Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for checking and compiling system startup files

A technology for starting files and verification methods, applied in the computer field, can solve problems such as cracking by hackers or other users, and achieve the effect of improving security

Active Publication Date: 2020-09-29
TCL COMM TECH NINGBO CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since these algorithms are public, it is easy to be cracked by hackers or other users, and the system firmware can be modified by modifying the original check value

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for checking and compiling system startup files
  • A method for checking and compiling system startup files
  • A method for checking and compiling system startup files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0022] In addition, the terms "first", "second", and "third" are used for descriptive purposes only, and cannot be interpreted as indicating or implying relative importance or implicitly specifying the quantity of the indicated technical features. Thus, features defined as "first", "second", and "third" may explicitly or implicitly include at least one of these features.

[0023] figure 1 It is a schematic flow chart of an embodiment of the system startup fil...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system start-up file verifying method. The system start-up file verifying method includes the steps: acquiring a system start-up file, a first verification value and a second verification value from a system firmware partition; utilizing a first verification algorithm to operate the system start-up file to obtain a third verification value; utilizing a second verification algorithm to operate the third verification value to obtain a fourth verification value; and comparing the first verification value and the second verification value with the third verification value and the fourth verification value respectively, and if any one comparison result is different, determining that a safety error exists in the system start-up file. Through the above mode, the system start-up file verifying and compiling method can check whether the system firmware is modified or damaged, thus improving the safety of the system.

Description

technical field [0001] The invention relates to the technical field of computers, in particular to a method for verifying and compiling system startup files. Background technique [0002] With the maturity and popularity of electronic products, more and more people are paying attention to the system software of electronic products, especially mobile phone products. There are many tools to crack root permissions on the Internet. Hackers or other users can easily obtain root tools to forcibly modify the system. Firmware files. After the system firmware files are modified, the software security of the system will be destroyed, resulting in failure to boot or abnormal functions on the system. [0003] At present, the Android system calculates the system firmware file and generates a check value. When the system starts, it judges whether the system firmware has been modified by comparing whether the check value is consistent. However, since these algorithms are public, it is eas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/10G06F21/64
CPCG06F11/1004G06F21/64
Inventor 邓铁军刘香君
Owner TCL COMM TECH NINGBO CO LTD