Terminal startup method, terminal, and signature device

A technology of signature devices and terminals, applied in the field of communications, can solve the problems of complicated implementation mechanism, increased cost, and inability to lock stolen mobile phones, etc., to avoid illegal tampering and improve security.

Active Publication Date: 2019-03-19
HUAWEI TECH CO LTD
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in this way, the chip introduces special circuits and underlying mechanisms, and the implementation mechanism is more complicated, which increases the cost.
Moreover, if the storage device is replaced before the cloud is successfully locked, and a third-party read-only memory (read-only memory, abbreviation: ROM) without the cloud locking function is flashed, the stolen mobile phone cannot be locked again.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal startup method, terminal, and signature device
  • Terminal startup method, terminal, and signature device
  • Terminal startup method, terminal, and signature device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention.

[0047] In this application, a terminal may refer to a device with a communication function, which may include a handheld device with a wireless communication function such as a mobile phone, a tablet computer, a vehicle-mounted device, a wearable device, a computing device, or other processing devices connected to a wireless modem equipment etc. The terminal can also be called by other names, such as: terminal, user equipment (English: UserEquipment, abbreviation: UE), mobile station, subscriber unit, station, cellular phone, personal digital assistant, wireless modem, wireless communication device, handheld device, laptop Top computer, cordless telephone, wireless local loop station, etc. The terminal device may refer to a wireless terminal or a wired terminal. The wireless terminal can be a device that provides voice and / or data ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a terminal startup method, a terminal and a signature device. The method comprises the following steps: when a verification certificate is detected in a terminal, the terminalunsigns the verification certificate by using a preset public key to obtain an identification and a status value carried by the verification certificate; when the verification certificate is detected,the terminal unsigns the verification certificate by using a preset public key to obtain a status value carried by the verification certificate. Wherein the verification certificate is written into the terminal after the signing device signs through the preset private key; the terminal obtains a chip identification of a main chip and a current state value of the terminal; the terminal judges whether the chip identifier is the same as the identifier carried by the verification certificate and whether the current state value is the same as the state value carried by the verification certificate. If all are the same, the terminal starts normally. By adopting the application, the program start control of the terminal can be carried out by introducing a verification certificate, the anti-theftreliability is improved, a special circuit is not required to be introduced, and the cost is low.

Description

technical field [0001] The present application relates to the field of communication technologies, and in particular to a terminal activation method, a terminal and a signature device. Background technique [0002] At present, it is more and more common for terminals such as mobile phones to be stolen. Therefore, the anti-theft function of mobile phones has attracted more and more attention. After some mobile phones are lost, the user can remotely lock the mobile phone by enabling the anti-theft function. After locking the mobile phone, even if the mobile phone is flashed or restored to factory settings, it will be required to enter the relevant lock screen password to start when restarting, so as to play an anti-theft function. . However, the current lock screen passwords are all stored on external storage devices such as Universal Flash Storage (Universal FlashStorage, abbreviated: UFS) or embedded Multi Media Card (embedded Multi Media Card, abbreviated: eMMC), which mak...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/33G06F21/44G06F21/73H04L9/08
CPCH04L9/0861H04L9/0897G06F21/33G06F21/44G06F21/73
Inventor 潘时林
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products