Universal safe intelligent terminal starting method

A smart terminal and security boot technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve the security threats of smart mobile terminals and other issues

Active Publication Date: 2015-01-21
INST OF INFORMATION ENG CAS
View PDF2 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For jailbroken terminal devices, all security mechanisms running on them can be bypassed, and the security architecture and mec

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Universal safe intelligent terminal starting method
  • Universal safe intelligent terminal starting method
  • Universal safe intelligent terminal starting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The following will further describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. It should be understood that the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0027] The system architecture of the embodiment provided by this patent application is as figure 2 As shown, the on-chip ROM, that is, iROM contains the secure boot module s-boot. The s-boot is stored in the iROM in a one-time burning method, which can ensure that the s-boot is not tampered with by malicious programs and maintains its integrity. On-chip RAM, namely iRAM, is a small-capacity static RAM. DRAM and external storage devices (such as nand f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a universal safe intelligent terminal starting method. According to the method, firstly, a safe starting module s-boot is arranged at the starting skipping position of an intelligent terminal, wherein the integrity reference value of a bootstrap program and the integrity reference value of an operating system are stored; secondly, s-boot is executed after the intelligent terminal is started, the storage positions of the bootstrap program and the operating system of the intelligent terminal are acquired; thirdly, the bootstrap program is installed on the s-boot, the integrity measuring value of the bootstrap program is obtained, the bootstrap program is verified, and if the bootstrap program does not pass the verification, the intelligent terminal is forced to reset; if the bootstrap program passes the verification, the operating system continues to be installed, the integrity of the operating system is measured, the integrity measuring value of the operating system is obtained, the operating system is verified, and if the operating system passes the verification, the bootstrap program is started; if not, the intelligent terminal is forced to reset. The safe starting process of the system can be guaranteed without making other change on a terminal device.

Description

technical field [0001] The present invention belongs to the field of mobile terminal security, and mainly relates to a security boot solution for mobile intelligent terminals, more precisely, a general security boot method, which is oriented to diversified mobile terminal equipment and flexible and diverse peripheral configurations, and can effectively Solve security issues such as jailbreak. Background technique [0002] In recent years, with the rapid development of integrated circuit technology, mobile intelligent terminals such as smartphones and tablet computers have already possessed extremely powerful processing capabilities, and their storage capabilities, computing capabilities, and operating speeds have been greatly improved. With the transformation of mobile smart terminals from functional phones to smart phones, mobile terminal operating systems emerged as the times require. The main purpose of the smart terminal operating system is no longer to provide call man...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/51
CPCG06F21/575G06F2221/034
Inventor 于爱民杨文思
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products