A kind of safety applications collocation method and deviceTechnical field
The application is related to communication technical field, more particularly to a kind of safety applications collocation method and device.
Background technology
The development of mobile communication technology brings the fast development of mobile terminal technology, the biography using BBP as coreFunctional form mobile terminal of uniting has been difficult to meet the mobile service demand that people are become increasingly abundant.With open high-order independent operation systemSystem, the Mobile solution that third party's exploitation can be installed, wireless access can be realized by mobile network, there is powerful disposal abilityThe development trend of mobile terminal is turned into the mobile intelligent terminal of more memory spaces.With traditional functional form mobile terminal notTogether, mobile intelligent terminal has no longer been simple voice call instrument, and it possesses the mobility of regular handset, telecommunications service work(The disposal ability of energy and PC (Personal Computer, personal computer) computer, network function, by telecommunications service and networkService convergence is within one device.While the popularization of mobile intelligent terminal brings great convenience, also bringGreat potential safety hazard.
Mobile intelligent terminal, which has evolved into, can download and install opening for various third-party applications from mobile InternetSoftware platform is put, meanwhile, the demand of mobile intelligent terminal processing critical services increasingly increases.From multimedia service to mobile phone remotePay and cause mobile intelligent terminal to turn into the viruses such as Malware, wooden horse with function, these development trends such as bank account managementTarget of attack.Due to lacking integrity protection mechanism on current mobile intelligent terminal, its software and hardware is easily under attack and usurpsChange, security breaches existing for operating system and third party software make security threat existing for mobile intelligent terminal exist than PC terminalSecurity threat it is more serious.
Common Mobile operating system Android, iOS belong to REE (untrusted performing environment) insecure environments, install thereonApplication belong to non-security application.Corresponding with REE is TEE (credible performing environment), it be run parallel with REE and therewith everyFrom isolated execution environment, and provide security service by TA (safety applications) for REE, REE passes through CA (client application) and visitedAsk TA.
Application software deployment way under traditional REE insecure environments is broadly divided into two kinds:The first, by device fabricationBusiness is preset in smart machine, the application software customized such as mobile operator;Second, issued by application developer using cityField or official website, voluntarily download and install for user.
The content of the invention
The problem of existing is that two kinds of deployment way all do not need special access right and extra safety certification measure, relies only on shiftingSoftware levels protection (such as antivirus software or security guard) in dynamic operating system, security protection rank is low.In download or moreEasily it is forged and is distorted during new, it is impossible to meets the demand of user's business high to sensitive data and level of security.
In order to solve the above problems, the application provides a kind of safety applications collocation method and device.
The application proposes a kind of safety applications collocation method, including:
In deployment phase, safety applications are deployed in credible performing environment;
In service stage, conduct interviews control to safety applications;
In the more new stage, safety applications are updated by trusted service management system;
Wherein, it is described that safety applications are deployed in credible performing environment, including:
Safety applications are preset on mobile phone terminal;Safety applications and some untrusted applications bundle to the side of installationFormula is attached on mobile phone terminal;Safety applications are placed in trusted service management system, pass through trusted service management system and handThe mode of machine terminal interaction is attached on mobile phone terminal.
Preferably, the control that safety applications are conducted interviews, including:
When client application sends safety applications access request, safety applications are examined to current untrusted performing environmentSurvey, judge whether risk;
Safety applications send authenticating identity request to client application, judge the security of client application;
Safety applications establish escape way with client application, are communicated by escape way.
Preferably, the safety applications deployment way that safety applications are preset on mobile phone terminal includes:
Preset safety applications are into credible performing environment, and preset client application is into untrusted performing environment;
Credible performing environment access modules are created, are deployed in untrusted performing environment;
Client application behavior script is write, is stored into client application;
Start client application and access credible performing environment;
Client application reading client application behavior script, access behavior is sent to credible performing environment and accesses mouldBlock;
The safety that credible performing environment access modules are loaded according to client application behavior script in credible performing environment shouldWith.
Preferably, the mode that safety applications and some untrusted applications bundle to installation is attached to mobile phone terminalOn safety applications deployment way include:
Safety applications and untrusted application are bundled;
Installed in untrusted performing environment or upgrade untrusted application;
Untrusted application is run in untrusted performing environment;
Untrusted is applied and copies to the safety applications file of binding under credible performing environment assigned catalogue;
Load the safety applications in credible performing environment.
Preferably, it is described that safety applications are placed in trusted service management system, pass through trusted service management system and handThe safety applications deployment way that the mode of machine terminal interaction is attached on mobile phone terminal includes:
Step S1:Installed in untrusted performing environment or upgrade untrusted application;
Step S2:Untrusted application is run in untrusted performing environment;
Step S3:Untrusted application judges whether client has safety applications installation file, does not continue, has and then perform stepRapid S5;
Step S4:System connection trusted service management system obtains safety applications installation kit;
Step S5:System opens safety applications installation kit and obtains safety applications file;
Step S6:Safety applications file is copied to client by system;
Step S7:System judges whether there is safety applications file in credible performing environment, has, and continues, not no then perform stepRapid S3;
Step S8:Safety applications file is copied under credible performing environment assigned catalogue by system;
Step S9:Safety applications in system loads are credible performing environment environment.
Preferably, it is described that safety applications are updated by trusted service management system, including:
Untrusted application is run in untrusted performing environment;
Untrusted applies the version information for obtaining safety applications by escape way with client application;
Untrusted application connection trusted service management system obtains the version information of safety applications installation kit;
Untrusted application compares safety applications and the version information of safety applications installation kit, and the party is exited if alwaysMethod, otherwise continue;
Safety applications installation kit is obtained from trusted service management system;
Open safety applications installation kit and obtain safety applications file;
Safety applications file is copied under the assigned catalogue of the credible performing environment of client;
Former safety applications file is deleted;
Load the safety applications in credible performing environment environment.
The application also proposes a kind of safety applications configuration device, including:
Deployment module, in deployment phase, safety applications to be deployed in credible performing environment;
Wherein, the deployment module, including:
Preset deployment component, for safety applications to be preset at into mobile phone terminal;
Binding deployment component, the mode for safety applications and some untrusted applications bundle to installation are attached to handIn machine terminal;
Remote deployment component, for safety applications to be placed in into trusted service management system, it is by trusted service managementThe mode interacted with mobile phone terminal of uniting is attached on mobile phone terminal.
Access control module, in service stage, to conduct interviews control to safety applications;
Security update module, in the more new stage, being updated by trusted service management system to safety applications.
Preferably, the access control module includes:
Risk Monitoring module, for when client application sends safety applications access request, safety applications to be to current non-Credible performing environment is detected, and judges whether risk
Authentication module, authenticating identity request is sent to client application for safety applications, judges client applicationSecurity;
Secure communication module, escape way is established for safety applications and client application, is led to by escape wayLetter.
Preferably, the preset deployment component includes:
Using preset unit, for preset safety applications into credible performing environment, preset client application to untrustedIn performing environment;
Module creation unit, for creating credible performing environment access modules, it is deployed in untrusted performing environment;
Script compilation unit, for writing client application behavior script, store into client application;
Communication unit, credible performing environment is accessed for starting client application;
Data transmission unit, for client application reading client application behavior script, access behavior is sent to canBelieve performing environment access modules;
First applies loading unit, can according to the loading of client application behavior script for credible performing environment access modulesBelieve the safety applications in performing environment.
Preferably, the binding deployment component includes:
Application bundle unit, for safety applications and untrusted application to be bundled;
First performs operating unit, for being installed in untrusted performing environment or upgrading untrusted application;
First operation applying unit, for running untrusted application in untrusted performing environment;
First file transmission unit, applied for untrusted and the safety applications file of binding is copied into credible performing environmentUnder assigned catalogue;
Second applies loading unit, for loading the safety applications in credible performing environment.
Preferably, the remote deployment component includes:
Second performs operating unit, for being installed in untrusted performing environment or upgrading untrusted application;
Second operation applying unit, for running untrusted application in untrusted performing environment;
First file judging unit, judge whether client has safety applications installation file for untrusted application;
First installation kit acquiring unit, safety applications installation kit is obtained for connecting trusted service management system;
First installation kit execution unit, safety applications file is obtained for opening safety applications installation kit;
File storage unit, for safety applications file to be copied into client;
Second file judging unit, for judging whether there is safety applications file in credible performing environment;
Second file transmission unit, for safety applications file to be copied under credible performing environment assigned catalogue;
3rd applies loading unit, for loading the safety applications in credible performing environment.
Preferably, the security update module includes:
3rd applies running unit, for running untrusted application in untrusted performing environment;
Application message acquiring unit, applied for untrusted and safety applications are obtained by escape way with client applicationVersion information;
Installation kit information acquisition unit, safety applications installation is obtained for untrusted application connection trusted service management systemThe version information of bag;
Information comparing unit, safety applications and the version information of safety applications installation kit are compared for untrusted application;
Second installation kit acquiring unit, for obtaining safety applications installation kit from trusted service management system;
Second installation kit execution unit, safety applications file is obtained for opening safety applications installation kit;
3rd file transmission unit, for safety applications file to be copied to the assigned catalogue of the credible performing environment of clientUnder;
Using unit is deleted, for former safety applications file to be deleted;
4th applies loading unit, for loading the safety applications in credible performing environment.
A kind of the safety applications collocation method and device that the invention described above proposes, obtain following technique effect:
The safety applications collocation method and device that the application proposes, are employed security protection to TA by each stage and arrangedApply, more believable secure interactive service is provided to the CA in REE.
Brief description of the drawings
, below will be to embodiment or existing in order to illustrate more clearly of the embodiment of the present application or technical scheme of the prior artThere is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only thisSome embodiments described in application, for those of ordinary skill in the art, other can also be obtained according to these accompanying drawingsAccompanying drawing.
Fig. 1 is the structural representation of the application safety applications configuration device;
Fig. 2 is the structural representation of the application deployment module;
Fig. 3 is the structural representation of the application access control module;
Fig. 4 is the structural representation of the application security update module;
Fig. 5 is the structural representation of the preset deployment component of the application;
Fig. 6 is the structural representation that the application bundlees deployment component;
Fig. 7 is the structural representation of the application remote deployment component;
Fig. 8 is the flow chart of the application safety applications collocation method;
Fig. 9 is the application in deployment phase, and safety applications are deployed in into the flow chart in credible performing environment;
Figure 10 is the application in service stage, the flow chart for the control that conducted interviews to safety applications;
Figure 11 is the flow chart that safety applications are preset on mobile phone terminal by the application;
Figure 12, which is the application, by safety applications and some untrusted applications bundle the mode of installation and is attached to mobile phone endFlow chart on end;
Figure 13 is that safety applications are placed in trusted service management system by the application, passes through trusted service management system and handThe mode of machine terminal interaction is attached to the flow chart on mobile phone terminal;
Figure 14 is the application in more new stage, the flow being updated by trusted service management system to safety applicationsFigure.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, completeSite preparation describes.
The application proposes a kind of safety applications configuration device, as shown in figure 1, including:
Deployment module 1, in deployment phase, safety applications to be deployed in credible performing environment;
Wherein, deployment module 1, as shown in Fig. 2 including:
Preset deployment component 11, for safety applications to be preset at into mobile phone terminal;Binding deployment component 12, for that will pacifyThe mode that full application with some untrusted applications bundle installation is attached on mobile phone terminal;Remote deployment component 13, is used forSafety applications are placed in trusted service management system, installed by way of trusted service management system interacts with mobile phone terminalTo mobile phone terminal.
Three of the above module can work or set simultaneously selector, and one is enabled.
Wherein, as shown in figure 5, preset deployment component 11 includes:
Using preset unit 111, for preset safety applications into credible performing environment, preset client application to it is non-canBelieve in performing environment;Module creation unit 112, for creating credible performing environment access modules, it is deployed to untrusted and performs ringIn border;Script compilation unit 113, for writing client application behavior script, store into client application;Communication unit114, access credible performing environment for starting client application;Data transmission unit 115, client is read for client applicationBehavior script is applied at end, and access behavior is sent into credible performing environment access modules;First applies loading unit 116, is used forCredible performing environment access modules load the safety applications in credible performing environment according to client application behavior script.
As shown in fig. 6, binding deployment component 12 includes:
Application bundle unit 121, for safety applications and untrusted application to be bundled;First performs operating unit122, for being installed in untrusted performing environment or upgrading untrusted application;First operation applying unit 123, for it is non-canBelieve and untrusted application is run in performing environment;First file transmission unit 124, applied for untrusted by the safety applications of bindingFile is copied under credible performing environment assigned catalogue;Second applies loading unit 125, for loading in credible performing environmentSafety applications.
The mode specifically bundled is to apply untrusted as the main body application with user mutual or communication with the outside world, credibleIt is automatic using the background application as backstage safe handling, the untrusted application of mobile phone terminal operation when mounted, untrusted applicationTrusted application is discharged into TEE, user can be avoided to directly contact trusted application;When in use, untrusted application receivesTo access request, forward the request in trusted application, trusted application is handled it, then is applied via untrusted by resultReturn, can avoid it is extraneous directly communicated with trusted application caused by potential safety hazard, lift TA safety in utilization.
As shown in fig. 7, remote deployment component 13 includes:
Second performs operating unit 131, for being installed in untrusted performing environment or upgrading untrusted application;Second fortuneRow applying unit 132, for running untrusted application in untrusted performing environment;First file judging unit 133, for non-Trusted application judges whether client has safety applications installation file;First installation kit acquiring unit 134, can convince for connectingManagement system of being engaged in obtains safety applications installation kit;First installation kit execution unit 135, obtained for opening safety applications installation kitSafety applications file;File storage unit 136, for safety applications file to be copied into client;Second file judging unit137, for judging whether there is safety applications file in credible performing environment;Second file transmission unit 138, for safety to be answeredIt is copied to file under credible performing environment assigned catalogue;3rd applies loading unit 139, for loading in credible performing environmentSafety applications.
Access control module 2, in service stage, to conduct interviews control to safety applications;
Wherein described access control module 2 includes as shown in Figure 3:
Risk Monitoring module 21, for when client application sends safety applications access request, safety applications to be to currentUntrusted performing environment is detected, and judges whether risk;
Specifically, first having to verify component, seeing that setting during whether with dispatching from the factory is identical, wind is sent if differentDangerous warning notice, next needs to carry out risk evaluation and test to all clients application, sees with the presence or absence of risk application, also sent out if havingGo out risk warning notice, finally background application detect, see whether the terminal is monitored, risk is sent if monitoredWarning notice.
Authentication module 22, authenticating identity request is sent to client application for safety applications, judge that client shouldSecurity;
Secure communication module 23, escape way is established for safety applications and client application, is carried out by escape wayCommunication.
Specifically, safety applications are poured into identity ID when mounted, while when client application access safety is applied,Public and private secret key pair is generated, public key is sent to client application, client application is sent to peace by the public key encryption communication informationThe communication information is decrypted using private key for full application, safety applications, and such safety applications communicate letter with client application useBreath establishes escape way, and safety applications securely communicate with client application passage safe to use.
Security update module 3, in the more new stage, being updated by trusted service management system to safety applications.
Wherein, the security update module as shown in figure 4, including:
3rd applies running unit 31, for running untrusted application in untrusted performing environment;Application message obtainsUnit 32, the version information for obtaining safety applications by escape way with client application is applied for untrusted;Installation kit is believedAcquiring unit 33 is ceased, the version information of safety applications installation kit is obtained for untrusted application connection trusted service management system;Information comparing unit 34, safety applications and the version information of safety applications installation kit are compared for untrusted application;Second installationBag acquiring unit 35, for obtaining safety applications installation kit from trusted service management system;Second installation kit execution unit 36, useSafety applications file is obtained in opening safety applications installation kit;3rd file transmission unit 37, for safety applications file to be answeredUnder system to the assigned catalogue of the credible performing environment of client;Using unit 38 is deleted, for former safety applications file to be deletedRemove;4th applies loading unit 39, for loading the safety applications in credible performing environment.
A kind of above-mentioned safety applications configuration device that the application proposition is introduced according to Fig. 1-7, is introduced below according to Fig. 8-14A kind of safety applications collocation method that the application proposes.
A kind of safety applications collocation method that the application proposes, as shown in figure 8, including:
Step S1:In deployment phase, safety applications are deployed in credible performing environment;
Wherein, safety applications are deployed in credible performing environment, as shown in figure 9, including:
Safety applications are preset on mobile phone terminal (step S101);Safety applications and some untrusted applications are tiedThe mode for tying up installation is attached on mobile phone terminal (step S102);Safety applications are placed in trusted service management system, passed throughThe mode that trusted service management system interacts with mobile phone terminal is attached on mobile phone terminal (step S103).
Wherein, as shown in figure 11, the safety applications deployment way that safety applications are preset on mobile phone terminal is included:
Step S1011:Preset safety applications are into credible performing environment, preset client application to untrusted performing environmentIn;
Step S1012:Credible performing environment access modules are created, are deployed in untrusted performing environment;
Step S1013:Client application behavior script is write, is stored into client application;
Step S1014:Start client application and access credible performing environment;
Step S1015:Client application reading client application behavior script, credible execution ring is sent to by access behaviorBorder access modules;
Step S1016:Credible performing environment access modules load credible performing environment according to client application behavior scriptIn safety applications.
As shown in figure 12, the mode for safety applications and some untrusted applications bundle to installation is attached to mobile phone terminalOn safety applications deployment way include:
Step S1021:Safety applications and untrusted application are bundled;
The mode specifically bundled is to apply untrusted as the main body application with user mutual or communication with the outside world, credibleIt is automatic using the background application as backstage safe handling, the untrusted application of mobile phone terminal operation when mounted, untrusted applicationTrusted application is discharged into TEE, user can be avoided to directly contact trusted application;When in use, untrusted is applied with connecingAccess request is received, is forwarded the request in trusted application, trusted application is handled it, then is applied via untrusted and tied processingFruit returns, can avoid it is extraneous directly communicated with trusted application caused by potential safety hazard, lift TA safety in utilization.
Step S1022:Installed in untrusted performing environment or upgrade untrusted application;
Step S1023:Untrusted application is run in untrusted performing environment;
Step S1024:Untrusted is applied and copies to the safety applications file of binding under credible performing environment assigned catalogue;
Step S1025:Load the safety applications in credible performing environment.
As shown in figure 13, safety applications are placed in trusted service management system, pass through trusted service management system and handThe safety applications deployment way that the mode of machine terminal interaction is attached on mobile phone terminal includes:
Step S1031:Installed in untrusted performing environment or upgrade untrusted application;
Step S1032:Untrusted application is run in untrusted performing environment;
Step S1033:Untrusted application judges whether client has safety applications installation file, does not continue, has, holdRow step S1035;
Step S1034:System connection trusted service management system obtains safety applications installation kit;
Step S1035:System opens safety applications installation kit and obtains safety applications file;
Step S1036:Safety applications file is copied to client by system;
Step S1037:System judges whether there is safety applications file in credible performing environment, has, and continues, and does not hold thenRow step S1033;
Step S1038:Safety applications file is copied under credible performing environment assigned catalogue by system;
Step S1039:Safety applications in system loads are credible performing environment environment.
Step S2:In service stage, conduct interviews control to safety applications;
Specifically, the control that safety applications are conducted interviews, as shown in Figure 10, including:
Step S201:When client application sends safety applications access request, safety applications perform to current untrustedEnvironment is detected, and judges whether risk;
Specifically, first having to verify component, seeing that setting during whether with dispatching from the factory is identical, wind is sent if differentDangerous warning notice, next needs to carry out risk evaluation and test to all clients application, sees with the presence or absence of risk application, also sent out if havingGo out risk warning notice, finally background application detect, see whether the terminal is monitored, risk is sent if monitoredWarning notice.
Step S202:Safety applications send authenticating identity request to client application, judge the security of client application;
Step S203:Safety applications establish escape way with client application, are communicated by escape way.
Specifically, safety applications are poured into identity ID when mounted, while when client application access safety is applied,Public and private secret key pair is generated, public key is sent to client application, client application is sent to peace by the public key encryption communication informationThe communication information is decrypted using private key for full application, safety applications, and such safety applications communicate letter with client application useBreath establishes escape way, and safety applications securely communicate with client application passage safe to use.
Step S3:In the more new stage, safety applications are updated by trusted service management system;
Specifically, described be updated by trusted service management system to safety applications, as shown in figure 14, including:
Step S301:Untrusted application is run in untrusted performing environment;
Step S302:Untrusted applies the version information for obtaining safety applications by escape way with client application;
Step S303:Untrusted application connection trusted service management system obtains the version information of safety applications installation kit;
Step S304:Untrusted application compares safety applications and the version information of safety applications installation kit, if alwaysThis method is exited, is otherwise continued;
Step S305:Safety applications installation kit is obtained from trusted service management system;
Step S306:Open safety applications installation kit and obtain safety applications file;
Step S307:Safety applications file is copied under the assigned catalogue of the credible performing environment of client;
Step S308:Former safety applications file is deleted;
Step S309:Load the safety applications in credible performing environment environment.
It is described above, only it is presently preferred embodiments of the present invention, any formal limitation not is made to the present invention, although thisInvention is disclosed above with preferred embodiment, but is not limited to the present invention, any person skilled in the art,Do not depart from the range of technical solution of the present invention, when the technology contents using the disclosure above make a little change or are modified to equivalentThe equivalent embodiment of change, as long as being the content without departing from technical solution of the present invention, the technical spirit according to the present invention is to the aboveAny simple modification, equivalent change and modification that embodiment is made, in the range of still falling within technical solution of the present invention.