Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Android system security verification method and verification device thereof

An Android system and verification method technology, applied in the field of technical security, can solve the problems of rapid expansion of the upgrade differential package size, waste of upgrade download traffic resources and speed resources, etc., and achieve the effect of improving system fluency, reducing impact, and ensuring security

Active Publication Date: 2017-08-04
ALLWINNER TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The main reason is that the security verification scheme provided in Google’s native code is an offline verification method in units of binary data, which can ensure the security of the system. However, the disadvantage of this verification method is that the size of the upgrade differential package will expand rapidly, which seriously wastes the upgrade download traffic. Resources and Velocity Resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android system security verification method and verification device thereof
  • Android system security verification method and verification device thereof
  • Android system security verification method and verification device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Android system security verification method embodiment:

[0024] refer to figure 1 , figure 1 is a flowchart of the steps of generating the hash value list of the original system file. The original system file hash value list generation step includes, first execute step S111, read all files in the firmware, then execute step S112, read the file names and path addresses of all files in the firmware, and then execute step S113, according to the file name pair Files are sorted and a list of original system filenames is produced with filename key information.

[0025] Then execute step S114, read the RSA key pair, then execute step S115, use the RSA private key to encrypt the original system file list and generate the digital signature of the original system file list. Then execute step S116, read the file name, path and file content of all files in the firmware, then execute step S117, calculate the hash value according to the file name, path and file content of each fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an Android system security verification method used on a terminal and a verification device thereof. According to the Android system security verification method, an original system file Hash list is stored in the terminal; the Android system security verification method comprises file Hash verification; particularly, file Hash verification comprises the following steps: reading a system film of an Android system, checking whether the system film is stored under a system directory of the Android system, finding out a corresponding original Hash value in the Hash value list according to the system file, calculating the current Hash value of the system file, judging whether the original Hash value is equal to the current Hash value, and if the original Hash value is equal to the current Hash value, feeding back the system file, thereby successfully completing the security verification. As the original Hash value is written into the terminal and is used as verification data, the Android system is verified in an offline verification mode, the verification on system security is achieved with the smallest power consumption, the smoothness and the security of the system are also improved, and the inconvenience in upgrading verification is avoided.

Description

technical field [0001] The invention relates to the technical security field, in particular to an Android system security verification method and a verification device thereof. Background technique [0002] With the emergence of more and more viruses and illegal programs on the Android system, the security of Android devices is seriously threatened. Therefore, Android devices have an increasing need for security performance, and Android systems are required to perform security verification when starting, that is, to verify whether their system files have been maliciously tampered with. The current verification method for starting the Android system cannot solve the contradiction between security performance and fluency of use. Some solutions can guarantee security verification, but affect the smoothness of Android use or other functions. Although some solutions do not affect the fluency of using the Android system, the security performance is easily affected. [0003] At ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56G06F21/57
CPCG06F21/51G06F21/57G06F2221/033
Inventor 陈勇
Owner ALLWINNER TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products