Terminal device and starting method thereof

A technology of terminal equipment and bootloader, which is applied in the direction of instruments, electronic digital data processing, platform integrity maintenance, etc., can solve problems such as the inability to guarantee the security of intelligent terminals, achieve integrity and consistency, reduce costs, and reduce errors Effect

Inactive Publication Date: 2017-06-16
SPREADTRUM COMM (SHANGHAI) CO LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The above process does not verify the code, the code can be changed and cracked at will, and the security of the smart terminal cannot be guaranteed. For example, the network lock card is easy to be cracked, so a mechanism is needed to ensure the integrity and consistency of the code. Improve the security of smart terminal startup

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal device and starting method thereof
  • Terminal device and starting method thereof
  • Terminal device and starting method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] As mentioned in the background technology, all intrusions to the field of smart terminals need to change the system content, and almost all intrusions need to change key system files, so it is very necessary to verify the integrity and consistency of the system. The verification of consistency and consistency is carried out when the smart terminal is started, so as to ensure the safe start of the smart terminal. However, the start-up process of the terminal device in the prior art does not verify the code, and the code may have been changed and cracked, thereby threatening system security.

[0071] In the embodiment of the present invention, the basic security content is verified by running the first security code. When the basic security content is verified, the second security code is run to verify the boot program. When the boot program is verified, the boot program is run. , wherein, the basic security content and the boot program are stored in a non-volatile first ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a terminal device and a starting method thereof. The method includes the following steps that a first safe code is operated, and basic safety contents are verified; when the basic safety contents pass the verification, a second safe code is operated, and a guiding program is verified; when the guiding program passes the verification, the guiding program is operated; the basic safety contents and the guiding program are stored in a nonvolatile first memory, and the first safe code and the second safe code are stored in a read-only second memory. By means of the terminal device and the method, the starting safety of an intelligent terminal can be improved, and the reliability of code verification is relatively high.

Description

technical field [0001] The present invention relates to the field of intelligent terminals, in particular to a terminal device and a starting method thereof. Background technique [0002] With the development of intelligent mobile terminals, the operating system of intelligent terminals can already provide the operating environment of various application software. The popularization of intelligent terminals and the prosperity of mobile Internet applications make more and more users use intelligent terminals to handle various security Sensitive business, so that the mobile terminal is facing various security threats. [0003] All intrusions to the field of smart terminals need to change the system content, and almost all intrusions need to change key system files, so it is very necessary to verify the integrity and consistency of the system. The verification of the integrity and consistency of the system is in It is carried out when the smart terminal is started, so as to en...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/575G06F2221/034
Inventor 虞华伟
Owner SPREADTRUM COMM (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products