CN106657551A - Method and system for preventing mobile terminal from being unlocked - Google Patents
Method and system for preventing mobile terminal from being unlocked Download PDFInfo
- Publication number
- CN106657551A CN106657551A CN201611105262.XA CN201611105262A CN106657551A CN 106657551 A CN106657551 A CN 106657551A CN 201611105262 A CN201611105262 A CN 201611105262A CN 106657551 A CN106657551 A CN 106657551A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- print data
- finger print
- internal memory
- brom
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Signal Processing (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a method and system for preventing a mobile terminal from being unlocked. The method comprises the following steps: A, transmitting fingerprint data input by a user in advance to a TEE TA to encrypt the fingerprint data, and then writing the encrypted fingerprint data in a RMPB storage region; B, when needing to be unlocked, receiving the fingerprint data input by the user at present, and acquiring the fingerprint stored in the RPMB storage region, and then decrypting the fingerprint data, comparing the fingerprint data input at present with the decrypted fingerprint data, and then judging whether to unlock according to a comparison result. By use of the method disclosed by the invention, the fingerprint data of the user is encrypted in advance and then written in the RMPB storage region, even though other person picks up the user mobile phone, the user important information cannot be stolen, and the equipment security of the mobile terminal is improved.
Description
Technical field
The present invention relates to terminal security protection field, more particularly to a kind of method and system for preventing mobile terminal from unlocking.
Background technology
With the development of mobile terminal and mobile Internet, fingerprint function is increasingly becoming the standard configuration of each mobile terminal
;Because fingerprint has specific specificity, bring convenience in terms of unblock and payment fast, instead of traditional numerical ciphers defeated
The trouble for entering and insecurity.But current unlocked by fingerprint still suffers from the greater risk that violence nature is cracked, user is set to lose handss
After machine there is the risk being exposed in significant data.
Therefore, prior art has yet to be improved and developed.
The content of the invention
In view of above-mentioned the deficiencies in the prior art, it is an object of the invention to provide a kind of method for preventing mobile terminal from unlocking
And system, it is intended to solve the problems, such as that existing unlocked by fingerprint mode still suffers from the risk of violence unblock after mobile terminal loss.
Technical scheme is as follows:
A kind of method for preventing mobile terminal from unlocking, wherein, including step:
A, the finger print data that user pre-enters is delivered to TEE TA it is encrypted, is then written to RMPB memory areas;
B, when unblock is needed, the finger print data of receive user currently input, and obtain the finger being stored in RPMB memory areas
Stricture of vagina data are simultaneously decrypted, and the finger print data of current input and the finger print data after decryption are compared, according to comparison result
Judge whether unblock.
The described method for preventing mobile terminal from unlocking, wherein, step A is specifically included:
A1, startup typing finger print data;
A2, collection finger print data;
A3, finger print data is delivered to by TEE TA by REE interfaces;
A4, TEE TA is encrypted to finger print data;
A5, the finger print data after encryption is write to RPMB memory areas;
A6, return storage result.
The described method for preventing mobile terminal from unlocking, wherein, step B is specifically included:
Mobile terminal screen is lighted in B1, control;
The finger print data of B2, receive user currently input;
B3, startup fingerprint verification operation;
B4, interact to obtain with TEE TA by REE interfaces and be stored in finger print data in RPMB memory areas;
B5, the finger print data read in RPMB memory areas;
B6, the finger print data in RPMB memory areas is decrypted;
B7, by the finger print data of current input with decrypt after finger print data compare;
B8, return comparison result, and unblock is judged whether according to comparison result.
The described method for preventing mobile terminal from unlocking, wherein, also include before step A:
S, in mobile terminal-opening, the internal memory ID being infused in BROM is compared with the internal memory ID in mobile terminal, if
The two is inconsistent, then control mobile terminal and restart, if the two is consistent, control mobile terminal enters holding state.
The described method for preventing mobile terminal from unlocking, wherein, step S is specifically included:
S1, BROM start;
S2, judge the first inspection mark whether is injected with BROM, the internal memory ID in BROM is read if having, and start prestrain
Program, directly initiates prestrain program if not;
S3, judge mobile terminal whether need check internal memory ID, if desired check then read mobile terminal in internal memory ID, and will
The internal memory ID being infused in BROM compares with the internal memory ID in mobile terminal, if the two is inconsistent, controls mobile terminal
Restart, if the two is consistent, control mobile terminal enters holding state;Mobile terminal is controlled if it need not check and enters standby
State.
The described method for preventing mobile terminal from unlocking, wherein, also include before step S:
T, the internal memory ID for obtaining mobile terminal, the internal memory ID for getting is written in the memory area of BROM, and is locked.
The described method for preventing mobile terminal from unlocking, wherein, step T is specifically included:
T1, mobile terminal is connected by ADB;
T2, the device id for obtaining mobile terminal;
T3, according to device id send read internal memory ID instruction to mobile terminal;
T4, mobile terminal receive and read after the instruction internal memory ID and return;
Order that T5, transmission equipment are restarted simultaneously is transferred to BROM;
T6, BROM map PORT COM;
T7, mapping result is returned;
T8, internal memory ID is written in the memory area of BROM;
T9, return write state.
A kind of system for preventing mobile terminal from unlocking, wherein, including:
Writing module, the finger print data for user to be pre-entered is delivered to TEE TA and is encrypted, and is then written to RMPB
Memory area;
Comparing module, for when unblock is needed, the finger print data of receive user currently input, and obtain and be stored in RPMB storages
Finger print data in region is simultaneously decrypted, by the finger print data of current input with decrypt after finger print data compare, root
Judge whether unblock according to comparison result.
The described system for preventing mobile terminal from unlocking, wherein, also include:
Module is checked, in mobile terminal-opening, by the internal memory ID in the internal memory ID being infused in BROM and mobile terminal
Compare, if the two is inconsistent, control mobile terminal is restarted, if the two is consistent, control mobile terminal enters standby shape
State.
The described system for preventing mobile terminal from unlocking, wherein, also include:
Binding module, for obtaining the internal memory ID of mobile terminal, the internal memory ID for getting is written in the memory area of BROM,
And locked.
Beneficial effect:By the finger print data of user, in advance encryption is then written to RMPB memory areas to the present invention, so i.e.
Make other people find customer mobile terminal, cannot also steal user's important information, improve the device security of mobile terminal.
Description of the drawings
Fig. 1 is a kind of flow chart of the method preferred embodiment for preventing mobile terminal from unlocking of the present invention.
Fig. 2 is the particular flow sheet of step S1 in method shown in Fig. 1.
Fig. 3 is the particular flow sheet of step S2 in method shown in Fig. 1.
Fig. 4 is the particular flow sheet of checking step in the inventive method.
Fig. 5 is the particular flow sheet that step is bound in the inventive method.
Fig. 6 is a kind of structured flowchart of the system preferred embodiment for preventing mobile terminal from unlocking of the present invention.
Specific embodiment
The present invention provides a kind of method and system for preventing mobile terminal from unlocking, to make the purpose of the present invention, technical scheme
And effect is clearer, clear and definite, below the present invention is described in more detail.It should be appreciated that described herein be embodied as
Example is not intended to limit the present invention only to explain the present invention.
Fig. 1 is referred to, Fig. 1 is a kind of flow chart of the method preferred embodiment for preventing mobile terminal from unlocking of the present invention, such as
Shown in figure, it includes step:
S1, the finger print data that user pre-enters is delivered to TEE TA it is encrypted, is then written to RMPB memory areas;
S2, when unblock is needed, the finger print data of receive user currently input, and obtain the finger being stored in RPMB memory areas
Stricture of vagina data are simultaneously decrypted, and the finger print data of current input and the finger print data after decryption are compared, according to comparison result
Judge whether unblock.
The present invention compare it is traditional swipe and numeral, pattern unlocking method, safety is more secure;Meanwhile, finger print data
In being not stored in system, but Choice encryption is stored in RPMB safety zones, even if so that it is guaranteed that mobile terminal lose,
Will not be stolen important information.
Specifically, as shown in Fig. 2 step S1 is specifically included:
S11, startup typing finger print data;
S12, collection finger print data;
S13, finger print data is delivered to by TEE TA by REE interfaces;
S14, TEE TA is encrypted to finger print data;
S15, the finger print data after encryption is write to RPMB memory areas;
S16, return storage result.
During using mobile terminal, needs activate unlocked by fingerprint by arranging to user, and guarantee fingerprint as only
One unlocking manner.First, the operation of typing finger print data is started(Application end), then fingerprint number is gathered by fingerprint sensor
According to finger print data is delivered to REE interfaces the TA under TEE environment at mobile terminal system REE ends(TEE TA), so that TEE
TA completes the encryption of finger print data(Specifically can be encrypted by AES), TA in TEE environment lower-pilot RMPB memory areas, and
By in the finger print data write RMPB memory areas after encryption, most at last result returns to REE ends and notifies that application completes operation.
Wherein, TEE(Trusted Execution Environment)Refer to that believable safety can perform environment;TA(Trusted
Applicaton)Refer to the program run under TEE environment;REE(Rich Execution Environment)Refer to unsafe
Performing environment, generally just refers to Linux android systems;RPMB(Replay Protect Memory Block)Refer to winding
Protection subregion, user can use the subregion when needing to store significant data, and the subregion employs the mechanism for authorizing encryption to be come
Protection data, are a specific safety regions on MEMORY memory blocks, and storage and read-write are required for specific cryptosystem to operate;
MEMORY refers to equipment memory area(That is internal memory), point RAM/ROM parts, equivalent to the internal memory and hard disk of computer, follow-up internal memory
ID refers to MEMORY ID.AES(Advanced Encryption Standard)It is Advanced Encryption Standard, in cryptography again
Claim Rijndael enciphered methods, be a kind of block encryption standard that Federal Government is adopted.
Specifically, as shown in figure 3, step S2 is specifically included:
Mobile terminal screen is lighted in S21, control;
The finger print data of S22, receive user currently input;
S23, startup fingerprint verification operation;
S24, interact to obtain with TEE TA by REE interfaces and be stored in finger print data in RPMB memory areas;
S25, the finger print data read in RPMB memory areas;
S26, the finger print data in RPMB memory areas is decrypted;
S27, by the finger print data of current input with decrypt after finger print data compare;
S28, return comparison result, and unblock is judged whether according to comparison result.
During using mobile terminal, such as start needs to be verified by instant fingerprint typing user.It is mobile whole lighting
After the screen of end, the finger print data of currently used person is gathered by fingerprint sensor, then start fingerprint verification operation.
After fingerprint verification operation starts, application end is interacted by TEE interfaces with TEE TA, and acquisition is stored in RPMB storages
Finger print data in region, that is, notify that TEE TA read the finger print data in RPMB memory areas.Then AES keys pair are passed through
Finger print data in RMPB memory areas is decrypted, and returns to application end, by the finger print data of the currently used person of collection
Compare with the finger print data for returning(Fingerprint sensor can be specifically transferred to compare), and comparison result is returned to
Application end, if fingerprint is mismatched, application end will inform unblock failure, keep current state, if fingerprint matching, unlock successfully.
Further, also include before step S1:
S0, in mobile terminal-opening, the internal memory ID being infused in BROM is compared with the internal memory ID in mobile terminal, if
The two is inconsistent, then control mobile terminal and restart, if the two is consistent, control mobile terminal enters holding state.
Above-mentioned flow process is after powering, to check MEMORY matching Uniqueness(Referred to as checking step).So, when other people
After finding mobile terminal, when start is restarted, if changing internal memory, can cause to start failure, and constantly restart, until shutting down.
Further, as shown in figure 4, step S0 is specifically included:
S01, BROM start;
S02, judge the first inspection mark whether is injected with BROM, the internal memory ID in BROM is read if having, and start pre-add
Load program, directly initiates prestrain program if not;
S03, judge mobile terminal whether need check internal memory ID, if desired check then read mobile terminal in internal memory ID, and
The internal memory ID being infused in BROM is compared with the internal memory ID in mobile terminal, if the two is inconsistent, control is mobile eventually
End is restarted, if the two is consistent, control mobile terminal enters holding state;Control mobile terminal is entered and treated if it need not check
Machine state.
Specifically, BROM is in CPU(Chip)The inside, wherein there is a memory area of very little, production of dispatching from the factory when
Time has operation to inject internal memory ID corresponding with mobile terminal originally toward this region;Manufacturer gives each Memory Allocation different one
String number, and cannot change, this data is injected before mobile terminal dispatches from the factory and change is will be unable to after BROM.BROM is referred in CPU cores
There is a small amount of disposable memory area first operation program after upper electricity in piece, the inside, and data cannot be wiped.Mobile terminal
Internal memory ID can be by when program be run, by preloader programs(Prestrain program)This information can be obtained.
Preloader programs refer to the operation program of a startup of initialization in mobile terminal.
When mobile terminal is started shooting every time, first start BROM, judge whether it has injection first to check mark, according to whether
There is injection first to check mark to judge whether to read the internal memory ID in BROM, that is to say, that first judge whether injected in BROM
Internal memory ID.Then judge whether to need to check internal memory ID by prestrain program, if desired, then dynamic reads movement
The internal memory ID of terminal, and be compared, activation system Kernel, if inconsistent, returns weight subsequently into standby if consistent
Open, lead to not start, so as to avoid information from being stolen.If internal memory ID need not be checked, system Kernel is directly initiated, just
Enter after normally open standby.System Kernel therein refers to operating system nucleus, and operating system nucleus refers to most of operations
The core of system;It in operating system by being used to manage those part groups of memorizer, file, peripheral hardware and system resource
Into.Operating system nucleus generally runs process, and provides the communication between process.
Further, also include before step S0:
T, the internal memory ID for obtaining mobile terminal, the internal memory ID for getting is written in the memory area of BROM, and is locked.
Above-mentioned steps are to bind cpu chip and MEMMORY(Referred to as bind step), so as to increase movement is found or steals
Terminal person steals the difficulty of user's important information.I.e. the present invention makes CPU and memory have High relevancy, enhances illegal point
Son replaces the cost and difficulty of single device, while importing Portable safety in production link.
Specifically, as shown in figure 5, step T is specifically included:
T1, mobile terminal is connected by ADB;
T2, the device id for obtaining mobile terminal;
T3, according to device id send read internal memory ID instruction to mobile terminal;
T4, mobile terminal receive and read after the instruction internal memory ID and return;
Order that T5, transmission equipment are restarted simultaneously is transferred to BROM;
T6, BROM map PORT COM;
T7, mapping result is returned;
T8, internal memory ID is written in the memory area of BROM;
T9, return write state.
Injection internal memory ID needs to be carried out in mobile terminal initial power-on, so need to allow again mobile phone to restart start, and
During internal memory ID injection BROM memory areas are completed in the BROM courses of work, and locked, it is ensured that cannot change again.
First mobile terminal-opening, then connects mobile terminal by PC programming efuse instruments by ADB, and mobile terminal will
Device id returns to PC programming efuse instruments, and then the instruction of PC programmings efuse instruments transmission reading internal memory ID is whole to movement
End, mobile terminal reads internal memory ID from device memory, and returns it to PC programming efuse instruments, PC programming efuse instruments
The order that transmission equipment is restarted is to mobile terminal and is transferred to BROM, and mapping result is simultaneously returned PC burnings by BROM mapping PORT COM
Efuse instruments are write, the data of PC programming efuse tool organizing internal memory ID are simultaneously written in the memory area of BROM, BROM is returned
Write state is to PC programming efuse instruments.
Wherein, efuse (Electronic fuse) refers to electronics fusing small storage in CPU chips, deposits
The following important flag of storage and data, on MTK platforms can only programming once, there is multiple programming chance in high-pass platform, can not
To wipe, and ad hoc fashion is needed to read.
ADB (Android Debug Bridge) refers to and plays a part of to debug bridge.
Based on said method, the present invention also provides a kind of system preferred embodiment for preventing mobile terminal from unlocking, such as Fig. 6 institutes
Show, it includes:
Writing module 100, the finger print data for user to be pre-entered is delivered to TEE TA and is encrypted, and is then written to
RMPB memory areas;
Comparing module 200, for when unblock is needed, the finger print data of receive user currently input, and obtain and be stored in RPMB
Finger print data in memory area is simultaneously decrypted, by the finger print data of current input with decrypt after finger print data compared
It is right, unblock is judged whether according to comparison result.
Specifically, said write module 100 is specifically included:
Typing start unit, for starting typing finger print data;
Fingerprint collecting unit, for gathering finger print data;
Fingerprint transfer unit, for finger print data to be delivered to into TEE TA by REE interfaces;
Encrypting fingerprint unit, for being encrypted to finger print data;
Fingerprint writing unit, for the finger print data after encryption to be write to RPMB memory areas;
Storage returning unit, for returning storage result.
Specifically, the comparing module 200 is specifically included:
Screen lighting unit, for control mobile terminal screen is lighted;
Fingerprint receiving unit, for the finger print data that receive user is currently input into;
Start authentication unit, for starting fingerprint verification operation;
Fingerprint acquiring unit, for interacting with TEE TA by REE interfaces the fingerprint number being stored in RPMB memory areas is obtained
According to;
Fingerprint reader, for reading RPMB memory areas in finger print data;
Fingerprint decryption unit, for being decrypted to the finger print data in RPMB memory areas;
Fingerprint comparison unit, for the finger print data of current input and the finger print data after decryption to be compared;
Unlocked by fingerprint unit, for returning comparison result, and judges whether unblock according to comparison result.
Further, system also includes:
Module is checked, in mobile terminal-opening, by the internal memory ID in the internal memory ID being infused in BROM and mobile terminal
Compare, if the two is inconsistent, control mobile terminal is restarted, if the two is consistent, control mobile terminal enters standby shape
State.
Specifically, the inspection module is specifically included:
BROM start units, for starting BROM;
First judging unit, for judging BROM in whether be injected with the first inspection mark, the internal memory in BROM is read if having
ID, and start prestrain program, prestrain program is directly initiated if not;
Second judging unit, for judging whether mobile terminal needs to check internal memory ID, if desired checks, reads mobile terminal
In internal memory ID, and the internal memory ID being infused in BROM is compared with the internal memory ID in mobile terminal, if the two is inconsistent,
Then control mobile terminal to restart, if the two is consistent, control mobile terminal enters holding state;The control if it need not check is moved
Dynamic terminal enters holding state.
Further, system also includes:
Binding module, for obtaining the internal memory ID of mobile terminal, the internal memory ID for getting is written in the memory area of BROM,
And locked.
Specifically, the binding module is specifically included:
Connection unit, for connecting mobile terminal by ADB;
Device id acquiring unit, for obtaining the device id of mobile terminal;
Instruction sending unit, for sending the instruction for reading internal memory ID to mobile terminal according to device id;
ID receiving units, receive for mobile terminal and read after the instruction internal memory ID and return;
Order transfer unit, for sending order that equipment restarts and being transferred to BROM;
Map unit, for BROM PORT COM is mapped;
Mapping returning unit, for mapping result to be returned;
ID writing units, for internal memory ID to be written in the memory area of BROM;
State returning unit, for returning write state.
It is described in detail in method above with regard to the ins and outs of above-mentioned modular unit, therefore repeats no more.
In sum, by the finger print data of user, in advance encryption is then written to RMPB memory areas to the present invention, so i.e.
Make other people find user mobile phone, cannot also steal user's important information, improve the device security of mobile terminal.The present invention is right
Mobile terminal user does not increase in routine use complex operations, very convenient in mobile terminal production operation flow process,
Also allow for inquiry;Other people cannot read fingerprint and be parsed from RPMB memory areas.
It should be appreciated that the application of the present invention is not limited to above-mentioned citing, and for those of ordinary skills, can
To be improved according to the above description or be converted, all these modifications and variations should all belong to the guarantor of claims of the present invention
Shield scope.
Claims (10)
1. it is a kind of prevent mobile terminal unlock method, it is characterised in that including step:
A, the finger print data that user pre-enters is delivered to TEE TA it is encrypted, is then written to RMPB memory areas;
B, when unblock is needed, the finger print data of receive user currently input, and obtain the finger being stored in RPMB memory areas
Stricture of vagina data are simultaneously decrypted, and the finger print data of current input and the finger print data after decryption are compared, according to comparison result
Judge whether unblock.
2. it is according to claim 1 prevent mobile terminal unlock method, it is characterised in that step A is specifically included:
A1, startup typing finger print data;
A2, collection finger print data;
A3, finger print data is delivered to by TEE TA by REE interfaces;
A4, TEE TA is encrypted to finger print data;
A5, the finger print data after encryption is write to RPMB memory areas;
A6, return storage result.
3. it is according to claim 1 prevent mobile terminal unlock method, it is characterised in that step B is specifically included:
Mobile terminal screen is lighted in B1, control;
The finger print data of B2, receive user currently input;
B3, startup fingerprint verification operation;
B4, interact to obtain with TEE TA by REE interfaces and be stored in finger print data in RPMB memory areas;
B5, the finger print data read in RPMB memory areas;
B6, the finger print data in RPMB memory areas is decrypted;
B7, by the finger print data of current input with decrypt after finger print data compare;
B8, return comparison result, and unblock is judged whether according to comparison result.
4. it is according to claim 1 prevent mobile terminal unlock method, it is characterised in that also wrap before step A
Include:
S, in mobile terminal-opening, the internal memory ID being infused in BROM is compared with the internal memory ID in mobile terminal, if
The two is inconsistent, then control mobile terminal and restart, if the two is consistent, control mobile terminal enters holding state.
5. it is according to claim 4 prevent mobile terminal unlock method, it is characterised in that step S is specifically included:
S1, BROM start;
S2, judge the first inspection mark whether is injected with BROM, the internal memory ID in BROM is read if having, and start prestrain
Program, directly initiates prestrain program if not;
S3, judge mobile terminal whether need check internal memory ID, if desired check then read mobile terminal in internal memory ID, and will
The internal memory ID being infused in BROM compares with the internal memory ID in mobile terminal, if the two is inconsistent, controls mobile terminal
Restart, if the two is consistent, control mobile terminal enters holding state;Mobile terminal is controlled if it need not check and enters standby
State.
6. it is according to claim 4 prevent mobile terminal unlock method, it is characterised in that also wrap before step S
Include:
T, the internal memory ID for obtaining mobile terminal, the internal memory ID for getting is written in the memory area of BROM, and is locked.
7. it is according to claim 6 prevent mobile terminal unlock method, it is characterised in that step T is specifically included:
T1, mobile terminal is connected by ADB;
T2, the device id for obtaining mobile terminal;
T3, according to device id send read internal memory ID instruction to mobile terminal;
T4, mobile terminal receive and read after the instruction internal memory ID and return;
Order that T5, transmission equipment are restarted simultaneously is transferred to BROM;
T6, BROM map PORT COM;
T7, mapping result is returned;
T8, internal memory ID is written in the memory area of BROM;
T9, return write state.
8. it is a kind of prevent mobile terminal unlock system, it is characterised in that include:
Writing module, the finger print data for user to be pre-entered is delivered to TEE TA and is encrypted, and is then written to RMPB
Memory area;
Comparing module, for when unblock is needed, the finger print data of receive user currently input, and obtain and be stored in RPMB storages
Finger print data in region is simultaneously decrypted, by the finger print data of current input with decrypt after finger print data compare, root
Judge whether unblock according to comparison result.
9. it is according to claim 8 prevent mobile terminal unlock system, it is characterised in that also include:
Module is checked, in mobile terminal-opening, by the internal memory ID in the internal memory ID being infused in BROM and mobile terminal
Compare, if the two is inconsistent, control mobile terminal is restarted, if the two is consistent, control mobile terminal enters standby shape
State.
10. it is according to claim 9 prevent mobile terminal unlock system, it is characterised in that also include:
Binding module, for obtaining the internal memory ID of mobile terminal, the internal memory ID for getting is written in the memory area of BROM,
And locked.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611105262.XA CN106657551A (en) | 2016-12-05 | 2016-12-05 | Method and system for preventing mobile terminal from being unlocked |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611105262.XA CN106657551A (en) | 2016-12-05 | 2016-12-05 | Method and system for preventing mobile terminal from being unlocked |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106657551A true CN106657551A (en) | 2017-05-10 |
Family
ID=58818528
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611105262.XA Pending CN106657551A (en) | 2016-12-05 | 2016-12-05 | Method and system for preventing mobile terminal from being unlocked |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106657551A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109495885A (en) * | 2017-09-13 | 2019-03-19 | 中国移动通信有限公司研究院 | Authentication method, mobile terminal, management system and Bluetooth IC |
CN109508532A (en) * | 2017-09-14 | 2019-03-22 | 展讯通信(上海)有限公司 | Equipment safety starting method, apparatus and terminal based on TEE |
CN110598384A (en) * | 2019-09-16 | 2019-12-20 | Oppo(重庆)智能科技有限公司 | Information protection method, information protection device and mobile terminal |
WO2020133500A1 (en) * | 2018-12-29 | 2020-07-02 | 华为技术有限公司 | Method and device for unlocking terminal device, and storage medium |
CN112347833A (en) * | 2020-06-19 | 2021-02-09 | 深圳Tcl新技术有限公司 | Fingerprint protection method of intelligent door lock, intelligent door lock and readable storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090037720A1 (en) * | 2007-07-31 | 2009-02-05 | Wistron Corp. | Hard Disk Security Method in a Computer System |
CN202870831U (en) * | 2012-08-20 | 2013-04-10 | 潘力 | Novel computer and networking certification system |
CN103729597A (en) * | 2014-01-16 | 2014-04-16 | 宇龙计算机通信科技(深圳)有限公司 | System starting verifying method and device and terminal |
CN104615938A (en) * | 2015-02-25 | 2015-05-13 | 山东超越数控电子有限公司 | Power-on authentication method based on solid-state hard disk drive |
CN105447406A (en) * | 2015-11-10 | 2016-03-30 | 华为技术有限公司 | Method and apparatus for accessing storage space |
CN105915686A (en) * | 2016-06-16 | 2016-08-31 | 青岛海信移动通信技术股份有限公司 | Device detection method and device of mobile terminal |
-
2016
- 2016-12-05 CN CN201611105262.XA patent/CN106657551A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090037720A1 (en) * | 2007-07-31 | 2009-02-05 | Wistron Corp. | Hard Disk Security Method in a Computer System |
CN202870831U (en) * | 2012-08-20 | 2013-04-10 | 潘力 | Novel computer and networking certification system |
CN103729597A (en) * | 2014-01-16 | 2014-04-16 | 宇龙计算机通信科技(深圳)有限公司 | System starting verifying method and device and terminal |
CN104615938A (en) * | 2015-02-25 | 2015-05-13 | 山东超越数控电子有限公司 | Power-on authentication method based on solid-state hard disk drive |
CN105447406A (en) * | 2015-11-10 | 2016-03-30 | 华为技术有限公司 | Method and apparatus for accessing storage space |
CN105915686A (en) * | 2016-06-16 | 2016-08-31 | 青岛海信移动通信技术股份有限公司 | Device detection method and device of mobile terminal |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109495885A (en) * | 2017-09-13 | 2019-03-19 | 中国移动通信有限公司研究院 | Authentication method, mobile terminal, management system and Bluetooth IC |
CN109495885B (en) * | 2017-09-13 | 2021-09-14 | 中国移动通信有限公司研究院 | Authentication method, mobile terminal, management system and Bluetooth IC card |
CN109508532A (en) * | 2017-09-14 | 2019-03-22 | 展讯通信(上海)有限公司 | Equipment safety starting method, apparatus and terminal based on TEE |
WO2020133500A1 (en) * | 2018-12-29 | 2020-07-02 | 华为技术有限公司 | Method and device for unlocking terminal device, and storage medium |
CN110598384A (en) * | 2019-09-16 | 2019-12-20 | Oppo(重庆)智能科技有限公司 | Information protection method, information protection device and mobile terminal |
CN110598384B (en) * | 2019-09-16 | 2022-02-22 | Oppo(重庆)智能科技有限公司 | Information protection method, information protection device and mobile terminal |
CN112347833A (en) * | 2020-06-19 | 2021-02-09 | 深圳Tcl新技术有限公司 | Fingerprint protection method of intelligent door lock, intelligent door lock and readable storage medium |
CN112347833B (en) * | 2020-06-19 | 2024-06-04 | 深圳Tcl新技术有限公司 | Fingerprint protection method for intelligent door lock, intelligent door lock and readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI524275B (en) | Storage device and method of operating a storage device | |
CN106657551A (en) | Method and system for preventing mobile terminal from being unlocked | |
US8060925B2 (en) | Processor, memory, computer system, and method of authentication | |
US20150207626A1 (en) | Communication secured between a medical device and its remote control device | |
US8122172B2 (en) | Portable information security device | |
US11087000B2 (en) | Controlled starting of an electronic circuit | |
US11086999B2 (en) | Secure starting of an electronic circuit | |
CN105531710A (en) | Method of authorizing an operation to be performed on a targeted computing device | |
CN102063591A (en) | Methods for updating PCR (Platform Configuration Register) reference values based on trusted platform | |
US20170118641A1 (en) | Communication device, communication method, and communication system | |
CN101419557A (en) | Program downloading control method | |
US8328104B2 (en) | Storage device management systems and methods | |
CN103198247A (en) | Computer safety protection method and computer safety protection system | |
CN101888627B (en) | Mobile terminal and system data protection method thereof | |
JP2018508063A (en) | Secure element | |
CN105512520B (en) | Anti-cloning vehicle-mounted system and working method thereof | |
JP4993114B2 (en) | Shared management method for portable storage device and portable storage device | |
CN101883357A (en) | Method, device and system for mutual authentication between terminal and intelligent card | |
CN111093190B (en) | Method, device, system, electronic equipment and storage medium for writing key data | |
JP2007072957A (en) | Read/write device and debugging system | |
JP2001118042A (en) | Card monitoring method | |
JP2003022216A (en) | Storage device | |
KR101836236B1 (en) | User authentication method and apparatus using authentication between applications, program therefor | |
US20100122323A1 (en) | Storage device management systems and methods | |
CN110851881B (en) | Security detection method and device for terminal equipment, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170510 |