WO2023174389A1 - 一种安全状态评估方法及装置、电子设备和可读存储介质 - Google Patents

一种安全状态评估方法及装置、电子设备和可读存储介质 Download PDF

Info

Publication number
WO2023174389A1
WO2023174389A1 PCT/CN2023/082026 CN2023082026W WO2023174389A1 WO 2023174389 A1 WO2023174389 A1 WO 2023174389A1 CN 2023082026 W CN2023082026 W CN 2023082026W WO 2023174389 A1 WO2023174389 A1 WO 2023174389A1
Authority
WO
WIPO (PCT)
Prior art keywords
security
information
status
security status
level indicator
Prior art date
Application number
PCT/CN2023/082026
Other languages
English (en)
French (fr)
Inventor
胡志远
史领航
陈辉军
鲁京辉
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Publication of WO2023174389A1 publication Critical patent/WO2023174389A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/37Managing security policies for mobile devices or for controlling mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/22Traffic simulation tools or models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic

Definitions

  • This application belongs to the field of communication technology, and specifically relates to a security status assessment method and device, electronic equipment and readable storage media.
  • the purpose of the embodiments of this application is to provide a security status assessment method and device, electronic equipment and readable storage media, which can solve the problem that the security risk assessment results obtained by the security risk assessment scheme in related technologies are not accurate enough and cannot meet the user's requirements for high business security. question of needs.
  • embodiments of the present application provide a security status assessment method, which is applied to electronic equipment.
  • the method includes:
  • the target safety status information includes at least one first-level indicator element, each of the first-level indicator elements includes at least one second-level indicator element and corresponding status information
  • the safety status evaluation model includes a first safety status evaluation model. and a second safety status assessment model
  • the second safety The status assessment model is used to determine the score of each first-level indicator element based on the at least one second-level indicator element and corresponding status information
  • the first safety status assessment model is used to determine the score of each first-level indicator element based on the at least one first-level indicator element. and corresponding scores to generate the safety status assessment results.
  • inventions of the present application provide a safety status assessment device, which is applied to electronic equipment.
  • the device includes:
  • a collection module configured to collect target security status information upon receiving a security status query request for querying the security status of the electronic device
  • An evaluation module used to evaluate the target safety status information using a safety status evaluation model and generate safety status evaluation results
  • the target safety status information includes at least one first-level indicator element, each of the first-level indicator elements includes at least one second-level indicator element and corresponding status information
  • the safety status evaluation model includes a first safety status evaluation model. and a second safety status evaluation model, the second safety status evaluation model is used to determine the score of each first-level indicator element based on the at least one second-level indicator element and corresponding status information, the first safety status The evaluation model is used to generate the safety status evaluation result based on the at least one first-level indicator element and the corresponding score.
  • inventions of the present application provide an electronic device.
  • the electronic device includes a processor and a memory.
  • the memory stores programs or instructions that can be run on the processor.
  • the programs or instructions are processed by the processor.
  • the processor is executed, the steps of the method described in the first aspect are implemented.
  • embodiments of the present application provide a readable storage medium.
  • Programs or instructions are stored on the readable storage medium.
  • the steps of the method described in the first aspect are implemented. .
  • inventions of the present application provide a chip.
  • the chip includes a processor and a communication interface.
  • the communication interface is coupled to the processor.
  • the processor is used to run programs or instructions to implement the first aspect. the method described.
  • embodiments of the present application provide a computer program product, the program product is stored in a storage medium, and the program product is executed by at least one processor to implement the method as described in the first aspect.
  • embodiments of the present application provide a communication device configured to implement the method described in the first aspect.
  • the target security status information of the electronic device is collected, and the target security status information is comprehensively evaluated through the security status assessment model. , so that accurate and comprehensive security status assessment results can be obtained, providing a more accurate assessment basis for businesses with high security requirements.
  • Figure 1 is a schematic flow chart of a security status assessment method provided by an embodiment of the present application
  • FIG. 2 is a schematic structural diagram of an electronic device supporting TEE and REE provided by an embodiment of the present application
  • Figure 3 is a schematic flow chart of obtaining the first-level indicator elements and the second-level indicator elements provided by the embodiment of the present application;
  • Figure 4 is a schematic structural diagram of a safety status assessment device provided by an embodiment of the present application.
  • Figure 5 is a schematic structural diagram of an electronic device provided by an embodiment of the present application.
  • FIG. 6 is a schematic diagram of the hardware structure of an electronic device implementing an embodiment of the present application.
  • first, second, etc. in the description and claims of this application are used to distinguish similar objects and are not used to describe a specific order or sequence. It is to be understood that the figures so used are interchangeable under appropriate circumstances so that the embodiments of the present application can be practiced in orders other than those illustrated or described herein, and that "first,” “second,” etc. are distinguished Objects are usually of one type, and the number of objects is not limited. For example, the first object can be one or multiple.
  • “and/or” in the description and claims indicates at least one of the connected objects, and the character “/" generally indicates that the related objects are in an "or” relationship.
  • Figure 1 is a flow chart of a security status assessment method provided by an embodiment of the present application. Schematic diagram. As shown in Figure 1, one embodiment of the present application provides a security status assessment method, which is applied to electronic equipment. The method includes:
  • Step 101 Upon receiving a security status query request for querying the security status of the electronic device, collect target security status information;
  • the querying party may be the user itself or the application server.
  • the transmission security mechanism between the application server and the local electronic device can use Transport Layer Security (TLS) to improve transmission security.
  • TLS Transport Layer Security
  • the collected target security status information may include various types of information related to the security of electronic equipment, and the specific information may be determined based on actual assessment needs.
  • Step 102 Use a security status assessment model to evaluate the target security status information and generate a security status assessment result
  • the target safety status information includes at least one first-level indicator element, each of the first-level indicator elements includes at least one second-level indicator element and corresponding status information
  • the safety status evaluation model includes a first safety status evaluation model. and a second safety status evaluation model, the second safety status evaluation model is used to determine the score of each first-level indicator element based on the at least one second-level indicator element and corresponding status information, the first safety status The evaluation model is used to generate the safety status evaluation result based on the at least one first-level indicator element and the corresponding score.
  • the security status assessment model can be stored in the trusted execution environment of the electronic device to improve its security.
  • This security status assessment model is used to evaluate the security status of electronic equipment.
  • the collected target security status information can be used as the input of the security status assessment model and analyzed and processed according to the corresponding security status assessment strategy to generate a security status assessment result of the electronic device. Therefore, by adopting the method of model analysis and evaluation, the accuracy of the safety status assessment results can be effectively improved.
  • the safety status assessment model can be continuously learned and optimized. As the number of evaluations increases, the safety status assessment results will become more accurate.
  • the optional security status assessment model can be built based on the Common Vulnerability Scoring System (CVSS).
  • CVSS Common Vulnerability Scoring System
  • the security status assessment result is a score, that is, the security status assessment result is expressed in the form of a score.
  • the score is positively correlated with the security of the electronic device
  • the score range of the security status assessment results is 0-10, 0 means the lowest security, and 10 means the highest security, thus providing a more accurate security assessment basis for the security risk assessment of various application businesses.
  • the target security status information of the electronic device is collected, and the target security status information is evaluated through the security status evaluation model. Conduct a comprehensive assessment to obtain accurate and comprehensive security status assessment results, providing a more accurate assessment basis for businesses with high security requirements.
  • using a security status assessment model to evaluate the target security status information includes:
  • the score of each of the first-level indicator elements is calculated.
  • each first-level indicator element includes at least one second-level indicator element and status information corresponding to each second-level indicator element. Then the second security assessment model in the security status assessment model can be based on each second-level indicator element. The status information corresponding to the element is used to determine the score of the secondary indicator element, that is, each secondary indicator element is scored. Afterwards, the score of each first-level indicator element can be calculated based on the scores of all second-level indicator elements contained in each first-level indicator element and the weight of each second-level indicator element.
  • the score time of each first-level indicator element is calculated based on the scores of all second-level indicator elements included in each first-level indicator element and the weight of each second-level indicator element. , can be calculated using weighted summation. Among them, the weight of each secondary indicator element can be determined according to the actual situation.
  • the use of a security status assessment model to evaluate the target security status information, and generating a security status assessment result includes:
  • the safety status assessment result is generated based on the score and weight of each first-level indicator element.
  • the first security assessment model in the security status assessment model can obtain the security status assessment result based on the score of each first-level indicator element and the weight of each first-level indicator element. fruit. Among them, the weight of each first-level indicator element can be determined according to the actual situation.
  • a weighted summation method when obtaining the safety status assessment result based on the score of each first-level indicator element and the weight of each first-level indicator element, a weighted summation method can be used.
  • the method further includes:
  • Configuration updates are performed on the security status assessment model according to the security status assessment model configuration information.
  • the target server may be an electronic device management server, which is used to manage local electronic devices.
  • the local electronic device can receive the security status assessment model configuration information sent by the target server.
  • the security status assessment model configuration information is used to update and adjust the parameters and evaluation strategies in the security status assessment model. Therefore, the electronic device can be based on The received security status assessment model configuration information updates the security status assessment model to make the security status assessment results generated by the security status assessment model more accurate.
  • the configuration update of the security status assessment model includes at least one of the following:
  • the weight of at least one first-level indicator element and/or at least one second-level indicator in the security status assessment model can be updated based on the actual software and hardware conditions of the local electronic device.
  • the weight of the elements; or, the scoring strategy of the secondary indicator elements can be configured and updated, etc.
  • the method is applied to electronic devices that support Trusted Execution Environment TEE and Rich Execution Environment REE.
  • the at least one first-level indicator element includes: TEE security status information, REE security status information, hardware and at least one of firmware security status information and communication security status information.
  • a Rich Execution Environment (Rich Execution Environment)
  • REE Rich Execution Environment
  • TEE Trusted Execution Environment
  • REE security status information can be collected through the REE security detection module and REE application programming interface (Application Programming Interface, API) in REE.
  • REE application programming interface Application Programming Interface, API
  • the REE side can send a security information query request and REE security status information to the TEE side through this transmission channel.
  • TEE security status information can be collected through the TEE security detection module and the Trusted Internal API (Trusted Internal API) in the TEE.
  • Trusted Internal API Trusted Internal API
  • REE security status information includes malicious/spoofed/fake applications, virus infections, application signature verification, verification startup, application layer data encryption, software-based memory vulnerability prevention, and application layer trustworthiness. and other secondary indicator elements, as well as the status information of each secondary indicator element.
  • the secondary indicator element is a malicious/deceptive/counterfeit application
  • the corresponding status information can be one of non-existent, unknown, and existing
  • the secondary indicator element is virus infection
  • the corresponding status information can be one of non-existent, unknown, and existing.
  • the secondary indicator element is verification startup, the corresponding status information can be supported or not supported.
  • the status information corresponding to each secondary indicator element is obtained through collection. Among them, the status information of each secondary indicator element corresponds to a score, and each secondary indicator element corresponds to a weight.
  • the TEE security status information includes malicious/spoofed/fake applications, virus infections, trusted verified startup, trusted user interaction, biometric identification, sensitive information storage, kernel real-time security protection, system Secondary indicator elements such as integrity measurement and kernel control flow integrity measurement, as well as the status information of each secondary indicator element.
  • the secondary indicator element is a malicious/spoofed/counterfeit application
  • the corresponding status information can be non-existent. , unknown, or exists.
  • the secondary indicator element is virus infection, and the corresponding status information can be one of non-existence, unknown, or existence.
  • the secondary indicator element is trusted verification startup.
  • the corresponding status information can be either supported or not supported, and the status information corresponding to each secondary indicator element is obtained through collection. Among them, the status information of each secondary indicator element corresponds to a score, and each secondary indicator element corresponds to a weight.
  • the hardware and firmware security status information includes hardware root of trust, security unit, hardware encryption and decryption, secure boot, hardware-based memory vulnerability defense, memory encryption, whether the firmware version meets requirements, and anti-explosion protection.
  • Secondary indicator elements such as channel attacks and anti-failure injection attacks, as well as the status information of each secondary indicator element.
  • the secondary indicator element is the hardware root of trust, and the corresponding status information can be either supported or not supported.
  • the secondary indicator element is a security unit, and the corresponding status information can be either supported or not supported.
  • the secondary indicator element is hardware encryption and decryption, and the corresponding status information can be supported or not supported.
  • the status information corresponding to each secondary indicator element is obtained through collection. Among them, the status information of each secondary indicator element corresponds to a score, and each secondary indicator element corresponds to a weight.
  • the communication security status information includes cellular network communication, Wi-Fi communication, communication protocol security, virtual private network (Virtual Private Network, VPN), domain name resolution system (Domain Name System, DNS) security Secondary indicator elements such as analysis, and the status information of each secondary indicator element.
  • the secondary indicator element is nest network communication, and the corresponding status information can be one of safe, unknown, and pseudo base stations.
  • the first-level indicator element is Wi-Fi communication, and the corresponding status information can be one of trusted, public, unknown, and malicious.
  • the second-level indicator element is communication protocol security, and the corresponding status information can be TLS, Internet security Protocol (Internet Protocol Security, IPsec), customization, or none.
  • the status information corresponding to each secondary indicator element is obtained through collection. Among them, the status information of each secondary indicator element corresponds to a score, and each secondary indicator element corresponds to a weight.
  • the security status assessment model is based on the weighted arithmetic average method and refers to the universal vulnerability scoring system.
  • the weighted arithmetic average method means that in n observation data, each observation value is given different weights according to the degree of impact on the future predicted value, and the observation values in each period are multiplied by their own weights, and then they are The sum of is divided by the sum of each weight, and the resulting quotient is the future predicted value.
  • the mathematical model is:
  • n is the number of data points in the population
  • W i is the weight corresponding to each observation value
  • W i is between 0 and 1, that is, 0 ⁇ W i ⁇ 1.
  • first-level indicator elements For details, see Tables 1 to 5 below.
  • Table 3 Secondary indicator elements and weights of TEE security status information
  • Table 4 Secondary indicator elements and weights of hardware and firmware security status information
  • Table 5 Secondary indicator elements and weights of communication security status information
  • S adopts a 10-level rating mechanism, with "0" representing the lowest security and "10" representing the safest Sex is the highest.
  • the security level can be divided into low, medium and high according to the final security status assessment result S. For example: if S belongs to [0, 4), it is a low security level; if S belongs to [4, 7), it is a medium security level. ;S belongs to [7, 10], which is a high security level.
  • S A S A1 *W A1 +S A2 *W A2 +...+S A i*W Ai +...+S An *W An
  • S B S B1 *W B1 +S B2 *W B2 +...+S Bi *W Bi +...+S Bn *W Bn
  • S C S C1 *W C1 +S C2 *W C2 +...+S Ci *W Ci +...+S Bn *W Cn
  • S D S D1 *W D1 +S D2 *W D2 +...+S Di *W Di +...+S Dn *W Dn .
  • the variables S A1 , S An , S B1 S Bn , etc. are the scores of the secondary index elements, which are all positive numbers less than or equal to 10; the variables W A1 W An , W B1 , WBn, etc. represent each secondary index element respectively.
  • the score is 10 points and the weight is 0.2; the status information of virus infection (S A2 ) is unknown, the score is 5 points, and the weight is 0.25; the status information of the application signature verification (S A3 ) is supported, the score is 10 points, and the weight is 0.15; the status information of the verification startup (S A4 ) is supported, the score is 10 points, and the weight is 0.10; the status information of application layer data encryption (S A5 ) is supported, then the score is 10 points, and the weight is 0.05; the status information of software-based memory vulnerability defense (S A6 ) is partially supported, then The score is 5 points and the weight is 0.15; if the status information of the application layer trustworthiness (S A7 ) is not enabled, the score is 0 points and the weight is 0.10.
  • the corresponding security level is located at [4,7), which is a medium security level.
  • the method further includes:
  • the security capability information includes trusted execution environment information, trusted user interaction information, hardware encryption and decryption information, security unit information, memory encryption information, side channel attack prevention information, and fault injection attack prevention information.
  • the private key of the electronic equipment is used to digitally sign the security capability information and security status assessment results, thereby improving security performance, reducing latency, and improving system performance.
  • the querying party has a public key paired with the private key of the electronic device, which can be used to verify the comprehensive security information returned by the electronic device to determine its authenticity and integrity.
  • the security situation of electronic equipment can be more comprehensively assessed, providing a fine-grained security performance assessment of electronic equipment, and providing security risks for various application businesses.
  • the assessment provides a more accurate basis for safety assessment.
  • FIG 2 is a schematic structural diagram of an electronic device supporting TEE and REE provided by an embodiment of the present application.
  • the querying party may be a mobile banking server, a mobile payment server, an enterprise application server, or other high-security application servers.
  • Electronic devices support Trusted Execution Environment TEE and Rich Execution Environment REE.
  • REE runs a Rich Execution Environment Operating System (REE Operating System, REE OS), and TEE runs a Trusted Execution Environment Operating System TEE OS.
  • REE Operating System REE Operating System
  • TEE OS Trusted Execution Environment Operating System
  • the request contains the identification of the "Security Capability and Security Status Client APP" and the authorization of the application server. token;
  • the request comes from a user's inquiry about this electronic device, the request only contains the identification of "Security Capability and Security Status Client APP";
  • Security status information on the REE side (such as whether there is malware, whether the system is infected with viruses, whether the network connection is safe, etc.) through the "REE security detection module” and "REE API";
  • security capabilities mainly include: trusted execution environment, trusted user interaction, hardware encryption and decryption, security unit, memory encryption, prevention of side channel attacks, prevention of fault injection attacks, etc.;
  • the evaluation result of the current security status is a score (such as 0-10, 0 indicates the lowest security, and 10 indicates the highest security).
  • the factors used to evaluate the current security status in addition to the security features of the Android operating system (such as application In addition to access control, file system access control, data encryption, data integrity protection, security lock screen and authentication, integrity verification of device configuration files, etc.), it also mainly includes: whether the system contains malware or is infected with viruses, hardware and firmware Whether the configuration has been tampered with, whether the system software version meets the requirements, whether the system is Rooted, whether the memory is under attack, whether the kernel and kernel configuration are tampered with, whether the network link is secure enough, etc.;
  • the request contains the identification of the "Security Capability and Security Status Client APP", the authorization token of the application server, and the REE Security status information;
  • a call request is initiated to the "Security Capability and Security Status Trusted App" on the TEE side.
  • the request contains the identification of the "Security Capability and Security Status Client APP" and the authorization of the application server. brand and REE safety status information;
  • the request contains the identification of the "Security Capability and Security Status Client APP" and the authorization token of the application server. and REE security status information; check whether the access request is valid according to the corresponding security policy:
  • Verify the validity of the application server's authorization token (such as whether the token comes from the management server of this electronic device, whether the token has expired, etc.), and check whether the server has the authority to call "Security Capabilities and Security Status Trusted APP";
  • Security status information on the TEE side through the "TEE security detection module” and "Trusted Internal API” (such as whether there is malware, whether the system is infected with viruses, whether the kernel configuration is tampered with, whether there are execution operations in the data area in the stack, etc.);
  • the safety status assessment based on the received REE safety status information and TEE safety status information, and based on the safety status evaluation model or method, the safety status of the electronic equipment is evaluated in real time to obtain an evaluation result of the current safety status;
  • the security capability information of the electronic device is returned to the "Security Capability and Security Status Client API" on the REE side of the electronic device;
  • Figure 3 is a schematic flow chart of obtaining the first-level indicator elements and the second-level indicator elements provided by the embodiment of the present application.
  • the acquisition of primary index elements and secondary index elements in the embodiment of this application includes the following:
  • the "Electronic Device Security Capability and Security Status Query Module" of the application server initiates a request for security capability query and current security status assessment (including authorization token) to the "Security Capability and Security Status Client APP" on the REE side of the electronic device.
  • the transmission security mechanism of the request message can use TLS;
  • the "Security Capability and Security Status Client APP" on the REE side of the electronic device sends a security capability query and security status assessment request (including authorization token, REE security status information) to the "Security Capability and Security Status Client API" on the REE side of the electronic device;
  • the "Security Capability and Security Status Client API" on the REE side of the electronic device sends the received security capability query and security status assessment request (including authorization token, REE security status information) to the TEE through the REE communication agent and the TEE communication agent.
  • Side “Security capabilities and security status Trusted APP";
  • the "Security Capability and Security Status Trusted APP" on the TEE side verifies the validity of the authorization token, and checks whether the application server has the authority to obtain the security capability and security status of the electronic device; if the verification of the authorization token fails, the relevant operations are terminated. Return an error message and prompt the application server to reapply for an authorization token;
  • the "Security Capability and Security Status Trusted APP" on the TEE side collects TEE security status information through the "TEE Security Detection Module” and "Trusted Internal API”;
  • the "Security Capability and Security Status Trusted APP" on the TEE side determines the security capability information of the electronic device and evaluates the current security status;
  • the "Security Capability and Security Status Trusted APP" on the TEE side uses the private key of the electronic device to digitally sign the security capability information and security status assessment results;
  • the "Security Capability and Security Status Trusted APP" on the TEE side returns the security capability information and security status evaluation results and signatures to the "Security Capability and Security Status Client API" on the REE side through the TEE communication agent and REE communication agent;
  • the "Security Capability and Security Status Client APP" on the REE side returns the received security capability information, security status assessment results and signature to the application server "Electronic Equipment Security Capability and Security Status Query Module".
  • the transmission security mechanism of the returned message TLS can be used;
  • the "electronic device security capability and security status query module" of the application server uses the public key of the electronic device to verify the signature of the security capability information and security status assessment results to determine their authenticity and integrity.
  • the target security status information of the electronic device is collected, and the target security status information is evaluated through the security status evaluation model.
  • Comprehensive assessment can obtain accurate and comprehensive security status assessment results, providing a more accurate assessment basis for businesses with high security requirements.
  • the execution subject may be a security status assessment device.
  • the security state assessment method performed by the security state assessment device is used as an example to illustrate the security state assessment device provided by the embodiment of the present application.
  • FIG. 4 is a schematic structural diagram of a safety status assessment device provided by an embodiment of the present application. As shown in Figure 4, another embodiment of the present application also provides a security status assessment device, which is applied to electronic equipment.
  • the device 400 includes:
  • the collection module 401 is configured to collect target security status information upon receiving a security status query request for querying the security status of the electronic device;
  • the evaluation module 402 is used to evaluate the target safety status information using a safety status evaluation model and generate a safety status evaluation result
  • the target safety status information includes at least one first-level indicator element, and each of the first-level indicator elements
  • the first-level indicator element includes at least one second-level indicator element and corresponding status information.
  • the safety status evaluation model includes a first safety status evaluation model and a second safety status evaluation model.
  • the second safety status evaluation model is used according to the At least one second-level indicator element and corresponding status information determine the score of each first-level indicator element
  • the first safety status assessment model is used to generate the safety status based on the at least one first-level indicator element and the corresponding score. Status assessment results.
  • the evaluation module includes:
  • a determining unit configured to determine the score of each of the secondary indicator elements based on the status information corresponding to each of the secondary indicator elements
  • the first scoring unit is used to calculate the score of each of the first-level index elements based on the score and weight of each of the second-level index elements.
  • the evaluation module includes:
  • An evaluation unit is configured to generate the safety status evaluation result based on the score and weight of each first-level indicator element.
  • the device also includes:
  • the receiving module is used to receive the security status assessment model configuration information sent by the target server;
  • An update module configured to update the configuration of the security status assessment model according to the security status assessment model configuration information.
  • the update module includes at least one of the following:
  • a weight update unit configured to update the weight of at least one first-level indicator element and/or the weight of at least one second-level indicator element in the safety status assessment model
  • a policy update unit configured to update the configuration of the scoring policy in the security status assessment model.
  • the device is applied to electronic equipment that supports Trusted Execution Environment TEE and Rich Execution Environment REE
  • the at least one first-level indicator element includes: TEE security status information, REE security status information, hardware and firmware security status information and at least one of communicating security status information.
  • the device also includes:
  • a signature module configured to collect the security capability information of the electronic device, and use the private key of the electronic device to digitally sign the security capability information and the security status assessment result, wherein the security status query request is sent
  • the querying party has a public key paired with the private key
  • a sending module configured to generate comprehensive security information based on the security capability information, the security status assessment result and the signature, and send the comprehensive security information to the querying party.
  • the security capability information includes trusted execution environment information, trusted user interaction information, hardware encryption and decryption information, security unit information, memory encryption information, side channel attack prevention information, and fault injection attack prevention information.
  • the target security status information of the electronic device is collected, and the target security status information is comprehensively evaluated through the security status assessment model. , so that accurate and comprehensive security status assessment results can be obtained, providing a more accurate assessment basis for businesses with high security requirements.
  • the safety status assessment device in the embodiment of the present application may be an electronic device or a component in the electronic device, such as an integrated circuit or chip.
  • the electronic device may be a terminal or other devices other than the terminal.
  • the electronic device can be a mobile phone, a tablet computer, a notebook computer, a handheld computer, a vehicle-mounted electronic device, a mobile internet device (Mobile Internet Device, MID), or augmented reality (AR)/virtual reality (VR).
  • the security status assessment device in the embodiment of the present application may be a device with an operating system.
  • the operating system can be an Android operating system, an iOS operating system, or other possible operating systems, which are not specifically limited in the embodiments of this application.
  • the security status assessment device provided by the embodiments of the present application can implement each process implemented by the method embodiments in Figures 1 to 3. To avoid duplication, they will not be described again here.
  • the embodiment of the present application also provides an electronic device 500, including a processor 501 and a memory 502.
  • the memory 502 stores programs or instructions that can be run on the processor 501.
  • the programs or instructions are When executed, the processor 501 implements each step of the above security status assessment method embodiment and can achieve the same technical effect. To avoid duplication, the details are not repeated here.
  • FIG. 6 is a schematic diagram of the hardware structure of an electronic device implementing an embodiment of the present application.
  • the electronic device 600 includes but is not limited to: radio frequency unit 601, network module 602, audio output unit 603, input unit 604, sensor 605, display unit 606, user input unit 607, interface unit 608, memory 609, processor 6010, etc. part.
  • the electronic device 600 may also include a power supply (such as a battery) that supplies power to various components.
  • the power supply may be logically connected to the processor 6010 through a power management system, thereby managing charging, discharging, and function through the power management system. Consumption management and other functions.
  • the structure of the electronic device shown in Figure 6 does not constitute a limitation on the electronic device.
  • the electronic device may include more or less components than shown in the figure, or combine certain components, or arrange different components, which will not be described again here. .
  • the processor 6010 is configured to collect target security status information when receiving a security status query request for querying the security status of the electronic device;
  • the processor 6010 is also configured to use a security status assessment model to evaluate the target security status information and generate a security status assessment result;
  • the target safety status information includes at least one first-level indicator element, each of the first-level indicator elements includes at least one second-level indicator element and corresponding status information
  • the safety status evaluation model includes a first safety status evaluation model. and a second safety status evaluation model, the second safety status evaluation model is used to determine the score of each first-level indicator element based on the at least one second-level indicator element and corresponding status information, the first safety status The evaluation model is used to generate the safety status evaluation result based on the at least one first-level indicator element and the corresponding score.
  • the processor 6010 is also configured to determine the score of each of the secondary indicator elements according to the status information corresponding to each of the secondary indicator elements;
  • the processor 6010 is also configured to calculate the score of each first-level indicator element based on the score and weight of each second-level indicator element.
  • the processor 6010 is also configured to generate the safety status assessment result according to the score and weight of each first-level indicator element.
  • the radio frequency unit 601 is used to receive the security status assessment model configuration information sent by the target server;
  • the processor 6010 is also configured to perform configuration updates on the security status assessment model according to the security status assessment model configuration information.
  • the configuration update of the security status assessment model includes at least one of the following:
  • the method is applied to electronic devices that support Trusted Execution Environment TEE and Rich Execution Environment REE, and the at least one first-level indicator element includes: TEE security status information, REE security status information, hardware and firmware security status information and at least one of communicating security status information.
  • the processor 6010 is also configured to collect the security capability information of the electronic device, and use the private key of the electronic device to digitally sign the security capability information and the security status assessment result, wherein sending The querying party of the security status query request has a public key paired with the private key;
  • the processor 6010 is also configured to generate comprehensive security information based on the security capability information, the security status assessment result, and the signature;
  • the radio frequency unit 601 is also used to send the comprehensive security information to the querying party.
  • the security capability information includes trusted execution environment information, trusted user interaction information, hardware encryption and decryption information, security unit information, memory encryption information, side channel attack prevention information, and fault injection attack prevention information.
  • the target security status information of the electronic device is collected, and the target security status information is comprehensively evaluated through the security status assessment model. , so that accurate and comprehensive security status assessment results can be obtained, providing a more accurate assessment basis for businesses with high security requirements.
  • the input unit 604 may include a graphics processor (Graphics Processing Unit, GPU) 6041 and a microphone 6042.
  • the graphics processor 6041 is responsible for the image capture device (GPU) in the video capture mode or the image capture mode. Process the image data of still pictures or videos obtained by cameras (such as cameras).
  • the display unit 606 may include a display panel 6061, which may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like.
  • the user input unit 607 includes a touch panel 6071 and at least one of other input devices 6072 .
  • Touch panel 6071 also called touch screen.
  • the touch panel 6071 may include two parts: a touch detection device and a touch controller.
  • Other input devices 6072 may include but are not limited to physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, and joysticks, which will not be described again here.
  • the memory 609 can be used to store software programs and various data.
  • the memory 609 can mainly include a first storage area for storing programs or instructions and a second storage area for storing data.
  • the first storage area can store an operating system and at least one function. Required applications or instructions (such as sound playback function, image playback function, etc.), etc.
  • memory 609 may include volatile memory or non-volatile memory, or memory 609 may include both volatile and non-volatile memory.
  • non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electrically removable memory.
  • Volatile memory can be random access memory (Random Access Memory, RAM), static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random access memory (Synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (Double Data Rate SDRAM, DDRSDRAM), enhanced synchronous dynamic random access memory (Enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (Synch link DRAM) , SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DRRAM).
  • RAM Random Access Memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • synchronous dynamic random access memory Synchronous DRAM, SDRAM
  • Double data rate synchronous dynamic random access memory Double Data Rate SDRAM, DDRSDRAM
  • Enhanced SDRAM, ESDRAM synchronous link dynamic random access memory
  • Synch link DRAM synchronous link dynamic random access memory
  • SLDRAM direct memory bus random access memory
  • the processor 6010 may include one or more processing units; optionally, the processor 6010 integrates an application processor and a modem processor, where the application processor mainly handles operations related to the operating system, user interface, application programs, etc., Modem processors mainly process wireless communication signals, such as baseband processors. It can be understood that the above modem processor may not be integrated into the processor 6010.
  • Embodiments of the present application also provide a readable storage medium.
  • the readable storage medium may be non-volatile or volatile.
  • the readable storage medium stores programs or instructions, and the programs or instructions are stored on the readable storage medium.
  • the processor executes, each process of the above security status assessment method embodiment is implemented, and the same technical effect can be achieved. To avoid duplication, the details will not be described here.
  • the processor is the processor in the electronic device described in the above embodiment.
  • the readable storage media includes computer-readable storage media, such as computer read-only memory, random access memory, magnetic disks or optical disks.
  • An embodiment of the present application further provides a chip, which includes a processor and a communication interface.
  • the communication interface is coupled to the processor, and the processor is used to run programs or instructions to implement each process of the above security status assessment method embodiment, and can achieve the same technical effect. To avoid duplication, the details will not be described here.
  • the chips mentioned in the embodiments of this application may also be called system-on-chip, system-on-a-chip, system-on-a-chip or system-on-chip, etc.
  • Embodiments of the present application provide a computer program product.
  • the program product is stored in a storage medium.
  • the program product is executed by at least one processor to implement each process of the above security status assessment method embodiment, and can achieve the same technology. The effect will not be described here to avoid repetition.
  • the methods of the above embodiments can be implemented by means of software plus the necessary general hardware platform. Of course, it can also be implemented by hardware, but in many cases the former is better. implementation.
  • the technical solution of the present application can be embodied in the form of a computer software product that is essentially or contributes to the existing technology.
  • the computer software product is stored in a storage medium (such as ROM/RAM, disk , optical disk), including several instructions to cause a terminal (which can be a mobile phone, computer, server, or network device, etc.) to execute the methods described in various embodiments of this application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

本申请公开了一种安全状态评估方法及装置、电子设备和可读存储介质,属于通信技术领域。所述安全状态评估方法应用于电子设备,所述方法包括:在接收到安全状态查询请求的情况下,采集目标安全状态信息;采用安全状态评估模型对目标安全状态信息进行评估,生成安全状态评估结果;目标安全状态信息包括至少一个一级指标要素,每一一级指标要素包括至少一个二级指标要素及对应的状态信息,安全状态评估模型包括第一安全状态评估模型和第二安全状态评估模型,第二安全状态评估模型根据至少一个二级指标要素及对应的状态信息确定每一一级指标要素的评分,第一安全状态评估模型根据至少一个一级指标要素以及对应的评分生成所述安全状态评估结果。

Description

一种安全状态评估方法及装置、电子设备和可读存储介质
相关申请的交叉引用
本申请主张在2022年03月18日在中国提交的中国专利申请No.202210272623.9的优先权,其全部内容通过引用包含于此。
技术领域
本申请属于通信技术领域,具体涉及一种安全状态评估方法及装置、电子设备和可读存储介质。
背景技术
移动应用服务提供商在为用户提供服务时,会进行相应的业务安全风险评估,需要考虑移动设备是否安全、用户行为是否异常、发起移动支付的应用是否可信等。然而目前的安全风险评估方案得到的安全风险评估结果不够准确,难以满足用户对高业务安全的需求。
发明内容
本申请实施例的目的是提供一种安全状态评估方法及装置、电子设备和可读存储介质,能够解决相关技术中安全风险评估方案得到的安全风险评估结果不够准确,难以满足用户对高业务安全的需求的问题。
第一方面,本申请实施例提供了一种安全状态评估方法,应用于电子设备,该方法包括:
在接收到用于查询所述电子设备的安全状态的安全状态查询请求的情况下,采集目标安全状态信息;
采用安全状态评估模型对所述目标安全状态信息进行评估,生成安全状态评估结果;
其中,所述目标安全状态信息包括至少一个一级指标要素,每一所述一级指标要素包括至少一个二级指标要素及对应的状态信息,所述安全状态评估模型包括第一安全状态评估模型和第二安全状态评估模型,所述第二安全 状态评估模型用于根据所述至少一个二级指标要素及对应的状态信息确定每一所述一级指标要素的评分,所述第一安全状态评估模型用于根据所述至少一个一级指标要素以及对应的评分生成所述安全状态评估结果。
第二方面,本申请实施例提供了一种安全状态评估装置,应用于电子设备,该装置包括:
采集模块,用于在接收到用于查询所述电子设备的安全状态的安全状态查询请求的情况下,采集目标安全状态信息;
评估模块,用于采用安全状态评估模型对所述目标安全状态信息进行评估,生成安全状态评估结果;
其中,所述目标安全状态信息包括至少一个一级指标要素,每一所述一级指标要素包括至少一个二级指标要素及对应的状态信息,所述安全状态评估模型包括第一安全状态评估模型和第二安全状态评估模型,所述第二安全状态评估模型用于根据所述至少一个二级指标要素及对应的状态信息确定每一所述一级指标要素的评分,所述第一安全状态评估模型用于根据所述至少一个一级指标要素以及对应的评分生成所述安全状态评估结果。
第三方面,本申请实施例提供了一种电子设备,该电子设备包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第一方面所述的方法的步骤。
第四方面,本申请实施例提供了一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如第一方面所述的方法的步骤。
第五方面,本申请实施例提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如第一方面所述的方法。
第六方面,本申请实施例提供一种计算机程序产品,该程序产品被存储在存储介质中,该程序产品被至少一个处理器执行以实现如第一方面所述的方法。
第七方面,本申请实施例提供一种通信设备,被配置为执行以实现如第一方面所述的方法。
在本申请实施例中,在接收到查询电子设备的安全状态的安全状态查询请求的情况下,通过采集电子设备的目标安全状态信息,并通过安全状态评估模型来对目标安全状态信息进行全面评估,从而可以得到准确、全面的安全状态评估结果,为高安全要求的业务提供了更准确的评估依据。
附图说明
图1为本申请实施例提供的一种安全状态评估方法的流程示意图;
图2为本申请实施例提供的支持TEE和REE的电子设备的结构示意图;
图3为本申请实施例提供的一级指标要素和二级指标要素的获取的流程示意图;
图4为本申请实施例提供的一种安全状态评估装置的结构示意图;
图5为本申请实施例提供的一种电子设备的结构示意图;
图6为实现本申请实施例的一种电子设备的硬件结构示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员获得的所有其他实施例,都属于本申请保护的范围。
本申请的说明书和权利要求书中的术语“第一”、“第二”等是用于区别类似的对象,而不用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施,且“第一”、“第二”等所区分的对象通常为一类,并不限定对象的个数,例如第一对象可以是一个,也可以是多个。此外,说明书以及权利要求中“和/或”表示所连接对象的至少其中之一,字符“/”,一般表示前后关联对象是一种“或”的关系。
下面结合附图,通过具体的实施例及其应用场景对本申请实施例提供的安全状态评估方法及装置、电子设备和可读存储介质进行详细地说明。
请参考图1,图1为本申请实施例提供的一种安全状态评估方法的流程 示意图。如图1所示,本申请一方面实施例提供了一种安全状态评估方法,应用于电子设备,该方法包括:
步骤101:在接收到用于查询所述电子设备的安全状态的安全状态查询请求的情况下,采集目标安全状态信息;
本实施例中,可选地,查询方可以为用户本身,也可以为应用服务器。在查询方为应用服务器时,应用服务器与本端电子设备之间的传输安全机制可以采用安全传输层协议(Transport Layer Security,TLS),以提高传输安全性。
其中,为了更全面地评估电子设备的安全状态,采集的目标安全状态信息可以包括涉及电子设备安全的各类信息,具体可以根据实际评估需求确定。
步骤102:采用安全状态评估模型对所述目标安全状态信息进行评估,生成安全状态评估结果;
其中,所述目标安全状态信息包括至少一个一级指标要素,每一所述一级指标要素包括至少一个二级指标要素及对应的状态信息,所述安全状态评估模型包括第一安全状态评估模型和第二安全状态评估模型,所述第二安全状态评估模型用于根据所述至少一个二级指标要素及对应的状态信息确定每一所述一级指标要素的评分,所述第一安全状态评估模型用于根据所述至少一个一级指标要素以及对应的评分生成所述安全状态评估结果。
本实施例中,可选地,安全状态评估模型可以存储在电子设备的可信执行环境中,以提高其安全性。该安全状态评估模型用于评估电子设备的安全状态。具体来说,可以将采集到的目标安全状态信息作为安全状态评估模型的输入,按照对应的安全状态评估策略进行分析处理,以生成电子设备的安全状态评估结果。由此,通过采用模型分析评估的方法,可以有效提高安全状态评估结果的准确度,并且,安全状态评估模型可以不断学习优化,随着评估次数的增加,安全状态评估结果也将越准确。
本申请的一些实施例中,可选地安全状态评估模型可以基于通用漏洞评分系统(Common Vulnerability Scoring System,CVSS)构建。
本申请的一些实施例中,可选地,安全状态评估结果为分值,也即安全状态评估结果以分值的形式体现。可选地,分值与电子设备的安全性呈正相 关,例如,安全状态评估结果的分值范围为0-10,0表示安全性最低,而10表示安全性最高,从而为各项应用业务的安全风险评估提供更准确的安全评估依据。
由此,在本申请实施例中,在接收到查询电子设备的安全状态的安全状态查询请求的情况下,通过采集电子设备的目标安全状态信息,并通过安全状态评估模型来对目标安全状态信息进行全面评估,从而可以得到准确、全面的安全状态评估结果,为高安全要求的业务提供了更准确的评估依据。
本申请的一些实施例中,所述采用安全状态评估模型对所述目标安全状态信息进行评估包括:
根据每一所述二级指标要素对应的状态信息,确定每一所述二级指标要素的评分;
根据每一所述二级指标要素的评分以及权重,计算每一所述一级指标要素的评分。
本实施例中,每一个一级指标要素包括至少一个二级指标要素以及与每一个二级指标要素对应的状态信息,则安全状态评估模型中的第二安全评估模型可以根据每一个二级指标要素对应的状态信息来确定该二级指标要素的评分,也即对每一个二级指标要素进行评分。之后,可以根据每一个一级指标要素中包含的所有二级指标要素的评分以及每一个二级指标要素的权重,计算出每一个一级指标要素的评分。
本申请的一些实施例中,可选地,根据每一个一级指标要素中包含的所有二级指标要素的评分以及每一个二级指标要素的权重,计算出每一个一级指标要素的评分时,可以采用加权求和的方式计算得到。其中,每一个二级指标要素的权重可以根据实际情况确定。
本申请的一些实施例中,所述采用安全状态评估模型对所述目标安全状态信息进行评估,生成安全状态评估结果包括:
根据每一所述一级指标要素的评分以及权重,生成所述安全状态评估结果。
本实施例中,安全状态评估模型中的第一安全评估模型可以根据每一个一级指标要素的评分以及每一个一级指标要素的权重来得到安全状态评估结 果。其中,每一个一级指标要素的权重可以根据实际情况确定。
本申请的一些实施例中,可选地,根据每一个一级指标要素的评分以及每一个一级指标要素的权重来得到安全状态评估结果时,可以采用加权求和的方式计算得到。
本申请的一些实施例中,所述方法还包括:
接收目标服务器发送的安全状态评估模型配置信息;
根据所述安全状态评估模型配置信息,对所述安全状态评估模型进行配置更新。
本实施例中,目标服务器可以为电子设备管理服务器,即用于对本端电子设备进行管理。例如,本端电子设备可以接收目标服务器发送的安全状态评估模型配置信息,该安全状态评估模型配置信息用于对安全状态评估模型中的参数、评估策略进行更新调整,由此,电子设备可以根据接收到的安全状态评估模型配置信息对安全状态评估模型进行配置更新,以更使安全状态评估模型生成的安全状态评估结果更准确。
本申请的一些实施例中,所述对所述安全状态评估模型进行配置更新包括以下至少一者:
对所述安全状态评估模型中的至少一个一级指标要素的权重和/或至少一个二级指标要素的权重进行配置更新;
对所述安全状态评估模型中的评分策略进行配置更新。
也就是说,在对安全状态评估模型进行配置更新时,可以根据本端电子设备的实际软硬件情况,更新安全状态评估模型中的至少一个一级指标要素的权重和/或至少一个二级指标要素的权重;或者,可以对二级指标要素的评分策略进行配置更新等等。由此,可以使得安全状态评估模型更符合本端电子设备的实际情况,生成的安全状态评估结果更加准确。
本申请的另一些实施例中,所述方法应用于支持可信执行环境TEE和富执行环境REE的电子设备,所述至少一个一级指标要素包括:TEE安全状态信息、REE安全状态信息、硬件及固件安全状态信息以及通信安全状态信息中的至少一者。
本申请实施例中,可选地,富执行环境(Rich Execution Environment, REE)中运行有富执行环境操作系统,而可信执行环境(Trusted Execution Environment,TEE)中运行有可信执行环境操作系统。
在一些实施例中,可选地,可以通过REE中的REE安全检测模块和REE应用程序接口(Application Programming Interface,API)来收集REE安全状态信息。
本实施例中,可选地,REE与TEE之间具有协定的通信代理,建立有通信/数据传输通道,因此,REE侧可以通过该传输通道向TEE侧发送安全信息查询请求以及REE安全状态信息。
在一些实施例中,可选地,可以通过TEE中的TEE安全检测模块和可信内部API(Trusted Internal API)来收集TEE安全状态信息。
在一些实施例中,可选地,REE安全状态信息包括恶意/欺骗/伪冒应用、病毒感染、应用签名验证、验证启动、应用层数据加密、软件方式的内存漏洞防御、应用层可信度量等二级指标要素,以及每一个二级指标要素的状态信息,例如,二级指标要素为恶意/欺骗/伪冒应用,对应的状态信息可以为不存在、未知、存在中的一者,又如,二级指标要素为病毒感染,对应的状态信息可以为不存在、未知、存在中的一者,再如,二级指标要素为验证启动,对应的状态信息可以为支持、不支持中的一者,每一个二级指标要素对应的状态信息即通过采集得到。其中,每一个二级指标要素的状态信息对应一个评分,每一个二级指标要素对应一个权重。
在一些实施例中,可选地,TEE安全状态信息包括恶意/欺骗/伪冒应用、病毒感染、可信验证启动、可信用户交互、生物特征识别、敏感信息存储、内核实时安全保护、系统完整性度量、内核控制流完整性度量等二级指标要素,以及每一个二级指标要素的状态信息,例如,二级指标要素为恶意/欺骗/伪冒应用,对应的状态信息可以为不存在、未知、存在中的一者,又如,二级指标要素为病毒感染,对应的状态信息可以为不存在、未知、存在中的一者,再如,二级指标要素为可信验证启动,对应的状态信息可以为支持、不支持中的一者,每一个二级指标要素对应的状态信息即通过采集得到。其中,每一个二级指标要素的状态信息对应一个评分,每一个二级指标要素对应一个权重。
在一些实施例中,可选地,硬件及固件安全状态信息包括硬件可信根、安全单元、硬件加解密、安全启动、硬件方式的内存漏洞防御、内存加密、固件版本是否满足要求、防侧信道攻击、防故障注入攻击等二级指标要素,以及每一个二级指标要素的状态信息,例如,二级指标要素为硬件可信根,对应的状态信息可以为支持、不支持中的一者,又如,二级指标要素为安全单元,对应的状态信息可以为支持、不支持中的一者,再如,二级指标要素为硬件加解密,对应的状态信息可以为支持、不支持中的一者,每一个二级指标要素对应的状态信息即通过采集得到。其中,每一个二级指标要素的状态信息对应一个评分,每一个二级指标要素对应一个权重。
在一些实施例中,可选地,通信安全状态信息包括蜂窝网络通信、Wi-Fi通信、通信协议安全、虚拟专用网络(Virtual Private Network,VPN)、域名解析系统(Domain Name System,DNS)安全解析等二级指标要素,以及每一个二级指标要素的状态信息,例如,二级指标要素为窝网络通信,对应的状态信息可以为安全、未知、伪基站中的一者,又如,二级指标要素为Wi-Fi通信,对应的状态信息可以为可信、公开、未知、恶意中的一者,再如,二级指标要素为通信协议安全,对应的状态信息可以为TLS、互联网安全协议(Internet Protocol Security,Ipsec)、自定义、无中的一者,每一个二级指标要素对应的状态信息即通过采集得到。其中,每一个二级指标要素的状态信息对应一个评分,每一个二级指标要素对应一个权重。
本申请实施例中,可选地,安全状态评估模型基于加权算数平均法,并参考通用漏洞评分系统。其中,加权算数平均法即在n个观测数据中,每个观测值根据对未来预测值影响的程度不同,给予不同的权数,将各个时期的观测值乘以自己的权数,然后将它们的和除以各个权数之和,所得之商就是未来预测值,其数学模型为:
其中,为加权算术平均值,即预测值,Yi为不同时期的观测值(i=1,2,…,n),n为总体中的数据点数,Wi为各个观察值对应的权数,Wi在0到1之间,即0≤Wi≤1。
基于此,本申请的一些实施例中,定义了如下的一级指标要素、二级指标要素以及相应的状态信息、评分等,具体见如下表1~表5。
表1:一级指标要素和权重
表2:REE安全状态信息的二级指标要素和权重
表3:TEE安全状态信息的二级指标要素和权重
表4:硬件及固件安全状态信息的二级指标要素和权重
表5:通信安全状态信息的二级指标要素和权重
由此,对于安全状态评估结果S,则有:
S=SA*WA+SB*WB+SC*WC+SD*WD
其中,变量SA、SB、SC、SD为一级指标要素的评分;变量WA、WB、WC、WD为一级指标要素在综合评价得到安全状态评估结果时的重要程度,即权重,其中,WA+WB+WC+WD=1;S、SA、SB、SC、SD是小于或等于10的正数。
可选地,S采取10级评级机制,“0”代表安全性最低,“10”代表安全 性最高。安全等级可根据最终的安全状态评估结果S分为低、中、高三等,例如:S属于[0,4),则为低等安全级别;S属于[4,7),则为中等安全级别;S属于[7,10],则为高等安全级别。
本申请的一些实施例中,SA、SB、SC、SD的计算公式如下:
SA=SA1*WA1+SA2*WA2+...+SAi*WAi+...+SAn*WAn
SB=SB1*WB1+SB2*WB2+...+SBi*WBi+...+SBn*WBn
SC=SC1*WC1+SC2*WC2+...+SCi*WCi+...+SBn*WCn
SD=SD1*WD1+SD2*WD2+...+SDi*WDi+...+SDn*WDn
其中,变量SA1、SAn、SB1 SBn等为二级指标要素的评分,都是小于或等于10的正数;变量WA1 WAn、WB1、WBn等分别表示各个二级指标要素的重要程度,即权重,同时满足以下关系:
WA1+WA2+...+WAi+...+WAn=1;
WB1+WB2+...+WBi+...+WBn=1;
WC1+WC2+...+WCi+...+WCn=1;
WD1+WD2+...+WDi+...+WDn=1。
下面示例性地介绍上述计算过程。
REE安全状态信息的二级指标要素和权重中,恶意/欺骗/伪冒应用(SA1)的状态信息为不存在、则评分为10分,权重为0.2;病毒感染(SA2)的状态信息为未知,则评分为5分,权重为0.25;应用签名验证(SA3)的状态信息为支持、则评分为10分,权重为0.15;验证启动(SA4)的状态信息为支持、则评分为10分,权重为0.10;应用层数据加密(SA5)的状态信息为支持、则评分为10分,权重为0.05;软件方式的内存漏洞防御(SA6)的状态信息为部分支持、则评分为5分,权重为0.15;应用层可信度量(SA7)的状态信息为未启用、则评分为0分,权重为0.10,则REE安全状态信息的评分为:
SA=SA1*WA1+SA2*WA2+SA3*WA3+SA4*WA4+SA5*WA5+SA6*WA6+SA7*WA7
=10*0.2+5*0.25+10*0.15+10*0.1+10*0.05+5*0.15+10*0
=7.0
同样的,假设计算得到SB=6.5,SC=6.0,SD=7.25。
则安全状态评估结果为:
S=SA*WA+SB*WB+SC*WC+SD*WD
=7.0*0.2+6.5*0.3+6.0*0.4+7.25*0.1
=6.5。
则对应的安全等级位于[4,7),属于中等安全级别。
本申请的一些实施例中,所述方法还包括:
采集所述电子设备的安全能力信息,并采用所述电子设备的私钥对所述安全能力信息和所述安全状态评估结果进行数字签名,其中,发送所述安全状态查询请求的查询方具有与所述私钥配对的公钥;
根据所述安全能力信息、所述安全状态评估结果以及签名生成综合安全信息,并将所述综合安全信息发送给所述查询方。
其中,所述安全能力信息包括可信执行环境信息、可信用户交互信息、硬件加解密信息、安全单元信息、内存加密信息、防侧信道攻击信息、防故障注入攻击信息。
在得到电子设备的安全能力信息和安全状态评估结果之后,为了解决相关技术中每次进行安全评估时都需要服务器对安全评估结果进行签名而导致的时延,本申请实施例中,在本端电子设备的TEE中即采用电子设备的私钥对安全能力信息和安全状态评估结果进行数字签名,从而在提高安全性能的同时,降低了时延,提高了系统性能。可选地,查询方具有与电子设备的私钥配对的公钥,可以利用该公钥对电子设备返回的综合安全信息进行验证,以确定其真实性和完整性。
由此,通过综合电子设备当前的安全状态信息以及电子设备的安全能力信息,可以更加全面地评估电子设备的安全情况,提供电子设备细颗粒度的安全性能评估,为各项应用业务的安全风险评估提供更准确的安全评估依据。
请参考图2,图2为本申请实施例提供的支持TEE和REE的电子设备的结构示意图。如图2所示,本申请实施例中,查询方可以为手机银行服务器、移动支付服务器、企业应用服务器或者其他高安全应用服务器等。电子设备支持可信执行环境TEE和富执行环境REE,REE中运行有富执行环境操作系统(REE Operating System,REE OS),而TEE中运行有可信执行环境操作系统TEE OS。
下面结合附图2介绍电子设备各部分功能以及各个一级指标要素和二级指标要素的获取流程。
·REE侧
a)安全能力和安全状态客户端(Client)APP:
接收来自用户或应用服务器“电子设备安全能力和安全状态查询模块”的安全能力查询和当前的安全状态评估的请求,该请求中包含“安全能力和安全状态Client APP”的标识和应用服务器的授权令牌;
如果该请求来自用户对本电子设备的查询,则该请求中只包含“安全能力和安全状态Client APP”的标识;
通过“REE安全检测模块”和“REE API”收集REE侧的安全状态信息(如是否存在恶意软件、系统是否感染病毒、网络连接是否安全等);
向“安全能力和安全状态Client API”发起安全能力查询和当前的安全状态评估的调用请求,该请求中包含“安全能力和安全状态Client APP”的标识、应用服务器的授权令牌以及REE安全状态信息;
接收来自“安全能力和安全状态Client API”相应的响应(包括安全能力信息和当前的安全状态评估结果、以及电子设备的签名等);
其中,安全能力,主要包括:可信执行环境、可信用户交互、硬件加解密、安全单元、内存加密、防侧信道攻击、防故障注入攻击等;
当前安全状态的评估结果是一个分值(如0-10,0标识安全性最低,而10表示安全性最高),当前安全状态评估的因素,除了安卓(Android)操作系统的安全特征(如应用访问控制、文件系统访问控制、数据加密、数据完整性保护、安全锁屏和认证、设备配置文件的完整性验证等)以外,主要还包括:系统是否存在恶意软件或感染病毒、硬件和固件的配置是否被篡改、系统软件版本是否满足要求、系统是否被Root、内存是否遭受攻击、内核及内核配置是否被篡改、网络链接是否足够安全等;
将接收到的安全能力信息和当前的安全状态评估结果、以及电子设备的签名等,返回给应用服务器“电子设备安全能力和安全状态查询模块”;
向用户呈现本电子设备的安全能力和当前的安全状态;
b)安全能力和安全状态Client API:
接收来自电子设备“安全能力和安全状态Client APP”的安全能力查询和当前的安全状态评估的请求,该请求中包含“安全能力和安全状态Client APP”的标识、应用服务器的授权令牌以及REE安全状态信息;
通过REE侧的通信代理和TEE侧的通信代理,向TEE侧“安全能力和安全状态Trusted App”发起调用请求,该请求中包含“安全能力和安全状态Client APP”的标识、应用服务器的授权令牌以及REE安全状态信息;
接收来自TEE侧“安全能力和安全状态Trusted App”相应的响应(包括安全能力信息和当前的安全状态评估结果、以及电子设备的签名);
将接收到的本电子设备的安全能力信息和当前的安全状态评估结果、及电子设备的签名,返回给电子设备“安全能力和安全状态Client APP”;
·TEE侧
a)安全能力和安全状态Trusted APP:
接收来自电子设备REE侧“安全能力和安全状态Client API”的安全能力查询和当前的安全状态评估的请求,该请求中包含“安全能力和安全状态Client APP”的标识、应用服务器的授权令牌以及REE安全状态信息;根据相应的安全策略,检查该访问请求是否有效:
根据本电子设备“安全能力和安全状态Client APP”的标识,检查该应用是否有调用“安全能力和安全状态Trusted APP”的权限;
验证应用服务器的授权令牌的有效性(如令牌是否来自本电子设备的管理服务器、令牌是否过期等),并检查该服务器否有调用“安全能力和安全状态Trusted APP”的权限;
通过“TEE安全检测模块”和“Trusted Internal API”收集TEE侧的安全状态信息(如是否存在恶意软件、系统是否感染病毒、内核的配置是否篡改、堆栈中的数据区域是否存在执行操作等);
通过模块“安全状态评估”根据接收到的REE安全状态信息和TEE安全状态信息,基于安全状态评估模型或方法,对本电子设备的安全状态进行实时评估,获得一个当前安全状态的评估结果;
通过模块“安全能力管理”根据安全能力查询请求,确定需要返回的安全能力信息;
使用本电子设备的私钥对安全能力信息和当前的安全状态评估结果进行数字签名;
通过REE侧的通信代理和TEE侧的通信代理,向电子设备REE侧“安全能力和安全状态Client API”返回本电子设备的安全能力信息和当前的安全状态评估结果、以及电子设备的签名;
接收来自电子设备管理服务器的“安全能力配置”对“安全能力管理”的配置和更新;
接收来自电子设备管理服务器的“安全状态评估模型管理”对“安全状态评估”的配置和更新。
其中,在电子设备管理服务器中:
·终端安全能力和安全状态管理模块
a)授权管理
接收来自应用服务器中“电子设备安全能力和安全状态查询模块”的电子设备安全能力查询和安全状态评估的授权请求;
认证应用服务器或应用服务器的“电子设备安全能力和安全状态查询模块”;
为该应用服务器的“电子设备安全能力和安全状态查询模块”生成一个授权令牌;
将该授权令牌返回给应用服务器的“电子设备安全能力和安全状态查询模块”;
b)安全能力配置
对电子设备“安全能力管理”中的安全能力进行配置和更新;
c)安全状态评估模型管理
对电子设备“安全状态评估”中的安全状态评估模型和安全评估策略进行配置和更新;
对安全状态评估模型进行增强。
其中,在应用服务器(手机银行、移动支付、企业应用等)的业务安全风险评估中:
·电子设备安全能力和安全状态查询模块
a)向电子设备“安全能力和安全状态API”发起安全能力查询和当前的安全状态评估的调用;
b)接收来自电子设备“安全能力和安全状态API”相应的响应(即电子设备的安全能力信息和安全状态评估结果、及电子设备的签名),并根据应用服务器的公钥验证该响应的真实性和完整性。
请参考图3,图3为本申请实施例提供的一级指标要素和二级指标要素的获取的流程示意图。如图3所示,本申请实施例中的一级指标要素和二级指标要素的获取包括以下:
1)应用服务器的“电子设备安全能力和安全状态查询模块”向电子设备REE侧“安全能力和安全状态Client APP”发起安全能力查询和当前的安全状态评估的请求(包含授权令牌),该请求消息的传输安全机制可采用TLS;
2)电子设备REE侧“安全能力和安全状态Client APP”通过“REE安全检测模块”和“REE API”收集REE安全状态信息;
3)电子设备REE侧“安全能力和安全状态Client APP”向电子设备REE侧“安全能力和安全状态Client API”发送安全能力查询和安全状态评估请求(包含授权令牌、REE安全状态信息);
4)电子设备REE侧“安全能力和安全状态Client API”将接收到的安全能力查询和安全状态评估请求(包含授权令牌、REE安全状态信息),通过REE通信代理和TEE通信代理发送给TEE侧“安全能力和安全状态Trusted APP”;
5)TEE侧“安全能力和安全状态Trusted APP”验证授权令牌的有效性,并检查应用服务器是否有权限获得电子设备的安全能力和安全状态;如果验证授权令牌失败,则终止相关操作,返回错误信息,并提示应用服务器重新申请授权令牌;
6)TEE侧“安全能力和安全状态Trusted APP”通过“TEE安全检测模块”和“Trusted Internal API”采集TEE安全状态信息;
7)TEE侧“安全能力和安全状态Trusted APP”确定电子设备的安全能力信息和评估当前的安全状态;
7.1)通过“安全能力管理”模块确定本电子设备的安全能力信息;
7.2)通过“安全状态评估”模块,结合REE安全状态信息和TEE安全 状态信息,评估本电子设备当前的安全状态;
8)TEE侧“安全能力和安全状态Trusted APP”使用电子设备的私钥,对安全能力信息和安全状态评估结果进行数字签名;
9)TEE侧“安全能力和安全状态Trusted APP”将安全能力信息和安全状态评估结果及签名,通过TEE通信代理和REE通信代理返回给REE侧“安全能力和安全状态Client API”;
10)REE侧“安全能力和安全状态Client API”将接收到的安全能力信息和安全状态评估结果及签名返回给REE侧“安全能力和安全状态Client APP”;
11)REE侧“安全能力和安全状态Client APP”将接收到的安全能力信息和安全状态评估结果及签名返回给应用服务器“电子设备安全能力和安全状态查询模块”,该返回消息的传输安全机制可采用TLS;
12)应用服务器“电子设备安全能力和安全状态查询模块”使用电子设备的公钥,对安全能力信息和安全状态评估结果的签名进行验证,确定其真实性和完整性。
总之,在本申请实施例中,在接收到查询电子设备的安全状态的安全状态查询请求的情况下,通过采集电子设备的目标安全状态信息,并通过安全状态评估模型来对目标安全状态信息进行全面评估,从而可以得到准确、全面的安全状态评估结果,为高安全要求的业务提供了更准确的评估依据。
本申请实施例提供的安全状态评估方法,执行主体可以为安全状态评估装置。本申请实施例中以安全状态评估装置执行安全状态评估方法为例,说明本申请实施例提供的安全状态评估装置。
请参考图4,图4为本申请实施例提供的一种安全状态评估装置的结构示意图。如图4所示,本申请另一方面实施例还提供了一种安全状态评估装置,应用于电子设备,该装置400包括:
采集模块401,用于在接收到用于查询所述电子设备的安全状态的安全状态查询请求的情况下,采集目标安全状态信息;
评估模块402,用于采用安全状态评估模型对所述目标安全状态信息进行评估,生成安全状态评估结果;
其中,所述目标安全状态信息包括至少一个一级指标要素,每一所述一 级指标要素包括至少一个二级指标要素及对应的状态信息,所述安全状态评估模型包括第一安全状态评估模型和第二安全状态评估模型,所述第二安全状态评估模型用于根据所述至少一个二级指标要素及对应的状态信息确定每一所述一级指标要素的评分,所述第一安全状态评估模型用于根据所述至少一个一级指标要素以及对应的评分生成所述安全状态评估结果。
可选地,所述评估模块包括:
确定单元,用于根据每一所述二级指标要素对应的状态信息,确定每一所述二级指标要素的评分;
第一评分单元,用于根据每一所述二级指标要素的评分以及权重,计算每一所述一级指标要素的评分。
可选地,所述评估模块包括:
评估单元,用于根据每一所述一级指标要素的评分以及权重,生成所述安全状态评估结果。
可选地,所述装置还包括:
接收模块,用于接收目标服务器发送的安全状态评估模型配置信息;
更新模块,用于根据所述安全状态评估模型配置信息,对所述安全状态评估模型进行配置更新。
可选地,所述更新模块包括以下至少一者:
权重更新单元,用于对所述安全状态评估模型中的至少一个一级指标要素的权重和/或至少一个二级指标要素的权重进行配置更新;
策略更新单元,用于对所述安全状态评估模型中的评分策略进行配置更新。
可选地,所述装置应用于支持可信执行环境TEE和富执行环境REE的电子设备,所述至少一个一级指标要素包括:TEE安全状态信息、REE安全状态信息、硬件及固件安全状态信息以及通信安全状态信息中的至少一者。
可选地,所述装置还包括:
签名模块,用于采集所述电子设备的安全能力信息,并采用所述电子设备的私钥对所述安全能力信息和所述安全状态评估结果进行数字签名,其中,发送所述安全状态查询请求的查询方具有与所述私钥配对的公钥;
发送模块,用于根据所述安全能力信息、所述安全状态评估结果以及签名生成综合安全信息,并将所述综合安全信息发送给所述查询方。
可选地,所述安全能力信息包括可信执行环境信息、可信用户交互信息、硬件加解密信息、安全单元信息、内存加密信息、防侧信道攻击信息、防故障注入攻击信息。
在本申请实施例中,在接收到查询电子设备的安全状态的安全状态查询请求的情况下,通过采集电子设备的目标安全状态信息,并通过安全状态评估模型来对目标安全状态信息进行全面评估,从而可以得到准确、全面的安全状态评估结果,为高安全要求的业务提供了更准确的评估依据。
本申请实施例中的安全状态评估装置可以是电子设备,也可以是电子设备中的部件,例如集成电路或芯片。该电子设备可以是终端,也可以为除终端之外的其他设备。示例性的,电子设备可以为手机、平板电脑、笔记本电脑、掌上电脑、车载电子设备、移动上网装置(Mobile Internet Device,MID)、增强现实(augmented reality,AR)/虚拟现实(virtual reality,VR)设备、机器人、可穿戴设备、超级移动个人计算机(ultra-mobile personal computer,UMPC)、上网本或者个人数字助理(personal digital assistant,PDA)等,还可以为服务器、网络附属存储器(Network Attached Storage,NAS)、个人计算机(personal computer,PC)、电视机(television,TV)、柜员机或者自助机等,本申请实施例不作具体限定。
本申请实施例中的安全状态评估装置可以为具有操作系统的装置。该操作系统可以为安卓(Android)操作系统,可以为iOS操作系统,还可以为其他可能的操作系统,本申请实施例不作具体限定。
本申请实施例提供的安全状态评估装置能够实现图1至图3的方法实施例实现的各个过程,为避免重复,这里不再赘述。
如图5所示,本申请实施例还提供一种电子设备500,包括处理器501和存储器502,存储器502上存储有可在所述处理器501上运行的程序或指令,该程序或指令被处理器501执行时实现上述安全状态评估方法实施例的各个步骤,且能达到相同的技术效果,为避免重复,这里不再赘述。
图6为实现本申请实施例的一种电子设备的硬件结构示意图。
该电子设备600包括但不限于:射频单元601、网络模块602、音频输出单元603、输入单元604、传感器605、显示单元606、用户输入单元607、接口单元608、存储器609、以及处理器6010等部件。
本领域技术人员可以理解,电子设备600还可以包括给各个部件供电的电源(比如电池),电源可以通过电源管理系统与处理器6010逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。图6中示出的电子设备结构并不构成对电子设备的限定,电子设备可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置,在此不再赘述。
其中,处理器6010,用于在接收到用于查询所述电子设备的安全状态的安全状态查询请求的情况下,采集目标安全状态信息;
处理器6010,还用于采用安全状态评估模型对所述目标安全状态信息进行评估,生成安全状态评估结果;
其中,所述目标安全状态信息包括至少一个一级指标要素,每一所述一级指标要素包括至少一个二级指标要素及对应的状态信息,所述安全状态评估模型包括第一安全状态评估模型和第二安全状态评估模型,所述第二安全状态评估模型用于根据所述至少一个二级指标要素及对应的状态信息确定每一所述一级指标要素的评分,所述第一安全状态评估模型用于根据所述至少一个一级指标要素以及对应的评分生成所述安全状态评估结果。
可选地,处理器6010,还用于根据每一所述二级指标要素对应的状态信息,确定每一所述二级指标要素的评分;
处理器6010,还用于根据每一所述二级指标要素的评分以及权重,计算每一所述一级指标要素的评分。
可选地,处理器6010,还用于根据每一所述一级指标要素的评分以及权重,生成所述安全状态评估结果。
可选地,射频单元601,用于接收目标服务器发送的安全状态评估模型配置信息;
处理器6010,还用于根据所述安全状态评估模型配置信息,对所述安全状态评估模型进行配置更新。
可选地,所述对所述安全状态评估模型进行配置更新包括以下至少一者:
对所述安全状态评估模型中的至少一个一级指标要素的权重和/或至少一个二级指标要素的权重进行配置更新;
对所述安全状态评估模型中的评分策略进行配置更新。
可选地,所述方法应用于支持可信执行环境TEE和富执行环境REE的电子设备,所述至少一个一级指标要素包括:TEE安全状态信息、REE安全状态信息、硬件及固件安全状态信息以及通信安全状态信息中的至少一者。
可选地,处理器6010,还用于采集所述电子设备的安全能力信息,并采用所述电子设备的私钥对所述安全能力信息和所述安全状态评估结果进行数字签名,其中,发送所述安全状态查询请求的查询方具有与所述私钥配对的公钥;
处理器6010,还用于根据所述安全能力信息、所述安全状态评估结果以及签名生成综合安全信息;
射频单元601,还用于将所述综合安全信息发送给所述查询方。
可选地,所述安全能力信息包括可信执行环境信息、可信用户交互信息、硬件加解密信息、安全单元信息、内存加密信息、防侧信道攻击信息、防故障注入攻击信息。
在本申请实施例中,在接收到查询电子设备的安全状态的安全状态查询请求的情况下,通过采集电子设备的目标安全状态信息,并通过安全状态评估模型来对目标安全状态信息进行全面评估,从而可以得到准确、全面的安全状态评估结果,为高安全要求的业务提供了更准确的评估依据。
应理解的是,本申请实施例中,输入单元604可以包括图形处理器(Graphics Processing Unit,GPU)6041和麦克风6042,图形处理器6041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。显示单元606可包括显示面板6061,可以采用液晶显示器、有机发光二极管等形式来配置显示面板6061。用户输入单元607包括触控面板6071以及其他输入设备6072中的至少一种。触控面板6071,也称为触摸屏。触控面板6071可包括触摸检测装置和触摸控制器两个部分。其他输入设备6072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。
存储器609可用于存储软件程序以及各种数据,存储器609可主要包括存储程序或指令的第一存储区和存储数据的第二存储区,其中,第一存储区可存储操作系统、至少一个功能所需的应用程序或指令(比如声音播放功能、图像播放功能等)等。此外,存储器609可以包括易失性存储器或非易失性存储器,或者,存储器609可以包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDRSDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synch link DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DRRAM)。本申请实施例中的存储器609包括但不限于这些和任意其它适合类型的存储器。
处理器6010可包括一个或多个处理单元;可选地,处理器6010集成应用处理器和调制解调处理器,其中,应用处理器主要处理涉及操作系统、用户界面和应用程序等的操作,调制解调处理器主要处理无线通信信号,如基带处理器。可以理解的是,上述调制解调处理器也可以不集成到处理器6010中。
本申请实施例还提供一种可读存储介质,所述可读存储介质可以是非易失的,也可以是易失的,所述可读存储介质上存储有程序或指令,该程序或指令被处理器执行时实现上述安全状态评估方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
其中,所述处理器为上述实施例中所述的电子设备中的处理器。所述可读存储介质,包括计算机可读存储介质,如计算机只读存储器、随机存取存储器、磁碟或者光盘等。
本申请实施例另提供了一种芯片,所述芯片包括处理器和通信接口,所 述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现上述安全状态评估方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。应理解,本申请实施例提到的芯片还可以称为系统级芯片、系统芯片、芯片系统或片上系统芯片等。
本申请实施例提供一种计算机程序产品,该程序产品被存储在存储介质中,该程序产品被至少一个处理器执行以实现如上述安全状态评估方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。此外,需要指出的是,本申请实施方式中的方法和装置的范围不限按示出或讨论的顺序来执行功能,还可包括根据所涉及的功能按基本同时的方式或按相反的顺序来执行功能,例如,可以按不同于所描述的次序来执行所描述的方法,并且还可以添加、省去、或组合各种步骤。另外,参照某些示例所描述的特征可在其他示例中被组合。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以计算机软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,或者网络设备等)执行本申请各个实施例所述的方法。
上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本申请的保护之内。

Claims (21)

  1. 一种安全状态评估方法,应用于电子设备,包括:
    在接收到用于查询所述电子设备的安全状态的安全状态查询请求的情况下,采集目标安全状态信息;
    采用安全状态评估模型对所述目标安全状态信息进行评估,生成安全状态评估结果;
    其中,所述目标安全状态信息包括至少一个一级指标要素,每一所述一级指标要素包括至少一个二级指标要素及对应的状态信息,所述安全状态评估模型包括第一安全状态评估模型和第二安全状态评估模型,所述第二安全状态评估模型用于根据所述至少一个二级指标要素及对应的状态信息确定每一所述一级指标要素的评分,所述第一安全状态评估模型用于根据所述至少一个一级指标要素以及对应的评分生成所述安全状态评估结果。
  2. 根据权利要求1所述的方法,其中,所述采用安全状态评估模型对所述目标安全状态信息进行评估包括:
    根据每一所述二级指标要素对应的状态信息,确定每一所述二级指标要素的评分;
    根据每一所述二级指标要素的评分以及权重,计算每一所述一级指标要素的评分。
  3. 根据权利要求1或2所述的方法,其中,所述采用安全状态评估模型对所述目标安全状态信息进行评估,生成安全状态评估结果包括:
    根据每一所述一级指标要素的评分以及权重,生成所述安全状态评估结果。
  4. 根据权利要求1所述的方法,还包括:
    接收目标服务器发送的安全状态评估模型配置信息;
    根据所述安全状态评估模型配置信息,对所述安全状态评估模型进行配置更新。
  5. 根据权利要求4所述的方法,其中,所述对所述安全状态评估模型进行配置更新包括以下至少一者:
    对所述安全状态评估模型中的至少一个一级指标要素的权重和/或至少一个二级指标要素的权重进行配置更新;
    对所述安全状态评估模型中的评分策略进行配置更新。
  6. 根据权利要求1所述的方法,其中,所述方法应用于支持可信执行环境TEE和富执行环境REE的电子设备,所述至少一个一级指标要素包括:TEE安全状态信息、REE安全状态信息、硬件及固件安全状态信息以及通信安全状态信息中的至少一者。
  7. 根据权利要求1所述的方法,还包括:
    采集所述电子设备的安全能力信息,并采用所述电子设备的私钥对所述安全能力信息和所述安全状态评估结果进行数字签名,其中,发送所述安全状态查询请求的查询方具有与所述私钥配对的公钥;
    根据所述安全能力信息、所述安全状态评估结果以及签名生成综合安全信息,并将所述综合安全信息发送给所述查询方。
  8. 根据权利要求7所述的方法,其中,所述安全能力信息包括可信执行环境信息、可信用户交互信息、硬件加解密信息、安全单元信息、内存加密信息、防侧信道攻击信息、防故障注入攻击信息。
  9. 一种安全状态评估装置,应用于电子设备,包括:
    采集模块,用于在接收到用于查询所述电子设备的安全状态的安全状态查询请求的情况下,采集目标安全状态信息;
    评估模块,用于采用安全状态评估模型对所述目标安全状态信息进行评估,生成安全状态评估结果;
    其中,所述目标安全状态信息包括至少一个一级指标要素,每一所述一级指标要素包括至少一个二级指标要素及对应的状态信息,所述安全状态评估模型包括第一安全状态评估模型和第二安全状态评估模型,所述第二安全状态评估模型用于根据所述至少一个二级指标要素及对应的状态信息确定每一所述一级指标要素的评分,所述第一安全状态评估模型用于根据所述至少一个一级指标要素以及对应的评分生成所述安全状态评估结果。
  10. 根据权利要求9所述的装置,其中,所述评估模块包括:
    确定单元,用于根据每一所述二级指标要素对应的状态信息,确定每一 所述二级指标要素的评分;
    第一评分单元,用于根据每一所述二级指标要素的评分以及权重,计算每一所述一级指标要素的评分。
  11. 根据权利要求9或10所述的装置,其中,所述评估模块包括:
    评估单元,用于根据每一所述一级指标要素的评分以及权重,生成所述安全状态评估结果。
  12. 根据权利要求9所述的装置,还包括:
    接收模块,用于接收目标服务器发送的安全状态评估模型配置信息;
    更新模块,用于根据所述安全状态评估模型配置信息,对所述安全状态评估模型进行配置更新。
  13. 根据权利要求12所述的装置,其中,所述更新模块包括以下至少一者:
    权重更新单元,用于对所述安全状态评估模型中的至少一个一级指标要素的权重和/或至少一个二级指标要素的权重进行配置更新;
    策略更新单元,用于对所述安全状态评估模型中的评分策略进行配置更新。
  14. 根据权利要求9所述的装置,其中,所述装置应用于支持可信执行环境TEE和富执行环境REE的电子设备,所述至少一个一级指标要素包括:TEE安全状态信息、REE安全状态信息、硬件及固件安全状态信息以及通信安全状态信息中的至少一者。
  15. 根据权利要求9所述的装置,还包括:
    签名模块,用于采集所述电子设备的安全能力信息,并采用所述电子设备的私钥对所述安全能力信息和所述安全状态评估结果进行数字签名,其中,发送所述安全状态查询请求的查询方具有与所述私钥配对的公钥;
    发送模块,用于根据所述安全能力信息、所述安全状态评估结果以及签名生成综合安全信息,并将所述综合安全信息发送给所述查询方。
  16. 根据权利要求15所述的装置,其中,所述安全能力信息包括可信执行环境信息、可信用户交互信息、硬件加解密信息、安全单元信息、内存加密信息、防侧信道攻击信息、防故障注入攻击信息。
  17. 一种电子设备,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求1-8中任一项所述的安全状态评估方法的步骤。
  18. 一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如权利要求1-8中任一项所述的安全状态评估方法的步骤。
  19. 一种芯片,包括处理器和通信接口,其中,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如权利要求1-8中任一项所述的安全状态评估方法的步骤。
  20. 一种计算机程序产品,其中,所述计算机程序产品被存储在非瞬态的可读存储介质中,所述计算机程序产品被至少一个处理器执行以实现如权利要求1-8中任一项所述的安全状态评估方法的步骤。
  21. 一种通信设备,被配置为执行如权利要求1-8中任一项所述的安全状态评估方法的步骤。
PCT/CN2023/082026 2022-03-18 2023-03-17 一种安全状态评估方法及装置、电子设备和可读存储介质 WO2023174389A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210272623.9 2022-03-18
CN202210272623.9A CN116801255A (zh) 2022-03-18 2022-03-18 一种安全状态评估方法及装置、电子设备和可读存储介质

Publications (1)

Publication Number Publication Date
WO2023174389A1 true WO2023174389A1 (zh) 2023-09-21

Family

ID=88022397

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/082026 WO2023174389A1 (zh) 2022-03-18 2023-03-17 一种安全状态评估方法及装置、电子设备和可读存储介质

Country Status (2)

Country Link
CN (1) CN116801255A (zh)
WO (1) WO2023174389A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117452901A (zh) * 2023-12-22 2024-01-26 浙江中智达科技有限公司 控制生产装置运行的零手动操作方法、装置、设备及介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160196558A1 (en) * 2015-01-05 2016-07-07 Ebay Inc. Risk assessment based on connected wearable devices
CN109962882A (zh) * 2017-12-22 2019-07-02 中国科学院数据与通信保护研究教育中心 一种网络身份管理服务可信等级评估方法与系统
CN111401795A (zh) * 2020-04-26 2020-07-10 新智数字科技有限公司 设备健康状态的评估方法、装置、可读介质及电子设备
CN113935827A (zh) * 2021-11-02 2022-01-14 中国农业银行股份有限公司天津市分行 信贷风险评估方法及装置、存储介质及电子设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160196558A1 (en) * 2015-01-05 2016-07-07 Ebay Inc. Risk assessment based on connected wearable devices
CN109962882A (zh) * 2017-12-22 2019-07-02 中国科学院数据与通信保护研究教育中心 一种网络身份管理服务可信等级评估方法与系统
CN111401795A (zh) * 2020-04-26 2020-07-10 新智数字科技有限公司 设备健康状态的评估方法、装置、可读介质及电子设备
CN113935827A (zh) * 2021-11-02 2022-01-14 中国农业银行股份有限公司天津市分行 信贷风险评估方法及装置、存储介质及电子设备

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117452901A (zh) * 2023-12-22 2024-01-26 浙江中智达科技有限公司 控制生产装置运行的零手动操作方法、装置、设备及介质
CN117452901B (zh) * 2023-12-22 2024-03-15 浙江中智达科技有限公司 控制生产装置运行的零手动操作方法、装置、设备及介质

Also Published As

Publication number Publication date
CN116801255A (zh) 2023-09-22

Similar Documents

Publication Publication Date Title
JP6680840B2 (ja) 不正デジタル証明書の自動検出
US9900346B2 (en) Identification of and countermeasures against forged websites
US8997190B2 (en) Using metadata in security tokens to prevent coordinated gaming in a reputation system
US9065845B1 (en) Detecting misuse of trusted seals
JP5599884B2 (ja) 評価システムでのクライアント装置の信頼度メトリクスの使用
US8266676B2 (en) Method to verify the integrity of components on a trusted platform using integrity database services
US11140150B2 (en) System and method for secure online authentication
US8499150B1 (en) Selectively trusting signed files
US20150113618A1 (en) Verifying the security of a remote server
EP3887981B1 (en) Verifying user interactions on a content platform
CN113302893B (zh) 用于信任验证的方法及装置
JP2008005156A (ja) 情報処理端末および状態通知方法
CN114598541B (zh) 一种安全评估方法及装置、电子设备和可读存储介质
CN109995776B (zh) 一种互联网数据验证方法及系统
US9311485B2 (en) Device reputation management
CN110768791A (zh) 一种零知识证明的数据交互方法、节点、设备
WO2023174389A1 (zh) 一种安全状态评估方法及装置、电子设备和可读存储介质
Cremona et al. Cybersecurity and the blockchain: preventing the insertion of child pornography images
US11570198B2 (en) Detecting and quantifying vulnerabilities in a network system
US11290471B2 (en) Cross-attestation of electronic devices
WO2023185900A1 (zh) 一种安全状态评估方法及装置、电子设备和可读存储介质
Cencini et al. Software Vulnerabilities: Full-, Responsible-, and Non-Disclosure

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23769891

Country of ref document: EP

Kind code of ref document: A1