A method, device and terminal for securely starting a terminal

A technology for secure startup and terminal, applied in the electronic field, can solve the problems affecting terminal information security, malicious tampering of system files, etc., and achieve the effect of reducing the possibility of implanting malicious code, increasing user confidence, and increasing security.

Active Publication Date: 2017-12-12
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention provides a secure startup method, device and terminal for a terminal, which solves the problem in the prior art that the system files of the terminal may be maliciously tampered with during the startup process of the terminal, which affects the security of terminal information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, device and terminal for securely starting a terminal
  • A method, device and terminal for securely starting a terminal
  • A method, device and terminal for securely starting a terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] figure 1 It is a flowchart of a method for securely booting a terminal provided in Embodiment 1 of the present invention, which is composed of figure 1 As shown, in this embodiment, the terminal security startup method provided by the present invention includes:

[0036] S101: After the terminal is powered on, enter the process of loading the system file of the terminal;

[0037] The terminals involved in the present invention include: mobile phones, tablet computers, computers or palmtop computers, etc.; when the terminal is powered on, it starts the switch of the terminal; for this step, for example, during the startup process of the Android system, it enters the loading terminal When the system file is used, first load the Rom Soc (chip). There is a ROM (Read Only Memory) memory on the Soc chip. The code in the ROM is solidified in the form of a mask when the chip leaves the factory and cannot be modified; when the system starts, The code in the ROM is mainly respo...

Embodiment 2

[0049] For example, the following describes the method in detail in practical applications, assuming that the terminal is a dual-system mobile phone, and the dual systems are security system and general information respectively; figure 2 It is a flow chart of a terminal secure boot method provided in Embodiment 2 of the present invention, which is composed of figure 2 As shown, in this embodiment, the secure boot method provided by the present invention includes:

[0050] S201: Power on the dual-system mobile phone;

[0051] S202: Load the kernel file of the dual-system mobile phone; for example, in the dual-system mobile phone, the kernel file is a linux kernel file;

[0052] S203: Perform security verification on the loaded kernel file; for example, by performing signature verification on the kernel file;

[0053] S204: Judging whether the kernel file has passed the security verification; if so, turn to S205, if not, then end; for example, when performing signature verif...

Embodiment 3

[0062] image 3 A schematic structural diagram of a terminal security boot device provided in Embodiment 3 of the present invention, which is represented by image 3 As shown, in this embodiment, the terminal security boot device 30 provided by the present invention includes: a file loading module 301, a security verification module 302, a judging module 303, and a system startup module 304; the file loading module 301 is used on the terminal After powering on, enter the process of loading the system file of the terminal; the security verification module 302 is used to perform security verification on the system file loaded by the file loading module 301; the judging module 303 is used to judge the security verification module 302 whether the security verification is passed; the system startup module 304 is configured to complete the loading of the system file and start the system of the terminal if the judging result of the judging module 303 is yes.

[0063] The secure acti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a terminal safety starting method and device and a terminal. The terminal safety starting method comprises the steps that after the terminal is powered on, a process loading a system file of the terminal is started; safety verification is carried out on the system file; whether the system file passes the safety verification is judged; if yes, loading of the system file is finished and the system of the terminal is started. The problem that as a system file of a terminal is likely to be tampered maliciously in the terminal starting process in the prior art, safety of terminal information is affected is solved, the possibility of implanting malicious codes in the terminal is reduced effectively, safety of the terminal is increased, and it is guaranteed that the terminal information does not leak.

Description

technical field [0001] The present invention relates to the field of electronics, in particular to a method, device and terminal for safely starting a terminal. Background technique [0002] With the development of terminal technology, the terminal has more and more functions. For the convenience of operation, users store more and more important information in the terminal. Therefore, the security of terminal information is paid more and more attention by users. In the actual application of the terminal, it is possible to encounter a malicious code implantation event during the terminal startup process, resulting in the leakage of terminal information. In the prior art, the startup process of the terminal specifically includes: after powering on the terminal, loading the system file of the terminal, including: loading the system kernel file of the terminal and the kernel image file of the system, and starting the operating system in the terminal after the loading is complete...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/51
CPCG06F21/51G06F2221/033
Inventor 胡军杰
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products