CN107729198A - A kind of Android system firmware method of calibration and device - Google Patents

A kind of Android system firmware method of calibration and device Download PDF

Info

Publication number
CN107729198A
CN107729198A CN201710971482.9A CN201710971482A CN107729198A CN 107729198 A CN107729198 A CN 107729198A CN 201710971482 A CN201710971482 A CN 201710971482A CN 107729198 A CN107729198 A CN 107729198A
Authority
CN
China
Prior art keywords
content
android
partitioning content
file
img
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710971482.9A
Other languages
Chinese (zh)
Other versions
CN107729198B (en
Inventor
汤冬勇
王道汉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Hezong Fu Technology Co Ltd
Original Assignee
Shenzhen Hezong Fu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Hezong Fu Technology Co Ltd filed Critical Shenzhen Hezong Fu Technology Co Ltd
Priority to CN201710971482.9A priority Critical patent/CN107729198B/en
Priority to PCT/CN2017/109774 priority patent/WO2019075800A1/en
Publication of CN107729198A publication Critical patent/CN107729198A/en
Application granted granted Critical
Publication of CN107729198B publication Critical patent/CN107729198B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/22Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
    • G06F11/2273Test methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/22Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
    • G06F11/2284Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing by power-on test, e.g. power-on self test [POST]

Abstract

The present invention relates to Android system technical field, and disclosing a kind of Android system firmware method of calibration and device, this method includes:Start image file boot.img, read system partitioning content;Legitimacy verifies are carried out to system check file verity.img;If legitimacy verifies success, system partitioning content described in carry, and completeness check is carried out to the system partitioning content;If completeness check success, then mark is provided with user data area, pass through the read operation to system partitioning content, by the file copy read into null device, reach the effect for starting and verifying and synchronously perform, improve execution speed, and mark is completed to be verified by reading, the verification that Android the superiors system just completes integrality and legitimacy before starting shooting into normal operating condition is realized, reaches and meets purposes of the PCI5.0 to terminal firmware startup self-detection standard.

Description

A kind of Android system firmware method of calibration and device
Technical field
The present invention relates to Android system technical field, more particularly to a kind of Android system firmware method of calibration and device.
Background technology
Android intelligence POS terminal is all to take dual chip scheme at present, safety chip+application chip(Non-security core Piece)Mode, safety chip all possesses safe ROMboot mechanism in itself, can be used for verifying the firmware of user, and applies core Piece is without this mechanism, to meet the safety of the Android system firmware operated on application chip, currently used side Method has two kinds:
1st, come pair by the way that by key storage, at safety chip end, safety chip can access Android system firmware storage region Firmware in android system is verified one by one, and the firmware for ensureing to operate in Android ends is legal, safe, the party In method, the verification of Android system firmware places one's entire reliance upon safety chip;This method can fully meet PCI5.0 to firmware self-test Standard requirement, just loaded after the completion of all verifications Android system firmware operation.But due to needing safety chip control With access application chip, need to increase the circuit of safety chip read access application chip storage medium in hardware design, it is soft The driving of increase safety chip read access application chip storage medium is needed on part, design and reality are all brought on soft and hardware Existing complexity, simultaneously because application chip end firmware needs to wait safety chip to verify and could run, and cause starting up of terminal Speed is very slow.
2nd, by increasing fuse mechanism at Android ends to ensure the safety of Android ends bottom firmware and key, on The dm-verity mechanism that layer is then carried using Android is verified to system firmware to ensure the conjunction of Android system firmware Method and security, safety chip and application chip are independent, and the verification of Android system firmware is without relying on safe core Piece, two chips are separate.This method realizes safety chip and using core by increasing fuse mechanism at application chip end The independence of piece, reduce the complexity of hardware design, but because the verification mode realized on software in android system is The dm-verity mechanism carried using Android, although can meet and ensure that only legal firmware can just download to application Die terminals, and ensure that normal starting up of terminal speed, but be not enough to fully meet PCI5.0 when being run to system firmware Carve the requirement of self-test, therefore, to assure that ability load operating after all firmwares of android system are verified, and dm-verity It is intended merely to improve the speed of service and uses system operation and needing just to be verified when loading which subregion to corresponding subregion.
The content of the invention
It is a primary object of the present invention to propose a kind of Android system firmware method of calibration and device, by system The read operation of partition content, by the file copy read into null device, reach the effect for starting and verifying and synchronously perform, Improve execution speed, and mark completed to be verified by reading, realize Android the superiors system start shooting into Enter just to complete before normal operating condition the verification of integrality and legitimacy, reach meet PCI5.0 to terminal firmware start from The purpose of inspection standard.
To achieve the above object, a kind of Android system firmware method of calibration provided by the invention, including:
Start image file boot.img, read system partitioning content;
Legitimacy verifies are carried out to system check file verity.img;
If legitimacy verifies success, system partitioning content described in carry, and integrality school is carried out to the system partitioning content Test;
If completeness check success, mark is provided with user data area.
Alternatively, system partitioning content described in the carry, and completeness check bag is carried out to the system partitioning content Include:
Carry system partitioning content;
The system partitioning content is copied in null device, while Hash calculation is carried out to the file in system partitioning content, And compared with corresponding Hash tree, if cryptographic Hash is different, System self-test failure is out of service;
If cryptographic Hash is the same, continue to carry out Hash calculation to next file of system partitioning content, until having replicated system The All Files of partition content.
Alternatively, it is described also to include after user data area is provided with mark:
Run android system desktop starter Launcher;
Judge to whether there is complement mark in the user data area, if, then it represents that system firmware verifies successfully, into normal Running status, while remove the complement mark;
Otherwise, System self-test fails, out of service.
Alternatively, it is described that system check file verity.img is carried out after legitimacy verifies also to include:
If legitimacy verifies are unsuccessful, System self-test failure is out of service.
Alternatively, the image file boot.img includes kernel kernel and virtual flash disk ramdisk.
As another aspect of the present invention, there is provided a kind of Android system firmware calibration equipment, including:
Read module, for starting image file boot.img, read system partitioning content;
Legitimacy verifies module, for carrying out legitimacy verifies to system check file verity.img;
Completeness check module, if for legitimacy verifies success, system partitioning content described in carry, and to the system point Area's content carries out completeness check;
Setup module, if for completeness check success, mark is provided with user data area.
Alternatively, the completeness check module includes:
Carry unit, for carry system partitioning content;
Copied cells, for the system partitioning content to be copied in null device, while to the file in system partitioning content Hash calculation is carried out, and compared with corresponding Hash tree, if cryptographic Hash is different, System self-test failure, stops fortune OK;
Traversal Unit, if the same for cryptographic Hash, continue to carry out Hash calculation to next file of system partitioning content, directly To the All Files for having replicated system partitioning content.
Alternatively, in addition to complete starting module, the starting module completely include:
UI running units, operation android system desktop starter Launcher;
Judging unit, for judging to whether there is complement mark in the user data area, if, then it represents that system firmware verifies Success, into normal operating condition, while removes the complement mark;
Fail self-test unit, for when complement mark is not present in the user data area, then it represents that System self-test fails, and stops Only run.
Alternatively, the fail self-test unit is additionally operable to:
If legitimacy verifies are unsuccessful, then it represents that System self-test fails, out of service.
Alternatively, the image file boot.img includes kernel kernel and virtual flash disk ramdisk.
A kind of Android system firmware method of calibration and device, this method proposed by the present invention include:Start image file Boot.img, read system partitioning content;Legitimacy verifies are carried out to system check file verity.img;If legitimacy verifies Success, then system partitioning content described in carry, and completeness check is carried out to the system partitioning content;If completeness check into Work(, then mark is provided with user data area, by the read operation to system partitioning content, the file copy that will be read Into null device, reach the effect for starting and verifying and synchronously perform, improve execution speed, and mark is completed to enter by reading Row verification, realize Android the superiors system and just complete integrality and conjunction before starting shooting into normal operating condition The verification of method, reach and meet purposes of the PCI5.0 to terminal firmware startup self-detection standard.
Brief description of the drawings
Fig. 1 is a kind of Android system firmware method of calibration flow chart that the embodiment of the present invention one provides;
Fig. 2 is the method flow diagram of step S30 in Fig. 1;
Fig. 3 is another Android system firmware method of calibration flow chart that the embodiment of the present invention one provides;
Fig. 4 is a kind of Android system firmware calibration equipment exemplary block diagram that the embodiment of the present invention two provides;
Fig. 5 is the exemplary block diagram of completeness check module in Fig. 4;
Fig. 6 is another Android system firmware calibration equipment exemplary block diagram that the embodiment of the present invention two provides;
Fig. 7 is the exemplary block diagram of complete starting module in Fig. 6.
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In follow-up description, the suffix using such as " module ", " part " or " unit " for representing element is only Be advantageous to the explanation of the present invention, itself do not have a specific meaning.Therefore, " module " can mixedly make with " part " With.
Embodiment one
As shown in figure 1, in the present embodiment, a kind of Android system firmware method of calibration, including:
S10, start image file boot.img, read system partitioning content;
S20, legitimacy verifies are carried out to system check file verity.img;
If legitimacy verifies success, into system partitioning content described in step S30, carry;If legitimacy verifies fail, enter Enter step S40, System self-test failure, it is out of service;
S50, completeness check is carried out to the system partitioning content;
If completeness check success, S60, in user data area is provided with mark;If completeness check fails, enter step Rapid S40, System self-test failure, it is out of service.
In the present embodiment, by the read operation to system partitioning content, by the file copy read to null device In, reach the effect for starting and verifying and synchronously perform, improve execution speed, and mark is completed to be verified by reading, Realize the school that Android the superiors system just completes integrality and legitimacy before starting shooting into normal operating condition Test, reach and meet purposes of the PCI5.0 to terminal firmware startup self-detection standard.
In the present embodiment, the image file boot.img starts the file mirrors that must be loaded for system, and it is wrapped Containing two parts, respectively kernel kernel and ramdisk.The entitled virtual flash disks of wherein ramdisk, it is by software by one Divide internal memory(RAM)A kind of technology for being modeled as hard disk to use.In start process, ramdisk can be first generated, is then performed Related content inside ramdisk carries out carry and related read operation to system subregions.Init.rc in ramdisk File is first init program parsing that system starts, and is responsible for the initialization operation of system, carry file system, starts Server services etc., we add the service of a reading system partition content in this document, and only allow unlatching one It is secondary
In the present embodiment, Android system subregions include:System partitioning content(System data contents)With system school File verity.img is tested, wherein, system check file verity.img includes again:Dm-verity mapping tbl, sig The files such as hash tree, start shooting carry system subregions when, it will verification system partition contents, but due to dm-verity's Principle simply just verifies when reading block contents to the block, so, in start process, only can first it verify Verity.img legitimacy, just can be corresponding to the content that is read when reading the related data inside system data Block regions verified.
As shown in Fig. 2 in the present embodiment, the step S30 includes:
S31, carry system partitioning content;
S32, the system partitioning content copied in null device, while Hash meter is carried out to the file in system partitioning content Calculate, and compared with corresponding Hash tree, if cryptographic Hash is different, System self-test failure is out of service;
If S33, cryptographic Hash are the same, continue to carry out Hash calculation to next file of system partitioning content, until having replicated The All Files of system partitioning content.
As shown in figure 3, in the present embodiment, also include after the step S60:
S70, operation android system desktop starter Launcher;
S80, judge to whether there is complement mark in the user data area, if so, then entering step S90, representing system firmware Verify successfully, into normal operating condition, while remove the complement mark;
Otherwise, fail into step S40, System self-test, it is out of service.
In the present embodiment, the method for calibration meets PCI5.0 firmware self-test standards, and meets to pay industry to Android The requirement of system firmware self-test.
Embodiment two
As shown in figure 4, in the present embodiment, a kind of Android system firmware calibration equipment, including:
Read module 10, for starting image file boot.img, read system partitioning content;
Legitimacy verifies module 20, for carrying out legitimacy verifies to system check file verity.img;
Completeness check module 30, if for legitimacy verifies success, system partitioning content described in carry, and to the system Partition content carries out completeness check;
Setup module 40, if for completeness check success, mark is provided with user data area.
In the present embodiment, by the read operation to system partitioning content, by the file copy read to null device In, reach the effect for starting and verifying and synchronously perform, improve execution speed, and mark is completed to be verified by reading, Realize the school that Android the superiors system just completes integrality and legitimacy before starting shooting into normal operating condition Test, reach and meet purposes of the PCI5.0 to terminal firmware startup self-detection standard.
In the present embodiment, the image file boot.img starts the file mirrors that must be loaded for system, and it is wrapped Containing two parts, respectively kernel kernel and ramdisk.The entitled virtual flash disks of wherein ramdisk, it is by software by one Divide internal memory(RAM)A kind of technology for being modeled as hard disk to use.In start process, ramdisk can be first generated, is then performed Related content inside ramdisk carries out carry and related read operation to system subregions.Init.rc in ramdisk File is first init program parsing that system starts, and is responsible for the initialization operation of system, carry file system, starts Server services etc., we add the service of a reading system partition content in this document, and only allow unlatching one It is secondary
In the present embodiment, Android system subregions include:System partitioning content(System data contents)With system school File verity.img is tested, wherein, system check file verity.img includes again:Dm-verity mapping tbl, sig The files such as hash tree, start shooting carry system subregions when, it will verification system partition contents, but due to dm-verity's Principle simply just verifies when reading block contents to the block, so, in start process, only can first it verify Verity.img legitimacy, just can be corresponding to the content that is read when reading the related data inside system data Block regions verified.
As shown in figure 5, in the present embodiment, the completeness check module includes:
Carry unit 31, for carry system partitioning content;
Copied cells 32, for the system partitioning content to be copied in null device, while to the text in system partitioning content Part carries out Hash calculation, and compared with corresponding Hash tree, if cryptographic Hash is different, System self-test failure, stops Operation;
Traversal Unit 33, if the same for cryptographic Hash, continue to carry out Hash calculation to next file of system partitioning content, All Files until having replicated system partitioning content.
As shown in fig. 6, in the present embodiment, a kind of Android system firmware calibration equipment also includes complete starting module 50, as shown in fig. 7, the starting module completely includes:
UI running units 51, operation android system desktop starter Launcher;
Judging unit 52, for judging to whether there is complement mark in the user data area, if, then it represents that system firmware school Success is tested, into normal operating condition, while removes the complement mark;
Fail self-test unit 53, for when complement mark is not present in the user data area, then it represents that System self-test fails, It is out of service.
In the present embodiment, the fail self-test unit is additionally operable to:
If legitimacy verifies are unsuccessful, then it represents that System self-test fails, out of service.
In the present embodiment, the method for calibration meets PCI5.0 firmware self-test standards, and meets to pay industry to Android The requirement of system firmware self-test.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to nonexcludability Include so that process, method, article or device including a series of elements not only include those key elements, but also Including the other element being not expressly set out, or also include for this process, method, article or device intrinsic want Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including the key element Process, method, other identical element also be present in article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment method can Realized by the mode of software plus required general hardware platform, naturally it is also possible to by hardware, but in many cases the former It is more preferably embodiment.Based on such understanding, technical scheme substantially makes tribute to prior art in other words The part offered can be embodied in the form of software product, and the computer software product is stored in a storage medium(Such as ROM/RAM, magnetic disc, CD)In, including some instructions are causing a station terminal equipment(It can be mobile phone, computer, service Device, air conditioner, or network equipment etc.)Perform the method described in each embodiment of the present invention.
The preferred embodiments of the present invention are these are only, are not intended to limit the scope of the invention, it is every to utilize this hair The equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills Art field, is included within the scope of the present invention.

Claims (10)

  1. A kind of 1. Android system firmware method of calibration, it is characterised in that including:
    Start image file boot.img, read system partitioning content;
    Legitimacy verifies are carried out to system check file verity.img;
    If legitimacy verifies success, system partitioning content described in carry, and integrality school is carried out to the system partitioning content Test;
    If completeness check success, mark is provided with user data area.
  2. 2. a kind of Android system firmware method of calibration according to claim 1, it is characterised in that described in the carry System partitioning content, and system partitioning content progress completeness check is included:
    Carry system partitioning content;
    The system partitioning content is copied in null device, while Hash calculation is carried out to the file in system partitioning content, And compared with corresponding Hash tree, if cryptographic Hash is different, System self-test failure is out of service;
    If cryptographic Hash is the same, continue to carry out Hash calculation to next file of system partitioning content, until having replicated system The All Files of partition content.
  3. 3. a kind of Android system firmware method of calibration according to claim 2, it is characterised in that described in number of users Being provided with according to area after mark also includes:
    Run android system desktop starter Launcher;
    Judge to whether there is complement mark in the user data area, if, then it represents that system firmware verifies successfully, into normal Running status, while remove the complement mark;
    Otherwise, System self-test fails, out of service.
  4. 4. a kind of Android system firmware method of calibration according to claim 1, it is characterised in that described to system school File verity.img is tested after legitimacy verifies also include:
    If legitimacy verifies are unsuccessful, System self-test failure is out of service.
  5. A kind of 5. Android system firmware method of calibration according to claim 1, it is characterised in that the image file Boot.img includes kernel kernel and virtual flash disk ramdisk.
  6. A kind of 6. Android system firmware calibration equipment, it is characterised in that including:
    Read module, for starting image file boot.img, read system partitioning content;
    Legitimacy verifies module, for carrying out legitimacy verifies to system check file verity.img;
    Completeness check module, if for legitimacy verifies success, system partitioning content described in carry, and to the system point Area's content carries out completeness check;
    Setup module, if for completeness check success, mark is provided with user data area.
  7. A kind of 7. Android system firmware calibration equipment according to claim 6, it is characterised in that the integrality school Testing module includes:
    Carry unit, for carry system partitioning content;
    Copied cells, for the system partitioning content to be copied in null device, while to the file in system partitioning content Hash calculation is carried out, and compared with corresponding Hash tree, if cryptographic Hash is different, System self-test failure, stops fortune OK;
    Traversal Unit, if the same for cryptographic Hash, continue to carry out Hash calculation to next file of system partitioning content, directly To the All Files for having replicated system partitioning content.
  8. 8. a kind of Android system firmware calibration equipment according to claim 7, it is characterised in that also include opening completely Dynamic model block, the starting module completely include:
    UI running units, operation android system desktop starter Launcher;
    Judging unit, for judging to whether there is complement mark in the user data area, if, then it represents that system firmware verifies Success, into normal operating condition, while removes the complement mark;
    Fail self-test unit, for when complement mark is not present in the user data area, then it represents that System self-test fails, and stops Only run.
  9. A kind of 9. Android system firmware calibration equipment according to claim 8, it is characterised in that the fail self-test Unit is additionally operable to:
    If legitimacy verifies are unsuccessful, then it represents that System self-test fails, out of service.
  10. A kind of 10. Android system firmware calibration equipment according to claim 6, it is characterised in that the image file Boot.img includes kernel kernel and virtual flash disk ramdisk.
CN201710971482.9A 2017-10-18 2017-10-18 Android system firmware verification method and device Active CN107729198B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710971482.9A CN107729198B (en) 2017-10-18 2017-10-18 Android system firmware verification method and device
PCT/CN2017/109774 WO2019075800A1 (en) 2017-10-18 2017-11-07 Firmware verification method and apparatus for android system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710971482.9A CN107729198B (en) 2017-10-18 2017-10-18 Android system firmware verification method and device

Publications (2)

Publication Number Publication Date
CN107729198A true CN107729198A (en) 2018-02-23
CN107729198B CN107729198B (en) 2020-04-21

Family

ID=61210724

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710971482.9A Active CN107729198B (en) 2017-10-18 2017-10-18 Android system firmware verification method and device

Country Status (2)

Country Link
CN (1) CN107729198B (en)
WO (1) WO2019075800A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108595981A (en) * 2018-05-09 2018-09-28 深圳市桑格尔科技股份有限公司 The method for encrypting Android system
CN108875358A (en) * 2018-06-08 2018-11-23 山东超越数控电子股份有限公司 A kind of android system safe starting method based on X86 platform
CN109460262A (en) * 2018-11-15 2019-03-12 深圳市网心科技有限公司 Verify method, system, Android device and the medium of main system image legitimacy
CN111083001A (en) * 2018-10-18 2020-04-28 杭州海康威视数字技术股份有限公司 Firmware abnormity detection method and device
CN111443950A (en) * 2018-12-29 2020-07-24 北京奇虎科技有限公司 Vehicle-mounted system safety starting method and vehicle-mounted system
CN114138344A (en) * 2020-09-04 2022-03-04 青岛海信移动通信技术股份有限公司 System checking method and terminal
WO2023077610A1 (en) * 2021-11-05 2023-05-11 锐凌无线有限责任公司 Data check method and apparatus, electronic device and computer readable storage medium
CN116661876A (en) * 2022-11-23 2023-08-29 荣耀终端有限公司 System starting method, file generating method, electronic equipment and server

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102981881A (en) * 2012-12-10 2013-03-20 中兴通讯股份有限公司 Method and system for preventing mobile terminal from being updated to illegal firmware version
CN103955648A (en) * 2014-05-15 2014-07-30 乐视致新电子科技(天津)有限公司 Method and device for verifying legality of system image
CN104348578A (en) * 2013-08-02 2015-02-11 腾讯科技(深圳)有限公司 Data processing method and device
CN104408370A (en) * 2014-12-25 2015-03-11 珠海全志科技股份有限公司 Android system security verification method and verification device thereof
CN105100039A (en) * 2015-04-21 2015-11-25 兰州大学 iSCSI-based data integrity storage system
CN105184186A (en) * 2015-09-08 2015-12-23 北京元心科技有限公司 Intelligent terminal file system protection method and intelligent terminal
CN105302708A (en) * 2014-06-30 2016-02-03 联发科技(新加坡)私人有限公司 Mobile terminal and detection method thereof
CN105574439A (en) * 2015-04-17 2016-05-11 宇龙计算机通信科技(深圳)有限公司 System disk verifying method and device
EP3026560A1 (en) * 2014-11-28 2016-06-01 Thomson Licensing Method and device for providing verifying application integrity
CN106227665A (en) * 2016-07-25 2016-12-14 青岛海信移动通信技术股份有限公司 A kind of equipment starting method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10073966B2 (en) * 2013-04-29 2018-09-11 Sri International Operating system-independent integrity verification

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102981881A (en) * 2012-12-10 2013-03-20 中兴通讯股份有限公司 Method and system for preventing mobile terminal from being updated to illegal firmware version
CN104348578A (en) * 2013-08-02 2015-02-11 腾讯科技(深圳)有限公司 Data processing method and device
CN103955648A (en) * 2014-05-15 2014-07-30 乐视致新电子科技(天津)有限公司 Method and device for verifying legality of system image
CN105302708A (en) * 2014-06-30 2016-02-03 联发科技(新加坡)私人有限公司 Mobile terminal and detection method thereof
EP3026560A1 (en) * 2014-11-28 2016-06-01 Thomson Licensing Method and device for providing verifying application integrity
CN104408370A (en) * 2014-12-25 2015-03-11 珠海全志科技股份有限公司 Android system security verification method and verification device thereof
CN105574439A (en) * 2015-04-17 2016-05-11 宇龙计算机通信科技(深圳)有限公司 System disk verifying method and device
CN105100039A (en) * 2015-04-21 2015-11-25 兰州大学 iSCSI-based data integrity storage system
CN105184186A (en) * 2015-09-08 2015-12-23 北京元心科技有限公司 Intelligent terminal file system protection method and intelligent terminal
CN106227665A (en) * 2016-07-25 2016-12-14 青岛海信移动通信技术股份有限公司 A kind of equipment starting method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
MJM_HL: "Android 中的dm-verity", 《HTTPS://BLOG.CSDN.NET/U011280717/ARTICLE/DETAILS/51867673》 *
NIKOLAY ELENKOV: "《Android 安全架构深究》", 31 March 2016, 电子工业出版社 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108595981A (en) * 2018-05-09 2018-09-28 深圳市桑格尔科技股份有限公司 The method for encrypting Android system
CN108875358A (en) * 2018-06-08 2018-11-23 山东超越数控电子股份有限公司 A kind of android system safe starting method based on X86 platform
CN111083001A (en) * 2018-10-18 2020-04-28 杭州海康威视数字技术股份有限公司 Firmware abnormity detection method and device
CN109460262A (en) * 2018-11-15 2019-03-12 深圳市网心科技有限公司 Verify method, system, Android device and the medium of main system image legitimacy
CN111443950A (en) * 2018-12-29 2020-07-24 北京奇虎科技有限公司 Vehicle-mounted system safety starting method and vehicle-mounted system
CN114138344A (en) * 2020-09-04 2022-03-04 青岛海信移动通信技术股份有限公司 System checking method and terminal
WO2023077610A1 (en) * 2021-11-05 2023-05-11 锐凌无线有限责任公司 Data check method and apparatus, electronic device and computer readable storage medium
CN116661876A (en) * 2022-11-23 2023-08-29 荣耀终端有限公司 System starting method, file generating method, electronic equipment and server
CN116661876B (en) * 2022-11-23 2024-04-05 荣耀终端有限公司 System starting method, file generating method, electronic equipment and server

Also Published As

Publication number Publication date
WO2019075800A1 (en) 2019-04-25
CN107729198B (en) 2020-04-21

Similar Documents

Publication Publication Date Title
CN107729198A (en) A kind of Android system firmware method of calibration and device
US9665465B1 (en) Automated determination of application permissions
CN108446225A (en) Creating device, method and the computer readable storage medium of analog interface
US11893331B2 (en) Device verification method, UVM verification platform, electronic apparatus and storage medium
CN107301343A (en) Secure data processing method, device and electronic equipment
CN112000382B (en) Linux system starting method and device and readable storage medium
CN105786636B (en) A kind of system repair and device
US20130305228A1 (en) Reducing application startup time through algorithm validation and selection
CN115184764A (en) Chip testing method and device, electronic equipment and storage medium
CN108459866A (en) Upgrade method, device, computer equipment, program product and storage medium
CN107734498A (en) Data migration method and device of the SIM card to eSIM cards
US10795806B2 (en) Devices and methods for generating a stream of health-related data
CN108804315A (en) Applied to the test method of dynamic development, device, electronic equipment and storage medium
CN109947493A (en) Application program launching method, device, electronic equipment and storage medium
CN108228965B (en) Simulation verification method, device and equipment for memory cell
CN114546837A (en) Interface test method, device, equipment and storage medium
CN115599618B (en) Register dynamic change-allocation verification method and device, storage medium and processor
CN110471828B (en) Operating system testing method, device and equipment thereof
TWI822038B (en) Computer program product, computer system and computer-implemented method for customization of multi-part metadata of a secure guest
CN106325937A (en) Third-party application calling method and electronic equipment
CN113760751B (en) Method for generating test case, electronic device and storage medium
CN114298840A (en) Block chain transaction endorsement method and system based on zero knowledge proof
CN112306954A (en) File system testing method and device
CN113672260A (en) CPU initialization method for processor
CN110874238A (en) Online service updating method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Tang Dongyong

Inventor after: Liu Jie

Inventor after: Wang Daohan

Inventor before: Tang Dongyong

Inventor before: Wang Daohan

CB03 Change of inventor or designer information
GR01 Patent grant
GR01 Patent grant