CN104778424B - The method that ROM brush machines are prevented based on intelligent television - Google Patents
The method that ROM brush machines are prevented based on intelligent television Download PDFInfo
- Publication number
- CN104778424B CN104778424B CN201510131457.0A CN201510131457A CN104778424B CN 104778424 B CN104778424 B CN 104778424B CN 201510131457 A CN201510131457 A CN 201510131457A CN 104778424 B CN104778424 B CN 104778424B
- Authority
- CN
- China
- Prior art keywords
- key
- intelligent television
- loader
- rom
- public key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Stored Programmes (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to embedded software technology field there is provided a kind of method that ROM brush machines are prevented based on intelligent television, to solve because the problem of mistake and hardware damage occurs in intelligent television system caused by the autonomous brush machine of user, this method includes:Generate the key of each startup stage of intelligent television system;When the system of intelligent television starts, Pre loader modules are verified;Verify Loader modules and external storage equipment of upgrading;Verify U boot modules.Technical scheme proposed by the present invention sets the key of each starting step according to the Booting sequence of intelligent television system, and the key of generation is write into upgrade file, can effectively limit the operation of brush-making machine program.
Description
Technical field
It is more particularly to a kind of that the side of ROM brush machines is prevented based on intelligent television the present invention relates to embedded software technology field
Method.
Background technology
At present, for many users, the enjoyment of android system will be far longer than other systems, because in Android
Various application software can be not only operated in system, while also many firmwares can be selected, such as it is more famous
CyanogenMod (CM) series and MIUI, these firmwares have carried out largely changing at many aspects to Android native systems
Make, allow mobile phone, TV to be more suitable for the use habit of people, add operation enjoyment.Needed using these firmwares by brush machine
Can brush machine be independently the maximum characteristic of android system to realize, but for intelligent television, due to each producer
Between hardware it is widely different, or even hardware used in the different model of same manufacturer is all not quite similar, and different hardware needs
Different hardware drivings and different ROM customizations, finally be presented to user is the android system of a depth customization, such as
Fruit is now left the autonomous brush machine of user, it may appear that some are difficult to the mistake saved, meanwhile, user is autonomous, and brush chance causes a certain factory
The intelligent television product of family is maliciously brushed into the product of other producers, causes the loss for generating producer's hardware resource.
The content of the invention
【The technical problem to be solved】
It is an object of the invention to provide a kind of method that ROM brush machines are prevented based on intelligent television, to solve because of user certainly
The problem of there is mistake and hardware damage in intelligent television system caused by main brush machine.
【Technical scheme】
The present invention is achieved by the following technical solutions.
The present invention relates to a kind of method for preventing ROM brush machines in intelligent television, it includes:
Step A:First key, the second key, the 3rd key are generated, the public key of first key is preserved to Secure IC
IC ROM and using first key private key encryption Pre-loader data, the public key of the second key is preserved to Pre-
Loader modules and the private key encryption Loader data for using the second key, the public key of the 3rd key is preserved to Loader modules
And the private key encryption U-boot data of the 3rd key of use, the public key of the 3rd key is preserved to U-boot modules and use the 3rd
The private key encryption Kernel data of key;
Step B:When the system of intelligent television starts, obtain and be stored in public key in IC ROM and for encrypting Pre-
The private key of loader data, Pre-loader is encrypted by the public key being stored in IC ROM that gets to being used for of getting
The private key of data is verified, and next step is performed if verifying successfully, otherwise exits this method flow;
Step C:The public key that acquisition is stored in Pre-loader modules and the private key for encrypting Loader data, pass through
The public key being stored in Pre-loader modules got carries out school to the private key for being used to encrypt Loader data got
Test, next step is performed if verifying successfully, otherwise exit this method flow;
Step D:The public key that acquisition is stored in Loader modules and the private key for encrypting U-boot data, pass through and obtain
To the public key being stored in Loader modules the private keys of U-boot data encrypted to being used for of getting verified, if school
Test successfully that then system starts successfully, otherwise exit this method flow.
As a preferred embodiment, the step C also includes:
The external storage equipment being connected with intelligent television is detected, the root of external storage equipment is traveled through and searches for upgrading text
Part, performs next step if upgrade file is searched, and otherwise exits upgrading;
Judge whether only to search a upgrade file, if it is read upgrade file in private key and by the private key with depositing
The public key being stored in Pre-loader modules is verified, and upgrade file is write into intelligent television if verifying successfully
Flash storage, otherwise exits upgrading;
The public key and the private key of flash storage that will be stored in Pre-loader modules are verified, if verified into
Work(then starts upgrading, otherwise exits upgrading.
As another preferred embodiment, the external storage equipment is USB flash disk and SD card.
As another preferred embodiment, the step C is specifically write upgrade file using FlashTool instruments
The flash storage of intelligent television.
It is specific close using the generation first of RSA key Core Generator in the step A as another preferred embodiment
Key, the second key and the 3rd key.
As another preferred embodiment, specifically used RSA Algorithm carries out the school of private key and public key in the step A
Test.
【Beneficial effect】
Technical scheme proposed by the present invention has the advantages that:
(1) present invention is according to the Booting sequence of intelligent television system, sets the key of each starting step, and by generation
Key writes upgrade file, can effectively limit the operation of brush-making machine program;
(2) present invention limits brush machine journey in terms of the two from the programming of flash storage, the upgrading of external storage equipment
The operation of sequence.
Brief description of the drawings
Fig. 1 prevents the method flow diagram of ROM brush machines based on intelligent television for what embodiments of the invention were provided.
Embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing, to the specific of the present invention
Embodiment carries out clear, complete description, it is clear that described embodiment is a part of embodiment of the present invention, rather than
Whole embodiments, nor limitation of the present invention.Based on embodiments of the invention, those of ordinary skill in the art are not paying
The every other embodiment obtained under the premise of creative work, belongs to protection scope of the present invention.
Fig. 1 prevents the method flow diagram of ROM brush machines based on intelligent television to be provided in an embodiment of the present invention.As shown in figure 1,
The method comprising the steps of S11 to step S14, each step is described in detail separately below.
Step S11:Generate the key of each startup stage of intelligent television system.
Specifically, the Booting sequence of intelligent television system is successively according to IC ROM, Pre-loader module, Loader moulds
Block, the order of U-boot modules are performed, therefore step S1 includes generation first key, the second key, the 3rd key, by the
The public key of one key is preserved to Secure IC IC ROM and using the private key encryption Pre-loader data of first key, will
The public key of second key is preserved to Pre-loader modules and using the private key encryption Loader data of the second key, close by the 3rd
The public key of key preserves to Loader modules and using the private key encryption U-boot data of the 3rd key, the public key of the 3rd key is protected
Deposit to U-boot modules and using the private key encryption Kernel data of the 3rd key.It is to be appreciated that the present embodiment uses RSA key
Core Generator generation first key, the second key and the 3rd key, in addition, Secure IC effect is that the chip internal has
One piece can operation program IC ROM, system program runs from here on first.
Step S12:When the system of intelligent television starts, Pre-loader modules are verified by IC ROM.
When the system of intelligent television starts, the public key that is stored in IC ROM is obtained and for encrypting Pre-loader numbers
According to private key, the private for being used to encrypt Pre-loader data by the public key being stored in IC ROM that gets to getting
Key is verified, and is performed step S13 if verifying successfully, is otherwise exited this method flow, i.e., in the case where verifying failure,
System starts failure.Explanation is additionally needed, in the present embodiment, the verification of private key and public key is carried out using RSA Algorithm.
Step S13:Loader modules and external storage equipment of upgrading are verified by Pre-loader modules.
Verification Pre-loader modules mainly include:Obtain and be stored in public key in Pre-loader modules and for encrypting
The private key of Loader data, is encrypted by the public key being stored in Pre-loader modules that gets to being used for of getting
The private key of Loader data is verified, and is performed step S14 if verifying successfully, is otherwise exited this method flow, i.e., in school
In the case of testing failure, system starts failure.
Upgrading external storage equipment mainly includes:
The external storage equipment being connected with intelligent television is detected first, is traveled through the root of external storage equipment and is searched for liter
Level file, next step is performed if upgrade file is searched, upgrading is otherwise exited;
Then judge whether only to search a upgrade file, if it is read in upgrade file private key and by the private key
Verified with the public key that is stored in Pre-loader modules, upgrade file is write into intelligent television if verifying successfully
Flash storage, otherwise exits upgrading, it is necessary to illustrate, upgrade file is write intelligence by the present embodiment using FlashTool instruments
The flash storage of TV;
The public key and the private key of flash storage that finally will be stored in Pre-loader modules are verified, if school
Test and successfully then start upgrading, otherwise exit upgrading.It is to be appreciated that in the present embodiment, external storage equipment includes USB storage device
And SD card.
Step S14:U-boot modules are verified by Loader modules.
The public key that acquisition is stored in Loader modules and the private key for encrypting U-boot data, pass through depositing for getting
The public key being stored in Loader modules is verified to the private key for being used to encrypt U-boot data got, if verified successfully
Then the system of intelligent television starts successfully, and otherwise system starts failure.
As can be seen from the above embodiments, the embodiment of the present invention sets each according to the Booting sequence of intelligent television system
The key of starting step, and the key of generation is write into upgrade file, it can effectively limit the operation of brush-making machine program;In addition, this
Inventive embodiments limit the fortune of brush machine program in terms of the two from the programming of flash storage, the upgrading of external storage equipment
OK.
Claims (6)
1. a kind of method that ROM brush machines are prevented based on intelligent television, it is characterised in that including:
Step A:First key, the second key, the 3rd key are generated, the public key of first key is preserved to Secure IC IC
ROM and the private key encryption Pre-loader data for using first key, the public key of the second key is preserved to Pre-loader moulds
Block and using the private key encryption Loader data of the second key, the public key of the 3rd key is preserved to Loader modules and the is used
The private key encryption U-boot data of three keys, the public key of the 3rd key is preserved to U-boot modules and using the private of the 3rd key
Key encrypts Kernel data,
Wherein, the Secure IC be have inside it one piece can operation program IC ROM chip, system program is first from institute
The IC ROM for stating Secure IC bring into operation here;
Step B:When the system of intelligent television starts, obtain and be stored in public key in IC ROM and for encrypting Pre-loader
The private key of data, Pre-loader data are encrypted by the public key being stored in IC ROM that gets to being used for of getting
Private key is verified, and next step is performed if verifying successfully, otherwise exits this method flow;
Step C:The public key that acquisition is stored in Pre-loader modules and the private key for encrypting Loader data, pass through and obtain
To the public key being stored in Pre-loader modules the private keys of Loader data encrypted to being used for of getting verified, such as
Fruit, which verifies, successfully then performs next step, otherwise exits this method flow;
Step D:The public key that acquisition is stored in Loader modules and the private key for encrypting U-boot data, pass through what is got
The public key being stored in Loader modules is verified to the private key for being used to encrypt U-boot data got, if verified into
Then system starts successfully work(, otherwise exits this method flow.
2. the method according to claim 1 that ROM brush machines are prevented based on intelligent television, it is characterised in that the step C is also
Including:
The external storage equipment being connected with intelligent television is detected, the root of external storage equipment is traveled through and searches for upgrade file,
Next step is performed if upgrade file is searched, upgrading is otherwise exited;
Judge whether only to search a upgrade file, if it is read upgrade file in private key and by the private key with being stored in
Public key in Pre-loader modules is verified, and the Flash that upgrade file is write into intelligent television if verifying successfully is deposited
Reservoir, otherwise exits upgrading;
The public key and the private key of flash storage that will be stored in Pre-loader modules are verified, if verifying successfully
Start upgrading, otherwise exit upgrading.
3. the method according to claim 2 that ROM brush machines are prevented based on intelligent television, it is characterised in that the external storage
Equipment is USB flash disk and SD card.
4. the method according to claim 2 that ROM brush machines are prevented based on intelligent television, it is characterised in that in the step C
The specific flash storage that upgrade file is write to intelligent television using FlashTool instruments.
5. the method according to claim 1 that ROM brush machines are prevented based on intelligent television, it is characterised in that in the step A
It is specific that first key, the second key and the 3rd key are generated using RSA key Core Generator.
6. the method according to claim 1 that ROM brush machines are prevented based on intelligent television, it is characterised in that in the step A
Specifically used RSA Algorithm carries out the verification of private key and public key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510131457.0A CN104778424B (en) | 2015-03-24 | 2015-03-24 | The method that ROM brush machines are prevented based on intelligent television |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510131457.0A CN104778424B (en) | 2015-03-24 | 2015-03-24 | The method that ROM brush machines are prevented based on intelligent television |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104778424A CN104778424A (en) | 2015-07-15 |
CN104778424B true CN104778424B (en) | 2017-10-27 |
Family
ID=53619879
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510131457.0A Active CN104778424B (en) | 2015-03-24 | 2015-03-24 | The method that ROM brush machines are prevented based on intelligent television |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104778424B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105096184B (en) * | 2015-08-28 | 2019-02-12 | 四川长虹电器股份有限公司 | The method of smart television high security level payment |
CN106384053A (en) * | 2016-09-14 | 2017-02-08 | 江苏北弓智能科技有限公司 | Trusted boot method and apparatus for mobile operation system |
CN107341003B (en) * | 2017-06-15 | 2020-08-07 | 百富计算机技术(深圳)有限公司 | Customization system implementing method, computer device and storage medium |
CN112995768A (en) * | 2019-12-17 | 2021-06-18 | 青岛海尔多媒体有限公司 | Television upgrade control method and device and television |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101009764A (en) * | 2006-01-27 | 2007-08-01 | 中国科学院声学研究所 | A network upgrade method of the TFTP-based IPTV STB software |
CN102104749A (en) * | 2009-12-22 | 2011-06-22 | 康佳集团股份有限公司 | System and method for upgrading television |
CN103888835A (en) * | 2014-04-17 | 2014-06-25 | 江苏银河电子股份有限公司 | Safety certification method of intelligent set top box |
CN104123505A (en) * | 2014-07-24 | 2014-10-29 | 丹阳市广播电视台 | Android intelligent device anti-getroot system and calibration method thereof |
CN104200153A (en) * | 2014-09-12 | 2014-12-10 | 北京赛科世纪数码科技有限公司 | Start verification method and system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8782367B2 (en) * | 2006-12-20 | 2014-07-15 | Stmicroelectronics S.A. | Memory area protection circuit |
-
2015
- 2015-03-24 CN CN201510131457.0A patent/CN104778424B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101009764A (en) * | 2006-01-27 | 2007-08-01 | 中国科学院声学研究所 | A network upgrade method of the TFTP-based IPTV STB software |
CN102104749A (en) * | 2009-12-22 | 2011-06-22 | 康佳集团股份有限公司 | System and method for upgrading television |
CN103888835A (en) * | 2014-04-17 | 2014-06-25 | 江苏银河电子股份有限公司 | Safety certification method of intelligent set top box |
CN104123505A (en) * | 2014-07-24 | 2014-10-29 | 丹阳市广播电视台 | Android intelligent device anti-getroot system and calibration method thereof |
CN104200153A (en) * | 2014-09-12 | 2014-12-10 | 北京赛科世纪数码科技有限公司 | Start verification method and system |
Also Published As
Publication number | Publication date |
---|---|
CN104778424A (en) | 2015-07-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10091000B2 (en) | Techniques for distributing secret shares | |
US9705678B1 (en) | Fast CAN message authentication for vehicular systems | |
CN104778424B (en) | The method that ROM brush machines are prevented based on intelligent television | |
CN109214168A (en) | Firmware upgrade method and device | |
US20150095652A1 (en) | Encryption and decryption processing method, apparatus, and device | |
CN104935429A (en) | Data processing method and system employing multi-encryption technology | |
CN101964789B (en) | Method and system for safely accessing protected resources | |
US9008304B2 (en) | Content protection key management | |
US20120179915A1 (en) | System and method for full disk encryption authentication | |
CN107220547A (en) | Terminal device and its startup method | |
CN111049897B (en) | Method, device, equipment and medium for encrypted uploading and decrypted deployment of small program package | |
CN107077567A (en) | Identify the secure border on computing device | |
CN108055585A (en) | Data processing method, set top box upgrading method, terminal and set-top box | |
CN108270561A (en) | Data transmission method for uplink and device, the generation method of cipher key index and device | |
CN104462882A (en) | Software protection method, hardware encryption equipment and software protection system comprising hardware encryption equipment | |
CN109446757A (en) | A method of for general MCU programmed protection | |
CN104023009B (en) | A kind of Web system license validation method | |
CN105512520B (en) | Anti-cloning vehicle-mounted system and working method thereof | |
CN107818272A (en) | Hard disk secure starts and hard disk binding method, device and industrial computer | |
CN102033820A (en) | Flash memory device and network authentication method thereof | |
CN105812877A (en) | Set-top box starting method and system based on Chip ID | |
CN109075974B (en) | Binding authentication method of fingerprint algorithm library and fingerprint sensor and fingerprint identification system | |
CN102983969A (en) | Security login system and security login method for operating system | |
US20160119334A1 (en) | Establishment of communication connection between mobile device and secure element | |
CN104504309A (en) | Data encryption method and terminal for application program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
EXSB | Decision made by sipo to initiate substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |