CN107346392B - Terminal system change identification method and device and readable storage medium - Google Patents

Terminal system change identification method and device and readable storage medium Download PDF

Info

Publication number
CN107346392B
CN107346392B CN201710518601.5A CN201710518601A CN107346392B CN 107346392 B CN107346392 B CN 107346392B CN 201710518601 A CN201710518601 A CN 201710518601A CN 107346392 B CN107346392 B CN 107346392B
Authority
CN
China
Prior art keywords
terminal
partition
information
verification
root
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710518601.5A
Other languages
Chinese (zh)
Other versions
CN107346392A (en
Inventor
王方友
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201710518601.5A priority Critical patent/CN107346392B/en
Publication of CN107346392A publication Critical patent/CN107346392A/en
Application granted granted Critical
Publication of CN107346392B publication Critical patent/CN107346392B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot

Abstract

The invention discloses a terminal system change identification method, a device and a readable storage medium, wherein the method comprises the following steps: when the terminal is detected to be started, acquiring verification information of different system partitions of the terminal in a security area; respectively carrying out characteristic verification on the system partitions corresponding to the terminals according to the verification information; when detecting that the characteristic verification corresponding to any system partition fails, modifying the first type of root information corresponding to the system partition with the failed characteristic verification in the security region to prompt the change of the system information of the system partition with the failed characteristic verification. The invention aims to solve the technical problems that the real state of the terminal software is counted by big after-sale data and the stability of a terminal system is difficult to maintain in the prior art.

Description

Terminal system change identification method and device and readable storage medium
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method and an apparatus for identifying a change in a terminal system, and a readable storage medium.
Background
At present, a user often performs various cracking on a terminal such as a mobile phone to obtain root authority, so that modification of terminal software is realized, and the terminal is more in line with the personality and the use habit of the user. Although better user experience can be provided after the terminal software is modified, hidden danger is caused to the stability of the terminal system, and after the software is modified by a user, many stability problems of the terminal system are out of the range predicted by a mobile phone manufacturer, so that trouble is caused to big data statistics and after-sales service of the mobile phone manufacturer.
Therefore, under the condition of not influencing user experience, the difficulty of how to reduce the real state of the after-sale big data statistics terminal software and maintain the stability of the terminal system becomes a difficult problem which puzzles technical personnel.
Disclosure of Invention
The invention mainly aims to provide a terminal system change identification method, a device and a readable storage medium, and aims to solve the technical problems that the difficulty of calculating the real state of terminal software by using big after-sale data and maintaining the stability of a terminal system in the prior art is high.
In order to achieve the above object, the present invention provides a method for identifying a change of a terminal system, where the terminal sets a secure area, and the secure area stores first type root information and verification information, and the method for identifying a change of a terminal system includes:
when the terminal is detected to be started, acquiring verification information of different system partitions of the terminal in a security area;
respectively carrying out characteristic verification on the system partitions corresponding to the terminals according to the verification information;
when detecting that the characteristic verification corresponding to any system partition fails, modifying the first type of root information corresponding to the system partition with the failed characteristic verification in the security region to prompt the change of the system information of the system partition with the failed characteristic verification.
Optionally, the second type of root information is stored in the security region, the terminal state includes a locked flashing mode state, and the method for changing and identifying the terminal system further includes:
when the terminal is detected to be in a locking flashing mode state, monitoring an unlocking module corresponding to the terminal in the state;
and if the unlocking of the terminal in the locking flashing mode is detected to be successful, changing the corresponding second type root information in the safety area so as to record the change of the system information of the terminal in the locking flashing mode.
Optionally, the second type of root information includes an unlocking root identifier and an unlocking root numerical value, and if it is detected that the unlocking of the terminal is successful in the locked flashing mode state, the step of changing the corresponding second type of root information in the secure area includes:
when an unlocking instruction is detected, acquiring an unlocking password of an input terminal, and verifying the unlocking password;
when the unlocking password passes the verification, acquiring a corresponding unlocking root identifier in the security region;
and when the unlocking root identification is based, changing the unlocking root numerical value corresponding to the unlocking root identification.
Optionally, when it is detected that the feature verification corresponding to any system partition fails, after the step of modifying the first type of root information corresponding to the system partition with the failed feature verification in the security region, the step includes:
and recording the detailed content of the system information change corresponding to the system partition with the failed characteristic verification.
Optionally, the security area includes a refined security partition, partition header information is stored in the terminal system partition, and the method for identifying a change of the terminal system further includes:
when detecting that the terminal is started for the first time, writing the partition title information of different system partitions of the terminal into a title refinement secure partition;
and refining the partition title information corresponding to the safe partition according to different titles, and setting a corresponding partition title root identifier and a partition title root numerical value.
Optionally, partition header information and partition content information are stored in the terminal system partition, the verification information includes header verification information and content verification information, and the step of performing feature verification on the system partition corresponding to the terminal according to the verification information includes:
performing characteristic verification on the partition header information of the system partition corresponding to the terminal according to the header verification information of the safe area;
and when the verification is passed, performing characteristic verification on the partition content information of the system partition corresponding to the terminal according to the content verification information of the safe area.
Optionally, after the step of prompting the change of the system information of the system partition with the failed feature verification, the method includes:
monitoring the partition characteristic verification states of different systems of the terminal, and controlling the terminal to be normally started when detecting that the partition characteristic verification of different systems of the terminal is completed.
Optionally, each secure partition is set in the secure area, and the secure partitions are expanded according to attributes of different system partitions of the terminal.
In addition, in order to achieve the above object, the present invention further provides a terminal system change recognition apparatus, including: a memory, a processor, a communication bus and a terminal system change recognition program stored on the memory:
the communication bus is used for realizing connection communication between the processor and the memory;
the processor is used for executing the terminal system change identification program to realize the following steps:
when the terminal is detected to be started, acquiring verification information of different system partitions of the terminal in a security area;
respectively carrying out characteristic verification on the system partitions corresponding to the terminals according to the verification information;
when detecting that the characteristic verification corresponding to any system partition fails, modifying the first type of root information corresponding to the system partition with the failed characteristic verification in the security region to prompt the change of the system information of the system partition with the failed characteristic verification.
Further, to achieve the above object, the present invention also provides a readable storage medium storing one or more programs, the one or more programs being executable by one or more processors for:
when the terminal is detected to be started, acquiring verification information of different system partitions of the terminal in a security area;
respectively carrying out characteristic verification on the system partitions corresponding to the terminals according to the verification information;
when detecting that the characteristic verification corresponding to any system partition fails, modifying the first type of root information corresponding to the system partition with the failed characteristic verification in the security region to prompt the change of the system information of the system partition with the failed characteristic verification.
According to the technical scheme, the terminal system change identification method comprises the steps that when the terminal is detected to be started, verification information of different system partitions of the terminal in a safety area is obtained; respectively carrying out characteristic verification on the system partitions corresponding to the terminals according to the verification information; when detecting that the characteristic verification corresponding to any system partition fails, modifying the first type of root information corresponding to the system partition with the failed characteristic verification in the security region to prompt the change of the system information of the system partition with the failed characteristic verification. The method comprises the steps that a safety region is arranged on a terminal, first-class root information and verification information corresponding to a terminal system partition are stored in the safety region, the first-class root information comprises a root mark and a numerical value corresponding to the root, when the terminal is started, a system or software built in the terminal is verified according to the verification information stored in the safety region, if verification failure is detected, the system or software corresponding to the verification failure of the terminal is modified, and therefore the terminal records the modification in the safety region. A manufacturer or a service provider obtains the change value of the root number corresponding to the root identification, namely the number of times of modifying the terminal software and the real state of the terminal software can be counted by big data, if the terminal software or the system has problems, the modified information of the terminal can be obtained based on the first type of root information, and therefore the technical problems that the real state of the terminal software is counted by big data after sale and the stability of the terminal system is difficult to maintain are solved.
Drawings
Fig. 1 is a schematic diagram of a hardware structure of an alternative mobile terminal for implementing various embodiments of the present invention;
FIG. 2 is a diagram illustrating a wireless communication system of the mobile terminal shown in FIG. 1;
FIG. 3 is a flowchart illustrating a first embodiment of a method for identifying a change in a terminal system according to the present invention;
FIG. 4 is a diagram illustrating a first scenario of a security area in a terminal system change identification method according to the present invention;
FIG. 5 is a diagram illustrating a second scenario of a security area in the method for identifying changes to the terminal system according to the present invention;
FIG. 6 is a diagram illustrating a third scenario of a security area in the method for identifying changes to the terminal system according to the present invention;
fig. 7 is a schematic device structure diagram of a hardware operating environment related to the method according to the embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in itself. Thus, "module", "component" or "unit" may be used mixedly.
The terminal may be implemented in various forms. For example, the terminal described in the present invention may include a mobile terminal such as a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a Personal Digital Assistant (PDA), a Portable Media Player (PMP), a navigation device, a wearable device, a smart band, a pedometer, and the like, and a fixed terminal such as a Digital TV, a desktop computer, and the like.
The following description will be given by way of example of a mobile terminal, and it will be understood by those skilled in the art that the construction according to the embodiment of the present invention can be applied to a fixed type terminal, in addition to elements particularly used for mobile purposes.
Referring to fig. 1, which is a schematic diagram of a hardware structure of a mobile terminal for implementing various embodiments of the present invention, the mobile terminal 100 may include: RF (Radio Frequency) unit 101, WiFi module 102, audio output unit 103, a/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, memory 109, processor 110, and power supply 111. Those skilled in the art will appreciate that the mobile terminal architecture shown in fig. 1 is not intended to be limiting of mobile terminals, which may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes each component of the mobile terminal in detail with reference to fig. 1:
the radio frequency unit 101 may be configured to receive and transmit signals during information transmission and reception or during a call, and specifically, receive downlink information of a base station and then process the downlink information to the processor 110; in addition, the uplink data is transmitted to the base station. Typically, radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 101 can also communicate with a network and other devices through wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System for Mobile communications), GPRS (General Packet Radio Service), CDMA2000(Code Division Multiple Access 2000), WCDMA (Wideband Code Division Multiple Access), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access), FDD-LTE (Frequency Division duplex Long Term Evolution), and TDD-LTE (Time Division duplex Long Term Evolution).
WiFi belongs to short-distance wireless transmission technology, and the mobile terminal can help a user to receive and send e-mails, browse webpages, access streaming media and the like through the WiFi module 102, and provides wireless broadband internet access for the user. Although fig. 1 shows the WiFi module 102, it is understood that it does not belong to the essential constitution of the mobile terminal, and may be omitted entirely as needed within the scope not changing the essence of the invention.
The audio output unit 103 may convert audio data received by the radio frequency unit 101 or the WiFi module 102 or stored in the memory 109 into an audio signal and output as sound when the mobile terminal 100 is in a call signal reception mode, a call mode, a recording mode, a voice recognition mode, a broadcast reception mode, or the like. Also, the audio output unit 103 may also provide audio output related to a specific function performed by the mobile terminal 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 103 may include a speaker, a buzzer, and the like.
Modem 104 is configured to receive network access parameters from terminal processor 110.
The mobile terminal 100 also includes at least one sensor 105, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 1061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 1061 and/or a backlight when the mobile terminal 100 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
The display unit 106 is used to display information input by a user or information provided to the user. The Display unit 106 may include a Display panel 1061, and the Display panel 1061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 107 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the mobile terminal. Specifically, the user input unit 107 may include a touch panel 1071 and other input devices 1072. The touch panel 1071, also referred to as a touch screen, may collect a touch operation performed by a user on or near the touch panel 1071 (e.g., an operation performed by the user on or near the touch panel 1071 using a finger, a stylus, or any other suitable object or accessory), and drive a corresponding connection device according to a predetermined program. The touch panel 1071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 110, and can receive and execute commands sent by the processor 110. In addition, the touch panel 1071 may be implemented in various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 1071, the user input unit 107 may include other input devices 1072. In particular, other input devices 1072 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like, and are not limited to these specific examples.
Further, the touch panel 1071 may cover the display panel 1061, and when the touch panel 1071 detects a touch operation thereon or nearby, the touch panel 1071 transmits the touch operation to the processor 110 to determine the type of the touch event, and then the processor 110 provides a corresponding visual output on the display panel 1061 according to the type of the touch event. Although the touch panel 1071 and the display panel 1061 are shown in fig. 1 as two separate components to implement the input and output functions of the mobile terminal, in some embodiments, the touch panel 1071 and the display panel 1061 may be integrated to implement the input and output functions of the mobile terminal, and is not limited herein.
The interface unit 108 serves as an interface through which at least one external device is connected to the mobile terminal 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 108 may be used to receive input (e.g., data information, power, etc.) from external devices and transmit the received input to one or more elements within the mobile terminal 100 or may be used to transmit data between the mobile terminal 100 and external devices.
The memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 109 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 110 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by operating or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, thereby performing overall monitoring of the mobile terminal. Processor 110 may include one or more processing units; preferably, the processor 110 may integrate a terminal upper processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The mobile terminal 100 may further include a power supply 111 (e.g., a battery) for supplying power to various components, and preferably, the power supply 111 may be logically connected to the processor 110 via a power management system, so as to manage charging, discharging, and power consumption management functions via the power management system.
Although not shown in fig. 1, the mobile terminal 100 may further include a bluetooth module or the like, which is not described in detail herein.
In order to facilitate understanding of the embodiments of the present invention, a communication network system on which the mobile terminal of the present invention is based is described below.
Referring to fig. 2, fig. 2 is an architecture diagram of a communication Network system according to an embodiment of the present invention, where the communication Network system is an LTE system of a universal mobile telecommunications technology, and the LTE system includes a UE (User Equipment) 201, an E-UTRAN (Evolved UMTS Terrestrial Radio Access Network) 202, an EPC (Evolved Packet Core) 203, and an IP service 204 of an operator, which are in communication connection in sequence.
Specifically, the UE201 may be the terminal 100 described above, and is not described herein again.
The E-UTRAN202 includes eNodeB2021 and other eNodeBs 2022, among others. Among them, the eNodeB2021 may be connected with other eNodeB2022 through backhaul (e.g., X2 interface), the eNodeB2021 is connected to the EPC203, and the eNodeB2021 may provide the UE201 access to the EPC 203.
The EPC203 may include an MME (Mobility Management Entity) 2031, an HSS (Home Subscriber Server) 2032, other MMEs 2033, an SGW (Serving gateway) 2034, a PGW (PDN gateway) 2035, and a PCRF (Policy and Charging Rules Function) 2036, and the like. The MME2031 is a control node that handles signaling between the UE201 and the EPC203, and provides bearer and connection management. HSS2032 is used to provide registers to manage functions such as home location register (not shown) and holds subscriber specific information about service characteristics, data rates, etc. All user data may be sent through SGW2034, PGW2035 may provide IP address assignment for UE201 and other functions, and PCRF2036 is a policy and charging control policy decision point for traffic data flow and IP bearer resources, which selects and provides available policy and charging control decisions for a policy and charging enforcement function (not shown).
The IP services 204 may include the internet, intranets, IMS (IP Multimedia Subsystem), or other IP services, among others.
Although the LTE system is described as an example, it should be understood by those skilled in the art that the present invention is not limited to the LTE system, but may also be applied to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA, and future new network systems.
Based on the hardware structure of the mobile terminal and the structure of the communication device, the invention provides various embodiments of the terminal system change identification method.
Referring to fig. 3, the present invention provides a terminal system change identification method, in a first embodiment of the terminal system change identification method, a terminal sets a security area, where root information and verification information are stored, and the terminal system change identification method includes:
step S10, when the terminal is detected to be started, the verification information of different system partitions of the terminal in the security area is obtained;
before the terminal leaves factory, a safety region is arranged in the terminal, each refined safety partition is arranged in the safety region and corresponds to different system partitions of the terminal, check information of the corresponding system partition of the terminal is stored in different refined safety partitions, and particularly, the refined safety partitions can be expanded according to the attributes or functions of the different system partitions of the terminal before the terminal leaves factory.
In addition, before the terminal is turned on, only the key system partition of the terminal may be checked, or different refined security partitions of the terminal security region may only store the checking information of the key system partition, and the security region does not store the checking information of the common partition, and the key system partition generally refers to a partition storing the terminal built-in software and the system configuration file, such as an operating system partition outside the terminal kernel memory, a kernel memory Boot partition, and as described in the specific embodiment, the refined security partition of the security region may be a first refined security partition, a second refined security partition, a third refined security partition, and so on, wherein, the checking information of the terminal Boot partition may be stored in the first refined security partition, the checking information of the system partition and so on may be stored in the second refined security partition, and the refined security partitions correspond to the terminal system partition one to one, as shown in fig. 6, the refined safety partition can be further divided into refined safety sub-partitions corresponding to the sub-system partitions of the terminal system partition, such as sub-Boot partitions of the Boot partition, and the refined safety partition can be further divided into a title refined safety partition, a content refined safety partition and the like.
In addition, check information is stored in different refining partitions of the security region, the check information comprises file or program capacity size and quantity information corresponding to different system partitions of the terminal, and when the terminal is detected to be started, the file size and quantity information of the different system partitions stored in the different refining security partitions can be acquired. In addition to the check information, as shown in fig. 5, different first-type root information is stored in different refined security partitions in the security region, where the first-type root information includes first-type root identifiers, and the first-type root identifiers may be letters and the like, the first-type root values indicate the times that the system partitions corresponding to the terminals are changed or the roots are changed, and the first-type root information corresponding to different terminal system partitions is different, for example, the first-type root identifiers of the Boot partitions may be a, the first-type root values may be 0, that is, the first-type root values are 0, that indicates that the Boot partitions have not been changed, the first-type root identifiers of the system partitions may be B, the first-type root values may be 1, and that the first-type root values are 1, that the system partitions have been changed for one time and the like.
Before acquiring first-class root values of different terminal system partitions recorded in a security area, a service provider checks first-class root identifications corresponding to the first-class root values, wherein the first-class root identifications can be represented by a specific character or a character string, the first-class root values corresponding to the first-class root identifications are considered to be valid only when the first-class root identifications are correct, the first-class root values corresponding to the first-class root identifications are invalid and can not be adopted when the first-class root identifications are detected to be wrong, if the service provider acquires the first-class root values of the terminal Boot partitions, the first-class root identifications corresponding to the Boot partitions are acquired firstly, such as A, if the first-class root identifications of the Boot partitions are confirmed to be correct, the first-class root values of the Boot partitions are acquired based on the first-class root identifications A of the Boot partitions, the first-class root values of the Boot partitions are recorded and adopted, if the first-class root identifications corresponding to the Boot partitions are not correct, the first-class root identifications of the Boot partitions are not corrected, it is not adopted.
Step S20, respectively carrying out feature verification on different system partitions of the terminal according to the verification information;
specifically, before the terminal leaves a factory, that is, before a system or software built in the terminal is not changed, the verification information existing in the terminal security area includes the size and the number of files or programs corresponding to different system partitions of the terminal, and when it is detected that the terminal is turned on, the verification information is called to perform feature verification on the terminal. For example, if the Boot partition of the terminal corresponds to the first refined security partition in the security domain, the check information in the first refined security partition is called to check the Boot partition, and if the system partition of the terminal corresponds to the second refined security partition, the check information in the second refined security partition in the security domain of the terminal is called to check the system partition when the system partition of the terminal is checked.
The specific process of the verification is as follows: calling the number of files corresponding to the terminal system partition stored in the refined safety partition, comparing the number of files with the number of files counted by the current system partition of the terminal, calling the file capacity size corresponding to the terminal system partition stored in the refined safety partition, comparing the file capacity size with the file capacity size of the terminal system partition, when the number or size of the files in the terminal system partition is detected to be different from the number or size of the files stored in the refined safety partition of the safety partition, the verification fails, and when the number or size of the files in the terminal system partition is completely the same as the file capacity size or size stored in the refined safety partition of the safety partition, the partition is considered to be not root-free, and the verification succeeds.
Step S30, when detecting that the feature verification corresponding to any system partition fails, modifying the first type root information corresponding to the system partition with the failed feature verification in the security area to prompt the change of the system information of the system partition with the failed feature verification.
When detecting that the feature verification corresponding to any system partition fails, modifying first-type root information corresponding to the feature verification failed system partition in the security region, wherein the specific step of modification can be that a refined security partition corresponding to the feature verification failed system partition is searched based on the feature verification failed system partition, if the verification information of a terminal system partition is stored in a second refined security partition in the security region and the verification information of a terminal Boot partition is stored in a first refined security partition of the terminal, searching the second refined security partition based on the system partition, searching the first refined security partition based on the Boot partition, and searching the first-type root information in different refined security partitions for modification.
The first-type Root information is modified, wherein the first-type Root identification of different system partitions can be represented by system partitions and magic numbers Root _ flag _ magic, the first-type Root values of different system partitions can be represented by the system partitions and the Root _ flag, if the Boot-type Root identifications and the magic numbers Root _ flag _ magic, the Boot-type Root identifications of different system partitions are represented by the Boot-type partitions and the Root _ flag, the Boot-type Root identifications of the different system partitions are represented by the Root _ flag, the Boot-type Root identifications of the Boot-type Root partitions are represented by the Root times, the Boot-type partition is represented by the Boot-type Root times of the Boot-type partitions, the Boot-type Root times of the Boot-type partitions are not represented by the Root times, and when the Boot-type partition values are increased, the Boot-type Root times of the Boot partitions are represented by the Root times. And prompting the change of Boot partition system information.
According to the technical scheme, the terminal system change identification method comprises the steps that when the terminal is detected to be started, verification information of different system partitions of the terminal in a safety area is obtained; respectively carrying out characteristic verification on the system partitions corresponding to the terminals according to the verification information; when detecting that the characteristic verification corresponding to any system partition fails, modifying the first type of root information corresponding to the system partition with the failed characteristic verification in the security region to prompt the change of the system information of the system partition with the failed characteristic verification. The method comprises the steps that a safety region is arranged on a terminal, first-class root information and verification information corresponding to a terminal system partition are stored in the safety region, the first-class root information comprises a root mark and a numerical value corresponding to the root, when the terminal is started, a system or software built in the terminal is verified according to the verification information stored in the safety region, if verification failure is detected, the system or software corresponding to the verification failure of the terminal is modified, and therefore the terminal records the modification in the safety region. A manufacturer or a service provider obtains the change value of the root number corresponding to the root identification, namely the number of times of modifying the terminal software and the real state of the terminal software can be counted by big data, if the terminal software or the system has problems, the modified information of the terminal can be obtained based on the first type of root information, and therefore the technical problems that the real state of the terminal software is counted by big data after sale and the stability of the terminal system is difficult to maintain are solved.
Further, on the basis of the first embodiment of the terminal system change identification method of the present invention, a second embodiment of the terminal system change identification method is provided, in the second embodiment, root information of a second type is stored in the security area, the terminal state includes a locked flush mode state, and the terminal system change identification method further includes:
when the terminal is detected to be in a locking flashing mode state, monitoring an unlocking module corresponding to the terminal in the state;
and if the unlocking of the terminal in the locking flashing mode is detected to be successful, changing the corresponding second type root information in the safety area so as to record the change of the system information of the terminal in the locking flashing mode.
The terminal flashing mode comprises multiple modes, such as a fast starting fastboot mode and the like, the flashing mode can be locked through modification of a corresponding code of the terminal flashing mode, in the locking flashing mode state, if a user does not unlock the terminal and cannot flash the terminal, when the terminal is detected to enter the locking flashing mode, an unlocking module corresponding to the terminal in the flashing mode is monitored, in the process of monitoring the unlocking module, if the terminal in the locking flashing mode is detected to be unlocked or successfully unlocked, second type of root information corresponding to the terminal in the flashing mode is changed in a safe area, and change of system information of the terminal in the flashing mode is recorded. The second type of root information includes an unlocking root identifier and an unlocking root numerical value, as shown in fig. 4, if it is detected that the unlocking of the terminal is successful in the locking and flashing mode state, the step of changing the corresponding second type of root information in the security region includes:
when an unlocking instruction is detected, acquiring an unlocking password of an input terminal, and verifying the unlocking password;
when the unlocking password passes the verification, acquiring a corresponding unlocking root identifier in the security region;
and when the unlocking root identification is based, changing the unlocking root numerical value corresponding to the unlocking root identification.
When an unlocking instruction is detected at a terminal, an unlocking password input by a user is obtained, the unlocking password is verified according to a password pre-stored in the terminal, when the verification is passed, an unlocking root mark corresponding to the terminal in a locking and flashing mode state in a safe area is obtained, the unlocking root mark can be represented by an unlocked magic number unlock _ magic, an unlocking root value is obtained based on the unlocking root mark, frequency increasing processing is carried out on the unlocking root value, and the unlocking root can be represented by an unlock _ flag.
In this embodiment, when it is detected that the terminal is in the locked flashing mode state, an unlocking module corresponding to the terminal in the state is monitored; and if the unlocking of the terminal in the locking flashing mode is detected to be successful, changing the corresponding second type root information in the safety area so as to record the change of the system information of the terminal in the locking flashing mode. Therefore, the root information of the terminal can be acquired and the state information of the terminal can be counted in the terminal flashing mode, and the difficulty of maintaining the stability of the terminal system after sale is reduced.
Further, on the basis of the first embodiment of the method for identifying a change of a terminal system, a third embodiment of the method for identifying a change of a terminal system is provided, and in the third embodiment, when it is detected that the verification of the feature corresponding to any system partition fails, the step of modifying the first type of root information corresponding to the system partition with the failed verification of the feature in the security area includes:
and recording the detailed content of the system information change corresponding to the system partition with the failed characteristic verification.
In this embodiment, the detailed content of the system information change corresponding to the failed feature verification partition is further recorded, when a failure of feature verification is detected, the file or program of the failed verification system partition is acquired, and the file or program of the failed verification system partition is called to the secure area for saving, and if it is detected that the failed verification system partition is modified for multiple times, the latest file or program of the failed verification system partition is saved to the secure area.
In the embodiment, the detailed content of the system information change corresponding to the failure zone is verified by recording the characteristics, so that a service provider can more specifically acquire the real state of the terminal software and the factors for maintaining the stability of the terminal system, and the difficulty of after-sale maintenance or big data statistics is reduced.
Further, on the basis of the first embodiment of the method for identifying a change in a terminal system according to the present invention, a fourth embodiment of the method for identifying a change in a terminal system is provided, in the fourth embodiment, partition header information and partition content information are stored in a partition of the terminal system, the verification information includes header verification information and content verification information, and the step of performing feature verification on the system partition corresponding to the terminal according to the verification information includes:
performing characteristic verification on the partition header information of the system partition corresponding to the terminal according to the header verification information of the safe area;
and when the verification is passed, performing characteristic verification on the partition content information of the system partition corresponding to the terminal according to the content verification information of the safe area.
When detecting that the terminal is started for the first time, writing the partition title information of different system partitions of the terminal into a title refinement secure partition; and refining the partition title information corresponding to the safe partition according to different titles, and setting a corresponding partition title root identifier and a partition title root numerical value. When the terminal is started for the first time, the terminal writes the content file quantity or size information of different system partitions into content thinning security partitions of a security region, sets content initial root identifications corresponding to the different terminal system partitions of the content thinning security partitions and content initial root values, when different system partitions of the terminal are verified, firstly, the title information of a system corresponding to the partition of the terminal is verified according to the title verification information of the security region, when the verification fails, the verification process is finished, when the verification of the title information of the system corresponding to the partition of the terminal is successful, the verification of the system content information of the partition of the terminal is continued, when the verification of the system content information of the partition of the system is successful, the terminal system is not changed, and when the verification of the system content information of the partition of the system fails, the terminal system is changed.
In the embodiment, the characteristic verification is carried out on the partition header information of the system partition corresponding to the terminal according to the header verification information of the safe area; and when the verification is passed, performing characteristic verification on the partition content information of the system partition corresponding to the terminal according to the content verification information of the safe area. Therefore, the checking times are effectively saved, and the energy consumption is reduced.
Further, on the basis of the first embodiment of the method for identifying a change of a terminal system, a fifth embodiment of the method for identifying a change of a terminal system is provided, and in the fifth embodiment, the step of prompting a change of the system information of the system partition with the failed feature verification includes:
monitoring the partition characteristic verification states of different systems of the terminal, and controlling the terminal to be normally started when detecting that the partition characteristic verification of different systems of the terminal is completed.
And monitoring the partition characteristic verification states of different systems of the terminal in real time, and controlling the terminal to be normally started when detecting that the partition characteristic verification of different systems of the terminal is completed. In addition, if the terminal is detected to be successfully unlocked in the locking flashing mode state, the corresponding second type root information is changed in the safe area so as to record that the terminal enters a normal flashing process after the step of changing the system information of the terminal in the locking flashing mode. Whether the verification of the different system partitions of the terminal is successful or failed, when the verification of the different system partitions of the terminal is detected to be completed, the terminal is controlled to be normally started, namely, the startup of the terminal is not influenced by the verification process.
In this embodiment, when it is detected that the verification of the different system partitions of the terminal is completed, the terminal is controlled to be normally started, that is, the terminal starting experience is not affected in the verification process of the present invention, so that the user experience is improved.
As shown in fig. 7, fig. 7 is a schematic terminal structure diagram of a hardware operating environment according to an embodiment of the present invention.
The terminal system change identification device of the embodiment of the invention can be a PC, and can also be a mobile terminal device with a display function, such as a smart phone, a tablet computer, an electronic book reader, an MP3(Moving Picture Experts Group Audio Layer III, dynamic video Experts compression standard Audio Layer 3) player, an MP4(Moving Picture Experts Group Audio Layer IV, dynamic video Experts compression standard Audio Layer 3) player, a portable computer and the like.
As shown in fig. 7, the terminal system change identifying means may include: a processor 110, such as a CPU, a memory 109, and a communication bus 1002. Wherein the communication bus 1002 is used for implementing connection communication between the processor 110 and the memory 109. The memory 109 may be a high-speed RAM memory or a non-volatile memory (e.g., a disk memory). The memory 109 may alternatively be a storage device separate from the processor 110 described above.
Optionally, the terminal system change recognition device may further include a camera, an RF (Radio Frequency) unit 101, a sensor 105, an audio circuit, a WiFi module 102, and the like. Among other things, sensors 105 such as light sensors, motion sensors, and other sensors. Specifically, the light sensor may include an ambient light sensor that may adjust the brightness of the display screen according to the brightness of ambient light, and a proximity sensor that may turn off the display screen and/or the backlight when the mobile terminal is moved to the ear. As one of the motion sensors, the gravity acceleration sensor can detect the magnitude of acceleration in each direction (generally, three axes), detect the magnitude and direction of gravity when the mobile terminal is stationary, and can be used for applications (such as horizontal and vertical screen switching, related games, magnetometer attitude calibration), vibration recognition related functions (such as pedometer and tapping) and the like for recognizing the attitude of the mobile terminal; of course, the mobile terminal may also be configured with other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which are not described herein again.
Those skilled in the art will appreciate that the configuration of the end system change recognition device shown in fig. 7 does not constitute a limitation of the end system change recognition device and may include more or less components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 7, the memory 109, which is a kind of computer storage medium, may include therein an operating system, a network communication module, and a terminal system change recognition program. The operating system is a program for managing and controlling hardware and software resources of the terminal system change identification device, and supports the operation of the terminal system change identification program and other software and/or programs. The network communication module is used for realizing communication among the components in the memory 109 and communication with other hardware and software in the terminal system change recognition device.
In the terminal system change recognition apparatus shown in fig. 7, the terminal system change recognition program is applicable to a server, and the processor 110 is configured to execute the terminal system change recognition program stored in the memory 109, and implement the following steps:
when the terminal is detected to be started, acquiring verification information of different system partitions of the terminal in a security area;
respectively carrying out characteristic verification on the system partitions corresponding to the terminals according to the verification information;
when detecting that the characteristic verification corresponding to any system partition fails, modifying the first type of root information corresponding to the system partition with the failed characteristic verification in the security region to prompt the change of the system information of the system partition with the failed characteristic verification.
Further, a second type of root information is stored in the security area, the terminal state includes a locked flashing mode state, and the terminal system change identification method further includes:
when the terminal is detected to be in a locking flashing mode state, monitoring an unlocking module corresponding to the terminal in the state;
and if the unlocking of the terminal in the locking flashing mode is detected to be successful, changing the corresponding second type root information in the safety area so as to record the change of the system information of the terminal in the locking flashing mode.
Further, the second type of root information includes an unlocking root identifier and an unlocking root numerical value, and if it is detected that the unlocking of the terminal is successful in the locking and flashing mode state, the step of changing the corresponding second type of root information in the secure area includes:
when an unlocking instruction is detected, acquiring an unlocking password of an input terminal, and verifying the unlocking password;
when the unlocking password passes the verification, acquiring a corresponding unlocking root identifier in the security region;
and when the unlocking root identification is based, changing the unlocking root numerical value corresponding to the unlocking root identification.
Further, when it is detected that the feature verification corresponding to any system partition fails, after the step of modifying the first type of root information corresponding to the system partition with the failed feature verification in the security region, the method includes:
and recording the detailed content of the system information change corresponding to the system partition with the failed characteristic verification.
Further, the security area includes a refined security partition, partition header information is stored in the terminal system partition, and the terminal system change identification method further includes:
when detecting that the terminal is started for the first time, writing the partition title information of different system partitions of the terminal into a title refinement secure partition;
and refining the partition title information corresponding to the safe partition according to different titles, and setting a corresponding partition title root identifier and a partition title root numerical value.
Further, partition header information and partition content information are stored in the terminal system partition, the verification information includes header verification information and content verification information, and the step of performing feature verification on the system partition corresponding to the terminal according to the verification information includes:
performing characteristic verification on the partition header information of the system partition corresponding to the terminal according to the header verification information of the safe area;
and when the verification is passed, performing characteristic verification on the partition content information of the system partition corresponding to the terminal according to the content verification information of the safe area.
Further, after the step of prompting the change of the system information of the system partition with the failed characteristic check, the method includes:
monitoring the partition characteristic verification states of different systems of the terminal, and controlling the terminal to be normally started when detecting that the partition characteristic verification of different systems of the terminal is completed.
Furthermore, each safety partition is arranged in the safety area, and the safety partitions are expanded according to the attributes of different system partitions of the terminal.
The specific implementation of the terminal system change identification device of the present invention is basically the same as the embodiments of the terminal system change identification method, and is not described herein again.
The present invention provides a readable storage medium storing one or more programs, the one or more programs further executable by one or more processors for:
when the terminal is detected to be started, acquiring verification information of different system partitions of the terminal in a security area;
respectively carrying out characteristic verification on the system partitions corresponding to the terminals according to the verification information;
when detecting that the characteristic verification corresponding to any system partition fails, modifying the first type of root information corresponding to the system partition with the failed characteristic verification in the security region to prompt the change of the system information of the system partition with the failed characteristic verification.
Further, a second type of root information is stored in the security area, the terminal state includes a locked flashing mode state, and the terminal system change identification method further includes:
when the terminal is detected to be in a locking flashing mode state, monitoring an unlocking module corresponding to the terminal in the state;
and if the unlocking of the terminal in the locking flashing mode is detected to be successful, changing the corresponding second type root information in the safety area so as to record the change of the system information of the terminal in the locking flashing mode.
Further, the second type of root information includes an unlocking root identifier and an unlocking root numerical value, and if it is detected that the unlocking of the terminal is successful in the locking and flashing mode state, the step of changing the corresponding second type of root information in the secure area includes:
when an unlocking instruction is detected, acquiring an unlocking password of an input terminal, and verifying the unlocking password;
when the unlocking password passes the verification, acquiring a corresponding unlocking root identifier in the security region;
and when the unlocking root identification is based, changing the unlocking root numerical value corresponding to the unlocking root identification.
Further, when it is detected that the feature verification corresponding to any system partition fails, after the step of modifying the first type of root information corresponding to the system partition with the failed feature verification in the security region, the method includes:
and recording the detailed content of the system information change corresponding to the system partition with the failed characteristic verification.
Further, the security area includes a refined security partition, partition header information is stored in the terminal system partition, and the terminal system change identification method further includes:
when detecting that the terminal is started for the first time, writing the partition title information of different system partitions of the terminal into a title refinement secure partition;
and refining the partition title information corresponding to the safe partition according to different titles, and setting a corresponding partition title root identifier and a partition title root numerical value.
Further, partition header information and partition content information are stored in the terminal system partition, the verification information includes header verification information and content verification information, and the step of performing feature verification on the system partition corresponding to the terminal according to the verification information includes:
performing characteristic verification on the partition header information of the system partition corresponding to the terminal according to the header verification information of the safe area;
and when the verification is passed, performing characteristic verification on the partition content information of the system partition corresponding to the terminal according to the content verification information of the safe area.
Further, after the step of prompting the change of the system information of the system partition with the failed characteristic check, the method includes:
monitoring the partition characteristic verification states of different systems of the terminal, and controlling the terminal to be normally started when detecting that the partition characteristic verification of different systems of the terminal is completed.
Furthermore, each safety partition is arranged in the safety area, and the safety partitions are expanded according to the attributes of different system partitions of the terminal.
The specific implementation manner of the readable storage medium of the present invention is substantially the same as that of each embodiment of the above-mentioned method for identifying a change of a terminal system, and is not described herein again.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (9)

1. A terminal system change identification method is characterized in that a terminal is provided with a safe area, first-type root information and verification information are stored in the safe area, and the terminal system change identification method comprises the following steps:
when the terminal is detected to be started, acquiring verification information of different system partitions of the terminal in a security area;
respectively carrying out characteristic verification on the system partitions corresponding to the terminals according to the verification information;
when detecting that the characteristic verification corresponding to any system partition fails, modifying first-type root information corresponding to the system partition with the failed characteristic verification in a security region to prompt the change of the system information of the system partition with the failed characteristic verification;
the second type of root information is stored in the safety area, the terminal state comprises a locking flashing mode state, and the terminal system change identification method further comprises the following steps:
when the terminal is detected to be in a locking flashing mode state, monitoring an unlocking module corresponding to the terminal in the state;
and if the unlocking of the terminal in the locking flashing mode is detected to be successful, changing the corresponding second type root information in the safety area so as to record the change of the system information of the terminal in the locking flashing mode.
2. The method for identifying system change of a terminal according to claim 1, wherein the second type of root information includes an unlock root identifier and an unlock root value, and the step of changing the corresponding second type of root information in the security area when detecting that the terminal is successfully unlocked in the lock flush mode state includes:
when an unlocking instruction is detected, acquiring an unlocking password of an input terminal, and verifying the unlocking password;
when the unlocking password passes the verification, acquiring a corresponding unlocking root identifier in the security region;
and when the unlocking root identification is based, changing the unlocking root numerical value corresponding to the unlocking root identification.
3. The method for identifying system change in claim 1, wherein when detecting that the feature check corresponding to any system partition fails, the step of modifying the first type root information corresponding to the system partition with failed feature check in the security region comprises the following steps:
and recording the detailed content of the system information change corresponding to the system partition with the failed characteristic verification.
4. The method for recognizing a change in a terminal system according to claim 1, wherein the secure area includes a refined secure partition in which partition header information is stored, and further comprising:
when detecting that the terminal is started for the first time, writing the partition title information of different system partitions of the terminal into a title refinement secure partition;
and refining the partition title information corresponding to the safe partition according to different titles, and setting a corresponding partition title root identifier and a partition title root numerical value.
5. The method for identifying changes to a terminal system according to claim 1, wherein partition header information and partition content information are stored in the partition of the terminal system, the verification information includes header verification information and content verification information, and the step of performing the feature verification on the system partitions corresponding to the terminals respectively according to the verification information includes:
performing characteristic verification on the partition header information of the system partition corresponding to the terminal according to the header verification information of the safe area;
and when the verification is passed, performing characteristic verification on the partition content information of the system partition corresponding to the terminal according to the content verification information of the safe area.
6. The method for identifying a change in a terminal system according to claim 1, wherein the step of prompting the change in the partition system information of the system with failed characteristic check is followed by:
monitoring the partition characteristic verification states of different systems of the terminal, and controlling the terminal to be normally started when detecting that the partition characteristic verification of different systems of the terminal is completed.
7. The method for identifying changes to an end system of any of claims 1-6, wherein different refined security zones within the security domain of the end are augmented according to the attributes of different system zones of the end.
8. An apparatus for recognizing a change of a terminal system, the apparatus comprising: a memory, a processor, a communication bus and a terminal system change recognition program stored on the memory:
the communication bus is used for realizing connection communication between the processor and the memory;
the processor is configured to execute the terminal system change identification program to implement the steps of the terminal system change identification method according to any one of claims 1 to 7.
9. A readable storage medium, characterized in that the readable storage medium has stored thereon an end system change recognition program, which when executed by a processor implements the steps of the end system change recognition method according to any one of claims 1 to 7.
CN201710518601.5A 2017-06-27 2017-06-27 Terminal system change identification method and device and readable storage medium Active CN107346392B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710518601.5A CN107346392B (en) 2017-06-27 2017-06-27 Terminal system change identification method and device and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710518601.5A CN107346392B (en) 2017-06-27 2017-06-27 Terminal system change identification method and device and readable storage medium

Publications (2)

Publication Number Publication Date
CN107346392A CN107346392A (en) 2017-11-14
CN107346392B true CN107346392B (en) 2021-09-21

Family

ID=60256590

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710518601.5A Active CN107346392B (en) 2017-06-27 2017-06-27 Terminal system change identification method and device and readable storage medium

Country Status (1)

Country Link
CN (1) CN107346392B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109151809B (en) * 2018-07-12 2021-12-03 维沃移动通信有限公司 Mobile terminal detection method and mobile terminal
CN109582348A (en) * 2018-11-22 2019-04-05 Tcl移动通信科技(宁波)有限公司 Processing method, mobile terminal and storage medium is arranged in mobile terminal radio frequency
CN113472465A (en) * 2020-09-03 2021-10-01 中国铁路通信信号上海工程局集团有限公司 New generation communication big data intelligent broadcasting system
CN114138343A (en) * 2020-09-04 2022-03-04 青岛海信移动通信技术股份有限公司 Terminal and terminal starting method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104065482A (en) * 2014-06-06 2014-09-24 宇龙计算机通信科技(深圳)有限公司 Method and device for improving terminalself-flashing safety through ciphertext handshaking
CN104217137A (en) * 2014-08-29 2014-12-17 广东欧珀移动通信有限公司 Method and device for identifying whether intelligent terminal system is changed
CN105373747A (en) * 2015-12-09 2016-03-02 上海斐讯数据通信技术有限公司 File generation method, file verification method and systems for preventing system from being tampered
CN105468477A (en) * 2015-11-20 2016-04-06 青岛海信移动通信技术股份有限公司 Android system protection method and apparatus

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104065482A (en) * 2014-06-06 2014-09-24 宇龙计算机通信科技(深圳)有限公司 Method and device for improving terminalself-flashing safety through ciphertext handshaking
CN104217137A (en) * 2014-08-29 2014-12-17 广东欧珀移动通信有限公司 Method and device for identifying whether intelligent terminal system is changed
CN105468477A (en) * 2015-11-20 2016-04-06 青岛海信移动通信技术股份有限公司 Android system protection method and apparatus
CN105373747A (en) * 2015-12-09 2016-03-02 上海斐讯数据通信技术有限公司 File generation method, file verification method and systems for preventing system from being tampered

Also Published As

Publication number Publication date
CN107346392A (en) 2017-11-14

Similar Documents

Publication Publication Date Title
CN107357704B (en) Application program detection method, terminal and computer readable storage medium
CN108040159B (en) Restart positioning method based on hardware drive, mobile terminal and readable storage medium
CN107346392B (en) Terminal system change identification method and device and readable storage medium
CN109600740B (en) File downloading method and device and computer readable storage medium
CN107329865B (en) Method for opening adb function of debugging bridge, mobile terminal and computer readable medium
CN108769976B (en) Network attachment control method and device and mobile terminal
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN108282834B (en) Method for accessing terminal to LTE network and terminal
CN107493378B (en) Method and device for logging in application program, computer equipment and readable storage medium
CN107563158B (en) Method, device and computer readable storage medium for displaying hidden application icon
CN107094303B (en) Terminal network registration method, device and computer readable storage medium
CN107832032B (en) Screen locking display method and mobile terminal
CN107682540B (en) Picture processing method, terminal and computer readable storage medium
CN109766119B (en) Recovery partition upgrade method, terminal and computer readable storage medium
CN108446574B (en) Data query method, terminal and computer readable storage medium
CN108513010B (en) Terminal unlocking method, terminal and computer readable storage medium
CN108121681B (en) Hot plug implementation method, terminal and storage medium
CN107168747B (en) Method and device for distinguishing mobile terminal configuration and computer readable storage medium
CN107194217B (en) User data access control method, apparatus and computer-readable storage medium
CN107135498B (en) File sharing method and equipment
CN113094670A (en) Privacy protection method, terminal and storage medium
CN108400994B (en) User authentication method, mobile terminal, server, and computer-readable storage medium
CN108845821B (en) Application program updating method, terminal and computer readable storage medium
CN108108054B (en) Method, apparatus and computer-readable storage medium for predicting user sliding operation
CN107992564B (en) Login verification processing method, mobile terminal and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant