Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Application software calling method for intelligent terminal

A technology of application software and intelligent terminal, applied in program control design, instrument, electrical digital data processing, etc., can solve the possibility of being easily attacked by hackers, the security of sensitive data cannot be guaranteed, and the possibility of stealing private data and important information Large and other problems, to achieve the effect that is not easy to attack

Active Publication Date: 2016-02-24
SHENZHEN JIUZHOU ELECTRIC
View PDF6 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The present invention aims to solve the problems that the security level of the application software call on the intelligent terminal is low, the possibility of stealing private data and important information is high, the security of sensitive data cannot be guaranteed, and it is easy to be attacked by hackers. Terminal application software call method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application software calling method for intelligent terminal
  • Application software calling method for intelligent terminal
  • Application software calling method for intelligent terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] see figure 1 , is a schematic diagram of an application software calling method of a smart terminal provided in Embodiment 1 of the present invention.

[0030] Such as figure 1 As shown, an application software calling method includes:

[0031] 101 Step 1: When the system is powered on, read the secret key 0 pre-stored in the Flash;

[0032] 102 Step 2: Use the secret key 0 to verify the Boot, if the verification is passed, start the Boot, and go to step 3;

[0033] 103 Step 3: Read secret key 1 from Boot, and use secret key 1 to verify the file system to be loaded, if the verification is passed, start the file system, and go to step 4;

[0034] 104 Step 4: Read the secret key 2 pre-stored in the Flash, use the secret key 2 to verify the application software to be loaded, and start the application software after the verification is passed.

[0035] The secret key 0 and the secret key 2 are decryption keys and are pre-stored in Flash, and the secret key 1 is a signat...

Embodiment 2

[0038] see figure 2 , is a schematic diagram of a method for starting an application software of a smart terminal according to Embodiment 2 of the present invention.

[0039] Such as figure 2 As shown, a smart terminal application software calling method includes:

[0040] 201 Step 1: When the system is powered on, read the secret key 0 pre-stored in the Flash;

[0041] 202 step 2: use the secret key 0 to verify the Boot, if the verification is passed, start the Boot, and go to step 3;

[0042] 203 Step 3: Read secret key 1 from Boot, and use secret key 1 to verify the file system to be loaded, if the verification passes, start the file system, and go to step 4;

[0043] 204 Step 4: Read the secret key 2 pre-stored in the Flash, use the secret key 2 to verify the application software to be loaded, and start the application software after the verification is passed.

[0044] Further, step 3 of 203: read the secret key 1 from the Boot, and use the secret key 1 to verify th...

Embodiment 3

[0055] see image 3 , is a schematic diagram of a method for starting and / or upgrading application software of a smart terminal according to Embodiment 3 of the present invention.

[0056] Such as image 3 As shown, a smart terminal application software calling method includes the following steps:

[0057] 301 Step 1: When the system is powered on, read the secret key 0 pre-stored in the Flash;

[0058] 302 step 2: use the secret key 0 to verify the Boot, if the verification is passed, start the Boot, and go to step 3;

[0059] 303 Step 3: Read secret key 1 from Boot, and use secret key 1 to verify the file system to be loaded, if the verification passes, start the file system, and go to step 4;

[0060] 304 Step 4: Read the secret key 2 pre-stored in the Flash, use the secret key 2 to verify the application software to be loaded, and start the application software after the verification is passed.

[0061] Further, step 3 of 303: read the secret key 1 from the Boot, and u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the field of safety of intelligent terminals and particularly relates to an application software calling method for an intelligent terminal. The application software calling method comprises the following steps: powering up a system, and reading a key 0 in a Flash; verifying a Boot by adopting the key 0, and after verification is passed, starting the Boot; reading a key 1 in the Boot, verifying a loaded file system, and after verification is passed, starting the file system; and reading a key 2 in the Flash, verifying loaded application software, and after verification is passed, starting the application software. According to the application software calling method for the intelligent terminal, which is provided by the present invention, in the starting and / or upgrading process of the intelligent terminal, authorized legal software can be correctly operated or an authorized program can be reloaded, and the intelligent terminal is difficult to be attacked by Hackers.

Description

【Technical field】 [0001] The present invention relates to the security field of intelligent terminals, in particular to a method for invoking application software of intelligent terminals. 【Background technique】 [0002] The security level of the original smart terminal without security hardening is low, especially after the addition of network functions, the security of smart terminals has increasingly become a major problem in network applications. How to construct a system that meets the design requirements, how to achieve kernel security and auditing is a key sex issue. The security level of the operating system of the smart terminal is low, and the corresponding security enhancement software is not abundant. At present, the common security hazards for smart terminals are as follows: [0003] 1. On smart terminals, illegal and unauthorized software that cannot be deleted is forced to be installed; user information is collected in the background for profit; bad informat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/445G06F21/51G06F21/60G06F21/64
CPCG06F9/44505G06F21/51G06F21/602G06F21/64
Inventor 丘裕嘉
Owner SHENZHEN JIUZHOU ELECTRIC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products