CN101222698A - IMEI code protection method based on hardware sequence number - Google Patents
IMEI code protection method based on hardware sequence number Download PDFInfo
- Publication number
- CN101222698A CN101222698A CNA2007100364050A CN200710036405A CN101222698A CN 101222698 A CN101222698 A CN 101222698A CN A2007100364050 A CNA2007100364050 A CN A2007100364050A CN 200710036405 A CN200710036405 A CN 200710036405A CN 101222698 A CN101222698 A CN 101222698A
- Authority
- CN
- China
- Prior art keywords
- imei
- value
- checkid
- cid
- sequence number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a hardware serial number based IMEI code protection method, wherein the method realizes the verification of the IMEI code by using a flash for storing the IMEI code and a baseband chip in which an unique hardware serial number(CID) is recorded; a verification value(CheckID) which reflects the information of the IMEI and the CID by the related algorithm is also stored in the flash or the baseband chip; the particular verification steps are that: (1) two of the CID value, the IMEI value and the CheckID value are randomly read out; (2) based on the two values read out in the step(1), the other CID' value or IMEI' value or CheckID' value is obtained by the related algorithm; (3) the CID' value or IMEI' value or CheckID' value is compared with the stored CID value or IMEI value or CheckID value, if the values are equal, a machine can be normally started; if the values are different, an alarm is given; by verifying the IMEI code of the mobile terminal, the invention has the advantages of resolving the problems that the IMEI code is freely revised at present and the certification of the mobile terminal is invalid due to the free revision of the IMEI code.
Description
Technical field
(International MobileEquipment Identity, be called for short: guard method IMEI) relates in particular to a kind of method of utilizing hardware sequence number in the baseband chip to protect the IMEI sign indicating number to the present invention relates to international mobile equipment identification number in the portable terminal.
Background technology
IMEI is the global unique identification number of mobile device, is made up of 15 bit digital.The user can be by being presented at it on screen at inputting combination key on the portable terminal " * #06# ".IMEI sign indicating number topmost purpose at the beginning of design is to guarantee that the mobile station equipment that uses in the system is not that usurp or illegal.The user also can judge whether the portable terminal of being bought is that former factory produces by the IMEI sign indicating number.
But reasons such as portable terminal production technology and production procedure, the form that the IMEI sign indicating number can not be taked to fix is recorded in the inside of chip, but utilizes software to be stored in flash memory (FLASH) zone of portable terminal.Because the storage mode of flash memory utilizes professional software just can easily it be rewritten, and the IMEI sign indicating number has just lost the effect of differentiating its legitimacy through the portable terminal of rewriting.Even some portable terminal reaches the purpose that the deception network obtains illegal identity or function by rewriting the IMEI sign indicating number.
Therefore, the method for existing mobile terminal stores IMEI sign indicating number can not provide the protection to the IMEI sign indicating number, can't limit the use of illegal portable terminal, does not have antitheft ability.
Summary of the invention
The object of the present invention is to provide a kind of IMEI code protection method based on hardware sequence number; mainly solve existing technical problem in the above-mentioned prior art; it takes the verification measure by the IMEI sign indicating number to portable terminal; solve the situation that the current IMEI sign indicating number is arbitrarily rewritten, and the situation of the mobile terminal device that therefore causes authentication inefficacy.
For addressing the above problem, the present invention is achieved in that
A kind of IMEI code protection method based on hardware sequence number is characterized in that: the utilization of this method deposit the flash memory of IMEI sign indicating number and internal record have the unique hardware sequence number (Chip ID, be called for short: baseband chip CID) is realized the checking of IMEI sign indicating number; Also store check value CheckID in this flash memory or the baseband chip, CheckID is a numerical value that has reflected IMEI and CID information by related algorithm; Concrete verification step is:
A reads any two in CID, IMEI, the CheckID value;
Two numerical value that read in the B utilization steps A obtain another CID ' or IMEI ' or CheckID ' value by related operation;
C makes comparisons the CID of CID ' or IMEI ' or CheckID ' value and storage or IMEI or CheckID value; If equate, then normal boot-strap; If unequal, then alarm.
Described IMEI code protection method based on hardware sequence number is characterized in that: the generation step D of this check value CheckID comprises:
D1 reads the IMEI value in the flash memory;
D2 reads the CID value in the baseband chip;
D3 carries out XOR with CID and IMEI, obtains check value CheckID;
D4 is stored in CheckID one kind disposable programmable data (One-Time-Programmable, the abbreviation: OTP) zone of baseband chip inside.
Described IMEI code protection method based on hardware sequence number is characterized in that: adopt interpolative operation among the said step D3.
Described IMEI code protection method based on hardware sequence number, it is characterized in that: CheckID is stored in the flash chip among the said step D4.
Described IMEI code protection method based on hardware sequence number is characterized in that: judge whether to carry out step D during mobile terminal-opening, if, then carry out A-C, otherwise, execution in step D.
By technique scheme, the invention has the beneficial effects as follows:
The inventive method is bound the IMEI value in itself and the flash memory based on the CID in the baseband chip; when mobile terminal-opening, it is carried out verification; thereby reach the purpose of protection IMEI value; solved the situation that the current IMEI sign indicating number is arbitrarily rewritten, and the situation of the mobile terminal device that therefore causes authentication inefficacy.
Description of drawings
Fig. 1 is the schematic flow sheet of the inventive method embodiment 1.
Fig. 2 is the schematic flow sheet of the inventive method embodiment 2.
Fig. 3 is the schematic flow sheet of the inventive method embodiment 3.
Embodiment
The invention provides a kind of IMEI code protection method based on hardware sequence number, this method mainly uses the flash memory of portable terminal inside and baseband chip to realize.Flash memory is responsible for depositing main software and the every terminal parameter information that portable terminal moves, comprising the IMEI sign indicating number of portable terminal.Baseband chip is the processor of executive utility, and the baseband chip internal record has the unique hardware sequence number (CID, Chip ID) of chip.The CID that the present invention is based in the baseband chip binds the IMEI value in itself and the flash memory, when mobile terminal-opening it is carried out verification, thereby reaches the purpose of protection IMEI value.
See also Fig. 1, it is the schematic flow sheet of the inventive method embodiment 1.As shown in the figure: at first, portable terminal need judge whether to have carried out the initialization of IMEI when system start-up, if do not carry out initialization, then carries out initialization procedure.This initialization procedure mainly calculates and preserves the check value that is generated by IMEI and CID.Initialized detailed process is as follows:
1, reads IMEI value in the flash memory;
2, read CID value in the baseband chip;
3, CID and IMEI are carried out XOR, obtain check value CheckID;
4, CheckID is stored in the OTP zone of chip internal.
OTP is the abbreviation of One-Time-Programmable, and it is the kind disposable programmable data zone in the chip, and in a single day data write, and just can not change.
If system through the initialization procedure of IMEI, then directly enters the proof procedure of IMEI, to confirm whether the IMEI value that writes down in the flash memory is illegally rewritten, and the concrete steps of checking are as follows:
1, reads CID and CheckID in the baseband chip;
2, CheckID and CID are carried out obtaining IMEI behind the XOR;
3, read IMEI ' in the flash memory;
4, IMEI and IMEI ' are compared, both consistent steps 5 that enter, otherwise enter step 6;
5, system's normal boot-strap;
6, ALM.
The generative process of step 110 among Fig. 1~113 expression CheckID; The proof procedure of step 120~123 expression IMEI.F in the step 112 and 122 and F
-1Represent a pair of reciprocal mathematical operation, its simplest implementation is an XOR.In the 2nd step that IMEI and CID bind, the generating mode of check value CheckID is not limited to XOR, can also adopt other mathematical operation method, as interpolation etc.In addition, can also do encryption to strengthen its fail safe to the numerical value that generates.In a word, check value CheckID is a numerical value that has reflected IMEI and CID information.
The mode of preserving CheckID among Fig. 1 can also be kept in the flash chip except utilizing of introducing above OTP is recorded in the baseband chip.But this preserving type is modified easily, not as the former safety.
See also Fig. 2, it is the schematic flow sheet of the inventive method embodiment 2.As shown in the figure: the process of mobile terminal-opening checking IMEI, except that the step of the foregoing description 1, can also carry out according to following step:
1, reads the CID among the IMEI and baseband chip in the flash memory;
2, IMEI and CID are carried out obtaining CheckID ' behind the XOR;
3, read CheckID;
4, CheckID ' and CheckID are compared, both consistent steps 5 that enter, otherwise enter step 6;
5, system's normal boot-strap;
6, ALM.
See also Fig. 3, it is the schematic flow sheet of the inventive method embodiment 3.As shown in the figure: the process of mobile terminal-opening checking IMEI, except that the step of the foregoing description 1, can also carry out according to following step:
1, reads IMEI and CheckID in the flash memory;
2, CheckID and IMEI are carried out obtaining CID ' behind the XOR;
3, read CID in the chip;
4, CID ' and CID are compared, both consistent steps 5 that enter, otherwise enter step 6;
5, system's normal boot-strap;
6, ALM.
Being preferred embodiment of the present invention only in sum, is not to be used for limiting practical range of the present invention.Be that all equivalences of doing according to the content of the present patent application claim change and modification, all should be technology category of the present invention.
Claims (5)
1. IMEI code protection method based on hardware sequence number is characterized in that: flash memory and internal record that the IMEI sign indicating number is deposited in this method utilization have the baseband chip of unique hardware sequence number CID to realize the checking of IMEI sign indicating number; Also store check value CheckID in this flash memory or the baseband chip, CheckID is a numerical value that has reflected IMEI and CID information by related algorithm; Concrete verification step is:
A reads any two in CID, IMEI, the CheckID value;
Two numerical value that read in the B utilization steps A obtain another CID ' or IMEI ' or CheckID ' value by related operation;
C compares the CID of CID ' or IMEI ' or CheckID ' value and storage or IMEI or CheckID value; If equate, then normal boot-strap; If unequal, then alarm.
2. the IMEI code protection method based on hardware sequence number according to claim 1 is characterized in that: the generation step D of this check value CheckID comprises:
D1 reads the IMEI value in the flash memory;
D2 reads the CID value in the baseband chip;
D3 carries out XOR with CID and IMEI, obtains check value CheckID;
D4 is stored in CheckID in the OTP zone of baseband chip inside.
3. the IMEI code protection method based on hardware sequence number according to claim 2 is characterized in that: adopt interpolative operation among the said step D3.
4. the IMEI code protection method based on hardware sequence number according to claim 2, it is characterized in that: CheckID is stored in the flash chip among the said step D4.
5. according to claim 2 or 3 or 4 described IMEI code protection methods, it is characterized in that based on hardware sequence number: judge whether to carry out step D during mobile terminal-opening, if, then carry out A-C, otherwise, execution in step D.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2007100364050A CN101222698A (en) | 2007-01-12 | 2007-01-12 | IMEI code protection method based on hardware sequence number |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2007100364050A CN101222698A (en) | 2007-01-12 | 2007-01-12 | IMEI code protection method based on hardware sequence number |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101222698A true CN101222698A (en) | 2008-07-16 |
Family
ID=39632227
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2007100364050A Pending CN101222698A (en) | 2007-01-12 | 2007-01-12 | IMEI code protection method based on hardware sequence number |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101222698A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101888442A (en) * | 2010-04-16 | 2010-11-17 | 中兴通讯股份有限公司 | Security management method for mobile terminal and mobile terminal |
WO2012092727A1 (en) * | 2011-01-05 | 2012-07-12 | 中兴通讯股份有限公司 | Method, device and system for locking card in the mobile terminal |
CN102902899A (en) * | 2012-09-04 | 2013-01-30 | 惠州三华工业有限公司 | Microchip software protection method |
CN103298158A (en) * | 2012-02-28 | 2013-09-11 | 芯讯通无线科技(上海)有限公司 | Communication module and control method thereof |
CN104270436A (en) * | 2014-09-25 | 2015-01-07 | 深圳市财富之舟科技有限公司 | Method for checking international mobile equipment identity information |
CN104572015A (en) * | 2013-10-21 | 2015-04-29 | 北京兆易创新科技股份有限公司 | FLASH chip combined with FPGA and instruction processing method |
CN105303097A (en) * | 2014-12-17 | 2016-02-03 | 维沃移动通信有限公司 | Verification method of mobile terminal, mobile terminal and verification system |
CN105812877A (en) * | 2016-03-23 | 2016-07-27 | 福建新大陆通信科技股份有限公司 | Set-top box starting method and system based on Chip ID |
CN107094296A (en) * | 2016-11-09 | 2017-08-25 | 北京小度信息科技有限公司 | device identification method and device |
CN107613493A (en) * | 2017-08-02 | 2018-01-19 | 捷开通讯(深圳)有限公司 | Intelligent terminal and its antitheft method, the device with store function |
CN109982314A (en) * | 2019-02-28 | 2019-07-05 | Oppo广东移动通信有限公司 | Mark code detection method, electronic device, equipment and the storage medium of electronic device |
-
2007
- 2007-01-12 CN CNA2007100364050A patent/CN101222698A/en active Pending
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101888442A (en) * | 2010-04-16 | 2010-11-17 | 中兴通讯股份有限公司 | Security management method for mobile terminal and mobile terminal |
WO2011127697A1 (en) * | 2010-04-16 | 2011-10-20 | 中兴通讯股份有限公司 | Security management method for mobile terminal and mobile terminal thereof |
WO2012092727A1 (en) * | 2011-01-05 | 2012-07-12 | 中兴通讯股份有限公司 | Method, device and system for locking card in the mobile terminal |
CN103298158A (en) * | 2012-02-28 | 2013-09-11 | 芯讯通无线科技(上海)有限公司 | Communication module and control method thereof |
CN102902899A (en) * | 2012-09-04 | 2013-01-30 | 惠州三华工业有限公司 | Microchip software protection method |
CN104572015A (en) * | 2013-10-21 | 2015-04-29 | 北京兆易创新科技股份有限公司 | FLASH chip combined with FPGA and instruction processing method |
CN104572015B (en) * | 2013-10-21 | 2018-08-03 | 北京兆易创新科技股份有限公司 | The FLASH chip and command processing method combined with FPGA |
CN104270436A (en) * | 2014-09-25 | 2015-01-07 | 深圳市财富之舟科技有限公司 | Method for checking international mobile equipment identity information |
CN105303097A (en) * | 2014-12-17 | 2016-02-03 | 维沃移动通信有限公司 | Verification method of mobile terminal, mobile terminal and verification system |
CN105303097B (en) * | 2014-12-17 | 2019-10-15 | 维沃移动通信有限公司 | Verification method, mobile terminal and the verifying system of mobile terminal |
CN105812877A (en) * | 2016-03-23 | 2016-07-27 | 福建新大陆通信科技股份有限公司 | Set-top box starting method and system based on Chip ID |
CN107094296A (en) * | 2016-11-09 | 2017-08-25 | 北京小度信息科技有限公司 | device identification method and device |
CN107613493A (en) * | 2017-08-02 | 2018-01-19 | 捷开通讯(深圳)有限公司 | Intelligent terminal and its antitheft method, the device with store function |
CN109982314A (en) * | 2019-02-28 | 2019-07-05 | Oppo广东移动通信有限公司 | Mark code detection method, electronic device, equipment and the storage medium of electronic device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101222698A (en) | IMEI code protection method based on hardware sequence number | |
CN108880797B (en) | Authentication method of Internet of things equipment and Internet of things equipment | |
CN101231622B (en) | Data storage method and equipment base on flash memory, as well as data fetch method and apparatu | |
CN101379506B (en) | Method and apparatus for securely booting from an external storage device | |
CN103946856B (en) | Encrypting and deciphering processing method, device and equipment | |
AU2013270195B2 (en) | Mobile terminal detection method and mobile terminal | |
CN102624699B (en) | Method and system for protecting data | |
CN102262599B (en) | Trusted root-based portable hard disk fingerprint identification method | |
CN102439897A (en) | Electronic device, key generation program, recording medium, and key generation method | |
CN109522328B (en) | Data processing method and device, medium and terminal thereof | |
CN103366103B (en) | The application program encryption protecting method of card reader | |
CN104200153A (en) | Start verification method and system | |
CN106778283A (en) | A kind of guard method of system partitioning critical data and system | |
CN103530534A (en) | Android program ROOT authorization method based on signature verification | |
CN101950344A (en) | Encryption and decryption methods of embedded software program | |
CN108199827A (en) | Client code integrity checking method, storage medium, electronic equipment and system | |
CN104268458A (en) | Vehicle program encrypting and verifying method and device | |
CN110543768A (en) | method and system for controlling trusted root in BIOS | |
CN104216693B (en) | A kind of method and device that device identification is provided | |
CN101888627B (en) | Mobile terminal and system data protection method thereof | |
CN114266083A (en) | Secure storage method of key in chip | |
CN104268483A (en) | Data protecting system, device and method | |
CN114241631A (en) | Control method and registration method of intelligent door lock and related devices | |
CN102662871A (en) | Trusted cryptography module based system and method for protection of virtual disk completeness | |
CN106203100A (en) | A kind of integrity checking method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Open date: 20080716 |