Unlock instant, AI-driven research and patent intelligence for your innovation.

Terminal startup method, terminal and signature device

A terminal and normal startup technology, applied in the field of communication, can solve the problems of increased cost, complex implementation mechanism, and the inability to lock stolen mobile phones, etc., to achieve the effect of improving security and avoiding illegal tampering

Active Publication Date: 2022-06-28
HUAWEI TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in this way, the chip introduces special circuits and underlying mechanisms, and the implementation mechanism is more complicated, which increases the cost.
Moreover, if the storage device is replaced before the cloud is successfully locked, and a third-party read-only memory (read-only memory, abbreviation: ROM) without the cloud locking function is flashed, the stolen mobile phone cannot be locked again.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal startup method, terminal and signature device
  • Terminal startup method, terminal and signature device
  • Terminal startup method, terminal and signature device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The embodiments of the present invention will be described below with reference to the accompanying drawings in the embodiments of the present invention.

[0047] In this application, a terminal may refer to a device with communication capabilities, which may include handheld devices with wireless communication capabilities such as mobile phones, tablet computers, in-vehicle devices, wearable devices, computing devices, or other processing devices connected to a wireless modem equipment, etc. The terminal may also be called by other names, such as: terminal, user equipment (English: UserEquipment, abbreviation: UE), mobile station, subscriber unit, station, cellular phone, personal digital assistant, wireless modem, wireless communication equipment, handheld equipment, laptop Top computers, cordless phones, wireless local loop stations, etc. The terminal device may refer to a wireless terminal or a wired terminal. The wireless terminal may be a device that provides vo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses a terminal starting method, a terminal and a signature device. Wherein, the method includes: when detecting that there is a verification certificate in the terminal, the terminal uses a preset public key to unsign the verification certificate to obtain the identification and status value carried by the verification certificate ; Wherein, the verification certificate is written into the terminal after the signing device signs with a preset private key; the terminal obtains the chip identification of the main chip and the current state value of the terminal; the terminal judges the Whether the chip identification is the same as the identification carried by the verification certificate, and whether the current state value is the same as the state value carried by the verification certificate; if they are the same, the terminal starts normally. By adopting the present application, the program startup control of the terminal can be carried out by introducing the verification certificate, which improves the reliability of anti-theft, and does not need to introduce a special circuit, and the realization cost is low.

Description

technical field [0001] The present application relates to the field of communication technologies, and in particular, to a terminal startup method, a terminal, and a signature device. Background technique [0002] At present, it is more and more common for terminals such as mobile phones to be stolen. Therefore, the anti-theft function of mobile phones has been paid more and more attention. After some mobile phones are lost, users can remotely lock the mobile phone by enabling the anti-theft function. After locking the mobile phone, even if the mobile phone is flashed or restored to factory settings, it will require the relevant lock screen password to be activated when restarting, thus playing the anti-theft function. . However, the current lock screen passwords are all stored in external storage devices such as Universal Flash Storage (Universal FlashStorage, abbreviation: UFS) or embedded Multi Media Card (abbreviation: eMMC), which makes illegal users The phone can be ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/33G06F21/44G06F21/73H04L9/08
CPCH04L9/0861H04L9/0897G06F21/33G06F21/44G06F21/73
Inventor 潘时林
Owner HUAWEI TECH CO LTD