System boot method and apparatus

A technology of system guidance and guidance devices, applied in the field of information security, can solve problems such as insufficient security and low security of open source mobile operating systems, and achieve the effect of improving security

Inactive Publication Date: 2017-01-04
BEIJING ERENEBEN INFORMATION TECH
View PDF6 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In view of this, the technical problem to be solved by the present invention is the low security of the open source mobile operating system, and the technical defe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System boot method and apparatus
  • System boot method and apparatus
  • System boot method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0053] see figure 1 , is a flow chart of the first embodiment of the system startup and guidance method of the present invention. In the first embodiment of the system startup and guidance method, the method includes:

[0054] S1, after the system is powered on, load the system boot image in the SD password card, and load the system code image from the system boot image;

[0055] This embodiment is applied to terminal devices running mobile operating systems, such as smart phones, tablet computers, and notebook computers.

[0056] During the startup process of the terminal device, the system boot image preset in the SD password card is loaded through the system startup command. Wherein, the SD password card refers to an SD memory card with an encryption and decryption chip and a private storage area. Specifically, two sub-storage areas are set in the private storage area, one of which is the first sub-storage area for storing the system boot image, The second is the second s...

Embodiment 2

[0069] see figure 2 , is the flow chart of the second embodiment of the system boot method of the present invention, the second embodiment of the system boot method is based on the first embodiment above, loading the system boot image in the SD password card, and according to Before loading the system code image, the system boot image also includes:

[0070] S01, generating a first public-private key pair including a first public key and a first private key that match each other;

[0071] S02. Obtain the hash value of the system code image at each stage in the system startup process, and encrypt the hash value with the first private key to form a signature hash value;

[0072] S03. Attach the signature hash value to the corresponding system code image.

[0073] Wherein, the first public-private key pair is generated by a security agency, or may be generated by a terminal manufacturer through a key generator, etc., and the generated first public-private key pair includes a f...

Embodiment 3

[0077] see image 3 , is a flowchart of the third embodiment of the system startup and guidance method of the present invention. The third embodiment of the system startup and guidance method is based on the above-mentioned first embodiment or the second embodiment, and this embodiment also includes:

[0078] S4, detecting in real time the insertion state of the SD password card in the terminal, and locking the terminal if it is detected that the SD password card is separated from the terminal.

[0079] The terminal system detects the SD encryption card inserted into the terminal in real time, and if it detects that the SD encryption card is separated from the terminal, the terminal is locked. It can be understood that the separation of the SD password card from the terminal may also be caused by damage to the SD password card or improper insertion. And locking the terminal may also be shutting down, locking the screen, and the like.

[0080] Further, in order to prevent the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system boot method and apparatus. The method comprises the steps of loading a system boot mirror image in an SD password card after a system is powered on, and loading a system code mirror image according to the system boot mirror image; calculating the system code mirror image to obtain a calculated hash value, and meanwhile, decrypting a signed hash value attached to the system code mirror image through a first public key stored in the SD password card to obtain a decrypted hash value; and judging whether the calculated hash value is the same as the decrypted hash value or not, and if yes, executing the system code mirror image. By implementing the system boot method and apparatus, the verification of the system code mirror image of each stage in a terminal is realized, the effect of preventing the tampered system code mirror image from being executed is achieved, and the effect of security verification is achieved in a system boot process, so that the security of the terminal and data information stored in the terminal is improved.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a method and device for starting and guiding a system. Background technique [0002] In the prior art, since some widely used mobile operating systems (such as Android) are open source, everyone can obtain the source code. Therefore, it is more common for such open-source mobile operating systems to be mirrored and burned to user devices by non-original personnel. Among them, this kind of burning behavior is widely referred to as flashing operation, and this kind of flashing behavior can bring benefits to software manufacturers due to the pre-installed software, so some organizations have begun to produce third-party flashing packages and flashing on a large scale. Tools, for example, Brush Master, Brush Wizard, etc. These organizations modify and add some pre-installed software based on the original equipment manufacturer's software image. [0003] On the one hand,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/51
CPCG06F21/51
Inventor 陈家楠朱少杰周佳杜国楹
Owner BEIJING ERENEBEN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products