WO2023284555A1 - Procédé pour appeler de manière sécurisée un service, et procédé et appareil pour enregistrer de manière sécurisée un service - Google Patents

Procédé pour appeler de manière sécurisée un service, et procédé et appareil pour enregistrer de manière sécurisée un service Download PDF

Info

Publication number
WO2023284555A1
WO2023284555A1 PCT/CN2022/102477 CN2022102477W WO2023284555A1 WO 2023284555 A1 WO2023284555 A1 WO 2023284555A1 CN 2022102477 W CN2022102477 W CN 2022102477W WO 2023284555 A1 WO2023284555 A1 WO 2023284555A1
Authority
WO
WIPO (PCT)
Prior art keywords
service
security level
terminal device
level
security
Prior art date
Application number
PCT/CN2022/102477
Other languages
English (en)
Chinese (zh)
Inventor
张阿东
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2023284555A1 publication Critical patent/WO2023284555A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • the present application relates to terminal operating system technology, and in particular to a method for securely invoking a service, and a method and device for securely registering a service.
  • the present application provides a method for securely invoking a service, a method and device for securely registering a service, so as to ensure the security of the service.
  • the present application provides a method for safely invoking a service, including: obtaining the first security level of the service requested by the terminal device; obtaining the second security level of the terminal device; according to the first security level and the The second security level determines whether the terminal device has the right to call the service; when the terminal device has the right to call the service, the terminal device is allowed to call the service.
  • the method before the acquiring the first security level of the service requested to be invoked by the terminal device, the method further includes: receiving a service invocation request sent by the terminal device.
  • the configuration file includes the field Securelevel: SL1.
  • Securelevel is a newly added security level field in the config file, and SL1 is preset or written by the service provider.
  • the configuration file (such as xml/config/Json file) includes the Securelevel field, and the configuration format is as follows:
  • the security configuration page can be displayed to the user, and the user can write or select the security level of the service.
  • the terminal operating system may also provide the user with an interface or interface for setting the security level in other ways, which is not specifically limited in this application.
  • the service key signature level can be associated with the service security level, and the service key signature level reflects its security level. For example, a service with a security level of SL1 is signed with an SL1-level key; a service with a security level of SL2 is signed with a SL2-level key.
  • the storage path of the service program may be associated with the security level of the service, and the security level of the service program may be reflected by the storage path of the service program.
  • the storage path of the service program is under the system path, and its security level is SL2, and the storage path of the service program is under the data path, and its security level is SL1.
  • the operating system of the terminal device may also provide other security level configuration interfaces to configure the security level of the service, and this application does not limit the specific implementation of the configuration.
  • the obtaining the second security level of the terminal device includes: when the service invocation request includes the identifier of the terminal device, obtaining the second security level according to the identifier of the terminal device Two security levels; or, when the service invocation request includes a security level identifier of the terminal device, acquiring the second security level according to the security level identifier of the terminal device.
  • the security level of the terminal device and the security level of the service may use the same judgment standard.
  • the security level of the terminal device and the security level of the service both include L1-Lm, so the two security levels are the same standard.
  • the service providing device may determine the highest service level corresponding to the second security level, and determine whether the first security level is smaller than the highest service level. When the first security level is less than the highest service level, it is determined that the service calling device has the right to call the service; when the first security level is greater than or equal to the highest service level, it is determined that the service calling device does not have the right to call the service.
  • the security level of the terminal equipment and the security level of the service can adopt different judgment standards, but there is a corresponding relationship between the security level of the terminal equipment and the security level of the service.
  • the security level of the terminal equipment includes L1 ⁇ Lm
  • the security levels of the service include SL1 ⁇ SLn, m ⁇ n
  • the security level of one terminal device may correspond to one or more security levels of the service.
  • the highest level of service corresponding to the second security level refers to the highest level of service that the service calling device can call. If the service is higher than the highest service level, the service calling device cannot call it.
  • the first security level is lower than the highest level of the service, which means that the security level of the service is lower than the highest level of the service that the service calling device can call, and the service calling device can call the service, so the service providing device determines that the service calling device has the authority to call the service.
  • the service providing device may determine the lowest level of the device corresponding to the first security level, and determine whether the second security level is greater than or equal to the lowest level of the device. When the second security level is greater than the lowest level of the device, it is determined that the service calling device has the right to call the service; when the second security level is less than or equal to the lowest level of the device, it is determined that the service calling device does not have the right to call the service.
  • the security level of the terminal equipment and the security level of the service can adopt different judgment standards, but there is a corresponding relationship between the security level of the terminal equipment and the security level of the service.
  • the security level of the terminal equipment includes L1 ⁇ Lm
  • the security levels of the service include SL1 ⁇ SLn
  • m is greater than n
  • one security level of the service may correspond to the security levels of one or more terminal devices.
  • the lowest level of equipment corresponding to the first security level refers to the lowest level of equipment that can call the service. If the security level of the service calling device is lower than the lowest level of the device, the service cannot be called.
  • the second security level is greater than the lowest level of the device, which means that the security level of the service calling device is greater than the lowest level of the terminal device that can call the service, and the service calling device can call the service, so the service providing device determines that the service calling device has the authority to call the service.
  • the service providing device matches the security level of the service invoking device with the security level of the called service.
  • the terminal device can call a service with a low security level), and the service calling device has the authority to call the service on the service providing device, which ensures the security of the service.
  • the above-mentioned embodiment describes the process of the service calling device securely calling the service on the service providing device.
  • the service calling device is allowed to call the service and obtain the data of the service.
  • the present application provides a method for secure registration service, including: obtaining the first security level of the service for which the terminal device requests to register; obtaining the second security level of the terminal device; according to the first security level and the The second security level determines whether the terminal device has the right to register the service; when the terminal device has the right to register the service, allow the terminal device to register the service.
  • the configuration file includes the field Securelevel: SL1.
  • Securelevel is a newly added security level field in the config file, and SL1 is preset or written by the service provider.
  • the configuration file (such as xml/config/Json file) includes the Securelevel field, and the configuration format is as follows:
  • the above configuration can be implemented by the provider of the service.
  • the security configuration page can be displayed to the user, and the user can write or select the security level of the service.
  • the terminal operating system may also provide the user with an interface or interface for setting the security level in other ways, which is not specifically limited in this application.
  • the service key signature level can be associated with the service security level, and the service key signature level reflects its security level. For example, a service with a security level of SL1 is signed with an SL1-level key; a service with a security level of SL2 is signed with a SL2-level key.
  • the storage path of the service program may be associated with the security level of the service, and the security level of the service program may be reflected by the storage path of the service program.
  • the storage path of the service program is under the system path, and its security level is SL2, and the storage path of the service program is under the data path, and its security level is SL1.
  • the operating system of the terminal device may also provide other security level configuration interfaces to configure the security level of the service, and this application does not limit the specific implementation of the configuration.
  • the terminal device can obtain the first security level of the service to be registered, for example, you can read the value of the field Securelevel in the config file, and use SL1 as the first security level; or, read the configuration of the service
  • the field Securelevel in the item set SL1 as the first security level; or, obtain the key signature level of the service, and use its corresponding security level as the first security level; or, obtain the storage path of the program of the service, according to the storage path Determines the second security level for the service.
  • the security level of the terminal device and the security level of the service may use the same judgment standard.
  • the security level of the terminal device and the security level of the service both include L1-Lm, so the two security levels are the same standard.
  • the first security level is lower than the second security level, indicating that the security level of the service is lower than that of the terminal device, and the terminal device can register for the service, so the operating system of the terminal device determines that the terminal device has the authority to register for the service.
  • the operating system of the terminal device may determine the highest service level corresponding to the second security level, and determine whether the first security level is lower than the highest service level. When the first security level is less than the highest service level, it is determined that the terminal device has the authority to register for the service; when the first security level is greater than or equal to the highest service level, it is determined that the terminal device does not have the authority to register for the service.
  • the security level of the terminal equipment and the security level of the service can adopt different judgment standards, but there is a corresponding relationship between the security level of the terminal equipment and the security level of the service.
  • the security level of the terminal equipment includes L1 ⁇ Lm
  • the security levels of the service include SL1 ⁇ SLn, m ⁇ n
  • the security level of one terminal device may correspond to one or more security levels of the service.
  • the highest service level corresponding to the second security level refers to the highest service level that the terminal device can register with. If the service is higher than the highest service level, the terminal device cannot register.
  • the first security level is lower than the highest service level, indicating that the security level of the service is lower than the highest level of services that the terminal device can register for, and the terminal device can register for the service, so the operating system of the terminal device determines that the terminal device has the authority to register for the service.
  • the operating system of the terminal device may determine the lowest level of the device corresponding to the first security level, and determine whether the second security level is greater than or equal to the lowest level of the device. When the second security level is greater than the lowest level of the device, it is determined that the terminal device has the authority to register the service; when the second security level is less than or equal to the lowest level of the device, it is determined that the terminal device does not have the authority to register the service.
  • the lowest level of equipment corresponding to the first security level refers to the lowest level of equipment that can register for services. If the security level of a terminal device is lower than the lowest level of equipment, it cannot register for services.
  • the second security level is greater than the lowest level of the device, which means that the security level of the terminal device is greater than the lowest level of the terminal device that can register for the service, and the terminal device can register for the service. Therefore, the operating system of the terminal device determines that the terminal device has the authority to register for the service.
  • the operating system of the terminal device matches the security level of the terminal device with the security level of the registered service.
  • the terminal device can register a service with a low security level), the terminal device has the authority to register the service on the operating system of the terminal device, ensuring the security of the service.
  • a terminal device with a security level can register a service with a low security level, which ensures the security of the service.
  • the above-mentioned embodiment describes the process of securely registering a local service on a terminal device.
  • the operating system of the terminal device can also refer to the above steps to implement the process of securely installing the service on the terminal device.
  • the terminal device has the authority to install the service, the terminal device is allowed to install service.
  • the method before obtaining the first security level of the service for which the terminal device requests to register, the method further includes: obtaining a service registration request.
  • the present application provides a device for safely invoking a service, including: an acquisition module and a processing module. in,
  • An acquisition module configured to acquire the first security level of the service requested by the terminal device; acquire a second security level of the terminal device; a processing module, configured to determine the required security level according to the first security level and the second security level Whether the terminal device has the right to call the service; when the terminal device has the right to call the service, allow the terminal device to call the service.
  • the processing module is specifically configured to judge whether the first security level is smaller than the second security level; when the first security level is smaller than the second security level, determine The terminal device has the right to call the service; or, when the first security level is greater than or equal to the second security level, it is determined that the terminal device does not have the right to call the service.
  • the processing module is specifically configured to determine the highest service level corresponding to the second security level; judge whether the first security level is smaller than the highest service level; when the first security level When the security level is lower than the highest service level, it is determined that the terminal device has the authority to call the service; when the first security level is greater than or equal to the highest service level, it is determined that the terminal device does not have the right to call the service. service permissions.
  • the processing module is specifically configured to determine the lowest level of equipment corresponding to the first security level; judge whether the second security level is greater than the lowest level of the equipment; when the second When the security level is greater than the minimum level of the device, it is determined that the terminal device has the authority to call the service; when the second security level is less than or equal to the minimum level of the device, it is determined that the terminal device does not have the right to call the service. service permissions.
  • the obtaining module is further configured to receive a service invocation request sent by the terminal device.
  • the service invocation request includes an identifier of the service; the obtaining module is specifically configured to determine the service according to the identifier of the service; read the configuration file of the service to obtain the the first security level; or, acquire the user configuration information of the service to acquire the first security level; or acquire the first security level according to the feature information of the service, the feature information including the service The key signature level or the storage path of the program of the service.
  • the acquiring module is specifically configured to acquire the second security level according to the identifier of the terminal device when the service call request includes the identifier of the terminal device; or, when When the service invocation request includes the security level identifier of the terminal device, the second security level is acquired according to the security level identifier of the terminal device.
  • the acquiring module is further configured to acquire the third security level of the service for which the terminal device requests to register; acquire the fourth security level of the terminal device; and the processing module is further configured to The third security level and the fourth security level determine whether the terminal device has the right to register the service; when the terminal device has the right to register the service, allow the terminal device to register the service .
  • the processing module is specifically configured to determine whether the third security level is less than the fourth security level; when the third security level is less than the fourth security level, determine The terminal device has the right to register the service; or, when the third security level is greater than or equal to the fourth security level, it is determined that the terminal device does not have the right to register the service.
  • the processing module is specifically configured to determine the highest service level corresponding to the fourth security level; determine whether the third security level is smaller than the highest service level; when the third security level When the security level is less than the highest service level, it is determined that the terminal device has the right to register the service; when the third security level is greater than or equal to the highest service level, it is determined that the terminal device does not have the right to register the service. service permissions.
  • the processing module is specifically configured to determine the lowest level of equipment corresponding to the third security level; judge whether the fourth security level is greater than the lowest level of the equipment; when the fourth When the security level is greater than the minimum level of the device, it is determined that the terminal device has the right to register the service; when the fourth security level is less than or equal to the minimum level of the device, it is determined that the terminal device does not have the right to register the service. service permissions.
  • the acquiring module is further configured to acquire a service registration request.
  • the service registration request includes an identifier of the service; the obtaining module is specifically configured to determine the service according to the identifier of the service; read the configuration file of the service to obtain the the third security level; or, acquire the user configuration information of the service to acquire the third security level; or acquire the third security level according to the feature information of the service, the feature information including the service The storage path of the key signature level or the program of the service.
  • the present application provides a terminal device, including: one or more processors; a memory for storing one or more programs; when the one or more programs are executed by the one or more processors , so that the one or more processors implement the method described in any one of the first to second aspects above.
  • the present application provides a computer-readable storage medium, including a computer program.
  • the computer program When the computer program is executed on a computer, the computer executes the method described in any one of the first to second aspects above.
  • the present application also provides a computer program product, the computer program product includes computer program code, and when the computer program code is run on the computer, the computer is made to execute the terminal device in any one of the above two method embodiments. Actions and/or processing performed.
  • FIG. 2 shows a schematic structural diagram of a terminal device 200
  • FIG. 3 is a software structural block diagram of the terminal device 200 of the present application.
  • FIG. 4 is a flowchart of a process 400 of a method for securely invoking a service provided by the present application
  • FIG. 5 is a flowchart of a process 500 of the method for secure registration services provided by the present application.
  • FIG. 6 is an exemplary structural diagram of an apparatus 600 for securely invoking a service provided by the present application.
  • At least one (item) means one or more, and “multiple” means two or more.
  • “And/or” is used to describe the association relationship of associated objects, indicating that there can be three types of relationships, for example, “A and/or B” can mean: only A exists, only B exists, and A and B exist at the same time , where A and B can be singular or plural.
  • the character “/” generally indicates that the contextual objects are an “or” relationship.
  • At least one of the following” or similar expressions refer to any combination of these items, including any combination of single or plural items.
  • At least one item (piece) of a, b or c can mean: a, b, c, "a and b", “a and c", “b and c", or "a and b and c ", where a, b, c can be single or multiple.
  • wireless data transmission from machine to machine M2M
  • sensor network sensor network
  • near field communication technology near field communication, NFC
  • wireless local area network wireless local area networks, WLAN
  • wireless fidelity wireless fidelity, Wi-Fi
  • Bluetooth blue, BT
  • global navigation satellite system global navigation satellite system, GNSS
  • frequency modulation frequency modulation, FM
  • infrared infrared
  • the multi-terminal device network is formed by interconnecting multiple terminal devices distributed in different locations based on the ubiquitous network, and the multiple terminal devices can provide distributed services and/or applications. There is no central node in the multi-terminal equipment network, each node can communicate with each other, and the communication control function is distributed on each node.
  • the multi-terminal equipment network has the characteristics of high reliability and easy sharing of resources by nodes in the network, and is widely used in multimedia database management, audio and video transmission, video on demand and other fields.
  • FIG. 1 is an exemplary structural diagram of a multi-terminal device network 100 provided by the present application.
  • the multi-terminal device network 100 may include a mobile phone, a tablet computer, a wearable device, a vehicle-mounted device, an augmented reality (augmented reality, AR)/virtual reality (virtual reality, VR) device, a notebook computer, a super mobile personal computer ( Ultra-mobile personal computer, UMPC), netbook, personal digital assistant (personal digital assistant, PDA) and other terminal devices, it should be understood that this application applies to the terminal devices included in the multi-terminal device network 100 The quantity and shape are not limited.
  • each terminal device In a multi-terminal device network, because the use scenarios of each terminal device are different, the services and applications carried by each terminal device are also different. Correspondingly, the security levels of each terminal device are also different. Terminal devices with low security levels Services and/or applications containing sensitive personal data cannot be processed, and terminal devices with a low security level should not call services and/or applications containing sensitive personal data on terminal devices with a high security level. For example, users do not want devices such as tablets and home TVs to access private data contained in chat applications and work applications on mobile phones. Or, at home, users expect that home smart devices (home TV) can automatically connect and access, for example, automatically project incoming calls from mobile phones to large-screen TVs; but in shopping malls, users do not expect other terminal devices to automatically access mobile phones data behavior.
  • home smart devices home TV
  • the current linux-based device access control methods mainly include two mechanisms: discretionary access control (DAC) and mandatory access control (mandatory access control, MAC).
  • DAC discretionary access control
  • MAC mandatory access control
  • resource access rights are determined by attributes of an access subject (Subject, such as a process) and a resource object (Object, such as a file, prop, etc.).
  • resource owners owners or group members
  • MAC resource access rights are determined by the security context of the access subject (Subject, such as a process) and the resource object (Object, such as a file, prop, binder, etc.) defined by the security policy.
  • Object such as a file, prop, binder, etc.
  • DAC and MAC have been able to meet the requirements for single-device scheduling control, but there are still problems with cross-device scheduling control in a multi-terminal device network.
  • two terminal devices with different security levels have the same identity label (such as system), but due to the different security levels, the permissions of the two terminal devices cannot be completely the same. If only the labels are considered, there must be a low security level Situations where an end device invokes services and/or applications containing sensitive personal data on an end device with a high security level.
  • the method for safely invoking services provided by this application can be applied to terminal devices such as mobile phones, tablet computers, wearable devices, vehicle-mounted devices, notebook computers, and tablets listed above, and this application does not impose any restrictions on the specific types of terminal devices .
  • FIG. 2 shows a schematic structural diagram of a terminal device 200 .
  • the terminal device 200 shown in FIG. 2 is only an example of a terminal device, and the terminal device 200 may have more or fewer components than those shown in the figure, and two or more components may be combined , or can have different component configurations.
  • the various components shown in Figure 2 may be implemented in hardware, software, or a combination of hardware and software including one or more signal processing and/or application specific integrated circuits.
  • the terminal device 200 may include: a processor 210, an external memory interface 220, an internal memory 121, a universal serial bus (universal serial bus, USB) interface 230, a charging management module 240, a power management module 241, a battery 242, an antenna 1, and an antenna 2.
  • Mobile communication module 250 wireless communication module 260, audio module 270, speaker 270A, receiver 270B, microphone 270C, earphone jack 270D, sensor module 280, button 290, motor 291, indicator 292, camera 293, display screen 294, And a subscriber identification module (subscriber identification module, SIM) card interface 295, etc.
  • SIM subscriber identification module
  • the sensor module 280 may include a pressure sensor 280A, a gyro sensor 280B, an air pressure sensor 280C, a magnetic sensor 280D, an acceleration sensor 280E, a distance sensor 280F, a proximity light sensor 280G, a fingerprint sensor 280H, a temperature sensor 280J, a touch sensor 280K, and an ambient light sensor.
  • the controller may be the nerve center and command center of the terminal device 200 .
  • the controller can generate operation control signals according to instruction opcodes and timing signals to complete the control of fetching and executing instructions.
  • the I2S interface can be used for audio communication.
  • processor 210 may include multiple sets of I2S buses.
  • the processor 210 may be coupled to the audio module 270 through an I2S bus to implement communication between the processor 210 and the audio module 270 .
  • the audio module 270 can transmit audio signals to the wireless communication module 260 through the I2S interface, so as to realize the function of answering calls through the Bluetooth headset.
  • the PCM interface can also be used for audio communication, sampling, quantizing and encoding the analog signal.
  • the audio module 270 and the wireless communication module 260 may be coupled through a PCM bus interface.
  • the audio module 270 can also transmit audio signals to the wireless communication module 260 through the PCM interface, so as to realize the function of answering calls through the Bluetooth headset. Both the I2S interface and the PCM interface can be used for audio communication.
  • the UART interface is a universal serial data bus used for asynchronous communication.
  • the bus can be a bidirectional communication bus. It converts the data to be transmitted between serial communication and parallel communication.
  • a UART interface is generally used to connect the processor 210 and the wireless communication module 260 .
  • the processor 210 communicates with the Bluetooth module in the wireless communication module 260 through the UART interface to realize the Bluetooth function.
  • the audio module 270 can transmit audio signals to the wireless communication module 260 through the UART interface, so as to realize the function of playing music through the Bluetooth headset.
  • the MIPI interface can be used to connect the processor 210 with the peripheral devices such as the display screen 294 and the camera 293 .
  • MIPI interface includes camera serial interface (camera serial interface, CSI), display serial interface (display serial interface, DSI), etc.
  • the processor 210 communicates with the camera 293 through the CSI interface to realize the shooting function of the terminal device 200 .
  • the processor 210 communicates with the display screen 294 through the DSI interface to realize the display function of the terminal device 200 .
  • the GPIO interface can be configured by software.
  • the GPIO interface can be configured as a control signal or as a data signal.
  • the GPIO interface can be used to connect the processor 210 with the camera 293 , the display screen 294 , the wireless communication module 260 , the audio module 270 , the sensor module 280 and so on.
  • the GPIO interface can also be configured as an I2C interface, I2S interface, UART interface, MIPI interface, etc.
  • the USB interface 230 is an interface conforming to the USB standard specification, specifically, it may be a Mini USB interface, a Micro USB interface, a USB Type C interface, and the like.
  • the USB interface 230 can be used to connect a charger to charge the terminal device 200, and can also be used to transmit data between the terminal device 200 and peripheral devices. It can also be used to connect headphones and play audio through them. This interface can also be used to connect other terminal devices, such as AR devices.
  • the interface connection relationship between the modules shown in this application is only a schematic illustration, and does not constitute a structural limitation of the terminal device 200 .
  • the terminal device 200 may also adopt different interface connection modes in the foregoing embodiments, or a combination of multiple interface connection modes.
  • the charging management module 240 is configured to receive charging input from the charger.
  • the charger may be a wireless charger or a wired charger.
  • the charging management module 240 can receive the charging input of the wired charger through the USB interface 230 .
  • the charging management module 240 may receive wireless charging input through the wireless charging coil of the terminal device 200 . While the charging management module 240 is charging the battery 242 , it can also supply power to the terminal device through the power management module 241 .
  • the power management module 241 is used for connecting the battery 242 , the charging management module 240 and the processor 210 .
  • the power management module 241 receives the input from the battery 242 and/or the charging management module 240 to provide power for the processor 210 , the internal memory 121 , the external memory, the display screen 294 , the camera 293 , and the wireless communication module 260 .
  • the power management module 241 can also be used to monitor parameters such as battery capacity, battery cycle times, and battery health status (leakage, impedance).
  • the power management module 241 can also be set in the processor 210 .
  • the power management module 241 and the charging management module 240 may also be set in the same device.
  • the wireless communication function of the terminal device 200 may be implemented by the antenna 1, the antenna 2, the mobile communication module 250, the wireless communication module 260, a modem processor, a baseband processor, and the like.
  • Antenna 1 and Antenna 2 are used to transmit and receive electromagnetic wave signals.
  • Each antenna in the terminal device 200 can be used to cover single or multiple communication frequency bands. Different antennas can also be multiplexed to improve the utilization of the antennas.
  • Antenna 1 can be multiplexed as a diversity antenna of a wireless local area network.
  • the antenna may be used in conjunction with a tuning switch.
  • the mobile communication module 250 can provide wireless communication solutions including 2G/3G/4G/5G applied on the terminal device 200 .
  • the mobile communication module 250 may include at least one filter, switch, power amplifier, low noise amplifier (low noise amplifier, LNA) and the like.
  • the mobile communication module 250 can receive electromagnetic waves through the antenna 1, filter and amplify the received electromagnetic waves, and send them to the modem processor for demodulation.
  • the mobile communication module 250 can also amplify the signal modulated by the modem processor, convert it into electromagnetic wave and radiate it through the antenna 1 .
  • at least part of the functional modules of the mobile communication module 250 may be set in the processor 210 .
  • at least part of the functional modules of the mobile communication module 250 and at least part of the modules of the processor 210 may be set in the same device.
  • a modem processor may include a modulator and a demodulator.
  • the modulator is used for modulating the low-frequency baseband signal to be transmitted into a medium-high frequency signal.
  • the demodulator is used to demodulate the received electromagnetic wave signal into a low frequency baseband signal. Then the demodulator sends the demodulated low-frequency baseband signal to the baseband processor for processing.
  • the low-frequency baseband signal is passed to the application processor after being processed by the baseband processor.
  • the application processor outputs sound signals through audio equipment (not limited to speaker 270A, receiver 270B, etc.), or displays images or videos through display screen 294 .
  • the modem processor may be a stand-alone device.
  • the modem processor may be independent of the processor 210, and be set in the same device as the mobile communication module 250 or other functional modules.
  • the wireless communication module 260 can provide wireless local area networks (wireless local area networks, WLAN) (such as wireless fidelity (Wireless fidelity, Wi-Fi) network), bluetooth (bluetooth, BT), global navigation satellite, etc. System (global navigation satellite system, GNSS), frequency modulation (frequency modulation, FM), near field communication technology (near field communication, NFC), infrared technology (infrared, IR) and other wireless communication solutions.
  • the wireless communication module 260 may be one or more devices integrating at least one communication processing module.
  • the wireless communication module 260 receives electromagnetic waves via the antenna 2 , frequency-modulates and filters the electromagnetic wave signals, and sends the processed signals to the processor 210 .
  • the wireless communication module 260 can also receive the signal to be sent from the processor 210 , frequency-modulate it, amplify it, and convert it into electromagnetic waves through the antenna 2 to radiate out.
  • the antenna 1 of the terminal device 200 is coupled to the mobile communication module 250, and the antenna 2 is coupled to the wireless communication module 260, so that the terminal device 200 can communicate with the network and other devices through wireless communication technology.
  • the wireless communication technology may include global system for mobile communications (GSM), general packet radio service (general packet radio service, GPRS), code division multiple access (code division multiple access, CDMA), broadband Code division multiple access (wideband code division multiple access, WCDMA), time division code division multiple access (time-division code division multiple access, TD-SCDMA), long term evolution (long term evolution, LTE), BT, GNSS, WLAN, NFC , FM, and/or IR techniques, etc.
  • GSM global system for mobile communications
  • GPRS general packet radio service
  • code division multiple access code division multiple access
  • CDMA broadband Code division multiple access
  • WCDMA wideband code division multiple access
  • time division code division multiple access time-division code division multiple access
  • TD-SCDMA time-division code division multiple access
  • the GNSS may include a global positioning system (global positioning system, GPS), a global navigation satellite system (global navigation satellite system, GLONASS), a Beidou navigation satellite system (beidou navigation satellite system, BDS), a quasi-zenith satellite system (quasi -zenith satellite system (QZSS) and/or satellite based augmentation systems (SBAS).
  • GPS global positioning system
  • GLONASS global navigation satellite system
  • Beidou navigation satellite system beidou navigation satellite system
  • BDS Beidou navigation satellite system
  • QZSS quasi-zenith satellite system
  • SBAS satellite based augmentation systems
  • the terminal device 200 implements a display function through a GPU, a display screen 294, an application processor, and the like.
  • the GPU is a microprocessor for image processing, and is connected to the display screen 294 and the application processor. GPUs are used to perform mathematical and geometric calculations for graphics rendering.
  • Processor 210 may include one or more GPUs that execute program instructions to generate or change display information.
  • the display screen 294 is used to display images, videos and the like.
  • Display 294 includes a display panel.
  • the display panel can be a liquid crystal display (LCD), an organic light-emitting diode (OLED), an active matrix organic light emitting diode or an active matrix organic light emitting diode (active-matrix organic light emitting diode, AMOLED), flexible light-emitting diode (flex light-emitting diode, FLED), Miniled, MicroLed, Micro-oLed, quantum dot light emitting diodes (quantum dot light emitting diodes, QLED), etc.
  • the terminal device 200 may include 1 or N display screens 294, where N is a positive integer greater than 1.
  • the terminal device 200 can realize the shooting function through the ISP, the camera 293, the video codec, the GPU, the display screen 294, and the application processor.
  • the ISP is used for processing the data fed back by the camera 293 .
  • the light is transmitted to the photosensitive element of the camera through the lens, and the light signal is converted into an electrical signal, and the photosensitive element of the camera transmits the electrical signal to the ISP for processing, and converts it into an image visible to the naked eye.
  • ISP can also perform algorithm optimization on image noise, brightness, and skin color.
  • ISP can also optimize the exposure, color temperature and other parameters of the shooting scene.
  • the ISP may be located in the camera 293 .
  • Camera 293 is used to capture still images or video.
  • the object generates an optical image through the lens and projects it to the photosensitive element.
  • the photosensitive element may be a charge coupled device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor.
  • CMOS complementary metal-oxide-semiconductor
  • the photosensitive element converts the light signal into an electrical signal, and then transmits the electrical signal to the ISP to convert it into a digital image signal.
  • the ISP outputs the digital image signal to the DSP for processing.
  • DSP converts digital image signals into standard RGB, YUV and other image signals.
  • the terminal device 200 may include 1 or N cameras 293, where N is a positive integer greater than 1.
  • Digital signal processors are used to process digital signals. In addition to digital image signals, they can also process other digital signals. For example, when the terminal device 200 selects a frequency point, the digital signal processor is used to perform Fourier transform on the energy of the frequency point.
  • Video codecs are used to compress or decompress digital video.
  • the terminal device 200 may support one or more video codecs.
  • the terminal device 200 can play or record videos in various encoding formats, for example: moving picture experts group (moving picture experts group, MPEG) 1, MPEG2, MPEG3, MPEG4, etc.
  • the NPU is a neural-network (NN) computing processor.
  • NN neural-network
  • the NPU can quickly process input information and continuously learn by itself.
  • Applications such as intelligent cognition of the terminal device 200 can be implemented through the NPU, such as image recognition, face recognition, speech recognition, text understanding, and the like.
  • the external memory interface 220 can be used to connect an external memory card, such as a Micro SD card, to expand the storage capacity of the terminal device 200.
  • the external memory card communicates with the processor 210 through the external memory interface 220 to implement a data storage function. Such as saving music, video and other files in the external memory card.
  • the internal memory 121 may be used to store computer-executable program codes including instructions.
  • the processor 210 executes various functional applications and data processing of the terminal device 200 by executing instructions stored in the internal memory 121 .
  • the internal memory 121 may include an area for storing programs and an area for storing data.
  • the stored program area can store an operating system, at least one application program required by a function (such as a sound playing function, an image playing function, etc.) and the like.
  • the storage data area can store data created during the use of the terminal device 200 (such as audio data, phonebook, etc.) and the like.
  • the internal memory 121 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, flash memory device, universal flash storage (universal flash storage, UFS) and the like.
  • the terminal device 200 may implement an audio function through an audio module 270, a speaker 270A, a receiver 270B, a microphone 270C, an earphone interface 270D, and an application processor. Such as music playback, recording, etc.
  • the audio module 270 is used to convert digital audio information into analog audio signal output, and is also used to convert analog audio input into digital audio signal.
  • the audio module 270 may also be used to encode and decode audio signals.
  • the audio module 270 can be set in the processor 210 , or some functional modules of the audio module 270 can be set in the processor 210 .
  • Speaker 270A also referred to as a "horn" is used to convert audio electrical signals into sound signals.
  • the terminal device 200 can listen to music through the speaker 270A, or listen to hands-free calls.
  • Receiver 270B also called “earpiece” is used to convert audio electrical signals into audio signals.
  • the receiver 270B can be placed close to the human ear to receive the voice.
  • the microphone 270C also called “microphone” or “microphone” is used to convert sound signals into electrical signals.
  • the user can make a sound by approaching the microphone 270C with a human mouth, and input the sound signal into the microphone 270C.
  • the terminal device 200 may be provided with at least one microphone 270C.
  • the terminal device 200 may be provided with two microphones 270C, which may also implement a noise reduction function in addition to collecting sound signals.
  • the terminal device 200 can also be provided with three, four or more microphones 270C, so as to collect sound signals, reduce noise, identify sound sources, and realize directional recording functions, etc.
  • the earphone interface 270D is used for connecting wired earphones.
  • the earphone interface 270D may be a USB interface 230, or a 3.5mm open mobile terminal platform (open mobile terminal platform, OMTP) standard interface, or a cellular telecommunications industry association of the USA (CTIA) standard interface.
  • OMTP open mobile terminal platform
  • CTIA cellular telecommunications industry association of the USA
  • the pressure sensor 280A is used to sense the pressure signal and convert the pressure signal into an electrical signal.
  • pressure sensor 280A may be located on display screen 294 .
  • pressure sensors 280A such as resistive pressure sensors, inductive pressure sensors, and capacitive pressure sensors.
  • a capacitive pressure sensor may be comprised of at least two parallel plates with conductive material.
  • the terminal device 200 may also calculate the touched position according to the detection signal of the pressure sensor 280A.
  • touch operations acting on the same touch position but with different touch operation intensities may correspond to different operation instructions. For example: when a touch operation with a touch operation intensity less than the first pressure threshold acts on the short message application icon, an instruction to view short messages is executed. When a touch operation whose intensity is greater than or equal to the first pressure threshold acts on the icon of the short message application, the instruction of creating a new short message is executed.
  • the gyroscope sensor 280B can be used to determine the motion posture of the terminal device 200 .
  • the angular velocity of the terminal device 200 around three axes ie, x, y and z axes
  • the gyro sensor 280B can be used for image stabilization.
  • the gyro sensor 280B detects the shaking angle of the terminal device 200, calculates the distance that the lens module needs to compensate according to the angle, and allows the lens to counteract the shaking of the terminal device 200 through reverse movement to achieve anti-shake.
  • the gyro sensor 280B can also be used for navigation and somatosensory game scenes.
  • the air pressure sensor 280C is used to measure air pressure. In some embodiments, the terminal device 200 calculates the altitude based on the air pressure value measured by the air pressure sensor 280C to assist in positioning and navigation.
  • the magnetic sensor 280D includes a Hall sensor.
  • the terminal device 200 may use the magnetic sensor 280D to detect the opening and closing of the flip holster.
  • the terminal device 200 may detect opening and closing of the clamshell according to the magnetic sensor 280D.
  • features such as automatic unlocking of the flip cover are set.
  • the acceleration sensor 280E can detect the acceleration of the terminal device 200 in various directions (generally three axes). When the terminal device 200 is stationary, the magnitude and direction of gravity can be detected. It can also be used to recognize the posture of terminal equipment, and can be used in applications such as horizontal and vertical screen switching, pedometers, etc.
  • the terminal device 200 can use the proximity light sensor 280G to detect that the user holds the terminal device 200 close to the ear to make a call, so as to automatically turn off the screen to save power.
  • Proximity light sensor 280G can also be used in leather case mode, automatic unlock and lock screen in pocket mode.
  • Touch sensor 280K also known as "touch panel”.
  • the touch sensor 280K can be arranged on the display screen 294, and the touch sensor 280K and the display screen 294 form a touch screen, also called “touch screen”.
  • the touch sensor 280K is used to detect a touch operation on or near it.
  • the touch sensor can pass the detected touch operation to the application processor to determine the type of touch event.
  • Visual output related to touch operations can be provided through the display screen 294 .
  • the touch sensor 280K may also be disposed on the surface of the terminal device 200 , which is different from the position of the display screen 294 .
  • FIG. 3 is a block diagram of the software structure of the terminal device 200 of the present application.
  • the application framework layer provides an application programming interface (application programming interface, API) and a programming framework for applications in the application layer.
  • the application framework layer includes some predefined functions.
  • the application framework layer can include window manager, content provider, view system, phone manager, resource manager, notification manager, security management module, etc.
  • Content providers are used to store and retrieve data and make it accessible to applications.
  • Said data may include video, images, audio, calls made and received, browsing history and bookmarks, phonebook, etc.
  • the view system includes visual controls, such as controls for displaying text, controls for displaying pictures, and so on.
  • the view system can be used to build applications.
  • a display interface can consist of one or more views.
  • a display interface including a text message notification icon may include a view for displaying text and a view for displaying pictures.
  • the resource manager provides various resources for the application, such as localized strings, icons, pictures, layout files, video files, and so on.
  • the notification manager enables the application to display notification information in the status bar, which can be used to convey notification-type messages, and can automatically disappear after a short stay without user interaction.
  • the notification manager is used to notify the download completion, message reminder, etc.
  • the notification manager can also be a notification that appears on the top status bar of the system in the form of a chart or scroll bar text, such as a notification of an application running in the background, or a notification that appears on the screen in the form of a dialog window.
  • a text message is displayed in the status bar, a prompt sound is issued, the terminal device 200 vibrates, and the indicator light flashes.
  • the present application cites the case of setting the security management module at the application framework layer, and the security management module may also be set at the kernel layer, which is not limited in the present application. As long as it has the same function as the security management module provided by this application, it is within the scope of protection of this application.
  • the Android Runtime includes core library and virtual machine. The Android runtime is responsible for the scheduling and management of the Android system.
  • the core library consists of two parts: one part is the function function that the java language needs to call, and the other part is the core library of Android.
  • the application layer and the application framework layer run in virtual machines.
  • the virtual machine executes the java files of the application program layer and the application program framework layer as binary files.
  • the virtual machine is used to perform functions such as object life cycle management, stack management, thread management, security and exception management, and garbage collection.
  • the media library supports playback and recording of various commonly used audio and video formats, as well as still image files, etc.
  • the media library can support a variety of audio and video encoding formats, such as: MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, etc.
  • the 2D graphics engine is a drawing engine for 2D drawing.
  • the kernel layer is the layer between hardware and software.
  • the kernel layer includes at least a display driver, a Wi-Fi driver, a Bluetooth driver, an audio driver, and a sensor driver.
  • the kernel layer may also include a process scheduling module, a disk data module, etc., which are not limited in this application.
  • the components included in the system framework layer, system library, and runtime layer shown in FIG. 3 do not constitute a specific limitation on the terminal device 200 .
  • the terminal device 200 may include more or fewer components than shown in the figure, or combine certain components, or separate certain components, or arrange different components.
  • FIG. 2 listed above is a structural diagram of a possible terminal device
  • FIG. 3 is a software architecture diagram of a possible terminal device.
  • the following embodiments of this application will take the service call between two terminal devices (such as the first device and the second device) in the multi-terminal device network shown in Figure 1 as an example, and the terminal device may have the The structure described above, the software structure shown in Figure 3.
  • the first electronic device that applies for invoking a service is called a "service application device”
  • the second electronic device that provides a service is called a "service providing device”.
  • both the service application device and the service provision device can include the security management module of the application framework layer in Figure 3, and the same terminal device can be used as a service application device (or called a "service calling device"), or Devices are provided as a service.
  • device A in FIG. 1 may apply for invoking the service and/or application of device B, and device B may in turn apply for invoking the service and/or application of device A.
  • device A applies to call the service and/or application of device B device A applies for the device for the service, and device B provides the device for the service;
  • device B in turn applies for calling the service and/or application of device A, device B is the service Apply for equipment, and equipment A provides equipment for the service, which is not limited in this application.
  • an application is an application (application, APP) installed on a terminal device provided by a third party, for example, a video application, a map application, a chat application, etc.
  • a service is provided by an operating system of the terminal device. functions, such as taking pictures, location services, SMS, etc.
  • distributed applications and services can be implemented in a network of multiple terminal devices, so the relevant procedures below are also applicable to applications.
  • security levels are respectively set for terminal equipment and services
  • security levels for terminal equipment include L1-Lm
  • security levels for services include SL1-SLn.
  • L1-Lm security levels for terminal equipment
  • SL1-SLn security levels for services
  • the terminal device can only process services with the same or lower security level as its own, and the security level here is the same or lower.
  • Step 401 the service calling device obtains the second security level of the device.
  • the service calling device calls the service on the service providing device by sending a request.
  • the service invocation request includes the identifier of the service to be invoked, so that the service providing device can determine the service to be invoked by the service invocation device according to the service identifier, and then determine the first security level of the service.
  • the service invocation request further includes the identification of the security level of the service invoking device, so that the service providing device can determine the second security level according to the identification of the security level of the service invoking device.
  • each terminal device can be configured with a security level table, which includes multiple security levels and their corresponding identifiers, so that the service providing device can determine its security level according to the identifier of the security level of the service calling device.
  • Step 403 the service providing device acquires the first security level of the service according to the service invocation request.
  • the operating system of the terminal device provides a service security level configuration interface
  • the service security level configuration interface includes but is not limited to the following forms:
  • the configuration file includes the field Securelevel: SL1.
  • Securelevel is a newly added security level field in the config file, and SL1 is preset or written by the service provider.
  • the configuration file (such as xml/config/Json file) includes the Securelevel field, and the configuration format is as follows:
  • the above configuration can be implemented by the provider of the service.
  • the security configuration page can be displayed to the user, and the user can write or select the security level of the service.
  • the terminal operating system may also provide the user with an interface or interface for setting the security level in other ways, which is not specifically limited in this application.
  • the service key signature level can be associated with the service security level, and the service key signature level reflects its security level. For example, a service with a security level of SL1 is signed with an SL1-level key; a service with a security level of SL2 is signed with a SL2-level key.
  • the storage path of the service program may be associated with the security level of the service, and the security level of the service program may be reflected by the storage path of the service program.
  • the storage path of the service program is under the system path, and its security level is SL2, and the storage path of the service program is under the data path, and its security level is SL1.
  • the operating system of the terminal device may also provide other security level configuration interfaces to configure the security level of the service, and this application does not limit the specific implementation of the configuration.
  • the service providing device can obtain the first security level of the service to be invoked by the service calling device, for example, it can read the value of the field Securelevel in the config file, and use SL1 as the first security level; or, read Take the field Securelevel in the configuration item of the service, and use SL1 as the first security level; or, obtain the secret key signature level of the service, and use its corresponding security level as the first security level; or, obtain the storage path of the service program, The second security level of the service is determined according to the storage path.
  • Step 404 the service providing device obtains the second security level of the service calling device according to the service calling request.
  • the service invocation request may include the identifier of the service invoking device, and the service providing device may look up the security level corresponding to the identifier from the security level information table, and use it as the second security level.
  • the service invocation request may include an identifier of the security level of the service invoking device, and the service providing device may search the security level table for the security level corresponding to the identifier, and use it as the second security level.
  • the service providing device may also store the correspondence between the identification of the terminal device and the security level in other ways, or the correspondence between the identification of the security level of the terminal equipment and the security level, which is not specifically limited in this application. .
  • Step 405 the service providing device determines whether the service calling device has the right to call the service according to the first security level and the second security level.
  • the service providing device may determine whether the first security level is smaller than the second security level. When the first security level is lower than the second security level, it is determined that the service calling device has the right to call the service; or, when the first security level is greater than or equal to the second security level, it is determined that the service calling device does not have the right to call the service.
  • the security level of the terminal device and the security level of the service may use the same judgment standard.
  • the security level of the terminal device and the security level of the service both include L1-Lm, so the two security levels are the same standard.
  • the first security level is lower than the second security level, indicating that the security level of the service is lower than that of the service calling device, and the service calling device can call the service, so the service providing device determines that the service calling device has the authority to call the service.
  • the service providing device may determine the highest service level corresponding to the second security level, and determine whether the first security level is smaller than the highest service level. When the first security level is less than the highest service level, it is determined that the service calling device has the right to call the service; when the first security level is greater than or equal to the highest service level, it is determined that the service calling device does not have the right to call the service.
  • the security level of the terminal equipment and the security level of the service can adopt different judgment standards, but there is a corresponding relationship between the security level of the terminal equipment and the security level of the service.
  • the security level of the terminal equipment includes L1 ⁇ Lm
  • the security levels of the service include SL1 ⁇ SLn, m ⁇ n
  • the security level of one terminal device may correspond to one or more security levels of the service.
  • the highest level of service corresponding to the second security level refers to the highest level of service that the service calling device can call. If the service is higher than the highest service level, the service calling device cannot call it.
  • the first security level is lower than the highest level of the service, which means that the security level of the service is lower than the highest level of the service that the service calling device can call, and the service calling device can call the service, so the service providing device determines that the service calling device has the authority to call the service.
  • the service providing device may determine the lowest level of the device corresponding to the first security level, and determine whether the second security level is greater than or equal to the lowest level of the device. When the second security level is greater than the lowest level of the device, it is determined that the service calling device has the right to call the service; when the second security level is less than or equal to the lowest level of the device, it is determined that the service calling device does not have the right to call the service.
  • the security level of the terminal equipment and the security level of the service can adopt different judgment standards, but there is a corresponding relationship between the security level of the terminal equipment and the security level of the service.
  • the security level of the terminal equipment includes L1 ⁇ Lm
  • the security levels of the service include SL1 ⁇ SLn
  • m is greater than n
  • one security level of the service may correspond to the security levels of one or more terminal devices.
  • the lowest level of equipment corresponding to the first security level refers to the lowest level of equipment that can call the service. If the security level of the service calling device is lower than the lowest level of the device, the service cannot be called.
  • the second security level is greater than the lowest level of the device, which means that the security level of the service calling device is greater than the lowest level of the terminal device that can call the service, and the service calling device can call the service, so the service providing device determines that the service calling device has the authority to call the service.
  • the service providing device matches the security level of the service invoking device with the security level of the called service.
  • the terminal device can call a service with a low security level), and the service calling device has the authority to call the service on the service providing device, ensuring the security of the service.
  • Step 406 When the service calling device has the right to call the service, the service providing device allows the service calling device to call the service.
  • the service providing device can determine whether the service calling device has the authority to call the service. Allowing the service calling device to call the service means that the service calling device can use the service and obtain the data of the service.
  • terminal equipment with a high security level can call services with a low security level, ensuring the security of services.
  • the above-mentioned embodiment describes the process of the service calling device securely calling the service on the service providing device.
  • the service calling device is allowed to call the service and obtain the data of the service.
  • FIG. 5 is a flowchart of a process 500 of the method for secure registration service provided by the present application.
  • the process 500 can be executed by a terminal device 200, specifically, it can be executed by an operating system of the terminal device.
  • the process 500 is described as a series of steps or operations. It should be understood that the process 500 may be executed in various orders and/or concurrently, and is not limited to the execution order shown in FIG. 5 .
  • Process 500 may include:
  • Step 501 obtain a service registration request.
  • the user uses the service for the first time, in order to ensure the security of user data, the user is required to register the service, for example, enter the user name and password set by the user.
  • the operating system of the terminal device will receive an operation instruction from the touch screen, and the operation instruction includes a service registration request.
  • Step 502 acquiring the first security level of the service for which the terminal device requests to register.
  • the operating system of the terminal device provides a service security level configuration interface
  • the service security level configuration interface includes but is not limited to the following forms:
  • the configuration file includes the field Securelevel: SL1.
  • Securelevel is a newly added security level field in the config file, and SL1 is preset or written by the service provider.
  • the configuration file (such as xml/config/Json file) includes the Securelevel field, and the configuration format is as follows:
  • the above configuration can be implemented by the provider of the service.
  • the security configuration page can be displayed to the user, and the user can write or select the security level of the service.
  • the terminal operating system may also provide the user with an interface or interface for setting the security level in other ways, which is not specifically limited in this application.
  • the service key signature level can be associated with the service security level, and the service key signature level reflects its security level. For example, a service with a security level of SL1 is signed with an SL1-level key; a service with a security level of SL2 is signed with a SL2-level key.
  • the storage path of the service program may be associated with the security level of the service, and the security level of the service program may be reflected by the storage path of the service program.
  • the storage path of the service program is under the system path, and its security level is SL2, and the storage path of the service program is under the data path, and its security level is SL1.
  • the operating system of the terminal device may also provide other security level configuration interfaces to configure the security level of the service, and this application does not limit the specific implementation of the configuration.
  • the terminal device can obtain the first security level of the service to be registered, for example, you can read the value of the field Securelevel in the config file, and use SL1 as the first security level; or, read the configuration of the service
  • the field Securelevel in the item set SL1 as the first security level; or, obtain the key signature level of the service, and use its corresponding security level as the first security level; or, obtain the storage path of the program of the service, according to the storage path Determines the second security level for the service.
  • Step 503 acquire the second security level of the terminal device.
  • the security level of the device itself can be written into the property file or firmware of the terminal device, so that when the terminal device registers for the service, it can first read the security level of the device from the corresponding file as the second security level.
  • Step 504 Determine whether the terminal device has the right to register the service according to the first security level and the second security level.
  • the operating system of the terminal device may determine whether the first security level is lower than the second security level. When the first security level is lower than the second security level, it is determined that the terminal device has the authority to register for the service; or, when the first security level is greater than or equal to the second security level, it is determined that the terminal device does not have the authority to register for the service.
  • the security level of the terminal device and the security level of the service may use the same judgment standard.
  • the security level of the terminal device and the security level of the service both include L1-Lm, so the two security levels are the same standard.
  • the first security level is lower than the second security level, indicating that the security level of the service is lower than that of the terminal device, and the terminal device can register for the service, so the operating system of the terminal device determines that the terminal device has the authority to register for the service.
  • the operating system of the terminal device may determine the highest service level corresponding to the second security level, and determine whether the first security level is lower than the highest service level. When the first security level is less than the highest service level, it is determined that the terminal device has the authority to register for the service; when the first security level is greater than or equal to the highest service level, it is determined that the terminal device does not have the authority to register for the service.
  • the security level of the terminal equipment and the security level of the service can adopt different judgment standards, but there is a corresponding relationship between the security level of the terminal equipment and the security level of the service.
  • the security level of the terminal equipment includes L1 ⁇ Lm
  • the security levels of the service include SL1 ⁇ SLn, m ⁇ n
  • the security level of one terminal device may correspond to one or more security levels of the service.
  • the highest service level corresponding to the second security level refers to the highest service level that the terminal device can register with. If the service is higher than the highest service level, the terminal device cannot register.
  • the first security level is lower than the highest service level, indicating that the security level of the service is lower than the highest level of services that the terminal device can register for, and the terminal device can register for the service, so the operating system of the terminal device determines that the terminal device has the authority to register for the service.
  • the operating system of the terminal device may determine the lowest level of the device corresponding to the first security level, and determine whether the second security level is greater than or equal to the lowest level of the device. When the second security level is greater than the lowest level of the device, it is determined that the terminal device has the authority to register the service; when the second security level is less than or equal to the lowest level of the device, it is determined that the terminal device does not have the authority to register the service.
  • the security level of the terminal equipment and the security level of the service can adopt different judgment standards, but there is a corresponding relationship between the security level of the terminal equipment and the security level of the service.
  • the security level of the terminal equipment includes L1 ⁇ Lm
  • the security levels of the service include SL1 ⁇ SLn
  • m is greater than n
  • one security level of the service may correspond to the security levels of one or more terminal devices.
  • the lowest level of equipment corresponding to the first security level refers to the lowest level of equipment that can register for services. If the security level of a terminal device is lower than the lowest level of equipment, it cannot register for services.
  • the second security level is greater than the lowest level of the device, which means that the security level of the terminal device is greater than the lowest level of the terminal device that can register for the service, and the terminal device can register for the service. Therefore, the operating system of the terminal device determines that the terminal device has the authority to register for the service.
  • the operating system of the terminal device matches the security level of the terminal device with the security level of the registered service.
  • the terminal device can register a service with a low security level), the terminal device has the authority to register the service on the operating system of the terminal device, ensuring the security of the service.
  • Step 505 when the terminal device has the authority to register for the service, allow the terminal device to register for the service.
  • the operating system of the terminal device can determine whether the terminal device has the authority to register the service. Allowing a terminal device to register with a service means that the terminal device can register with the service and obtain data of the service.
  • a terminal device with a security level can register a service with a low security level, which ensures the security of the service.
  • the above-mentioned embodiment describes the process of securely registering a local service on a terminal device.
  • the operating system of the terminal device can also refer to the above steps to implement the process of securely installing the service on the terminal device.
  • the terminal device has the authority to install the service, the terminal device is allowed to install service.
  • FIG. 6 is an exemplary structural diagram of an apparatus 600 for securely invoking a service provided by the present application. As shown in FIG. 6 , the apparatus 600 may be applied to the terminal device in the foregoing embodiment.
  • the apparatus 600 in this embodiment may include: an acquiring module 601 and a processing module 602 . in,
  • the obtaining module 601 is used to obtain the first security level of the service requested by the terminal device; to obtain the second security level of the terminal device; the processing module 602 is used to obtain the first security level according to the first security level and the second security level Determine whether the terminal device has the right to call the service; when the terminal device has the right to call the service, allow the terminal device to call the service.
  • the processing module 602 is specifically configured to determine whether the first security level is lower than the second security level; when the first security level is lower than the second security level, Determining that the terminal device has the right to call the service; or, when the first security level is greater than or equal to the second security level, determining that the terminal device does not have the right to call the service.
  • the processing module 602 is specifically configured to determine the highest service level corresponding to the second security level; determine whether the first security level is less than the highest service level; When a security level is less than the highest service level, it is determined that the terminal device has the right to call the service; when the first security level is greater than or equal to the highest service level, it is determined that the terminal device does not have the right to call the service. permissions for the services described above.
  • the processing module 602 is specifically configured to determine the lowest level of equipment corresponding to the first security level; determine whether the second security level is greater than the lowest level of the equipment; When the second security level is greater than the lowest level of the device, it is determined that the terminal device has the authority to call the service; when the second security level is less than or equal to the lowest level of the device, it is determined that the terminal device does not have the right to call the service permissions for the services described above.
  • the obtaining module 601 is further configured to receive a service invocation request sent by the terminal device.
  • the service call request includes the identifier of the service; the obtaining module 601 is specifically configured to determine the service according to the identifier of the service; read the configuration file of the service to obtain The first security level; or, acquiring the user configuration information of the service to acquire the first security level; or, acquiring the first security level according to characteristic information of the service, the characteristic information including the service The signature level of the secret key or the storage path of the program of the service.
  • the acquiring module 601 is specifically configured to acquire the second security level according to the identifier of the terminal device when the service call request includes the identifier of the terminal device; or, When the service invocation request includes the security level identifier of the terminal device, the second security level is acquired according to the security level identifier of the terminal device.
  • the acquiring module 601 is further configured to acquire the third security level of the service for which the terminal device requests registration; acquire the fourth security level of the terminal device; the processing module 602 is also configured to Determine whether the terminal device has the authority to register the service according to the third security level and the fourth security level; when the terminal device has the authority to register the service, allow the terminal device to register the service described services.
  • the processing module 602 is specifically configured to determine whether the third security level is lower than the fourth security level; when the third security level is lower than the fourth security level, Determining that the terminal device has the right to register the service; or, when the third security level is greater than or equal to the fourth security level, determining that the terminal device does not have the right to register the service.
  • the processing module 602 is specifically configured to determine the highest service level corresponding to the fourth security level; determine whether the third security level is smaller than the highest service level; When the third security level is less than the highest service level, it is determined that the terminal device has the right to register the service; when the third security level is greater than or equal to the highest service level, it is determined that the terminal device does not have the right to register permissions for the services described above.
  • the processing module 602 is specifically configured to determine the lowest level of equipment corresponding to the third security level; determine whether the fourth security level is greater than the lowest level of equipment; Fourth, when the security level is greater than the lowest level of the device, it is determined that the terminal device has the right to register the service; when the fourth security level is less than or equal to the lowest level of the device, it is determined that the terminal device does not have the right to register permissions for the services described above.
  • the acquiring module 601 is further configured to acquire a service registration request.
  • the service registration request includes the identifier of the service; the obtaining module 601 is specifically configured to determine the service according to the identifier of the service; read the configuration file of the service to obtain The third security level; or, acquiring the third security level from user configuration information of the service; or, acquiring the third security level according to characteristic information of the service, the characteristic information including the service The signature level of the secret key or the storage path of the program of the service.
  • the device in this embodiment can be used to execute the technical solution of the method embodiment shown in FIG. 4 or FIG. 5 , and its implementation principle and technical effect are similar, and details are not repeated here.
  • each step of the above-mentioned method embodiments may be completed by an integrated logic circuit of hardware in a processor or instructions in the form of software.
  • the processor can be a general-purpose processor, a digital signal processor (DSP), an application-specific integrated circuit (ASIC), a field programmable gate array (FPGA), or other possible Program logic devices, discrete gate or transistor logic devices, discrete hardware components.
  • a general-purpose processor may be a microprocessor, or the processor may be any conventional processor, or the like.
  • the steps of the method disclosed in the present application can be directly implemented by a hardware coded processor, or executed by a combination of hardware and software modules in the coded processor.
  • the software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, register.
  • the storage medium is located in the memory, and the processor reads the information in the memory, and completes the steps of the above method in combination with its hardware.
  • the memories mentioned in the above embodiments may be volatile memories or nonvolatile memories, or may include both volatile and nonvolatile memories.
  • the non-volatile memory can be read-only memory (read-only memory, ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically programmable Erases programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • Volatile memory can be random access memory (RAM), which acts as external cache memory.
  • RAM random access memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • SDRAM double data rate synchronous dynamic random access memory
  • ESDRAM enhanced synchronous dynamic random access memory
  • SLDRAM direct memory bus random access memory
  • direct rambus RAM direct rambus RAM
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
  • the functions described above are realized in the form of software function units and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the technical solution of the present application is essentially or the part that contributes to the prior art or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (personal computer, server, or network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (read-only memory, ROM), random access memory (random access memory, RAM), magnetic disk or optical disc and other media that can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

La présente demande concerne un procédé pour appeler de manière sécurisée un service, et un procédé et un appareil pour enregistrer de manière sécurisée le service. Le procédé pour appeler de manière sécurisée un service dans la présente demande comprend les étapes suivantes : obtention d'un premier niveau de sécurité d'un service demandé à être appelé par un dispositif terminal ; obtention d'un second niveau de sécurité du dispositif terminal ; détermination, selon le premier niveau de sécurité et le second niveau de sécurité, quant au fait de savoir si le dispositif terminal dispose de l'autorisation d'appeler le service ; et lorsque le dispositif terminal dispose de l'autorisation d'appeler le service, autorisation au dispositif terminal d'appeler le service. La présente demande assure la sécurité du service.
PCT/CN2022/102477 2021-07-14 2022-06-29 Procédé pour appeler de manière sécurisée un service, et procédé et appareil pour enregistrer de manière sécurisée un service WO2023284555A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110795692.3 2021-07-14
CN202110795692.3A CN115701018A (zh) 2021-07-14 2021-07-14 安全调用服务的方法、安全注册服务的方法及装置

Publications (1)

Publication Number Publication Date
WO2023284555A1 true WO2023284555A1 (fr) 2023-01-19

Family

ID=84919017

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/102477 WO2023284555A1 (fr) 2021-07-14 2022-06-29 Procédé pour appeler de manière sécurisée un service, et procédé et appareil pour enregistrer de manière sécurisée un service

Country Status (2)

Country Link
CN (1) CN115701018A (fr)
WO (1) WO2023284555A1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116226886B (zh) * 2023-03-22 2024-02-09 中国移动通信集团广东有限公司 一种软件信息系统的信息安全管理方法及系统

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101282254A (zh) * 2007-04-02 2008-10-08 华为技术有限公司 家庭网络设备管理方法、系统及装置
CN101383828A (zh) * 2008-10-13 2009-03-11 中国电信股份有限公司 一种JavaScript对象的调用方法、系统和终端
US20150042449A1 (en) * 2013-08-09 2015-02-12 Lg Cns Co., Ltd. Method of controlling mobile terminal based on location information and applying security policy based on priority rules, and system thereof
CN105264934A (zh) * 2013-04-15 2016-01-20 德国捷德有限公司 包含具有不同安全级别的安全资源的移动平台
CN105790957A (zh) * 2016-04-29 2016-07-20 宇龙计算机通信科技(深圳)有限公司 一种eSIM卡数据共享方法及相关设备、系统
WO2018076368A1 (fr) * 2016-10-31 2018-05-03 美的智慧家居科技有限公司 Procédé et système pour exploiter en toute sécurité un dispositif dans un réseau local, et dispositif associé

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101282254A (zh) * 2007-04-02 2008-10-08 华为技术有限公司 家庭网络设备管理方法、系统及装置
CN101383828A (zh) * 2008-10-13 2009-03-11 中国电信股份有限公司 一种JavaScript对象的调用方法、系统和终端
CN105264934A (zh) * 2013-04-15 2016-01-20 德国捷德有限公司 包含具有不同安全级别的安全资源的移动平台
US20150042449A1 (en) * 2013-08-09 2015-02-12 Lg Cns Co., Ltd. Method of controlling mobile terminal based on location information and applying security policy based on priority rules, and system thereof
CN105790957A (zh) * 2016-04-29 2016-07-20 宇龙计算机通信科技(深圳)有限公司 一种eSIM卡数据共享方法及相关设备、系统
WO2018076368A1 (fr) * 2016-10-31 2018-05-03 美的智慧家居科技有限公司 Procédé et système pour exploiter en toute sécurité un dispositif dans un réseau local, et dispositif associé

Also Published As

Publication number Publication date
CN115701018A (zh) 2023-02-07

Similar Documents

Publication Publication Date Title
WO2020259452A1 (fr) Procédé d'affichage plein écran pour terminal mobile et appareil
US20220050656A1 (en) Method for displaying ui component and electronic device
US11868463B2 (en) Method for managing application permission and electronic device
US20230021994A1 (en) Cross-Device Content Projection Method and Electronic Device
CN110276177B (zh) 智能终端的登录方法及电子设备
WO2021052204A1 (fr) Procédé de découverte de dispositif basé sur un carnet d'adresses, procédé de communication audio et vidéo, et dispositif électronique
WO2021253975A1 (fr) Procédé et appareil de gestion d'autorisation pour application, et dispositif électronique
WO2022042770A1 (fr) Procédé de commande d'état de service de communication, dispositif terminal et support de stockage lisible
US20230262065A1 (en) Atomic Ability Invoking Method and Terminal Device
CN114124980B (zh) 一种启动应用的方法、设备、系统、终端及存储介质
WO2020107463A1 (fr) Procédé de commande de dispositif électronique et dispositif électronique
US20240031450A1 (en) Method and apparatus for processing push message
WO2021218429A1 (fr) Procédé de gestion d'une fenêtre d'application, dispositif terminal et support de stockage lisible par ordinateur
CN111615820B (zh) 通过向grs服务器发送关键值进行域名解析的方法及设备
EP4195199A1 (fr) Procédé de réduction de bruit et appareil de réduction de bruit
US20230297700A1 (en) Permission Management Method and Terminal Device
US20230418630A1 (en) Operation sequence adding method, electronic device, and system
WO2023284555A1 (fr) Procédé pour appeler de manière sécurisée un service, et procédé et appareil pour enregistrer de manière sécurisée un service
CN114006698B (zh) token刷新方法、装置、电子设备及可读存储介质
WO2022135195A1 (fr) Procédé et appareil permettant d'afficher une interface de réalité virtuelle, dispositif, et support de stockage lisible
WO2021147483A1 (fr) Procédé et appareil de partage de données
WO2023024887A1 (fr) Procédé et appareil d'authentification inter-dispositifs
WO2023155583A1 (fr) Procédé de gestion d'application inter-dispositifs, dispositif électronique et système
WO2023109636A1 (fr) Procédé et appareil d'affichage de carte d'application, dispositif terminal et support de stockage lisible
US20230342335A1 (en) File sharing method and electronic device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22841193

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE