Unlock instant, AI-driven research and patent intelligence for your innovation.

Information tampering prevention method and device, server and terminal

An anti-tampering, server technology, applied in the field of information security, can solve the problems of infringing the interests of operators and mobile terminal manufacturers, infringing interests, and mobile terminals being unable to access communication networks, etc., to ensure authenticity and prevent malicious tampering.

Active Publication Date: 2017-05-31
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This practice not only violates the interests of the majority of users, but also violates the interests of operators and mobile terminal manufacturers, and damages the image of mobile terminal manufacturers
In addition, when a communication operator provides communication services, if two mobile terminals with the same IMEI are detected in the same cell, one of the mobile terminals may not be able to access the communication network, which will affect the normal communication of users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information tampering prevention method and device, server and terminal
  • Information tampering prevention method and device, server and terminal
  • Information tampering prevention method and device, server and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention. In addition, it should be noted that, for the convenience of description, the drawings only show some but not all structures related to the present invention.

[0034] Before discussing the exemplary embodiments in greater detail, it should be mentioned that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although the flowchart depicts the steps as a sequential process, many of the steps may be performed in parallel, concurrently, or concurrently. Furthermore, the order of the steps can be rearranged. The process may be terminated when its operation is complete, but may also have additional steps not included in the figures. The processes may cor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an information tampering prevention method and device, a server and a terminal. The method comprises the following steps: when a write information request of an information modification tool having a permission for built-in information is detected and a modification operation for the built-in information needs to be authorized, generating a random key; encrypting the random key and to-be-written information by employing a preset public key to obtain first encrypted data, and transmitting the first encrypted data to the server via the information modification tool, so that the server generates second encrypted data according to the first encrypted data; and acquiring the second encrypted data, decrypting the second encrypted data by employing the random key to obtain the to-be-written information, and modifying the built-in information according to the to-be-written information. According to the technical scheme provided by the embodiment of the invention, the effect of preventing the built-in information of the terminal from being tampered maliciously is achieved.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of information security, and in particular, to an information tamper-proof method, device, server and terminal. Background technique [0002] Terminals are often built with some key information before they leave the factory. Some of these key information are used to assist the terminal to perform basic functions, and some are used as the terminal's identity. For example, the IMEI (International MobileEquipment Identity, mobile equipment international identity code) of the mobile terminal, which is like the identity card of the mobile terminal, is used to uniquely identify the mobile terminal. [0003] However, with the development of technology, there are some methods for unauthorized tampering with the built-in information of the terminal, and tools for executing such methods. Through the method of unauthorized tampering with the built-in information of the terminal, the setting b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0869H04L63/0428H04L63/06H04L63/1466
Inventor 蔡文龙谭正鹏张志龙
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD