WO2023185900A1 - 一种安全状态评估方法及装置、电子设备和可读存储介质 - Google Patents

一种安全状态评估方法及装置、电子设备和可读存储介质 Download PDF

Info

Publication number
WO2023185900A1
WO2023185900A1 PCT/CN2023/084578 CN2023084578W WO2023185900A1 WO 2023185900 A1 WO2023185900 A1 WO 2023185900A1 CN 2023084578 W CN2023084578 W CN 2023084578W WO 2023185900 A1 WO2023185900 A1 WO 2023185900A1
Authority
WO
WIPO (PCT)
Prior art keywords
security
indicator element
layer
status information
security status
Prior art date
Application number
PCT/CN2023/084578
Other languages
English (en)
French (fr)
Inventor
胡志远
史领航
陈辉军
鲁京辉
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Publication of WO2023185900A1 publication Critical patent/WO2023185900A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/35Protecting application or service provisioning, e.g. securing SIM application provisioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security

Definitions

  • This application belongs to the field of communication technology, and specifically relates to a security status assessment method and device, electronic equipment and readable storage media.
  • the purpose of the embodiments of this application is to provide a security status assessment method and device, electronic equipment and readable storage media, which can solve the problem that the security risk assessment results obtained by the security risk assessment scheme in related technologies are not accurate enough and cannot meet the user's requirements for high business security. question of needs.
  • embodiments of the present application provide a security status assessment method, which includes:
  • the target security status information includes at least one second layer indicator element, each second layer indicator element includes at least one third layer indicator element and the status of each third layer indicator element information;
  • a security status evaluation result of the electronic device is generated.
  • a safety status assessment device which includes:
  • a collection module configured to collect target security status information, where the target security status information includes at least one second-layer indicator element, and each second-layer indicator element includes at least one third-layer indicator element and each of the third-layer indicator elements. Status information of layer indicator elements;
  • a weight determination module configured to determine the weight of each of the second-level indicator elements and each of the third-level indicator elements using the analytic hierarchy process
  • An evaluation module configured to generate a safety status evaluation result of the electronic device according to the target safety status information and the weight.
  • inventions of the present application provide an electronic device.
  • the electronic device includes a processor and a memory.
  • the memory stores programs or instructions that can be run on the processor.
  • the programs or instructions are processed by the processor.
  • the processor is executed, the steps of the method described in the first aspect are implemented.
  • embodiments of the present application provide a readable storage medium.
  • Programs or instructions are stored on the readable storage medium.
  • the steps of the method described in the first aspect are implemented. .
  • inventions of the present application provide a chip.
  • the chip includes a processor and a communication interface.
  • the communication interface is coupled to the processor.
  • the processor is used to run programs or instructions to implement the first aspect. steps of the method.
  • embodiments of the present application provide a computer program product, the program product is stored in a storage medium, and the program product is executed by at least one processor to implement the steps of the method described in the first aspect.
  • an embodiment of the present application provides an electronic device, wherein the electronic device is configured to perform the steps of the method described in the first aspect.
  • a security status assessment needs to be performed, for example, when a security status query request for querying the security status of an electronic device is received, the target security status information of the electronic device is collected, and the analytic hierarchy process is used to determine The weight of each indicator element in the target security status information is then used to obtain an accurate and comprehensive security status assessment result based on the target security status information and the determined weight, providing a more accurate assessment basis for businesses with high security requirements.
  • Figure 1 is a schematic flow chart of a security status assessment method provided by an embodiment of the present application
  • FIG. 2 is a schematic structural diagram of an electronic device supporting TEE and REE provided by an embodiment of the present application
  • Figure 3 is a schematic flow chart of obtaining second-level indicator elements and third-level indicator elements provided by the embodiment of the present application;
  • Figure 4 is a schematic structural diagram of a safety status assessment device provided by an embodiment of the present application.
  • Figure 5 is a schematic structural diagram of an electronic device provided by an embodiment of the present application.
  • FIG. 6 is a schematic diagram of the hardware structure of an electronic device implementing an embodiment of the present application.
  • first, second, etc. in the description and claims of this application are used to distinguish similar objects and are not used to describe a specific order or sequence. It is to be understood that the figures so used are interchangeable under appropriate circumstances so that the embodiments of the present application can be practiced in orders other than those illustrated or described herein, and that "first,” “second,” etc. are distinguished Objects are usually of one type, and the number of objects is not limited. For example, the first object can be one or multiple.
  • “and/or” in the description and claims indicates at least one of the connected objects, and the character “/" generally indicates that the related objects are in an "or” relationship.
  • Figure 1 is a schematic flow chart of a security status assessment method provided by an embodiment of the present application.
  • a security status assessment method which includes:
  • Step 101 Collect target security status information.
  • the target security status information includes at least one second-layer indicator element.
  • Each second-layer indicator element includes at least one third-layer indicator element and each third-layer indicator. Status information of features;
  • the target security status of the electronic device may be collected.
  • information for security posture assessment can be the query party.
  • the query party can be the user itself or the application server.
  • the transmission security mechanism between the application server and the local electronic device can use Transport Layer Security (TLS) to improve transmission security.
  • TLS Transport Layer Security
  • the collected target security status information may include various types of information related to the security of electronic equipment, and the specific information may be determined based on actual assessment needs.
  • the target security status information includes at least one second-layer indicator element, and each second-layer indicator element includes at least one third-layer indicator element and status information of each third-layer indicator element, that is, the third layer indicator element There is a subordinate relationship between the second-level indicator elements and the third-level indicator elements.
  • the indicator elements may specifically include three layers, namely the first layer of indicator elements, the second layer of indicator elements and the third layer of indicator elements.
  • the comprehensive security assessment of electronic equipment is the first layer.
  • Indicator elements correspond to the safety status assessment results of electronic equipment.
  • the first-level indicator elements include at least one second-level indicator element, and the second-level indicator elements include at least one third-level indicator element, that is, the third-level indicator element. It is subordinate to a certain second-level indicator element, and the second-level indicator element is subordinate to the first-level indicator element.
  • Step 102 Use the analytic hierarchy process to determine the weight of each of the second-level indicator elements and each of the third-level indicator elements;
  • the Analytic Hierarchy Process can be applied in the security status assessment model, that is, the security status assessment model is established based on the AHP.
  • the security posture assessment model can be stored in the trusted execution environment of the electronic device to improve its security.
  • the security status assessment model can be used to evaluate the security status of electronic equipment.
  • the collected target security status information can be used as the input of the security status assessment model and analyzed and processed according to the corresponding security status assessment strategy to generate a security status assessment result of the electronic device.
  • Step 103 Generate a safety status evaluation result of the electronic device according to the target safety status information and the weight.
  • the safety status evaluation results of the electronic device can be calculated based on the target safety status information and the corresponding weights, so as to comprehensively and objectively consider The impact of various index elements on the safety status can be obtained to obtain more accurate safety status assessment results.
  • the security status assessment result is a score, that is, the security status assessment result is expressed in the form of a score.
  • the score is positively correlated with the security of the electronic device.
  • the score range of the security status assessment result is 0-10, 0 represents the lowest security, and 10 represents the highest security, thus providing a basis for various application services.
  • Security risk assessment provides a more accurate basis for security assessment.
  • the target security status information of the electronic device is collected and hierarchical
  • the analytical method determines the weight of each indicator element in the target security status information, and then based on the target security status information and the determined weight, an accurate and comprehensive security status assessment result can be obtained, providing a more accurate assessment basis for businesses with high security requirements. .
  • the use of the analytic hierarchy process to determine the weight of each of the second-level indicator elements and each of the third-level indicator elements includes:
  • the consistency index and the random consistency index a consistency ratio is obtained, and the random consistency index is related to the number of rows or columns of the pairwise comparison matrix;
  • the target layer is the second layer or the third layer
  • the values in the pairwise comparison matrix are related to application scenarios.
  • the above steps can be used for determination.
  • the values in the constructed pairwise comparison matrix of the target layer are related to the application scenario. For example, it can be based on the theory of "when evaluating the weight of a multi-factor, compare the factors with each other, so as to more accurately determine the weight of each factor in an evaluation result", combined with experience As well as the specific application scenario in this embodiment, assign values to the pairwise comparison matrix.
  • the weight of each indicator element in an evaluation result can be determined more accurately, that is, corresponding to Table 1 below.
  • a pairwise comparison matrix is constructed for the indicator elements in the second layer that are subordinate to the first-level indicator elements, that is, all the second-level indicator elements, and the The weight vector and maximum eigenroot of the pairwise comparison matrix, where the weight vector is also called the weight vector, can be constructed using the pairwise comparison method and the 1-9 comparison scale when constructing the pairwise comparison matrix.
  • n is the number of indicator elements in the second layer
  • i and j represent indicator i and indicator j respectively.
  • Step 1 Normalize the column vectors of the pairwise comparison matrix A:
  • Step 2 Yes Sum by row:
  • Step 4 Calculate the maximum eigenroot approximation:
  • the random consistency index RI is the standard for measuring the consistency index CI of A.
  • the value of RI is shown in Table 2 below;
  • the target layer indicator element is at least one third layer indicator element included in any of the second layer indicator elements
  • the calculation can also be performed with reference to the above steps to determine the corresponding weight. This embodiment will not be used here. Repeat.
  • the target layer is the second layer or the third layer.
  • the random consistency index of the pairwise comparison matrix is related to the number of rows or columns of the pairwise comparison matrix. Since the pairwise comparison matrix is a square matrix, that is, the number of rows is equal to the number of columns, then the number of rows/columns of the pairwise comparison matrix That is, n, then the corresponding random consistency index can be determined by looking up Table 2.
  • the analytic hierarchy process when using the analytic hierarchy process, it is necessary to ensure that the number of target layer indicator elements is more than three, and to ensure that the sum of the weights of all target layer indicator elements is equal to 1. If it is not equal to 1, then Weight adjustment is required.
  • Generating safety status assessment results for electronic equipment includes:
  • the security status assessment result is generated based on the score and corresponding weight of each second-layer indicator element.
  • each calculation can be calculated based on the status information and weight of the third-layer indicator element contained in the second-layer indicator element.
  • a score for a second-level indicator element That is to say, the score for any second-level indicator element is determined based on the status information of all third-level indicator elements contained in the second-level indicator element and the corresponding weight of each third-level indicator element.
  • a safety status evaluation result can be generated based on the score and corresponding weight of each second-layer index element.
  • the safety status evaluation result corresponds to the comprehensive safety Assessment is the first level indicator element in the analytic hierarchy process. Therefore, by integrating various third-level indicator elements, a more accurate score of the second-level indicator elements can be obtained, and by integrating various second-level indicator elements, the accuracy of the obtained safety status assessment results is ultimately improved. .
  • the second layer is determined based on at least one third layer indicator element included in the second layer indicator element and the status information and weight of each third layer indicator element. Scores for indicator elements include:
  • the score of the second-level indicator element is calculated.
  • the score of the corresponding third-level indicator element can be determined based on the status information corresponding to each third-level indicator element, that is, each second-level indicator element can be scored. After that, the score can be determined based on each second-level indicator element.
  • the scores of all third-level indicator elements included in the first-level indicator elements and the weight of each third-level indicator element are used to calculate the score of each second-level indicator element.
  • each second layer index element included The scores and weights of the three-level indicator elements can be calculated by weighted summation when calculating the scores of the second-level indicator elements. Similarly, when generating safety status assessment results based on the score and corresponding weight of each second-layer indicator element, it can also be calculated using a weighted summation method.
  • the method is applied to electronic devices that support Trusted Execution Environment TEE and Rich Execution Environment REE
  • the at least one second layer indicator element includes: TEE security status information, REE security status information, At least one of hardware and firmware security status information and communication security status information.
  • a Rich Execution Environment runs a Rich Execution Environment operating system
  • a Trusted Execution Environment Trusted Execution Environment, TEE
  • TEE Trusted Execution Environment operating system
  • REE security status information can be collected through the REE security detection module and REE application programming interface (Application Programming Interface, API) in REE.
  • REE application programming interface Application Programming Interface, API
  • the REE side can send a security information query request and REE security status information to the TEE side through this transmission channel.
  • TEE security status information can be collected through the TEE security detection module and Trusted Internal application programming interface (Application Programming Interface, API) in the TEE.
  • TEE security detection module and Trusted Internal application programming interface (Application Programming Interface, API) in the TEE.
  • API Application Programming Interface
  • the third layer indicator elements included in the REE security status information include at least one of the following: malicious/spoofed/fake applications, virus infection, application signature verification, verification startup, application layer data encryption, Software-based memory vulnerability prevention, application layer trustworthiness, and status information of each third-layer indicator element.
  • malicious/spoofed/fake applications virus infection
  • application signature verification verification startup
  • application layer data encryption Software-based memory vulnerability prevention
  • application layer trustworthiness and status information of each third-layer indicator element.
  • the third-layer indicator element is a malicious/spoofed/counterfeit application
  • the corresponding status information can be non-existent, One of unknown and existing.
  • the third layer indicator element is virus infection, and the corresponding status information can be one of non-existence, unknown, and existing.
  • the third layer indicator element is verification startup, corresponding to The status information can be either supported or not supported, and the status information corresponding to each third-layer indicator element is obtained through collection.
  • every third The status information of layer indicator elements corresponds to a score, and each third-level indicator element corresponds to a weight.
  • the third layer indicator elements of TEE security status information include at least one of the following: malicious/spoofed/fake applications, virus infection, trusted verification startup, trusted user interaction, biometric identification , sensitive information storage, kernel real-time security protection, system integrity measurement, kernel control flow integrity measurement, and status information of each third-layer indicator element.
  • the third-layer indicator element is malicious/spoofing/counterfeit application
  • the corresponding status information can be one of non-existence, unknown, and existence.
  • the third layer indicator element is virus infection, and the corresponding status information can be one of non-existence, unknown, and existence.
  • the third layer indicator element can be one of non-existence, unknown, and existence.
  • the three-layer indicator elements are enabled for trusted verification, and the corresponding status information can be either supported or not supported.
  • the status information corresponding to each third-layer indicator element is obtained through collection. Among them, the status information of each third-level indicator element corresponds to a score, and each third-level indicator element corresponds to a weight.
  • the third layer indicator elements included in the hardware and firmware security status information include at least one of the following: hardware root of trust, security unit, hardware encryption and decryption, secure boot, and hardware-based memory vulnerability defense. , memory encryption, whether the firmware version meets the requirements, prevention of side channel attacks, prevention of fault injection attacks, and the status information of each third-layer indicator element.
  • the third-layer indicator element is the hardware root of trust, and the corresponding status information can It is either supported or not supported.
  • the third layer indicator element is a security unit, and the corresponding status information can be one of supported or not supported.
  • the third layer indicator element is hardware encryption and decryption.
  • the corresponding status information can be either supported or not supported, and the status information corresponding to each third-layer indicator element is obtained through collection. Among them, the status information of each third-level indicator element corresponds to a score, and each third-level indicator element corresponds to a weight.
  • the third layer indicator elements included in the communication security status information include at least one of the following: cellular network communication, Wi-Fi communication, communication protocol security, VPN, DNS security resolution, and each third layer The status information of the three-layer indicator elements.
  • the third-layer indicator element is cellular network communication, and the corresponding status information can be one of safe, unknown, and pseudo base stations.
  • the third-layer indicator element is Wi-Fi communication.
  • the corresponding status information can be one of trusted, public, unknown, and malicious.
  • the third layer indicator element is communication protocol security, and the corresponding status information
  • the information can be one of TLS, Internet Protocol Security (IPSec), custom, or none.
  • the status information corresponding to each third-layer indicator element is obtained through collection. Among them, the status information of each third-level indicator element corresponds to a score, and each third-level indicator element corresponds to a weight.
  • scoring based on the status information of the third-layer indicator elements when scoring based on the status information of the third-layer indicator elements, corresponding scoring standards can be set, and different status information corresponds to different scores.
  • the weighted arithmetic average method means that in n observation data, each observation value is given different weights according to the degree of impact on the future predicted value, and the observation values in each period are multiplied by their own weights, and then they are The sum of is divided by the sum of each weight, and the resulting quotient is the future predicted value.
  • the mathematical model is:
  • n is the number of data points in the population
  • W i is the weight corresponding to each observation value
  • W i is between 0 and 1, that is, 0 ⁇ W i ⁇ 1.
  • the above security status assessment method is introduced below based on specific data information.
  • the following second-level indicator elements are defined, as detailed in Table 3 below.
  • Step 1 Construct a pairwise comparison matrix S of the second-level indicator elements:
  • Step 2 Normalize the column vector of the pairwise comparison matrix S, then find the row sum, and finally normalize the row sum to obtain the weight vector W of the second-level indicator elements.
  • Step 3 Calculate the product of the pairwise comparison matrix S and the weight vector W, and calculate the maximum eigenroot of the pairwise comparison matrix S.
  • Step 4 Consistency check of pairwise comparison matrix S.
  • the consistency ratio can be calculated:
  • the following third-layer indicator elements and corresponding weights included in the REE security status information are defined. See Table 4 below for details.
  • Table 4 Third-layer indicator elements and weights included in REE security status information
  • the pairwise comparison matrix S A of the third-level indicator elements included in the REE safety status information is:
  • the following third-layer indicator elements and corresponding weights included in the TEE security status information are defined. See Table 5 below for details.
  • Table 5 Third-layer indicator elements and weights included in TEE security status information
  • the pairwise comparison matrix S B of the third-level indicator elements included in the TEE security status information is:
  • third-layer indicator elements and corresponding weights included in the hardware and firmware security status information are defined. See Table 6 below for details.
  • Table 6 Third-layer indicator elements and weights included in hardware and firmware security status information
  • the pairwise comparison matrix S C of the third-layer indicator elements included in the hardware and firmware security status information is:
  • the following third-layer indicator elements and corresponding weights included in the communication security status information are defined. See Table 7 below for details.
  • Table 7 Third-layer indicator elements and weights included in communication security status information
  • the pairwise comparison matrix S D of the third-level indicator elements included in the communication security status information is:
  • the variables S A , S B , S C , and S D are the scores of the second-level index elements; the variables W A , W B , W C , and W D are the second-level index elements.
  • S adopts a 10-level rating mechanism, with "0" representing the lowest security and "10" representing the safest Sex is the highest.
  • the security level can be divided into low, medium and high according to the final security status assessment result S. For example: if S belongs to [0, 4), it is a low security level; if S belongs to [4, 7), it is a medium security level. ;S belongs to [7, 10], which is a high security level.
  • S A S A1 *W A1 +S A2 *W A2 +...+S A i*W Ai +...+S An *W An
  • S B S B1 *W B1 +S B2 *W B2 +...+S Bi *W Bi +...+S Bn *W Bn
  • S C S C1 *W C1 +S C2 *W C2 +...+S Ci *W Ci +...+S Bn *W Cn
  • S D S D1 *W D1 +S D2 *W D2 +...+S Di *W Di +...+S Dn *W Dn .
  • the variables S A1 , S An , S B1 S Bn , etc. are the scores of the third-level indicator elements, all positive numbers less than or equal to 10; the variables W A1 W An , W B1 , WBn, etc. represent each third-level index element respectively.
  • the third layer indicator elements, corresponding status information, scores and corresponding weights included in the REE security status information are specifically: if the status information of the malicious/deceptive/counterfeit application (S A1 ) does not exist, the score is 10 points , the weight is 0.2; if the status information of virus infection (S A2 ) is unknown, the score is 5 points, and the weight is 0.25; if the status information of application signature verification (S A3 ) is supported, the score is 10 points, and the weight is 0.15; If the status information of verification startup (S A4 ) is supported, the score is 10 points, and the weight is 0.10; if the status information of application layer data encryption (S A5 ) is supported, the score is 10 points, and the weight is 0.05; software-based memory If the status information of vulnerability defense (S A6 ) is partially supported, the score is 5 points, and the weight is 0.15; if the status information of the application layer trustworthiness (S A7 ) is not enabled, the score is
  • the corresponding security level is located at [4,7), which is a medium security level.
  • the method further includes:
  • the security capability information includes trusted execution environment information, trusted user interaction information, hardware encryption and decryption information, security unit information, memory encryption information, side channel attack prevention information, and fault injection attack prevention information.
  • the private key of the electronic equipment is used to digitally sign the security capability information and security status assessment results, thereby improving security performance, reducing latency, and improving system performance.
  • the querying party has a public key paired with the private key of the electronic device, which can be used to verify the comprehensive security information returned by the electronic device to determine its authenticity and integrity.
  • the security situation of electronic equipment can be more comprehensively assessed, providing a fine-grained security performance assessment of electronic equipment, and providing security risks for various application businesses.
  • the assessment provides a more accurate basis for safety assessment.
  • Figure 2 is an illustration of an electronic device supporting TEE and REE provided by an embodiment of the present application. Schematic. As shown in Figure 2, in this embodiment of the present application, the querying party may be a mobile banking server, a mobile payment server, an enterprise application server, or other high-security application servers.
  • the electronic device supports the Trusted Execution Environment TEE and the Rich Execution Environment REE.
  • the REE runs the Rich Execution Environment operating system REE OS
  • the TEE runs the Trusted Execution Environment operating system TEE OS.
  • the request contains the identification of the "Security Capability and Security Status Client APP" and the authorization of the application server. token;
  • the request comes from a user's inquiry about this electronic device, the request only contains the identification of "Security Capability and Security Status Client APP";
  • Security status information on the REE side (such as whether there is malware, whether the system is infected with viruses, whether the network connection is safe, etc.) through the "REE security detection module” and "REE API";
  • security capabilities mainly include: trusted execution environment, trusted user interaction, hardware encryption and decryption, security unit, memory encryption, prevention of side channel attacks, prevention of fault injection attacks, etc.;
  • the evaluation result of the current security status is a score (such as 0-10, 0 indicates the lowest security, and 10 indicates the highest security).
  • the factors used in the current security status evaluation in addition to the security features of the Android operating system (such as application access control, In addition to file system access control, data encryption, data integrity protection, security lock screen and authentication, integrity verification of device configuration files, etc.), it mainly includes: whether there is malware or virus infection in the system, whether the configuration of hardware and firmware has been Tampering, system software version Whether the system meets the requirements, whether the system is Rooted, whether the memory is attacked, whether the kernel and kernel configuration are tampered with, whether the network link is secure enough, etc.;
  • the request contains the identification of the "Security Capability and Security Status Client APP", the authorization token of the application server, and the REE Security status information;
  • a call request is initiated to the "Security Capability and Security Status Trusted App" on the TEE side.
  • the request contains the identification of the "Security Capability and Security Status Client APP" and the authorization of the application server. brand and REE safety status information;
  • the request contains the identification of the "Security Capability and Security Status Client APP" and the authorization token of the application server. and REE security status information; check whether the access request is valid according to the corresponding security policy:
  • Verify the validity of the application server's authorization token (such as whether the token comes from the management server of this electronic device, whether the token has expired, etc.), and check whether the server has the authority to call "Security Capabilities and Security Status Trusted APP";
  • Security status information on the TEE side through the "TEE security detection module” and "Trusted Internal API” (such as whether there is malware, whether the system is infected with viruses, whether the kernel configuration is tampered with, whether there are execution operations in the data area in the stack, etc.);
  • the safety status assessment based on the received REE safety status information and TEE safety status information, and based on the safety status evaluation model or method, the safety status of the electronic equipment is evaluated in real time to obtain an evaluation result of the current safety status;
  • the security capability information of the electronic device is returned to the "Security Capability and Security Status Client API" on the REE side of the electronic device;
  • FIG. 3 is a schematic flowchart of obtaining second-level indicator elements and third-level indicator elements provided by an embodiment of the present application.
  • the acquisition of second-level indicator elements and third-level indicator elements in the embodiment of this application includes the following:
  • the "Electronic Device Security Capability and Security Status Query Module" of the application server initiates a request for security capability query and current security status assessment (including authorization token) to the "Security Capability and Security Status Client APP" on the REE side of the electronic device.
  • the transmission security mechanism of the request message can use TLS;
  • the "Security Capability and Security Status Client APP" on the REE side of the electronic device sends a security capability query and security status assessment request (including authorization token, REE security status information) to the "Security Capability and Security Status Client API" on the REE side of the electronic device;
  • the security capabilities and security status Client API on the REE side of the electronic device will receive Capability query and security status assessment request (including authorization token, REE security status information) are sent to the "Security Capability and Security Status Trusted APP" on the TEE side through the REE communication agent and TEE communication agent;
  • the "Security Capability and Security Status Trusted APP" on the TEE side verifies the validity of the authorization token, and checks whether the application server has the authority to obtain the security capability and security status of the electronic device; if the verification of the authorization token fails, the relevant operations are terminated. Return an error message and prompt the application server to reapply for an authorization token;
  • the "Security Capability and Security Status Trusted APP" on the TEE side collects TEE security status information through the "TEE Security Detection Module” and "Trusted Internal API”;
  • the "Security Capability and Security Status Trusted APP" on the TEE side determines the security capability information of the electronic device and evaluates the current security status;
  • the "Security Capability and Security Status Trusted APP" on the TEE side uses the private key of the electronic device to digitally sign the security capability information and security status assessment results;
  • the "Security Capability and Security Status Trusted APP" on the TEE side returns the security capability information and security status evaluation results and signatures to the "Security Capability and Security Status Client API" on the REE side through the TEE communication agent and REE communication agent;
  • the "Security Capability and Security Status Client APP" on the REE side returns the received security capability information, security status assessment results and signature to the application server "Electronic Equipment Security Capability and Security Status Query Module".
  • the transmission security mechanism of the returned message TLS can be used;
  • the "electronic device security capability and security status query module" of the application server uses the public key of the electronic device to verify the signature of the security capability information and security status assessment results to determine their authenticity and integrity.
  • a security status assessment needs to be performed, for example, when receiving When querying the security status of electronic equipment, such as security status query requests, the target security status information of the electronic equipment is collected, and the analytic hierarchy process is used to determine the weight of each indicator element in the target security status information, and then the target security status information and determination weight, so that accurate and comprehensive security status assessment results can be obtained, providing a more accurate assessment basis for businesses with high security requirements.
  • the execution subject may be a security status assessment device.
  • the security state assessment method performed by the security state assessment device is used as an example to illustrate the security state assessment device provided by the embodiment of the present application.
  • FIG. 4 is a schematic structural diagram of a safety status assessment device provided by an embodiment of the present application. As shown in Figure 4, another embodiment of the present application also provides a safety status assessment device.
  • the device 400 includes:
  • the collection module 401 is used to collect target security status information.
  • the target security status information includes at least one second-layer indicator element.
  • Each of the second-layer indicator elements includes at least one third-layer indicator element and each of the third-layer indicator elements. Status information of three-layer indicator elements;
  • the weight determination module 402 is used to determine the weight of each of the second-level indicator elements and each of the third-level indicator elements using the analytic hierarchy process;
  • the evaluation module 403 is configured to generate a safety status evaluation result of the electronic device according to the target safety status information and the weight.
  • the weight determination module includes:
  • a construction unit used to construct a pairwise comparison matrix of the target layer, and calculate the weight vector and maximum eigenroot of the pairwise comparison matrix
  • a consistency index unit configured to obtain a consistency index based on the pairwise comparison matrix and the weight vector and the maximum characteristic root of the pairwise comparison matrix
  • a consistency ratio unit configured to obtain a consistency ratio based on the consistency index and a random consistency index, where the random consistency index is related to the number of rows or columns of the pairwise comparison matrix;
  • a weight determination unit configured to determine the weight of each target layer indicator element based on the weight vector of the pairwise comparison matrix when the consistency ratio satisfies the preset condition
  • the target layer is the second layer or the third layer, and the Values are related to application scenarios.
  • the evaluation module includes:
  • a scoring unit configured to determine the score of the second-level indicator element based on at least one third-level indicator element included in the second-level indicator element and the status information and weight of each third-level indicator element;
  • An evaluation unit is configured to generate the safety status evaluation result based on the score and corresponding weight of each second-layer indicator element.
  • the scoring unit includes:
  • the first scoring subunit determines the corresponding score of the third-level indicator element based on the status information of the third-level indicator element;
  • the second scoring subunit is used to calculate the score of the second-level indicator element based on the score and weight of each third-level indicator element included in the second-level indicator element.
  • the at least one second layer indicator element includes: TEE security status information, REE security status information, hardware and firmware security status information, and communication At least one of the security status information.
  • the third layer indicator elements included in the REE security status information include at least one of the following: malicious/spoofing/counterfeit applications, virus infection, application signature verification, verification startup, application layer data encryption, and software-based memory. Vulnerability defense, application layer trustworthiness;
  • the third layer indicator elements included in the TEE security status information include at least one of the following: malicious/deceptive/counterfeit applications, virus infection, trusted verification startup, trusted user interaction, biometric identification, sensitive information storage, and kernel real-time Security protection, system integrity measurement, kernel control flow integrity measurement
  • the third layer indicator elements included in the hardware and firmware security status information include at least one of the following: hardware root of trust, security unit, hardware encryption and decryption, secure boot, hardware-based memory vulnerability defense, memory encryption, and whether the firmware version meets Requirements, protection against side channel attacks and fault injection attacks;
  • the third layer indicator elements included in the communication security status information include at least one of the following: cellular network communication, Wi-Fi communication, communication protocol security, VPN, and DNS security analysis.
  • a security status assessment needs to be performed, for example, when a security status query request for querying the security status of an electronic device is received, the target security status information of the electronic device is collected, and the analytic hierarchy process is used to determine The weight of each indicator element in the target security status information is then used to obtain an accurate and comprehensive security status assessment result based on the target security status information and the determined weight, providing a more accurate assessment basis for businesses with high security requirements.
  • the safety status assessment device in the embodiment of the present application may be an electronic device or a component in the electronic device, such as an integrated circuit or chip.
  • the electronic device may be a terminal or other devices other than the terminal.
  • the electronic device can be a mobile phone, a tablet computer, a notebook computer, a handheld computer, a vehicle-mounted electronic device, a mobile internet device (Mobile Internet Device, MID), or augmented reality (AR)/virtual reality (VR).
  • the security status assessment device in the embodiment of the present application may be a device with an operating system.
  • the operating system can be an Android operating system, an iOS operating system, or other possible operating systems, which are not specifically limited in the embodiments of this application.
  • the security status assessment device provided by the embodiments of the present application can implement each process implemented by the method embodiments in Figures 1 to 3. To avoid duplication, they will not be described again here.
  • this embodiment of the present application also provides an electronic device 500, including a processor 501 and a memory 502.
  • the memory 502 stores programs or instructions that can be run on the processor 501.
  • each step of the above security status assessment method embodiment is implemented, and the same technical effect can be achieved. To avoid duplication, the details will not be described here.
  • FIG. 6 is a schematic diagram of the hardware structure of an electronic device implementing an embodiment of the present application.
  • the electronic device 600 includes but is not limited to: radio frequency unit 601, network module 602, audio output unit 603, input unit 604, sensor 605, display unit 606, user input unit 607, Interface unit 608, memory 609, processor 6010 and other components.
  • the electronic device 600 may also include a power supply (such as a battery) that supplies power to various components.
  • the power supply may be logically connected to the processor 6010 through a power management system, thereby managing charging, discharging, and function through the power management system. Consumption management and other functions.
  • the structure of the electronic device shown in Figure 6 does not constitute a limitation on the electronic device.
  • the electronic device may include more or less components than shown in the figure, or combine certain components, or arrange different components, which will not be described again here. .
  • the processor 6010 is used to collect target security status information, the target security status information includes at least one second layer indicator element, and each of the second layer indicator elements includes at least one third layer indicator element and each of the Describe the status information of the third-level indicator elements;
  • the processor 6010 is also configured to use the analytic hierarchy process to determine the weight of each of the second-level indicator elements and each of the third-level indicator elements;
  • the processor 6010 is also configured to generate a security status assessment result of the electronic device according to the target security status information and the weight.
  • the processor 6010 is also used to construct a pairwise comparison matrix of the target layer, and calculate the weight vector and maximum eigenroot of the pairwise comparison matrix;
  • the consistency index and the random consistency index a consistency ratio is obtained, and the random consistency index is related to the number of rows or columns of the pairwise comparison matrix;
  • the target layer is the second layer or the third layer
  • the values in the pairwise comparison matrix are related to application scenarios.
  • the processor 6010 is further configured to determine the second layer based on at least one third layer indicator element included in the second layer indicator element and the status information and weight of each third layer indicator element. Rating of indicator elements;
  • the security Status assessment results.
  • the processor 6010 is also configured to determine the corresponding score of the third-layer indicator element based on the status information of the third-layer indicator element;
  • the score of the second-level indicator element is calculated.
  • the method is applied to electronic devices that support Trusted Execution Environment TEE and Rich Execution Environment REE, and the at least one second layer indicator element includes: TEE security status information, REE security status information, hardware and firmware security status At least one of information and communication security status information.
  • the third layer indicator elements included in the REE security status information include at least one of the following: malicious/spoofing/counterfeit applications, virus infection, application signature verification, verification startup, application layer data encryption, and software-based memory. Vulnerability defense, application layer trustworthiness;
  • the third layer indicator elements included in the TEE security status information include at least one of the following: malicious/deceptive/counterfeit applications, virus infection, trusted verification startup, trusted user interaction, biometric identification, sensitive information storage, and kernel real-time Security protection, system integrity measurement, kernel control flow integrity measurement;
  • the third layer indicator elements included in the hardware and firmware security status information include at least one of the following: hardware root of trust, security unit, hardware encryption and decryption, secure boot, hardware-based memory vulnerability defense, memory encryption, and whether the firmware version meets Requirements, protection against side channel attacks and fault injection attacks;
  • the third layer indicator elements included in the communication security status information include at least one of the following: cellular network communication, Wi-Fi communication, communication protocol security, virtual private network (Virtual Private Network, VPN), domain name system (Domain Name System, DNS) secure resolution.
  • a security status assessment needs to be performed, for example, when a security status query request for querying the security status of an electronic device is received, the target security status information of the electronic device is collected, and the analytic hierarchy process is used to determine The weight of each indicator element in the target security status information is then used to obtain an accurate and comprehensive security status assessment result based on the target security status information and the determined weight, providing a more accurate assessment basis for businesses with high security requirements.
  • the input unit 604 may include a graphics processor (Graphics Processing Unit, GPU) 6041 and microphone 6042, the graphics processor 6041 processes image data of still pictures or videos obtained by an image capture device (such as a camera) in a video capture mode or an image capture mode.
  • the display unit 606 may include a display panel 6061, which may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like.
  • the user input unit 607 includes a touch panel 6071 and at least one of other input devices 6072 . Touch panel 6071, also called touch screen.
  • the touch panel 6071 may include two parts: a touch detection device and a touch controller.
  • Other input devices 6072 may include but are not limited to physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, and joysticks, which will not be described again here.
  • the memory 609 can be used to store software programs and various data.
  • the memory 609 can mainly include a first storage area for storing programs or instructions and a second storage area for storing data.
  • the first storage area can store an operating system and at least one function. Required applications or instructions (such as sound playback function, image playback function, etc.), etc.
  • memory 609 may include volatile memory or non-volatile memory, or memory 609 may include both volatile and non-volatile memory.
  • non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electrically removable memory.
  • Volatile memory can be random access memory (Random Access Memory, RAM), static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random access memory (Synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (Double Data Rate SDRAM, DDRSDRAM), enhanced synchronous dynamic random access memory (Enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (Synch link DRAM) , SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DRRAM).
  • RAM Random Access Memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • synchronous dynamic random access memory Synchronous DRAM, SDRAM
  • Double data rate synchronous dynamic random access memory Double Data Rate SDRAM, DDRSDRAM
  • Enhanced SDRAM, ESDRAM synchronous link dynamic random access memory
  • Synch link DRAM synchronous link dynamic random access memory
  • SLDRAM direct memory bus random access memory
  • the processor 6010 may include one or more processing units; optionally, the processor 6010 integrates an application processor and a modem processor, where the application processor mainly handles operations related to the operating system, user interface, application programs, etc.,
  • the modem processor mainly processes wireless communication signals, such as base With processor. It can be understood that the above modem processor may not be integrated into the processor 6010.
  • Embodiments of the present application also provide a readable storage medium.
  • Programs or instructions are stored on the readable storage medium.
  • the program or instructions are executed by a processor, each process of the above embodiments of the security status assessment method is implemented and can achieve The same technical effects are not repeated here to avoid repetition.
  • the processor is the processor in the electronic device described in the above embodiment.
  • the readable storage media includes computer-readable storage media, such as computer read-only memory, random access memory, magnetic disks or optical disks.
  • An embodiment of the present application further provides a chip.
  • the chip includes a processor and a communication interface.
  • the communication interface is coupled to the processor.
  • the processor is used to run programs or instructions to implement the above embodiments of the security status assessment method. Each process can achieve the same technical effect. To avoid repetition, we will not go into details here.
  • chips mentioned in the embodiments of this application may also be called system-on-chip, system-on-a-chip, system-on-a-chip or system-on-a-chip.
  • Embodiments of the present application provide a computer program product.
  • the program product is stored in a storage medium.
  • the program product is executed by at least one processor to implement each process of the above security status assessment method embodiment, and can achieve the same technology. The effect will not be described here to avoid repetition.
  • the methods of the above embodiments can be implemented by means of software plus the necessary general hardware platform. Of course, it can also be implemented by hardware, but in many cases the former is better. implementation.
  • the technical solution of the present application can be embodied in the form of a computer software product that is essentially or contributes to the existing technology.
  • the computer software product is stored in a storage medium (such as ROM/RAM, disk , optical disk), including several instructions to cause a terminal (which can be a mobile phone, computer, server, or network device, etc.) to execute the methods described in various embodiments of this application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

本申请公开了一种安全状态评估方法及装置、电子设备和可读存储介质,属于通信技术领域。所述安全状态评估方法包括:采集目标安全状态信息,所述目标安全状态信息包括至少一个第二层指标要素,每一所述第二层指标要素包括至少一个第三层指标要素以及每一个所述第三层指标要素的状态信息;采用层次分析法确定每一所述第二层指标要素和每一所述第三层指标要素的权重;根据所述目标安全状态信息以及所述权重,生成电子设备的安全状态评估结果。

Description

一种安全状态评估方法及装置、电子设备和可读存储介质
相关申请的交叉引用
本申请主张在2022年3月30日在中国提交的中国专利申请No.202210328660.7的优先权,其全部内容通过引用包含于此。
技术领域
本申请属于通信技术领域,具体涉及一种安全状态评估方法及装置、电子设备和可读存储介质。
背景技术
移动应用服务提供商在为用户提供服务时,会进行相应的业务安全风险评估,需要考虑移动设备是否安全、用户行为是否异常、发起移动支付的应用是否可信等。然而目前的安全风险评估方案得到的安全风险评估结果不够准确,难以满足用户对高业务安全的需求。
发明内容
本申请实施例的目的是提供一种安全状态评估方法及装置、电子设备和可读存储介质,能够解决相关技术中安全风险评估方案得到的安全风险评估结果不够准确,难以满足用户对高业务安全的需求的问题。
第一方面,本申请实施例提供了一种安全状态评估方法,该方法包括:
采集目标安全状态信息,所述目标安全状态信息包括至少一个第二层指标要素,每一所述第二层指标要素包括至少一个第三层指标要素以及每一个所述第三层指标要素的状态信息;
采用层次分析法确定每一所述第二层指标要素和每一所述第三层指标要素的权重;
根据所述目标安全状态信息以及所述权重,生成电子设备的安全状态评估结果。
第二方面,本申请实施例提供了一种安全状态评估装置,该装置包括:
采集模块,用于采集目标安全状态信息,所述目标安全状态信息包括至少一个第二层指标要素,每一所述第二层指标要素包括至少一个第三层指标要素以及每一个所述第三层指标要素的状态信息;
权重确定模块,用于采用层次分析法确定每一所述第二层指标要素和每一所述第三层指标要素的权重;
评估模块,用于根据所述目标安全状态信息以及所述权重,生成电子设备的安全状态评估结果。
第三方面,本申请实施例提供了一种电子设备,该电子设备包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第一方面所述的方法的步骤。
第四方面,本申请实施例提供了一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如第一方面所述的方法的步骤。
第五方面,本申请实施例提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如第一方面所述的方法的步骤。
第六方面,本申请实施例提供一种计算机程序产品,该程序产品被存储在存储介质中,该程序产品被至少一个处理器执行以实现如第一方面所述的方法的步骤。
第七方面,本申请实施例提供一种电子设备,其中,所述电子设备用于执行如第一方面所述的方法的步骤。
在本申请实施例中,在需要进行安全状态评估时,例如在接收到查询电子设备的安全状态的安全状态查询请求等情况时,通过采集电子设备的目标安全状态信息,并采用层次分析法确定目标安全状态信息中各个指标要素的权重,继而根据目标安全状态信息和确定的权重,从而可以得到准确、全面的安全状态评估结果,为高安全要求的业务提供了更准确的评估依据。
附图说明
图1为本申请实施例提供的一种安全状态评估方法的流程示意图;
图2为本申请实施例提供的支持TEE和REE的电子设备的结构示意图;
图3为本申请实施例提供的第二层指标要素和第三层指标要素的获取的流程示意图;
图4为本申请实施例提供的一种安全状态评估装置的结构示意图;
图5为本申请实施例提供的一种电子设备的结构示意图;
图6为实现本申请实施例的一种电子设备的硬件结构示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员获得的所有其他实施例,都属于本申请保护的范围。
本申请的说明书和权利要求书中的术语“第一”、“第二”等是用于区别类似的对象,而不用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施,且“第一”、“第二”等所区分的对象通常为一类,并不限定对象的个数,例如第一对象可以是一个,也可以是多个。此外,说明书以及权利要求中“和/或”表示所连接对象的至少其中之一,字符“/”,一般表示前后关联对象是一种“或”的关系。
下面结合附图,通过具体的实施例及其应用场景对本申请实施例提供的安全状态评估方法及装置、电子设备和可读存储介质进行详细地说明。
请参考图1,图1为本申请实施例提供的一种安全状态评估方法的流程示意图。如图1所示,本申请一方面实施例提供了一种安全状态评估方法,该方法包括:
步骤101:采集目标安全状态信息,所述目标安全状态信息包括至少一个第二层指标要素,每一所述第二层指标要素包括至少一个第三层指标要素以及每一个所述第三层指标要素的状态信息;
本实施例中,可选地,在需要进行电子设备的安全状态评估时,例如,在接收到用于查询所述电子设备的安全状态的安全状态查询请求时,可以采集电子设备的目标安全状态信息,以供安全状态评估。其中,查询方可以为用户本身,也可以为应用服务器。在查询方为应用服务器时,应用服务器与本端电子设备之间的传输安全机制可以采用安全传输层协议(Transport Layer Security,TLS),以提高传输安全性。
其中,为了更全面地评估电子设备的安全状态,采集的目标安全状态信息可以包括涉及电子设备安全的各类信息,具体可以根据实际评估需求确定。示例性地,目标安全状态信息包括至少一个第二层指标要素,而每一个第二层指标要素包括至少一个第三层指标要素以及每一个第三层指标要素的状态信息,也就是说,第二层指标要素和第三层指标要素之间具有从属关系。
本申请实施例中,可选地,指标要素具体可以包括三层,即第一层指标要素、第二层指标要素和第三层指标要素,其中,电子设备的综合安全评估即为第一层指标要素,对应于电子设备的安全状态评估结果,第一层指标要素包括至少一个第二层指标要素,而第二层指标要素则包括至少一个第三层指标要素,即,第三层指标要素从属于某一第二层指标要素,而第二层指标要素则从属于第一层指标要素。
步骤102:采用层次分析法确定每一所述第二层指标要素和每一所述第三层指标要素的权重;
本实施例中,可选地,层次分析法(Analytic Hierarchy Process,AHP)可以应用在安全状态评估模型中,即基于层次分析法建立安全状态评估模型。通过运用层次分析法进行分析,可以方便地确定出目标安全状态信息中包含的各项指标要素的权重,继而实现对目标安全状态信息的全面评估。可选地,安全状态评估模型可以存储在电子设备的可信执行环境中,以提高其安全性。 该安全状态评估模型可以用于评估电子设备的安全状态。具体来说,可以将采集到的目标安全状态信息作为安全状态评估模型的输入,按照对应的安全状态评估策略进行分析处理,以生成电子设备的安全状态评估结果。
步骤103:根据所述目标安全状态信息以及所述权重,生成电子设备的安全状态评估结果。
本实施例中,在确定出目标安全状态信息中的各项指标要素的权重之后,即可根据目标安全状态信息以及对应的权重,计算得到电子设备的安全状态评估结果,从而全面、客观的考量各项指标要素对安全状态的影响,得到更为准确的安全状态评估结果。
本申请的一些实施例中,可选地,安全状态评估结果为分值,也即安全状态评估结果以分值的形式体现。可选地,分值与电子设备的安全性呈正相关,例如,安全状态评估结果的分值范围为0-10,0表示安全性最低,而10表示安全性最高,从而为各项应用业务的安全风险评估提供更准确的安全评估依据。
由此,在本申请实施例中,在需要进行安全状态评估时,例如在接收到查询电子设备的安全状态的安全状态查询请求等情况时,通过采集电子设备的目标安全状态信息,并采用层次分析法确定目标安全状态信息中各个指标要素的权重,继而根据目标安全状态信息和确定的权重,从而可以得到准确、全面的安全状态评估结果,为高安全要求的业务提供了更准确的评估依据。
本申请的一些实施例中,所述采用层次分析法确定每一所述第二层指标要素和每一所述第三层指标要素的权重包括:
构建目标层的成对比较矩阵,并计算所述成对比较矩阵的权重向量和最大特征根;
根据所述成对比较矩阵以及所述成对比较矩阵的权重向量和最大特征根,得到一致性指标;
根据所述一致性指标以及随机一致性指标,得到一致性比率,所述随机一致性指标与所述成对比较矩阵的行数或列数相关;
在所述一致性比率满足预设条件的情况下,根据所述成对比较矩阵的权重向量确定每一目标层指标要素的权重;
其中,所述目标层为所述第二层或所述第三层,所述成对比较矩阵中的数值与应用场景相关。
本实施例中,在采用层次分析法确定每一个第二层指标要素的权重和每一个第三层指标要素的权重时,均可采用上述步骤进行确定。
本实施例中,构建的目标层的成对比较矩阵中的数值与应用场景相关。示例性地,可以根据“在评估一个多因子的权重时,进行因子之间的两两互相比较,从而能更精确地确定各因子在一个评估结果中各自所占的权重”的理论,结合经验以及本实施例中的具体应用场景,对成对比较矩阵进行赋值。
例如,在评估目标层的指标要素的权重时,通过进行目标层指标要素之间的两两互相比较,从而能够更精确地确定各指标要素在一个评估结果中各自所占的权重,即对应于下表1。
示例性地,在确定第二层指标要素的权重时,对于该第二层中从属于第一层指标要素的指标要素,即所有的第二层指标要素,构造成对比较矩阵,并计算该成对比较矩阵的权重向量和最大特征根,其中权重向量又称为权向量,在构造成对比较矩阵时,可以采用成对比较法和1-9比较尺度来构造。例如,令A为成对比较矩阵:
A=(aij)n×n,aij>0,aji=1/aij
其中,n为第二层的指标要素的数量,i、j分别表示指标i和指标j。
表1:1-9比较尺度
本实施例中,在采用层次分析法确定每一个第二层指标要素的权重时,具体步骤如下:
步骤一:将成对比较矩阵A的列向量归一化:
步骤二:对按行求和得:
步骤三:对归一化:其中则W=(w1,w2,w3,...,wn)T,即为近似特征向量,也即权重向量;
步骤四:计算最大特征根近似值:
步骤五:一致性检验:
a)根据层次分析法,计算一致性指标CI=(λ-n)/(n-1);
b)随机一致性指标RI为衡量A的一致性指标CI的标准,RI的数值见下表2;
c)A的一致性指标CI与同阶的随机一致性指标RI之比称为一致性比率CR;
当一致性比率CR=CI/RI<0.1时,A的一致性被认可,可用A的特征向量作为权向量。
表2:随机一致性指标RI的数值
可以理解,当目标层指标要素为任意一个所述第二层指标要素包括的至少一个第三层指标要素时,同样可以参照上述步骤进行计算,确定出对应的权重,本实施例在此不再赘述。
本实施例中,目标层即为第二层或第三层。成对比较矩阵的随机一致性指标的与该成对比较矩阵的行数或列数相关,由于成对比较矩阵为方阵,即行数等于列数,则成对比较矩阵的行数/列数即为n,则通过查上表2即可确定出对应的随机一致性指标。
在一些实施例中,在采用层次分析法时,需要确保目标层指标要素的数量为三个以上,并且,确保所有目标层指标要素的权重之和等于1,若出现不等于1的情况,则需要进行权重调整。
本申请的一些实施例中,所述根据所述目标安全状态信息以及所述权重, 生成电子设备的安全状态评估结果包括:
根据所述第二层指标要素包括的至少一个第三层指标要素以及每一个所述第三层指标要素的状态信息和权重,确定所述第二层指标要素的评分;
根据每一个所述第二层指标要素的评分以及对应的权重,生成所述安全状态评估结果。
本实施例中,在确定出每一个第二层指标要素包含的第三层指标要素的权重之后,即可以根据第二层指标要素包含的第三层指标要素的状态信息以及权重,计算出每一个第二层指标要素的评分。也就是说,对于任意一个第二层指标要素的评分,是根据该第二层指标要素包含的所有第三层指标要素的状态信息以及每一个第三层指标要素对应的权重确定的。进一步地,在确定出每一个第二层指标要素的评分之后,即可根据每一个第二层指标要素的评分以及对应的权重,生成安全状态评估结果,该安全状态评估结果即对应于综合安全评估,在层次分析法中为第一层指标要素。由此,通过综合各项第三层指标要素,可以得到更为准确的第二层指标要素的评分,而通过综合各项第二层指标要素,最终提升了得到的安全状态评估结果的准确性。
本申请的另一些实施例中,所述根据所述第二层指标要素包括的至少一个第三层指标要素以及每一个所述第三层指标要素的状态信息和权重,确定所述第二层指标要素的评分包括:
根据所述第三层指标要素的状态信息,确定对应的所述第三层指标要素的评分;
根据所述第二层指标要素包括的每一个第三层指标要素的评分以及权重,计算所述第二层指标要素的评分。
本实施例中,可以根据每一个第三层指标要素对应的状态信息来确定对应的第三层指标要素的评分,也即对每一个二级指标要素进行评分,之后,可以根据每一个第二层指标要素中包含的所有第三层指标要素的评分以及每一个第三层指标要素的权重,计算出每一个第二层指标要素的评分。
本申请的一些实施例中,可选地,根据第二层指标要素包括的每一个第 三层指标要素的评分以及权重,计算第二层指标要素的评分时,可以采用加权求和的方式计算得到。同样的,根据每一个第二层指标要素的评分以及对应的权重,生成安全状态评估结果时,也可以采用加权求和的方式计算得到。
本申请的另一些实施例中,所述方法应用于支持可信执行环境TEE和富执行环境REE的电子设备,所述至少一个第二层指标要素包括:TEE安全状态信息、REE安全状态信息、硬件及固件安全状态信息以及通信安全状态信息中的至少一者。
本申请实施例中,可选地,富执行环境(Rich Execution Environment,REE)中运行有富执行环境操作系统,而可信执行环境(Trusted Execution Environment,TEE)中运行有可信执行环境操作系统。
在一些实施例中,可选地,可以通过REE中的REE安全检测模块和REE应用程序接口(Application Programming Interface,API)来收集REE安全状态信息。
本实施例中,可选地,REE与TEE之间具有协定的通信代理,建立有通信/数据传输通道,因此,REE侧可以通过该传输通道向TEE侧发送安全信息查询请求以及REE安全状态信息。
在一些实施例中,可选地,可以通过TEE中的TEE安全检测模块和Trusted Internal应用程序接口(Application Programming Interface,API)来收集TEE安全状态信息。
在一些实施例中,可选地,REE安全状态信息包括的第三层指标要素包括以下至少一者:恶意/欺骗/伪冒应用、病毒感染、应用签名验证、验证启动、应用层数据加密、软件方式的内存漏洞防御、应用层可信度量,以及每一个第三层指标要素的状态信息,例如,第三层指标要素为恶意/欺骗/伪冒应用,对应的状态信息可以为不存在、未知、存在中的一者,又如,第三层指标要素为病毒感染,对应的状态信息可以为不存在、未知、存在中的一者,再如,第三层指标要素为验证启动,对应的状态信息可以为支持、不支持中的一者,每一个第三层指标要素对应的状态信息即通过采集得到。其中,每一个第三 层指标要素的状态信息对应一个评分,每一个第三层指标要素对应一个权重。
在一些实施例中,可选地,TEE安全状态信息的第三层指标要素包括以下至少一者:恶意/欺骗/伪冒应用、病毒感染、可信验证启动、可信用户交互、生物特征识别、敏感信息存储、内核实时安全保护、系统完整性度量、内核控制流完整性度量,以及每一个第三层指标要素的状态信息,例如,第三层指标要素为恶意/欺骗/伪冒应用,对应的状态信息可以为不存在、未知、存在中的一者,又如,第三层指标要素为病毒感染,对应的状态信息可以为不存在、未知、存在中的一者,再如,第三层指标要素为可信验证启动,对应的状态信息可以为支持、不支持中的一者,每一个第三层指标要素对应的状态信息即通过采集得到。其中,每一个第三层指标要素的状态信息对应一个评分,每一个第三层指标要素对应一个权重。
在一些实施例中,可选地,硬件及固件安全状态信息包括的第三层指标要素包括以下至少一者:硬件可信根、安全单元、硬件加解密、安全启动、硬件方式的内存漏洞防御、内存加密、固件版本是否满足要求、防侧信道攻击、防故障注入攻击,以及每一个第三层指标要素的状态信息,例如,第三层指标要素为硬件可信根,对应的状态信息可以为支持、不支持中的一者,又如,第三层指标要素为安全单元,对应的状态信息可以为支持、不支持中的一者,再如,第三层指标要素为硬件加解密,对应的状态信息可以为支持、不支持中的一者,每一个第三层指标要素对应的状态信息即通过采集得到。其中,每一个第三层指标要素的状态信息对应一个评分,每一个第三层指标要素对应一个权重。
在一些实施例中,可选地,通信安全状态信息包括的第三层指标要素包括以下至少一者:蜂窝网络通信、Wi-Fi通信、通信协议安全、VPN、DNS安全解析,以及每一个第三层指标要素的状态信息,例如,第三层指标要素为蜂窝网络通信,对应的状态信息可以为安全、未知、伪基站中的一者,又如,第三层指标要素为Wi-Fi通信,对应的状态信息可以为可信、公开、未知、恶意中的一者,再如,第三层指标要素为通信协议安全,对应的状态信 息可以为TLS、互联网安全协议(Internet Protocol Security,IPSec)、自定义、无中的一者,每一个第三层指标要素对应的状态信息即通过采集得到。其中,每一个第三层指标要素的状态信息对应一个评分,每一个第三层指标要素对应一个权重。
其中,在根据第三层指标要素的状态信息进行评分时,可以设定相应的评分标准,不同状态信息对应不同的评分。
本申请实施例中,可选地,在进行安全状态评估时,参考通用漏洞评分系统。其中,加权算数平均法即在n个观测数据中,每个观测值根据对未来预测值影响的程度不同,给予不同的权数,将各个时期的观测值乘以自己的权数,然后将它们的和除以各个权数之和,所得之商就是未来预测值,其数学模型为:
其中,为加权算术平均值,即预测值,Yi为不同时期的观测值(i=1,2,…,n),n为总体中的数据点数,Wi为各个观察值对应的权数,Wi在0到1之间,即0≤Wi≤1。
下面结合具体数据信息介绍上述安全状态评估方法。
本申请的一些实施例中,定义了如下的第二层指标要素,具体见如下表3。
表3:第二层指标要素和权重
采用层次分析法确定第二层指标要素的权重的步骤如下:
步骤一:构造第二层指标要素的成对比较矩阵S:
具体地,根据“在评估一个多因子的权重时,进行因子之间的两两互相比较,从而能更精确地确定各因子在一个评估结果中各自所占的权重”的理 论,结合经验以及本实施例中的具体应用场景,对成对比较矩阵进行赋值,以得到下方的成对比较矩阵。
步骤二:对成对比较矩阵S进行列向量归一化、然后求行和、最后对行和进行归一化,得到第二层指标要素的权重向量W。
列向量归一化:
求行和并归一化:
步骤三:计算成对比较矩阵S和权重向量W的乘积,计算成对比较矩阵S的最大特征根。
计算成对比较矩阵S和权重向量W的乘积:
计算成对比较矩阵S的最大特征根:
步骤四:成对比较矩阵S的一致性校验。
根据成对比较矩阵S、权重向量W、以及成对比较矩阵S的最大特征根λmax(S),计算一致性指标CI:
通过查上述表2中随机一致性指标RI的数值,可知,当n=4时,即第二层指标要素的数量为4时,随机一致性指标RI=0.89。
根据一致性指标CI和随机一致性指标RI,可以计算得到一致性比率:
由于CR小于0.1,即成对比较矩阵S通过一致性检验,因此,求得第二层指标要素SA、SB、SC、SD对S的权重分别为:WA,B,C,D=(0.122,0.263,0.558,0.057)T
本申请的一些实施例中,定义了如下的REE安全状态信息包括的第三层指标要素及对应的权重,具体见如下表4。
表4:REE安全状态信息包括的第三层指标要素和权重
同理,采用层次分析法确定第三层指标要素的权重时,REE安全状态信息包括的第三层指标要素的成对比较矩阵SA为:
计算得到SA1、SA2、SA3、SA4、SA5、SA6、SA7、SA8对SA的权重分别为:WA1,A2,A3,A4,A5,A6,A7,A8=(0.224,0.391,0.119,0.028,0.028,0.119,0.062,0.028)T,且计 算得到一致性比率CRSA=0.034<0.1,通过一致性检验。
本申请的一些实施例中,定义了如下的TEE安全状态信息包括的第三层指标要素及对应的权重,具体见如下表5。
表5:TEE安全状态信息包括的第三层指标要素和权重
同理,采用层次分析法确定第三层指标要素的权重时,TEE安全状态信息包括的第三层指标要素的成对比较矩阵SB为:
计算得到SB1、SB2、SB3、SB4、SB5、SB6、SB7、SB8、SB9、SB10、SB11对SB的权重分别为:
WB1,B2,B3,B4,B5,B6,B7,B8,B9,B10,B11
=(0.015,0.020,0.261,0.030,0.044,0.090,0.129,0.186,0.030,0.129,0.064)T
计算得到一致性比率,CRSB=0.029<0.1,通过一致性检验。
本申请的一些实施例中,定义了如下的硬件及固件安全状态信息包括的第三层指标要素及对应的权重,具体见如下表6。
表6:硬件及固件安全状态信息包括的第三层指标要素和权重
同理,采用层次分析法确定第三层指标要素的权重时,硬件及固件安全状态信息包括的第三层指标要素的成对比较矩阵SC为:
计算得到SC1、SC2、SC3、SC4、SC5、SC6、SC7、SC8、SC9对SC的权重分别为:
WC1,C2,C3,C4,C5,C6,C7,C8,C9
=(0.322,0.238,0.150,0.065,0.093,0.050,0.042,0.023,0.018)T
计算得到一致性比率,CRSC=0.054<0.1,通过一致性检验。
本申请的一些实施例中,定义了如下的通信安全状态信息包括的第三层指标要素及对应的权重,具体见如下表7。
表7:通信安全状态信息包括的第三层指标要素和权重
同理,采用层次分析法确定第三层指标要素的权重时,通信安全状态信息包括的第三层指标要素的成对比较矩阵SD为:
计算得到SD1、SD2、SD3、SD4、SD5对SD的权重分别为:
WD1,D2,D3,D4,D5=(0.310,0.459,0.105,0.063,0.063)T
计算得到一致性比率,CRSC=0.015<0.1,通过一致性检验。
由此,对于安全状态评估结果S,则有:
S=SA*WA+SB*WB+SC*WC+SD*WD
其中,变量SA、SB、SC、SD为第二层指标要素的评分;变量WA、WB、WC、WD为第二层指标要素在综合评价得到安全状态评估结果时的重要程度,即权重,其中,WA+WB+WC+WD=1;S、SA、SB、SC、SD是小于或等于10的正数。
可选地,S采取10级评级机制,“0”代表安全性最低,“10”代表安全 性最高。安全等级可根据最终的安全状态评估结果S分为低、中、高三等,例如:S属于[0,4),则为低等安全级别;S属于[4,7),则为中等安全级别;S属于[7,10],则为高等安全级别。
本申请的一些实施例中,SA、SB、SC、SD的计算公式如下:
SA=SA1*WA1+SA2*WA2+...+SAi*WAi+...+SAn*WAn
SB=SB1*WB1+SB2*WB2+...+SBi*WBi+...+SBn*WBn
SC=SC1*WC1+SC2*WC2+...+SCi*WCi+...+SBn*WCn
SD=SD1*WD1+SD2*WD2+...+SDi*WDi+...+SDn*WDn
其中,变量SA1、SAn、SB1 SBn等为第三层指标要素的评分,都是小于或等于10的正数;变量WA1 WAn、WB1、WBn等分别表示各个第三层指标要素的重要程度,即权重,同时满足以下关系:
WA1+WA2+...+WAi+...+WAn=1;
WB1+WB2+...+WBi+...+WBn=1;
WC1+WC2+...+WCi+...+WCn=1;
WD1+WD2+...+WDi+...+WDn=1。
下面示例性地介绍上述计算过程。
假设:REE安全状态信息包括的第三层指标要素、对应的状态信息、评分以及对应的权重具体为:恶意/欺骗/伪冒应用(SA1)的状态信息为不存在、则评分为10分,权重为0.2;病毒感染(SA2)的状态信息为未知,则评分为5分,权重为0.25;应用签名验证(SA3)的状态信息为支持、则评分为10分,权重为0.15;验证启动(SA4)的状态信息为支持、则评分为10分,权重为0.10;应用层数据加密(SA5)的状态信息为支持、则评分为10分,权重为0.05;软件方式的内存漏洞防御(SA6)的状态信息为部分支持、则评分为5分,权重为0.15;应用层可信度量(SA7)的状态信息为未启用、则评分为0分,权重为0.10,则REE安全状态信息的评分为:
SA=SA1*WA1+SA2*WA2+SA3*WA3+SA4*WA4+SA5*WA5+SA6*WA6+SA7*WA7
=10*0.2+5*0.25+10*0.15+10*0.1+10*0.05+5*0.15+10*0
=7.0
同样的,假设计算得到SB=6.5,SC=6.0,SD=7.25。
则安全状态评估结果为:
S=SA*WA+SB*WB+SC*WC+SD*WD
=7.0*0.2+6.5*0.3+6.0*0.4+7.25*0.1
=6.5。
则对应的安全等级位于[4,7),属于中等安全级别。
本申请的一些实施例中,所述方法还包括:
采集所述电子设备的安全能力信息,并采用所述电子设备的私钥对所述安全能力信息和所述安全状态评估结果进行数字签名,其中,发送所述安全状态查询请求的查询方具有与所述私钥配对的公钥;
根据所述安全能力信息、所述安全状态评估结果以及签名生成综合安全信息,并将所述综合安全信息发送给所述查询方。
其中,所述安全能力信息包括可信执行环境信息、可信用户交互信息、硬件加解密信息、安全单元信息、内存加密信息、防侧信道攻击信息、防故障注入攻击信息。
在得到电子设备的安全能力信息和安全状态评估结果之后,为了解决相关技术中每次进行安全评估时都需要服务器对安全评估结果进行签名而导致的时延,本申请实施例中,在本端电子设备的TEE中即采用电子设备的私钥对安全能力信息和安全状态评估结果进行数字签名,从而在提高安全性能的同时,降低了时延,提高了系统性能。可选地,查询方具有与电子设备的私钥配对的公钥,可以利用该公钥对电子设备返回的综合安全信息进行验证,以确定其真实性和完整性。
由此,通过综合电子设备当前的安全状态信息以及电子设备的安全能力信息,可以更加全面地评估电子设备的安全情况,提供电子设备细颗粒度的安全性能评估,为各项应用业务的安全风险评估提供更准确的安全评估依据。
请参考图2,图2为本申请实施例提供的支持TEE和REE的电子设备的 结构示意图。如图2所示,本申请实施例中,查询方可以为手机银行服务器、移动支付服务器、企业应用服务器或者其他高安全应用服务器等。电子设备支持可信执行环境TEE和富执行环境REE,REE中运行有富执行环境操作系统REE OS,而TEE中运行有可信执行环境操作系统TEE OS。
下面结合附图2介绍电子设备各部分功能以及各第二层指标要素和第三层指标要素的获取流程。
·REE侧
a)安全能力和安全状态Client APP:
接收来自用户或应用服务器“电子设备安全能力和安全状态查询模块”的安全能力查询和当前的安全状态评估的请求,该请求中包含“安全能力和安全状态Client APP”的标识和应用服务器的授权令牌;
如果该请求来自用户对本电子设备的查询,则该请求中只包含“安全能力和安全状态Client APP”的标识;
通过“REE安全检测模块”和“REE API”收集REE侧的安全状态信息(如是否存在恶意软件、系统是否感染病毒、网络连接是否安全等);
向“安全能力和安全状态Client API”发起安全能力查询和当前的安全状态评估的调用请求,该请求中包含“安全能力和安全状态Client APP”的标识、应用服务器的授权令牌以及REE安全状态信息;
接收来自“安全能力和安全状态Client API”相应的响应(包括安全能力信息和当前的安全状态评估结果、以及电子设备的签名等);
其中,安全能力,主要包括:可信执行环境、可信用户交互、硬件加解密、安全单元、内存加密、防侧信道攻击、防故障注入攻击等;
当前安全状态的评估结果是一个分值(如0-10,0标识安全性最低,而10表示安全性最高),当前安全状态评估的因素,除了Android操作系统的安全特征(如应用访问控制、文件系统访问控制、数据加密、数据完整性保护、安全锁屏和认证、设备配置文件的完整性验证等)以外,主要还包括:系统是否存在恶意软件或感染病毒、硬件和固件的配置是否被篡改、系统软件版 本是否满足要求、系统是否被Root、内存是否遭受攻击、内核及内核配置是否被篡改、网络链接是否足够安全等;
将接收到的安全能力信息和当前的安全状态评估结果、以及电子设备的签名等,返回给应用服务器“电子设备安全能力和安全状态查询模块”;
向用户呈现本电子设备的安全能力和当前的安全状态;
b)安全能力和安全状态Client API:
接收来自电子设备“安全能力和安全状态Client APP”的安全能力查询和当前的安全状态评估的请求,该请求中包含“安全能力和安全状态Client APP”的标识、应用服务器的授权令牌以及REE安全状态信息;
通过REE侧的通信代理和TEE侧的通信代理,向TEE侧“安全能力和安全状态Trusted App”发起调用请求,该请求中包含“安全能力和安全状态Client APP”的标识、应用服务器的授权令牌以及REE安全状态信息;
接收来自TEE侧“安全能力和安全状态Trusted App”相应的响应(包括安全能力信息和当前的安全状态评估结果、以及电子设备的签名);
将接收到的本电子设备的安全能力信息和当前的安全状态评估结果、及电子设备的签名,返回给电子设备“安全能力和安全状态Client APP”;
·TEE侧
a)安全能力和安全状态Trusted APP:
接收来自电子设备REE侧“安全能力和安全状态Client API”的安全能力查询和当前的安全状态评估的请求,该请求中包含“安全能力和安全状态Client APP”的标识、应用服务器的授权令牌以及REE安全状态信息;根据相应的安全策略,检查该访问请求是否有效:
根据本电子设备“安全能力和安全状态Client APP”的标识,检查该应用是否有调用“安全能力和安全状态Trusted APP”的权限;
验证应用服务器的授权令牌的有效性(如令牌是否来自本电子设备的管理服务器、令牌是否过期等),并检查该服务器否有调用“安全能力和安全状态Trusted APP”的权限;
通过“TEE安全检测模块”和“Trusted Internal API”收集TEE侧的安全状态信息(如是否存在恶意软件、系统是否感染病毒、内核的配置是否篡改、堆栈中的数据区域是否存在执行操作等);
通过模块“安全状态评估”根据接收到的REE安全状态信息和TEE安全状态信息,基于安全状态评估模型或方法,对本电子设备的安全状态进行实时评估,获得一个当前安全状态的评估结果;
通过模块“安全能力管理”根据安全能力查询请求,确定需要返回的安全能力信息;
使用本电子设备的私钥对安全能力信息和当前的安全状态评估结果进行数字签名;
通过REE侧的通信代理和TEE侧的通信代理,向电子设备REE侧“安全能力和安全状态Client API”返回本电子设备的安全能力信息和当前的安全状态评估结果、以及电子设备的签名;
接收来自电子设备管理服务器的“安全能力配置”对“安全能力管理”的配置和更新;
接收来自电子设备管理服务器的“安全状态评估模型管理”对“安全状态评估”的配置和更新。
其中,在电子设备管理服务器中:
·终端安全能力和安全状态管理模块
a)授权管理
接收来自应用服务器中“电子设备安全能力和安全状态查询模块”的电子设备安全能力查询和安全状态评估的授权请求;
认证应用服务器或应用服务器的“电子设备安全能力和安全状态查询模块”;
为该应用服务器的“电子设备安全能力和安全状态查询模块”生成一个授权令牌;
将该授权令牌返回给应用服务器的“电子设备安全能力和安全状态查询 模块”;
b)安全能力配置
对电子设备“安全能力管理”中的安全能力进行配置和更新;
c)安全状态评估模型管理
对电子设备“安全状态评估”中的安全状态评估模型和安全评估策略进行配置和更新;
对安全状态评估模型进行增强。
其中,在应用服务器(手机银行、移动支付、企业应用等)的业务安全风险评估中:
·电子设备安全能力和安全状态查询模块
a)向电子设备“安全能力和安全状态API”发起安全能力查询和当前的安全状态评估的调用;
b)接收来自电子设备“安全能力和安全状态API”相应的响应(即电子设备的安全能力信息和安全状态评估结果、及电子设备的签名),并根据应用服务器的公钥验证该响应的真实性和完整性。
请参考图3,图3为本申请实施例提供的第二层指标要素和第三层指标要素的获取的流程示意图。如图3所示,本申请实施例中的第二层指标要素和第三层指标要素的获取包括以下:
1)应用服务器的“电子设备安全能力和安全状态查询模块”向电子设备REE侧“安全能力和安全状态Client APP”发起安全能力查询和当前的安全状态评估的请求(包含授权令牌),该请求消息的传输安全机制可采用TLS;
2)电子设备REE侧“安全能力和安全状态Client APP”通过“REE安全检测模块”和“REE API”收集REE安全状态信息;
3)电子设备REE侧“安全能力和安全状态Client APP”向电子设备REE侧“安全能力和安全状态Client API”发送安全能力查询和安全状态评估请求(包含授权令牌、REE安全状态信息);
4)电子设备REE侧“安全能力和安全状态Client API”将接收到的安全 能力查询和安全状态评估请求(包含授权令牌、REE安全状态信息),通过REE通信代理和TEE通信代理发送给TEE侧“安全能力和安全状态Trusted APP”;
5)TEE侧“安全能力和安全状态Trusted APP”验证授权令牌的有效性,并检查应用服务器是否有权限获得电子设备的安全能力和安全状态;如果验证授权令牌失败,则终止相关操作,返回错误信息,并提示应用服务器重新申请授权令牌;
6)TEE侧“安全能力和安全状态Trusted APP”通过“TEE安全检测模块”和“Trusted Internal API”采集TEE安全状态信息;
7)TEE侧“安全能力和安全状态Trusted APP”确定电子设备的安全能力信息和评估当前的安全状态;
7.1)通过“安全能力管理”模块确定本电子设备的安全能力信息;
7.2)通过“安全状态评估”模块,结合REE安全状态信息和TEE安全状态信息,评估本电子设备当前的安全状态;
8)TEE侧“安全能力和安全状态Trusted APP”使用电子设备的私钥,对安全能力信息和安全状态评估结果进行数字签名;
9)TEE侧“安全能力和安全状态Trusted APP”将安全能力信息和安全状态评估结果及签名,通过TEE通信代理和REE通信代理返回给REE侧“安全能力和安全状态Client API”;
10)REE侧“安全能力和安全状态Client API”将接收到的安全能力信息和安全状态评估结果及签名返回给REE侧“安全能力和安全状态Client APP”;
11)REE侧“安全能力和安全状态Client APP”将接收到的安全能力信息和安全状态评估结果及签名返回给应用服务器“电子设备安全能力和安全状态查询模块”,该返回消息的传输安全机制可采用TLS;
12)应用服务器“电子设备安全能力和安全状态查询模块”使用电子设备的公钥,对安全能力信息和安全状态评估结果的签名进行验证,确定其真实性和完整性。
总之,在本申请实施例中,在需要进行安全状态评估时,例如在接收到 查询电子设备的安全状态的安全状态查询请求等情况时,通过采集电子设备的目标安全状态信息,并采用层次分析法确定目标安全状态信息中各个指标要素的权重,继而根据目标安全状态信息和确定的权重,从而可以得到准确、全面的安全状态评估结果,为高安全要求的业务提供了更准确的评估依据。
本申请实施例提供的安全状态评估方法,执行主体可以为安全状态评估装置。本申请实施例中以安全状态评估装置执行安全状态评估方法为例,说明本申请实施例提供的安全状态评估装置。
请参考图4,图4为本申请实施例提供的一种安全状态评估装置的结构示意图。如图4所示,本申请另一方面实施例还提供了一种安全状态评估装置,该装置400包括:
采集模块401,用于采集目标安全状态信息,所述目标安全状态信息包括至少一个第二层指标要素,每一所述第二层指标要素包括至少一个第三层指标要素以及每一个所述第三层指标要素的状态信息;
权重确定模块402,用于采用层次分析法确定每一所述第二层指标要素和每一所述第三层指标要素的权重;
评估模块403,用于根据所述目标安全状态信息以及所述权重,生成电子设备的安全状态评估结果。
可选地,所述权重确定模块包括:
构造单元,用于构建目标层的成对比较矩阵,并计算所述成对比较矩阵的权重向量和最大特征根;
一致性指标单元,用于根据所述成对比较矩阵以及所述成对比较矩阵的权重向量和最大特征根,得到一致性指标;
一致性比率单元,用于根据所述一致性指标以及随机一致性指标,得到一致性比率,所述随机一致性指标与所述成对比较矩阵的行数或列数相关;
权重确定单元,用于在所述一致性比率满足预设条件的情况下,根据所述成对比较矩阵的权重向量确定每一目标层指标要素的权重;
其中,所述目标层为所述第二层或所述第三层,所述成对比较矩阵中的 数值与应用场景相关。
可选地,所述评估模块包括:
评分单元,用于根据所述第二层指标要素包括的至少一个第三层指标要素以及每一个所述第三层指标要素的状态信息和权重,确定所述第二层指标要素的评分;
评估单元,用于根据每一个所述第二层指标要素的评分以及对应的权重,生成所述安全状态评估结果。
可选地,所述评分单元包括:
第一评分子单元,根据所述第三层指标要素的状态信息,确定对应的所述第三层指标要素的评分;
第二评分子单元,用于根据所述第二层指标要素包括的每一个第三层指标要素的评分以及权重,计算所述第二层指标要素的评分。
可选地,应用于支持可信执行环境TEE和富执行环境REE的电子设备,所述至少一个第二层指标要素包括:TEE安全状态信息、REE安全状态信息、硬件及固件安全状态信息以及通信安全状态信息中的至少一者。
可选地,所述REE安全状态信息包括的第三层指标要素包括以下至少一者:恶意/欺骗/伪冒应用、病毒感染、应用签名验证、验证启动、应用层数据加密、软件方式的内存漏洞防御、应用层可信度量;
所述TEE安全状态信息包括的第三层指标要素包括以下至少一者:恶意/欺骗/伪冒应用、病毒感染、可信验证启动、可信用户交互、生物特征识别、敏感信息存储、内核实时安全保护、系统完整性度量、内核控制流完整性度量
所述硬件及固件安全状态信息包括的第三层指标要素包括以下至少一者:硬件可信根、安全单元、硬件加解密、安全启动、硬件方式的内存漏洞防御、内存加密、固件版本是否满足要求、防侧信道攻击、防故障注入攻击;
所述通信安全状态信息包括的第三层指标要素包括以下至少一者:蜂窝网络通信、Wi-Fi通信、通信协议安全、VPN、DNS安全解析。
在本申请实施例中,在需要进行安全状态评估时,例如在接收到查询电子设备的安全状态的安全状态查询请求等情况时,通过采集电子设备的目标安全状态信息,并采用层次分析法确定目标安全状态信息中各个指标要素的权重,继而根据目标安全状态信息和确定的权重,从而可以得到准确、全面的安全状态评估结果,为高安全要求的业务提供了更准确的评估依据。
本申请实施例中的安全状态评估装置可以是电子设备,也可以是电子设备中的部件,例如集成电路或芯片。该电子设备可以是终端,也可以为除终端之外的其他设备。示例性的,电子设备可以为手机、平板电脑、笔记本电脑、掌上电脑、车载电子设备、移动上网装置(Mobile Internet Device,MID)、增强现实(augmented reality,AR)/虚拟现实(virtual reality,VR)设备、机器人、可穿戴设备、超级移动个人计算机(ultra-mobile personal computer,UMPC)、上网本或者个人数字助理(personal digital assistant,PDA)等,还可以为服务器、网络附属存储器(Network Attached Storage,NAS)、个人计算机(personal computer,PC)、电视机(television,TV)、柜员机或者自助机等,本申请实施例不作具体限定。
本申请实施例中的安全状态评估装置可以为具有操作系统的装置。该操作系统可以为安卓(Android)操作系统,可以为iOS操作系统,还可以为其他可能的操作系统,本申请实施例不作具体限定。
本申请实施例提供的安全状态评估装置能够实现图1至图3的方法实施例实现的各个过程,为避免重复,这里不再赘述。
可选地,如图5所示,本申请实施例还提供一种电子设备500,包括处理器501和存储器502,存储器502上存储有可在所述处理器501上运行的程序或指令,该程序或指令被处理器501执行时实现上述安全状态评估方法实施例的各个步骤,且能达到相同的技术效果,为避免重复,这里不再赘述。
图6为实现本申请实施例的一种电子设备的硬件结构示意图。
该电子设备600包括但不限于:射频单元601、网络模块602、音频输出单元603、输入单元604、传感器605、显示单元606、用户输入单元607、 接口单元608、存储器609、以及处理器6010等部件。
本领域技术人员可以理解,电子设备600还可以包括给各个部件供电的电源(比如电池),电源可以通过电源管理系统与处理器6010逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。图6中示出的电子设备结构并不构成对电子设备的限定,电子设备可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置,在此不再赘述。
其中,处理器6010,用于采集目标安全状态信息,所述目标安全状态信息包括至少一个第二层指标要素,每一所述第二层指标要素包括至少一个第三层指标要素以及每一个所述第三层指标要素的状态信息;
处理器6010,还用于采用层次分析法确定每一所述第二层指标要素和每一所述第三层指标要素的权重;
处理器6010,还用于根据所述目标安全状态信息以及所述权重,生成电子设备的安全状态评估结果。
可选地,处理器6010,还用于构建目标层的成对比较矩阵,并计算所述成对比较矩阵的权重向量和最大特征根;
根据所述成对比较矩阵以及所述成对比较矩阵的权重向量和最大特征根,得到一致性指标;
根据所述一致性指标以及随机一致性指标,得到一致性比率,所述随机一致性指标与所述成对比较矩阵的行数或列数相关;
在所述一致性比率满足预设条件的情况下,根据所述成对比较矩阵的权重向量确定每一目标层指标要素的权重;
其中,所述目标层为所述第二层或所述第三层,所述成对比较矩阵中的数值与应用场景相关。
可选地,处理器6010,还用于根据所述第二层指标要素包括的至少一个第三层指标要素以及每一个所述第三层指标要素的状态信息和权重,确定所述第二层指标要素的评分;
根据每一个所述第二层指标要素的评分以及对应的权重,生成所述安全 状态评估结果。
处理器6010,还用于根据所述第三层指标要素的状态信息,确定对应的所述第三层指标要素的评分;
根据所述第二层指标要素包括的每一个第三层指标要素的评分以及权重,计算所述第二层指标要素的评分。
可选地,所述方法应用于支持可信执行环境TEE和富执行环境REE的电子设备,所述至少一个第二层指标要素包括:TEE安全状态信息、REE安全状态信息、硬件及固件安全状态信息以及通信安全状态信息中的至少一者。
可选地,所述REE安全状态信息包括的第三层指标要素包括以下至少一者:恶意/欺骗/伪冒应用、病毒感染、应用签名验证、验证启动、应用层数据加密、软件方式的内存漏洞防御、应用层可信度量;
所述TEE安全状态信息包括的第三层指标要素包括以下至少一者:恶意/欺骗/伪冒应用、病毒感染、可信验证启动、可信用户交互、生物特征识别、敏感信息存储、内核实时安全保护、系统完整性度量、内核控制流完整性度量;
所述硬件及固件安全状态信息包括的第三层指标要素包括以下至少一者:硬件可信根、安全单元、硬件加解密、安全启动、硬件方式的内存漏洞防御、内存加密、固件版本是否满足要求、防侧信道攻击、防故障注入攻击;
所述通信安全状态信息包括的第三层指标要素包括以下至少一者:蜂窝网络通信、Wi-Fi通信、通信协议安全、虚拟专用网络(Virtual Private Network,VPN)、域名系统(Domain Name System,DNS)安全解析。
在本申请实施例中,在需要进行安全状态评估时,例如在接收到查询电子设备的安全状态的安全状态查询请求等情况时,通过采集电子设备的目标安全状态信息,并采用层次分析法确定目标安全状态信息中各个指标要素的权重,继而根据目标安全状态信息和确定的权重,从而可以得到准确、全面的安全状态评估结果,为高安全要求的业务提供了更准确的评估依据。
应理解的是,本申请实施例中,输入单元604可以包括图形处理器 (Graphics Processing Unit,GPU)6041和麦克风6042,图形处理器6041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。显示单元606可包括显示面板6061,可以采用液晶显示器、有机发光二极管等形式来配置显示面板6061。用户输入单元607包括触控面板6071以及其他输入设备6072中的至少一种。触控面板6071,也称为触摸屏。触控面板6071可包括触摸检测装置和触摸控制器两个部分。其他输入设备6072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。
存储器609可用于存储软件程序以及各种数据,存储器609可主要包括存储程序或指令的第一存储区和存储数据的第二存储区,其中,第一存储区可存储操作系统、至少一个功能所需的应用程序或指令(比如声音播放功能、图像播放功能等)等。此外,存储器609可以包括易失性存储器或非易失性存储器,或者,存储器609可以包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDRSDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synch link DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DRRAM)。本申请实施例中的存储器609包括但不限于这些和任意其它适合类型的存储器。
处理器6010可包括一个或多个处理单元;可选的,处理器6010集成应用处理器和调制解调处理器,其中,应用处理器主要处理涉及操作系统、用户界面和应用程序等的操作,调制解调处理器主要处理无线通信信号,如基 带处理器。可以理解的是,上述调制解调处理器也可以不集成到处理器6010中。
本申请实施例还提供一种可读存储介质,所述可读存储介质上存储有程序或指令,该程序或指令被处理器执行时实现上述安全状态评估方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
其中,所述处理器为上述实施例中所述的电子设备中的处理器。所述可读存储介质,包括计算机可读存储介质,如计算机只读存储器、随机存取存储器、磁碟或者光盘等。
本申请实施例另提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现上述安全状态评估方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
应理解,本申请实施例提到的芯片还可以称为系统级芯片、系统芯片、芯片系统或片上系统芯片等。
本申请实施例提供一种计算机程序产品,该程序产品被存储在存储介质中,该程序产品被至少一个处理器执行以实现如上述安全状态评估方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。此外,需要指出的是,本申请实施方式中的方法和装置的范围不限按示出或讨论的顺序来执行功能,还可包括根据所涉及的功能按基本同时的方式或按相反的顺序来执行功能,例如,可以按不同于所描述的次序来执行所描述的方法,并且还可以添加、省去、或组合各种步骤。另外,参照某些示例所描述的特征可在其他示例中被 组合。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以计算机软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,或者网络设备等)执行本申请各个实施例所述的方法。
上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本申请的保护之内。

Claims (17)

  1. 一种安全状态评估方法,包括:
    采集目标安全状态信息,所述目标安全状态信息包括至少一个第二层指标要素,每一所述第二层指标要素包括至少一个第三层指标要素以及每一个所述第三层指标要素的状态信息;
    采用层次分析法确定每一所述第二层指标要素和每一所述第三层指标要素的权重;
    根据所述目标安全状态信息以及所述权重,生成电子设备的安全状态评估结果。
  2. 根据权利要求1所述的方法,其中,所述采用层次分析法确定每一所述第二层指标要素和每一所述第三层指标要素的权重包括:
    构建目标层的成对比较矩阵,并计算所述成对比较矩阵的权重向量和最大特征根;
    根据所述成对比较矩阵以及所述成对比较矩阵的权重向量和最大特征根,得到一致性指标;
    根据所述一致性指标以及随机一致性指标,得到一致性比率,所述随机一致性指标与所述成对比较矩阵的行数或列数相关;
    在所述一致性比率满足预设条件的情况下,根据所述成对比较矩阵的权重向量确定每一目标层指标要素的权重;
    其中,所述目标层为所述第二层或所述第三层,所述成对比较矩阵中的数值与应用场景相关。
  3. 根据权利要求1所述的方法,其中,所述根据所述目标安全状态信息以及所述权重,生成电子设备的安全状态评估结果包括:
    根据所述第二层指标要素包括的至少一个第三层指标要素以及每一个所述第三层指标要素的状态信息和权重,确定所述第二层指标要素的评分;
    根据每一个所述第二层指标要素的评分以及对应的权重,生成所述安全状态评估结果。
  4. 根据权利要求3所述的方法,其中,所述根据所述第二层指标要素包括的至少一个第三层指标要素以及每一个所述第三层指标要素的状态信息和权重,确定所述第二层指标要素的评分包括:
    根据所述第三层指标要素的状态信息,确定对应的所述第三层指标要素的评分;
    根据所述第二层指标要素包括的每一个第三层指标要素的评分以及权重,计算所述第二层指标要素的评分。
  5. 根据权利要求1所述的方法,其中,所述方法应用于支持可信执行环境TEE和富执行环境REE的电子设备,所述至少一个第二层指标要素包括:TEE安全状态信息、REE安全状态信息、硬件及固件安全状态信息以及通信安全状态信息中的至少一者。
  6. 根据权利要求5所述的方法,其中,所述REE安全状态信息包括的第三层指标要素包括以下至少一者:恶意/欺骗/伪冒应用、病毒感染、应用签名验证、验证启动、应用层数据加密、软件方式的内存漏洞防御、应用层可信度量;
    所述TEE安全状态信息包括的第三层指标要素包括以下至少一者:恶意/欺骗/伪冒应用、病毒感染、可信验证启动、可信用户交互、生物特征识别、敏感信息存储、内核实时安全保护、系统完整性度量、内核控制流完整性度量;
    所述硬件及固件安全状态信息包括的第三层指标要素包括以下至少一者:硬件可信根、安全单元、硬件加解密、安全启动、硬件方式的内存漏洞防御、内存加密、固件版本是否满足要求、防侧信道攻击、防故障注入攻击;
    所述通信安全状态信息包括的第三层指标要素包括以下至少一者:蜂窝网络通信、Wi-Fi通信、通信协议安全、VPN、DNS安全解析。
  7. 一种安全状态评估装置,包括:
    采集模块,用于采集目标安全状态信息,所述目标安全状态信息包括至少一个第二层指标要素,每一所述第二层指标要素包括至少一个第三层指标要素以及每一个所述第三层指标要素的状态信息;
    权重确定模块,用于采用层次分析法确定每一所述第二层指标要素和每一所述第三层指标要素的权重;
    评估模块,用于根据所述目标安全状态信息以及所述权重,生成电子设备的安全状态评估结果。
  8. 根据权利要求7所述的装置,其中,所述权重确定模块包括:
    构造单元,用于构建目标层的成对比较矩阵,并计算所述成对比较矩阵的权重向量和最大特征根;
    一致性指标单元,用于根据所述成对比较矩阵以及所述成对比较矩阵的权重向量和最大特征根,得到一致性指标;
    一致性比率单元,用于根据所述一致性指标以及随机一致性指标,得到一致性比率,所述随机一致性指标与所述成对比较矩阵的行数或列数相关;
    权重确定单元,用于在所述一致性比率满足预设条件的情况下,根据所述成对比较矩阵的权重向量确定每一所述目标层指标要素的权重;
    其中,所述目标层为所述第二层或所述第三层,所述成对比较矩阵中的数值与应用场景相关。
  9. 根据权利要求7所述的装置,其中,所述评估模块包括:
    评分单元,用于根据所述第二层指标要素包括的至少一个第三层指标要素以及每一个所述第三层指标要素的状态信息和权重,确定所述第二层指标要素的评分;
    评估单元,用于根据每一个所述第二层指标要素的评分以及对应的权重,生成所述安全状态评估结果。
  10. 根据权利要求9所述的装置,其中,所述评分单元包括:
    第一评分子单元,根据所述第三层指标要素的状态信息,确定对应的所述第三层指标要素的评分;
    第二评分子单元,用于根据所述第二层指标要素包括的每一个第三层指标要素的评分以及权重,计算所述第二层指标要素的评分。
  11. 根据权利要求7所述的装置,其中,应用于支持可信执行环境TEE和富执行环境REE的电子设备,所述至少一个第二层指标要素包括:TEE安全状态信息、REE安全状态信息、硬件及固件安全状态信息以及通信安全状态信息中的至少一者。
  12. 根据权利要求11所述的装置,其中,所述REE安全状态信息包括的第三层指标要素包括以下至少一者:恶意/欺骗/伪冒应用、病毒感染、应用签名验证、验证启动、应用层数据加密、软件方式的内存漏洞防御、应用层可信度量;
    所述TEE安全状态信息包括的第三层指标要素包括以下至少一者:恶意/欺骗/伪冒应用、病毒感染、可信验证启动、可信用户交互、生物特征识别、敏感信息存储、内核实时安全保护、系统完整性度量、内核控制流完整性度量
    所述硬件及固件安全状态信息包括的第三层指标要素包括以下至少一者:硬件可信根、安全单元、硬件加解密、安全启动、硬件方式的内存漏洞防御、内存加密、固件版本是否满足要求、防侧信道攻击、防故障注入攻击;
    所述通信安全状态信息包括的第三层指标要素包括以下至少一者:蜂窝网络通信、Wi-Fi通信、通信协议安全、VPN、DNS安全解析。
  13. 一种电子设备,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,其中,所述程序或指令被所述处理器执行时实现如权利要求1-6中任一项所述的安全状态评估方法的步骤。
  14. 一种可读存储介质,所述可读存储介质上存储程序或指令,其中,所述程序或指令被处理器执行时实现如权利要求1-6中任一项所述的安全状态评估方法的步骤。
  15. 一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如权利要求1-6中任一 项所述的安全状态评估方法的步骤。
  16. 一种计算机程序产品,该程序产品被存储在存储介质中,该程序产品被至少一个处理器执行以实现如权利要求1-6中任一项所述的安全状态评估方法的步骤。
  17. 一种电子设备,其中,所述电子设备用于执行如权利要求1-6中任一项所述的安全状态评估方法的步骤。
PCT/CN2023/084578 2022-03-30 2023-03-29 一种安全状态评估方法及装置、电子设备和可读存储介质 WO2023185900A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210328660.7 2022-03-30
CN202210328660.7A CN116939617A (zh) 2022-03-30 2022-03-30 一种安全状态评估方法及装置、电子设备和可读存储介质

Publications (1)

Publication Number Publication Date
WO2023185900A1 true WO2023185900A1 (zh) 2023-10-05

Family

ID=88199278

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/084578 WO2023185900A1 (zh) 2022-03-30 2023-03-29 一种安全状态评估方法及装置、电子设备和可读存储介质

Country Status (2)

Country Link
CN (1) CN116939617A (zh)
WO (1) WO2023185900A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109074460A (zh) * 2016-05-13 2018-12-21 高通股份有限公司 基于电子装置的安全管理
US10366361B1 (en) * 2018-05-10 2019-07-30 Definitive Business Solutions, Inc. Systems and methods for performing multi-tier data transfer in a group assessment processing environment
CN112364351A (zh) * 2020-12-30 2021-02-12 杭州海康威视数字技术股份有限公司 设备威胁发现方法、装置、计算设备及存储介质
CN114065220A (zh) * 2021-11-25 2022-02-18 国网四川省电力公司成都供电公司 一种基于分布式系统的双重层次分析态势评估方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109074460A (zh) * 2016-05-13 2018-12-21 高通股份有限公司 基于电子装置的安全管理
US10366361B1 (en) * 2018-05-10 2019-07-30 Definitive Business Solutions, Inc. Systems and methods for performing multi-tier data transfer in a group assessment processing environment
CN112364351A (zh) * 2020-12-30 2021-02-12 杭州海康威视数字技术股份有限公司 设备威胁发现方法、装置、计算设备及存储介质
CN114065220A (zh) * 2021-11-25 2022-02-18 国网四川省电力公司成都供电公司 一种基于分布式系统的双重层次分析态势评估方法

Also Published As

Publication number Publication date
CN116939617A (zh) 2023-10-24

Similar Documents

Publication Publication Date Title
US20210089300A1 (en) System and method for identifying particular computer platform associated with potential altered or falsified execution of copy of software
US8966659B2 (en) Automatic fraudulent digital certificate detection
US9065845B1 (en) Detecting misuse of trusted seals
Chen et al. What’s new about cloud computing security
US8997190B2 (en) Using metadata in security tokens to prevent coordinated gaming in a reputation system
WO2023174389A1 (zh) 一种安全状态评估方法及装置、电子设备和可读存储介质
US12028460B2 (en) Verifying user interactions on a content platform
JP2008005156A (ja) 情報処理端末および状態通知方法
US11522901B2 (en) Computer security vulnerability assessment
CN111552973A (zh) 对设备进行风险评估的方法、装置、电子设备及介质
WO2023174393A1 (zh) 一种安全评估方法及装置、电子设备和可读存储介质
US20130167230A1 (en) Device reputation management
CN113302893A (zh) 用于信任验证的方法及装置
CN101166126B (zh) 用于证明分组踪迹的方法和系统
US11290471B2 (en) Cross-attestation of electronic devices
Dhiyanesh et al. F2C: an novel distributed denial of service attack mitigation model for SAAS cloud environment
WO2023185900A1 (zh) 一种安全状态评估方法及装置、电子设备和可读存储介质
Chang et al. Information security modeling for the operation of a novel highly trusted network in a virtualization environment
Park et al. Secure device control scheme with blockchain in a smart home
JP6284301B2 (ja) 保守作業判定装置および保守作業判定方法
WO2024002124A1 (zh) 远程证明方法、装置、系统、存储介质及计算机程序产品
US20240022546A1 (en) Master ledger and local host log extension detection and mitigation of forged authentication attacks
Dey et al. SVM-A novel trust measurement system in cloud service
Ran et al. Blockchain-enabled cross-border insurance: from legal
CN118300785A (zh) 电力物联网安全的数据加密方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23778265

Country of ref document: EP

Kind code of ref document: A1