Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Secure startup method of terminal equipment and terminal equipment

A technology for terminal equipment and secure startup, which is applied in the direction of computer security devices, instruments, platform integrity maintenance, etc., can solve the problems that the security of mobile terminals cannot be guaranteed and is easy to be cracked, so as to improve the efficiency of authentication, flexible versions, and improve cost effect

Active Publication Date: 2017-02-22
SPREADTRUM COMM (SHANGHAI) CO LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] This startup process does not verify the code. Users can change and crack the code at will. The security of the mobile terminal cannot be guaranteed. The functions of the system manufacturer, such as locking the network and locking the card, are easy to be cracked, so a mechanism is needed. To prevent and identify the integrity and correctness of the code

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure startup method of terminal equipment and terminal equipment
  • Secure startup method of terminal equipment and terminal equipment
  • Secure startup method of terminal equipment and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In the following description, many technical details are proposed in order to enable readers to better understand the application. However, those skilled in the art can understand that without these technical details and various changes and modifications based on the following implementation modes, the technical solution claimed in each claim of the present application can be realized.

[0035] In order to make the purpose, technical solution and advantages of the present invention clearer, the following will further describe the implementation of the present invention in detail in conjunction with the accompanying drawings.

[0036] The first embodiment of the present invention relates to a method for securely starting a terminal device. figure 2 is a schematic flow chart of the secure boot method of the terminal device.

[0037] The device includes a processor, a read-only first memory, a one-time programmable second memory and a rewritable and non-volatile third me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of mobile terminals, and discloses a safe starting method of terminal equipment, and the terminal equipment. The terminal equipment disclosed by the invention comprises a read-only first memory, a one time programmable second memory and an erasable non-volatile third memory, wherein a first safety code is saved in the first memory; a first Hash abstract is saved in the second memory; basic safety contents, a boot program and a mapping file are saved in the third memory; the basic safety contents comprise a first public key and a second safety code; the boot program comprises a ciphertext of a second Hash abstract encrypted by a first private key in advance; the basic safety contents are authenticated by using the first safety code and the first Hash abstract, and then the boot program is authenticated by the first public key and the second safety code. According to the safe starting method of terminal equipment, and the terminal equipment disclosed by the invention, on one hand, starting safety is increased by stringent multiple authentication, on the other hand, only the Hash abstract of the basic safety contents is saved in the second memory, so that a low capacity is required for the second memory and cost is reduced.

Description

technical field [0001] The present invention relates to the field of mobile terminals, in particular to the secure startup technology of terminal equipment. Background technique [0002] Almost all intrusions in the field of mobile terminals need to change the system content, and the outside world's traditional intrusion methods are mainly through destroying and exchanging hardware units or changing the contents of system files. Usually, the anti-intrusion inspection method is based on known intrusion methods, so it is almost difficult to prevent new intrusion methods. It is entirely possible for system intrusion events to last for several weeks or even longer without being detected. Skilled intruders can clear system logs and deceive common intrusion detection systems, but almost all intrusions require changes to key system files, so It is very necessary to verify the integrity and consistency of the system, which is the function and purpose of secure boot. [0003] figu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06F21/62G06F21/64
CPCG06F21/575G06F21/604G06F21/64G06F2221/2113
Inventor 虞华伟
Owner SPREADTRUM COMM (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products