Unlock instant, AI-driven research and patent intelligence for your innovation.

Terminal startup processing method and device

A processing method and terminal technology, applied in the field of network security, can solve the problems of low data security and data theft of key modules, and achieve the effect of reducing the risk of being stolen and improving security.

Active Publication Date: 2022-07-22
HANGZHOU HIKVISION DIGITAL TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, since the data of the key modules has been preset in the embedded terminal in the form of plain text, there is a risk of the data of the key modules being stolen, resulting in low security of the data of the key modules

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal startup processing method and device
  • Terminal startup processing method and device
  • Terminal startup processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] Exemplary embodiments will be described in detail herein, examples of which are illustrated in the accompanying drawings. Where the following description refers to the drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the illustrative examples below are not intended to represent all implementations consistent with this disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure, as recited in the appended claims.

[0057] In the embodiments of the present application, "at least one" refers to one or more, and "a plurality" refers to two or more. "And / or", which describes the association relationship of the associated objects, means that there can be three kinds of relationships, for example, A and / or B, which can mean that A exists alone, A and B exist at the same time, and B exists alone, where A and B can...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

According to the method and device for processing terminal startup provided by the embodiments of the present application, before the terminal is started, target data and digital signature are preset in the terminal in the form of ciphertext. The target data and the ciphertext digital signature are decrypted to obtain the target data and the digital signature, and then the digital signature is verified by using the public key corresponding to the private key, and after the verification is passed, the target data is run, and the terminal is controlled to start, which is similar to the prior art. In contrast, the target data and digital signature have always been preset in the terminal in the form of ciphertext. Only when the target data is started to run, the decryption algorithm is used to decrypt the ciphertext target data and the ciphertext digital signature to obtain the target data. Data and digital signatures, which can reduce the time that the target data and digital signatures exist in plaintext, effectively reduce the risk of target data and digital signatures being stolen, and improve data security.

Description

technical field [0001] The present application relates to the technical field of network security, and in particular, to a method and apparatus for processing terminal startup. Background technique [0002] With the continuous improvement of terminal technology, taking embedded terminal as an example, embedded terminal provides convenience for people's daily life and has become an indispensable part of people's daily life. At the same time, the security of embedded terminal has also changed. be particularly important. [0003] At present, there are many mature and effective schemes to perform security verification on the running phase of the embedded terminal, but there are few schemes for performing the security verification on the startup phase of the embedded terminal. In order to perform security verification on the startup phase of the embedded terminal, in the prior art, a private key is used to digitally sign the data of the key modules of the embedded terminal (for ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/40
CPCH04L9/3247H04L9/3263H04L9/3268H04L63/0823
Inventor 陈达陈加栋陈思
Owner HANGZHOU HIKVISION DIGITAL TECH