CN106778374A - Terminal and its method for preventing fraudulent-using - Google Patents

Terminal and its method for preventing fraudulent-using Download PDF

Info

Publication number
CN106778374A
CN106778374A CN201611084560.5A CN201611084560A CN106778374A CN 106778374 A CN106778374 A CN 106778374A CN 201611084560 A CN201611084560 A CN 201611084560A CN 106778374 A CN106778374 A CN 106778374A
Authority
CN
China
Prior art keywords
terminal
key
output end
level signal
processor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611084560.5A
Other languages
Chinese (zh)
Inventor
邹武滨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Yude Information Technology Co Ltd
Original Assignee
Shanghai Yude Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Yude Information Technology Co Ltd filed Critical Shanghai Yude Information Technology Co Ltd
Priority to CN201611084560.5A priority Critical patent/CN106778374A/en
Publication of CN106778374A publication Critical patent/CN106778374A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/81Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to field of terminal technology, a kind of terminal and its method for preventing fraudulent-using are disclosed.In the present invention, terminal includes:Processor, power management chip, timer and XOR computing circuit;The default output end of the first of processor, the second default output end of power management chip connect two inputs of XOR computing circuit respectively;The input of the output end connection timer of XOR computing circuit;The output end of timer connects the control end of power management chip.Embodiment of the present invention additionally provides a kind of method for preventing fraudulent-using of terminal; relative to prior art; embodiment of the present invention lost terminal or it is stolen after; can prevent from non-owner from being booted up come decryption by brush official version even robber's brush version to use, can be with the protection secure user data of high degree.

Description

Terminal and its method for preventing fraudulent-using
Technical field
The present invention relates to field of terminal technology, more particularly to terminal and its method for preventing fraudulent-using.
Background technology
Because most of terminal device is designed with password, after the stolen the latter of terminal loses, stealer or end is found The user at end can consider that brush official version again or robber's brush crack version in order to be able to be continuing with the mobile phone, typically.In existing skill In art, just can normally be used after terminal brush redaction, thus easily cause the privacy leakage of user.
The content of the invention
The purpose of embodiment of the present invention is to provide a kind of terminal and its method for preventing fraudulent-using, after lost terminal, can be with Prevent from non-owner from being booted up come decryption by brush official version even robber's brush version to usurp, the protection user of high degree Data safety.
In order to solve the above technical problems, embodiments of the present invention provide a kind of terminal, comprising:Processor, power supply pipe Reason chip, timer and XOR computing circuit;The first of the processor default output end, the power management chip The second default output end connect two inputs of the XOR computing circuit respectively;The XOR computing circuit Output end connect the input of the timer;The output end of the timer connects the control of the power management chip End;
Wherein, the second of the power management chip the default output end exports high level signal in the starting up of terminal; When the processor judges that the current system of the terminal is not positive edition system, or the current system of the terminal is legal system When the built-in key of system and the terminal is mismatched with primary key, the first default output end output low level of the processor Signal;The high level signal that the XOR computing circuit receives the described second default output end output is default with described first The low level signal of output end output, and export high level signal;The timer receives the XOR computing circuit Start timing during the high level signal of output, and shutdown trigger signal is exported at the end of timing;The power management chip Control end controls the terminal closedown after receiving the shutdown trigger signal.
Embodiments of the present invention additionally provide a kind of method for preventing fraudulent-using of terminal, are applied to above-mentioned terminal, terminal Method for preventing fraudulent-using includes:In starting up of terminal, the second default output end output high level signal of power management chip;Processor Whether the current system for judging terminal is positive edition system;When the current system of terminal is positive edition system, the built-in of terminal is judged Whether key matches with primary key;Mismatched with primary key in the built-in key of terminal, or in the current system of terminal When system is not positive edition system, the first default output end output low level signal of processor;XOR computing circuit receives institute The high level signal of the second default output end output and the low level signal of the first default output end output are stated, and exports high level Signal;Timer starts timing when receiving the high level signal of XOR computing circuit output, and defeated at the end of timing Go out trigger signal of shutting down;The control end of power management chip receives control terminal shutdown after shutdown trigger signal.
Embodiment of the present invention in terms of existing technologies, by by an output signal and power management of processor The work of timer is controlled after one voltage output signal XOR computing of chip, and during starting up of terminal, power management The voltage output high level of chip, and when brush system or built-in key are mismatched with primary key again, the output of processor It is low level, so as to control timer operation, and shutdown is controlled by power management chip after the completion of timing, so works as terminal After stolen, even if having refreshed system again, terminal normal boot-strap cannot be also kept, stealing data becomes extremely difficult, Ke Yiji The protection secure user data of big degree.
In addition, when the processor judges that the current system of the terminal is positive edition system and the built-in key of the terminal When being mismatched with primary key, before the first of the processor presets output end output low level signal, also include:It is described The interface of processor display input key, to receive the key of input;The processor judge the key of the input with it is described Primary key is mismatched.Whether it is owner, Ke Yiti by be input into that key can again judge current operation terminal The accuracy of height checking.
In addition, the primary key is generated by the sequence number of the terminal.Because terminal is when dispatching from the factory, its sequence number is only One, and not modifiable, therefore, the original password generated by the sequence number of terminal be also it is unique, it is immutable, so may be used To prevent original password to be tampered.
In addition, the primary key is generated by the sequence number of the terminal by AES.Original password can be prevented It is cracked, security is good.
In addition, the built-in key is divided into two parts, and it is stored in CACHE DIRECTORY and system file directory respectively;Institute State and judge whether the built-in key of the terminal matches with primary key, specifically include:Respectively from the CACHE DIRECTORY and Two parts of the built-in key are obtained in the system file directory;After two parts of the built-in key are integrated with it is described Primary key is matched.By built-in key be divided into two parts be stored in respectively in CACHE DIRECTORY and system file directory be difficult by Crack, it is ensured that the security of password.And built-in key is stored in respectively in CACHE DIRECTORY and system file directory and is (after terminal more new system or factory reset built-in key can be caused to lose) that can be wiped, non-owner can be prevented Terminal is continuing with using brush version again or the method for factory reset.
Brief description of the drawings
Fig. 1 is the structural representation of the terminal according to first embodiment of the invention;
Fig. 2 is the flow chart of the method for preventing fraudulent-using of the terminal according to second embodiment of the invention;
Fig. 3 is the flow chart of the method for preventing fraudulent-using of the terminal according to third embodiment of the invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to each reality of the invention The mode of applying is explained in detail.However, it will be understood by those skilled in the art that in each implementation method of the invention, In order that reader more fully understands the application and proposes many ins and outs.But, even if without these ins and outs and base Many variations and modification in following implementation method, it is also possible to realize the application technical scheme required for protection.
First embodiment of the invention is related to a kind of terminal, as shown in figure 1, comprising:Processor 1, power management chip 2nd, timer 3 and XOR computing circuit 4.
The default output end 11 of the first of processor 1, the second default output end 21 of power management chip 2 connect XOR respectively Two inputs of logical operation circuit 4;The input 31 of the output end connection timer 3 of XOR computing circuit 4;Timing The output end 32 of device 3 connects the control end 22 of power management chip 2.
Wherein, the second of power management chip 2 the default output end 21 exports high level signal in starting up of terminal;Work as treatment Device 1 judges that the current system of terminal is not positive edition system, or the current system of terminal is the built-in close of positive edition system and terminal When key is mismatched with primary key, the first default output of output end 11 low level signal of processor 1;XOR computing circuit 4 high level signals for receiving the second default output of output end 21 and the low level signal of the first default output of output end 11, and it is defeated Go out high level signal;Timer 3 starts timing when receiving the high level signal of the output of XOR computing circuit 4, and in meter When at the end of export shutdown trigger signal;The control end 22 of power management chip 2 receives control terminal after shutdown trigger signal Shutdown.
Specifically, in present embodiment, shutdown or the power down of power management chip 2 during dormancy, treatment when terminal closedown The also inevitable also power down of device 1;And during mobile phone normal boot-strap, electricity on power management chip 2, that is to say, that, it is desirable to control process device 1 During input and output, power management chip 2 must be power-up state.
By installing timer 3 in present embodiment, by by an output signal and power management chip of processor A voltage output signal XOR computing after control timer 3 work.When starting up of terminal, power management chip The default output end 21 of the second of 2 will necessarily export high level signal;After terminal detects more new system, and update after be When system is not positive edition system, presets output end 11 by the first of software-controlled processor 1 and export low level signal, so that XOR is patrolled The output high level signal of computing circuit 4 is collected, then timer 3 is by work, and the control terminal shutdown after the completion of timing.So eventually Even if after end is stolen, stealer cannot also keep terminal normal boot-strap, and stealing data becomes extremely difficult.And if stealer from Row modification official system, removes antitheft software, so steals after brush system, and also the uncontrollable first default output end 11 exports height Level signal, so that still can not normal using terminal.
In actual applications, the first of processor 1 the default output end 11 is a universal input output connecting pin.Power management The default output end 21 of the second of chip 2 is a voltage output pin.In present embodiment, the first default output end 11 and second Default output end 21 with existing processor 1 and the vacant pin of power management chip 2, therefore can not need additional configuration input defeated Outgoing interface, can be with cost-effective.
Present embodiment in terms of existing technologies, by by an output signal and power management chip of processor A voltage output signal XOR computing after control the work of timer, and during starting up of terminal, power management chip Voltage output high level, and after brush system again or change system version, processor is output as low level, so as to control Timer operation, and shutdown is controlled by power management chip after the completion of timing, so after terminal is stolen, even if this is again Refresh system, cannot also keep terminal normal boot-strap, stealing data has become extremely difficult, can be with the protection user of high degree Data safety.
Second embodiment of the present invention is related to a kind of method for preventing fraudulent-using of terminal, is applied to the end in first embodiment End, its flow is as shown in Fig. 2 specific as follows:
In step 201, starting up of terminal.Specifically, the second of power management chip the default output when starting up of terminal End output high level signal.
In step 202., whether the current system for judging terminal is positive edition system.Specifically, can be by terminal system Whether the installation package file detection terminal of system is positive edition system.In this step if the determination result is YES, the current system of terminal is illustrated It is positive edition system to unite, then into step 203, the current system for otherwise illustrating terminal is not positive edition system, then into step 207.
In step 203, judge whether the built-in key of terminal matches with primary key.Specifically, this embodiment party Primary key in formula is generated by the sequence number of terminal, to ensure the uniqueness of primary key.Preferably, the primary key can be with Generated by AES by the sequence number of terminal, to prevent original password to be cracked, security is good.It is interior in present embodiment Putting key can be provided by developer, the built-in key that each terminal only one of which matches with the primary key of terminal, should When built-in key is first powered on after being dispatched from the factory for terminal, by user input and it is stored in terminal, in actual applications, this is interior It can be two parts to put key, and is stored in CACHE DIRECTORY and system file directory respectively;Due to built-in key being protected respectively Exist in CACHE DIRECTORY and system file directory can be erasing (i.e. terminal is every time after more new system or factory reset Built-in key can be caused to lose), can prevent the appropriator of terminal using brush version again or the method for factory reset after Continuous using terminal.In this step, two parts of built-in key can be obtained from CACHE DIRECTORY and system file directory respectively, Then matched with primary key after two parts of built-in key are integrated.In this step if the determination result is YES, illustrate eventually Whether the built-in key at end matches with primary key, then into step 204, otherwise illustrate terminal built-in key whether with original Beginning key is mismatched, then into step 207.
In step 204, the first of processor the default output end output high level signal.
In step 205, XOR computing circuit receives the high level signal and first of the second default output end output The high level signal of default output end output, and export low level signal
In step 206, terminal normal boot-strap.Specifically, when XOR computing circuit exports low level signal, Timer cannot be started, then terminal will not start timing shutdown, terminal can be used with normal boot-strap.
In step 207, the first of processor the default output end output low level signal.Specifically, if terminal work as Preceding system is not positive edition system, or the built-in key of terminal with primary key when mismatching, the first default output of processor End output low level signal.
In a step 208, XOR computing circuit receives the high level signal and first of the second default output end output The low level signal of default output end output, and export high level signal
In step 209, timing is started when timer receives the high level signal of XOR computing circuit output.
In step 210, shutdown trigger signal is exported at the end of timing.
In step 211, the control end of power management chip receives control terminal shutdown after shutdown trigger signal.
It should be noted that the built-in key in present embodiment can be defeated manually when terminal is first powered on by user Enter, and be divided into two parts to be respectively stored in CACHE DIRECTORY and system file directory, when user starts shooting again, terminal respectively from Two parts of built-in key are obtained in CACHE DIRECTORY and system file directory, with original after then two parts of built-in key are integrated Beginning key is matched, and when terminal steals brush system or factory reset, two parts of built-in key can partial loss Or all lose;When built-in key partial loss, built-in key and the primary key of terminal must be mismatched;And work as built-in When two parts of key are all lost, the built-in key of acquisition is zero, must also be mismatched with primary key, then first is default defeated Go out end output low level signal, shutdown is triggered so as to control timer operation, and after timing terminates, such that it is able to effectively prevent Terminal is usurped by way of stealing brush system or factory reset.
Present embodiment in terms of existing technologies, by by an output signal and power management chip of processor A voltage output signal XOR computing after control the work of timer, and during starting up of terminal, power management chip Voltage output high level, and when brush system again or built-in key are mismatched with primary key, processor is output as low Level, so as to control timer operation, and controls shutdown after the completion of timing by power management chip, so when terminal is stolen Used time, even if having refreshed system or factory reset again, terminal normal boot-strap cannot be also kept, stealing data becomes non- It is often difficult, can be with the protection secure user data of high degree.
It is seen that, present embodiment is the embodiment of the method corresponding with first embodiment, and present embodiment can be with First embodiment is worked in coordination implementation.The relevant technical details mentioned in first embodiment still have in the present embodiment Effect, in order to reduce repetition, repeats no more here.Correspondingly, the relevant technical details mentioned in present embodiment are also applicable in In first embodiment.
Third embodiment of the invention is related to a kind of method for preventing fraudulent-using of terminal, and the 3rd implementation method is in second embodiment On the basis of improve, the improvement is that:In the present embodiment, when the built-in key of terminal is mismatched with primary key When, the identity that built-in key verifies user again can be manually input into, the method for preventing fraudulent-using of terminal in present embodiment Flow is as shown in figure 3, specific as follows:
Step 301-303 in present embodiment is similar with the step 201-203 in second embodiment, is no longer gone to live in the household of one's in-laws on getting married secondary State.
In step 304, the interface of processor display input key, to receive the key of input.Specifically, terminal is worked as Built-in key and primary key when mismatching, the interface of processor display input key, the interface can be input frame, user Key can be input into this input frame.
In step 305, processor judges whether the key of input matches with primary key.If judged result in this step It is yes, illustrates that the key of input is matched with primary key, then into step 306, if judged result is no, illustrates the key of input Mismatched with primary key, then into step 309.It should be noted that in present embodiment, when the key of input is close with original When key is matched, the key can be replaced with original built-in key, and be divided into two parts, CACHE DIRECTORY is stored in respectively and is In system file directory.
Step 306-313 in present embodiment is similar with the step 204-211 in second embodiment, is no longer gone to live in the household of one's in-laws on getting married secondary State.
Due in actual applications, existing, owner is needed to update system version based on personal reason or recovery is dispatched from the factory The situation of setting, thus built-in key in terminal mismatches with primary key and leads to not normal boot-strap.Therefore, in this reality Apply in mode, when the built-in key for verifying terminal is mismatched with primary key, can manually be input into built-in key another The identity of secondary checking user, when the key being manually entered is matched with primary key, terminal can be used with normal boot-strap.
In present embodiment, when built-in key and the primary key for verifying terminal are inconsistent, can be with by being input into key Whether judge currently used terminal again is owner, can avoid refreshing terminal system or recovery because of owner Lead to not the situation of start after Default Value, can further improve the accuracy of checking so that embodiment of the present invention is more Add kind.
Above the step of various methods divide, be intended merely to description it is clear, can be merged into when realizing a step or Some steps are split, multiple steps are decomposed into, as long as comprising identical logical relation, all in the protection domain of this patent It is interior;To adding inessential modification in algorithm or in flow or introducing inessential design, but its algorithm is not changed With the core design of flow all in the protection domain of the patent.
It is noted that each module involved in present embodiment is logic module, in actual applications, one Individual logic unit can be a part for a physical location, or a physical location, can also be with multiple physics lists The combination of unit is realized.Additionally, in order to protrude innovative part of the invention, will not be with solution institute of the present invention in present embodiment The unit that the technical problem relation of proposition is less close is introduced, but this is not intended that in present embodiment do not exist other lists Unit.
It will be appreciated by those skilled in the art that all or part of step in realizing above-described embodiment method can be by Program is completed to instruct the hardware of correlation, and the program storage is in a storage medium, including some instructions are used to so that one Individual equipment (can be single-chip microcomputer, chip etc.) or processor (processor) perform the application each embodiment methods described All or part of step.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
It will be understood by those skilled in the art that the respective embodiments described above are to realize specific embodiment of the invention, And in actual applications, can to it, various changes can be made in the form and details, without departing from the spirit and scope of the present invention.

Claims (9)

1. a kind of terminal, it is characterised in that include:Processor, power management chip, timer and XOR computing electricity Road;
The default output end of the first of the processor, the second default output end of the power management chip connect described different respectively Or two inputs of logical operation circuit;
The output end of the XOR computing circuit connects the input of the timer;
The output end of the timer connects the control end of the power management chip;
Wherein, the second of the power management chip the default output end exports high level signal in the starting up of terminal;Work as institute State processor and judge that the current system of the terminal is not positive edition system, or the terminal built-in key with primary key not During matching, the first default output end output low level signal of the processor;The XOR computing circuit receives described The low level signal that the high level signal of the second default output end output is exported with the described first default output end, and export electricity high Ordinary mail number;The timer starts timing when receiving the high level signal of the XOR computing circuit output, and in meter When at the end of export shutdown trigger signal;The control end of the power management chip is controlled after receiving the shutdown trigger signal The terminal closedown.
2. terminal according to claim 1, it is characterised in that the default output end of the first of the processor is general Input and output pin.
3. terminal according to claim 1, it is characterised in that the default output end of the second of the power management chip is Individual voltage output pin.
4. a kind of method for preventing fraudulent-using of terminal, is applied in claim 1 to claim 3 described in any one claim Terminal, it is characterised in that the method for preventing fraudulent-using of the terminal includes:
In the starting up of terminal, the second default output end output high level signal of the power management chip;
The processor judges whether the current system of the terminal is positive edition system;
The terminal current system be positive edition system when, judge the terminal built-in key whether with primary key phase Match somebody with somebody;
Mismatched with the primary key in the built-in key of the terminal, or be not legal in the current system of the terminal During system, the first default output end output low level signal of the processor;
The high level signal that the XOR computing circuit receives the described second default output end output is default with described first The low level signal of output end output, and export high level signal;
The timer starts timing when receiving the high level signal of the XOR computing circuit output, and in timing knot Shutdown trigger signal is exported during beam;
The control end of the power management chip controls the terminal closedown after receiving the shutdown trigger signal.
5. the method for preventing fraudulent-using of terminal according to claim 4, it is characterised in that the terminal built-in key with it is former After beginning key is mismatched, and before the first of the processor presets output end output low level signal, also include:
The interface of the processor display input key, to receive the key of input;
The processor judges that the key of the input is mismatched with the primary key.
6. the method for preventing fraudulent-using of terminal according to claim 4, it is characterised in that the method for preventing fraudulent-using of the terminal is also wrapped Include:
When the processor judges that the current system of the terminal is close with original as the built-in key of positive edition system and the terminal When key is matched, the first default output end output high level signal of the processor;
The high level signal that the XOR computing circuit receives the described second default output end output is default with described first The high level signal of output end output, and export low level signal;
Wherein, the low level signal of the XOR computing circuit output cannot start the timer, and the terminal is normal Start.
7. the method for preventing fraudulent-using of terminal according to claim 4, it is characterised in that the primary key is by the terminal Sequence number is generated.
8. the method for preventing fraudulent-using of terminal according to claim 7, it is characterised in that
The primary key is generated by the sequence number of the terminal by AES.
9. the method for preventing fraudulent-using of terminal according to claim 4, it is characterised in that
The built-in key is divided into two parts, and is stored in CACHE DIRECTORY and system file directory respectively;
In whether the built-in key for judging the terminal matches with primary key, specifically include:
Two parts of the built-in key are obtained from the CACHE DIRECTORY and the system file directory respectively;
Matched with the primary key after two parts of the built-in key are integrated.
CN201611084560.5A 2016-11-30 2016-11-30 Terminal and its method for preventing fraudulent-using Pending CN106778374A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611084560.5A CN106778374A (en) 2016-11-30 2016-11-30 Terminal and its method for preventing fraudulent-using

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611084560.5A CN106778374A (en) 2016-11-30 2016-11-30 Terminal and its method for preventing fraudulent-using

Publications (1)

Publication Number Publication Date
CN106778374A true CN106778374A (en) 2017-05-31

Family

ID=58913205

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611084560.5A Pending CN106778374A (en) 2016-11-30 2016-11-30 Terminal and its method for preventing fraudulent-using

Country Status (1)

Country Link
CN (1) CN106778374A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107231355A (en) * 2017-06-01 2017-10-03 珠海市魅族科技有限公司 Anti- method, terminal, server, device and the storage medium for cracking binding service

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1946230A (en) * 2006-10-19 2007-04-11 宇龙计算机通信科技(深圳)有限公司 Anti-theft method for cell phone
CN102663314A (en) * 2012-03-23 2012-09-12 邱漫 Anti-theft and information security protecting method and device for portable terminal
CN102946604A (en) * 2012-11-07 2013-02-27 中兴通讯股份有限公司 Method and device for version protection of mobile terminal
CN105978899A (en) * 2016-06-27 2016-09-28 成都轻车快马网络科技有限公司 SIM card binding method for preventing malicious mobile phone flash

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1946230A (en) * 2006-10-19 2007-04-11 宇龙计算机通信科技(深圳)有限公司 Anti-theft method for cell phone
CN102663314A (en) * 2012-03-23 2012-09-12 邱漫 Anti-theft and information security protecting method and device for portable terminal
CN102946604A (en) * 2012-11-07 2013-02-27 中兴通讯股份有限公司 Method and device for version protection of mobile terminal
CN105978899A (en) * 2016-06-27 2016-09-28 成都轻车快马网络科技有限公司 SIM card binding method for preventing malicious mobile phone flash

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107231355A (en) * 2017-06-01 2017-10-03 珠海市魅族科技有限公司 Anti- method, terminal, server, device and the storage medium for cracking binding service

Similar Documents

Publication Publication Date Title
CN105205401B (en) Trusted computer system and its trusted bootstrap method based on security password chip
CN100378609C (en) Method and apparatus for unlocking a computer system hard drive
US10489612B2 (en) Memory controller to verify authenticity of data
CN102883026B (en) A kind of mobile terminal realizes the method for power-on protection
CN106156635A (en) Method for starting terminal and device
CN101980235A (en) Safe computing platform
US9262631B2 (en) Embedded device and control method thereof
CN104008342A (en) Method for achieving safe and trusted authentication through BIOS and kernel
JP2007534544A (en) Certification of control equipment in the vehicle
CN101673330A (en) BIOS-based computer security protection method and system
US20190318078A1 (en) Application security authentication method, terminal and storage medium
CN100504897C (en) Method for starting protected partition
CN104573536A (en) File protection method and device
CN103198247A (en) Computer safety protection method and computer safety protection system
CN109977039A (en) HD encryption method for storing cipher key, device, equipment and readable storage medium storing program for executing
CN102915415A (en) Safety control method and system of mobile terminal
EP3757838B1 (en) Warm boot attack mitigations for non-volatile memory modules
CN106933752A (en) The encryption device and method of a kind of SRAM type FPGA
US20120060215A1 (en) Mobile terminal and method for protecting its system data
CN103023647B (en) A kind of method strengthening secondary radar FPGA fail safe
CN103714018A (en) Security access control method for chip storage circuit
CN106936672A (en) The control method and terminal of gas-fired equipment
CN105516500A (en) Method and system for selecting device mode
CN106778374A (en) Terminal and its method for preventing fraudulent-using
CN109889334A (en) Embedded firmware encrypting method, apparatus, wifi equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170531

WD01 Invention patent application deemed withdrawn after publication