CN107729198A - A kind of Android system firmware method of calibration and device - Google Patents
A kind of Android system firmware method of calibration and device Download PDFInfo
- Publication number
- CN107729198A CN107729198A CN201710971482.9A CN201710971482A CN107729198A CN 107729198 A CN107729198 A CN 107729198A CN 201710971482 A CN201710971482 A CN 201710971482A CN 107729198 A CN107729198 A CN 107729198A
- Authority
- CN
- China
- Prior art keywords
- content
- android
- partitioning content
- file
- img
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/22—Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
- G06F11/2273—Test methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/22—Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
- G06F11/2284—Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing by power-on test, e.g. power-on self test [POST]
Abstract
The present invention relates to Android system technical field, and disclosing a kind of Android system firmware method of calibration and device, this method includes:Start image file boot.img, read system partitioning content;Legitimacy verifies are carried out to system check file verity.img;If legitimacy verifies success, system partitioning content described in carry, and completeness check is carried out to the system partitioning content;If completeness check success, then mark is provided with user data area, pass through the read operation to system partitioning content, by the file copy read into null device, reach the effect for starting and verifying and synchronously perform, improve execution speed, and mark is completed to be verified by reading, the verification that Android the superiors system just completes integrality and legitimacy before starting shooting into normal operating condition is realized, reaches and meets purposes of the PCI5.0 to terminal firmware startup self-detection standard.
Description
Technical field
The present invention relates to Android system technical field, more particularly to a kind of Android system firmware method of calibration and device.
Background technology
Android intelligence POS terminal is all to take dual chip scheme at present, safety chip+application chip(Non-security core
Piece)Mode, safety chip all possesses safe ROMboot mechanism in itself, can be used for verifying the firmware of user, and applies core
Piece is without this mechanism, to meet the safety of the Android system firmware operated on application chip, currently used side
Method has two kinds:
1st, come pair by the way that by key storage, at safety chip end, safety chip can access Android system firmware storage region
Firmware in android system is verified one by one, and the firmware for ensureing to operate in Android ends is legal, safe, the party
In method, the verification of Android system firmware places one's entire reliance upon safety chip;This method can fully meet PCI5.0 to firmware self-test
Standard requirement, just loaded after the completion of all verifications Android system firmware operation.But due to needing safety chip control
With access application chip, need to increase the circuit of safety chip read access application chip storage medium in hardware design, it is soft
The driving of increase safety chip read access application chip storage medium is needed on part, design and reality are all brought on soft and hardware
Existing complexity, simultaneously because application chip end firmware needs to wait safety chip to verify and could run, and cause starting up of terminal
Speed is very slow.
2nd, by increasing fuse mechanism at Android ends to ensure the safety of Android ends bottom firmware and key, on
The dm-verity mechanism that layer is then carried using Android is verified to system firmware to ensure the conjunction of Android system firmware
Method and security, safety chip and application chip are independent, and the verification of Android system firmware is without relying on safe core
Piece, two chips are separate.This method realizes safety chip and using core by increasing fuse mechanism at application chip end
The independence of piece, reduce the complexity of hardware design, but because the verification mode realized on software in android system is
The dm-verity mechanism carried using Android, although can meet and ensure that only legal firmware can just download to application
Die terminals, and ensure that normal starting up of terminal speed, but be not enough to fully meet PCI5.0 when being run to system firmware
Carve the requirement of self-test, therefore, to assure that ability load operating after all firmwares of android system are verified, and dm-verity
It is intended merely to improve the speed of service and uses system operation and needing just to be verified when loading which subregion to corresponding subregion.
The content of the invention
It is a primary object of the present invention to propose a kind of Android system firmware method of calibration and device, by system
The read operation of partition content, by the file copy read into null device, reach the effect for starting and verifying and synchronously perform,
Improve execution speed, and mark completed to be verified by reading, realize Android the superiors system start shooting into
Enter just to complete before normal operating condition the verification of integrality and legitimacy, reach meet PCI5.0 to terminal firmware start from
The purpose of inspection standard.
To achieve the above object, a kind of Android system firmware method of calibration provided by the invention, including:
Start image file boot.img, read system partitioning content;
Legitimacy verifies are carried out to system check file verity.img;
If legitimacy verifies success, system partitioning content described in carry, and integrality school is carried out to the system partitioning content
Test;
If completeness check success, mark is provided with user data area.
Alternatively, system partitioning content described in the carry, and completeness check bag is carried out to the system partitioning content
Include:
Carry system partitioning content;
The system partitioning content is copied in null device, while Hash calculation is carried out to the file in system partitioning content,
And compared with corresponding Hash tree, if cryptographic Hash is different, System self-test failure is out of service;
If cryptographic Hash is the same, continue to carry out Hash calculation to next file of system partitioning content, until having replicated system
The All Files of partition content.
Alternatively, it is described also to include after user data area is provided with mark:
Run android system desktop starter Launcher;
Judge to whether there is complement mark in the user data area, if, then it represents that system firmware verifies successfully, into normal
Running status, while remove the complement mark;
Otherwise, System self-test fails, out of service.
Alternatively, it is described that system check file verity.img is carried out after legitimacy verifies also to include:
If legitimacy verifies are unsuccessful, System self-test failure is out of service.
Alternatively, the image file boot.img includes kernel kernel and virtual flash disk ramdisk.
As another aspect of the present invention, there is provided a kind of Android system firmware calibration equipment, including:
Read module, for starting image file boot.img, read system partitioning content;
Legitimacy verifies module, for carrying out legitimacy verifies to system check file verity.img;
Completeness check module, if for legitimacy verifies success, system partitioning content described in carry, and to the system point
Area's content carries out completeness check;
Setup module, if for completeness check success, mark is provided with user data area.
Alternatively, the completeness check module includes:
Carry unit, for carry system partitioning content;
Copied cells, for the system partitioning content to be copied in null device, while to the file in system partitioning content
Hash calculation is carried out, and compared with corresponding Hash tree, if cryptographic Hash is different, System self-test failure, stops fortune
OK;
Traversal Unit, if the same for cryptographic Hash, continue to carry out Hash calculation to next file of system partitioning content, directly
To the All Files for having replicated system partitioning content.
Alternatively, in addition to complete starting module, the starting module completely include:
UI running units, operation android system desktop starter Launcher;
Judging unit, for judging to whether there is complement mark in the user data area, if, then it represents that system firmware verifies
Success, into normal operating condition, while removes the complement mark;
Fail self-test unit, for when complement mark is not present in the user data area, then it represents that System self-test fails, and stops
Only run.
Alternatively, the fail self-test unit is additionally operable to:
If legitimacy verifies are unsuccessful, then it represents that System self-test fails, out of service.
Alternatively, the image file boot.img includes kernel kernel and virtual flash disk ramdisk.
A kind of Android system firmware method of calibration and device, this method proposed by the present invention include:Start image file
Boot.img, read system partitioning content;Legitimacy verifies are carried out to system check file verity.img;If legitimacy verifies
Success, then system partitioning content described in carry, and completeness check is carried out to the system partitioning content;If completeness check into
Work(, then mark is provided with user data area, by the read operation to system partitioning content, the file copy that will be read
Into null device, reach the effect for starting and verifying and synchronously perform, improve execution speed, and mark is completed to enter by reading
Row verification, realize Android the superiors system and just complete integrality and conjunction before starting shooting into normal operating condition
The verification of method, reach and meet purposes of the PCI5.0 to terminal firmware startup self-detection standard.
Brief description of the drawings
Fig. 1 is a kind of Android system firmware method of calibration flow chart that the embodiment of the present invention one provides;
Fig. 2 is the method flow diagram of step S30 in Fig. 1;
Fig. 3 is another Android system firmware method of calibration flow chart that the embodiment of the present invention one provides;
Fig. 4 is a kind of Android system firmware calibration equipment exemplary block diagram that the embodiment of the present invention two provides;
Fig. 5 is the exemplary block diagram of completeness check module in Fig. 4;
Fig. 6 is another Android system firmware calibration equipment exemplary block diagram that the embodiment of the present invention two provides;
Fig. 7 is the exemplary block diagram of complete starting module in Fig. 6.
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In follow-up description, the suffix using such as " module ", " part " or " unit " for representing element is only
Be advantageous to the explanation of the present invention, itself do not have a specific meaning.Therefore, " module " can mixedly make with " part "
With.
Embodiment one
As shown in figure 1, in the present embodiment, a kind of Android system firmware method of calibration, including:
S10, start image file boot.img, read system partitioning content;
S20, legitimacy verifies are carried out to system check file verity.img;
If legitimacy verifies success, into system partitioning content described in step S30, carry;If legitimacy verifies fail, enter
Enter step S40, System self-test failure, it is out of service;
S50, completeness check is carried out to the system partitioning content;
If completeness check success, S60, in user data area is provided with mark;If completeness check fails, enter step
Rapid S40, System self-test failure, it is out of service.
In the present embodiment, by the read operation to system partitioning content, by the file copy read to null device
In, reach the effect for starting and verifying and synchronously perform, improve execution speed, and mark is completed to be verified by reading,
Realize the school that Android the superiors system just completes integrality and legitimacy before starting shooting into normal operating condition
Test, reach and meet purposes of the PCI5.0 to terminal firmware startup self-detection standard.
In the present embodiment, the image file boot.img starts the file mirrors that must be loaded for system, and it is wrapped
Containing two parts, respectively kernel kernel and ramdisk.The entitled virtual flash disks of wherein ramdisk, it is by software by one
Divide internal memory(RAM)A kind of technology for being modeled as hard disk to use.In start process, ramdisk can be first generated, is then performed
Related content inside ramdisk carries out carry and related read operation to system subregions.Init.rc in ramdisk
File is first init program parsing that system starts, and is responsible for the initialization operation of system, carry file system, starts
Server services etc., we add the service of a reading system partition content in this document, and only allow unlatching one
It is secondary
In the present embodiment, Android system subregions include:System partitioning content(System data contents)With system school
File verity.img is tested, wherein, system check file verity.img includes again:Dm-verity mapping tbl, sig
The files such as hash tree, start shooting carry system subregions when, it will verification system partition contents, but due to dm-verity's
Principle simply just verifies when reading block contents to the block, so, in start process, only can first it verify
Verity.img legitimacy, just can be corresponding to the content that is read when reading the related data inside system data
Block regions verified.
As shown in Fig. 2 in the present embodiment, the step S30 includes:
S31, carry system partitioning content;
S32, the system partitioning content copied in null device, while Hash meter is carried out to the file in system partitioning content
Calculate, and compared with corresponding Hash tree, if cryptographic Hash is different, System self-test failure is out of service;
If S33, cryptographic Hash are the same, continue to carry out Hash calculation to next file of system partitioning content, until having replicated
The All Files of system partitioning content.
As shown in figure 3, in the present embodiment, also include after the step S60:
S70, operation android system desktop starter Launcher;
S80, judge to whether there is complement mark in the user data area, if so, then entering step S90, representing system firmware
Verify successfully, into normal operating condition, while remove the complement mark;
Otherwise, fail into step S40, System self-test, it is out of service.
In the present embodiment, the method for calibration meets PCI5.0 firmware self-test standards, and meets to pay industry to Android
The requirement of system firmware self-test.
Embodiment two
As shown in figure 4, in the present embodiment, a kind of Android system firmware calibration equipment, including:
Read module 10, for starting image file boot.img, read system partitioning content;
Legitimacy verifies module 20, for carrying out legitimacy verifies to system check file verity.img;
Completeness check module 30, if for legitimacy verifies success, system partitioning content described in carry, and to the system
Partition content carries out completeness check;
Setup module 40, if for completeness check success, mark is provided with user data area.
In the present embodiment, by the read operation to system partitioning content, by the file copy read to null device
In, reach the effect for starting and verifying and synchronously perform, improve execution speed, and mark is completed to be verified by reading,
Realize the school that Android the superiors system just completes integrality and legitimacy before starting shooting into normal operating condition
Test, reach and meet purposes of the PCI5.0 to terminal firmware startup self-detection standard.
In the present embodiment, the image file boot.img starts the file mirrors that must be loaded for system, and it is wrapped
Containing two parts, respectively kernel kernel and ramdisk.The entitled virtual flash disks of wherein ramdisk, it is by software by one
Divide internal memory(RAM)A kind of technology for being modeled as hard disk to use.In start process, ramdisk can be first generated, is then performed
Related content inside ramdisk carries out carry and related read operation to system subregions.Init.rc in ramdisk
File is first init program parsing that system starts, and is responsible for the initialization operation of system, carry file system, starts
Server services etc., we add the service of a reading system partition content in this document, and only allow unlatching one
It is secondary
In the present embodiment, Android system subregions include:System partitioning content(System data contents)With system school
File verity.img is tested, wherein, system check file verity.img includes again:Dm-verity mapping tbl, sig
The files such as hash tree, start shooting carry system subregions when, it will verification system partition contents, but due to dm-verity's
Principle simply just verifies when reading block contents to the block, so, in start process, only can first it verify
Verity.img legitimacy, just can be corresponding to the content that is read when reading the related data inside system data
Block regions verified.
As shown in figure 5, in the present embodiment, the completeness check module includes:
Carry unit 31, for carry system partitioning content;
Copied cells 32, for the system partitioning content to be copied in null device, while to the text in system partitioning content
Part carries out Hash calculation, and compared with corresponding Hash tree, if cryptographic Hash is different, System self-test failure, stops
Operation;
Traversal Unit 33, if the same for cryptographic Hash, continue to carry out Hash calculation to next file of system partitioning content,
All Files until having replicated system partitioning content.
As shown in fig. 6, in the present embodiment, a kind of Android system firmware calibration equipment also includes complete starting module
50, as shown in fig. 7, the starting module completely includes:
UI running units 51, operation android system desktop starter Launcher;
Judging unit 52, for judging to whether there is complement mark in the user data area, if, then it represents that system firmware school
Success is tested, into normal operating condition, while removes the complement mark;
Fail self-test unit 53, for when complement mark is not present in the user data area, then it represents that System self-test fails,
It is out of service.
In the present embodiment, the fail self-test unit is additionally operable to:
If legitimacy verifies are unsuccessful, then it represents that System self-test fails, out of service.
In the present embodiment, the method for calibration meets PCI5.0 firmware self-test standards, and meets to pay industry to Android
The requirement of system firmware self-test.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to nonexcludability
Include so that process, method, article or device including a series of elements not only include those key elements, but also
Including the other element being not expressly set out, or also include for this process, method, article or device intrinsic want
Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including the key element
Process, method, other identical element also be present in article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment method can
Realized by the mode of software plus required general hardware platform, naturally it is also possible to by hardware, but in many cases the former
It is more preferably embodiment.Based on such understanding, technical scheme substantially makes tribute to prior art in other words
The part offered can be embodied in the form of software product, and the computer software product is stored in a storage medium(Such as
ROM/RAM, magnetic disc, CD)In, including some instructions are causing a station terminal equipment(It can be mobile phone, computer, service
Device, air conditioner, or network equipment etc.)Perform the method described in each embodiment of the present invention.
The preferred embodiments of the present invention are these are only, are not intended to limit the scope of the invention, it is every to utilize this hair
The equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills
Art field, is included within the scope of the present invention.
Claims (10)
- A kind of 1. Android system firmware method of calibration, it is characterised in that including:Start image file boot.img, read system partitioning content;Legitimacy verifies are carried out to system check file verity.img;If legitimacy verifies success, system partitioning content described in carry, and integrality school is carried out to the system partitioning content Test;If completeness check success, mark is provided with user data area.
- 2. a kind of Android system firmware method of calibration according to claim 1, it is characterised in that described in the carry System partitioning content, and system partitioning content progress completeness check is included:Carry system partitioning content;The system partitioning content is copied in null device, while Hash calculation is carried out to the file in system partitioning content, And compared with corresponding Hash tree, if cryptographic Hash is different, System self-test failure is out of service;If cryptographic Hash is the same, continue to carry out Hash calculation to next file of system partitioning content, until having replicated system The All Files of partition content.
- 3. a kind of Android system firmware method of calibration according to claim 2, it is characterised in that described in number of users Being provided with according to area after mark also includes:Run android system desktop starter Launcher;Judge to whether there is complement mark in the user data area, if, then it represents that system firmware verifies successfully, into normal Running status, while remove the complement mark;Otherwise, System self-test fails, out of service.
- 4. a kind of Android system firmware method of calibration according to claim 1, it is characterised in that described to system school File verity.img is tested after legitimacy verifies also include:If legitimacy verifies are unsuccessful, System self-test failure is out of service.
- A kind of 5. Android system firmware method of calibration according to claim 1, it is characterised in that the image file Boot.img includes kernel kernel and virtual flash disk ramdisk.
- A kind of 6. Android system firmware calibration equipment, it is characterised in that including:Read module, for starting image file boot.img, read system partitioning content;Legitimacy verifies module, for carrying out legitimacy verifies to system check file verity.img;Completeness check module, if for legitimacy verifies success, system partitioning content described in carry, and to the system point Area's content carries out completeness check;Setup module, if for completeness check success, mark is provided with user data area.
- A kind of 7. Android system firmware calibration equipment according to claim 6, it is characterised in that the integrality school Testing module includes:Carry unit, for carry system partitioning content;Copied cells, for the system partitioning content to be copied in null device, while to the file in system partitioning content Hash calculation is carried out, and compared with corresponding Hash tree, if cryptographic Hash is different, System self-test failure, stops fortune OK;Traversal Unit, if the same for cryptographic Hash, continue to carry out Hash calculation to next file of system partitioning content, directly To the All Files for having replicated system partitioning content.
- 8. a kind of Android system firmware calibration equipment according to claim 7, it is characterised in that also include opening completely Dynamic model block, the starting module completely include:UI running units, operation android system desktop starter Launcher;Judging unit, for judging to whether there is complement mark in the user data area, if, then it represents that system firmware verifies Success, into normal operating condition, while removes the complement mark;Fail self-test unit, for when complement mark is not present in the user data area, then it represents that System self-test fails, and stops Only run.
- A kind of 9. Android system firmware calibration equipment according to claim 8, it is characterised in that the fail self-test Unit is additionally operable to:If legitimacy verifies are unsuccessful, then it represents that System self-test fails, out of service.
- A kind of 10. Android system firmware calibration equipment according to claim 6, it is characterised in that the image file Boot.img includes kernel kernel and virtual flash disk ramdisk.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710971482.9A CN107729198B (en) | 2017-10-18 | 2017-10-18 | Android system firmware verification method and device |
PCT/CN2017/109774 WO2019075800A1 (en) | 2017-10-18 | 2017-11-07 | Firmware verification method and apparatus for android system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710971482.9A CN107729198B (en) | 2017-10-18 | 2017-10-18 | Android system firmware verification method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107729198A true CN107729198A (en) | 2018-02-23 |
CN107729198B CN107729198B (en) | 2020-04-21 |
Family
ID=61210724
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710971482.9A Active CN107729198B (en) | 2017-10-18 | 2017-10-18 | Android system firmware verification method and device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107729198B (en) |
WO (1) | WO2019075800A1 (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108595981A (en) * | 2018-05-09 | 2018-09-28 | 深圳市桑格尔科技股份有限公司 | The method for encrypting Android system |
CN108875358A (en) * | 2018-06-08 | 2018-11-23 | 山东超越数控电子股份有限公司 | A kind of android system safe starting method based on X86 platform |
CN109460262A (en) * | 2018-11-15 | 2019-03-12 | 深圳市网心科技有限公司 | Verify method, system, Android device and the medium of main system image legitimacy |
CN111083001A (en) * | 2018-10-18 | 2020-04-28 | 杭州海康威视数字技术股份有限公司 | Firmware abnormity detection method and device |
CN111443950A (en) * | 2018-12-29 | 2020-07-24 | 北京奇虎科技有限公司 | Vehicle-mounted system safety starting method and vehicle-mounted system |
CN114138344A (en) * | 2020-09-04 | 2022-03-04 | 青岛海信移动通信技术股份有限公司 | System checking method and terminal |
WO2023077610A1 (en) * | 2021-11-05 | 2023-05-11 | 锐凌无线有限责任公司 | Data check method and apparatus, electronic device and computer readable storage medium |
CN116661876A (en) * | 2022-11-23 | 2023-08-29 | 荣耀终端有限公司 | System starting method, file generating method, electronic equipment and server |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102981881A (en) * | 2012-12-10 | 2013-03-20 | 中兴通讯股份有限公司 | Method and system for preventing mobile terminal from being updated to illegal firmware version |
CN103955648A (en) * | 2014-05-15 | 2014-07-30 | 乐视致新电子科技(天津)有限公司 | Method and device for verifying legality of system image |
CN104348578A (en) * | 2013-08-02 | 2015-02-11 | 腾讯科技(深圳)有限公司 | Data processing method and device |
CN104408370A (en) * | 2014-12-25 | 2015-03-11 | 珠海全志科技股份有限公司 | Android system security verification method and verification device thereof |
CN105100039A (en) * | 2015-04-21 | 2015-11-25 | 兰州大学 | iSCSI-based data integrity storage system |
CN105184186A (en) * | 2015-09-08 | 2015-12-23 | 北京元心科技有限公司 | Intelligent terminal file system protection method and intelligent terminal |
CN105302708A (en) * | 2014-06-30 | 2016-02-03 | 联发科技(新加坡)私人有限公司 | Mobile terminal and detection method thereof |
CN105574439A (en) * | 2015-04-17 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | System disk verifying method and device |
EP3026560A1 (en) * | 2014-11-28 | 2016-06-01 | Thomson Licensing | Method and device for providing verifying application integrity |
CN106227665A (en) * | 2016-07-25 | 2016-12-14 | 青岛海信移动通信技术股份有限公司 | A kind of equipment starting method and device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10073966B2 (en) * | 2013-04-29 | 2018-09-11 | Sri International | Operating system-independent integrity verification |
-
2017
- 2017-10-18 CN CN201710971482.9A patent/CN107729198B/en active Active
- 2017-11-07 WO PCT/CN2017/109774 patent/WO2019075800A1/en active Application Filing
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102981881A (en) * | 2012-12-10 | 2013-03-20 | 中兴通讯股份有限公司 | Method and system for preventing mobile terminal from being updated to illegal firmware version |
CN104348578A (en) * | 2013-08-02 | 2015-02-11 | 腾讯科技(深圳)有限公司 | Data processing method and device |
CN103955648A (en) * | 2014-05-15 | 2014-07-30 | 乐视致新电子科技(天津)有限公司 | Method and device for verifying legality of system image |
CN105302708A (en) * | 2014-06-30 | 2016-02-03 | 联发科技(新加坡)私人有限公司 | Mobile terminal and detection method thereof |
EP3026560A1 (en) * | 2014-11-28 | 2016-06-01 | Thomson Licensing | Method and device for providing verifying application integrity |
CN104408370A (en) * | 2014-12-25 | 2015-03-11 | 珠海全志科技股份有限公司 | Android system security verification method and verification device thereof |
CN105574439A (en) * | 2015-04-17 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | System disk verifying method and device |
CN105100039A (en) * | 2015-04-21 | 2015-11-25 | 兰州大学 | iSCSI-based data integrity storage system |
CN105184186A (en) * | 2015-09-08 | 2015-12-23 | 北京元心科技有限公司 | Intelligent terminal file system protection method and intelligent terminal |
CN106227665A (en) * | 2016-07-25 | 2016-12-14 | 青岛海信移动通信技术股份有限公司 | A kind of equipment starting method and device |
Non-Patent Citations (2)
Title |
---|
MJM_HL: "Android 中的dm-verity", 《HTTPS://BLOG.CSDN.NET/U011280717/ARTICLE/DETAILS/51867673》 * |
NIKOLAY ELENKOV: "《Android 安全架构深究》", 31 March 2016, 电子工业出版社 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108595981A (en) * | 2018-05-09 | 2018-09-28 | 深圳市桑格尔科技股份有限公司 | The method for encrypting Android system |
CN108875358A (en) * | 2018-06-08 | 2018-11-23 | 山东超越数控电子股份有限公司 | A kind of android system safe starting method based on X86 platform |
CN111083001A (en) * | 2018-10-18 | 2020-04-28 | 杭州海康威视数字技术股份有限公司 | Firmware abnormity detection method and device |
CN109460262A (en) * | 2018-11-15 | 2019-03-12 | 深圳市网心科技有限公司 | Verify method, system, Android device and the medium of main system image legitimacy |
CN111443950A (en) * | 2018-12-29 | 2020-07-24 | 北京奇虎科技有限公司 | Vehicle-mounted system safety starting method and vehicle-mounted system |
CN114138344A (en) * | 2020-09-04 | 2022-03-04 | 青岛海信移动通信技术股份有限公司 | System checking method and terminal |
WO2023077610A1 (en) * | 2021-11-05 | 2023-05-11 | 锐凌无线有限责任公司 | Data check method and apparatus, electronic device and computer readable storage medium |
CN116661876A (en) * | 2022-11-23 | 2023-08-29 | 荣耀终端有限公司 | System starting method, file generating method, electronic equipment and server |
CN116661876B (en) * | 2022-11-23 | 2024-04-05 | 荣耀终端有限公司 | System starting method, file generating method, electronic equipment and server |
Also Published As
Publication number | Publication date |
---|---|
WO2019075800A1 (en) | 2019-04-25 |
CN107729198B (en) | 2020-04-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107729198A (en) | A kind of Android system firmware method of calibration and device | |
US9665465B1 (en) | Automated determination of application permissions | |
CN108446225A (en) | Creating device, method and the computer readable storage medium of analog interface | |
US11893331B2 (en) | Device verification method, UVM verification platform, electronic apparatus and storage medium | |
CN107301343A (en) | Secure data processing method, device and electronic equipment | |
CN112000382B (en) | Linux system starting method and device and readable storage medium | |
CN105786636B (en) | A kind of system repair and device | |
US20130305228A1 (en) | Reducing application startup time through algorithm validation and selection | |
CN115184764A (en) | Chip testing method and device, electronic equipment and storage medium | |
CN108459866A (en) | Upgrade method, device, computer equipment, program product and storage medium | |
CN107734498A (en) | Data migration method and device of the SIM card to eSIM cards | |
US10795806B2 (en) | Devices and methods for generating a stream of health-related data | |
CN108804315A (en) | Applied to the test method of dynamic development, device, electronic equipment and storage medium | |
CN109947493A (en) | Application program launching method, device, electronic equipment and storage medium | |
CN108228965B (en) | Simulation verification method, device and equipment for memory cell | |
CN114546837A (en) | Interface test method, device, equipment and storage medium | |
CN115599618B (en) | Register dynamic change-allocation verification method and device, storage medium and processor | |
CN110471828B (en) | Operating system testing method, device and equipment thereof | |
TWI822038B (en) | Computer program product, computer system and computer-implemented method for customization of multi-part metadata of a secure guest | |
CN106325937A (en) | Third-party application calling method and electronic equipment | |
CN113760751B (en) | Method for generating test case, electronic device and storage medium | |
CN114298840A (en) | Block chain transaction endorsement method and system based on zero knowledge proof | |
CN112306954A (en) | File system testing method and device | |
CN113672260A (en) | CPU initialization method for processor | |
CN110874238A (en) | Online service updating method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information |
Inventor after: Tang Dongyong Inventor after: Liu Jie Inventor after: Wang Daohan Inventor before: Tang Dongyong Inventor before: Wang Daohan |
|
CB03 | Change of inventor or designer information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |