Trusted boot method and apparatus for mobile operation system

A mobile operating system and trusted technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve the problems of low security, achieve good security performance, improve security reliability, security algorithms and storage areas are reliable Effect

Inactive Publication Date: 2017-02-08
江苏北弓智能科技有限公司
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the secure boot of mobile products, the current technical means rely more on staged verification instead of doing a secure boot from the moment the product is powered on, and the verification method uses a software encryption algorithm and the verificat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted boot method and apparatus for mobile operation system
  • Trusted boot method and apparatus for mobile operation system
  • Trusted boot method and apparatus for mobile operation system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention.

[0058] see figure 1 , figure 1 It is the mobile operating system start-up flow chart provided by the embodiment of the present invention, combined with the trusted start-up method of the mobile operating system provided by the embodiment shown in the present invention, the difference between the structure diagram shown in this embodiment and the flow of the mobile operating system in the prior art It lies in: adding a secure encryption chip module and a trusted verification process. The secure encryption chip has the highest security level, supports national secret encryption algorithms and has a built-in secure encrypted storage area.

[0059] The overview of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a trusted boot method and apparatus for a mobile operation system. The method comprises the steps of powering on a system, executing a Boot ROM Code embedded in an SOC by a CPU, and calling a GMB algorithm of a security encryption chip and a measurement reference value pre-stored in the encryption chip to measure whether a Preloader is trusted or not; if the Preloader is trusted, executing a Preloader code, and calling the GMB algorithm of the security encryption chip and the measurement reference value pre-stored in the encryption chip to measure whether a Boot Loader is trusted or not; if the Boot Loader is trusted, executing a Boot Loader code, and calling the GMB algorithm of the security encryption chip and the measurement reference value pre-stored in the encryption chip to measure whether a kernel is trusted or not; if the kernel is trusted, executing the kernel, and calling the GMB algorithm of the security encryption chip and the measurement reference value pre-stored in the encryption chip to measure whether an application framework is trusted or not; and if the application framework is trusted, executing an application framework code, thereby finishing system boot. By adopting the scheme, the boot security of the mobile operation system can be improved.

Description

technical field [0001] The invention relates to the technical field of trusted computing, in particular to a method and device for trusted startup of a mobile operating system. Background technique [0002] With the rapid development of mobile communication technology, smart mobile terminal products are emerging in an endless stream. Various mobile products bring us great convenience and have become a part of our life and work. [0003] However, the development of mobile products is more focused on the improvement of functions and performance, and the development of security is relatively lagging behind. However, with the exposure of various information security issues, security has begun to attract everyone's attention. For the secure boot of mobile products, the current technical means rely more on staged verification instead of doing a secure boot from the moment the product is powered on, and the verification method uses a software encryption algorithm and the verificati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57
CPCG06F21/575
Inventor 郭玉其刘铮蒋思宇赵芮周军喻鑫马泽龙王彦姣黄波刘智臣陈婷婷
Owner 江苏北弓智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products