[go: up one dir, main page]

CN112149134A - Trusted application management method and device - Google Patents

Trusted application management method and device Download PDF

Info

Publication number
CN112149134A
CN112149134A CN202010955075.0A CN202010955075A CN112149134A CN 112149134 A CN112149134 A CN 112149134A CN 202010955075 A CN202010955075 A CN 202010955075A CN 112149134 A CN112149134 A CN 112149134A
Authority
CN
China
Prior art keywords
tee
application
operation request
information
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010955075.0A
Other languages
Chinese (zh)
Other versions
CN112149134B (en
Inventor
昌文婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202010955075.0A priority Critical patent/CN112149134B/en
Publication of CN112149134A publication Critical patent/CN112149134A/en
Application granted granted Critical
Publication of CN112149134B publication Critical patent/CN112149134B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Stored Programmes (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本说明书实施例提供一种可信应用管理方法及装置。TEE终端和服务提供方均可以监听应用客户端对可信应用的安装或更新需求,并向TEE管理方发起可信应用的管理流程。之后,TEE管理方与TEE终端进行设备状态同步,并获取到基于其生成的第一秘钥对可信应用加密得到的加密应用信息。最后,将加密应用信息发送至TEE终端,由TEE终端完成安装或更新操作。

Figure 202010955075

The embodiments of this specification provide a trusted application management method and device. Both the TEE terminal and the service provider can monitor the application client's installation or update requirements of the trusted application, and initiate the management process of the trusted application to the TEE management party. After that, the TEE management party synchronizes the device state with the TEE terminal, and obtains encrypted application information obtained by encrypting the trusted application based on the first secret key generated by the TEE management party. Finally, the encrypted application information is sent to the TEE terminal, and the TEE terminal completes the installation or update operation.

Figure 202010955075

Description

可信应用管理方法及装置Trusted application management method and device

技术领域technical field

本说明书一个或多个实施例涉及计算机领域,尤其涉及可信应用管理方法及装置。One or more embodiments of this specification relate to the field of computers, and in particular, to a method and apparatus for managing trusted applications.

背景技术Background technique

随着计算机技术的发展,用户的隐私信息安全受到越来越高的关注和重视。为此,提出了可信应用(Trusted application,TA),来处理对安全性有较高要求的用户数据。例如,可信应用可以是用于对用户身份进行核实的指纹认证应用,刷脸认证应用,等等。为满足可信应用的高度安全性和机密性要求,需要使得可信应用运行在可信执行环境(Trustedexecution environment,TEE)中。With the development of computer technology, users' privacy information security has received more and more attention and attention. To this end, a Trusted Application (TA) is proposed to process user data with higher security requirements. For example, the trusted application may be a fingerprint authentication application for verifying a user's identity, a face-swiping authentication application, and the like. In order to meet the high security and confidentiality requirements of the trusted application, it is necessary to make the trusted application run in a trusted execution environment (Trusted execution environment, TEE).

可信执行环境TEE是具有一定隔离能力从而保证计算安全性的计算模块或计算设备,其隔离能力可以保证外界,包括操作系统或驱动等,都无法获取内部的运行时内存等秘密。例如,根据SGX技术,可以在内存中创建具有高访问权限的私有内存区域而形成计算围圈Enclave。其他应用程序,包括操作系统OS,BIOS系统,虚拟机系统等,均不能访问围圈Enclave中的数据,也就不能窥探和篡改其中应用程序的状态和数据。TEE is a computing module or computing device that has a certain isolation capability to ensure computing security. Its isolation capability can ensure that the outside world, including operating systems or drivers, cannot obtain secrets such as internal runtime memory. For example, according to SGX technology, a private memory area with high access rights can be created in memory to form a computing enclave. Other applications, including the operating system OS, BIOS system, virtual machine system, etc., cannot access the data in the enclave, and therefore cannot spy on and tamper with the state and data of the applications in it.

对于一般的应用,通常情况下,TEE终端的提供商会通过应用商店等形式,为TEE终端的用户提供应用的安装和更新渠道。而对于可信应用来说,由于需要运行在可信执行环境中,TEE终端提供商会设置专用的TEE管理方,管理TEE终端中的可信执行环境TEE,并通过与可信应用的服务提供方的交互,实现可信应用的安装或更新。For general applications, under normal circumstances, the provider of the TEE terminal will provide the user of the TEE terminal with an application installation and update channel through an application store or the like. For trusted applications, since they need to run in a trusted execution environment, the TEE terminal provider will set up a dedicated TEE manager to manage the trusted execution environment TEE in the TEE terminal, and communicate with the service provider of the trusted application through a dedicated TEE manager. interaction to implement the installation or update of trusted applications.

由于可信应用的安全性要求,已有的安装或更新过程往往比较复杂。希望能有改进的方案,可以使得可信应用的安装或更新过程更加高效,提升用户体验。Due to the security requirements of trusted applications, the existing installation or update process is often complicated. It is hoped that there will be an improved solution that can make the installation or update process of trusted applications more efficient and improve user experience.

发明内容SUMMARY OF THE INVENTION

本说明书一个或多个实施例描述了可信应用管理方法及装置,通过这样的方法和装置,TEE终端和服务提供方均可以监听应用客户端对可信应用的安装或更新需求,并向TEE管理方发起可信应用的管理流程;之后,由TEE管理方获取基于其生成的第一秘钥对可信应用加密得到的加密应用信息,并将加密应用信息发送至TEE终端,由TEE终端完成安装或更新操作,简化了重复传输,降低了服务提供方的负荷,提升了传输效率,进而提升了安装或更新效率。One or more embodiments of this specification describe a trusted application management method and apparatus. Through such a method and apparatus, both the TEE terminal and the service provider can monitor the application client's installation or update requirements for trusted applications, and report to the TEE The management party initiates the management process of the trusted application; after that, the TEE management party obtains the encrypted application information obtained by encrypting the trusted application based on the first secret key generated by the TEE management party, and sends the encrypted application information to the TEE terminal, which is completed by the TEE terminal The installation or update operation simplifies the repeated transmission, reduces the load on the service provider, improves the transmission efficiency, and further improves the installation or update efficiency.

根据第一方面,提供了一种可信应用管理方法,该方法由可信执行环境TEE管理方执行,包括:According to a first aspect, a trusted application management method is provided, and the method is executed by a trusted execution environment TEE manager, including:

从请求方接收用于请求在TEE终端中安装或更新第一可信应用的第一操作请求,所述请求方包括所述TEE终端或所述第一可信应用对应的服务提供方,所述第一操作请求由所述请求方监听应用客户端对所述第一可信应用的安装或更新需求而产生;A first operation request for requesting to install or update a first trusted application in a TEE terminal is received from a requester, where the requester includes the TEE terminal or a service provider corresponding to the first trusted application, the The first operation request is generated by the requestor monitoring the installation or update requirement of the first trusted application by the application client;

与所述TEE终端进行设备状态同步,从而向其发送第一秘钥;Perform device state synchronization with the TEE terminal, thereby sending the first secret key to it;

获取基于所述第一秘钥对所述第一可信应用加密得到的第一加密应用信息;obtaining first encrypted application information obtained by encrypting the first trusted application based on the first secret key;

将所述第一加密应用信息附加到所述第一操作请求,生成第二操作请求;appending the first encrypted application information to the first operation request to generate a second operation request;

将所述第二操作请求发送至所述TEE终端,以使所述TEE终端基于所述第一秘钥和所述第二操作请求安装或更新所述第一可信应用。The second operation request is sent to the TEE terminal, so that the TEE terminal installs or updates the first trusted application based on the first secret key and the second operation request.

在一个实施例中,所述获取基于所述第一秘钥对所述第一可信应用加密得到的第一加密应用信息,包括:In one embodiment, the obtaining the first encrypted application information obtained by encrypting the first trusted application based on the first secret key includes:

向所述服务提供方发送所述第一秘钥,使其基于所述第一秘钥对所述第一可信应用进行加密,得到所述第一加密应用信息;sending the first secret key to the service provider, so that it encrypts the first trusted application based on the first secret key to obtain the first encrypted application information;

从所述服务提供方接收所述第一加密应用信息。The first encrypted application information is received from the service provider.

在一个实施例中,所述获取基于所述第一秘钥对所述第一可信应用加密得到的第一加密应用信息,包括:In one embodiment, the obtaining the first encrypted application information obtained by encrypting the first trusted application based on the first secret key includes:

获取预先存储的所述第一加密应用信息。Acquire the pre-stored first encrypted application information.

在一个实施例中,所述获取预先存储的第一加密应用信息之前,包括:In one embodiment, before acquiring the pre-stored first encrypted application information, the method includes:

预先从所述服务提供方接收所述第一可信应用;receiving the first trusted application from the service provider in advance;

利用所述第一秘钥加密所述第一可信应用,得到所述第一加密应用信息;Encrypt the first trusted application with the first secret key to obtain the first encrypted application information;

存储所述第一加密应用信息。The first encrypted application information is stored.

在一个实施例中,所述获取预先存储的第一加密应用信息之前,包括:In one embodiment, before acquiring the pre-stored first encrypted application information, the method includes:

预先从所述服务提供方接收所述第一加密应用信息,以及存储所述第一加密应用信息。The first encrypted application information is received from the service provider in advance, and the first encrypted application information is stored.

根据第二方面,提供了一种可信应用管理方法,该方法由可信执行环境TEE管理方执行,包括:According to a second aspect, a trusted application management method is provided, and the method is executed by a trusted execution environment TEE manager, including:

从请求方接收用于请求在多个TEE终端中安装或更新第一可信应用的第一操作请求,所述请求方包括所述第一可信应用对应的服务提供方或所述多个TEE终端;A first operation request for requesting to install or update a first trusted application in multiple TEE terminals is received from a requester, where the requester includes a service provider corresponding to the first trusted application or the multiple TEEs terminal;

与所述多个TEE终端分别进行设备状态同步,获取各个TEE终端的设备信息,并向所述各个TEE终端发送第一秘钥;Perform device state synchronization with the multiple TEE terminals respectively, obtain the device information of each TEE terminal, and send the first secret key to each TEE terminal;

向所述服务提供方发送第一消息,所述第一消息包括所述各个TEE终端的设备信息,以使所述服务提供方基于所述各个TEE终端的设备信息确定对应的应用安装信息;sending a first message to the service provider, where the first message includes device information of each TEE terminal, so that the service provider determines corresponding application installation information based on the device information of each TEE terminal;

接收所述服务提供方发送的第二消息,所述第二消息包括所述各个TEE终端对应的应用安装信息;receiving a second message sent by the service provider, where the second message includes application installation information corresponding to each TEE terminal;

基于所述各个TEE终端对应的应用安装信息从预先存储的多个加密应用信息中,确定所述各个TEE终端对应的第一加密应用信息,所述第一加密应用信息基于所述第一秘钥加密所述第一可信应用而得到;First encrypted application information corresponding to each TEE terminal is determined from a plurality of pre-stored encrypted application information based on the application installation information corresponding to each TEE terminal, where the first encrypted application information is based on the first secret key obtained by encrypting the first trusted application;

将所述各个TEE终端对应的第一加密应用信息附加到相应的第一操作请求,生成所述各个TEE终端对应的第二操作请求;appending the first encrypted application information corresponding to each TEE terminal to the corresponding first operation request, and generating a second operation request corresponding to each of the TEE terminals;

将所述各个TEE终端对应的第二操作请求发送至相应的TEE终端,以使相应的TEE终端基于所述第一秘钥和所述第二操作请求安装或更新所述第一可信应用。The second operation request corresponding to each TEE terminal is sent to the corresponding TEE terminal, so that the corresponding TEE terminal installs or updates the first trusted application based on the first secret key and the second operation request.

在一个实施例中,所述应用安装信息包括,所述第一可信应用的版本信息,文件大小信息。In one embodiment, the application installation information includes version information and file size information of the first trusted application.

在一个实施例中,所述第一消息包括针对所述多个TEE终端创建的第一会话标识;所述第二消息包括该第一会话标识。In one embodiment, the first message includes a first session identifier created for the multiple TEE terminals; the second message includes the first session identifier.

在一个实施例中,所述将所述各个TEE终端对应的第二操作请求发送至相应的TEE终端,包括:In an embodiment, the sending the second operation request corresponding to each TEE terminal to the corresponding TEE terminal includes:

基于所述各个TEE终端对应的应用安装信息,确定目标TEE终端组,所述目标TEE终端组由对应相同的应用安装信息的TEE终端构成;Determine a target TEE terminal group based on the application installation information corresponding to each TEE terminal, and the target TEE terminal group is composed of TEE terminals corresponding to the same application installation information;

向所述服务提供方发送合并操作请求,所述合并操作请求包括所述第一会话标识,所述相同的应用安装信息所对应的第一加密应用信息,和所述目标TEE终端组的信息,以使得所述服务提供方根据所述合并操作请求,向所述目标TEE终端组中每个TEE终端发送对应的第二操作请求。sending a merge operation request to the service provider, where the merge operation request includes the first session identifier, the first encrypted application information corresponding to the same application installation information, and the information of the target TEE terminal group, So that the service provider sends a corresponding second operation request to each TEE terminal in the target TEE terminal group according to the combined operation request.

在一个实施例中,所述与所述多个TEE终端分别进行设备状态同步,包括:In an embodiment, the performing device state synchronization with the multiple TEE terminals respectively includes:

直接与所述多个TEE终端分别进行设备状态同步,或者通过所述服务提供方和/或应用客户端与所述多个TEE终端分别进行设备状态同步。The device state synchronization is performed directly with the multiple TEE terminals, or the device state synchronization is performed with the multiple TEE terminals through the service provider and/or the application client.

在一个实施例中,所述第一操作请求由所述服务提供方监听所述多个TEE终端上的应用客户端对所述第一可信应用的安装或更新需求而产生;或者In one embodiment, the first operation request is generated by the service provider monitoring the installation or update requirements of the first trusted application by the application clients on the multiple TEE terminals; or

所述第一操作请求由所述TEE终端监听其上的应用客户端对所述第一可信应用的安装或更新需求而产生,并发送至所述服务提供方。The first operation request is generated by the TEE terminal monitoring the installation or update requirement of the first trusted application by the application client on the TEE terminal, and sent to the service provider.

根据第三方面,提供了一种可信应用管理方法,该方法由服务提供方执行,包括:According to a third aspect, a trusted application management method is provided, the method is performed by a service provider, including:

监听应用客户端对第一可信应用的安装或更新需求,并生成第一操作请求,所述第一操作请求用于请求在所述应用客户端对应的TEE终端中安装所述第一可信应用;Monitor the installation or update requirements of the application client for the first trusted application, and generate a first operation request, where the first operation request is used to request to install the first trusted application in the TEE terminal corresponding to the application client application;

将所述第一操作请求发送至可信执行环境TEE管理方;sending the first operation request to the trusted execution environment TEE manager;

接收所述TEE管理方发送的第一秘钥;receiving the first secret key sent by the TEE management party;

至少基于所述第一秘钥对所述第一可信应用进行加密,得到第一加密应用信息;Encrypting the first trusted application based on at least the first secret key to obtain first encrypted application information;

将所述第一加密应用信息发送至所述TEE管理方,以使所述TEE管理方将所述第一加密应用信息发送至TEE终端。Sending the first encrypted application information to the TEE manager, so that the TEE manager sends the first encrypted application information to the TEE terminal.

根据第四方面,提供了一种可信应用管理方法,该方法由服务提供方执行,包括:According to a fourth aspect, a trusted application management method is provided, the method is performed by a service provider, including:

监听多个TEE终端上的应用客户端对第一可信应用的安装或更新需求,并生成第一操作请求,所述第一操作请求用于请求在所述多个TEE终端中安装所述第一可信应用;Monitor the installation or update requirements of the first trusted application by the application clients on multiple TEE terminals, and generate a first operation request, where the first operation request is used to request to install the first trusted application in the multiple TEE terminals a trusted application;

将所述第一操作请求发送至可信执行环境TEE管理方;sending the first operation request to the trusted execution environment TEE manager;

接收所述TEE管理方发送的第一消息,所述第一消息包括各个TEE终端的设备信息;receiving a first message sent by the TEE manager, where the first message includes device information of each TEE terminal;

基于所述各个TEE终端的设备信息确定对应的应用安装信息;Determine corresponding application installation information based on the device information of each TEE terminal;

向所述TEE管理方发送第二消息,所述第二消息包括所述各个TEE终端对应的应用安装信息,以使所述TEE管理方基于所述各个TEE终端对应的应用安装信息从预先存储的多个加密应用信息中,确定所述各个TEE终端对应的第一加密应用信息,所述第一加密应用信息基于第一秘钥加密所述第一可信应用而得到。Send a second message to the TEE management party, where the second message includes the application installation information corresponding to the respective TEE terminals, so that the TEE management party can download the pre-stored application installation information based on the application installation information corresponding to the respective TEE terminals. Among the plurality of encrypted application information, first encrypted application information corresponding to each TEE terminal is determined, and the first encrypted application information is obtained by encrypting the first trusted application based on a first secret key.

在一个实施例中,所述应用安装信息包括,所述第一可信应用的版本信息,文件大小信息。In one embodiment, the application installation information includes version information and file size information of the first trusted application.

在一个实施例中,所述第一消息包括针对所述多个TEE终端创建的第一会话标识;所述第二消息包括该第一会话标识。In one embodiment, the first message includes a first session identifier created for the multiple TEE terminals; the second message includes the first session identifier.

在一个实施例中,还包括:In one embodiment, it also includes:

接收所述TEE管理方发送的合并操作请求,所述合并操作请求包括所述第一会话标识,相同的应用安装信息所对应的第一加密应用信息,和目标TEE终端组的信息,所述目标TEE终端组由对应相同的应用安装信息的TEE终端构成;Receive a merge operation request sent by the TEE manager, where the merge operation request includes the first session identifier, the first encrypted application information corresponding to the same application installation information, and the information of the target TEE terminal group. The TEE terminal group consists of TEE terminals corresponding to the same application installation information;

根据所述合并操作请求,向所述目标TEE终端组中每个TEE终端发送对应的第二操作请求,以使所述每个TEE终端基于所述第一秘钥和所述第二操作请求安装或更新所述第一可信应用,所述第二操作请求由所述TEE管理方将所述每个TEE终端对应的第一加密应用信息附加到相应的第一操作请求而生成。According to the combined operation request, a corresponding second operation request is sent to each TEE terminal in the target TEE terminal group, so that each TEE terminal is installed based on the first key and the second operation request Or update the first trusted application, and the second operation request is generated by the TEE management party adding the first encrypted application information corresponding to each TEE terminal to the corresponding first operation request.

根据第五方面,提供了一种可信应用管理方法,该方法由可信执行环境TEE终端执行,包括:According to a fifth aspect, a trusted application management method is provided, and the method is executed by a trusted execution environment TEE terminal, including:

响应于可信执行环境TEE管理方的同步请求,与所述TEE管理方进行设备状态同步,接收所述TEE管理方发送的第一秘钥;In response to a synchronization request from the TEE manager of the trusted execution environment, perform device state synchronization with the TEE manager, and receive the first key sent by the TEE manager;

接收所述TEE管理方发送的第二操作请求,所述第二操作请求由所述TEE管理方将TEE终端对应的第一加密应用信息附加到相应的第一操作请求而生成,,所述第一加密应用信息基于所述第一秘钥加密第一可信应用得到,所述第一操作请求用于请求在所述TEE终端中安装或更新第一可信应用;Receive a second operation request sent by the TEE management party, where the second operation request is generated by the TEE management party adding the first encrypted application information corresponding to the TEE terminal to the corresponding first operation request, and the first operation request is generated by the TEE management party. Encrypted application information is obtained by encrypting a first trusted application based on the first key, and the first operation request is used to request to install or update the first trusted application in the TEE terminal;

基于所述第一秘钥和所述第二操作请求安装或更新所述第一可信应用。The first trusted application is installed or updated based on the first secret key and the second operation request.

在一个实施例中,所述响应于可信执行环境TEE管理方的同步请求之前,包括:In one embodiment, before the response to the synchronization request of the trusted execution environment TEE manager, includes:

监听应用客户端对所述第一可信应用的安装或更新需求,并生成第一操作请求;Monitor the installation or update requirements of the application client for the first trusted application, and generate a first operation request;

将所述第一操作请求发送至所述TEE管理方,以使所述TEE管理方与所述TEE终端进行设备状态同步和/或获取所述第一加密应用信息。The first operation request is sent to the TEE manager, so that the TEE manager and the TEE terminal perform device state synchronization and/or acquire the first encrypted application information.

在一个实施例中,所述与所述TEE管理方进行设备状态同步时,包括:In an embodiment, when the device state synchronization with the TEE manager includes:

将所述TEE终端的设备信息发送至所述TEE管理方。Send the device information of the TEE terminal to the TEE management party.

根据第六方面,提供了一种可信应用管理装置,该装置部署在可信执行环境TEE管理方,包括:According to a sixth aspect, a trusted application management device is provided, and the device is deployed in a trusted execution environment TEE management party, including:

第一操作请求接收单元,配置为从请求方接收用于请求在TEE终端中安装或更新第一可信应用的第一操作请求,所述请求方包括所述TEE终端或所述第一可信应用对应的服务提供方,所述第一操作请求由所述请求方监听应用客户端对所述第一可信应用的安装或更新需求而产生;a first operation request receiving unit, configured to receive a first operation request for requesting to install or update a first trusted application in a TEE terminal from a requesting party, where the requesting party includes the TEE terminal or the first trusted application a service provider corresponding to the application, where the first operation request is generated by the requester monitoring the installation or update requirement of the first trusted application by the application client;

同步单元,配置为与所述TEE终端进行设备状态同步,从而向其发送第一秘钥;a synchronization unit, configured to perform device state synchronization with the TEE terminal, thereby sending the first secret key to it;

加密应用信息获取单元,配置为获取基于所述第一秘钥对所述第一可信应用加密得到的第一加密应用信息;an encrypted application information obtaining unit, configured to obtain first encrypted application information obtained by encrypting the first trusted application based on the first secret key;

第二操作请求生成单元,配置为将所述第一加密应用信息附加到所述第一操作请求,生成第二操作请求;A second operation request generating unit, configured to append the first encrypted application information to the first operation request to generate a second operation request;

第二操作请求发送单元,配置为将所述第二操作请求发送至所述TEE终端,以使所述TEE终端基于所述第一秘钥和所述第二操作请求安装或更新所述第一可信应用。A second operation request sending unit, configured to send the second operation request to the TEE terminal, so that the TEE terminal installs or updates the first operation request based on the first key and the second operation request Trusted application.

根据第七方面,提供了一种可信应用管理装置,该装置部署在可信执行环境TEE管理方,包括:According to a seventh aspect, a trusted application management device is provided, and the device is deployed on a trusted execution environment TEE management party, including:

第一操作请求接收单元,配置为从请求方接收用于请求在多个TEE终端中安装或更新第一可信应用的第一操作请求,所述请求方包括所述第一可信应用对应的服务提供方或所述多个TEE终端;A first operation request receiving unit, configured to receive a first operation request for requesting to install or update a first trusted application in multiple TEE terminals from a requesting party, where the requesting party includes the corresponding first trusted application. the service provider or the plurality of TEE terminals;

同步单元,配置为与所述多个TEE终端分别进行设备状态同步,获取各个TEE终端的设备信息,并向所述各个TEE终端发送第一秘钥;a synchronization unit, configured to perform device state synchronization with the multiple TEE terminals respectively, obtain device information of each TEE terminal, and send the first secret key to each TEE terminal;

第一消息发送单元,配置为向所述服务提供方发送第一消息,所述第一消息包括所述各个TEE终端的设备信息,以使所述服务提供方基于所述各个TEE终端的设备信息确定对应的应用安装信息;a first message sending unit, configured to send a first message to the service provider, where the first message includes device information of each TEE terminal, so that the service provider can base the service provider on the device information of each TEE terminal Determine the corresponding application installation information;

第二消息接收单元,配置为接收所述服务提供方发送的第二消息,所述第二消息包括所述各个TEE终端对应的应用安装信息;a second message receiving unit, configured to receive a second message sent by the service provider, where the second message includes application installation information corresponding to each TEE terminal;

加密应用信息确定单元,配置为基于所述各个TEE终端对应的应用安装信息从预先存储的多个加密应用信息中,确定所述各个TEE终端对应的第一加密应用信息,所述第一加密应用信息基于所述第一秘钥加密所述第一可信应用而得到;An encrypted application information determination unit, configured to determine first encrypted application information corresponding to each TEE terminal from a plurality of pre-stored encrypted application information based on the application installation information corresponding to each TEE terminal, the first encrypted application information The information is obtained by encrypting the first trusted application based on the first secret key;

第二操作请求生成单元,配置为将所述各个TEE终端对应的第一加密应用信息附加到相应的第一操作请求,生成所述各个TEE终端对应的第二操作请求;A second operation request generating unit, configured to attach the first encrypted application information corresponding to each TEE terminal to the corresponding first operation request, and generate a second operation request corresponding to each TEE terminal;

第二操作请求发送单元,配置为将所述各个TEE终端对应的第二操作请求发送至相应的TEE终端,以使相应的TEE终端基于所述第一秘钥和所述第二操作请求安装或更新所述第一可信应用。The second operation request sending unit is configured to send the second operation request corresponding to each TEE terminal to the corresponding TEE terminal, so that the corresponding TEE terminal installs or installs the operation request based on the first key and the second operation request. The first trusted application is updated.

根据第八方面,提供了一种可信应用管理装置,该装置部署在服务提供方,包括:According to an eighth aspect, a trusted application management device is provided, the device is deployed on a service provider, including:

监听单元,配置为监听应用客户端对第一可信应用的安装或更新需求,并生成第一操作请求,所述第一操作请求用于请求在所述应用客户端对应的TEE终端中安装所述第一可信应用;The monitoring unit is configured to monitor the installation or update requirements of the application client for the first trusted application, and generate a first operation request, where the first operation request is used for requesting to install all the trusted applications in the TEE terminal corresponding to the application client. the first trusted application;

第一操作请求发送单元,配置为将所述第一操作请求发送至可信执行环境TEE管理方;a first operation request sending unit, configured to send the first operation request to a trusted execution environment TEE manager;

秘钥接收单元,配置为接收所述TEE管理方发送的第一秘钥;a key receiving unit, configured to receive the first key sent by the TEE management party;

加密单元,配置为至少基于所述第一秘钥对所述第一可信应用进行加密,得到第一加密应用信息;an encryption unit, configured to encrypt the first trusted application based on at least the first secret key to obtain first encrypted application information;

加密应用信息发送单元,配置为将所述第一加密应用信息发送至所述TEE管理方,以使所述TEE管理方将所述第一加密应用信息发送至TEE终端。The encrypted application information sending unit is configured to send the first encrypted application information to the TEE manager, so that the TEE manager sends the first encrypted application information to the TEE terminal.

根据第九方面,提供了一种可信应用管理装置,该装置部署在服务提供方,包括:According to a ninth aspect, a trusted application management device is provided, the device is deployed on a service provider, including:

监听单元,配置为监听多个TEE终端上的应用客户端对第一可信应用的安装或更新需求,并生成第一操作请求,所述第一操作请求用于请求在所述多个TEE终端中安装所述第一可信应用;a monitoring unit, configured to monitor the installation or update requirements of the first trusted application by the application clients on the multiple TEE terminals, and generate a first operation request, where the first operation request is used to request the multiple TEE terminals install the first trusted application in;

第一操作请求发送单元,配置为将所述第一操作请求发送至可信执行环境TEE管理方;a first operation request sending unit, configured to send the first operation request to a trusted execution environment TEE manager;

消息接收单元,配置为接收所述TEE管理方发送的第一消息,所述第一消息包括各个TEE终端的设备信息;a message receiving unit, configured to receive a first message sent by the TEE manager, where the first message includes device information of each TEE terminal;

确定单元,配置为基于所述各个TEE终端的设备信息确定对应的应用安装信息;a determining unit, configured to determine corresponding application installation information based on the device information of each TEE terminal;

第二消息发送单元,配置为向所述TEE管理方发送第二消息,所述第二消息包括所述各个TEE终端对应的应用安装信息,以使所述TEE管理方基于所述各个TEE终端对应的应用安装信息从预先存储的多个加密应用信息中,确定所述各个TEE终端对应的第一加密应用信息,所述第一加密应用信息基于第一秘钥加密所述第一可信应用而得到。A second message sending unit, configured to send a second message to the TEE management party, where the second message includes application installation information corresponding to each TEE terminal, so that the TEE management party is based on the corresponding TEE terminal The first encrypted application information corresponding to each TEE terminal is determined from a plurality of pre-stored encrypted application information, and the first encrypted application information is encrypted based on the first key to encrypt the first trusted application. get.

根据第十方面,提供了一种可信应用管理装置,该装置部署在可信执行环境TEE终端,包括:According to a tenth aspect, a trusted application management device is provided, the device is deployed in a trusted execution environment TEE terminal, including:

响应单元,配置为响应于可信执行环境TEE管理方的同步请求,与所述TEE管理方进行设备状态同步,接收所述TEE管理方发送的第一秘钥;a response unit, configured to perform device state synchronization with the TEE manager in response to a synchronization request from the TEE manager of the trusted execution environment, and receive the first secret key sent by the TEE manager;

第二操作请求接收单元,配置为接收所述TEE管理方发送的第二操作请求,所述第二操作请求由所述TEE管理方将TEE终端对应的第一加密应用信息附加到相应的第一操作请求而生成,所述第一加密应用信息基于所述第一秘钥加密第一可信应用得到,所述第一操作请求用于请求在所述TEE终端中安装或更新第一可信应用;A second operation request receiving unit, configured to receive a second operation request sent by the TEE manager, where the TEE manager appends the first encrypted application information corresponding to the TEE terminal to the corresponding first operation request by the TEE manager An operation request is generated, the first encrypted application information is obtained by encrypting a first trusted application based on the first key, and the first operation request is used to request to install or update the first trusted application in the TEE terminal ;

安装或更新单元,配置为基于所述第一秘钥和所述第二操作请求安装或更新所述第一可信应用。An installation or update unit configured to install or update the first trusted application based on the first secret key and the second operation request.

根据第十一方面,提供了一种计算机可读存储介质,其上存储有计算机程序,当所述计算机程序在计算机中执行时,令计算机执行第一方面到第五方面的方法。According to an eleventh aspect, there is provided a computer-readable storage medium on which a computer program is stored, and when the computer program is executed in a computer, causes the computer to execute the methods of the first to fifth aspects.

根据第十二方面,提供了一种计算设备,包括存储器和处理器,所述存储器中存储有可执行代码,所述处理器执行所述可执行代码时,实现第一方面到第五方面的方法。According to a twelfth aspect, a computing device is provided, including a memory and a processor, the memory stores executable codes, and when the processor executes the executable codes, the first to fifth aspects are implemented. method.

通过本说明书实施例提供的方法和装置,在安装或更新可信应用的过程中,TEE终端和服务提供方均可以监听应用客户端对可信应用的安装或更新需求,并向TEE管理方发起可信应用的管理流程;之后,由TEE管理方获取基于其生成的第一秘钥对可信应用加密得到的加密应用信息,并将加密应用信息发送至TEE终端,由TEE终端完成安装或更新操作,简化了重复传输,降低了服务提供方的负荷,提升了传输效率,进而提升了安装或更新效率。With the method and device provided by the embodiments of this specification, during the process of installing or updating a trusted application, both the TEE terminal and the service provider can monitor the application client's installation or update requirements for the trusted application, and initiate a request to the TEE management party Management process of trusted applications; after that, the TEE management party obtains encrypted application information obtained by encrypting trusted applications based on the first secret key generated by the TEE management party, and sends the encrypted application information to the TEE terminal, and the TEE terminal completes the installation or update The operation simplifies the repeated transmission, reduces the load on the service provider, improves the transmission efficiency, and further improves the installation or update efficiency.

附图说明Description of drawings

为了更清楚地说明本发明实施例的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其它的附图。In order to illustrate the technical solutions of the embodiments of the present invention more clearly, the following briefly introduces the accompanying drawings used in the description of the embodiments. Obviously, the drawings in the following description are only some embodiments of the present invention. For those of ordinary skill in the art, other drawings can also be obtained from these drawings without any creative effort.

图1示出本说明书披露的一个实施例的实施场景示意图;FIG. 1 shows a schematic diagram of an implementation scenario of an embodiment disclosed in this specification;

图2示出根据一个实施例的可信应用管理方法;Figure 2 illustrates a trusted application management method according to one embodiment;

图3示出根据一个实施例的加密应用信息的数据结构;Figure 3 illustrates a data structure of encrypted application information according to one embodiment;

图4示出根据另一个实施例的加密应用信息的数据结构;4 illustrates a data structure of encrypted application information according to another embodiment;

图5示出根据一个实施例的操作请求的数据结构;Figure 5 illustrates the data structure of an operation request according to one embodiment;

图6示出根据另一个实施例的可信应用管理方法;6 illustrates a trusted application management method according to another embodiment;

图7示出根据又一个实施例的可信应用管理方法;7 illustrates a trusted application management method according to yet another embodiment;

图8示出根据又一个实施例的可信应用管理方法;8 illustrates a trusted application management method according to yet another embodiment;

图9示出根据一个实施例的TEE管理方向服务提供方发送消息的示意图;9 shows a schematic diagram of a TEE management sending a message to a service provider according to one embodiment;

图10示出根据一个实施例的服务提供方向TEE管理方发送消息的示意图;10 shows a schematic diagram of a service provider sending a message to a TEE manager according to an embodiment;

图11示出根据一个实施例的可信应用管理装置的示意性框图;11 shows a schematic block diagram of a trusted application management apparatus according to an embodiment;

图12示出根据一个实施例的可信应用管理装置的示意性框图;FIG. 12 shows a schematic block diagram of a trusted application management apparatus according to an embodiment;

图13示出根据一个实施例的可信应用管理装置的示意性框图;13 shows a schematic block diagram of a trusted application management apparatus according to an embodiment;

图14示出根据一个实施例的可信应用管理装置的示意性框图;14 shows a schematic block diagram of a trusted application management apparatus according to an embodiment;

图15示出根据一个实施例的可信应用管理装置的示意性框图。FIG. 15 shows a schematic block diagram of a trusted application management apparatus according to an embodiment.

具体实施方式Detailed ways

下面结合附图,对本说明书提供的方案进行描述。The solution provided in this specification will be described below with reference to the accompanying drawings.

应该理解,本文中的“第一”,“第二”仅仅是为了表述的清楚而对类似概念进行的标记和区分,并不具有其他限定作用。It should be understood that "first" and "second" in this document are only used to mark and distinguish similar concepts for clarity of expression, and have no other limiting role.

图1为本说明书披露的一个实施例的实施场景示意图。根据图1的实施例,用户终端中配置有TEE执行环境并安装有需要使用可信应用的应用客户端;其中,用户终端可以为手机、平板电脑等电子设备,TEE执行环境用于为授权的可信应用(例如指纹认证应用,人脸识别应用等)提供安全的执行环境,应用客户端可以是需要使用上述可信应用的客户端。在下文中,将部署有TEE执行环境的用户终端称为TEE终端。TEE终端和服务提供方均可以监听应用客户端对可信应用的安装或更新需求,并向TEE管理方发起可信应用的管理流程。之后,TEE管理方与TEE终端进行设备状态同步,并获取到基于其生成的第一秘钥对可信应用加密得到的加密应用信息。最后,将加密应用信息发送至TEE终端,由TEE终端完成安装或更新操作。FIG. 1 is a schematic diagram of an implementation scenario of an embodiment disclosed in this specification. According to the embodiment of FIG. 1 , the user terminal is configured with a TEE execution environment and installed with an application client that needs to use trusted applications; wherein, the user terminal may be an electronic device such as a mobile phone or a tablet computer, and the TEE execution environment is used for authorized applications. Trusted applications (such as fingerprint authentication applications, face recognition applications, etc.) provide a secure execution environment, and the application client may be a client that needs to use the above-mentioned trusted applications. Hereinafter, the user terminal in which the TEE execution environment is deployed will be referred to as a TEE terminal. Both the TEE terminal and the service provider can monitor the application client's installation or update requirements of the trusted application, and initiate the management process of the trusted application to the TEE management party. After that, the TEE management party synchronizes the device state with the TEE terminal, and obtains encrypted application information obtained by encrypting the trusted application based on the first secret key generated by the TEE management party. Finally, the encrypted application information is sent to the TEE terminal, and the TEE terminal completes the installation or update operation.

具体地,TEE终端和/或服务提供方监听到应用客户端对可信应用的安装或更新需求,生成第一操作请求,并将该第一操作请求发送至TEE管理方,其中该第一操作请求可以用于请求在应用客户端对应的TEE终端中安装第一可信应用。之后,TEE管理方与TEE终端进行设备状态同步,并将其生成的第一秘钥发送至TEE终端。接着,TEE管理方获取基于第一秘钥对第一可信应用加密得到的加密应用信息;其中,该加密应用信息可以是实时从服务提供方接收的,也可以是TEE管理方预先存储的。之后,TEE管理方将加密应用信息附加到第一操作请求中,并发送至TEE终端。最后,TEE终端基于第一秘钥解密加密应用信息,得到第一可信应用,并安装或更新第一可信应用。下面描述以上过程的具体实现步骤。Specifically, the TEE terminal and/or the service provider monitors the application client's installation or update requirements for trusted applications, generates a first operation request, and sends the first operation request to the TEE manager, where the first operation The request may be used to request to install the first trusted application in the TEE terminal corresponding to the application client. After that, the TEE manager synchronizes the device state with the TEE terminal, and sends the first secret key generated by the TEE terminal to the TEE terminal. Next, the TEE management party obtains encrypted application information obtained by encrypting the first trusted application based on the first secret key; wherein the encrypted application information may be received from the service provider in real time, or may be pre-stored by the TEE management party. After that, the TEE manager adds the encrypted application information to the first operation request, and sends it to the TEE terminal. Finally, the TEE terminal decrypts the encrypted application information based on the first secret key, obtains the first trusted application, and installs or updates the first trusted application. The specific implementation steps of the above process are described below.

图2示出根据一个实施例的可信应用管理方法。如图2所示,该方法至少涉及TEE管理方、服务提供方和TEE终端。Figure 2 illustrates a trusted application management method according to one embodiment. As shown in FIG. 2, the method involves at least a TEE manager, a service provider and a TEE terminal.

TEE管理方由TEE终端提供商部署,负责检测TEE终端和/或服务提供方产生的安装或更新可信应用的请求,以及检测TEE终端是否具备安装或更新可信应用的环境等,例如,检测用户终端中是否存在针对服务提供方的安全域,其中在该安全域中可以安装或更新可信应用。The TEE manager is deployed by the TEE terminal provider and is responsible for detecting requests for installing or updating trusted applications generated by TEE terminals and/or service providers, as well as detecting whether the TEE terminal has an environment for installing or updating trusted applications, etc. For example, detecting Whether there is a security domain for the service provider in the user terminal in which trusted applications can be installed or updated.

服务提供方,或称为可信应用的提供者,是提供可供安装或更新的可信应用的相关文件的一方。服务提供方可以产生安装或更新可信应用的请求,该请求可以是监听到应用客户端对可信应用的安装或更新需求时产生。其中,应用客户端可以是例如支付宝应用客户端等可以提供支付、身份认证等安全服务的应用客户端。A service provider, or provider of a trusted application, is a party that provides documentation about trusted applications that can be installed or updated. The service provider may generate a request for installing or updating the trusted application, and the request may be generated when monitoring the application client's request for installing or updating the trusted application. The application client may be, for example, an Alipay application client that can provide security services such as payment and identity authentication.

TEE终端可以包括TEE代理或者用户终端中为服务提供方申请的安全域等。TEE终端可以产生安装或更新可信应用的请求,该请求监听到应用客户端对可信应用的安装或更新需求时产生。The TEE terminal may include a TEE proxy or a security domain applied for the service provider in the user terminal, and the like. The TEE terminal may generate a request for installing or updating a trusted application, and the request is generated when the application client's request for installing or updating a trusted application is monitored.

下面,描述图2所示的可信应用管理方法的具体步骤。Next, the specific steps of the trusted application management method shown in FIG. 2 are described.

首先,在步骤S101,应用客户端可以将其对可信应用的安装或更新需求发送至TEE终端。在该实施方式下,由TEE终端监听应用客户端对第一可信应用的安装或更新需求。First, in step S101, the application client may send its installation or update requirements for the trusted application to the TEE terminal. In this implementation manner, the TEE terminal monitors the installation or update requirement of the first trusted application by the application client.

上述监听应用客户端对第一可信应用的安装或更新需求可以通过多种方式进行。例如,TEE终端可以监听用户通过应用客户端用户终端输入安装或更新例如指纹识别应用的指令。其中,用户可以通过相关应用的客户端,输入上述安装指令。例如,用户在支付宝客户端中,通过点击例如“开启指纹认证”,即输入了安装指纹认证应用的指令。The above-mentioned monitoring of the application client's installation or update requirements for the first trusted application can be performed in various ways. For example, the TEE terminal may listen to the user's input of an instruction to install or update an application such as fingerprint recognition through the application client user terminal. The user may input the above installation instruction through the client of the relevant application. For example, in the Alipay client, the user inputs an instruction to install the fingerprint authentication application by clicking, for example, "enable fingerprint authentication".

在另一例子中,上述监听应用客户端对第一可信应用的安装或更新需求也可以通过监听应用客户端发起的需求进行。例如,当某个应用客户端需要调用可信应用的功能时,可以在用户授权的情况下产生需求,并将需求反馈至TEE终端,从而使得TEE终端获知应用客户端对可信应用的需求。或者,应用客户端在检测到已经安装的可信应用需要更新时,可以将该需求反馈至TEE终端,从而使得TEE终端获知应用客户端对可信应用的需求。In another example, the above-mentioned monitoring of the installation or update requirements of the first trusted application by the application client may also be performed by monitoring the requirements initiated by the application client. For example, when an application client needs to invoke a function of a trusted application, it can generate a requirement under the user's authorization, and feed the requirement back to the TEE terminal, so that the TEE terminal can know the application client's requirement for the trusted application. Alternatively, when the application client detects that the installed trusted application needs to be updated, the requirement can be fed back to the TEE terminal, so that the TEE terminal can learn the application client's requirement for the trusted application.

接着,在步骤S102,TEE终端一旦监听到应用客户端对第一可信应用的安装或更新需求,生成第一操作请求。该第一操作请求用于请求在该TEE终端中安装或更新第一可信应用。Next, in step S102, once the TEE terminal monitors the installation or update requirement of the application client for the first trusted application, the TEE terminal generates a first operation request. The first operation request is used to request to install or update the first trusted application in the TEE terminal.

接着,在步骤S104,TEE终端向TEE管理方发出第一操作请求。Next, in step S104, the TEE terminal sends a first operation request to the TEE management party.

在一个例子中,TEE终端可以通过上述与可信应用相关的应用客户端(例如支付宝客户端),将第一操作请求透传至TEE管理方。在另一实施例中,TEE终端也可以通过其操作系统直接向TEE管理方发出上述第一操作请求。In an example, the TEE terminal may transparently transmit the first operation request to the TEE management party through the above-mentioned application client related to the trusted application (for example, an Alipay client). In another embodiment, the TEE terminal may also directly send the above-mentioned first operation request to the TEE management party through its operating system.

在步骤S106,TEE管理方接收第一操作请求,与TEE终端进行设备状态同步。一般地,TEE管理方接收到TEE终端发送的操作请求,就响应该操作请求,与TEE终端进行设备状态同步,检测TEE终端是否具备安装或更新可信应用的环境等,并向TEE终端发送第一秘钥。可选地,TEE管理方可以直接与TEE终端进行设备状态同步,以减轻服务提供方的负荷;也可以通过服务提供方和/或应用客户端与TEE终端进行设备状态同步。In step S106, the TEE manager receives the first operation request, and performs device state synchronization with the TEE terminal. Generally, when the TEE management party receives the operation request sent by the TEE terminal, it responds to the operation request, synchronizes the device status with the TEE terminal, detects whether the TEE terminal has an environment for installing or updating trusted applications, etc., and sends the first message to the TEE terminal. a secret key. Optionally, the TEE manager can directly synchronize the device state with the TEE terminal to reduce the load on the service provider; it can also synchronize the device state with the TEE terminal through the service provider and/or the application client.

在一个例子中,TEE管理方每次接收到第一操作请求时,可以针对该第一操作请求生成一串对称的动态秘钥(即第一秘钥)。In an example, each time the TEE manager receives the first operation request, it may generate a series of symmetric dynamic keys (ie, the first key) for the first operation request.

接着,在步骤S108,TEE管理方向第一可信应用对应的服务提供方发送第一秘钥。Next, in step S108, the TEE management sends the first secret key to the service provider corresponding to the first trusted application.

步骤S110,服务提供方基于第一秘钥对第一可信应用进行加密,得到第一加密应用信息。Step S110, the service provider encrypts the first trusted application based on the first secret key to obtain first encrypted application information.

在一个例子中,如图3所示,服务提供方可以利用第一秘钥,直接对第一可信应用进行加密,以得到加密应用信息。In an example, as shown in FIG. 3 , the service provider may directly encrypt the first trusted application by using the first secret key to obtain encrypted application information.

在另一个例子中,如图4所示,服务提供方可以生成一个专有秘钥,之后,利用该专有秘钥,对第一可信应用进行加密,得到第一加密数据;然后再利用第一秘钥加密该专有秘钥,得到第二加密数据;最后,将第一加密数据和第二加密数据作为第一加密应用信息,也可以说,第一加密数据和第二加密数据构成了第一加密应用信息。可以理解的是,利用专有秘钥进行加密时,可以采用DES、3DES、IDEA、RC5、RC6等对称算法进行加密;利用第一秘钥进行加密时,也可以采用上述的对称算法进行加密。In another example, as shown in FIG. 4 , the service provider can generate a private key, and then use the private key to encrypt the first trusted application to obtain the first encrypted data; and then use the private key to encrypt the first trusted application. The first secret key encrypts the private secret key to obtain the second encrypted data; finally, the first encrypted data and the second encrypted data are used as the first encrypted application information. It can also be said that the first encrypted data and the second encrypted data constitute the first encrypted application information. It can be understood that when using the private key for encryption, symmetric algorithms such as DES, 3DES, IDEA, RC5, RC6 can be used for encryption; when using the first key for encryption, the above-mentioned symmetric algorithm can also be used for encryption.

在又一个例子中,服务提供方可以预先利用专有秘钥对第一可信应用进行加密,并得到第一加密数据。其中,该专有秘钥是服务提供方提供的多个可信应用中与当前所需安装或更新的第一可信应用对应的秘钥,或者,该专有秘钥是与当前所需安装或更新的第一可信应用的当前版本对应的秘钥;也即是说,同一可信应用可以使用同一秘钥预先进行加密,或者同一版本的可信应用可以使用同一秘钥预先进行加密,如此避免对应用的重复加密,进一步加快安装/更新过程。之后,再利用第一秘钥加密专有秘钥,得到第二加密数据。最后,将第一加密数据和第二加密数据作为加密应用信息,也可以说,第一加密数据和第二加密数据构成了加密应用信息。In yet another example, the service provider may encrypt the first trusted application with the private key in advance, and obtain the first encrypted data. Wherein, the private key is a key corresponding to the first trusted application that needs to be installed or updated currently among the multiple trusted applications provided by the service provider, or the private key is a key corresponding to the first trusted application currently required to be installed or updated. or the key corresponding to the current version of the updated first trusted application; that is, the same trusted application can be pre-encrypted with the same key, or the same version of the trusted application can be pre-encrypted with the same key, This avoids repeated encryption of the application, further speeding up the installation/update process. After that, the private key is encrypted with the first key to obtain the second encrypted data. Finally, the first encrypted data and the second encrypted data are regarded as encrypted application information, it can also be said that the first encrypted data and the second encrypted data constitute encrypted application information.

步骤S112,服务提供方将第一加密应用信息发送至TEE管理方。Step S112, the service provider sends the first encrypted application information to the TEE manager.

接着,步骤S114,TEE管理方将第一加密应用信息附加到第一操作请求,生成第二操作请求。该第二操作请求可以理解为安装或更新可信应用的请求。可选地,TEE管理方还可以对第二操作请求进行签名,以防止第二操作请求中的内容被篡改。具体地,如图5所示,TEE管理方可以先将第一加密应用信息附加在操作请求中,再对该操作请求进行签名。Next, in step S114, the TEE manager adds the first encrypted application information to the first operation request to generate a second operation request. The second operation request may be understood as a request to install or update a trusted application. Optionally, the TEE manager may also sign the second operation request to prevent the content in the second operation request from being tampered with. Specifically, as shown in FIG. 5 , the TEE manager may add the first encrypted application information to the operation request first, and then sign the operation request.

此外,TEE管理方还可以在第二操作请求中附加上其自身的身份标识信息,以使服务提供方和/或TEE终端明确第二操作请求的来源,提升操作安全性。In addition, the TEE manager may also add its own identification information to the second operation request, so that the service provider and/or the TEE terminal can clarify the source of the second operation request and improve operation security.

接着,在步骤S116,TEE管理方将第二操作请求发送至TEE终端。Next, in step S116, the TEE manager sends the second operation request to the TEE terminal.

在步骤S118,TEE终端基于第一秘钥和第二操作请求安装或更新第一可信应用。一般地,TEE终端可以利用第一秘钥对第二操作请求中的第一加密应用信息进行解密,以得到第一可信应用;之后,即可以安装或更新该第一可信应用。In step S118, the TEE terminal requests to install or update the first trusted application based on the first secret key and the second operation request. Generally, the TEE terminal can use the first secret key to decrypt the first encrypted application information in the second operation request to obtain the first trusted application; after that, the first trusted application can be installed or updated.

此外,在安装或更新第一可信应用成功后,TEE终端可以向TEE管理方、服务提供方和/或应用客户端等反馈安装或更新成功的信息,以使TEE管理方、服务提供方和/或应用客户端获知安装或更新成功的信息。In addition, after the first trusted application is successfully installed or updated, the TEE terminal can feed back information about the successful installation or update to the TEE management party, service provider and/or application client, so that the TEE management party, service provider and/or application client can / or the application client is informed that the installation or update is successful.

可以理解的是,TEE终端在利用第一秘钥对第二操作请求中的第一加密应用信息进行解密时,还可以验证TEE管理方的签名、TEE管理方的身份标识信息、服务提供方的身份标识信息等,以提升操作的安全性。It can be understood that when the TEE terminal uses the first secret key to decrypt the first encrypted application information in the second operation request, it can also verify the signature of the TEE manager, the identity information of the TEE manager, and the service provider's signature. Identity information, etc., to improve the security of operations.

图6示出根据另一个实施例的可信应用管理方法。下面描述图6所示的可信应用管理方法的具体步骤。FIG. 6 illustrates a trusted application management method according to another embodiment. The specific steps of the trusted application management method shown in FIG. 6 are described below.

首先,在步骤S201,应用客户端可以将其对可信应用的安装或更新需求发送至服务提供方。在该实施方式下,由服务提供方监听应用客户端对第一可信应用的安装或更新需求。First, in step S201, the application client may send its installation or update requirements for the trusted application to the service provider. In this embodiment, the service provider monitors the application client's installation or update requirements for the first trusted application.

例如,当某个应用客户端需要调用可信应用的功能时,可以在用户授权的情况下产生需求,并将需求反馈至该可信应用对应的服务提供方,从而使得服务提供方获知应用客户端对可信应用的需求。或者,应用客户端在检测到已经安装的可信应用需要更新时,可以将该需求反馈至服务提供方,从而使得服务提供方获知应用客户端对可信应用的需求。For example, when an application client needs to call a function of a trusted application, it can generate a demand under the authorization of the user, and feed the demand back to the service provider corresponding to the trusted application, so that the service provider can know the application client End-to-end requirements for trusted applications. Alternatively, when the application client detects that the installed trusted application needs to be updated, the application client can feed back the requirement to the service provider, so that the service provider can learn the application client's requirement for the trusted application.

接着,在步骤S202,一旦服务提供方监听到应用客户端对第一可信应用的安装或更新需求,生成第一操作请求。该第一操作请求用于请求在该TEE终端中安装或更新第一可信应用。Next, in step S202, once the service provider monitors the installation or update requirements of the application client for the first trusted application, a first operation request is generated. The first operation request is used to request to install or update the first trusted application in the TEE terminal.

接着,在步骤S204,服务提供方向TEE管理方发出第一操作请求。Next, in step S204, the service provider sends a first operation request to the TEE manager.

接下来的步骤,可以参考上述步骤S106-S118,在此就不再一一赘述。For the next steps, reference may be made to the above steps S106-S118, which will not be repeated here.

图7示出根据又一个实施例的可信应用管理方法。下面描述图7所示的可信应用管理方法的具体步骤。FIG. 7 illustrates a trusted application management method according to yet another embodiment. The specific steps of the trusted application management method shown in FIG. 7 are described below.

首先,在步骤S101,应用客户端可以将其对可信应用的安装或更新需求发送至TEE终端。First, in step S101, the application client may send its installation or update requirements for the trusted application to the TEE terminal.

接着,在步骤S102,TEE终端监听到应用客户端对第一可信应用的安装或更新需求,生成第一操作请求。该第一操作请求用于请求在该TEE终端中安装或更新第一可信应用。Next, in step S102, the TEE terminal monitors the installation or update requirements of the application client for the first trusted application, and generates a first operation request. The first operation request is used to request to install or update the first trusted application in the TEE terminal.

接着,在步骤S104,TEE终端向TEE管理方发出第一操作请求。Next, in step S104, the TEE terminal sends a first operation request to the TEE management party.

在步骤S106,TEE管理方接收第一操作请求,与TEE终端中的TEE进行同步。In step S106, the TEE manager receives the first operation request and synchronizes with the TEE in the TEE terminal.

步骤S302,TEE管理方获取其预先存储的基于第一秘钥对第一可信应用加密得到的第一加密应用信息。其中,预先存储加密应用信息,可以避免在安装或更新可信应用过程中,在TEE管理方和服务提供方之间多次传输加密应用信息,降低了服务提供方的负荷,提升了传输效率,进而提升了安装或更新效率。Step S302, the TEE management party obtains the pre-stored first encrypted application information obtained by encrypting the first trusted application based on the first secret key. Among them, pre-storing encrypted application information can avoid multiple transmissions of encrypted application information between the TEE manager and the service provider during the process of installing or updating trusted applications, reducing the load on the service provider and improving the transmission efficiency. This in turn improves installation or update efficiency.

在一个例子中,TEE管理方可以预先向第一可信应用对应的服务提供方发送获取第一可信应用的请求。然后,TEE管理方再从服务提供方处接收第一可信应用。之后,TEE管理方再利用其生成的第一秘钥加密第一可信应用,得到第一加密应用信息。最后TEE管理方再存储该第一加密应用信息。In an example, the TEE manager may send a request for acquiring the first trusted application to the service provider corresponding to the first trusted application in advance. Then, the TEE manager receives the first trusted application from the service provider. After that, the TEE management party encrypts the first trusted application by using the generated first secret key to obtain the first encrypted application information. Finally, the TEE manager stores the first encrypted application information again.

在另一个例子中,TEE管理方可以预先向第一可信应用对应的服务提供方发送获取第一加密应用信息的请求。然后,TEE管理方再接收服务提供方发送的第一加密应用信息。最后,TEE管理方存储该第一加密应用信息。应理解的是,此时第一加密应用信息由服务提供方基于从TEE管理方获取的第一秘钥加密第一可信应用而得到。In another example, the TEE manager may send a request for acquiring the information of the first encrypted application to the service provider corresponding to the first trusted application in advance. Then, the TEE manager receives the first encrypted application information sent by the service provider. Finally, the TEE manager stores the first encrypted application information. It should be understood that, at this time, the first encrypted application information is obtained by the service provider encrypting the first trusted application based on the first secret key obtained from the TEE management party.

接着,步骤S114,TEE管理方将第一加密应用信息附加到第一操作请求,生成第二操作请求。此外,TEE管理方还可以在第二操作请求中附加上其自身的身份标识信息,以使服务提供方和/或TEE终端明确第二操作请求的来源,提升操作安全性。Next, in step S114, the TEE manager adds the first encrypted application information to the first operation request to generate a second operation request. In addition, the TEE manager may also add its own identification information to the second operation request, so that the service provider and/or the TEE terminal can clarify the source of the second operation request and improve operation security.

接着,在步骤S116,TEE管理方将第二操作请求发送至TEE终端。Next, in step S116, the TEE manager sends the second operation request to the TEE terminal.

在步骤S118,TEE终端基于第一秘钥和第二操作请求安装或更新第一可信应用。In step S118, the TEE terminal requests to install or update the first trusted application based on the first secret key and the second operation request.

应理解的是,该可信应用管理方法中的步骤S102-S104也可以是由第一可信应用对应的服务提供方执行,详见上述图6中的描述,在此就不再一一赘述。It should be understood that the steps S102-S104 in the trusted application management method may also be performed by the service provider corresponding to the first trusted application. For details, please refer to the description in FIG. 6 above, which will not be repeated here. .

图8示出根据又一个实施例的可信应用管理方法。下面描述图8所示的可信应用管理方法的具体步骤。FIG. 8 illustrates a trusted application management method according to yet another embodiment. The specific steps of the trusted application management method shown in FIG. 8 are described below.

首先,在步骤S401,多个TEE终端上的应用客户端可以将其对可信应用的安装或更新需求发送至服务提供方。在一个例子中,每个TEE终端上的应用客户端在检测到已经安装的可信应用需要更新时,均可以将该更新需求发送至服务提供方。在另一个例子中,当任一TEE终端上的应用客户端需要调用可信应用的功能时,若该TEE终端中未安装有可信应用,则应用客户端可以将安装可信应用的需求发送至服务提供方。First, in step S401, application clients on multiple TEE terminals may send their installation or update requirements for trusted applications to the service provider. In one example, when the application client on each TEE terminal detects that the installed trusted application needs to be updated, it can send the update requirement to the service provider. In another example, when the application client on any TEE terminal needs to call the function of the trusted application, if the trusted application is not installed in the TEE terminal, the application client can send the request for installing the trusted application to to the service provider.

接着,在步骤S402,服务提供方监听到多个TEE终端上的应用客户端对第一可信应用的安装或更新需求,生成第一操作请求。该第一操作请求用于请求在多个TEE终端中安装第一可信应用。Next, in step S402, the service provider monitors the installation or update requirements of the first trusted application by the application clients on the multiple TEE terminals, and generates a first operation request. The first operation request is used to request to install the first trusted application in the multiple TEE terminals.

在步骤S404,服务提供方将第一操作请求发送至TEE管理方。In step S404, the service provider sends the first operation request to the TEE manager.

在一个实施例中,服务提供方基于多个TEE终端的需求信息生成多个第一操作请求,分别发送给TEE管理方。在另一实施例中,服务提供方将多个TEE终端的需求信息合并为单个第一操作请求,发送给TEE管理方,该单个第一操作请求中包含多个TEE终端的请求信息。In one embodiment, the service provider generates multiple first operation requests based on the demand information of multiple TEE terminals, and sends them to the TEE manager respectively. In another embodiment, the service provider combines the requirement information of multiple TEE terminals into a single first operation request, and sends it to the TEE manager, where the single first operation request includes request information of multiple TEE terminals.

接着,在步骤S406,TEE管理方接收第一操作请求,与多个TEE终端分别进行设备状态同步。一般地,TEE管理方接收到上述操作请求,就响应该操作请求,与多个TEE终端进行设备状态同步,以向TEE终端发送第一秘钥,检测TEE终端是否具备安装或更新可信应用的环境,获取各个TEE终端的设备信息等。其中,TEE终端的设备信息可以包括TEE终端的身份标识例如设备ID、设备型号等,身份标识的哈希值,TEE终端的操作系统的版本号,TEE终端中TEE的身份标识等。Next, in step S406, the TEE manager receives the first operation request, and performs device state synchronization with the multiple TEE terminals respectively. Generally, when the TEE management party receives the above operation request, it responds to the operation request and synchronizes the device status with multiple TEE terminals to send the first secret key to the TEE terminals to detect whether the TEE terminals have the ability to install or update trusted applications. environment, obtain the device information of each TEE terminal, etc. The device information of the TEE terminal may include the identity of the TEE terminal such as device ID, device model, etc., the hash value of the identity, the version number of the operating system of the TEE terminal, the identity of the TEE in the TEE terminal, and the like.

可选地,TEE管理方可以直接与多个TEE终端进行设备状态同步,以减轻服务提供方的负荷;也可以通过服务提供方和/或应用客户端与多个TEE终端进行设备状态同步。Optionally, the TEE manager can directly perform device status synchronization with multiple TEE terminals to reduce the load on the service provider; it can also perform device status synchronization with multiple TEE terminals through the service provider and/or the application client.

在一个例子中,TEE管理方每次接收到第一操作请求时,可以针对该第一操作请求生成一串对称的动态秘钥(即第一秘钥)。In an example, each time the TEE manager receives the first operation request, it may generate a series of symmetric dynamic keys (ie, the first key) for the first operation request.

在步骤S408,TEE管理方向服务提供方发送第一消息。第一消息包括各个TEE终端的设备信息。In step S408, the TEE management sends a first message to the service provider. The first message includes device information of each TEE terminal.

在一个例子中,第一消息中可以包括针对多个TEE终端创建的第一会话标识。TEE管理方可以使用该第一会话标识对应的会话窗口将各个TEE终端的设备信息发送至服务提供方。换言之,如图9所示,TEE管理方使用一个会话ID所表示的当前会话,将各个TEE终端的设备信息发送至服务提供方,使多个用户终端可以共享信息流程,以减少重复传输,提升传输效率,降低时延。In one example, the first message may include first session identifiers created for multiple TEE terminals. The TEE manager may use the session window corresponding to the first session identifier to send the device information of each TEE terminal to the service provider. In other words, as shown in Figure 9, the TEE manager uses the current session represented by a session ID to send the device information of each TEE terminal to the service provider, so that multiple user terminals can share the information flow, so as to reduce repeated transmission and improve Transmission efficiency and reduced delay.

接着,在步骤S410,服务提供方基于各个TEE终端的设备信息确定各个TEE终端对应的应用安装信息。该应用安装信息可以包括第一可信应用的版本信息,文件大小信息等。一般地,服务提供方可以基于TEE终端的设备信息,查询设备信息与应用安装信息之间的映射关系表,确定出与该TEE终端适配的可信应用的版本信息和文件大小信息等。例如,若操作系统ios9对应的可信应用的版本为V1,ios10对应的可信应用的版本为V2,则当TEE终端的操作系统为ios9时,就可以确定出可信应用的版本为V1。Next, in step S410, the service provider determines application installation information corresponding to each TEE terminal based on the device information of each TEE terminal. The application installation information may include version information of the first trusted application, file size information, and the like. Generally, the service provider can query the mapping table between device information and application installation information based on the device information of the TEE terminal, and determine the version information and file size information of the trusted application adapted to the TEE terminal. For example, if the version of the trusted application corresponding to the operating system ios9 is V1, and the version of the trusted application corresponding to ios10 is V2, when the operating system of the TEE terminal is ios9, it can be determined that the version of the trusted application is V1.

在步骤S412,服务提供方向TEE管理方发送第二消息。该第二消息包括各个TEE终端对应的应用安装信息。In step S412, the service provider sends a second message to the TEE manager. The second message includes application installation information corresponding to each TEE terminal.

在一个例子中,第二消息包括针对多个TEE终端创建的前述第一会话标识。服务提供方可以使用该第一会话标识对应的会话窗口将各个TEE终端对应的应用安装信息发送至TEE管理方。换言之,如图10所示,服务提供方使用一个会话ID所表示的当前会话,将各个TEE终端的应用安装信息发送至TEE管理方,使多个用户终端可以共享信息流程,以减少重复传输,提升传输效率,降低时延。In one example, the second message includes the aforementioned first session identifiers created for multiple TEE terminals. The service provider may use the session window corresponding to the first session identifier to send the application installation information corresponding to each TEE terminal to the TEE manager. In other words, as shown in Figure 10, the service provider uses the current session represented by a session ID to send the application installation information of each TEE terminal to the TEE manager, so that multiple user terminals can share the information flow to reduce repeated transmissions. Improve transmission efficiency and reduce latency.

接着,在步骤S414,TEE管理方基于各个TEE终端对应的应用安装信息从预先存储的多个加密应用信息中,确定各个TEE终端对应的第一加密应用信息;第一加密应用信息基于第一秘钥加密第一可信应用而得到。一般地,TEE管理方接收到各个TEE终端对应的应用安装信息后,可以基于应用安装信息中有关可信应用的相关信息例如版本号信息等,从预先存储的多个加密应用信息中搜寻相关的可信应用,从而确定出各个TEE终端对应的第一加密应用信息。Next, in step S414, the TEE management party determines the first encrypted application information corresponding to each TEE terminal from a plurality of pre-stored encrypted application information based on the application installation information corresponding to each TEE terminal; the first encrypted application information is based on the first encrypted application information. obtained by encrypting the first trusted application with the key. Generally, after receiving the application installation information corresponding to each TEE terminal, the TEE management party can search for relevant information from multiple pre-stored encrypted application information based on relevant information about trusted applications in the application installation information, such as version number information, etc. Trusted applications, so as to determine the first encrypted application information corresponding to each TEE terminal.

需说明的是,对于预先存储加密应用信息的过程,可参考上文中的描述,在此就不再一一赘述。其中,预先存储加密应用信息,可以避免在安装或更新可信应用过程中,在TEE管理方和服务提供方之间多次传输加密应用信息,降低了服务提供方的负荷,提升了传输效率,进而提升了安装或更新效率。It should be noted that, for the process of pre-storing the encrypted application information, reference may be made to the above description, which will not be repeated here. Among them, pre-storing encrypted application information can avoid multiple transmissions of encrypted application information between the TEE manager and the service provider during the process of installing or updating trusted applications, reducing the load on the service provider and improving the transmission efficiency. This in turn improves installation or update efficiency.

在步骤S416,TEE管理方将各个TEE终端对应的第一加密应用信息附加到相应的第一操作请求,生成各个TEE终端对应的第二操作请求。In step S416, the TEE management party adds the first encrypted application information corresponding to each TEE terminal to the corresponding first operation request, and generates a second operation request corresponding to each TEE terminal.

在步骤S418,TEE管理方基于各个TEE终端对应的应用安装信息,确定目标TEE终端组。该目标TEE终端组由对应相同的应用安装信息的TEE终端构成。一般地,TEE管理方可以从多个应用安装信息中,筛选出相同的应用安装信息;然后,再将相同的应用安装信息对应的TEE终端分成一组,从而构成目标终端组。例如,当TEE终端1,TEE终端2所需的可信应用的版本号相同时,则可以将TEE终端1和TEE终端2分成一组。In step S418, the TEE manager determines a target TEE terminal group based on the application installation information corresponding to each TEE terminal. The target TEE terminal group is composed of TEE terminals corresponding to the same application installation information. Generally, the TEE manager can filter out the same application installation information from multiple application installation information; then, group TEE terminals corresponding to the same application installation information into a group to form a target terminal group. For example, when the version numbers of the trusted applications required by the TEE terminal 1 and the TEE terminal 2 are the same, the TEE terminal 1 and the TEE terminal 2 may be grouped into one group.

在步骤S420,TEE管理方向服务提供方发送合并操作请求,合并操作请求包括第一会话标识,相同的应用安装信息所对应的第一加密应用信息,和目标TEE终端组的信息。如此,对于一个TEE终端组中的多个TEE终端,由于其对应相同的应用安装信息,则通过合并操作请求针对该多个TEE终端发送共同的第一加密应用信息,以减少重复传输,提升传输效率,降低时延。In step S420, the TEE management sends a merge operation request to the service provider, and the merge operation request includes the first session identifier, the first encrypted application information corresponding to the same application installation information, and the information of the target TEE terminal group. In this way, for multiple TEE terminals in a TEE terminal group, since they correspond to the same application installation information, a combined operation request is used to send the common first encrypted application information to the multiple TEE terminals to reduce repeated transmission and improve transmission. efficiency and reduce latency.

接着,在步骤S422,服务提供方根据合并操作请求,向目标TEE终端组中每个TEE终端发送对应的第二操作请求。Next, in step S422, the service provider sends a corresponding second operation request to each TEE terminal in the target TEE terminal group according to the combined operation request.

在另一实施例中,也可以将上述步骤S418至S422修改为,由TEE管理方直接向各个TEE终端发送其各自对应的第二操作请求。In another embodiment, the above steps S418 to S422 may also be modified so that the TEE management party directly sends its corresponding second operation request to each TEE terminal.

接着,在步骤S424,TEE终端基于第一秘钥和第二操作请求安装或更新第一可信应用。一般地,TEE终端可以利用第一秘钥对第二操作请求中的第一加密应用信息进行解密,以得到第一可信应用;之后,即可以安装或更新该第一可信应用。Next, in step S424, the TEE terminal requests to install or update the first trusted application based on the first secret key and the second operation request. Generally, the TEE terminal can use the first secret key to decrypt the first encrypted application information in the second operation request to obtain the first trusted application; after that, the first trusted application can be installed or updated.

此外,在安装或更新第一可信应用成功后,TEE终端可以向TEE管理方、服务提供方和/或应用客户端等反馈安装或更新成功的信息,以使TEE管理方、服务提供方和/或应用客户端获知安装或更新成功的信息。In addition, after the first trusted application is successfully installed or updated, the TEE terminal can feed back information about the successful installation or update to the TEE management party, service provider and/or application client, so that the TEE management party, service provider and/or application client can / or the application client is informed that the installation or update is successful.

可以理解的是,TEE终端在利用第一秘钥对第二操作请求中的第一加密应用信息进行解密时,还可以验证TEE管理方的签名、TEE管理方的身份标识信息、服务提供方的身份标识信息等,以提升操作的安全性。It can be understood that when the TEE terminal uses the first secret key to decrypt the first encrypted application information in the second operation request, it can also verify the signature of the TEE manager, the identity information of the TEE manager, and the service provider's signature. Identity information, etc., to improve the security of operations.

应理解的是,该可信应用管理方法中的步骤S402-S404也可以是由多个TEE终端执行,对于TEE终端的执行过程,详见上文中的描述,在此就不再一一赘述。It should be understood that the steps S402-S404 in the trusted application management method may also be executed by multiple TEE terminals. For the execution process of the TEE terminals, see the above description for details, and will not be repeated here.

通过以上描述可以看到,在安装或更新可信应用的过程中,TEE终端和服务提供方均可以监听应用客户端对可信应用的安装或更新需求,并向TEE管理方发起可信应用的管理流程;之后,由TEE管理方获取基于其生成的第一秘钥对可信应用加密得到的加密应用信息,并将加密应用信息发送至TEE终端,由TEE终端完成安装或更新操作,简化了重复传输,降低了服务提供方的负荷,提升了传输效率,进而提升了安装或更新效率。It can be seen from the above description that during the process of installing or updating a trusted application, both the TEE terminal and the service provider can monitor the application client's installation or update requirements for the trusted application, and initiate a trusted application notification to the TEE manager. Management process; after that, the TEE management party obtains the encrypted application information obtained by encrypting the trusted application based on the generated first key, and sends the encrypted application information to the TEE terminal, and the TEE terminal completes the installation or update operation, which simplifies the Repeated transmission reduces the load on service providers, improves transmission efficiency, and further improves installation or update efficiency.

在以上的可信应用管理的过程中,涉及TEE管理方、服务提供方和TEE终端的多方交互。下面分别描述以上各方的装置构成。In the above process of trusted application management, multi-party interaction between the TEE manager, the service provider and the TEE terminal is involved. The device configuration of each of the above will be described separately below.

图11示出根据一个实施例提供的可信应用管理装置的示意性框图,该装置部署于TEE管理方。如图11所示,该装置500包括:Fig. 11 shows a schematic block diagram of a trusted application management apparatus provided according to an embodiment, where the apparatus is deployed on a TEE manager. As shown in Figure 11, the device 500 includes:

第一操作请求接收单元51,配置为从请求方接收用于请求在TEE终端中安装或更新第一可信应用的第一操作请求,请求方包括TEE终端或第一可信应用对应的服务提供方,第一操作请求由请求方监听应用客户端对第一可信应用的安装或更新需求而产生;The first operation request receiving unit 51 is configured to receive a first operation request for requesting to install or update a first trusted application in the TEE terminal from a requesting party, where the requesting party includes the TEE terminal or the service provider corresponding to the first trusted application The first operation request is generated by the requesting party monitoring the installation or update requirements of the application client for the first trusted application;

同步单元52,配置为与TEE终端进行设备状态同步,从而向其发送第一秘钥;The synchronization unit 52 is configured to perform device state synchronization with the TEE terminal, thereby sending the first secret key to it;

加密应用信息获取单元53,配置为获取基于第一秘钥对第一可信应用加密得到的第一加密应用信息;The encrypted application information obtaining unit 53 is configured to obtain the first encrypted application information obtained by encrypting the first trusted application based on the first secret key;

第二操作请求生成单元54,配置为将第一加密应用信息附加到第一操作请求,生成第二操作请求;The second operation request generating unit 54 is configured to attach the first encrypted application information to the first operation request to generate a second operation request;

第二操作请求发送单元55,配置为将第二操作请求发送至TEE终端,以使TEE终端基于第一秘钥和第二操作请求安装或更新第一可信应用。The second operation request sending unit 55 is configured to send the second operation request to the TEE terminal, so that the TEE terminal installs or updates the first trusted application based on the first secret key and the second operation request.

在一个例子中,加密应用信息获取单元53可以如下得到第一加密应用信息:向服务提供方发送第一秘钥,使其基于第一秘钥对第一可信应用进行加密,得到第一加密应用信息;从服务提供方接收第一加密应用信息。In one example, the encrypted application information obtaining unit 53 may obtain the first encrypted application information as follows: send the first secret key to the service provider, so that it encrypts the first trusted application based on the first secret key, and obtains the first encrypted application Application information; receiving the first encrypted application information from the service provider.

在另一个例子中,加密应用信息获取单元53可以如下得到第一加密应用信息:获取预先存储的第一加密应用信息。In another example, the encrypted application information obtaining unit 53 may obtain the first encrypted application information as follows: obtain pre-stored first encrypted application information.

进一步地,在一个例子中,加密应用信息获取单元53可以如下存储第一加密应用信息:预先从服务提供方接收第一可信应用;利用第一秘钥加密第一可信应用,得到第一加密应用信息;存储第一加密应用信息。Further, in an example, the encrypted application information obtaining unit 53 may store the first encrypted application information as follows: receive the first trusted application from the service provider in advance; encrypt the first trusted application with the first key to obtain the first trusted application Encrypting application information; storing the first encrypted application information.

进一步地,在另一个例子中,加密应用信息获取单元53可以如下存储第一加密应用信息:预先从服务提供方接收第一加密应用信息,以及存储第一加密应用信息。Further, in another example, the encrypted application information acquisition unit 53 may store the first encrypted application information as follows: receive the first encrypted application information from the service provider in advance, and store the first encrypted application information.

图12示出根据一个实施例提供的可信应用管理的示意性框图,该装置部署于TEE管理方。如图12所示,该装置600包括:FIG. 12 shows a schematic block diagram of trusted application management provided according to an embodiment, and the apparatus is deployed on a TEE manager. As shown in Figure 12, the device 600 includes:

第一操作请求接收单元61,配置为从请求方接收用于请求在多个TEE终端中安装或更新第一可信应用的第一操作请求,请求方包括第一可信应用对应的服务提供方或多个TEE终端;The first operation request receiving unit 61 is configured to receive a first operation request for requesting to install or update a first trusted application in multiple TEE terminals from a requesting party, where the requesting party includes a service provider corresponding to the first trusted application or multiple TEE terminals;

同步单元62,配置为与多个TEE终端分别进行设备状态同步,获取各个TEE终端的设备信息,并向各个TEE终端发送第一秘钥;The synchronization unit 62 is configured to perform device state synchronization with a plurality of TEE terminals respectively, obtain the device information of each TEE terminal, and send the first secret key to each TEE terminal;

第一消息发送单元63,配置为向服务提供方发送第一消息,第一消息包括各个TEE终端的设备信息,以使服务提供方基于各个TEE终端的设备信息确定对应的应用安装信息;The first message sending unit 63 is configured to send a first message to the service provider, where the first message includes device information of each TEE terminal, so that the service provider determines the corresponding application installation information based on the device information of each TEE terminal;

第二消息接收单元64,配置为接收服务提供方发送的第二消息,第二消息包括各个TEE终端对应的应用安装信息;The second message receiving unit 64 is configured to receive a second message sent by the service provider, where the second message includes application installation information corresponding to each TEE terminal;

加密应用信息确定单元65,配置为基于各个TEE终端对应的应用安装信息从预先存储的多个加密应用信息中,确定各个TEE终端对应的第一加密应用信息,第一加密应用信息基于第一秘钥加密第一可信应用而得到;The encrypted application information determination unit 65 is configured to determine the first encrypted application information corresponding to each TEE terminal from a plurality of pre-stored encrypted application information based on the application installation information corresponding to each TEE terminal, and the first encrypted application information is based on the first encrypted application information. obtained by encrypting the first trusted application with the key;

第二操作请求生成单元66,配置为将各个TEE终端对应的第一加密应用信息附加到相应的第一操作请求,生成各个TEE终端对应的第二操作请求;The second operation request generating unit 66 is configured to attach the first encrypted application information corresponding to each TEE terminal to the corresponding first operation request, and generate a second operation request corresponding to each TEE terminal;

第二操作请求发送单元67,配置为将各个TEE终端对应的第二操作请求发送至相应的TEE终端,以使相应的TEE终端基于第一秘钥和第二操作请求安装或更新第一可信应用。The second operation request sending unit 67 is configured to send the second operation request corresponding to each TEE terminal to the corresponding TEE terminal, so that the corresponding TEE terminal installs or updates the first trusted terminal based on the first secret key and the second operation request application.

在一个例子中,应用安装信息包括,第一可信应用的版本信息,文件大小信息。In one example, the application installation information includes version information and file size information of the first trusted application.

在一个例子中,第一消息包括针对多个TEE终端创建的第一会话标识;第二消息包括该第一会话标识。In one example, the first message includes a first session identifier created for multiple TEE terminals; the second message includes the first session identifier.

进一步地,第二操作请求发送单元67可以如下发送第二操作请求:基于各个TEE终端对应的应用安装信息,确定目标TEE终端组,目标TEE终端组由对应相同的应用安装信息的TEE终端构成;向服务提供方发送合并操作请求,合并操作请求包括第一会话标识,相同的应用安装信息所对应的第一加密应用信息,和目标TEE终端组的信息,以使得服务提供方根据合并操作请求,向目标TEE终端组中每个TEE终端发送对应的第二操作请求。Further, the second operation request sending unit 67 can send the second operation request as follows: based on the application installation information corresponding to each TEE terminal, determine a target TEE terminal group, and the target TEE terminal group is composed of TEE terminals corresponding to the same application installation information; Send a merge operation request to the service provider, where the merge operation request includes the first session identifier, the first encrypted application information corresponding to the same application installation information, and the information of the target TEE terminal group, so that the service provider according to the merge operation request, Send a corresponding second operation request to each TEE terminal in the target TEE terminal group.

在一个例子中,同步单元62可以如下进行同步:直接与多个TEE终端分别进行设备状态同步,或者通过服务提供方和/或应用客户端与多个TEE终端分别进行设备状态同步。In one example, the synchronization unit 62 may perform synchronization as follows: directly perform device status synchronization with multiple TEE terminals, or perform device status synchronization with multiple TEE terminals respectively through a service provider and/or an application client.

在一个例子中,,第一操作请求由服务提供方监听多个TEE终端上的应用客户端对第一可信应用的安装或更新需求而产生;或者In one example, the first operation request is generated by the service provider monitoring the installation or update requirements of the first trusted application by the application clients on multiple TEE terminals; or

第一操作请求由TEE终端监听其上的应用客户端对第一可信应用的安装或更新需求而产生,并发送至服务提供方。The first operation request is generated by the TEE terminal monitoring the installation or update requirement of the first trusted application by the application client on the TEE terminal, and sent to the service provider.

图13示出根据一个实施例提供的可信应用管理的示意性框图,该装置部署于服务提供方。如图13所示,该装置700包括:Figure 13 shows a schematic block diagram of trusted application management provided according to one embodiment, the apparatus is deployed on a service provider. As shown in Figure 13, the device 700 includes:

监听单元71,配置为监听应用客户端对第一可信应用的安装或更新需求,并生成第一操作请求,第一操作请求用于请求在应用客户端对应的TEE终端中安装第一可信应用;The monitoring unit 71 is configured to monitor the installation or update requirements of the application client for the first trusted application, and generate a first operation request, where the first operation request is used to request to install the first trusted application in the TEE terminal corresponding to the application client application;

第一操作请求发送单元72,配置为将第一操作请求发送至可信执行环境TEE管理方;The first operation request sending unit 72 is configured to send the first operation request to the trusted execution environment TEE manager;

秘钥接收单元73,配置为接收TEE管理方发送的第一秘钥;The key receiving unit 73 is configured to receive the first key sent by the TEE management party;

加密单元,配置为至少基于第一秘钥对第一可信应用进行加密,得到第一加密应用信息;an encryption unit, configured to encrypt the first trusted application based on at least the first secret key to obtain first encrypted application information;

加密应用信息发送单元74,配置为将第一加密应用信息发送至TEE管理方,以使TEE管理方将第一加密应用信息发送至TEE终端。The encrypted application information sending unit 74 is configured to send the first encrypted application information to the TEE manager, so that the TEE manager sends the first encrypted application information to the TEE terminal.

图14示出根据一个实施例提供的可信应用管理的示意性框图,该装置部署于服务提供方。如图14所示,该装置800包括:Figure 14 shows a schematic block diagram of trusted application management provided according to one embodiment, the apparatus is deployed on a service provider. As shown in Figure 14, the apparatus 800 includes:

监听单元81,配置为监听多个TEE终端上的应用客户端对第一可信应用的安装或更新需求,并生成第一操作请求,第一操作请求用于请求在多个TEE终端中安装第一可信应用;The monitoring unit 81 is configured to monitor the installation or update requirements of the first trusted application by the application clients on the multiple TEE terminals, and generate a first operation request, and the first operation request is used to request the installation of the first trusted application in the multiple TEE terminals. a trusted application;

第一操作请求发送单元82,配置为将第一操作请求发送至可信执行环境TEE管理方;The first operation request sending unit 82 is configured to send the first operation request to the trusted execution environment TEE manager;

消息接收单元83,配置为接收TEE管理方发送的第一消息,第一消息包括各个TEE终端的设备信息;The message receiving unit 83 is configured to receive a first message sent by the TEE manager, where the first message includes device information of each TEE terminal;

确定单元84,配置为基于各个TEE终端的设备信息确定对应的应用安装信息;The determining unit 84 is configured to determine the corresponding application installation information based on the device information of each TEE terminal;

第二消息发送单元85,配置为向TEE管理方发送第二消息,第二消息包括各个TEE终端对应的应用安装信息,以使TEE管理方基于各个TEE终端对应的应用安装信息从预先存储的多个加密应用信息中,确定各个TEE终端对应的第一加密应用信息,第一加密应用信息基于第一秘钥加密第一可信应用而得到。The second message sending unit 85 is configured to send a second message to the TEE management party, where the second message includes the application installation information corresponding to each TEE terminal, so that the TEE management party can select the application installation information corresponding to each TEE terminal from the pre-stored multiple Among the pieces of encrypted application information, the first encrypted application information corresponding to each TEE terminal is determined, and the first encrypted application information is obtained by encrypting the first trusted application based on the first secret key.

在一个例子中,还包括:In one example, also include:

合并操作请求接收单元(未示出),配置为接收TEE管理方发送的合并操作请求,合并操作请求包括第一会话标识,相同的应用安装信息所对应的第一加密应用信息,和目标TEE终端组的信息,目标TEE终端组由对应相同的应用安装信息的TEE终端构成;The merge operation request receiving unit (not shown) is configured to receive the merge operation request sent by the TEE manager, where the merge operation request includes the first session identifier, the first encrypted application information corresponding to the same application installation information, and the target TEE terminal Group information, the target TEE terminal group is composed of TEE terminals corresponding to the same application installation information;

第二操作请求发送单元(未示出),配置为根据合并操作请求,向目标TEE终端组中每个TEE终端发送对应的第二操作请求,以使每个TEE终端基于第一秘钥和第二操作请求安装或更新第一可信应用,第二操作请求由TEE管理方将每个TEE终端对应的第一加密应用信息附加到相应的第一操作请求而生成。The second operation request sending unit (not shown) is configured to send a corresponding second operation request to each TEE terminal in the target TEE terminal group according to the combined operation request, so that each TEE terminal is based on the first secret key and the third operation request. The second operation request is to install or update the first trusted application, and the second operation request is generated by the TEE management party adding the first encrypted application information corresponding to each TEE terminal to the corresponding first operation request.

图15示出根据一个实施例提供的可信应用管理的示意性框图,该装置部署于可信执行环境TEE终端。如图15所示,该装置500包括:FIG. 15 shows a schematic block diagram of trusted application management provided according to an embodiment, and the apparatus is deployed in a trusted execution environment TEE terminal. As shown in Figure 15, the device 500 includes:

响应单元91,配置为响应于可信执行环境TEE管理方的同步请求,与TEE管理方进行设备状态同步,接收TEE管理方发送的第一秘钥;The response unit 91 is configured to perform device state synchronization with the TEE manager in response to a synchronization request from the TEE manager of the trusted execution environment, and receive the first secret key sent by the TEE manager;

第二操作请求接收单元92,配置为接收TEE管理方发送的第二操作请求,第二操作请求由TEE管理方将TEE终端对应的第一加密应用信息附加到相应的第一操作请求而生成,第一加密应用信息基于第一秘钥加密第一可信应用得到,第一操作请求用于请求在TEE终端中安装或更新第一可信应用;The second operation request receiving unit 92 is configured to receive a second operation request sent by the TEE manager, where the second operation request is generated by the TEE manager adding the first encrypted application information corresponding to the TEE terminal to the corresponding first operation request, The first encrypted application information is obtained by encrypting the first trusted application based on the first secret key, and the first operation request is used to request to install or update the first trusted application in the TEE terminal;

安装或更新单元93,配置为基于第一秘钥和第二操作请求安装或更新第一可信应用。The installation or update unit 93 is configured to install or update the first trusted application based on the first secret key and the second operation request.

在一个例子中,还包括:In one example, also include:

监听单元(未示出),配置为监听应用客户端对第一可信应用的安装或更新需求,并生成第一操作请求;a monitoring unit (not shown), configured to monitor the installation or update requirements of the application client for the first trusted application, and generate a first operation request;

第一操作请求发送单元,配置为将第一操作请求发送至TEE管理方,以使TEE管理方与TEE终端进行设备状态同步和/或获取第一加密应用信息。The first operation request sending unit is configured to send the first operation request to the TEE management party, so that the TEE management party and the TEE terminal perform device state synchronization and/or obtain first encrypted application information.

在一个例子中,还包括:In one example, also include:

设备信息发送单元(未示出),配置为将TEE终端的设备信息发送至TEE管理方。The device information sending unit (not shown) is configured to send the device information of the TEE terminal to the TEE manager.

根据另一方面的实施例,还提供一种计算机可读存储介质,其上存储有计算机程序,当所述计算机程序在计算机中执行时,令计算机执行上文所描述的方法。According to another embodiment, there is also provided a computer-readable storage medium having stored thereon a computer program which, when executed in a computer, causes the computer to perform the above-described method.

根据再一方面的实施例,还提供一种计算设备,包括存储器和处理器,所述存储器中存储有可执行代码,所述处理器执行所述可执行代码时,实现上文所述的方法。According to yet another embodiment, a computing device is also provided, including a memory and a processor, the memory stores executable codes, and when the processor executes the executable codes, the above-mentioned method is implemented .

本领域技术人员应该可以意识到,在上述一个或多个示例中,本发明所描述的功能可以用硬件、软件、固件或它们的任意组合来实现。当使用软件实现时,可以将这些功能存储在计算机可读介质中或者作为计算机可读介质上的一个或多个指令或代码进行传输。Those skilled in the art should appreciate that, in one or more of the above examples, the functions described in the present invention may be implemented in hardware, software, firmware, or any combination thereof. When implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium.

以上所述的具体实施方式,对本发明的目的、技术方案和有益效果进行了进一步详细说明,所应理解的是,以上所述仅为本发明的具体实施方式而已,并不用于限定本发明的保护范围,凡在本发明的技术方案的基础之上,所做的任何修改、等同替换、改进等,均应包括在本发明的保护范围之内。The specific embodiments described above further describe the objectives, technical solutions and beneficial effects of the present invention in detail. It should be understood that the above descriptions are only specific embodiments of the present invention, and are not intended to limit the scope of the present invention. Any modification, equivalent replacement, improvement, etc. made on the basis of the technical solution of the present invention shall be included within the protection scope of the present invention.

Claims (22)

1. A trusted application management method, performed by a trusted execution environment, TEE, manager, comprising:
receiving a first operation request for requesting installation or update of a first trusted application in a TEE terminal from a requester, wherein the requester comprises a service provider corresponding to the TEE terminal or the first trusted application, and the first operation request is generated by monitoring the installation or update demand of an application client on the first trusted application by the requester;
performing device state synchronization with the TEE terminal so as to send a first secret key to the TEE terminal;
acquiring first encrypted application information obtained by encrypting the first trusted application based on the first secret key;
attaching the first encrypted application information to the first operation request to generate a second operation request;
sending the second operation request to the TEE terminal to enable the TEE terminal to install or update the first trusted application based on the first key and the second operation request.
2. The method of claim 1, wherein the obtaining first encrypted application information that is obtained by encrypting the first trusted application based on the first key comprises:
sending the first secret key to the service provider, so that the service provider encrypts the first trusted application based on the first secret key to obtain first encrypted application information;
receiving the first encrypted application information from the service provider.
3. The method of claim 1, wherein the obtaining first encrypted application information that is obtained by encrypting the first trusted application based on the first key comprises:
and acquiring the first encryption application information stored in advance.
4. The method of claim 3, wherein the obtaining the pre-stored first encrypted application information comprises, prior to:
receiving the first trusted application from the service provider in advance;
encrypting the first trusted application by using the first secret key to obtain first encrypted application information;
storing the first encrypted application information.
5. The method of claim 3, wherein the obtaining the pre-stored first encrypted application information comprises, prior to:
receiving the first encryption application information from the service provider in advance, and storing the first encryption application information.
6. A trusted application management method, performed by a trusted execution environment, TEE, manager, comprising:
receiving a first operation request for requesting installation or update of a first trusted application in a plurality of TEE terminals from a requester, wherein the requester comprises a service provider corresponding to the first trusted application or the plurality of TEE terminals;
respectively carrying out equipment state synchronization with the TEE terminals, acquiring equipment information of each TEE terminal, and sending a first secret key to each TEE terminal;
sending a first message to the service provider, wherein the first message comprises the equipment information of each TEE terminal, so that the service provider determines corresponding application installation information based on the equipment information of each TEE terminal;
receiving a second message sent by the service provider, wherein the second message comprises application installation information corresponding to each TEE terminal;
determining first encrypted application information corresponding to each TEE terminal from a plurality of encrypted application information stored in advance based on application installation information corresponding to each TEE terminal, wherein the first encrypted application information is obtained by encrypting the first trusted application based on the first secret key;
attaching the first encryption application information corresponding to each TEE terminal to a corresponding first operation request, and generating a second operation request corresponding to each TEE terminal;
and sending the second operation request corresponding to each TEE terminal to the corresponding TEE terminal so that the corresponding TEE terminal installs or updates the first trusted application based on the first secret key and the second operation request.
7. The method of claim 6, wherein the application installation information includes version information, file size information of the first trusted application.
8. The method of claim 6, wherein the first message comprises a first session identification created for the plurality of TEE terminals; the second message includes the first session identification.
9. The method of claim 8, wherein the sending the second operation request corresponding to each TEE terminal to the corresponding TEE terminal comprises:
determining a target TEE terminal group based on the application installation information corresponding to each TEE terminal, wherein the target TEE terminal group consists of TEE terminals corresponding to the same application installation information;
and sending a merging operation request to the service provider, wherein the merging operation request comprises the first session identifier, first encrypted application information corresponding to the same application installation information and information of the target TEE terminal group, so that the service provider sends a corresponding second operation request to each TEE terminal in the target TEE terminal group according to the merging operation request.
10. The method of any of claims 6-8, wherein the device state synchronization with the plurality of TEE terminals, respectively, comprises:
and directly and respectively carrying out equipment state synchronization with the plurality of TEE terminals, or respectively carrying out equipment state synchronization with the plurality of TEE terminals through the service provider and/or the application client.
11. The method of any of claims 6-8, wherein the first operation request is generated by the service provider listening to a need for installation or update of the first trusted application by an application client on the plurality of TEE terminals; or
The first operation request is generated by monitoring the installation or update requirement of the first trusted application by an application client on the TEE terminal, and is sent to the service provider.
12. A trusted application management method, performed by a service provider, comprising:
monitoring the installation or update requirement of an application client on a first trusted application, and generating a first operation request, wherein the first operation request is used for requesting the installation of the first trusted application in a TEE terminal corresponding to the application client;
sending the first operation request to a Trusted Execution Environment (TEE) manager;
receiving a first secret key sent by the TEE manager;
encrypting the first trusted application at least based on the first secret key to obtain first encrypted application information;
and sending the first encryption application information to the TEE manager so that the TEE manager sends the first encryption application information to the TEE terminal.
13. A trusted application management method, performed by a service provider, comprising:
monitoring the installation or update requirements of application clients on a plurality of TEE terminals on a first trusted application, and generating a first operation request, wherein the first operation request is used for requesting the installation of the first trusted application in the plurality of TEE terminals;
sending the first operation request to a Trusted Execution Environment (TEE) manager;
receiving a first message sent by the TEE manager, wherein the first message comprises equipment information of each TEE terminal;
determining corresponding application installation information based on the equipment information of each TEE terminal;
and sending a second message to the TEE manager, wherein the second message comprises application installation information corresponding to each TEE terminal, so that the TEE manager determines first encrypted application information corresponding to each TEE terminal from a plurality of encrypted application information stored in advance based on the application installation information corresponding to each TEE terminal, and the first encrypted application information is obtained by encrypting the first trusted application based on a first secret key.
14. The method of claim 13, wherein the application installation information includes version information, file size information of the first trusted application.
15. The method of claim 13, wherein the first message comprises a first session identification created for the plurality of TEE terminals; the second message includes the first session identification.
16. The method of claim 15, further comprising:
receiving a merging operation request sent by the TEE manager, wherein the merging operation request comprises the first session identifier, first encrypted application information corresponding to the same application installation information and information of a target TEE terminal group, and the target TEE terminal group consists of TEE terminals corresponding to the same application installation information;
and according to the merging operation request, sending a corresponding second operation request to each TEE terminal in the target TEE terminal group, so that each TEE terminal installs or updates the first trusted application based on the first secret key and the second operation request, and the TEE manager adds first encryption application information corresponding to each TEE terminal to the corresponding first operation request to generate the second operation request.
17. A trusted application management apparatus, the apparatus being deployed at a trusted execution environment, TEE, manager, comprising:
a first operation request receiving unit, configured to receive a first operation request for requesting installation or update of a first trusted application in a TEE terminal from a requester, where the requester includes a service provider corresponding to the TEE terminal or the first trusted application, and the first operation request is generated by monitoring, by the requester, a demand of an application client for installation or update of the first trusted application;
a synchronization unit configured to perform device state synchronization with the TEE terminal, thereby transmitting a first secret key thereto;
an encrypted application information acquisition unit configured to acquire first encrypted application information obtained by encrypting the first trusted application based on the first key;
a second operation request generation unit configured to attach the first encrypted application information to the first operation request, generating a second operation request;
a second operation request sending unit configured to send the second operation request to the TEE terminal, so that the TEE terminal installs or updates the first trusted application based on the first key and the second operation request.
18. A trusted application management apparatus, the apparatus being deployed at a trusted execution environment, TEE, manager, comprising:
a first operation request receiving unit configured to receive a first operation request for requesting installation or update of a first trusted application in a plurality of TEE terminals from a requester, the requester including a service provider corresponding to the first trusted application or the plurality of TEE terminals;
the synchronization unit is configured to perform equipment state synchronization with the TEE terminals respectively, acquire equipment information of each TEE terminal, and send a first secret key to each TEE terminal;
a first message sending unit configured to send a first message to the service provider, the first message including the device information of the respective TEE terminals, so that the service provider determines corresponding application installation information based on the device information of the respective TEE terminals;
a second message receiving unit, configured to receive a second message sent by the service provider, where the second message includes application installation information corresponding to each TEE terminal;
an encrypted application information determining unit configured to determine first encrypted application information corresponding to each TEE terminal from a plurality of pieces of encrypted application information stored in advance based on application installation information corresponding to each TEE terminal, the first encrypted application information being obtained by encrypting the first trusted application based on the first secret key;
a second operation request generation unit, configured to attach the first encrypted application information corresponding to each TEE terminal to a corresponding first operation request, and generate a second operation request corresponding to each TEE terminal;
a second operation request sending unit, configured to send a second operation request corresponding to each TEE terminal to a corresponding TEE terminal, so that the corresponding TEE terminal installs or updates the first trusted application based on the first key and the second operation request.
19. A trusted application management apparatus, deployed at a service provider, comprising:
the monitoring unit is configured to monitor the installation or update requirement of an application client on a first trusted application, and generate a first operation request, where the first operation request is used to request that the first trusted application is installed in a TEE terminal corresponding to the application client;
a first operation request sending unit configured to send the first operation request to a Trusted Execution Environment (TEE) manager;
a key receiving unit configured to receive a first key sent by the TEE manager;
the encryption unit is configured to encrypt the first trusted application at least based on the first secret key to obtain first encrypted application information;
and the encryption application information sending unit is configured to send the first encryption application information to the TEE manager so that the TEE manager sends the first encryption application information to the TEE terminal.
20. A trusted application management apparatus, deployed at a service provider, comprising:
the monitoring unit is configured to monitor installation or update requirements of application clients on a plurality of TEE terminals on a first trusted application, and generate a first operation request, wherein the first operation request is used for requesting that the first trusted application is installed in the plurality of TEE terminals;
a first operation request sending unit configured to send the first operation request to a Trusted Execution Environment (TEE) manager;
a message receiving unit configured to receive a first message sent by the TEE manager, where the first message includes device information of each TEE terminal;
a determining unit configured to determine corresponding application installation information based on the device information of the respective TEE terminals;
a second message sending unit, configured to send a second message to the TEE manager, where the second message includes application installation information corresponding to each TEE terminal, so that the TEE manager determines, based on the application installation information corresponding to each TEE terminal, first encrypted application information corresponding to each TEE terminal from a plurality of pieces of encrypted application information stored in advance, where the first encrypted application information is obtained by encrypting the first trusted application based on a first secret key.
21. A computer-readable storage medium, on which a computer program is stored which, when executed in a computer, causes the computer to carry out the method of any one of claims 1-16.
22. A computing device comprising a memory and a processor, wherein the memory has stored therein executable code that, when executed by the processor, performs the method of any of claims 1-16.
CN202010955075.0A 2020-09-11 2020-09-11 Trusted application management method and device Active CN112149134B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010955075.0A CN112149134B (en) 2020-09-11 2020-09-11 Trusted application management method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010955075.0A CN112149134B (en) 2020-09-11 2020-09-11 Trusted application management method and device

Publications (2)

Publication Number Publication Date
CN112149134A true CN112149134A (en) 2020-12-29
CN112149134B CN112149134B (en) 2024-11-19

Family

ID=73889661

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010955075.0A Active CN112149134B (en) 2020-09-11 2020-09-11 Trusted application management method and device

Country Status (1)

Country Link
CN (1) CN112149134B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116708044A (en) * 2023-08-07 2023-09-05 北京小米移动软件有限公司 Application management system, application management method, server, terminal and medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140317686A1 (en) * 2013-04-22 2014-10-23 Oracle International Corporation System with a trusted execution environment component executed on a secure element
CN107682159A (en) * 2017-10-12 2018-02-09 北京握奇智能科技有限公司 The trusted application management method and trusted application management system of a kind of intelligent terminal
CN108781210A (en) * 2015-12-11 2018-11-09 格马尔托股份有限公司 Mobile device with credible performing environment
WO2019165931A1 (en) * 2018-02-28 2019-09-06 华为技术有限公司 Management method, terminal and server
CN111181720A (en) * 2019-12-31 2020-05-19 支付宝(杭州)信息技术有限公司 Service processing method and device based on trusted execution environment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140317686A1 (en) * 2013-04-22 2014-10-23 Oracle International Corporation System with a trusted execution environment component executed on a secure element
CN108781210A (en) * 2015-12-11 2018-11-09 格马尔托股份有限公司 Mobile device with credible performing environment
CN107682159A (en) * 2017-10-12 2018-02-09 北京握奇智能科技有限公司 The trusted application management method and trusted application management system of a kind of intelligent terminal
WO2019165931A1 (en) * 2018-02-28 2019-09-06 华为技术有限公司 Management method, terminal and server
CN111181720A (en) * 2019-12-31 2020-05-19 支付宝(杭州)信息技术有限公司 Service processing method and device based on trusted execution environment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
YANG CAI等: "ALTEE: constructing trustworthy execution environment for mobile App Dynamically", 《 2019 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC)》, 30 June 2019 (2019-06-30) *
施健;陈铁明;茆俊康;: "基于IBE Service的新型文件加密系统", 计算机系统应用, no. 06, 15 June 2012 (2012-06-15) *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116708044A (en) * 2023-08-07 2023-09-05 北京小米移动软件有限公司 Application management system, application management method, server, terminal and medium
CN116708044B (en) * 2023-08-07 2023-10-20 北京小米移动软件有限公司 Application management system, application management method, server, terminal and medium

Also Published As

Publication number Publication date
CN112149134B (en) 2024-11-19

Similar Documents

Publication Publication Date Title
WO2022206349A1 (en) Information verification method, related apparatus, device, and storage medium
CN112422532B (en) Service communication method, system and device and electronic equipment
US12086259B2 (en) Secure over-the-air firmware upgrade
CN106686008B (en) Information storage means and device
EP3687107B1 (en) Information assurance (ia) using an integrity and identity resilient blockchain
CN111737366B (en) Private data processing method, device, equipment and storage medium of block chain
US8447970B2 (en) Securing out-of-band messages
CN109587101B (en) Digital certificate management method, device and storage medium
CN108540433B (en) User identity verification method and device
EP3408992A1 (en) Secure connections for low-power devices
TW201709691A (en) Method and device for multi-user cluster identity authentication
CN110933484A (en) Management method and device of wireless screen projection equipment
CN107733639B (en) Key management method, device and readable storage medium
EP4096160A1 (en) Shared secret implementation of proxied cryptographic keys
EP4096147A1 (en) Secure enclave implementation of proxied cryptographic keys
EP3921749A1 (en) Device and method for authenticating application in execution environment in trust zone
CN113992346A (en) Implementation method of security cloud desktop based on state password reinforcement
CN112966287B (en) Method, system, device and computer readable medium for acquiring user data
CN111740824B (en) Trusted application management method and device
CN114584299A (en) Data processing method and device, electronic equipment and storage medium
US11805182B2 (en) User profile distribution and deployment systems and methods
CN114329596A (en) Firmware updating method, device and system for Internet of things equipment
CN112149134B (en) Trusted application management method and device
WO2024234936A1 (en) Service providing method and apparatus for third-party applet
US20190289090A1 (en) Message Push Method and Terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant