Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Firmware tamper-proofing method and equipment based on Android system

An Android system, anti-tampering technology, applied in the field of system security, can solve the problems of imperfect security technology, affecting the interests of users and manufacturers, and achieve the effect of protecting security and preventing tampering

Inactive Publication Date: 2021-03-09
微讯智造(广州)电子有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Android system firmware is easy to obtain on the Internet, and it is often cracked and tampered with by people with ulterior motives, which will affect the interests of users, manufacturers and other parties.
[0003] The Internet is becoming more and more developed, and a lot of information can be obtained from it. When the security technology was not perfect in the early days, it was frequently seen that the Android system firmware of some manufacturers was cracked and modified by netizens, and all the applications bound to the firmware were deleted and replaced with other applications. , the reason is that in related technologies, only simple protection measures are taken for boot.img

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Firmware tamper-proofing method and equipment based on Android system
  • Firmware tamper-proofing method and equipment based on Android system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In the following description, references to "some embodiments" describe a subset of all possible embodiments, but it is understood that "some embodiments" may be the same subset or a different subset of all possible embodiments, and Can be combined with each other without conflict.

[0037] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field to which this application belongs. The terms used herein are only for the purpose of describing the embodiments of the present application, and are not intended to limit the present application.

[0038] Before further describing the embodiments of the present application in detail, the nouns and terms involved in the embodiments of the present application are described, and the nouns and terms involved in the embodiments of the present application are applicable to the following explanations.

[0039] boot.img is a fil...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a firmware tamper-proofing method and device based on an Android system, and relates to the security technology, and the method comprises the following steps: reading a publickey from a CPU efuse; obtaining a signature of the boot.img file; obtaining a private key from the boot.img file according to the signature of the boot.img file; carrying out secret key matching on the public key and the private key, and reading an integrity check value of a preset file in the system. Im.img file from the boot. Img file under the condition that the secret key matching is successful; and performing integrity check on a preset file in the system. Img file according to the integrity check value, and starting the system under the condition that the integrity check is successful. According to the invention, the system firmware can be effectively prevented from being illegally tampered, and the user information security is ensured.

Description

technical field [0001] The invention relates to system security technology, in particular to a firmware tamper-proof method and device based on an Android system. Background technique [0002] Android system firmware is easily available on the Internet, and it is often cracked and tampered with by people with ulterior motives, thereby affecting the interests of users, manufacturers, and other parties. [0003] The Internet is becoming more and more developed, and a lot of information can be obtained from it. When the security technology was not perfect in the early days, it was frequently seen that the Android system firmware of some manufacturers was cracked and modified by netizens, and all the applications bound to the firmware were deleted and replaced with other applications. , the reason is that in related technologies, only simple protection measures are taken for boot.img. Contents of the invention [0004] In view of this, in order to solve at least one of the ab...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/64
CPCG06F21/572G06F21/64
Inventor 谭攻坚唐杰宏陈贺荣
Owner 微讯智造(广州)电子有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products