。采用对称加密密钥(key)对加密数据(EnData)进行解密,得到终端设备信息InfoSet、数据签名SIGN1和设备标识签名SIGN2。In the embodiment of the present application, the asymmetric encryption data includes encrypted data (EnData), asymmetric encryption key (Enkey), and asymmetric encryption public key (pk_1). After the risk probe server receives the asymmetric encryption data sent by the terminal device, the risk probe server can use the asymmetric encryption private key (sk_1) corresponding to the asymmetric encryption public key (pk_1) to pair the asymmetric encryption key (Enkey ) Is decrypted to obtain a symmetric encryption key (key). Use a symmetric encryption key (key) to decrypt the encrypted data (EnData) to obtain terminal device information InfoSet, data signature SIGN1, and device identification signature SIGN2.
303,风险探针服务端基于终端设备信息生成设备指纹以及与设备指纹对应的令牌。303. The risk probe server generates a device fingerprint and a token corresponding to the device fingerprint based on the terminal device information.
本申请实施例中,设备指纹(Device fingerprint)是指可以用于唯一标识出该设备的设备特征或者独特的设备标识。每台终端设备的终端设备信息都是唯一的,因此,生成的设备指纹也是唯一的。In the embodiments of the present application, a device fingerprint (Device fingerprint) refers to a device feature or a unique device identifier that can be used to uniquely identify the device. The terminal device information of each terminal device is unique, so the generated device fingerprint is also unique.
可选的,在执行步骤303之后,还可以执行如下步骤:Optionally, after step 303 is performed, the following steps may be performed:
所述风险探针服务端向所述终端设备发送所述令牌。The risk probe server sends the token to the terminal device.
可选的,在执行步骤303之后,还可以执行如下步骤:Optionally, after step 303 is performed, the following steps may be performed:
所述风险探针服务端生成后端校验因子,将所述后端校验因子发送至所述终端设备,所述后端校验因子用于所述终端设备通过硬件安全区进行安全校验。The risk probe server generates a back-end check factor, and sends the back-end check factor to the terminal device, where the back-end check factor is used by the terminal device to perform a security check through the hardware security zone .
本申请实施例中,风险探针服务端可以根据设备标识签名SIGN2和TAND生成后端校验元素VerCode。其中,TAND为风险探针服务端生成的随机数。风险探针服务端可以根据后端校验元素VerCode生成后端校验因子。具体的,通过设备标识签名库中存在设备标识签名SIGN2与pk_2的映射关系,可以得到密钥对中与sk_2对应的公钥pk_2。风险探针服务端可以采用公钥pk_2对后端校验元素VerCode进行非对称加密,得到后端校验因子EnVerCode。In the embodiment of the present application, the risk probe server can generate the back-end verification element VerCode according to the device identification signature SIGN2 and TAND. Among them, TAND is a random number generated by the risk probe server. The risk probe server can generate a back-end verification factor based on the back-end verification element VerCode. Specifically, according to the mapping relationship between the device identification signature SIGN2 and pk_2 in the device identification signature library, the public key pk_2 corresponding to sk_2 in the key pair can be obtained. The risk probe server can use the public key pk_2 to perform asymmetric encryption on the back-end verification element VerCode to obtain the back-end verification factor EnVerCode.
可选的,在所述终端设备通过硬件安全区对所述后端校验因子校验成功的情况下,所述风险探针服务端接收所述终端设备发送的前端校验因子;Optionally, when the terminal device successfully verifies the back-end check factor through the hardware security zone, the risk probe server receives the front-end check factor sent by the terminal device;
所述风险探针服务端对所述前端校验因子进行安全校验;The risk probe server performs a security check on the front-end check factor;
在所述风险探针服务端对所述前端校验因子校验成功的情况下,所述风险探针服务端执行所述向所述终端设备发送所述令牌的步骤。In the case that the risk probe server successfully verifies the front-end check factor, the risk probe server executes the step of sending the token to the terminal device.
本申请实施例中,终端设备可以通过所述硬件安全区中的TA对所述后端校验因子EnVerCode进行解密,得到后端校验元素VerCode,对设备标识签名SIGN2进行校验。校验通过后,终端设备可以通过所述硬件安全区中的TA采用非对称加密公钥(pk_1)对后端校验元素VerCode和设备标识签名SIGN2进行非对称加密,得到前端校验因子EnSIGN2。终端设备通过RA将前端校验因子EnSIGN2发送至风险探针服务端,风险探针服务端对前端校验因子EnSIGN2进行安全校验。具体的,风险探针服务端通过非对称加密私钥(sk_1)对前端校验因子EnSIGN2进行解密,得到后端校验元素VerCode和设备标识签名SIGN2,风险探针服务端对后端校验元素VerCode和设备标识签名SIGN2进行校验。在所述风险探针服务端对所述前端校验因子校验成功的情况下,风险探针服务端向所述终端设备发送令牌Token。In the embodiment of the present application, the terminal device may decrypt the back-end verification factor EnVerCode through the TA in the hardware security zone to obtain the back-end verification element VerCode, and verify the device identification signature SIGN2. After the verification is passed, the terminal device can use the asymmetric encryption public key (pk_1) to perform asymmetric encryption on the back-end verification element VerCode and the device identification signature SIGN2 through the TA in the hardware security zone to obtain the front-end verification factor EnSIGN2. The terminal equipment sends the front-end check factor EnSIGN2 to the risk probe server through the RA, and the risk probe server performs a security check on the front-end check factor EnSIGN2. Specifically, the risk probe server uses the asymmetric encryption private key (sk_1) to decrypt the front-end verification factor EnSIGN2 to obtain the back-end verification element VerCode and the device identification signature SIGN2. The risk probe server verifies the back-end verification element VerCode and equipment identification signature SIGN2 are verified. When the risk probe server successfully verifies the front-end check factor, the risk probe server sends a token to the terminal device.
本申请实施例中,可以增强风险探针服务端的后端校验,在风险探针服务端生成经过非对称加密的后端校验因子,还可以增强终端设备的前端校验。终端设备与风险探针服务端可以交互验证,可以增加终端设备作弊成本,弥补RA的不可信和不安全的不足。In the embodiment of the present application, the back-end verification of the risk probe server can be enhanced, the back-end verification factor after asymmetric encryption is generated on the risk probe server, and the front-end verification of the terminal device can also be enhanced. The terminal equipment and the risk probe server can be mutually verified, which can increase the cheating cost of the terminal equipment and make up for the lack of untrustworthiness and insecurity of RA.
本申请实施例中,风险探针服务端接收终端设备发送的非对称加密数据,采用与非对称加密公钥对应的非对称加密私钥对非对称加密数据进行解密,得到终端设备信息。由于非对称加密数据是终端设备采用对称加密密钥进行加密,保证风险探针服务端从终端设备接收的非对称加密数据的安全性,保证了风险探针服务端接收的数据的安全性。从而保证设备指纹生成的安全性。In the embodiment of this application, the risk probe server receives the asymmetric encryption data sent by the terminal device, and decrypts the asymmetric encryption data with the asymmetric encryption private key corresponding to the asymmetric encryption public key to obtain terminal device information. Since the asymmetric encrypted data is encrypted by the terminal device using a symmetric encryption key, the security of the asymmetric encrypted data received from the terminal device by the risk probe server is ensured, and the security of the data received by the risk probe server is guaranteed. Thereby ensuring the security of device fingerprint generation.
请参阅图4,图4是本申请实施例提供的另一种设备指纹生成方法的流程示意图。如图4所示,该设备指纹生成方法可以包括如下步骤。Please refer to FIG. 4, which is a schematic flowchart of another device fingerprint generation method provided by an embodiment of the present application. As shown in Figure 4, the device fingerprint generation method may include the following steps.
401,风险探针服务端接收终端设备发送的秘钥获取请求,向终端设备发送非对称加密公钥;非对称加密公钥用于终端设备采用非对称加密方式进行加密。401. The risk probe server receives a secret key acquisition request sent by a terminal device, and sends an asymmetric encryption public key to the terminal device; the asymmetric encryption public key is used for the terminal device to encrypt using an asymmetric encryption method.
402,风险探针服务端接收终端设备发送的非对称加密数据,采用与非对称加密公钥对应的非对称加密私钥对非对称加密数据进行解密,得到终端设备信息。402. The risk probe server receives the asymmetric encryption data sent by the terminal device, and uses the asymmetric encryption private key corresponding to the asymmetric encryption public key to decrypt the asymmetric encryption data to obtain terminal device information.
403,风险探针服务端基于终端设备信息生成设备指纹以及与设备指纹对应的令牌。403. The risk probe server generates a device fingerprint and a token corresponding to the device fingerprint based on the terminal device information.
本申请实施例中的步骤401至步骤403的具体实施可以参加图3所示的步骤301至步骤303,此处不再赘述。The specific implementation of step 401 to step 403 in the embodiment of the present application can participate in step 301 to step 303 shown in FIG. 3, which will not be repeated here.
404,风险探针服务端根据终端设备信息、历史上报数据、业务风控数据进行大数据计算,对终端设备的业务倾向分类进行标识,对终端设备的设备风险等级进行标识。404. The risk probe server performs big data calculations based on terminal device information, historical reported data, and business risk control data, identifies the business tendency classification of the terminal device, and identifies the equipment risk level of the terminal device.
本申请实施例中,风险探针服务端可以构建终端设备画像库。风险探针服务端可以对终端设备上报的终端设备信息Infoset进行清洗,并结合历史上报数据、业务风控数据进行大数据计算,对设备指纹进行业务倾向分类和风险打标,从而构建终端设备画像库。In the embodiment of the present application, the risk probe server can construct a terminal device portrait library. The risk probe server can clean the terminal device information Infoset reported by the terminal device, and combine the historical reported data and business risk control data to perform big data calculations, and perform business tendency classification and risk marking on device fingerprints to build a terminal device profile Library.
可选的,在执行步骤404之后,还可以执行如下步骤:Optionally, after step 404 is performed, the following steps may be performed:
风险探针服务端向所述终端设备发送所述终端设备的设备风险等级标识。The risk probe server sends the device risk level identifier of the terminal device to the terminal device.
本申请实施例的风险探针服务端可以结合终端设备信息(比如,运行环境、系统状态等等)、业务数据以及风控情报,通过大数据技术和机器学习,对设备风险等级进行标识,从而快速准确的获取设备风险等级,为终端设备提供风险预警服务。The risk probe server of the embodiment of this application can combine terminal equipment information (such as operating environment, system status, etc.), business data, and risk control information, and use big data technology and machine learning to identify equipment risk levels, thereby Obtain equipment risk levels quickly and accurately, and provide risk early warning services for terminal equipment.
请参阅图5,图5是本申请实施例提供的另一种设备指纹生成方法的流程示意图。终端设备可以包括终端设备RA,风险探针服务端可以是欧珀风险探针(OPPO Risk Probe,ORP)后端。如图5所示,该设备指纹生成方法可以包括如下步骤。Please refer to FIG. 5, which is a schematic flowchart of another device fingerprint generation method provided by an embodiment of the present application. The terminal equipment may include the terminal equipment RA, and the risk probe server may be the OPPO Risk Probe (ORP) backend. As shown in Figure 5, the device fingerprint generation method may include the following steps.
501,终端设备RA向ORP后端发送秘钥获取请求,从所述ORP后端获取非对称加密公钥。501. The terminal device RA sends a secret key acquisition request to the ORP back end, and obtains the asymmetric encryption public key from the ORP back end.
其中,ORP后端可以产生秘钥对(非对称加密公钥pk_1和非对称加密私钥sk_1)。Among them, the ORP backend can generate a secret key pair (asymmetric encryption public key pk_1 and asymmetric encryption private key sk_1).
502,终端设备RA请求硬件安全区中的终端设备TA获取数据签名和设备标识签名。502. The terminal device RA requests the terminal device TA in the hardware security zone to obtain a data signature and a device identification signature.
硬件安全区中的终端设备TA生成数据签名和设备标识签名的方式具体为:The specific method for the terminal device TA in the hardware security zone to generate the data signature and the device identification signature is as follows:
硬件安全区中的终端设备TA通过硬件安全区中的硬件生成随机数TRAN,并分别对(KeyFieldSet+TRAN)和(sk_2)做签名,得到数据签名SIGN1和设备标识签名SIGN2;然后对(SIGN1+SIGN2+TRAN)做非对称加密(秘钥为pk_1),得到EncSign;终端设备TA返回加密结果EncSign给终端设备的RA端。其中,sk_2是终端设备唯一标识。这里的sk_2可以认为是密钥对中的私钥,pk_2是密钥对中与sk_2对应的公钥。The terminal device TA in the hardware security zone generates a random number TRAN through the hardware in the hardware security zone, and signs (KeyFieldSet+TRAN) and (sk_2) respectively to obtain the data signature SIGN1 and the device identification signature SIGN2; then, the (SIGN1+ SIGN2+TRAN) do asymmetric encryption (the secret key is pk_1) to get EncSign; the terminal device TA returns the encryption result EncSign to the RA end of the terminal device. Among them, sk_2 is the unique identifier of the terminal device. Here sk_2 can be considered as the private key in the key pair, and pk_2 is the public key corresponding to sk_2 in the key pair.
终端设备TA分别对(KeyFieldSet+TRAN)和(sk_2)做签名具体可以采用MD5加密方式进行签名。The terminal device TA separately signs (KeyFieldSet+TRAN) and (sk_2), specifically, MD5 encryption method can be used to sign.
具体的,SIGN1=MD5(KeyFieldSet+TRAN);SIGN2=MD5(sk_2)。Specifically, SIGN1=MD5(KeyFieldSet+TRAN); SIGN2=MD5(sk_2).
503,终端设备RA生成对称加密密钥,终端设备RA采集终端设备信息,采用对称加密密钥对终端设备信息、数据签名和设备标识签名做对称加密,得到加密数据。503. The terminal device RA generates a symmetric encryption key, and the terminal device RA collects terminal device information, and uses the symmetric encryption key to perform symmetric encryption on the terminal device information, data signature, and device identification signature to obtain encrypted data.
其中,步骤503的具体实施可以参见步骤202的描述,此处不再赘述。For the specific implementation of step 503, refer to the description of step 202, which will not be repeated here.
504,终端设备RA采用非对称加密公钥对对称加密密钥做非对称加密处理,得到非对称加密密钥。504. The terminal device RA uses the asymmetric encryption public key to perform asymmetric encryption processing on the symmetric encryption key to obtain the asymmetric encryption key.
其中,步骤504的具体实施可以参见步骤203的描述,此处不再赘述。For the specific implementation of step 504, refer to the description of step 203, which will not be repeated here.
505,终端设备RA将非对称加密数据上报至ORP后端;非对称加密数据包括加密数据、非对称加密密钥和非对称加密公钥。505. The terminal device RA reports the asymmetric encryption data to the ORP backend; the asymmetric encryption data includes the encrypted data, the asymmetric encryption key, and the asymmetric encryption public key.
其中,步骤505的具体实施可以参见步骤204的描述,此处不再赘述。For the specific implementation of step 505, refer to the description of step 204, which will not be repeated here.
506,ORP后端接收终端设备RA发送的非对称加密数据,采用与非对称加密公钥对应的非对称加密私钥对非对称加密数据进行解密,得到终端设备信息。506. The ORP back-end receives the asymmetric encryption data sent by the terminal device RA, and decrypts the asymmetric encryption data with the asymmetric encryption private key corresponding to the asymmetric encryption public key to obtain terminal device information.
其中,步骤506的具体实施可以参见步骤302的描述,此处不再赘述。For the specific implementation of step 506, refer to the description of step 302, which will not be repeated here.
507,ORP后端基于终端设备信息生成设备指纹以及与设备指纹对应的令牌。507. The ORP backend generates a device fingerprint and a token corresponding to the device fingerprint based on the terminal device information.
其中,步骤507的具体实施可以参见步骤303的描述,此处不再赘述。For the specific implementation of step 507, refer to the description of step 303, which will not be repeated here.
508,终端设备RA接收ORP后端发送的令牌,将令牌存储在本端。508. The terminal device RA receives the token sent by the ORP backend, and stores the token on the local end.
其中,步骤508的具体实施可以参见步骤205的描述,此处不再赘述。For the specific implementation of step 508, refer to the description of step 205, which will not be repeated here.
本申请实施例中,终端设备向风险探针服务端发送包含终端设备信息的非对称加密数据。由于数据签名和设备标识签名是从硬件安全区获取的,保证了数据签名和设备标识签名的安全性,保证了终端设备发送的数据的安全性。由于采用对称加密密钥对所述终端设备信息、所述数据签名和所述设备标识签名做对称加密,采用非对称加密公钥对所述对称加密密钥做非对称加密处理,得到非对称加密密钥,保证终端设备向风险探针服务端发送的非对称加密数据的安全性,保证了风险探针服务端接收的数据的安全性。在终端设备信息传输的过程中,从数据发送端和数据接收端都保证了传输的数据的安全性,从而可以提高终端设备信息传输的安全性。风险探针服务端接收终端设备发送的非对称加密数据,采用与非对称加密公钥对应的非对称加密私钥对非对称加密数据进行解密,得到终端设备信息。由于非对称加密数据是终端设备采用对称加密密钥进行加密,保证风险探针服务端从终端设备接收的非对称加密数据的安全性,保证了风险探针服务端接收的数据的安全性。从而保证设备指纹生成的安全性。In this embodiment of the application, the terminal device sends asymmetric encrypted data containing terminal device information to the risk probe server. Since the data signature and the device identification signature are obtained from the hardware security zone, the security of the data signature and the device identification signature is ensured, and the security of the data sent by the terminal device is ensured. Since a symmetric encryption key is used to symmetrically encrypt the terminal device information, the data signature, and the device identification signature, an asymmetric encryption public key is used to perform asymmetric encryption on the symmetric encryption key to obtain asymmetric encryption The key ensures the security of the asymmetric encrypted data sent by the terminal device to the risk probe server, and ensures the security of the data received by the risk probe server. In the process of terminal device information transmission, both the data sending end and the data receiving end ensure the security of the transmitted data, so that the security of terminal device information transmission can be improved. The risk probe server receives the asymmetric encryption data sent by the terminal device, and decrypts the asymmetric encryption data with the asymmetric encryption private key corresponding to the asymmetric encryption public key to obtain terminal device information. Since the asymmetric encrypted data is encrypted by the terminal device using a symmetric encryption key, the security of the asymmetric encrypted data received from the terminal device by the risk probe server is ensured, and the security of the data received by the risk probe server is guaranteed. Thereby ensuring the security of device fingerprint generation.
请参阅图6,图6是本申请实施例提供的另一种设备指纹生成方法的流程示意图。终端设备可以包括终端设备RA,风险探针服务端可以是欧珀风险探针(OPPO Risk Probe,ORP)后端。如图6所示,该设备指纹生成方法可以包括如下步骤。Please refer to FIG. 6, which is a schematic flowchart of another device fingerprint generation method provided by an embodiment of the present application. The terminal equipment may include the terminal equipment RA, and the risk probe server may be the OPPO Risk Probe (ORP) backend. As shown in Figure 6, the device fingerprint generation method may include the following steps.
601,终端设备RA向ORP后端发送秘钥获取请求,从所述ORP后端获取非对称加密公钥。601. The terminal device RA sends a secret key acquisition request to the ORP backend, and acquires the asymmetric encryption public key from the ORP backend.
602,终端设备RA请求硬件安全区中的终端设备TA获取数据签名和设备标识签名。602. The terminal device RA requests the terminal device TA in the hardware security zone to obtain a data signature and a device identification signature.
603,终端设备RA生成对称加密密钥,终端设备RA采集终端设备信息,采用对称加密密钥对终端设备信息、数据签名和设备标识签名做对称加密,得到加密数据。603. The terminal device RA generates a symmetric encryption key, and the terminal device RA collects terminal device information, and uses the symmetric encryption key to perform symmetric encryption on the terminal device information, data signature, and device identification signature to obtain encrypted data.
604,终端设备RA采用非对称加密公钥对对称加密密钥做非对称加密处理,得到非对称加密密钥。604. The terminal equipment RA uses the asymmetric encryption public key to perform asymmetric encryption processing on the symmetric encryption key to obtain the asymmetric encryption key.
605,终端设备RA将非对称加密数据上报至ORP后端;非对称加密数据包括加密数据、非对称加密密钥和非对称加密公钥。605. The terminal device RA reports the asymmetric encryption data to the ORP backend; the asymmetric encryption data includes the encrypted data, the asymmetric encryption key, and the asymmetric encryption public key.
606,ORP后端接收终端设备RA发送的非对称加密数据,采用与非对称加密公钥对应的非对称加密私钥对非对称加密数据进行解密,得到终端设备信息。606. The ORP back-end receives the asymmetric encryption data sent by the terminal device RA, and decrypts the asymmetric encryption data with the asymmetric encryption private key corresponding to the asymmetric encryption public key to obtain terminal device information.
其中,步骤601至步骤606的具体实施可以参加图5所示的步骤501至步骤506,此处不再赘述。Among them, the specific implementation of step 601 to step 606 can participate in step 501 to step 506 shown in FIG. 5, which will not be repeated here.
607,ORP后端生成后端校验因子,通过所述终端设备RA将后端校验因子发送至终端设备TA。607. The ORP back-end generates a back-end check factor, and sends the back-end check factor to the terminal device TA through the terminal device RA.
608,终端设备TA对所述后端校验因子进行校验。608. The terminal device TA checks the back-end check factor.
609,若校验成功,终端设备TA生成前端校验因子,通过所述终端设备RA将前端校验因子发送至ORP后端。609: If the verification is successful, the terminal device TA generates a front-end check factor, and sends the front-end check factor to the ORP back end through the terminal device RA.
610,ORP后端对所述前端校验因子进行安全校验。610. The ORP back-end performs a security check on the front-end check factor.
本申请实施例中,ORP后端可以根据设备标识签名SIGN2和TAND生成后端校验元素VerCode。其中,TAND为ORP后端生成的随机数。ORP后端可以根据后端校验元素VerCode生成后端校验因子。具体的,对于设备标识签名SIGN2,ORP后端可以采用MD5解密方式得到sk_2,进而可以得到密钥对中与sk_2对应的公钥pk_2。ORP后端可以采用公钥pk_2对后端校验元素VerCode进行非对称加密,得到后端校验因子EnVerCode。In the embodiment of this application, the ORP backend may generate the backend verification element VerCode according to the device identification signature SIGN2 and TAND. Among them, TAND is a random number generated by the ORP backend. The ORP back-end can generate a back-end verification factor based on the back-end verification element VerCode. Specifically, for the device identification signature SIGN2, the ORP backend can use MD5 decryption to obtain sk_2, and then obtain the public key pk_2 corresponding to sk_2 in the key pair. The ORP backend can use the public key pk_2 to perform asymmetric encryption on the backend verification element VerCode to obtain the backend verification factor EnVerCode.
终端设备TA对所述后端校验因子EnVerCode进行解密,得到后端校验元素VerCode,对设备标识签名SIGN2进行校验。校验通过后,终端设备TA采用非对称加密公钥(pk_1)对后端校验元素VerCode和设备标识签名SIGN2进行非对称加密,得到前端校验因子EnSIGN2。终端设备TA通过终端设备RA将前端校验因子EnSIGN2发送至ORP后端,ORP后端对前端校验因子EnSIGN2进行安全校验。具体的,ORP后端通过非对称加密私钥(sk_1)对前端校验因子EnSIGN2进行解密,得到后端校验元素VerCode和设备标识签名SIGN2,ORP后端对后端校验元素VerCode和设备标识签名SIGN2进行校验。在所述ORP后端对所述前端校验因子校验成功的情况下,执行步骤611。The terminal device TA decrypts the back-end verification factor EnVerCode to obtain the back-end verification element VerCode, and verifies the device identification signature SIGN2. After the verification is passed, the terminal device TA uses the asymmetric encryption public key (pk_1) to perform asymmetric encryption on the back-end verification element VerCode and the device identification signature SIGN2 to obtain the front-end verification factor EnSIGN2. The terminal device TA sends the front-end check factor EnSIGN2 to the ORP back-end through the terminal device RA, and the ORP back-end performs a security check on the front-end check factor EnSIGN2. Specifically, the ORP back-end decrypts the front-end verification factor EnSIGN2 through the asymmetric encryption private key (sk_1) to obtain the back-end verification element VerCode and the device identification signature SIGN2, and the ORP back-end verifies the back-end verification element VerCode and the device identification. Sign SIGN2 for verification. In the case that the ORP backend successfully verifies the front-end check factor, step 611 is executed.
611,若校验成功,ORP后端基于终端设备信息生成设备指纹以及与设备指纹对应的令牌。611. If the verification is successful, the ORP backend generates a device fingerprint and a token corresponding to the device fingerprint based on the terminal device information.
612,终端设备RA接收ORP后端发送的令牌,将令牌存储在本端。612. The terminal device RA receives the token sent by the ORP backend, and stores the token on the local end.
其中,步骤611至步骤612的具体实施可以参加图5所示的步骤507至步骤508,此处不再赘述。Among them, the specific implementation of step 611 to step 612 can participate in step 507 to step 508 shown in FIG. 5, which will not be repeated here.
本申请实施例中,可以增强风险探针服务端的后端校验,在风险探针服务端生成经过非对称加密的后端校验因子,还可以增强终端设备的前端校验。终端设备与风险探针服务端可以交互验证,可以增加终端设备作弊成本,弥补RA的不可信和不安全的不足。In the embodiment of the present application, the back-end verification of the risk probe server can be enhanced, the back-end verification factor after asymmetric encryption is generated on the risk probe server, and the front-end verification of the terminal device can also be enhanced. The terminal equipment and the risk probe server can be mutually verified, which can increase the cheating cost of the terminal equipment and make up for the lack of untrustworthiness and insecurity of RA.
请参阅图7,图7是本申请实施例提供的另一种设备指纹生成方法的流程示意图。终端设备可以包括终端设备RA、终端设备TA,风险探针服务端可以是欧珀风险探针(OPPO Risk Probe,ORP)后端。图7是图6的具体实现过程。如图7所示,该设备指纹生成方法可以包括如下步骤。Please refer to FIG. 7, which is a schematic flowchart of another device fingerprint generation method provided by an embodiment of the present application. The terminal equipment may include the terminal equipment RA and the terminal equipment TA, and the risk probe server may be the OPPO Risk Probe (ORP) backend. Figure 7 is the specific implementation process of Figure 6. As shown in Figure 7, the device fingerprint generation method may include the following steps.
701,RA向ORP后端请求pk_1;701. RA requests pk_1 from the ORP backend;
702,ORP后端生成秘钥对(pk_1,sk_1);702. The ORP backend generates a secret key pair (pk_1, sk_1);
703,ORP后端向RA返回pk_1;703, the ORP backend returns pk_1 to RA;
704,RA向TA请求身份信息(KeyFieldSet、pk_1);704. RA requests identity information (KeyFieldSet, pk_1) from TA;
705,TA生成数据签名SIGN1和设备标识签名SIGN2;其中,SIGN1=MD5(KeyFieldSet+TRAN);SIGN2=MD5(sk_2);705, TA generates data signature SIGN1 and equipment identification signature SIGN2; where SIGN1=MD5(KeyFieldSet+TRAN); SIGN2=MD5(sk_2);
706,TA采用pk_1对数据签名SIGN1和设备标识签名SIGN2进行非对称加密,得到EnSign;其中,EnSign=RSA_ENC(pk_1,SIGN1+SIGN2+TRAN);706, TA uses pk_1 to asymmetrically encrypt data signature SIGN1 and device identification signature SIGN2 to obtain EnSign; where EnSign=RSA_ENC(pk_1, SIGN1+SIGN2+TRAN);
707,TA向RA返回EnSign;707, TA returns EnSign to RA;
708,RA生成key,采集Infoset,采用key对Infoset和EnSign进行对称加密,得到EnData,采用pk_1对key进行非对称加密,得到Enkey;其中,EnData=AES_ENC(key,Infoset+EnSign);Enkey=RSA_ENC(pk_1,key);708, RA generates a key, collects Infoset, uses key to encrypt Infoset and EnSign symmetrically to obtain EnData, uses pk_1 to perform asymmetric encryption on key to obtain Enkey; where, EnData=AES_ENC(key, Infoset+EnSign); Enkey=RSA_ENC (pk_1, key);
709,RA向ORP后端上传数据EnData、Enkey和pk_1;709, RA uploads data EnData, Enkey and pk_1 to the ORP backend;
710,ORP后端采用sk_1对Enkey进行解密,得到key,采用key对EnData进行解密,得到Infoset+EnSign,采用sk_1对EnSign进行解密,得到SIGN1和SIGN2;710. The ORP backend uses sk_1 to decrypt Enkey to obtain the key, uses key to decrypt EnData to obtain Infoset+EnSign, and uses sk_1 to decrypt EnSign to obtain SIGN1 and SIGN2;
711,ORP后端验签SIGN1(具体的,对KeyFieldSet+TRAN进行MD5签名并与SIGN1进行比对,若一致,则验签通过),根据设备标识签名SIGN2和TAND生成后端校验元素VerCode,采用公钥pk_2对后端校验元素VerCode进行非对称加密,得到后端校验因子EnVerCode;其中,VerCode=(SIGN2+TAND),EnVerCode=RSA_ENC(pk_2,VerCode);711, ORP back-end verification SIGN1 (specifically, MD5 signature is performed on KeyFieldSet+TRAN and compared with SIGN1, if they are consistent, the verification is passed), the back-end verification element VerCode is generated according to the device identification signatures SIGN2 and TAND, Use the public key pk_2 to perform asymmetric encryption on the back-end verification element VerCode to obtain the back-end verification factor EnVerCode; where VerCode=(SIGN2+TAND), EnVerCode=RSA_ENC(pk_2, VerCode);
712,ORP后端返回EnVerCode给RA;712, ORP backend returns EnVerCode to RA;
713,RA返回EnVerCode给TA;713, RA returns EnVerCode to TA;
714,TA采用私钥sk_2对EnVerCode进行解密,得到VerCode;其中,VerCode=RSA_DNC(sk_2,EnVerCode);714, TA uses the private key sk_2 to decrypt EnVerCode to obtain VerCode; where VerCode=RSA_DNC(sk_2, EnVerCode);
715,TA验签SIGN2(验证SIGN2是否存在风险探针服务端的设备标识签名库中),采用pk_1对SIGN2和VerCode进行非对称加密,得到前端校验因子EnSIGN2;其中,EnSIGN2=RSA_ENC(pk_1,SIGN2+VerCode);715, TA verify SIGN2 (verify whether SIGN2 exists in the equipment identification signature library of the risk probe server), use pk_1 to asymmetrically encrypt SIGN2 and VerCode to obtain the front-end verification factor EnSIGN2; where EnSIGN2 = RSA_ENC(pk_1, SIGN2 +VerCode);
716,TA返回EnSIGN2给RA;716, TA returns EnSIGN2 to RA;
717,RA返回EnSIGN2给ORP后端;717, RA returns EnSIGN2 to the ORP backend;
718,ORP后端采用sk_1对EnSIGN2进行解密,得到SIGN2+VerCode;718, the ORP backend uses sk_1 to decrypt EnSIGN2 to obtain SIGN2+VerCode;
719,ORP后端校验SIGN2和VerCode;719, ORP backend verifies SIGN2 and VerCode;
720,ORP后端生成Token;720, ORP backend generates Token;
721,ORP返回Token给RA。721, ORP returns Token to RA.
请参阅图8,图8是本申请实施例提供的一种业务接入流程示意图。如图8所示,在业务客户端,软件开发工具包(software development kit,SDK)接入,业务客户端向业务后端发送请求信息,请求信息包括令牌Token和终端设备信息关键字段集KeyFieldSet,业务后端在请求信息中加入应用标识(Application Identity document,APPID)后,将请求信息发送至ORP后端,ORP后端向业务后端返回风险评估结果。Please refer to FIG. 8. FIG. 8 is a schematic diagram of a service access process provided by an embodiment of the present application. As shown in Figure 8, on the business client, the software development kit (SDK) accesses, and the business client sends request information to the business backend. The request information includes the token Token and the key field set of terminal device information. KeyFieldSet, after the business backend adds the application identity document (APPID) to the request information, the request information is sent to the ORP backend, and the ORP backend returns the risk assessment result to the business backend.
本申请实施例中,业务部署简洁,业务客户端只需接入轻量SDK,用于获取终端设备中持久化存储的Token及KeyFieldSet,并将数据上传到业务后端;业务后端只需访问ORP后端的一个接口,即可获取终端设备风险标签。业务客户端只需接入轻量SDK即可,业务客户端接入轻量SDK,采集非常少的终端设备信息,所需权限也非常少,对业务客户端的影响可忽略。TA内置在终端设备的硬件中,RA跟随终端设备的操作系统,即风险探针客户端与终端设备绑定,对终端设备之上的所有业务统一提供服务。可以提高风险探针SDK安全性,可以对轻量SDK进行加固,有效提高SDK逆向、破解的难度。In the embodiment of this application, the service deployment is simple, and the service client only needs to access the lightweight SDK to obtain the persistently stored Token and KeyFieldSet in the terminal device and upload the data to the service back end; the service back end only needs to access An interface on the ORP backend can obtain the terminal device risk label. The business client only needs to access the lightweight SDK, and the business client accesses the lightweight SDK, collecting very little terminal device information, requiring very few permissions, and negligible impact on the business client. TA is built into the hardware of the terminal device, and RA follows the operating system of the terminal device, that is, the risk probe client is bound to the terminal device to provide unified services for all services on the terminal device. The security of the risk probe SDK can be improved, and the lightweight SDK can be reinforced, effectively improving the difficulty of SDK reverse engineering and cracking.
上述主要从方法侧执行过程的角度对本申请实施例的方案进行了介绍。可以理解的是,终端设备为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领 域技术人员应该很容易意识到,结合本文中所提供的实施例描述的各示例的单元及算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。The foregoing mainly introduces the solution of the embodiment of the present application from the perspective of the execution process on the method side. It can be understood that, in order to implement the above-mentioned functions, the terminal device includes a hardware structure and/or software module corresponding to each function. Those skilled in the art should easily realize that in combination with the units and algorithm steps of the examples described in the embodiments provided herein, this application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is executed by hardware or computer software-driven hardware depends on the specific application and design constraint conditions of the technical solution. Professionals and technicians can use different methods for each specific application to implement the described functions, but such implementation should not be considered beyond the scope of this application.
本申请实施例可以根据上述方法示例对终端设备进行功能单元的划分,例如,可以对应各个功能划分各个功能单元,也可以将两个或两个以上的功能集成在一个处理单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。需要说明的是,本申请实施例中对单元的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。The embodiment of the present application may divide the terminal device into functional units according to the foregoing method examples. For example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit. The above-mentioned integrated unit can be implemented in the form of hardware or software functional unit. It should be noted that the division of units in the embodiments of the present application is illustrative, and is only a logical function division, and there may be other division methods in actual implementation.
与上述一致的,请参阅图9,图9为本申请实施例提供的一种终端设备信息传输装置的结构示意图,该终端设备信息传输装置900应用于终端设备,该终端设备信息传输装置900可以包括获取单元901、第一生成单元902、采集单元903、第一加密单元904、第一通信单元905和存储单元906,其中:Consistent with the above, please refer to FIG. 9. FIG. 9 is a schematic structural diagram of a terminal equipment information transmission apparatus provided by an embodiment of the application. The terminal equipment information transmission apparatus 900 is applied to terminal equipment, and the terminal equipment information transmission apparatus 900 may It includes an acquisition unit 901, a first generation unit 902, an acquisition unit 903, a first encryption unit 904, a first communication unit 905, and a storage unit 906, wherein:
所述获取单元901,用于从硬件安全区获取数据签名和设备标识签名;The obtaining unit 901 is configured to obtain a data signature and a device identification signature from the hardware security zone;
所述第一生成单元902,用于生成对称加密密钥;The first generating unit 902 is configured to generate a symmetric encryption key;
所述采集单元903,用于采集终端设备信息;The collection unit 903 is used to collect terminal device information;
所述第一加密单元904,用于采用所述对称加密密钥对所述终端设备信息、所述数据签名和所述设备标识签名做对称加密,得到加密数据;The first encryption unit 904 is configured to use the symmetric encryption key to perform symmetric encryption on the terminal device information, the data signature, and the device identification signature to obtain encrypted data;
所述第一加密单元904,还用于采用非对称加密公钥对所述对称加密密钥做非对称加密处理,得到非对称加密密钥;所述非对称加密公钥从风险探针服务端获取;The first encryption unit 904 is further configured to use an asymmetric encryption public key to perform asymmetric encryption processing on the symmetric encryption key to obtain an asymmetric encryption key; the asymmetric encryption public key is obtained from the risk probe server Obtain;
所述第一通信单元905,用于将非对称加密数据上报至所述风险探针服务端;所述非对称加密数据包括所述加密数据、所述非对称加密密钥和所述非对称加密公钥;The first communication unit 905 is configured to report asymmetric encrypted data to the risk probe server; the asymmetric encrypted data includes the encrypted data, the asymmetric encryption key, and the asymmetric encryption Public key
所述第一通信单元905,还用于接收所述风险探针服务端发送的令牌;The first communication unit 905 is further configured to receive a token sent by the risk probe server;
所述存储单元906,用于将所述令牌存储在本端,所述令牌为所述风险探针服务端根据所述加密数据、所述非对称加密密钥和所述非对称加密公钥生成的设备指纹对应的令牌。The storage unit 906 is configured to store the token at the local end, and the token is the risk probe server based on the encrypted data, the asymmetric encryption key, and the asymmetric encryption public. The token corresponding to the device fingerprint generated by the key.
可选的,该终端设备信息传输装置900还可以包括第一校验单元907;Optionally, the terminal device information transmission apparatus 900 may further include a first verification unit 907;
所述第一通信单元905,还用于将非对称加密数据上报至所述风险探针服务端之后,接收所述风险探针服务端发送的后端校验因子;The first communication unit 905 is further configured to receive the backend check factor sent by the risk probe server after reporting the asymmetric encrypted data to the risk probe server;
所述第一校验单元907,用于通过所述硬件安全区对所述后端校验因子进行校验;The first check unit 907 is configured to check the back-end check factor through the hardware security zone;
所述第一生成单元902,还用于基于所述后端校验因子生成前端校验因子;The first generating unit 902 is further configured to generate a front-end check factor based on the back-end check factor;
所述第一通信单元905,还用于将所述前端校验因子发送至所述风险探针服务端,所述前端校验因子用于所述风险探针服务端进行安全校验;以及用于在所述风险探针服务端对所述前端校验因子校验成功的情况下,接收所述风险探针服务端发送的令牌。The first communication unit 905 is further configured to send the front-end check factor to the risk probe server, where the front-end check factor is used by the risk probe server to perform security verification; and In the case that the front-end check factor is successfully verified by the risk probe server, the token sent by the risk probe server is received.
其中,本申请实施例中的获取单元901、第一生成单元902、采集单元903、第一加密单元904、第一校验单元907可以是终端设备中的处理器,第一通信单元905可以是终端设备中的通信接口,存储单元906可以是终端设备中的存储器(比如,非易失性存储器)。Among them, the acquisition unit 901, the first generation unit 902, the acquisition unit 903, the first encryption unit 904, and the first verification unit 907 in the embodiment of the present application may be processors in the terminal device, and the first communication unit 905 may be For the communication interface in the terminal device, the storage unit 906 may be a memory in the terminal device (for example, a non-volatile memory).
本申请实施例中,终端设备向风险探针服务端发送包含终端设备信息的非对称加密数据。由于数据签名和设备标识签名是从硬件安全区获取的,保证了数据签名和设备标识签名的安全性,保证了终端设备发送的数据的安全性。由于采用对称加密密钥对所述终端设备信息、所述数据签名和所述设备标识签名做对称加密,采用非对称加密公钥对所述对称加密密钥做非对称加密处理,得到非对称加密密钥,保证终端设备向风险探针服务端发送的非对称加密数据的安全性,保证了风险探针服务端接收的数据的安全性。在终端设备信息传输的过程中,从数据发送端和数据接收端都保证了传输的数据的安全性,从而可以提 高终端设备信息传输的安全性。In this embodiment of the application, the terminal device sends asymmetric encrypted data containing terminal device information to the risk probe server. Since the data signature and the device identification signature are obtained from the hardware security zone, the security of the data signature and the device identification signature is ensured, and the security of the data sent by the terminal device is ensured. Since a symmetric encryption key is used to symmetrically encrypt the terminal device information, the data signature, and the device identification signature, an asymmetric encryption public key is used to perform asymmetric encryption on the symmetric encryption key to obtain asymmetric encryption The key ensures the security of the asymmetric encrypted data sent by the terminal device to the risk probe server, and ensures the security of the data received by the risk probe server. In the process of terminal device information transmission, both the data sending end and the data receiving end ensure the security of the transmitted data, which can improve the security of terminal device information transmission.
与上述一致的,请参阅图10,图10为本申请实施例提供的一种设备指纹生成装置的结构示意图,该设备指纹生成装置1000应用于风险探针服务器。该设备指纹生成装置1000可以包括第二通信单元1001、解密单元1002和第二生成单元1003,其中:Consistent with the above, please refer to FIG. 10. FIG. 10 is a schematic structural diagram of a device fingerprint generating apparatus according to an embodiment of the present application. The device fingerprint generating apparatus 1000 is applied to a risk probe server. The device fingerprint generation device 1000 may include a second communication unit 1001, a decryption unit 1002, and a second generation unit 1003, wherein:
第二通信单元1001,用于接收终端设备发送的秘钥获取请求,向所述终端设备发送非对称加密公钥;所述非对称加密公钥用于所述终端设备采用非对称加密方式进行加密;The second communication unit 1001 is configured to receive a secret key acquisition request sent by a terminal device, and send an asymmetric encryption public key to the terminal device; the asymmetric encryption public key is used for encryption by the terminal device in an asymmetric encryption manner ;
所述第二通信单元1001,还用于接收所述终端设备发送的非对称加密数据;The second communication unit 1001 is further configured to receive asymmetric encrypted data sent by the terminal device;
解密单元1002,用于采用与所述非对称加密公钥对应的非对称加密私钥对所述非对称加密数据进行解密,得到终端设备信息;The decryption unit 1002 is configured to use the asymmetric encryption private key corresponding to the asymmetric encryption public key to decrypt the asymmetric encryption data to obtain terminal device information;
第二生成单元1003,用于基于所述终端设备信息生成设备指纹以及与所述设备指纹对应的令牌。The second generating unit 1003 is configured to generate a device fingerprint and a token corresponding to the device fingerprint based on the terminal device information.
可选的,该设备指纹生成装置1000可以包括标识单元1004。Optionally, the device 1000 for generating fingerprints may include an identification unit 1004.
所述标识单元1004,用于在所述第二生成单元1003基于所述终端设备信息生成设备指纹以及与所述设备指纹对应的令牌之后,根据所述终端设备信息、历史上报数据、业务风控数据进行大数据计算,对所述终端设备的业务倾向分类进行标识,对所述终端设备的设备风险等级进行标识。The identification unit 1004 is configured to, after the second generating unit 1003 generates a device fingerprint and a token corresponding to the device fingerprint based on the terminal device information, according to the terminal device information, historical reported data, and business style The control data performs big data calculation, identifies the business tendency classification of the terminal device, and identifies the equipment risk level of the terminal device.
可选的,所述非对称加密数据包括加密数据、非对称加密密钥和非对称加密公钥;所述解密单元1002采用与所述非对称加密公钥对应的非对称加密私钥对所述非对称加密数据进行解密,得到终端设备信息,具体为:Optionally, the asymmetric encryption data includes encrypted data, an asymmetric encryption key, and an asymmetric encryption public key; the decryption unit 1002 uses an asymmetric encryption private key corresponding to the asymmetric encryption public key to pair the Asymmetrically encrypted data is decrypted to obtain terminal device information, specifically:
采用与所述非对称加密公钥对应的非对称加密私钥对所述非对称加密密钥进行解密,得到对称加密密钥;采用所述对称加密密钥对加密数据进行解密,得到所述终端设备信息。Use the asymmetric encryption private key corresponding to the asymmetric encryption public key to decrypt the asymmetric encryption key to obtain a symmetric encryption key; use the symmetric encryption key to decrypt the encrypted data to obtain the terminal Device Information.
可选的,所述第二通信单元1001,还用于在所述第二生成单元1003基于所述终端设备信息生成设备指纹以及与所述设备指纹对应的令牌之后,向所述终端设备发送所述令牌。Optionally, the second communication unit 1001 is further configured to send to the terminal device after the second generating unit 1003 generates a device fingerprint and a token corresponding to the device fingerprint based on the terminal device information The token.
可选的,所述第二生成单元1003,还用于在所述第二生成单元1003基于所述终端设备信息生成设备指纹以及与所述设备指纹对应的令牌之后,生成后端校验因子;Optionally, the second generating unit 1003 is further configured to generate a back-end check factor after the second generating unit 1003 generates a device fingerprint and a token corresponding to the device fingerprint based on the terminal device information ;
所述第二通信单元1001,还用于将所述后端校验因子发送至所述终端设备,所述后端校验因子用于所述终端设备通过硬件安全区进行安全校验。The second communication unit 1001 is further configured to send the back-end check factor to the terminal device, where the back-end check factor is used by the terminal device to perform security verification through the hardware security zone.
可选的,该设备指纹生成装置1000可以包括第二校验单元1005。Optionally, the device 1000 for generating fingerprints may include a second verification unit 1005.
所述第二通信单元1001,还用于在所述终端设备通过硬件安全区对所述后端校验因子校验成功的情况下,接收所述终端设备发送的前端校验因子;The second communication unit 1001 is further configured to receive the front-end check factor sent by the terminal device when the terminal device successfully checks the back-end check factor through the hardware security zone;
所述第二校验单元1005,用于对所述前端校验因子进行安全校验;The second verification unit 1005 is configured to perform security verification on the front-end verification factor;
所述第二通信单元1001,还用于在所述第二校验单元1005对所述前端校验因子校验成功的情况下,向所述终端设备发送所述令牌。The second communication unit 1001 is further configured to send the token to the terminal device when the second check unit 1005 successfully checks the front-end check factor.
本申请实施例中,风险探针服务端接收终端设备发送的非对称加密数据,采用与非对称加密公钥对应的非对称加密私钥对非对称加密数据进行解密,得到终端设备信息。由于非对称加密数据是终端设备采用对称加密密钥进行加密,保证风险探针服务端从终端设备接收的非对称加密数据的安全性,保证了风险探针服务端接收的数据的安全性。从而保证设备指纹生成的安全性。In the embodiment of this application, the risk probe server receives the asymmetric encryption data sent by the terminal device, and decrypts the asymmetric encryption data with the asymmetric encryption private key corresponding to the asymmetric encryption public key to obtain terminal device information. Since the asymmetric encrypted data is encrypted by the terminal device using a symmetric encryption key, the security of the asymmetric encrypted data received from the terminal device by the risk probe server is ensured, and the security of the data received by the risk probe server is guaranteed. Thereby ensuring the security of device fingerprint generation.
请参阅图11,图11是本申请实施例提供的一种终端设备的结构示意图,如图11所示,该终端设备1100包括处理器1101和存储器1102,处理器1101、存储器1102可以通过通信总线1103相互连接。通信总线1103可以是外设部件互连标准(Peripheral Component Interconnect,简称PCI)总线或扩展工业标准结构(Extended Industry Standard Architecture,简称EISA)总线等。通信总线1103可以分为地址总线、数据总线、控制总线等。为便于表示,图11中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。存储器1102 用于存储计算机程序,计算机程序包括程序指令,处理器1101被配置用于调用程序指令,上述程序包括用于执行图2所示的方法。Please refer to FIG. 11. FIG. 11 is a schematic structural diagram of a terminal device provided by an embodiment of the present application. As shown in FIG. 11, the terminal device 1100 includes a processor 1101 and a memory 1102. 1103 are connected to each other. The communication bus 1103 may be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) bus, etc. The communication bus 1103 can be divided into an address bus, a data bus, a control bus, and so on. For ease of representation, only one thick line is used to represent in FIG. 11, but it does not mean that there is only one bus or one type of bus. The memory 1102 is used to store a computer program, the computer program includes program instructions, the processor 1101 is configured to call the program instructions, and the above program includes a method for executing the method shown in FIG. 2.
处理器1101可以是通用中央处理器(CPU),微处理器,特定应用集成电路(application-specific integrated circuit,ASIC),或一个或多个用于控制以上方案程序执行的集成电路。The processor 1101 may be a general-purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more integrated circuits for controlling the execution of the above program programs.
存储器1102可以是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(Electrically Erasable Programmable Read-Only Memory,EEPROM)、只读光盘(Compact Disc Read-Only Memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。存储器可以是独立存在,通过总线与处理器相连接。存储器也可以和处理器集成在一起。The memory 1102 may be a read-only memory (ROM) or other types of static storage devices that can store static information and instructions, random access memory (RAM), or other types that can store information and instructions The dynamic storage device can also be electrically erasable programmable read-only memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), CD-ROM (Compact Disc Read-Only Memory, CD-ROM) or other optical disc storage, optical disc storage (Including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to carry or store desired program codes in the form of instructions or data structures and can be used by a computer Any other media accessed, but not limited to this. The memory can exist independently and is connected to the processor through a bus. The memory can also be integrated with the processor.
此外,该终端设备1100还可以包括通信接口、天线等通用部件,在此不再详述。In addition, the terminal device 1100 may also include general components such as a communication interface and an antenna, which are not described in detail here.
本申请实施例中,终端设备向风险探针服务端发送包含终端设备信息的非对称加密数据。由于数据签名和设备标识签名是从硬件安全区获取的,保证了数据签名和设备标识签名的安全性,保证了终端设备发送的数据的安全性。由于采用对称加密密钥对所述终端设备信息、所述数据签名和所述设备标识签名做对称加密,采用非对称加密公钥对所述对称加密密钥做非对称加密处理,得到非对称加密密钥,保证终端设备向风险探针服务端发送的非对称加密数据的安全性,保证了风险探针服务端接收的数据的安全性。在终端设备信息传输的过程中,从数据发送端和数据接收端都保证了传输的数据的安全性,从而可以提高终端设备信息传输的安全性。In this embodiment of the application, the terminal device sends asymmetric encrypted data containing terminal device information to the risk probe server. Since the data signature and the device identification signature are obtained from the hardware security zone, the security of the data signature and the device identification signature is ensured, and the security of the data sent by the terminal device is ensured. Since a symmetric encryption key is used to symmetrically encrypt the terminal device information, the data signature, and the device identification signature, an asymmetric encryption public key is used to perform asymmetric encryption on the symmetric encryption key to obtain asymmetric encryption The key ensures the security of the asymmetric encrypted data sent by the terminal device to the risk probe server, and ensures the security of the data received by the risk probe server. In the process of terminal device information transmission, both the data sending end and the data receiving end ensure the security of the transmitted data, so that the security of terminal device information transmission can be improved.
请参阅图12,图12是本申请实施例提供的一种服务器的结构示意图,如图12所示,该服务器1200包括处理器1201和存储器1202,处理器1201、存储器1202可以通过通信总线1203相互连接。通信总线1203可以是外设部件互连标准(Peripheral Component Interconnect,简称PCI)总线或扩展工业标准结构(Extended Industry Standard Architecture,简称EISA)总线等。通信总线1203可以分为地址总线、数据总线、控制总线等。为便于表示,图12中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。存储器1202用于存储计算机程序,计算机程序包括程序指令,处理器1201被配置用于调用程序指令,上述程序包括用于执行图2至图4所示的方法。Please refer to FIG. 12, which is a schematic structural diagram of a server provided by an embodiment of the present application. As shown in FIG. 12, the server 1200 includes a processor 1201 and a memory 1202. The processor 1201 and the memory 1202 can communicate with each other through a communication bus 1203. connect. The communication bus 1203 may be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) bus, etc. The communication bus 1203 can be divided into an address bus, a data bus, a control bus, and so on. For ease of presentation, only one thick line is used to represent in FIG. 12, but it does not mean that there is only one bus or one type of bus. The memory 1202 is used to store a computer program. The computer program includes program instructions. The processor 1201 is configured to call the program instructions. The above program includes methods for executing the methods shown in FIGS. 2 to 4.
处理器1201可以是通用中央处理器(CPU),微处理器,特定应用集成电路(application-specific integrated circuit,ASIC),或一个或多个用于控制以上方案程序执行的集成电路。The processor 1201 may be a general-purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more integrated circuits for controlling the execution of the above program programs.
存储器1202可以是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(Electrically Erasable Programmable Read-Only Memory,EEPROM)、只读光盘(Compact Disc Read-Only Memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。存储器可以是独立存在,通过总线与处理器相连接。存储器也可以和处理器集成在一起。The memory 1202 may be a read-only memory (ROM) or other types of static storage devices that can store static information and instructions, random access memory (RAM), or other types that can store information and instructions The dynamic storage device can also be electrically erasable programmable read-only memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), CD-ROM (Compact Disc Read-Only Memory, CD-ROM) or other optical disc storage, optical disc storage (Including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to carry or store desired program codes in the form of instructions or data structures and can be used by a computer Any other media accessed, but not limited to this. The memory can exist independently and is connected to the processor through a bus. The memory can also be integrated with the processor.
此外,该服务器1200还可以包括通信接口、天线等通用部件,在此不再详述。In addition, the server 1200 may also include general components such as a communication interface and an antenna, which are not described in detail here.
该服务器1200可以是风险探针服务器。The server 1200 may be a risk probe server.
本申请实施例中,风险探针服务器接收终端设备发送的非对称加密数据,采用与非对 称加密公钥对应的非对称加密私钥对非对称加密数据进行解密,得到终端设备信息。由于非对称加密数据是终端设备采用对称加密密钥进行加密,保证风险探针服务器从终端设备接收的非对称加密数据的安全性,保证了风险探针服务器接收的数据的安全性。从而保证设备指纹生成的安全性。In the embodiment of the present application, the risk probe server receives the asymmetric encryption data sent by the terminal device, and uses the asymmetric encryption private key corresponding to the asymmetric encryption public key to decrypt the asymmetric encryption data to obtain the terminal device information. Since the asymmetric encrypted data is encrypted by the terminal device using a symmetric encryption key, the security of the asymmetric encrypted data received by the risk probe server from the terminal device is ensured, and the security of the data received by the risk probe server is guaranteed. Thereby ensuring the security of device fingerprint generation.
本申请实施例还提供一种计算机可读存储介质,其中,该计算机可读存储介质存储用于电子数据交换的计算机程序,该计算机程序使得计算机执行如上述方法实施例中记载的任何一种网络制式切换方法的部分或全部步骤。An embodiment of the present application also provides a computer-readable storage medium, wherein the computer-readable storage medium stores a computer program for electronic data exchange, and the computer program enables a computer to execute any network described in the above method embodiments. Part or all of the steps of the standard switching method.
本申请实施例还提供一种计算机程序产品,所述计算机程序产品包括存储了计算机程序的非瞬时性计算机可读存储介质,该计算机程序使得计算机执行如上述方法实施例中记载的任何一种网络制式切换方法的部分或全部步骤。The embodiments of the present application also provide a computer program product. The computer program product includes a non-transitory computer-readable storage medium storing a computer program. The computer program enables a computer to execute any network described in the above method embodiments. Part or all of the steps of the standard switching method.
需要说明的是,对于前述的各方法实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本申请并不受所描述的动作顺序的限制,因为依据本申请,某些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作和模块并不一定是本申请所必须的。It should be noted that for the foregoing method embodiments, for the sake of simple description, they are all expressed as a series of action combinations, but those skilled in the art should know that this application is not limited by the described sequence of actions. Because according to this application, some steps can be performed in other order or at the same time. Secondly, those skilled in the art should also know that the embodiments described in the specification are all preferred embodiments, and the actions and modules involved are not necessarily required by this application.
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。In the above-mentioned embodiments, the description of each embodiment has its own emphasis. For parts that are not described in detail in an embodiment, reference may be made to related descriptions of other embodiments.
在本申请所提供的几个实施例中,应该理解到,所揭露的装置,可通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed device may be implemented in other ways. For example, the device embodiments described above are merely illustrative, for example, the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or may be Integrate into another system, or some features can be ignored or not implemented. In addition, the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
另外,在申请明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件程序模块的形式实现。In addition, it is stated in the application that each functional unit in each embodiment may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit. The above-mentioned integrated unit can be implemented in the form of hardware or in the form of software program modules.
所述集成的单元如果以软件程序模块的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储器中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储器中,包括若干指令用以使得一台计算机设备(可为个人计算机、服务器或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储器包括:U盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。If the integrated unit is implemented in the form of a software program module and sold or used as an independent product, it can be stored in a computer readable memory. Based on this understanding, the technical solution of the present application essentially or the part that contributes to the existing technology or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a memory. A number of instructions are included to enable a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the present application. The aforementioned memory includes: U disk, read-only memory (read-only memory, ROM), random access memory (random access memory, RAM), mobile hard disk, magnetic disk, or optical disk and other media that can store program codes.
本领域普通技术人员可以理解上述实施例的各种方法中的全部或部分步骤是可以通过程序来指令相关的硬件来完成,该程序可以存储于一计算机可读存储器中,存储器可以包括:闪存盘、只读存储器、随机存取器、磁盘或光盘等。Those of ordinary skill in the art can understand that all or part of the steps in the various methods of the above-mentioned embodiments can be completed by a program instructing relevant hardware. The program can be stored in a computer-readable memory, and the memory can include: a flash disk , Read-only memory, random access device, magnetic or optical disk, etc.
以上对本申请实施例进行了详细介绍,本文中应用了具体个例对本申请的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本申请的方法及其核心思想;同时,对于本领域的一般技术人员,依据本申请的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本申请的限制。The embodiments of the application are described in detail above, and specific examples are used in this article to illustrate the principles and implementation of the application. The descriptions of the above embodiments are only used to help understand the methods and core ideas of the application; at the same time, for Those of ordinary skill in the art, based on the idea of the application, will have changes in the specific implementation and the scope of application. In summary, the content of this specification should not be construed as a limitation to the application.

Claims (14)

  1. 一种终端设备信息传输方法,其特征在于,包括:A method for transmitting terminal equipment information, which is characterized in that it includes:
    所述终端设备从硬件安全区获取数据签名和设备标识签名;The terminal device obtains the data signature and the device identification signature from the hardware security zone;
    所述终端设备生成对称加密密钥,采集终端设备信息,采用所述对称加密密钥对所述终端设备信息、所述数据签名和所述设备标识签名做对称加密,得到加密数据;The terminal device generates a symmetric encryption key, collects terminal device information, and uses the symmetric encryption key to perform symmetric encryption on the terminal device information, the data signature, and the device identification signature to obtain encrypted data;
    所述终端设备采用非对称加密公钥对所述对称加密密钥做非对称加密处理,得到非对称加密密钥;所述非对称加密公钥为所述终端设备从风险探针服务端获取;The terminal device uses an asymmetric encryption public key to perform asymmetric encryption processing on the symmetric encryption key to obtain an asymmetric encryption key; the asymmetric encryption public key is obtained by the terminal device from the risk probe server;
    所述终端设备将非对称加密数据上报至所述风险探针服务端;所述非对称加密数据包括所述加密数据、所述非对称加密密钥和所述非对称加密公钥;The terminal device reports asymmetric encrypted data to the risk probe server; the asymmetric encrypted data includes the encrypted data, the asymmetric encryption key, and the asymmetric encryption public key;
    所述终端设备接收所述风险探针服务端发送的令牌,将所述令牌存储在本端,所述令牌为所述风险探针服务端根据所述加密数据、所述非对称加密密钥和所述非对称加密公钥生成的设备指纹对应的令牌。The terminal device receives the token sent by the risk probe server, and stores the token at the local end, where the token is the risk probe server according to the encrypted data and the asymmetric encryption The secret key and the token corresponding to the device fingerprint generated by the asymmetric encryption public key.
  2. 根据权利要求1所述的方法,其特征在于,所述终端设备将非对称加密数据上报至所述风险探针服务端之后,所述方法还包括:The method according to claim 1, wherein after the terminal device reports the asymmetric encrypted data to the risk probe server, the method further comprises:
    所述终端设备接收所述风险探针服务端发送的后端校验因子,通过所述硬件安全区对所述后端校验因子进行校验,基于所述后端校验因子生成前端校验因子,将所述前端校验因子发送至所述风险探针服务端,所述前端校验因子用于所述风险探针服务端进行安全校验;The terminal device receives the back-end check factor sent by the risk probe server, checks the back-end check factor through the hardware security zone, and generates a front-end check based on the back-end check factor Factor, sending the front-end check factor to the risk probe server, where the front-end check factor is used by the risk probe server to perform security verification;
    在所述风险探针服务端对所述前端校验因子校验成功的情况下,所述终端设备执行所述接收所述风险探针服务端发送的令牌的步骤。When the risk probe server successfully verifies the front-end check factor, the terminal device executes the step of receiving the token sent by the risk probe server.
  3. 一种设备指纹生成方法,其特征在于,包括:A method for generating device fingerprints is characterized in that it includes:
    风险探针服务端接收终端设备发送的秘钥获取请求,向所述终端设备发送非对称加密公钥;所述非对称加密公钥用于所述终端设备采用非对称加密方式进行加密;The risk probe server receives the secret key acquisition request sent by the terminal device, and sends an asymmetric encryption public key to the terminal device; the asymmetric encryption public key is used for the terminal device to encrypt using an asymmetric encryption method;
    所述风险探针服务端接收所述终端设备发送的非对称加密数据,采用与所述非对称加密公钥对应的非对称加密私钥对所述非对称加密数据进行解密,得到终端设备信息;The risk probe server receives the asymmetric encryption data sent by the terminal device, and decrypts the asymmetric encryption data with the asymmetric encryption private key corresponding to the asymmetric encryption public key to obtain terminal device information;
    所述风险探针服务端基于所述终端设备信息生成设备指纹以及与所述设备指纹对应的令牌。The risk probe server generates a device fingerprint and a token corresponding to the device fingerprint based on the terminal device information.
  4. 根据权利要求3所述的方法,其特征在于,所述风险探针服务端基于所述终端设备信息生成设备指纹以及与所述设备指纹对应的令牌之后,所述方法还包括:The method according to claim 3, wherein after the risk probe server generates a device fingerprint and a token corresponding to the device fingerprint based on the terminal device information, the method further comprises:
    所述风险探针服务端根据所述终端设备信息、历史上报数据、业务风控数据进行大数据计算,对所述终端设备的业务倾向分类进行标识,对所述终端设备的设备风险等级进行标识。The risk probe server performs big data calculations based on the terminal device information, historical report data, and business risk control data, identifies the business tendency classification of the terminal device, and identifies the equipment risk level of the terminal device .
  5. 根据权利要求3或4所述的方法,其特征在于,所述非对称加密数据包括加密数据、非对称加密密钥和非对称加密公钥;所述风险探针服务端采用与所述非对称加密公钥对应的非对称加密私钥对所述非对称加密数据进行解密,得到终端设备信息,包括:The method according to claim 3 or 4, wherein the asymmetric encryption data includes encrypted data, an asymmetric encryption key, and an asymmetric encryption public key; the risk probe server uses the same The asymmetric encryption private key corresponding to the encryption public key decrypts the asymmetric encryption data to obtain terminal device information, including:
    所述风险探针服务端采用与所述非对称加密公钥对应的非对称加密私钥对所述非对称加密密钥进行解密,得到对称加密密钥;The risk probe server uses the asymmetric encryption private key corresponding to the asymmetric encryption public key to decrypt the asymmetric encryption key to obtain the symmetric encryption key;
    所述风险探针服务端采用所述对称加密密钥对加密数据进行解密,得到所述终端设备信息。The risk probe server uses the symmetric encryption key to decrypt the encrypted data to obtain the terminal device information.
  6. 根据权利要求3所述的方法,其特征在于,所述风险探针服务端基于所述终端设备信息生成设备指纹以及与所述设备指纹对应的令牌之后,所述方法还包括:The method according to claim 3, wherein after the risk probe server generates a device fingerprint and a token corresponding to the device fingerprint based on the terminal device information, the method further comprises:
    所述风险探针服务端向所述终端设备发送所述令牌。The risk probe server sends the token to the terminal device.
  7. 根据权利要求6所述的方法,其特征在于,所述风险探针服务端基于所述终端设备 信息生成设备指纹以及与所述设备指纹对应的令牌之后,所述方法还包括:The method according to claim 6, wherein after the risk probe server generates a device fingerprint and a token corresponding to the device fingerprint based on the terminal device information, the method further comprises:
    所述风险探针服务端生成后端校验因子,将所述后端校验因子发送至所述终端设备,所述后端校验因子用于所述终端设备通过硬件安全区进行安全校验。The risk probe server generates a back-end check factor, and sends the back-end check factor to the terminal device, where the back-end check factor is used by the terminal device to perform a security check through the hardware security zone .
  8. 根据权利要求7所述的方法,其特征在于,所述方法还包括:The method according to claim 7, wherein the method further comprises:
    在所述终端设备通过硬件安全区对所述后端校验因子校验成功的情况下,所述风险探针服务端接收所述终端设备发送的前端校验因子;In the case that the terminal device successfully verifies the back-end check factor through the hardware security zone, the risk probe server receives the front-end check factor sent by the terminal device;
    所述风险探针服务端对所述前端校验因子进行安全校验;The risk probe server performs a security check on the front-end check factor;
    在所述风险探针服务端对所述前端校验因子校验成功的情况下,所述风险探针服务端执行所述向所述终端设备发送所述令牌的步骤。In the case that the risk probe server successfully verifies the front-end check factor, the risk probe server executes the step of sending the token to the terminal device.
  9. 一种终端设备信息传输装置,其特征在于,包括:A terminal equipment information transmission device, which is characterized in that it comprises:
    获取单元,用于从硬件安全区获取数据签名和设备标识签名;The obtaining unit is used to obtain the data signature and the device identification signature from the hardware security zone;
    第一生成单元,用于生成对称加密密钥;The first generating unit is used to generate a symmetric encryption key;
    采集单元,用于采集终端设备信息;The collection unit is used to collect terminal equipment information;
    第一加密单元,用于采用所述对称加密密钥对所述终端设备信息、所述数据签名和所述设备标识签名做对称加密,得到加密数据;The first encryption unit is configured to use the symmetric encryption key to perform symmetric encryption on the terminal device information, the data signature, and the device identification signature to obtain encrypted data;
    所述第一加密单元,还用于采用非对称加密公钥对所述对称加密密钥做非对称加密处理,得到非对称加密密钥;所述非对称加密公钥从风险探针服务端获取;The first encryption unit is further configured to use an asymmetric encryption public key to perform asymmetric encryption processing on the symmetric encryption key to obtain an asymmetric encryption key; the asymmetric encryption public key is obtained from the risk probe server ;
    第一通信单元,用于将非对称加密数据上报至所述风险探针服务端;所述非对称加密数据包括所述加密数据、所述非对称加密密钥和所述非对称加密公钥;The first communication unit is configured to report asymmetric encrypted data to the risk probe server; the asymmetric encrypted data includes the encrypted data, the asymmetric encryption key, and the asymmetric encryption public key;
    所述第一通信单元,还用于接收所述风险探针服务端发送的令牌;The first communication unit is further configured to receive a token sent by the risk probe server;
    存储单元,用于将所述令牌存储在本端,所述令牌为所述风险探针服务端根据所述加密数据、所述非对称加密密钥和所述非对称加密公钥生成的设备指纹对应的令牌。The storage unit is configured to store the token at the local end, and the token is generated by the risk probe server according to the encrypted data, the asymmetric encryption key, and the asymmetric encryption public key The token corresponding to the device fingerprint.
  10. 一种设备指纹生成装置,其特征在于,包括:A device fingerprint generation device, characterized in that it comprises:
    第二通信单元,用于接收终端设备发送的秘钥获取请求,向所述终端设备发送非对称加密公钥;所述非对称加密公钥用于所述终端设备采用非对称加密方式进行加密;The second communication unit is configured to receive a secret key acquisition request sent by a terminal device, and send an asymmetric encryption public key to the terminal device; the asymmetric encryption public key is used for the terminal device to perform encryption in an asymmetric encryption manner;
    所述第二通信单元,还用于接收所述终端设备发送的非对称加密数据;The second communication unit is further configured to receive asymmetric encrypted data sent by the terminal device;
    第二加密单元,用于采用与所述非对称加密公钥对应的非对称加密私钥对所述非对称加密数据进行解密,得到终端设备信息;The second encryption unit is configured to use the asymmetric encryption private key corresponding to the asymmetric encryption public key to decrypt the asymmetric encryption data to obtain terminal device information;
    第二生成单元,用于基于所述终端设备信息生成设备指纹以及与所述设备指纹对应的令牌。The second generating unit is configured to generate a device fingerprint and a token corresponding to the device fingerprint based on the terminal device information.
  11. 一种终端设备,其特征在于,包括处理器和存储器,所述存储器用于存储计算机程序,所述计算机程序包括程序指令,所述处理器被配置用于调用所述程序指令,执行如权利要求1~2任一项所述的方法。A terminal device, characterized by comprising a processor and a memory, the memory is used to store a computer program, the computer program includes program instructions, and the processor is configured to call the program instructions to execute as claimed The method described in any one of 1 to 2.
  12. 一种服务器,其特征在于,包括处理器和存储器,所述存储器用于存储计算机程序,所述计算机程序包括程序指令,所述处理器被配置用于调用所述程序指令,执行如权利要求3~8任一项所述的方法。A server, characterized by comprising a processor and a memory, the memory is used to store a computer program, the computer program includes program instructions, and the processor is configured to call the program instructions to execute as claimed in claim 3. The method described in any one of ~8.
  13. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机程序,所述计算机程序包括程序指令,所述程序指令当被处理器执行时使所述处理器执行如权利要求1~2任一项所述的方法。A computer-readable storage medium, wherein the computer-readable storage medium stores a computer program, and the computer program includes program instructions that, when executed by a processor, cause the processor to execute The method described in any one of 1 to 2 is required.
  14. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机程序,所述计算机程序包括程序指令,所述程序指令当被处理器执行时使所述处理器执行如权利要求3~8任一项所述的方法。A computer-readable storage medium, wherein the computer-readable storage medium stores a computer program, and the computer program includes program instructions that, when executed by a processor, cause the processor to execute The method described in any one of 3-8 is required.
PCT/CN2020/076605 2020-02-25 2020-02-25 Terminal device information transmission method, device fingerprint generation method, and related product WO2021168652A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2020/076605 WO2021168652A1 (en) 2020-02-25 2020-02-25 Terminal device information transmission method, device fingerprint generation method, and related product
CN202080095150.9A CN115039376A (en) 2020-02-25 2020-02-25 Terminal equipment information transmission method, equipment fingerprint generation method and related products

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/076605 WO2021168652A1 (en) 2020-02-25 2020-02-25 Terminal device information transmission method, device fingerprint generation method, and related product

Publications (1)

Publication Number Publication Date
WO2021168652A1 true WO2021168652A1 (en) 2021-09-02

Family

ID=77491726

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/076605 WO2021168652A1 (en) 2020-02-25 2020-02-25 Terminal device information transmission method, device fingerprint generation method, and related product

Country Status (2)

Country Link
CN (1) CN115039376A (en)
WO (1) WO2021168652A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115459929A (en) * 2022-09-06 2022-12-09 中国建设银行股份有限公司 Security verification method, apparatus, electronic device, system, medium, and product
CN117131519A (en) * 2023-02-27 2023-11-28 荣耀终端有限公司 Information protection method and equipment
CN115459929B (en) * 2022-09-06 2024-05-10 中国建设银行股份有限公司 Security verification method, security verification device, electronic equipment, security verification system, security verification medium and security verification product

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150261950A1 (en) * 2014-03-13 2015-09-17 Intel Corporation Symmetric keying and chain of trust
CN105847000A (en) * 2016-05-27 2016-08-10 深圳市雪球科技有限公司 Token generation method and communication system based on same
CN106411926A (en) * 2016-11-03 2017-02-15 厦门安胜网络科技有限公司 Data encryption communication method and system
US20170063811A1 (en) * 2013-02-08 2017-03-02 Amazon Technologies, Inc. Secure Transfer and Use of Secret Material in a Shared Environment
CN109905233A (en) * 2017-12-08 2019-06-18 阿里巴巴集团控股有限公司 A kind of device data processing method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170063811A1 (en) * 2013-02-08 2017-03-02 Amazon Technologies, Inc. Secure Transfer and Use of Secret Material in a Shared Environment
US20150261950A1 (en) * 2014-03-13 2015-09-17 Intel Corporation Symmetric keying and chain of trust
CN105847000A (en) * 2016-05-27 2016-08-10 深圳市雪球科技有限公司 Token generation method and communication system based on same
CN106411926A (en) * 2016-11-03 2017-02-15 厦门安胜网络科技有限公司 Data encryption communication method and system
CN109905233A (en) * 2017-12-08 2019-06-18 阿里巴巴集团控股有限公司 A kind of device data processing method and system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115459929A (en) * 2022-09-06 2022-12-09 中国建设银行股份有限公司 Security verification method, apparatus, electronic device, system, medium, and product
CN115459929B (en) * 2022-09-06 2024-05-10 中国建设银行股份有限公司 Security verification method, security verification device, electronic equipment, security verification system, security verification medium and security verification product
CN117131519A (en) * 2023-02-27 2023-11-28 荣耀终端有限公司 Information protection method and equipment

Also Published As

Publication number Publication date
CN115039376A (en) 2022-09-09

Similar Documents

Publication Publication Date Title
EP3319292B1 (en) Methods, client and server for checking security based on biometric features
CN108234115B (en) Information security verification method, device and system
US9838205B2 (en) Network authentication method for secure electronic transactions
US11764966B2 (en) Systems and methods for single-step out-of-band authentication
US10333903B1 (en) Provisioning network keys to devices to allow them to provide their identity
TWI587672B (en) Login authentication method, client, server and system
TWI633775B (en) Terminal identification method, machine identification code registration method, corresponding system and equipment
US9219722B2 (en) Unclonable ID based chip-to-chip communication
US8543471B2 (en) System and method for securely accessing a wirelessly advertised service
CN106789841B (en) Service processing method, terminal, server and system
CN106452772B (en) Terminal authentication method and device
US20110167263A1 (en) Wireless connections to a wireless access point
TWI424726B (en) Method and system for defeating the man in the middle computer hacking technique
KR102429406B1 (en) Check user interactions on the content platform
EP3552131B1 (en) Password security
JP2016518656A (en) Method and system for distinguishing humans from machines and for controlling access to network services
CN104601593A (en) Anti-tracking method in network electronic identity authentication process based on challenge modes
WO2014048749A1 (en) Inter-domain single sign-on
CN105516208A (en) WEB site link dynamic hiding method and device capable of effectively preventing network attacks
CN102577301A (en) Method and apparatus for trusted authentication and logon
CN107786515B (en) Certificate authentication method and equipment
CN114244522A (en) Information protection method and device, electronic equipment and computer readable storage medium
CN105516054B (en) A kind of method and device of subscriber authentication
US8583921B1 (en) Method and system for identity authentication
WO2021168652A1 (en) Terminal device information transmission method, device fingerprint generation method, and related product

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20922444

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 25/01/2023)

122 Ep: pct application non-entry in european phase

Ref document number: 20922444

Country of ref document: EP

Kind code of ref document: A1