Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for detecting data integrity of mobile terminal memory

A data integrity and mobile terminal technology, applied in security devices, sub-office equipment, electrical components, etc., can solve problems such as data integrity damage in mobile phone memory, and achieve the effects of protecting against tampering, reducing losses, and shortening the detection time

Inactive Publication Date: 2015-09-16
ZTE CORP
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the prior art, after the data is downloaded to the mobile phone memory, only the key part of the data is protected, only the data related to the network lock or card lock is protected, and there is a possibility of illegal modification by bypassing the protected data part , and, after illegally modifying the data to be downloaded, downloading the illegally modified data to the mobile phone may indirectly destroy the integrity of the data in the mobile phone memory

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting data integrity of mobile terminal memory
  • Method and device for detecting data integrity of mobile terminal memory
  • Method and device for detecting data integrity of mobile terminal memory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The basic idea of ​​the present invention is: divide the data into several data blocks arbitrarily, extract the data abstract of each data block, encrypt the data abstract to become the abstract ciphertext, which is the preset abstract ciphertext, and then download it to the mobile terminal memory, the counter The setting module sets the counter in the memory, and the operation detection module encrypts the counter value into the ciphertext of the counter value. When starting up each time, the operation detection module detects the corresponding data block in the mobile terminal memory according to the decrypted counter value plaintext, and extracts the data block. The data digest is used to decrypt the preset digest ciphertext of the corresponding data block into preset digest plaintext, and if the data digest of the data block matches the preset digest plaintext, the mobile terminal application is started.

[0024] The present invention will be further described below ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for detecting the data integrity of the memory of a mobile terminal is disclosed. The method comprises: determining the serial number of a data block to be detected; decrypting the preset digest ciphertext corresponding to the data block to be detected into the preset digest plaintext; comparing the data digest of the data block to be detected with the preset digest plaintext; if they are determined to be identical, data in the current data block to be detected is complete. An apparatus for detecting the data integrity of the mobile of a terminal memory is also disclosed. The data integrity of the memory of the mobile terminal can be detected effectively by using the apparatus, so that the invalid modification of data in the memory is avoided.

Description

technical field [0001] The invention relates to the field of mobile terminal security mechanisms, in particular to a method and device for detecting the data integrity of a mobile terminal memory. Background technique [0002] With the maturity and development of electronic technology, mobile terminals, such as mobile phones, are becoming more and more popular, which brings great convenience to people, meets the fast-paced and high-efficiency social needs, and is very popular among users. In order to better develop customers, some mobile operators sometimes sell mobile phones to users at a price below the cost, or even give them away for free. At the same time, mobile operators will require these mobile phones to be locked to the operator's network, or locked The operator's Subscriber Identity Module (SIM), the so-called lock card. However, there are some people or organizations in the market. Driven by interests, they illegally rewrite the data or codes in the mobile phone...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/10H04W88/02H04M1/725H04W12/106
CPCH04W12/10H04L63/123H04W88/02H04W12/108
Inventor 李春雨
Owner ZTE CORP