WO2023174393A1 - 一种安全评估方法及装置、电子设备和可读存储介质 - Google Patents

一种安全评估方法及装置、电子设备和可读存储介质 Download PDF

Info

Publication number
WO2023174393A1
WO2023174393A1 PCT/CN2023/082037 CN2023082037W WO2023174393A1 WO 2023174393 A1 WO2023174393 A1 WO 2023174393A1 CN 2023082037 W CN2023082037 W CN 2023082037W WO 2023174393 A1 WO2023174393 A1 WO 2023174393A1
Authority
WO
WIPO (PCT)
Prior art keywords
security
information
electronic device
status
ree
Prior art date
Application number
PCT/CN2023/082037
Other languages
English (en)
French (fr)
Inventor
胡志远
史领航
翟东岩
苏涛
颜俊
吴华琛
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Publication of WO2023174393A1 publication Critical patent/WO2023174393A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/28Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Definitions

  • This application belongs to the field of communication technology, and specifically relates to a security assessment method and device, electronic equipment and readable storage media.
  • the purpose of the embodiments of this application is to provide a security assessment method and device, electronic equipment and readable storage media, which can solve the problem that the security risk assessment results obtained by the security risk assessment scheme in related technologies are not accurate enough and cannot meet the user's requirements for high business security. A question of demand.
  • embodiments of this application provide a security assessment method that is applied to electronic devices that support TEE (Trusted Execution Environment, Trusted Execution Environment) and REE (Rich Execution Environment, Rich Execution Environment).
  • the method includes:
  • the REE side When the REE side receives a security information query request sent by the server for querying the security status of the electronic device, obtains the REE security status information, and combines the security information query request and the REE security status information. Sent to the TEE side;
  • target security information on the TEE side and generate comprehensive security information based on the REE security status information and the target security information, where the target security information includes the TEE security status status information;
  • embodiments of this application provide a security assessment method applied to servers.
  • the method includes:
  • the comprehensive security information is obtained by the electronic device based on the REE security status information and TEE security status information of the electronic device when responding to the security information query request.
  • the comprehensive security information includes a signature generated by the electronic device using a private key;
  • the target business service is provided to the electronic device.
  • embodiments of the present application provide a security assessment device, which is applied to electronic devices that support Trusted Execution Environment TEE and Rich Execution Environment REE.
  • the device includes:
  • the first processing module is configured to obtain the REE security status information when the REE side receives a security information query request sent by the server for querying the security status of the electronic device, and send the security information query request to the REE side. and the REE security status information is sent to the TEE side;
  • a second processing module configured to obtain target security information on the TEE side, and generate comprehensive security information based on the REE security status information and the target security information, where the target security information includes TEE security status information;
  • a sending module configured to send the comprehensive security information to the server.
  • inventions of the present application provide a security assessment device applied to an application server.
  • the device includes:
  • a query module configured to send a security information query request to the electronic device for querying the security status of the electronic device
  • the first receiving module is configured to receive comprehensive security information sent by the electronic device.
  • the comprehensive security information is based on the REE security status information and TEE security of the electronic device when responding to the security information query request. Status information is obtained, and the comprehensive security information includes The electronic device uses a signature generated by a private key;
  • a verification module configured to verify the signature in the comprehensive security information using the public key paired with the private key
  • the service module is used to provide target business services to the electronic device if the verification is passed.
  • inventions of the present application provide an electronic device.
  • the electronic device includes a processor and a memory.
  • the memory stores programs or instructions that can be run on the processor.
  • the programs or instructions are processed by the processor.
  • the steps of the method described in the first aspect are implemented when executed by a processor, or the steps of the method described in the second aspect are implemented when the program or instruction is executed by the processor.
  • embodiments of the present application provide a readable storage medium, which stores programs or instructions.
  • programs or instructions When the programs or instructions are executed by a processor, the steps of the method described in the first aspect are implemented. , or when the program or instruction is executed by the processor, the steps of the method described in the second aspect are implemented.
  • embodiments of the present application provide a chip.
  • the chip includes a processor and a communication interface.
  • the communication interface is coupled to the processor.
  • the processor is used to run programs or instructions to implement the first aspect. The method described in the second aspect, or the method described in the second aspect.
  • embodiments of the present application provide a computer program product.
  • the program product is stored in a storage medium.
  • the program product is executed by at least one processor to implement the method described in the first aspect.
  • the program product Executed by at least one processor to implement the method described in the second aspect.
  • the REE security status information and target security information can be used to implement a comprehensive assessment of the security status of the electronic device, so that the security assessment results More accurate, and, enhanced system security due to the generation of comprehensive security information in the TEE environment.
  • Figure 1 is a schematic flow chart of a security assessment method provided by an embodiment of the present application.
  • Figure 2 is a schematic structural diagram of a safety assessment device provided by an embodiment of the present application.
  • Figure 3 is a schematic flow chart of another security assessment method provided by an embodiment of the present application.
  • Figure 4 is a schematic structural diagram of another safety assessment device provided by an embodiment of the present application.
  • FIG. 5 is a schematic structural diagram of an electronic device supporting TEE and REE provided by an embodiment of the present application
  • Figure 6 is a schematic flow chart of yet another security assessment method provided by an embodiment of the present application.
  • Figure 7 is a schematic structural diagram of an electronic device provided by an embodiment of the present application.
  • FIG. 8 is a schematic diagram of the hardware structure of an electronic device implementing an embodiment of the present application.
  • first, second, etc. in the description and claims of this application are used to distinguish similar objects and are not used to describe a specific order or sequence. It is to be understood that the figures so used are interchangeable under appropriate circumstances so that the embodiments of the present application can be practiced in orders other than those illustrated or described herein, and that "first,” “second,” etc. are distinguished Objects are usually of one type, and the number of objects is not limited. For example, the first object can be one or multiple.
  • “and/or” in the description and claims indicates at least one of the connected objects, and the character “/" generally indicates that the related objects are in an "or” relationship.
  • Figure 1 is a schematic flow chart of a security assessment method provided by an embodiment of the present application.
  • one embodiment of the present application provides a security assessment method that can be applied to electronic devices that support Trusted Execution Environment TEE and Rich Execution Environment REE. The method includes the following steps:
  • Step 101 The REE side receives a message sent by the server for querying the electronic device.
  • the REE security status information is obtained, and the security information query request and the REE security status information are sent to the TEE side.
  • a rich execution environment operating system runs in REE (Rich Execution Environment, rich execution environment), and a trusted execution environment operating system runs in TEE (Trusted Execution Environment, trusted execution environment) .
  • the server may be an application server.
  • the transmission security mechanism between the application server and the local electronic device can use TLS (Transport Layer Security, Secure Transport Layer Protocol) to improve transmission security.
  • the application server may be an application server with high security requirements such as payment services.
  • REE security detection can be performed to collect REE security status information.
  • the REE security status information can include whether there is malware, whether the system is infected with viruses, and whether the network connection is safe. wait.
  • REE security status information can be collected through the REE security detection module and REE API (Application Programming Interface, application program interface) in REE.
  • REE API Application Programming Interface, application program interface
  • the REE side can send a security information query request and REE security status information to the TEE side through this transmission channel.
  • the user can also initiate a security information query request for querying the security status of the electronic device to meet the user's own needs for querying the security status of the electronic device.
  • Step 102 Obtain target security information on the TEE side, and generate comprehensive security information based on the REE security status information and the target security information, where the target security information includes TEE security status information;
  • the target security information can be collected in response to the security information query request, where the target security information can include TEE security status information, and the TEE security status information can include whether there is malware, Is the system infected with viruses or internal files? Whether the core configuration has been tampered with, whether there are execution operations in the data area in the stack, etc.
  • target security information can optionally be collected through the TEE security detection module and Trusted Internal API (Application Programming Interface, application program interface) in the TEE.
  • Trusted Internal API Application Programming Interface, application program interface
  • Step 103 Send the comprehensive security information to the server.
  • the TEE side can return the comprehensive security information to the REE side, and the REE side sends the comprehensive security information to the server.
  • the comprehensive security information can be sent to the application program interface where the user initiates the security information query request for display, so as to present the query results to the user.
  • the comprehensive security information can be sent to the corresponding application server, and the transmission security mechanism can adopt the TLS protocol.
  • the REE security status information and target security information can be used to implement a comprehensive assessment of the security status of the electronic device, so that Security assessment results are more accurate, and system security is enhanced due to the generation of comprehensive security information in the TEE environment.
  • the method when the security information query request contains the identity of the client application, before obtaining the target security information, the method further includes:
  • the obtaining target security information includes:
  • the target security information is obtained.
  • the security information query request only contains the identifier of the client application, that is, the user initiates a security information query request through the client application, and then the TEE side receives After the security information query request is made and before the target security information is collected, the identity of the client application needs to be verified on the TEE side to verify whether the client application has the query permission; the verification result is that the client application has The target security information is collected only if the query permission is granted. If the verification result is that the client application does not have the query permission, it will be terminated. Related operations return error information. As a result, system safety performance can be improved.
  • the method further includes:
  • the obtaining target security information includes:
  • the target security information is obtained.
  • the security information query request includes the identity of the client application and the authorization token of the application server, that is, the application server initiates a security information query through the client application.
  • the TEE side needs to verify the identity of the client application and the authorization token of the application server to verify the client application. Whether it has query permission, whether the application server has query permission, and whether the authorization time limit of the authorization token has expired; the target security is collected only when the verification result is that the client application has query permission and the authorization token is valid.
  • generating comprehensive security information based on the REE security status information and the target security information includes:
  • the collected target security information includes TEE security status information.
  • TEE security status information When generating comprehensive security information based on the REE security status information and the target security information, the security status of the electronic device can be generated based on the REE security status information and the TEE security status information. Status assessment results. From this, the obtained safety status assessment results not only evaluate the safety status of REE, but also evaluate the safety of TEE. status, so that the safety status assessment results can fully reflect the current safety status of the electronic equipment, and the safety status assessment results are more accurate and reliable.
  • the TEE side stores a security status assessment model, and generating a security status assessment result of the electronic device based on the REE security status information and the TEE security status information includes:
  • the security status assessment model is used to perform security status assessment on the REE security status information and the TEE security status information, and a security status assessment result of the electronic device is generated.
  • a security status assessment model is stored in the TEE, and the security status assessment model is used to evaluate the current security status of the electronic device.
  • the collected REE security status information and TEE security status information can be used as input to the security status assessment model, and analyzed and processed according to the corresponding security status assessment strategy to generate the current security status assessment result of the electronic device. Therefore, by adopting the method of model analysis and evaluation, the accuracy of the safety status assessment results can be effectively improved.
  • the safety status assessment model can be continuously learned and optimized. As the number of evaluations increases, the safety status assessment results will become more accurate.
  • the security status assessment result is a score, that is, the security status assessment result is expressed in the form of a score.
  • the score is positively correlated with the security of the electronic device.
  • the score range of the security status assessment result is 0-10, 0 represents the lowest security, and 10 represents the highest security, thus providing a basis for various application services.
  • Security risk assessment provides a more accurate basis for security assessment.
  • the method further includes:
  • the security status assessment model of the electronic device is configured and updated according to the security status assessment model configuration information.
  • the target server is an electronic device management server, which is used to manage local electronic devices.
  • the local electronic device can receive the security status assessment sent by the target server. Model configuration information.
  • the security status assessment model configuration information is used to update and adjust the parameters and evaluation strategies in the security status assessment model. Therefore, the electronic device can evaluate the security status in the TEE based on the received security status assessment model configuration information.
  • the assessment model performs configuration updates to make the security posture assessment results generated by the security posture assessment model more accurate.
  • the local electronic device can also receive the security capability configuration information sent by the target server.
  • the security capability configuration information is used to update and adjust the security capability of the electronic device. Therefore, the electronic device can implement the security capability configuration information according to the received security capability configuration information. Update the configuration of its own security capabilities to improve the security performance of the system.
  • the target security information also includes security capability information of the electronic device.
  • the target security information not only includes TEE security status information, but also includes the security capability information of the electronic device.
  • the security capability information of the electronic device includes at least one of trusted execution environment, trusted user interaction, hardware encryption and decryption, security unit, memory encryption, protection against side channel attacks, and protection against fault injection attacks.
  • generating comprehensive security information based on the security status assessment results includes:
  • the TEE of the local electronic device After obtaining the security capability information and security status assessment results of the electronic device, in order to avoid the delay caused by the need for the server to sign the security assessment results every time the security assessment is performed in related technologies, the TEE of the local electronic device is adopted.
  • the private key of the electronic device digitally signs the security capability information and security status assessment results, thereby improving security performance while reducing latency and improving system performance.
  • the server has a public key paired with the electronic device's private key, which can be used to verify the comprehensive security information returned by the electronic device to determine its authenticity and completeness. sex.
  • REE security status information and TEE security status information may include at least one of the following: application access control information, file system access control information, data encryption information, data integrity protection information, security lock screen and authentication Information, integrity verification information of device configuration files, whether there is malware or virus infection in the system, whether the hardware and firmware configurations have been tampered with, whether the system software version meets the requirements, whether the system is Rooted, whether the memory is under attack, the kernel and kernel configuration Whether it has been tampered with and whether the network connection is secure.
  • the above information can be detected by the security detection modules on the REE side and TEE side.
  • the needs of some applications for high security performance can be met, the security situation of electronic equipment can be more comprehensively assessed, and a fine-grained security performance assessment of electronic equipment can be provided, providing various The security risk assessment of each application business provides a more accurate basis for security assessment.
  • the REE security status information and target security information can be used to implement a comprehensive assessment of the security status of the electronic device, making the safety Assessment results are more accurate, and system security is enhanced due to the generation of comprehensive security information in the TEE environment.
  • FIG 2 is a schematic structural diagram of a safety assessment device provided by an embodiment of the present application.
  • another embodiment of the present application also provides a security assessment device, which is applied to electronic devices that support Trusted Execution Environment TEE and Rich Execution Environment REE.
  • the device 200 includes:
  • the first processing module 201 is configured to obtain the REE security status information and query the security information when the REE side receives a security information query request sent by the server for querying the security status of the electronic device.
  • the request and the REE security status information are sent to the TEE side;
  • the second processing module 202 is configured to obtain target security information on the TEE side, and generate comprehensive security information based on the REE security status information and the target security information, where the target security information includes TEE security status information;
  • the sending module 203 is used to send the comprehensive security information to the querying party.
  • the device 200 further includes:
  • a first verification module configured to verify whether the client application has query permission on the TEE side according to the identifier of the client application
  • the second processing module 202 includes:
  • the first acquisition unit is used to acquire the target security information if the client application has query permission.
  • the device 200 further includes:
  • the second verification module is used to verify on the TEE side whether the client application has query permission according to the identity of the client application, and to verify on the TEE side whether the authorization token is valid. ;
  • the second processing module 202 includes:
  • the second acquisition unit is configured to acquire the target security information if the client application has query permission and the authorization token is valid.
  • the second processing module 202 includes:
  • a first generation unit configured to generate a safety status evaluation result of the electronic device based on the REE safety status information and the TEE safety status information;
  • the second generation unit is configured to generate comprehensive security information based on the security status assessment results.
  • the target security information also includes security capability information of the electronic device
  • the second generation unit includes:
  • a signature subunit configured to digitally sign the security capability information and the security status assessment result using the private key of the electronic device
  • Generating subunit configured to generate comprehensive security information based on the security capability information, the security status assessment result and the signature.
  • the TEE side stores a security status assessment model
  • the first generation unit includes:
  • Evaluation subunit used to use the safety status evaluation model to evaluate the REE safety status information Perform a security status assessment with the TEE security status information to generate a security status assessment result of the electronic device.
  • the device 200 also includes:
  • the first update module is configured to perform configuration updates on the security capabilities of the electronic device based on the security capability configuration information when receiving the security capability configuration information sent by the target server;
  • the second update module is configured to update the configuration of the security status assessment model of the electronic device according to the security status assessment model configuration information when receiving the security status assessment model configuration information sent by the target server.
  • the security capability information includes at least one of the following: trusted execution environment information, trusted user interaction information, hardware encryption and decryption information, secure unit information, memory encryption information, side channel attack prevention information, and fault injection attack prevention. information.
  • the REE security status information and the TEE security status information include at least one of the following: application access control information, file system access control information, data encryption information, data integrity protection information, security lock screen and authentication Information, integrity verification information of device configuration files, whether there is malware or virus infection in the system, whether the hardware and firmware configurations have been tampered with, whether the system software version meets the requirements, whether the system is Rooted, whether the memory is under attack, the kernel and kernel configuration Whether it has been tampered with and whether the network connection is secure.
  • the REE security status information and target security information can be used to implement a comprehensive assessment of the security status of the electronic device, so that the security assessment results More accurate, and, enhanced system security due to the generation of comprehensive security information in the TEE environment.
  • the safety assessment device in the embodiment of the present application may be an electronic device or a component in the electronic device, such as an integrated circuit or chip.
  • the electronic device may be a terminal or other devices other than the terminal.
  • the electronic device may be a mobile phone, a tablet computer, a notebook computer, a handheld computer, a vehicle-mounted electronic device, a mobile Internet device (MID), or augmented reality (AR)/virtual reality (VR).
  • MID mobile Internet device
  • AR augmented reality
  • VR virtual reality
  • ) equipment, robots, Wearable devices, ultra-mobile personal computers (UMPC), netbooks or personal digital assistants (PDA), etc. can also be network attached storage (NAS), personal computers (personal computers), etc.
  • a computer (PC), a television (TV), a teller machine or a self-service machine, etc. are not specifically limited in the embodiments of this application.
  • the security assessment device in the embodiment of the present application may be a device with an operating system.
  • the operating system can be an Android operating system, an iOS operating system, or other possible operating systems, which are not specifically limited in the embodiments of this application.
  • the security assessment device provided by the embodiment of the present application can implement each process implemented by the method embodiment in Figure 1. To avoid duplication, the details will not be described here.
  • FIG 3 is a schematic flow chart of another security assessment method provided by an embodiment of the present application.
  • another embodiment of the present application also provides a security assessment method, which is applied to the server.
  • the method includes:
  • Step 301 Send a security information query request to the electronic device for querying the security status of the electronic device;
  • Step 302 Receive comprehensive security information sent by the electronic device.
  • the comprehensive security information is obtained based on the REE security status information and TEE security status information of the electronic device when the electronic device responds to the security information query request.
  • the comprehensive security information includes a signature generated by the electronic device using a private key;
  • Step 303 Use the public key paired with the private key to verify the signature in the comprehensive security information
  • Step 304 If the verification passes, provide the target business service to the electronic device.
  • the comprehensive security information generated is digitally signed using the private key of the electronic device, so that the application server can use the public key paired with the private key to verify the feedback.
  • the authenticity and completeness of the comprehensive security information enhances system security. Only after the verification is passed, the electronic device is authorized to provide the target business service, thereby improving the security of the related business.
  • the execution subject may be a security assessment device.
  • the security assessment method executed by the security assessment device is used as an example to illustrate the security assessment device provided by the embodiments of this application.
  • FIG. 4 is a schematic structural diagram of another safety assessment device provided by an embodiment of the present application.
  • another embodiment of the present application provides a security assessment device, which is applied to a server.
  • the device 400 includes:
  • Query module 401 configured to send a security information query request to the electronic device for querying the security status of the electronic device
  • the first receiving module 402 is configured to receive comprehensive security information sent by the electronic device.
  • the comprehensive security information is based on the REE security status information and TEE of the electronic device when responding to the security information query request. Obtained from security status information, the comprehensive security information includes a signature generated by the electronic device using a private key;
  • Verification module 403 configured to verify the signature in the comprehensive security information using the public key paired with the private key
  • the service module 404 is used to provide target business services to the electronic device if the verification is passed.
  • the comprehensive security information generated is digitally signed using the private key of the electronic device, so that the application server can use the public key paired with the private key to verify the feedback.
  • the authenticity and completeness of the comprehensive security information enhances system security.
  • the security assessment device in the embodiment of the present application may be a server, etc., which is not specifically limited in the embodiment of the present application.
  • the security assessment device in the embodiment of the present application may be a device with an operating system.
  • the operating system can be an Android operating system, an iOS operating system, or other possible operating systems, which are not specifically limited in the embodiments of this application.
  • the security assessment device provided by the embodiment of the present application can implement each process implemented by the method embodiment in Figure 3. To avoid repetition, details will not be described here.
  • FIG. 5 is a schematic structural diagram of an electronic device supporting TEE and REE provided by an embodiment of the present application.
  • the querying party may be a mobile banking server, a mobile payment server, an enterprise application server, or other high-security application servers.
  • the electronic device supports the Trusted Execution Environment TEE and the Rich Execution Environment REE.
  • the REE runs the Rich Execution Environment operating system REE OS
  • the TEE runs the Trusted Execution Environment operating system TEE OS.
  • the request contains the identification of the "Security Capability and Security Status Client APP" and the authorization of the application server. token;
  • the request comes from a user's inquiry about this electronic device, the request only contains the identification of "Security Capability and Security Status Client APP";
  • Security status information on the REE side (such as whether there is malware, whether the system is infected with viruses, whether the network connection is safe, etc.) through the "REE security detection module” and "REE API";
  • security capabilities mainly include: trusted execution environment, trusted user interaction, hardware encryption and decryption, security unit, memory encryption, prevention of side channel attacks, prevention of fault injection attacks, etc.;
  • the evaluation result of the current security status is a score (such as 0-10, 0 indicates the lowest security, and 10 indicates the highest security).
  • the factors used in the current security status evaluation in addition to the security features of the Android operating system (such as application access control, File system access control, data encryption, data integrity protection, In addition to security lock screen and authentication, integrity verification of device configuration files, etc.), it also mainly includes: whether there is malware or virus infection in the system, whether the configuration of hardware and firmware has been tampered with, whether the system software version meets the requirements, whether the system is Rooted , whether the memory has been attacked, whether the kernel and kernel configuration have been tampered with, whether the network link is secure enough, etc.;
  • the request contains the identification of the "Security Capability and Security Status Client APP", the authorization token of the application server, and the REE Security status information;
  • a call request is initiated to the "Security Capability and Security Status Trusted App" on the TEE side.
  • the request contains the identification of the "Security Capability and Security Status Client APP" and the authorization of the application server. brand and REE safety status information;
  • the request contains the identification of the "Security Capability and Security Status Client APP" and the authorization token of the application server. and REE security status information; check whether the access request is valid according to the corresponding security policy:
  • Verify the validity of the authorization token of the application server (for example, whether the token comes from the management of this electronic device) management server, whether the token has expired, etc.), and check whether the server has the permission to call "Security Capability and Security Status Trusted APP";
  • Security status information on the TEE side through the "TEE security detection module” and "Trusted Internal API” (such as whether there is malware, whether the system is infected with viruses, whether the kernel configuration is tampered with, whether there are execution operations in the data area in the stack, etc.);
  • the safety status assessment based on the received REE safety status information and TEE safety status information, and based on the safety status evaluation model or method, the safety status of the electronic equipment is evaluated in real time to obtain an evaluation result of the current safety status;
  • the security capability information of the electronic device is returned to the "Security Capability and Security Status Client API" on the REE side of the electronic device;
  • FIG. 6 is a schematic flow chart of yet another security assessment method provided by an embodiment of the present application. As shown in Figure 6, in the security assessment method in the embodiment of this application:
  • the query phase includes the following steps:
  • the "Electronic Device Security Capability and Security Status Query Module" of the application server initiates a request for security capability query and current security status assessment (including authorization token) to the "Security Capability and Security Status Client APP" on the REE side of the electronic device.
  • the transmission security mechanism of the request message can use TLS;
  • the "Security Capability and Security Status Client API" on the REE side of the electronic device sends the received security capability query and security status assessment request (including authorization token, REE security status information) to the TEE through the REE communication agent and the TEE communication agent.
  • Side “Security capabilities and security status Trusted APP";
  • the "Security Capability and Security Status Trusted APP" on the TEE side verifies the validity of the authorization token, and checks whether the application server has the authority to obtain the security capability and security status of the electronic device; if the verification of the authorization token fails, the relevant operations are terminated. Return an error message and prompt the application server to reapply for an authorization token;
  • the "Security Capability and Security Status Trusted APP" on the TEE side collects TEE security status information through the "TEE Security Detection Module” and "Trusted Internal API”;
  • the "Security Capability and Security Status Trusted APP" on the TEE side determines the security capability information of the electronic device and evaluates the current security status;
  • the "Security Capability and Security Status Trusted APP" on the TEE side uses the private key of the electronic device to digitally sign the security capability information and security status assessment results;
  • the "Security Capability and Security Status Trusted APP" on the TEE side returns the security capability information and security status evaluation results and signatures to the "Security Capability and Security Status Client API" on the REE side through the TEE communication agent and REE communication agent;
  • the "Security Capability and Security Status Client APP" on the REE side returns the received security capability information, security status assessment results and signature to the application server "Electronic Equipment Security Capability and Security Status Query Module".
  • the transmission security mechanism of the returned message TLS can be used;
  • the application server "electronic device security capability and security status query module” uses the public key of the electronic device to verify the signature of the security capability information and security status assessment results to determine its authenticity sex and integrity.
  • the REE security status information and target security information can be used to implement a comprehensive assessment of the security status of the electronic device, so that the security assessment results More accurate, and, enhanced system security due to the generation of comprehensive security information in the TEE environment.
  • this embodiment of the present application also provides an electronic device 700, including a processor 701 and a memory 702.
  • the memory 702 stores programs or instructions that can be run on the processor 701.
  • each step of the above security assessment method embodiment is implemented, and the same technical effect can be achieved. To avoid duplication, the details will not be described here.
  • FIG. 8 is a schematic diagram of the hardware structure of an electronic device implementing an embodiment of the present application.
  • the electronic device 800 includes but is not limited to: radio frequency unit 801, network module 802, audio output unit 803, input unit 804, sensor 805, display unit 806, user input unit 807, interface unit 808, memory 809, processor 8010, etc. part.
  • the electronic device 800 may also include a power supply (such as a battery) that supplies power to various components.
  • the power supply may be logically connected to the processor 8010 through a power management system, thereby managing charging, discharging, and function through the power management system. Consumption management and other functions.
  • the structure of the electronic device shown in Figure 8 does not constitute a limitation on the electronic device.
  • the electronic device may include more or less components than shown in the figure, or combine certain components, or arrange different components, which will not be described again here. .
  • the processor 8010 is configured to obtain the REE security status information when the REE side receives a security information query request sent by the server for querying the security status of the electronic device, and query the security information The request and the REE security status information are sent to the TEE side;
  • target security information on the TEE side and generate comprehensive security information based on the REE security status information and the target security information, where the target security information includes TEE security status information;
  • REE security status information by collecting REE security status information on the REE side and on the TEE
  • target security information By collecting target security information on the side, REE security status information and target security information can be used to comprehensively assess the security status of electronic equipment, making the security assessment results more accurate.
  • comprehensive security information is generated in the TEE environment, system security is enhanced. sex.
  • the method further includes:
  • the obtaining target security information includes:
  • the target security information is obtained.
  • the method further includes:
  • the obtaining target security information includes:
  • the target security information is obtained.
  • generating comprehensive security information based on the REE security status information and the target security information includes:
  • the target security information also includes security capability information of the electronic device, and generating comprehensive security information based on the security status assessment results includes:
  • the processor 8010 is also configured to, upon receiving the security capability configuration information sent by the target server, perform a configuration update on the security capability of the electronic device according to the security capability configuration information;
  • the security status assessment model of the electronic device is configured and updated according to the security status assessment model configuration information.
  • the security capability information includes at least one of the following: trusted execution environment information, trusted user interaction information, hardware encryption and decryption information, secure unit information, memory encryption information, side channel attack prevention information, and fault injection attack prevention. information.
  • the REE security status information and the TEE security status information include at least one of the following: application access control information, file system access control information, data encryption information, data integrity protection information, security lock screen and authentication Information, integrity verification information of device configuration files, whether there is malware or virus infection in the system, whether the hardware and firmware configurations have been tampered with, whether the system software version meets the requirements, whether the system is Rooted, whether the memory is under attack, the kernel and kernel configuration Whether it has been tampered with and whether the network connection is secure.
  • the input unit 804 may include a graphics processor (Graphics Processing Unit, GPU) 8041 and a microphone 8042.
  • the graphics processor 8041 is responsible for the image capture device (GPU) in the video capture mode or the image capture mode. Process the image data of still pictures or videos obtained by cameras (such as cameras).
  • the display unit 806 may include a display panel 8061, which may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like.
  • the user input unit 807 includes a touch panel 8071 and at least one of other input devices 8072 .
  • Touch panel 8071 also known as touch screen.
  • the touch panel 8071 may include two parts: a touch detection device and a touch controller.
  • Other input devices 8072 may include but are not limited to physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, and joysticks, which will not be described again here.
  • the memory 809 can be used to store software programs and various data.
  • the memory 809 can mainly include a first storage area for storing programs or instructions and a second storage area for storing data.
  • the first storage area can store an operating system and at least one function. required applications or commands (such as sound playback function, Image playback function, etc.) etc.
  • memory 809 may include volatile memory or non-volatile memory, or memory 809 may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electrically removable memory.
  • Volatile memory can be random access memory (Random Access Memory, RAM), static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random access memory (Synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (Double Data Rate SDRAM, DDRSDRAM), enhanced synchronous dynamic random access memory (Enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (Synch link DRAM) , SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DRRAM).
  • RAM Random Access Memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • synchronous dynamic random access memory Synchronous DRAM, SDRAM
  • Double data rate synchronous dynamic random access memory Double Data Rate SDRAM, DDRSDRAM
  • Enhanced SDRAM, ESDRAM synchronous link dynamic random access memory
  • Synch link DRAM synchronous link dynamic random access memory
  • SLDRAM direct memory bus random access memory
  • the processor 8010 may include one or more processing units; optionally, the processor 8010 integrates an application processor and a modem processor, where the application processor mainly handles operations involving the operating system, user interface, application programs, etc., Modem processors mainly process wireless communication signals, such as baseband processors. It can be understood that the above modem processor may not be integrated into the processor 8010.
  • Embodiments of the present application also provide a readable storage medium, with programs or instructions stored on the readable storage medium.
  • the program or instructions are executed by a processor, each process of the above security assessment method embodiment is implemented, and the same can be achieved. The technical effects will not be repeated here to avoid repetition.
  • the processor is the processor in the electronic device described in the above embodiment.
  • the readable storage media includes computer-readable storage media, such as computer read-only memory, random access memory, magnetic disks or optical disks.
  • An embodiment of the present application further provides a chip.
  • the chip includes a processor and a communication interface.
  • the communication interface is coupled to the processor.
  • the processor is used to run programs or instructions to implement the above security assessment method embodiment. Each process can achieve the same technical effect. In order to avoid duplication, I won’t go into details here.
  • chips mentioned in the embodiments of this application may also be called system-on-chip, system-on-a-chip, system-on-a-chip or system-on-chip, etc.
  • Embodiments of the present application provide a computer program product.
  • the program product is stored in a storage medium.
  • the program product is executed by at least one processor to implement each process of the above security assessment method embodiment, and can achieve the same technical effect. , to avoid repetition, will not be repeated here.
  • the disclosed devices and methods can be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components may be combined or can be integrated into another system, or some features can be ignored, or not implemented.
  • the coupling or direct coupling or communication connection between each other shown or discussed may be through some interfaces, and the indirect coupling or communication connection of the devices or units may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or they may be distributed to multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in various embodiments of the present disclosure can be integrated into one processing unit, or each unit can exist physically alone, or two or more units can be integrated into a single processing unit. Yuanzhong.
  • the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the technical solution of the present disclosure is essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product.
  • the computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which can be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in various embodiments of the present disclosure.
  • the aforementioned storage media include: U disk, mobile hard disk, ROM, RAM, magnetic disk or optical disk and other media that can store program codes.
  • the program can be stored in a computer-readable storage medium.
  • the program can be stored in a computer-readable storage medium.
  • the process may include the processes of the embodiments of each of the above methods.
  • the storage medium can be a magnetic disk, an optical disk, a read-only memory (Read-Only Memory, ROM) or a random access memory (Random Access Memory, RAM), etc.
  • the methods of the above embodiments can be implemented by means of software plus the necessary general hardware platform. Of course, they can also be implemented by over hardware, but in many cases the former is the better implementation.
  • the technical solution of the present application can be embodied in the form of a computer software product that is essentially or contributes to the existing technology.
  • the computer software product is stored in a storage medium (such as ROM/RAM, disk , optical disk), including several instructions to cause a terminal (which can be a mobile phone, computer, server, or network device, etc.) to execute the methods described in various embodiments of this application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

本申请公开了一种安全评估方法及装置、电子设备和可读存储介质,属于通信技术领域。所述安全评估方法应用于支持可信执行环境TEE和富执行环境REE的电子设备,所述方法包括:在所述REE侧接收到服务器发送的用于查询所述电子设备的安全状态的安全信息查询请求的情况下,采集REE安全状态信息,并将所述安全信息查询请求和所述REE安全状态信息发送至所述TEE侧;在所述TEE侧采集目标安全信息,根据所述REE安全状态信息和所述目标安全信息生成综合安全信息,其中,所述目标安全信息包括TEE安全状态信息;将所述综合安全信息发送至所述服务器。

Description

一种安全评估方法及装置、电子设备和可读存储介质
相关申请的交叉引用
本申请主张在2022年03月18日在中国提交的中国专利申请No.202210273432.4的优先权,其全部内容通过引用包含于此。
技术领域
本申请属于通信技术领域,具体涉及一种安全评估方法及装置、电子设备和可读存储介质。
背景技术
移动应用服务提供商在为用户提供服务时,会进行相应的业务的安全风险评估,需要考虑电子设备是否安全、用户行为是否异常、发起移动支付的应用是否可信等。然而,目前的安全风险评估方案得到的安全风险评估结果不够准确,难以满足用户对高业务安全的需求。
发明内容
本申请实施例的目的是提供一种安全评估方法及装置、电子设备和可读存储介质,能够解决相关技术中安全风险评估方案得到的安全风险评估结果不够准确,难以满足用户对高业务安全的需求的问题。
第一方面,本申请实施例提供了一种安全评估方法,应用于支持TEE(Trusted Execution Environment,可信执行环境)和REE(Rich Execution Environment,富执行环境)的电子设备,该方法包括:
在所述REE侧接收到服务器发送的用于查询所述电子设备的安全状态的安全信息查询请求的情况下,获取REE安全状态信息,并将所述安全信息查询请求和所述REE安全状态信息发送至所述TEE侧;
在所述TEE侧获取目标安全信息,根据所述REE安全状态信息和所述目标安全信息生成综合安全信息,其中,所述目标安全信息包括TEE安全状 态信息;
将所述综合安全信息发送至所述服务器。
第二方面,本申请实施例提供了一种安全评估方法,应用于服务器,该方法包括:
向电子设备发送用于查询所述电子设备的安全状态的安全信息查询请求;
接收所述电子设备发送的综合安全信息,所述综合安全信息是所述电子设备在响应所述安全信息查询请求时根据所述电子设备的REE安全状态信息和TEE安全状态信息得到的,所述综合安全信息包括所述电子设备采用私钥生成的签名;
采用与所述私钥配对的公钥对所述综合安全信息中的签名进行验证;
在验证通过的情况下,向所述电子设备提供的目标业务服务。
第三方面,本申请实施例提供了一种安全评估装置,应用于支持可信执行环境TEE和富执行环境REE的电子设备,该装置包括:
第一处理模块,用于在所述REE侧接收到服务器发送的用于查询所述电子设备的安全状态的安全信息查询请求的情况下,获取REE安全状态信息,并将所述安全信息查询请求和所述REE安全状态信息发送至所述TEE侧;
第二处理模块,用于在所述TEE侧获取目标安全信息,根据所述REE安全状态信息和所述目标安全信息生成综合安全信息,其中,所述目标安全信息包括TEE安全状态信息;
发送模块,用于将所述综合安全信息发送至所述服务器。
第四方面,本申请实施例提供了一种安全评估装置,应用于应用服务器,该装置包括:
查询模块,用于向电子设备发送用于查询所述电子设备的安全状态的安全信息查询请求;
第一接收模块,用于接收所述电子设备发送的综合安全信息,所述综合安全信息是所述电子设备在响应所述安全信息查询请求时根据所述电子设备的REE安全状态信息和TEE安全状态信息得到的,所述综合安全信息包括 所述电子设备采用私钥生成的签名;
验证模块,用于采用与所述私钥配对的公钥对所述综合安全信息中的签名进行验证;
服务模块,用于在验证通过的情况下,向所述电子设备提供的目标业务服务。
第五方面,本申请实施例提供了一种电子设备,该电子设备包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第一方面所述的方法的步骤,或者,所述程序或指令被所述处理器执行时实现如第二方面所述的方法的步骤。
第六方面,本申请实施例提供了一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如第一方面所述的方法的步骤,或者,所述程序或指令被所述处理器执行时实现如第二方面所述的方法的步骤。
第七方面,本申请实施例提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如第一方面所述的方法,或者实现如第二方面所述的方法。
第八方面,本申请实施例提供一种计算机程序产品,该程序产品被存储在存储介质中,该程序产品被至少一个处理器执行以实现如第一方面所述的方法,或者,该程序产品被至少一个处理器执行以实现如第二方面所述的方法。
在本申请实施例中,通过在REE侧采集REE安全状态信息以及在TEE侧采集目标安全信息,可以利用REE安全状态信息和目标安全信息实现对电子设备的安全状态进行全面评估,使得安全评估结果更加准确,并且,由于在TEE环境中生成综合安全信息,增强了系统安全性。
附图说明
图1为本申请实施例提供的一种安全评估方法的流程示意图;
图2为本申请实施例提供的一种安全评估装置的结构示意图;
图3为本申请实施例提供的另一种安全评估方法的流程示意图;
图4为本申请实施例提供的另一种安全评估装置的结构示意图;
图5为本申请实施例提供的支持TEE和REE的电子设备的结构示意图;
图6为本申请实施例提供的再一种安全评估方法的流程示意图;
图7说明书为本申请实施例提供的一种电子设备的结构示意图
图8为实现本申请实施例的一种电子设备的硬件结构示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员获得的所有其他实施例,都属于本申请保护的范围。
本申请的说明书和权利要求书中的术语“第一”、“第二”等是用于区别类似的对象,而不用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施,且“第一”、“第二”等所区分的对象通常为一类,并不限定对象的个数,例如第一对象可以是一个,也可以是多个。此外,说明书以及权利要求中“和/或”表示所连接对象的至少其中之一,字符“/”,一般表示前后关联对象是一种“或”的关系。
下面结合附图,通过具体的实施例及其应用场景对本申请实施例提供的安全评估方法及装置、电子设备和可读存储介质进行详细地说明。
请参考图1,图1为本申请实施例提供的一种安全评估方法的流程示意图。如图1所示,本申请一方面实施例提供了一种安全评估方法,可以应用于支持可信执行环境TEE和富执行环境REE的电子设备,该方法包括以下步骤:
步骤101:在所述REE侧接收到服务器发送的用于查询所述电子设备的 安全状态的安全信息查询请求的情况下,获取REE安全状态信息,并将所述安全信息查询请求和所述REE安全状态信息发送至所述TEE侧。
本申请实施例中,可选地,REE(Rich Execution Environment,富执行环境)中运行有富执行环境操作系统,而TEE(Trusted Execution Environment,可信执行环境)中运行有可信执行环境操作系统。
本实施例中,可选地,所述服务器可以为应用服务器。在查询方为应用服务器时,应用服务器与本端电子设备之间的传输安全机制可以采用TLS(Transport Layer Security,安全传输层协议),以提高传输安全性。所述应用服务器可以为提供支付服务等高安全要求的应用服务器。
其中,在REE侧接收到服务器发送的安全信息查询请求的情况下,可以进行REE安全检测以采集REE安全状态信息,REE安全状态信息可以包括是否存在恶意软件、系统是否感染病毒、网络连接是否安全等。
在一些实施例中,可选地,可以通过REE中的REE安全检测模块和REE API(Application Programming Interface,应用程序接口)来收集REE安全状态信息。
本实施例中,可选地,REE与TEE之间具有协定的通信代理,建立有通信/数据传输通道,因此,REE侧可以通过该传输通道向TEE侧发送安全信息查询请求以及REE安全状态信息。
本申请的一些实施例中,可选地,除了服务器外,也可以由用户发起用于查询所述电子设备的安全状态的安全信息查询请求,以满足用户自身查询电子设备安全状态的需求。
步骤102:在所述TEE侧获取目标安全信息,根据所述REE安全状态信息和所述目标安全信息生成综合安全信息,其中,所述目标安全信息包括TEE安全状态信息;
在接收到REE侧发送的安全信息查询请求之后,可响应于该安全信息查询请求,采集目标安全信息,其中,目标安全信息可以包括TEE安全状态信息,TEE安全状态信息可以包括是否存在恶意软件、系统是否感染病毒、内 核的配置是否篡改、堆栈中的数据区域是否存在执行操作等。
在一些实施例中,可选地,可以通过TEE中的TEE安全检测模块和Trusted Internal API(Application Programming Interface,应用程序接口)来收集目标安全信息。
步骤103:将所述综合安全信息发送至所述服务器。
本步骤中,在TEE侧得到综合安全信息之后,TEE侧可以将该综合安全信息返回给REE侧,由REE侧将该综合安全信息发送给服务器。
在一些实施例中,可选地,在查询方为用户时,可以将综合安全信息发送至用户发起安全信息查询请求的应用程序界面进行显示,以向用户呈现查询结果。在查询方为应用服务器时,可以将该综合安全信息发送给相应应用服务器,并且,传输安全机制可以采用TLS协议。
由此,在本申请实施例中,通过在REE侧采集REE安全状态信息以及在TEE侧采集目标安全信息,可以利用REE安全状态信息和目标安全信息实现对电子设备的安全状态进行全面评估,使得安全评估结果更加准确,并且,由于在TEE环境中生成综合安全信息,增强了系统安全性。
本申请的一些实施例中,在所述安全信息查询请求包含客户端应用程序的标识的情况下,所述获取目标安全信息之前,还包括:
在所述TEE侧根据所述客户端应用程序的标识校验所述客户端应用程序是否具有查询权限;
所述获取目标安全信息包括:
若所述客户端应用程序具有查询权限,则获取目标安全信息。
本实施例中,可选地,若查询方为用户,则安全信息查询请求中只包含客户端应用程序的标识,即用户通过该客户端应用程序发起安全信息查询请求,则在TEE侧接收到安全信息查询请求之后,采集目标安全信息之前,需要在TEE侧对客户端应用程序的标识进行校验,以校验该客户端应用程序是否具有查询权限;在校验结果为客户端应用程序具有查询权限的情况下,才采集目标安全信息,若校验结果为客户端应用程序不具有查询权限,则终止 相关操作,返回错误信息。由此,可以提高系统安全性能。
本申请的另一些实施例中,在所述安全信息查询请求包含客户端应用程序的标识以及授权令牌的情况下,所述获取目标安全信息之前,还包括:
在所述TEE侧根据所述客户端应用程序的标识校验所述客户端应用程序是否具有查询权限,以及在所述TEE侧校验所述授权令牌是否有效;
所述获取目标安全信息包括:
若所述客户端应用程序具有查询权限且所述授权令牌有效,则获取目标安全信息。
本实施例中,可选地,若查询方为应用服务器,则安全信息查询请求中包含客户端应用程序的标识和应用服务器的授权令牌,即应用服务器通过该客户端应用程序发起安全信息查询请求,则在TEE侧接收到安全信息查询请求之后,采集目标安全信息之前,需要在TEE侧对客户端应用程序的标识以及应用服务器的授权令牌进行校验,以校验该客户端应用程序是否具有查询权限,以及应用服务器是否具有查询权限、授权令牌的授权时限是否已过;在校验结果为客户端应用程序具有查询权限且所述授权令牌有效的情况下,才采集目标安全信息,若校验结果为客户端应用程序不具有查询权限或所述授权令牌无效,则终止相关操作,返回错误信息,并提示应用服务器重新申请授权令牌。由此,可以提高系统安全性能。
本申请的一些实施例中,所述根据所述REE安全状态信息和所述目标安全信息生成综合安全信息包括:
根据所述REE安全状态信息和所述TEE安全状态信息,生成所述电子设备的安全状态评估结果;
根据所述安全状态评估结果,生成综合安全信息。
本实施例中,采集的目标安全信息中包括TEE安全状态信息,在根据REE安全状态信息和目标安全信息生成综合安全信息时,可以根据REE安全状态信息和TEE安全状态信息,生成电子设备的安全状态评估结果,由此,得到的安全状态评估结果即评估了REE的安全状态,也评估了TEE的安全 状态,从而使得安全状态评估结果可以全面反映电子设备当前的安全状态,安全状态评估结果更准确、可靠。
本申请的一些实施例中,所述TEE侧存储有安全状态评估模型,所述根据所述REE安全状态信息和所述TEE安全状态信息,生成所述电子设备的安全状态评估结果包括:
采用所述安全状态评估模型对所述REE安全状态信息和所述TEE安全状态信息进行安全状态评估,生成所述电子设备的安全状态评估结果。
本实施例中,可选地,TEE中存储有安全状态评估模型,该安全状态评估模型用于评估电子设备当前的安全状态。具体来说,可以将采集到的REE安全状态信息和TEE安全状态信息作为安全状态评估模型的输入,按照对应的安全状态评估策略进行分析处理,以生成电子设备当前的安全状态评估结果。由此,通过采用模型分析评估的方法,可以有效提高安全状态评估结果的准确度,并且,安全状态评估模型可以不断学习优化,随着评估次数的增加,安全状态评估结果也将越准确。
本申请的一些实施例中,可选地,安全状态评估结果为分值,也即安全状态评估结果以分值的形式体现。可选地,分值与电子设备的安全性呈正相关,例如,安全状态评估结果的分值范围为0-10,0表示安全性最低,而10表示安全性最高,从而为各项应用业务的安全风险评估提供更准确的安全评估依据。
本申请的一些实施例中,所述方法还包括:
在接收到目标服务器发送的安全能力配置信息的情况下,根据所述安全能力配置信息,对所述电子设备的安全能力进行配置更新;
或者,在接收到目标服务器发送的安全状态评估模型配置信息的情况下,根据所述安全状态评估模型配置信息,对所述电子设备的安全状态评估模型进行配置更新。
本实施例中,目标服务器为电子设备管理服务器,即用于对本端电子设备进行管理。例如,本端电子设备可以接收目标服务器发送的安全状态评估 模型配置信息,该安全状态评估模型配置信息用于对安全状态评估模型中的参数、评估策略进行更新调整,由此,电子设备可以根据接收到的安全状态评估模型配置信息对TEE中的安全状态评估模型进行配置更新,以更使安全状态评估模型生成的安全状态评估结果更准确。或者,本端电子设备也可以接收目标服务器发送的安全能力配置信息,该安全能力配置信息用于对电子设备的安全能力进行更新调整,由此,电子设备可以根据接收到的安全能力配置信息实现对自身安全能力的配置更新,以提高系统的安全性能。
本申请的一些实施例中,所述目标安全信息还包括所述电子设备的安全能力信息。也就是说,目标安全信息不仅包括TEE安全状态信息,还包括电子设备的安全能力信息,通过综合电子设备当前的安全状态信息以及电子设备的安全能力信息,可以更加全面地评估电子设备的安全情况,提供电子设备细颗粒度的安全性能评估,为各项应用业务的安全风险评估提供更准确的安全评估依据。在一些实施例中,可选地,电子设备的安全能力信息包括可信执行环境、可信用户交互、硬件加解密、安全单元、内存加密、防侧信道攻击、防故障注入攻击中的至少一者。
本申请的另一些实施例中,所述根据所述安全状态评估结果,生成综合安全信息包括:
采用所述电子设备的私钥对所述安全能力信息和所述安全状态评估结果进行数字签名;
根据所述安全能力信息、所述安全状态评估结果以及签名生成综合安全信息。
在得到电子设备的安全能力信息和安全状态评估结果之后,为了相关技术中每次进行安全评估时都需要服务器对安全评估结果进行签名而导致的时延,在本端电子设备的TEE中即采用电子设备的私钥对安全能力信息和安全状态评估结果进行数字签名,从而在提高安全性能的同时,降低了时延,提高了系统性能。可选地,服务器具有与电子设备的私钥配对的公钥,可以利用该公钥对电子设备返回的综合安全信息进行验证,以确定其真实性和完整 性。
本申请的一些实施例中,REE安全状态信息、TEE安全状态信息可以包括以下至少一者:应用访问控制信息、文件系统访问控制信息、数据加密信息、数据完整性保护信息、安全锁屏和认证信息、设备配置文件的完整性验证信息、系统是否存在恶意软件或感染病毒、硬件和固件的配置是否被篡改、系统软件版本是否满足要求、系统是否被Root、内存是否遭受攻击、内核及内核配置是否被篡改、网络连接是否安全。上述各项信息可以由REE侧和TEE侧的安全检测模块检测得到。通过将更多的安全状态信息纳入安全状态评估中,可以满足一些应用程序对高安全性能的需求,可以更加全面地评估电子设备的安全情况,提供电子设备细颗粒度的安全性能评估,为各项应用业务的安全风险评估提供更准确的安全评估依据。
总之,在本申请实施例中,通过在REE侧采集REE安全状态信息以及在TEE侧采集目标安全信息,可以利用REE安全状态信息和目标安全信息实现对电子设备的安全状态进行全面评估,使得安全评估结果更加准确,并且,由于在TEE环境中生成综合安全信息,增强了系统安全性。
请参考图2,图2为本申请实施例提供的一种安全评估装置的结构示意图。如图2所示,本申请另一方面实施例还提供了一种安全评估装置,应用于支持可信执行环境TEE和富执行环境REE的电子设备,所述装置200包括:
第一处理模块201,用于在所述REE侧接收到服务器发送的用于查询所述电子设备的安全状态的安全信息查询请求的情况下,获取REE安全状态信息,并将所述安全信息查询请求和所述REE安全状态信息发送至所述TEE侧;
第二处理模块202,用于在所述TEE侧获取目标安全信息,根据所述REE安全状态信息和所述目标安全信息生成综合安全信息,其中,所述目标安全信息包括TEE安全状态信息;
发送模块203,用于将所述综合安全信息发送至所述查询方。
可选地,在所述安全信息查询请求包含客户端应用程序的标识的情况下,所述装置200还包括:
第一校验模块,用于在所述TEE侧根据所述客户端应用程序的标识校验所述客户端应用程序是否具有查询权限;
所述第二处理模块202包括:
第一获取单元,用于若所述客户端应用程序具有查询权限,则获取目标安全信息。
可选地,在所述安全信息查询请求包含客户端应用程序的标识以及授权令牌的情况下,所述装置200还包括:
第二校验模块,用于在所述TEE侧根据所述客户端应用程序的标识校验所述客户端应用程序是否具有查询权限,以及在所述TEE侧校验所述授权令牌是否有效;
所述第二处理模块202包括:
第二获取单元,用于若所述客户端应用程序具有查询权限且所述授权令牌有效,则获取目标安全信息。
可选地,所述第二处理模块202包括:
第一生成单元,用于根据所述REE安全状态信息和所述TEE安全状态信息,生成所述电子设备的安全状态评估结果;
第二生成单元,用于根据所述安全状态评估结果,生成综合安全信息。
可选地,所述目标安全信息还包括所述电子设备的安全能力信息,所述第二生成单元包括:
签名子单元,用于采用所述电子设备的私钥对所述安全能力信息和所述安全状态评估结果进行数字签名;
生成子单元,用于根据所述安全能力信息、所述安全状态评估结果以及签名生成综合安全信息。
可选地,所述TEE侧存储有安全状态评估模型,所述第一生成单元包括:
评估子单元,用于采用所述安全状态评估模型对所述REE安全状态信息 和所述TEE安全状态信息进行安全状态评估,生成所述电子设备的安全状态评估结果。
可选地,所述装置200还包括:
第一更新模块,用于在接收到目标服务器发送的安全能力配置信息的情况下,根据所述安全能力配置信息,对所述电子设备的安全能力进行配置更新;
或者,第二更新模块,用于在接收到目标服务器发送的安全状态评估模型配置信息的情况下,根据所述安全状态评估模型配置信息,对所述电子设备的安全状态评估模型进行配置更新。
可选地,所述安全能力信息包括以下至少一者:可信执行环境信息、可信用户交互信息、硬件加解密信息、安全单元信息、内存加密信息、防侧信道攻击信息、防故障注入攻击信息。
可选地,所述REE安全状态信息以及所述TEE安全状态信息均包括以下至少一者:应用访问控制信息、文件系统访问控制信息、数据加密信息、数据完整性保护信息、安全锁屏和认证信息、设备配置文件的完整性验证信息、系统是否存在恶意软件或感染病毒、硬件和固件的配置是否被篡改、系统软件版本是否满足要求、系统是否被Root、内存是否遭受攻击、内核及内核配置是否被篡改、网络连接是否安全。
在本申请实施例中,通过在REE侧采集REE安全状态信息以及在TEE侧采集目标安全信息,可以利用REE安全状态信息和目标安全信息实现对电子设备的安全状态进行全面评估,使得安全评估结果更加准确,并且,由于在TEE环境中生成综合安全信息,增强了系统安全性。
本申请实施例中的安全评估装置可以是电子设备,也可以是电子设备中的部件,例如集成电路或芯片。该电子设备可以是终端,也可以为除终端之外的其他设备。示例性的,电子设备可以为手机、平板电脑、笔记本电脑、掌上电脑、车载电子设备、移动上网装置(Mobile Internet Device,MID)、增强现实(augmented reality,AR)/虚拟现实(virtual reality,VR)设备、机器人、 可穿戴设备、超级移动个人计算机(ultra-mobile personal computer,UMPC)、上网本或者个人数字助理(personal digital assistant,PDA)等,还可以为网络附属存储器(Network Attached Storage,NAS)、个人计算机(personal computer,PC)、电视机(television,TV)、柜员机或者自助机等,本申请实施例不作具体限定。
本申请实施例中的安全评估装置可以为具有操作系统的装置。该操作系统可以为安卓(Android)操作系统,可以为iOS操作系统,还可以为其他可能的操作系统,本申请实施例不作具体限定。
本申请实施例提供的安全评估装置能够实现图1的方法实施例实现的各个过程,为避免重复,这里不再赘述。
请参考图3,图3为本申请实施例提供的另一种安全评估方法的流程示意图。如图3所示,本申请另一方面实施例还提供了一种安全评估方法,应用于服务器,所述方法包括:
步骤301:向电子设备发送用于查询所述电子设备的安全状态的安全信息查询请求;
步骤302:接收所述电子设备发送的综合安全信息,所述综合安全信息是所述电子设备在响应所述安全信息查询请求时根据所述电子设备的REE安全状态信息和TEE安全状态信息得到的,所述综合安全信息包括所述电子设备采用私钥生成的签名;
步骤303:采用与所述私钥配对的公钥对所述综合安全信息中的签名进行验证;
步骤304:在验证通过的情况下,向所述电子设备提供的目标业务服务。
在本申请实施例中,由于电子设备在接收到安全信息查询请求后,生成的综合安全信息采用了电子设备的私钥进行数字签名,使得应用服务器可以采用与私钥配对的公钥来验证反馈的综合安全信息的真实性和完整性,增强了系统安全性。在验证通过后,才授权允许向电子设备提供目标业务服务,从而提高了相关业务的安全性。
本实施例中,电子设备响应于所述安全信息查询请求得到综合安全信息的过程请参照应用于电子设备的安全评估方法实施例,此处不再赘述。
本申请实施例提供的安全评估方法,执行主体可以为安全评估装置。本申请实施例中以安全评估装置执行安全评估方法为例,说明本申请实施例提供的安全评估装置。
请参考图4,图4为本申请实施例提供的另一种安全评估装置的结构示意图。如图4所示,本申请再一方面实施例提供了一种安全评估装置,应用于服务器,所述装置400包括:
查询模块401,用于向电子设备发送用于查询所述电子设备的安全状态的安全信息查询请求;
第一接收模块402,用于接收所述电子设备发送的综合安全信息,所述综合安全信息是所述电子设备在响应所述安全信息查询请求时根据所述电子设备的REE安全状态信息和TEE安全状态信息得到的,所述综合安全信息包括所述电子设备采用私钥生成的签名;
验证模块403,用于采用与所述私钥配对的公钥对所述综合安全信息中的签名进行验证;
服务模块404,用于在验证通过的情况下,向所述电子设备提供的目标业务服务。
在本申请实施例中,由于电子设备在接收到安全信息查询请求后,生成的综合安全信息采用了电子设备的私钥进行数字签名,使得应用服务器可以采用与私钥配对的公钥来验证反馈的综合安全信息的真实性和完整性,增强了系统安全性。
本申请实施例中的安全评估装置可以是服务器等,本申请实施例不作具体限定。
本申请实施例中的安全评估装置可以为具有操作系统的装置。该操作系统可以为安卓(Android)操作系统,可以为iOS操作系统,还可以为其他可能的操作系统,本申请实施例不作具体限定。
本申请实施例提供的安全评估装置能够实现图3的方法实施例实现的各个过程,为避免重复,这里不再赘述。
请参考图5,图5为本申请实施例提供的支持TEE和REE的电子设备的结构示意图。如图5所示,本申请实施例中,查询方可以为手机银行服务器、移动支付服务器、企业应用服务器或者其他高安全应用服务器等。电子设备支持可信执行环境TEE和富执行环境REE,REE中运行有富执行环境操作系统REE OS,而TEE中运行有可信执行环境操作系统TEE OS。
下面结合附图介绍电子设备各部分功能。
·REE侧
a)安全能力和安全状态Client APP:
接收来自用户或应用服务器“电子设备安全能力和安全状态查询模块”的安全能力查询和当前的安全状态评估的请求,该请求中包含“安全能力和安全状态Client APP”的标识和应用服务器的授权令牌;
如果该请求来自用户对本电子设备的查询,则该请求中只包含“安全能力和安全状态Client APP”的标识;
通过“REE安全检测模块”和“REE API”收集REE侧的安全状态信息(如是否存在恶意软件、系统是否感染病毒、网络连接是否安全等);
向“安全能力和安全状态Client API”发起安全能力查询和当前的安全状态评估的调用请求,该请求中包含“安全能力和安全状态Client APP”的标识、应用服务器的授权令牌以及REE安全状态信息;
接收来自“安全能力和安全状态Client API”相应的响应(包括安全能力信息和当前的安全状态评估结果、以及电子设备的签名等);
其中,安全能力,主要包括:可信执行环境、可信用户交互、硬件加解密、安全单元、内存加密、防侧信道攻击、防故障注入攻击等;
当前安全状态的评估结果是一个分值(如0-10,0标识安全性最低,而10表示安全性最高),当前安全状态评估的因素,除了Android操作系统的安全特征(如应用访问控制、文件系统访问控制、数据加密、数据完整性保护、 安全锁屏和认证、设备配置文件的完整性验证等)以外,主要还包括:系统是否存在恶意软件或感染病毒、硬件和固件的配置是否被篡改、系统软件版本是否满足要求、系统是否被Root、内存是否遭受攻击、内核及内核配置是否被篡改、网络链接是否足够安全等;
将接收到的安全能力信息和当前的安全状态评估结果、以及电子设备的签名等,返回给应用服务器“电子设备安全能力和安全状态查询模块”;
向用户呈现本电子设备的安全能力和当前的安全状态;
b)安全能力和安全状态Client API:
接收来自电子设备“安全能力和安全状态Client APP”的安全能力查询和当前的安全状态评估的请求,该请求中包含“安全能力和安全状态Client APP”的标识、应用服务器的授权令牌以及REE安全状态信息;
通过REE侧的通信代理和TEE侧的通信代理,向TEE侧“安全能力和安全状态Trusted App”发起调用请求,该请求中包含“安全能力和安全状态Client APP”的标识、应用服务器的授权令牌以及REE安全状态信息;
接收来自TEE侧“安全能力和安全状态Trusted App”相应的响应(包括安全能力信息和当前的安全状态评估结果、以及电子设备的签名);
将接收到的本电子设备的安全能力信息和当前的安全状态评估结果、及电子设备的签名,返回给电子设备“安全能力和安全状态Client APP”;
·TEE侧
a)安全能力和安全状态Trusted APP:
接收来自电子设备REE侧“安全能力和安全状态Client API”的安全能力查询和当前的安全状态评估的请求,该请求中包含“安全能力和安全状态Client APP”的标识、应用服务器的授权令牌以及REE安全状态信息;根据相应的安全策略,检查该访问请求是否有效:
根据本电子设备“安全能力和安全状态Client APP”的标识,检查该应用是否有调用“安全能力和安全状态Trusted APP”的权限;
验证应用服务器的授权令牌的有效性(如令牌是否来自本电子设备的管 理服务器、令牌是否过期等),并检查该服务器否有调用“安全能力和安全状态Trusted APP”的权限;
通过“TEE安全检测模块”和“Trusted Internal API”收集TEE侧的安全状态信息(如是否存在恶意软件、系统是否感染病毒、内核的配置是否篡改、堆栈中的数据区域是否存在执行操作等);
通过模块“安全状态评估”根据接收到的REE安全状态信息和TEE安全状态信息,基于安全状态评估模型或方法,对本电子设备的安全状态进行实时评估,获得一个当前安全状态的评估结果;
通过模块“安全能力管理”根据安全能力查询请求,确定需要返回的安全能力信息;
使用本电子设备的私钥对安全能力信息和当前的安全状态评估结果进行数字签名;
通过REE侧的通信代理和TEE侧的通信代理,向电子设备REE侧“安全能力和安全状态Client API”返回本电子设备的安全能力信息和当前的安全状态评估结果、以及电子设备的签名;
接收来自电子设备管理服务器的“安全能力配置”对“安全能力管理”的配置和更新;
接收来自电子设备管理服务器的“安全状态评估模型管理”对“安全状态评估”的配置和更新。
其中,在电子设备管理服务器中:
·终端安全能力和安全状态管理模块
a)授权管理
接收来自应用服务器中“电子设备安全能力和安全状态查询模块”的电子设备安全能力查询和安全状态评估的授权请求;
认证应用服务器或应用服务器的“电子设备安全能力和安全状态查询模块”;
为该应用服务器的“电子设备安全能力和安全状态查询模块”生成一个 授权令牌;
将该授权令牌返回给应用服务器的“电子设备安全能力和安全状态查询模块”;
b)安全能力配置
对电子设备“安全能力管理”中的安全能力进行配置和更新;
c)安全状态评估模型管理
对电子设备“安全状态评估”中的安全状态评估模型和安全评估策略进行配置和更新;
对安全状态评估模型进行增强。
其中,在应用服务器(手机银行、移动支付、企业应用等)的业务安全风险评估中:
·电子设备安全能力和安全状态查询模块
a)向电子设备“安全能力和安全状态API”发起安全能力查询和当前的安全状态评估的调用;
b)接收来自电子设备“安全能力和安全状态API”相应的响应(即电子设备的安全能力信息和安全状态评估结果、及电子设备的签名),并根据应用服务器的公钥验证该响应的真实性和完整性。
请参考图6,图6为本申请实施例提供的再一种安全评估方法的流程示意图。如图6所示,本申请实施例中的安全评估方法中:
查询阶段包括以下步骤:
1)应用服务器的“电子设备安全能力和安全状态查询模块”向电子设备REE侧“安全能力和安全状态Client APP”发起安全能力查询和当前的安全状态评估的请求(包含授权令牌),该请求消息的传输安全机制可采用TLS;
2)电子设备REE侧“安全能力和安全状态Client APP”通过“REE安全检测模块”和“REE API”收集REE安全状态信息;
3)电子设备REE侧“安全能力和安全状态Client APP”向电子设备REE侧“安全能力和安全状态Client API”发送安全能力查询和安全状态评估请求 (包含授权令牌、REE安全状态信息);
4)电子设备REE侧“安全能力和安全状态Client API”将接收到的安全能力查询和安全状态评估请求(包含授权令牌、REE安全状态信息),通过REE通信代理和TEE通信代理发送给TEE侧“安全能力和安全状态Trusted APP”;
5)TEE侧“安全能力和安全状态Trusted APP”验证授权令牌的有效性,并检查应用服务器是否有权限获得电子设备的安全能力和安全状态;如果验证授权令牌失败,则终止相关操作,返回错误信息,并提示应用服务器重新申请授权令牌;
6)TEE侧“安全能力和安全状态Trusted APP”通过“TEE安全检测模块”和“Trusted Internal API”采集TEE安全状态信息;
7)TEE侧“安全能力和安全状态Trusted APP”确定电子设备的安全能力信息和评估当前的安全状态;
7.1)通过“安全能力管理”模块确定本电子设备的安全能力信息;
7.2)通过“安全状态评估”模块,结合REE安全状态信息和TEE安全状态信息,评估本电子设备当前的安全状态;
8)TEE侧“安全能力和安全状态Trusted APP”使用电子设备的私钥,对安全能力信息和安全状态评估结果进行数字签名;
9)TEE侧“安全能力和安全状态Trusted APP”将安全能力信息和安全状态评估结果及签名,通过TEE通信代理和REE通信代理返回给REE侧“安全能力和安全状态Client API”;
10)REE侧“安全能力和安全状态Client API”将接收到的安全能力信息和安全状态评估结果及签名返回给REE侧“安全能力和安全状态Client APP”;
11)REE侧“安全能力和安全状态Client APP”将接收到的安全能力信息和安全状态评估结果及签名返回给应用服务器“电子设备安全能力和安全状态查询模块”,该返回消息的传输安全机制可采用TLS;
12)应用服务器“电子设备安全能力和安全状态查询模块”使用电子设备的公钥,对安全能力信息和安全状态评估结果的签名进行验证,确定其真实 性和完整性。
在本申请实施例中,通过在REE侧采集REE安全状态信息以及在TEE侧采集目标安全信息,可以利用REE安全状态信息和目标安全信息实现对电子设备的安全状态进行全面评估,使得安全评估结果更加准确,并且,由于在TEE环境中生成综合安全信息,增强了系统安全性。
可选地,如图7所示,本申请实施例还提供一种电子设备700,包括处理器701和存储器702,存储器702上存储有可在所述处理器701上运行的程序或指令,该程序或指令被处理器701执行时实现上述安全评估方法实施例的各个步骤,且能达到相同的技术效果,为避免重复,这里不再赘述。
图8为实现本申请实施例的一种电子设备的硬件结构示意图。
该电子设备800包括但不限于:射频单元801、网络模块802、音频输出单元803、输入单元804、传感器805、显示单元806、用户输入单元807、接口单元808、存储器809、以及处理器8010等部件。
本领域技术人员可以理解,电子设备800还可以包括给各个部件供电的电源(比如电池),电源可以通过电源管理系统与处理器8010逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。图8中示出的电子设备结构并不构成对电子设备的限定,电子设备可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置,在此不再赘述。
其中,处理器8010,用于在所述REE侧接收到服务器发送的用于查询所述电子设备的安全状态的安全信息查询请求的情况下,获取REE安全状态信息,并将所述安全信息查询请求和所述REE安全状态信息发送至所述TEE侧;
在所述TEE侧获取目标安全信息,根据所述REE安全状态信息和所述目标安全信息生成综合安全信息,其中,所述目标安全信息包括TEE安全状态信息;
将所述综合安全信息发送至所述服务器。
在本申请实施例中,通过在REE侧采集REE安全状态信息以及在TEE 侧采集目标安全信息,可以利用REE安全状态信息和目标安全信息实现对电子设备的安全状态进行全面评估,使得安全评估结果更加准确,并且,由于在TEE环境中生成综合安全信息,增强了系统安全性。
可选地,在所述安全信息查询请求包含客户端应用程序的标识的情况下,所述采集目标安全信息之前,还包括:
在所述TEE侧根据所述客户端应用程序的标识校验所述客户端应用程序是否具有查询权限;
所述获取目标安全信息包括:
若所述客户端应用程序具有查询权限,则获取目标安全信息。
可选地,在所述安全信息查询请求包含客户端应用程序的标识以及授权令牌的情况下,所述获取目标安全信息之前,还包括:
在所述TEE侧根据所述客户端应用程序的标识校验所述客户端应用程序是否具有查询权限,以及在所述TEE侧校验所述授权令牌是否有效;
所述获取目标安全信息包括:
若所述客户端应用程序具有查询权限且所述授权令牌有效,则获取目标安全信息。
可选地,所述根据所述REE安全状态信息和所述目标安全信息生成综合安全信息包括:
根据所述REE安全状态信息和所述TEE安全状态信息,生成所述电子设备的安全状态评估结果;
根据所述安全状态评估结果,生成综合安全信息。
可选地,所述目标安全信息还包括所述电子设备的安全能力信息,所述根据所述安全状态评估结果,生成综合安全信息包括:
采用所述电子设备的私钥对所述安全能力信息和所述安全状态评估结果进行数字签名;
根据所述安全能力信息、所述安全状态评估结果以及签名生成综合安全信息。
可选地,处理器8010,还用于在接收到目标服务器发送的安全能力配置信息的情况下,根据所述安全能力配置信息,对所述电子设备的安全能力进行配置更新;
或者,在接收到目标服务器发送的安全状态评估模型配置信息的情况下,根据所述安全状态评估模型配置信息,对所述电子设备的安全状态评估模型进行配置更新。
可选地,所述安全能力信息包括以下至少一者:可信执行环境信息、可信用户交互信息、硬件加解密信息、安全单元信息、内存加密信息、防侧信道攻击信息、防故障注入攻击信息。
可选地,所述REE安全状态信息以及所述TEE安全状态信息均包括以下至少一者:应用访问控制信息、文件系统访问控制信息、数据加密信息、数据完整性保护信息、安全锁屏和认证信息、设备配置文件的完整性验证信息、系统是否存在恶意软件或感染病毒、硬件和固件的配置是否被篡改、系统软件版本是否满足要求、系统是否被Root、内存是否遭受攻击、内核及内核配置是否被篡改、网络连接是否安全。
应理解的是,本申请实施例中,输入单元804可以包括图形处理器(Graphics Processing Unit,GPU)8041和麦克风8042,图形处理器8041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。显示单元806可包括显示面板8061,可以采用液晶显示器、有机发光二极管等形式来配置显示面板8061。用户输入单元807包括触控面板8071以及其他输入设备8072中的至少一种。触控面板8071,也称为触摸屏。触控面板8071可包括触摸检测装置和触摸控制器两个部分。其他输入设备8072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。
存储器809可用于存储软件程序以及各种数据,存储器809可主要包括存储程序或指令的第一存储区和存储数据的第二存储区,其中,第一存储区可存储操作系统、至少一个功能所需的应用程序或指令(比如声音播放功能、 图像播放功能等)等。此外,存储器809可以包括易失性存储器或非易失性存储器,或者,存储器809可以包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDRSDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synch link DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DRRAM)。本申请实施例中的存储器809包括但不限于这些和任意其它适合类型的存储器。
处理器8010可包括一个或多个处理单元;可选的,处理器8010集成应用处理器和调制解调处理器,其中,应用处理器主要处理涉及操作系统、用户界面和应用程序等的操作,调制解调处理器主要处理无线通信信号,如基带处理器。可以理解的是,上述调制解调处理器也可以不集成到处理器8010中。
本申请实施例还提供一种可读存储介质,所述可读存储介质上存储有程序或指令,该程序或指令被处理器执行时实现上述安全评估方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
其中,所述处理器为上述实施例中所述的电子设备中的处理器。所述可读存储介质,包括计算机可读存储介质,如计算机只读存储器、随机存取存储器、磁碟或者光盘等。
本申请实施例另提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现上述安全评估方法实施例的各个过程,且能达到相同的技术效果,为避免重复, 这里不再赘述。
应理解,本申请实施例提到的芯片还可以称为系统级芯片、系统芯片、芯片系统或片上系统芯片等。
本申请实施例提供一种计算机程序产品,该程序产品被存储在存储介质中,该程序产品被至少一个处理器执行以实现如上述安全评估方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本公开的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本公开各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单 元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本公开的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本公开各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来控制相关的硬件来完成,所述的程序可存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)或随机存储记忆体(Random Access Memory,RAM)等。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。此外,需要指出的是,本申请实施方式中的方法和装置的范围不限按示出或讨论的顺序来执行功能,还可包括根据所涉及的功能按基本同时的方式或按相反的顺序来执行功能,例如,可以按不同于所描述的次序来执行所描述的方法,并且还可以添加、省去、或组合各种步骤。另外,参照某些示例所描述的特征可在其他示例中被组合。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通 过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以计算机软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,或者网络设备等)执行本申请各个实施例所述的方法。
上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本申请的保护之内。

Claims (23)

  1. 一种安全评估方法,应用于支持可信执行环境TEE和富执行环境REE的电子设备,所述方法包括:
    在所述REE侧接收到服务器发送的用于查询所述电子设备的安全状态的安全信息查询请求的情况下,获取REE安全状态信息,并将所述安全信息查询请求和所述REE安全状态信息发送至所述TEE侧;
    在所述TEE侧获取目标安全信息,根据所述REE安全状态信息和所述目标安全信息生成综合安全信息,其中,所述目标安全信息包括TEE安全状态信息;
    将所述综合安全信息发送至所述服务器。
  2. 根据权利要求1所述的方法,其中,在所述安全信息查询请求包含客户端应用程序的标识的情况下,所述获取目标安全信息之前,还包括:
    在所述TEE侧根据所述客户端应用程序的标识校验所述客户端应用程序是否具有查询权限;
    所述获取目标安全信息包括:
    若所述客户端应用程序具有查询权限,则获取目标安全信息。
  3. 根据权利要求1所述的方法,其中,在所述安全信息查询请求包含客户端应用程序的标识以及授权令牌的情况下,所述获取目标安全信息之前,还包括:
    在所述TEE侧根据所述客户端应用程序的标识校验所述客户端应用程序是否具有查询权限,以及在所述TEE侧校验所述授权令牌是否有效;
    所述获取目标安全信息包括:
    若所述客户端应用程序具有查询权限且所述授权令牌有效,则获取目标安全信息。
  4. 根据权利要求1所述的方法,其中,所述根据所述REE安全状态信息 和所述目标安全信息生成综合安全信息包括:
    根据所述REE安全状态信息和所述TEE安全状态信息,生成所述电子设备的安全状态评估结果;
    根据所述安全状态评估结果,生成综合安全信息。
  5. 根据权利要求4所述的方法,其中,所述目标安全信息还包括所述电子设备的安全能力信息,所述根据所述安全状态评估结果,生成综合安全信息包括:
    采用所述电子设备的私钥对所述安全能力信息和所述安全状态评估结果进行数字签名;
    根据所述安全能力信息、所述安全状态评估结果以及签名生成综合安全信息。
  6. 根据权利要求3所述的方法,其中,所述TEE侧存储有安全状态评估模型,所述根据所述REE安全状态信息和所述TEE安全状态信息,生成所述电子设备的安全状态评估结果包括:
    采用所述安全状态评估模型对所述REE安全状态信息和所述TEE安全状态信息进行安全状态评估,生成所述电子设备的安全状态评估结果。
  7. 根据权利要求1所述的方法,其中,还包括:
    在接收到目标服务器发送的安全能力配置信息的情况下,根据所述安全能力配置信息,对所述电子设备的安全能力进行配置更新;
    或者,在接收到目标服务器发送的安全状态评估模型配置信息的情况下,根据所述安全状态评估模型配置信息,对所述电子设备的安全状态评估模型进行配置更新。
  8. 根据权利要求5所述的方法,其中,所述安全能力信息包括以下至少一项:可信执行环境信息、可信用户交互信息、硬件加解密信息、安全单元信息、内存加密信息、防侧信道攻击信息、防故障注入攻击信息。
  9. 根据权利要求1所述的方法,其中,所述REE安全状态信息以及所述TEE安全状态信息均包括以下至少一者:应用访问控制信息、文件系统访问 控制信息、数据加密信息、数据完整性保护信息、安全锁屏和认证信息、设备配置文件的完整性验证信息、系统是否存在恶意软件或感染病毒、硬件和固件的配置是否被篡改、系统软件版本是否满足要求、系统是否被Root、内存是否遭受攻击、内核及内核配置是否被篡改、网络连接是否安全。
  10. 一种安全评估方法,应用于服务器,所述方法包括:
    向电子设备发送用于查询所述电子设备的安全状态的安全信息查询请求;
    接收所述电子设备发送的综合安全信息,所述综合安全信息是所述电子设备在响应所述安全信息查询请求时根据所述电子设备的REE安全状态信息和TEE安全状态信息得到的,所述综合安全信息包括所述电子设备采用私钥生成的签名;
    采用与所述私钥配对的公钥对所述综合安全信息中的签名进行验证;
    在验证通过的情况下,向所述电子设备提供的目标业务服务。
  11. 一种安全评估装置,应用于支持可信执行环境TEE和富执行环境REE的电子设备,所述装置包括:
    第一处理模块,用于在所述REE侧接收到服务器发送的用于查询所述电子设备的安全状态的安全信息查询请求的情况下,获取REE安全状态信息,并将所述安全信息查询请求和所述REE安全状态信息发送至所述TEE侧;
    第二处理模块,用于在所述TEE侧获取目标安全信息,根据所述REE安全状态信息和所述目标安全信息生成综合安全信息,其中,所述目标安全信息包括TEE安全状态信息;
    发送模块,用于将所述综合安全信息发送至所述服务器。
  12. 根据权利要求11所述的装置,其中,在所述安全信息查询请求包含客户端应用程序的标识的情况下,所述装置还包括:
    第一校验模块,用于在所述TEE侧根据所述客户端应用程序的标识校验所述客户端应用程序是否具有查询权限;
    所述第二处理模块包括:
    第一获取单元,用于若所述客户端应用程序具有查询权限,则获取目标 安全信息。
  13. 根据权利要求11所述的装置,其中,在所述安全信息查询请求包含客户端应用程序的标识以及授权令牌的情况下,所述装置还包括:
    第二校验模块,用于在所述TEE侧根据所述客户端应用程序的标识校验所述客户端应用程序是否具有查询权限,以及在所述TEE侧校验所述授权令牌是否有效;
    所述第二处理模块包括:
    第二获取单元,用于若所述客户端应用程序具有查询权限且所述授权令牌有效,则获取目标安全信息。
  14. 根据权利要求11所述的装置,其中,所述第二处理模块包括:
    第一生成单元,用于根据所述REE安全状态信息和所述TEE安全状态信息,生成所述电子设备的安全状态评估结果;
    第二生成单元,用于根据所述安全状态评估结果,生成综合安全信息。
  15. 根据权利要求14所述的装置,其中,所述目标安全信息还包括所述电子设备的安全能力信息,所述第二生成单元包括:
    签名子单元,用于采用所述电子设备的私钥对所述安全能力信息和所述安全状态评估结果进行数字签名;
    生成子单元,用于根据所述安全能力信息、所述安全状态评估结果以及签名生成综合安全信息。
  16. 根据权利要求14所述的装置,其中,所述TEE侧存储有安全状态评估模型,所述第一生成单元包括:
    评估子单元,用于采用所述安全状态评估模型对所述REE安全状态信息和所述TEE安全状态信息进行安全状态评估,生成所述电子设备的安全状态评估结果。
  17. 根据权利要求11所述的装置,其中,还包括:
    第一更新模块,用于在接收到目标服务器发送的安全能力配置信息的情况下,根据所述安全能力配置信息,对所述电子设备的安全能力进行配置更 新;
    或者,第二更新模块,用于在接收到目标服务器发送的安全状态评估模型配置信息的情况下,根据所述安全状态评估模型配置信息,对所述电子设备的安全状态评估模型进行配置更新。
  18. 根据权利要求15所述的装置,其中,所述安全能力信息包括以下至少一者:可信执行环境信息、可信用户交互信息、硬件加解密信息、安全单元信息、内存加密信息、防侧信道攻击信息、防故障注入攻击信息。
  19. 根据权利要求11所述的装置,其中,所述REE安全状态信息以及所述TEE安全状态信息均包括以下至少一者:应用访问控制信息、文件系统访问控制信息、数据加密信息、数据完整性保护信息、安全锁屏和认证信息、设备配置文件的完整性验证信息、系统是否存在恶意软件或感染病毒、硬件和固件的配置是否被篡改、系统软件版本是否满足要求、系统是否被Root、内存是否遭受攻击、内核及内核配置是否被篡改、网络连接是否安全。
  20. 一种安全评估装置,应用于服务器,所述装置包括:
    查询模块,用于向电子设备发送用于查询所述电子设备的安全状态的安全信息查询请求;
    第一接收模块,用于接收所述电子设备发送的综合安全信息,所述综合安全信息是所述电子设备在响应所述安全信息查询请求时根据所述电子设备的REE安全状态信息和TEE安全状态信息得到的,所述综合安全信息包括所述电子设备采用私钥生成的签名;
    验证模块,用于采用与所述私钥配对的公钥对所述综合安全信息中的签名进行验证;
    服务模块,用于在验证通过的情况下,向所述电子设备提供的目标业务服务。
  21. 一种电子设备,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时如权利要求1-9中任一项所述的安全评估方法的步骤,或者实现如权利要求10所述的安 全评估方法的步骤。
  22. 一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如权利要求1-9中任一项所述的安全评估方法的步骤,或者实现如权利要求10所述的安全评估方法的步骤。
  23. 一种通信设备,被配置为执行如权利要求1-9中任一项所述的安全评估方法的步骤。
PCT/CN2023/082037 2022-03-18 2023-03-17 一种安全评估方法及装置、电子设备和可读存储介质 WO2023174393A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210273432.4 2022-03-18
CN202210273432.4A CN114598541B (zh) 2022-03-18 2022-03-18 一种安全评估方法及装置、电子设备和可读存储介质

Publications (1)

Publication Number Publication Date
WO2023174393A1 true WO2023174393A1 (zh) 2023-09-21

Family

ID=81819540

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/082037 WO2023174393A1 (zh) 2022-03-18 2023-03-17 一种安全评估方法及装置、电子设备和可读存储介质

Country Status (2)

Country Link
CN (1) CN114598541B (zh)
WO (1) WO2023174393A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114598541B (zh) * 2022-03-18 2024-03-29 维沃移动通信有限公司 一种安全评估方法及装置、电子设备和可读存储介质
CN115037482A (zh) * 2022-06-10 2022-09-09 维沃移动通信有限公司 欺诈行为检测方法、装置、电子设备及可读存储介质
CN117917660A (zh) * 2022-10-20 2024-04-23 华为技术有限公司 数据处理方法、终端设备及系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104125216A (zh) * 2014-06-30 2014-10-29 华为技术有限公司 一种提升可信执行环境安全性的方法、系统及终端
WO2016116271A1 (de) * 2015-01-20 2016-07-28 Giesecke & Devrient Gmbh Laufzeitumgebung für mobiles endgerät, die ein bereitstellen eines sicherheits-dienstes ermöglicht
US20210044575A1 (en) * 2019-08-06 2021-02-11 Samsung Electronics Co., Ltd. Electronic device and method for generating attestation certificate based on fused key
CN114598541A (zh) * 2022-03-18 2022-06-07 维沃移动通信有限公司 一种安全评估方法及装置、电子设备和可读存储介质

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104079530A (zh) * 2013-03-26 2014-10-01 北京中创智信科技有限公司 远程数据采集系统
CN111125705B (zh) * 2018-11-01 2022-08-19 华为终端有限公司 一种能力开放方法及装置
WO2020088323A1 (zh) * 2018-11-01 2020-05-07 华为技术有限公司 一种能力开放方法及装置
CN109871327B (zh) * 2019-02-20 2022-05-31 中国信息通信研究院 可信执行环境安全存储安全性测试方法及装置
CN112596802B (zh) * 2019-09-17 2022-07-12 华为技术有限公司 一种信息处理方法及装置
US20200320206A1 (en) * 2020-06-24 2020-10-08 Intel Corporation Systems, methods, apparatus and articles of manufacture to prevent unauthorized release of information associated with a function as a service
CN112351022B (zh) * 2020-10-30 2022-07-12 新华三技术有限公司 信任区的安全防护方法及装置
CN113014539B (zh) * 2020-11-23 2022-05-17 杭州安芯物联网安全技术有限公司 一种物联网设备安全保护系统及方法
CN113315637B (zh) * 2021-05-31 2023-07-04 中国农业银行股份有限公司 安全认证方法、装置及存储介质
CN113485524B (zh) * 2021-07-12 2022-11-11 上海瓶钵信息科技有限公司 基于可信执行环境的时钟同步方法及系统
CN113836538A (zh) * 2021-08-23 2021-12-24 杭州逗酷软件科技有限公司 数据模型处理方法、装置、服务器及存储介质

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104125216A (zh) * 2014-06-30 2014-10-29 华为技术有限公司 一种提升可信执行环境安全性的方法、系统及终端
WO2016116271A1 (de) * 2015-01-20 2016-07-28 Giesecke & Devrient Gmbh Laufzeitumgebung für mobiles endgerät, die ein bereitstellen eines sicherheits-dienstes ermöglicht
US20210044575A1 (en) * 2019-08-06 2021-02-11 Samsung Electronics Co., Ltd. Electronic device and method for generating attestation certificate based on fused key
CN114598541A (zh) * 2022-03-18 2022-06-07 维沃移动通信有限公司 一种安全评估方法及装置、电子设备和可读存储介质

Also Published As

Publication number Publication date
CN114598541A (zh) 2022-06-07
CN114598541B (zh) 2024-03-29

Similar Documents

Publication Publication Date Title
US11558381B2 (en) Out-of-band authentication based on secure channel to trusted execution environment on client device
WO2023174393A1 (zh) 一种安全评估方法及装置、电子设备和可读存储介质
JP4219561B2 (ja) 信頼できる計算プラットフォームのためのスマートカード・ユーザインターフェイス
WO2021169107A1 (zh) 一种网络身份保护方法、装置及电子设备和存储介质
US9569602B2 (en) Mechanism for enforcing user-specific and device-specific security constraints in an isolated execution environment on a device
US8079069B2 (en) Cardspace history validator
JP4939851B2 (ja) 情報処理端末、セキュアデバイスおよび状態処理方法
US20160134660A1 (en) Securely operating a process using user-specific and device-specific security constraints
JP6530049B2 (ja) ホスト型認証サービスを実装するためのシステム及び方法
US20140317413A1 (en) Secure remediation of devices requesting cloud services
US11943256B2 (en) Link detection method and apparatus, electronic device, and storage medium
US9600671B2 (en) Systems and methods for account recovery using a platform attestation credential
US20040010686A1 (en) Apparatus for remote working
EP3206329B1 (en) Security check method, device, terminal and server
CN109981680B (zh) 一种访问控制实现方法、装置、计算机设备及存储介质
WO2023174389A1 (zh) 一种安全状态评估方法及装置、电子设备和可读存储介质
US20230362018A1 (en) System and Method for Secure Internet Communications
US20240259811A1 (en) Device identifier counterfeiting prevention method and apparatus, and electronic device
WO2023236884A1 (zh) 欺诈行为检测方法、装置、电子设备及可读存储介质
JP2023507568A (ja) 悪意のあるプログラムコード注入に対する保護のためのシステム及び方法
US11290471B2 (en) Cross-attestation of electronic devices
US10845990B2 (en) Method for executing of security keyboard, apparatus and system for executing the method
WO2013180745A1 (en) Methods and systems for increasing the security private keys
CN113569214A (zh) 要件数据授权方法及系统
WO2023185900A1 (zh) 一种安全状态评估方法及装置、电子设备和可读存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23769895

Country of ref document: EP

Kind code of ref document: A1