Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for detecting integrity of mobile terminal memory data

A mobile terminal and memory technology, applied in security devices, telephone communications, electrical components, etc., can solve the problem of data integrity damage in mobile phone memory, and achieve the effect of protecting from tampering, shortening detection time, and reducing losses

Inactive Publication Date: 2011-06-01
ZTE CORP
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the prior art, after the data is downloaded to the mobile phone memory, only the key part of the data is protected, only the data related to the network lock or card lock is protected, and there is a possibility of illegal modification by bypassing the protected data part , and, after illegally modifying the data to be downloaded, downloading the illegally modified data to the mobile phone may indirectly destroy the integrity of the data in the mobile phone memory

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting integrity of mobile terminal memory data
  • Method and device for detecting integrity of mobile terminal memory data
  • Method and device for detecting integrity of mobile terminal memory data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The basic idea of ​​the present invention is: divide the data into several data blocks arbitrarily, extract the data abstract of each data block, encrypt the data abstract to become the abstract ciphertext, which is the preset abstract ciphertext, and then download it to the mobile terminal memory, the counter The setting module sets the counter in the memory, and the operation detection module encrypts the counter value into the ciphertext of the counter value. When starting up each time, the operation detection module detects the corresponding data block in the mobile terminal memory according to the decrypted counter value plaintext, and extracts the data block. The data digest is used to decrypt the preset digest ciphertext of the corresponding data block into preset digest plaintext, and if the data digest of the data block matches the preset digest plaintext, the mobile terminal application is started.

[0024] The present invention will be further described below ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for detecting integrity of mobile terminal memory data, which comprises: an operation detection module determines the serial number of a data block to be detected; and the operation detection module decrypts the corresponding preset abstract cipher text into preset abstract plain text and compares the data abstract of the data block to be detected with the preset abstract plain text, and if the data abstract and the preset abstract plain text are determined to be the same, the data of the current data block to be detected are integral. The invention also discloses a device for detecting the integrity of the mobile terminal memory data. By adopting the device, the integrity of the mobile terminal memory data can be effectively detected and the data in a memory is prevented from being illegally modified.

Description

technical field [0001] The invention relates to the field of mobile terminal security mechanisms, in particular to a method and device for detecting the data integrity of a mobile terminal memory. Background technique [0002] With the maturity and development of electronic technology, mobile terminals, such as mobile phones, are becoming more and more popular, which brings great convenience to people, meets the fast-paced and high-efficiency social needs, and is very popular among users. In order to better develop customers, some mobile operators sometimes sell mobile phones to users at a price below the cost, or even give them away for free. At the same time, mobile operators will require these mobile phones to be locked to the operator's network, or locked The operator's Subscriber Identity Module (SIM), the so-called lock card. However, there are some people or organizations in the market. Driven by interests, they illegally rewrite the data or codes in the mobile phone...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/10H04W88/02H04M1/725H04W12/106
CPCH04W12/10H04L63/123H04W88/02H04W12/108
Inventor 李春雨
Owner ZTE CORP