Mobile phone software encryption method

A technology of mobile phone software and encryption method, applied in electrical components, wireless communication, network data management, etc., can solve problems such as increasing costs, and achieve the effect of preventing theft

Inactive Publication Date: 2011-06-29
深圳市闪电通讯技术有限公司
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the traditional design, the terminal product software encryption is through the combination of software and h

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile phone software encryption method
  • Mobile phone software encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The present invention will be further described below in conjunction with accompanying drawing:

[0016] refer to figure 1 Shown, a kind of mobile phone software encryption method of the present invention comprises the following steps:

[0017] S1. After the design company completes the development of the mobile phone software, it compiles and connects it to a BIN file for burning in the factory;

[0018] S2. The mobile phone burning software first reads the unique identification code UID of the mobile phone CPU when burning, and the UIDs of any two CPUs are different;

[0019] S3. The mobile phone burning software uses the UID as the key to encrypt the key part of the code in the BIN file, and then burns the processed BIN file into the mobile phone;

[0020] S4. The mobile phone burning software records the UID of each mobile phone and imports them into the UID database of the verification server in batches;

[0021] S5. After the mobile phone is turned on, read the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mobile phone software encryption method, which relates to software, in particular to the software encryption method for a mobile phone designing scheme. In a production link, when the software is burned in a mobile phone, a part of key codes in the software may be encrypted according to a unique identifier (UID) code in a central processing unit (CPU) of the mobile phone. The UID code of the each mobile phone is unique, so the software actually written into read-only memories (ROM) of each mobile phone is uniquely matched with corresponding hardware UID codes. In a production burning process, the UID codes of each legally-produced mobile phone are recorded, and are summarized into a database of a verification server; when the mobile phone is started for the first time and connected into an operator network, the UID code of the mobile phone is transmitted to the server for verification; and if the server cannot find a corresponding record from the UID database, the mobile phone is determined not to be legally produced, and the software of the mobile phone is locked and cannot work normally. Therefore, the mobile phone designing scheme can be prevented from being stolen by dual encryption verification in the production link and a using link.

Description

technical field [0001] The invention relates to software, in particular to a software encryption method for a design scheme of a mobile phone. Background technique [0002] In the traditional design, the terminal product software encryption is through the combination of software and hardware. The combination of software and hardware requires the use of IC chips, which increases the cost of the product. Contents of the invention [0003] The technical problem to be solved by the present invention is to provide a simple software encryption method, which can effectively prevent the mobile phone design scheme from being embezzled through the double encryption verification in the production link and the use link. [0004] The present invention is achieved through the following technical solutions: a mobile phone software encryption method, characterized in that it comprises the following steps: [0005] S1. After the design company completes the development of the mobile phone...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W8/24H04W12/04H04W12/06H04W12/03H04W12/126
Inventor 楼昊
Owner 深圳市闪电通讯技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products