Introduction to Asset Store Kit

Asset Store Kit provides a set of asset store service (ASSET) APIs, which implement secure storage and management of sensitive data less than 1024 bytes in size, including passwords, app tokens, and other critical data (such as bank card numbers).

Disclaimer for the trial version

You can use Asset Store Kit of the trial version based on requirements. ASSET APIs may change at any time without notice, or may no longer be maintained. The reliability and availability of the trial version are not subject to formal SDK specifications. We do not assume any responsibilities caused by or related to the use of the Asset Store Kit of the trial version. You shall bear the risks of using it.

Basic Concepts

The secure storage of assets depends on the underlying HUKS. Specifically, HUKS implements the asset encryption, decryption, and access control in a secure environment (such as a TEE). The sensitive user data will never be disclosed even if the system is attacked.

The AES256-GCM algorithm is used to encrypt and decrypt assets. The following access control mechanisms are used to protect assets against unauthorized access:

  • Owner-based access control: All assets are protected by this mechanism by default.

    • An asset can be accessed only by its owner (service that writes the asset).
    • ASSET obtains the asset owner identity from the system service. Even if the service identity is spoofed, the spoofer cannot obtain the data of other services.
    • The asset encryption/decryption also protects the integrity of the asset owner identity. Even if the owner of the asset is tampered with, attackers cannot obtain data of other services.
  • Access control based on the lock screen status: This mechanism provides the following protection levels in ascending order of security. You can set it based on site requirements. If no protection level is set, assets are accessible only after the device is unlocked for the first time.

    • DEVICE_POWERED_ON: allows access to assets after the device is powered on.
    • DEVICE_FIRST_UNLOCKED: allows access to assets after the device is unlocked for the first time.
    • DEVICE_UNLOCKED: allows access to assets only when the device is unlocked.
  • Access control based on the setting of the lock screen password: This mechanism allows assets to be accessed only after a lock screen password is set. By default, it is disabled.

    • If this mechanism is enabled, assets can be accessed only after the user sets a screen lock password.
  • Access control based on user authentication: This mechanism allows assets to be accessed only after a successful user identity authentication. By default, it is disabled.

    • If this mechanism is enabled, assets can be accessed only after a successful user identity authentication.
    • The user authentication can be fingerprint, facial, or PIN authentication.
    • You can set an authentication validity period, which allows access to multiple assets within the validity period. The maximum authentication validity period is 10 minutes.

Constraints

  • Alias-based access

    Assets are stored in the ASSET database in ciphertext and uniquely identified by the service identity and alias. The alias of each asset must be unique.

  • Batch asset query

    The assets queried are transmitted to the service through an IPC channel. Due to the limitation of the IPC buffer size, the maximum number of assets to be queried at a time cannot exceed 40.

  • Custom service data storage ASSET provides 8 custom asset attributes starting with DATA_LABEL for services. If the 8 custom attributes are used, you can combine multiple data segments in a certain format (for example, JSON) into an ASSET attribute.

    ASSET protects the integrity of the attributes starting with DATA_LABEL_CRITICAL. These attributes cannot be changed once written.

Relationship with Other Kits

Asset Store Kit provides secure storage of sensitive data less than 1 KB in size. To protect data greater than 1 KB, use HUKS or Crypto Framework.