Method and device for detecting data integrity of mobile terminal memory
A data integrity and mobile terminal technology, applied in security devices, sub-office equipment, electrical components, etc., can solve problems such as data integrity damage in mobile phone memory, and achieve the effects of protecting against tampering, reducing losses, and shortening the detection time
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] The basic idea of the present invention is: divide the data into several data blocks arbitrarily, extract the data abstract of each data block, encrypt the data abstract to become the abstract ciphertext, which is the preset abstract ciphertext, and then download it to the mobile terminal memory, the counter The setting module sets the counter in the memory, and the operation detection module encrypts the counter value into the ciphertext of the counter value. When starting up each time, the operation detection module detects the corresponding data block in the mobile terminal memory according to the decrypted counter value plaintext, and extracts the data block. The data digest is used to decrypt the preset digest ciphertext of the corresponding data block into preset digest plaintext, and if the data digest of the data block matches the preset digest plaintext, the mobile terminal application is started.
[0024] The present invention will be further described below ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 