CN111193751A - Factory setting restoration method and equipment - Google Patents

Factory setting restoration method and equipment Download PDF

Info

Publication number
CN111193751A
CN111193751A CN202010032607.3A CN202010032607A CN111193751A CN 111193751 A CN111193751 A CN 111193751A CN 202010032607 A CN202010032607 A CN 202010032607A CN 111193751 A CN111193751 A CN 111193751A
Authority
CN
China
Prior art keywords
factory
request message
value
preset
equipment identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010032607.3A
Other languages
Chinese (zh)
Other versions
CN111193751B (en
Inventor
武传坤
傅德谦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Linyi University
Original Assignee
Linyi University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Linyi University filed Critical Linyi University
Priority to CN202010032607.3A priority Critical patent/CN111193751B/en
Publication of CN111193751A publication Critical patent/CN111193751A/en
Application granted granted Critical
Publication of CN111193751B publication Critical patent/CN111193751B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the application provides a method and equipment for restoring factory settings, wherein the method comprises the following steps: and the target equipment receives a factory setting restoration request message from the control terminal. The factory reset request message includes: restoring the factory setting instruction, the equipment identity identification and the first confusion value; the first confusion value is obtained by encrypting the factory reset instruction and the equipment identity identifier by the control terminal based on a preset algorithm and a preset first key. And verifying the first confusion value according to the factory setting restoration request message based on a preset rule. And executing a factory setting restoration instruction when the first confusion value is verified. Through the scheme, the safety of the electronic equipment can be effectively improved, and the situation that the owner of the electronic equipment loses the control right of the electronic equipment to cause corresponding loss is avoided.

Description

Factory setting restoration method and equipment
Technical Field
The present application relates to the field of electronic technologies, and in particular, to a method and an apparatus for restoring factory settings.
Background
With the rapid development and wide application of network technologies, more and more electronic devices have network communication capabilities, so that the electronic devices can be managed and controlled through a network.
Most of the existing electronic devices have a function of restoring factory settings, that is, the electronic devices can be initialized. The existing electronic equipment is mainly restored to factory settings in two ways: the electronic equipment is controlled to restore the factory settings through a network.
The two main ways of restoring the factory settings of the electronic equipment can restore the factory settings of the electronic equipment without the consent of the owner. However, in some scenarios, the user and the owner of the electronic device are not the same person, for example, rental, theft, etc., and the user directly controls the electronic device to restore the factory settings by the factory setting restoring manner, which may cause the electronic device to be out of the control of the owner, resulting in loss of the owner of the device.
Disclosure of Invention
The method and device for restoring factory settings provided in the embodiments of the present specification are used to solve the following technical problems in the prior art: the electronic equipment does not need to be agreed by the owner, and other people can restore the electronic equipment to factory settings, so that the electronic equipment is separated from the control of the owner, and corresponding loss is caused.
In one aspect, an embodiment of the present application provides a method for restoring factory settings, where the method includes: the target equipment receives factory setting restoration request information from the control terminal, wherein the factory setting restoration request information comprises: restoring the factory setting instruction, the equipment identity identification and the first confusion value; the first confusion value is obtained by encrypting a factory reset instruction and an equipment identity identifier by the control terminal based on a preset algorithm and a preset first key; verifying the first confusion value according to a factory reset restoration request message based on a preset rule; and executing a factory setting restoration instruction when the first confusion value is verified.
In a possible implementation manner, verifying, based on a preset rule, a first obfuscated value in a factory reset request message includes: encrypting the factory resetting instruction and the equipment identity in the factory resetting request message based on a preset algorithm and a preset second secret key to obtain a second confusion value; determining whether the first confusion value and the second confusion value in the factory setting restoration request message are consistent; in the event that the first obfuscated value is consistent with the second obfuscated value, it is determined that the first obfuscated value verifies.
In a possible implementation manner, verifying, based on a preset rule, a first obfuscated value in a factory reset request message includes: decrypting the first confusion value in the factory setting restoration request message based on a preset algorithm and a preset second key to obtain a corresponding equipment identity; determining whether the decrypted equipment identity is consistent with the equipment identity in the factory reset request message; and determining that the first confusion value is verified under the condition that the equipment identity obtained after decryption is consistent with the equipment identity in the factory reset request message.
In a possible implementation manner, before verifying the first obfuscated value in the factory reset request message based on a preset rule, the method further includes: and determining the equipment identity in the factory resetting request message to be consistent with the identity of the target equipment.
In a possible implementation manner, the factory reset request message further includes: a random number; the first confusion value is obtained by encrypting the factory reset instruction, the equipment identity identifier and the random number by the control terminal based on a preset algorithm and a preset first key.
In a possible implementation manner, verifying, based on a preset rule, a first obfuscated value in a factory reset request message includes: encrypting the random number, the factory reset instruction and the equipment identity in the factory reset request message based on a preset algorithm and a preset second secret key, and encrypting to obtain a second confusion value; determining whether the first confusion value and the second confusion value in the factory setting restoration request message are consistent; in the event that the first obfuscated value is consistent with the second obfuscated value, it is determined that the first obfuscated value verifies.
In a possible implementation manner, verifying, based on a preset rule, a first obfuscated value in a factory reset request message includes: decrypting the first confusion value in the factory setting restoration request message based on a preset algorithm and a preset second key to obtain a corresponding equipment identity and a random number; determining whether the decrypted equipment identity is consistent with the equipment identity in the factory reset request message; determining whether the random number obtained after decryption is consistent with the random number in the factory reset request message; in the case where both agree, it is determined that the first obfuscated value verifies.
In a possible implementation manner, the random number generates a timestamp of the factory reset request message for the control terminal.
In a possible implementation manner, before verifying the first obfuscated value in the factory reset request message based on a preset rule, the method further includes: determining whether the timestamp exceeds a preset threshold; and under the condition that the timestamp does not exceed the preset threshold value, determining that the factory reset request message is an effective factory reset request message.
On the other hand, an embodiment of the present application further provides an apparatus for restoring factory settings, where the apparatus includes: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to cause the at least one processor to:
the target equipment receives factory setting restoration request information from the control terminal, wherein the factory setting restoration request information comprises: restoring the factory setting instruction, the equipment identity identification and the first confusion value;
the first confusion value is obtained by encrypting a factory reset instruction and an equipment identity identifier by the control terminal based on a preset algorithm and a preset first key;
verifying the first confusion value according to a factory restoration request based on a preset rule;
and executing a factory setting restoration instruction when the first confusion value is verified.
According to the method and the device for factory setting restoration, when the control terminal sends the factory setting restoration request message to the target device, a first confusion value for security verification is added, and the first confusion value is obtained by encrypting information such as a factory setting restoration instruction and device identity identification according to a preset algorithm and a first secret key. The target device can verify the first confusion value through a preset rule after receiving a factory reset request message containing the first confusion value, and can execute a factory reset instruction under the condition that the first confusion value passes the verification. Through the scheme, the problem that electronic equipment in the prior art is not required to be approved by an owner, and other people can restore factory settings of the electronic equipment, so that the electronic equipment is separated from the control of the owner and the owner is lost can be effectively solved. Moreover, the safety of the electronic equipment can be effectively enhanced, and the user experience of the user is improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a flowchart of a method for restoring factory settings according to an embodiment of the present disclosure;
fig. 2 is another flowchart of a method for restoring factory settings according to an embodiment of the present disclosure;
fig. 3 is another flowchart of a method for restoring factory settings according to an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of an apparatus for restoring factory settings according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present disclosure more apparent, the technical solutions of the present disclosure will be clearly and completely described below with reference to the specific embodiments of the present disclosure and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments obtained by a person skilled in the art without making any inventive step based on the embodiments in the description belong to the protection scope of the present application.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
In the prior art, most of the factory restoration settings for the electronic device can be determined and executed by a user of the electronic device. Some electronic devices require a user to input authentication information such as password or fingerprint, and only when the authentication information is legal, the user can enter the system of the electronic device, but once the electronic device enters the system, the user can start the electronic device to restore the factory settings. In the prior art, the control terminal may also control the electronic device to restore factory settings through a corresponding network, but whether a user corresponding to the control terminal is a user of the electronic device or an owner of the electronic device cannot be confirmed.
Therefore, in some special cases, for example, when the electronic device is stolen, the thief can restore the electronic device to the factory setting without verifying the consent of the device owner, thereby causing the device owner to lose control over the electronic device. For another example, the owner of the electronic device leases the electronic device to other users, and the leased user may also directly restore the electronic device to the factory setting without the consent of the owner of the electronic device, but the owner of the electronic device loses the control right of the electronic device, which causes a certain loss. Therefore, how to guarantee the rights of the owner of the electronic device and improve the safety of the electronic device in restoring factory settings becomes an important technical problem.
Fig. 1 is a flowchart of a method for restoring factory settings according to an embodiment of the present application. As shown in fig. 1, the method comprises the steps of:
s101, the control terminal generates a production setting recovery request message and sends the factory setting recovery request message to corresponding target equipment.
Wherein, the factory reset request message at least comprises: and restoring the factory setting instruction, the equipment identity identification and the first confusion value. The first confusion value may be obtained by encrypting the factory reset instruction and the device identifier by the control terminal according to a preset algorithm and a preset first key.
For example, the factory reset Command is Command, the device ID is ID, and the first key is K1The predetermined algorithm is F1Then the first alias value C1=F1(K1,Command||ID)。
The device identity is an identity of the target device and is used for uniquely identifying the target device. The device identity and the first key may be pre-stored in the control terminal, or may be input by the user to the control terminal, which is not limited in the embodiment of the present application.
The control terminal here refers to a terminal device used by an electronic device owner, and may be an electronic device with network communication capability, such as a smart phone and a tablet computer. The target device is an electronic device that performs factory reset.
S102, the target device determines the device identity in the factory reset request message, and the device identity is consistent with the identity of the target device.
The target device may first determine whether the device identity in the factory reset request message is consistent with the identity of the target device; in case of coincidence, the next step is executed again.
Through the scheme, the target device can determine the factory reset request message corresponding to the target device.
And S103, the target device verifies the first confusion value in the received factory setting restoration request message based on a preset rule.
In some embodiments of the present application, the verification of the first obfuscated value based on a preset rule may be implemented according to a method as shown in fig. 2:
and S201, the target device encrypts the factory resetting instruction and the device identity in the factory resetting request message according to a preset algorithm and a preset second secret key to obtain a second confusion value.
In this application, the second obfuscation value is obtained by encrypting, by the target device, the factory reset instruction and the device identifier in the factory reset request message based on the preset algorithm and the preset second key.
For example, the preset algorithm in the target device is F2The second secret key is K2If the factory reset Command in the factory reset request message is a Command and the device identifier is an ID, the second confusion function C is used2=F2(K2,Command||ID)。
It should be noted that the second key and the preset algorithm in the target device may be stored in the target device in advance, and the second key and the preset algorithm may be fixed parameters and cannot be changed. Also, the preset algorithm mentioned here is an encryption algorithm.
S202, the target device determines whether the first obfuscated value and the second obfuscated value in the factory reset request message are consistent.
For example, where the first confusion function is C1The second confusion function is C2In the case of (1), judgment is made of1And C2Is the same.
S203, determining that the first obfuscated value passes verification under the condition that the first obfuscated value is consistent with the second obfuscated value; in the event that the first obfuscated value is not consistent with the second obfuscated value, it is determined that the first obfuscated value failed verification.
In the above scheme, the target device may encrypt the factory resetting restoration instruction and the device identity in the received factory resetting request message according to a preset algorithm and the second key, so as to obtain a second confusion value. That is to say, based on the preset algorithm and the second key in the target device and the preset algorithm and the first key in the control terminal, the factory reset request message is subjected to security verification, and compared with directly sending the first key, the encrypted first obfuscated value can effectively prevent other malicious users from intercepting the corresponding key, and the security of the key is enhanced.
In some embodiments of the present application, the verifying the first obfuscated value based on a preset rule may also be implemented according to a method as shown in fig. 3:
s301, based on a preset algorithm and a preset second secret key, decrypting the first confusion value in the factory setting restoration request message to obtain a corresponding equipment identity.
And after receiving the factory setting restoration request message, the target device calls a pre-stored preset algorithm and a preset second secret key. And decrypting the first confusion value through a pre-stored preset algorithm and a preset second key so as to obtain a corresponding equipment identity.
For example, the predetermined algorithm is D, and the second key is K2The first confusion value is C1Then, we can get: (Command ID) ═ D (K)2,C1) Wherein: the Command is a factory reset Command, and the ID is equipment identity.
S302, determining whether the decrypted equipment identity is consistent with the equipment identity in the factory reset request message.
And the target equipment determines the equipment identity in the factory-reset request message, compares the equipment identity with the equipment identity obtained after decryption, and determines whether the equipment identity and the equipment identity are the same.
S303, determining that the first confusion value is verified under the condition that the decrypted equipment identity is consistent with the equipment identity in the factory setting restoration request message; and under the condition that the equipment identity obtained after decryption is consistent with the equipment identity in the factory reset request message, determining that the first confusion value verification fails.
It should be noted that the device identity in the factory reset request message is consistent with the decrypted device identity, which may mean that the device identity in the factory reset request message is the same as the decrypted device identity. And, the preset algorithm mentioned here is a corresponding decryption algorithm.
In the above scheme, the target terminal decrypts the received first obfuscated value, compares the decrypted device identity with the device identity in the factory reset request message, and determines whether the two are consistent, so as to complete verification of the first obfuscated value.
And S104, executing a factory reset instruction under the condition that the first confusion value is verified.
It should be noted that, when the first confusion value is verified as passing, the target device may send a prompt message to the control terminal to prompt the user corresponding to the control terminal to have no authority to restore the factory settings of the target device. The target device may also send alarm information to a third-party principal (e.g., a special supervision department) to prompt that the third-party principal receives a malicious factory-reset instruction, which may threaten the security of the target device, and the third-party principal may perform tracking processing on the target device according to the alarm information to ensure the security of the target device.
In order to further improve the security of the target device when factory reset is performed, in an embodiment of the present application, the factory reset request message generated by the control terminal further includes a random number. And the first confusion value is obtained by encrypting the factory reset instruction, the equipment identity identifier and the random number by the control terminal based on a preset algorithm and a preset first key.
For example, the factory reset Command is Command, the device ID is ID, and the first key is K1The predetermined algorithm is F1R is the random number, then the first confusion value C1=F1(K1,Command||ID||R)。
It should be noted that the random number mentioned here may be a number, a letter, a character string obtained by combining a number and a letter, or a character string obtained by combining characters in other forms or different forms, and is not limited in the embodiment of the present application. The random number mentioned here may be randomly generated by the control terminal, or randomly set by the user of the control terminal, and is not limited in the embodiment of the present application.
Through the scheme, the random number is added to the factory setting restoration request message generated by the control terminal, and the random number is also used in the generation process of the first confusion value, so that the problem that after the factory setting restoration request message sent by the control terminal is intercepted by a third party, the third party implements replay attack to obtain the control right of the electronic equipment can be effectively avoided.
When the factory reset request message includes the random number, the method for the target terminal to verify the first obfuscated value is as follows:
encrypting a factory resetting restoration instruction, an equipment identity identifier and a random number in a factory resetting restoration request message based on a preset algorithm and a preset second secret key to obtain a second confusion value;
determining whether the first confusion value and the second confusion value in the factory setting restoration request message are consistent;
determining that the first obfuscated value verifies if the first obfuscated value is identical to the second obfuscated value;
determining that the first obfuscated value fails verification if the first obfuscated value is not consistent with the second obfuscated value.
In addition to the above method, in the embodiment of the present application, the first obfuscated value may be verified by a method shown as follows:
decrypting the first confusion value in the factory setting restoration request message based on a preset algorithm and a preset second key to obtain a corresponding equipment identity and a random number;
determining whether the decrypted equipment identity is consistent with the equipment identity in the factory reset request message; determining whether the random number obtained after decryption is consistent with the random number in the factory reset request message;
in the case where both agree, it is determined that the first obfuscated value verifies.
In some embodiments of the present application, the random number may be a timestamp of the control terminal generating the factory reset request message, that is, the timestamp is used to indicate a time when the control terminal generates the factory reset request message. In the factory reset method provided in this embodiment of the application, in a case where the random number is a timestamp for generating a factory reset request message for the control terminal, before step S103, the method further includes:
determining whether the timestamp exceeds a preset threshold;
and under the condition that the time stamp does not exceed the preset threshold value, determining that the factory reset request message is an effective factory reset request message.
In the above scheme, the random number is set as a timestamp for generating the factory reset request message by the control terminal, and the timestamp is compared with a preset threshold value, so as to determine whether the received factory reset request message is valid, and further avoid a third party from obtaining the control right of the electronic device after intercepting the factory reset request message.
It should be noted that the preset algorithm mentioned in the present application may be an existing encryption algorithm, or may be an algorithm with a data mixing function, which is designed by a manufacturer of the electronic device, and is not limited in the embodiment of the present application.
According to the method for restoring factory settings, the control terminal can add a first confusion value for security verification when sending a factory setting restoring request message to the target device, wherein the first confusion value is obtained by encrypting information such as a factory setting restoring instruction, a device identity mark and the like according to a preset algorithm and a first secret key. The target device can verify the first confusion value through a preset rule after receiving a factory reset request message containing the first confusion value, and can execute a factory reset instruction under the condition that the first confusion value passes the verification. Through the scheme, the problem that electronic equipment in the prior art is not required to be approved by an owner, and other people can restore factory settings of the electronic equipment, so that the electronic equipment is separated from the control of the owner and the owner is lost can be effectively solved. Moreover, the safety of the electronic equipment can be effectively enhanced, and the user experience of the user is improved.
Based on the same idea, some embodiments of the present application further provide a device corresponding to the above method.
Fig. 4 is a device for restoring factory settings according to an embodiment of the present application. As shown in fig. 4, the apparatus includes:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to cause the at least one processor to:
the target equipment receives factory setting restoration request information from the control terminal, wherein the factory setting restoration request information comprises: restoring the factory setting instruction, the equipment identity identification and the first confusion value;
the first confusion value is obtained by encrypting a factory reset instruction and an equipment identity identifier by the control terminal based on a preset algorithm and a preset first key;
verifying the first confusion value according to a factory restoration request based on a preset rule;
and executing a factory setting restoration instruction when the first confusion value is verified.
The embodiments in the present application are described in a progressive manner, and the same and similar parts among the embodiments can be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the apparatus embodiment, since it is substantially similar to the method embodiment, the description is relatively simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The devices and the methods provided by the embodiment of the application are in one-to-one correspondence, so the devices also have beneficial technical effects similar to the corresponding methods.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A method for factory reset, the method comprising:
the target device receives a factory resetting request message from a control terminal, wherein the factory resetting request message comprises: restoring the factory setting instruction, the equipment identity identification and the first confusion value;
the first confusion value is obtained by encrypting the factory reset instruction and the equipment identity identifier by the control terminal based on a preset algorithm and a preset first key;
verifying the first confusion value according to the factory setting restoration request message based on a preset rule;
and executing the factory setting restoration instruction under the condition that the first obfuscated value is verified.
2. The method according to claim 1, wherein the verifying the first confusion value in the factory reset request message based on a preset rule specifically includes:
encrypting the factory resetting restoration instruction and the equipment identity in the factory resetting request message based on a preset algorithm and a preset second secret key to obtain a second confusion value;
determining whether a first obfuscated value in the factory reset request message is consistent with a second obfuscated value;
determining that the first obfuscated value verifies if the first obfuscated value is identical to the second obfuscated value.
3. The method according to claim 1, wherein the verifying the first confusion value in the factory reset request message based on a preset rule specifically includes:
decrypting the first confusion value in the factory setting restoration request message based on a preset algorithm and a preset second key to obtain a corresponding equipment identity;
determining whether the decrypted equipment identity is consistent with the equipment identity in the factory reset request message or not;
and determining that the first confusion value is verified under the condition that the decrypted equipment identity is consistent with the equipment identity in the factory resetting request message.
4. The method according to claim 1, wherein before verifying the first obfuscated value in the factory reset request message based on a preset rule, the method further comprises:
and determining the equipment identity in the factory resetting request message to be consistent with the identity of the target equipment.
5. The method according to claim 1, wherein the factory reset request message further comprises: a random number;
the first confusion value is obtained by encrypting the factory reset instruction, the equipment identity identifier and the random number by the control terminal based on a preset algorithm and a preset first key.
6. The method according to claim 5, wherein verifying the first confusion value in the factory reset request message based on a preset rule specifically comprises:
encrypting the random number, the factory reset instruction and the equipment identity in the factory reset request message based on a preset algorithm and a preset second key to obtain a second confusion value;
determining whether a first obfuscated value in the factory reset request message is consistent with a second obfuscated value;
determining that the first obfuscated value verifies if the first obfuscated value is identical to the second obfuscated value.
7. The method according to claim 5, wherein the verifying the first confusion value in the factory reset request message based on a preset rule specifically includes:
decrypting the first confusion value in the factory setting restoration request message based on a preset algorithm and a preset second key to obtain a corresponding equipment identity and a random number;
determining whether the decrypted equipment identity is consistent with the equipment identity in the factory reset request message or not; determining whether the random number obtained after decryption is consistent with the random number in the factory reset request message;
in the event that both agree, determining that the first obfuscated value verifies.
8. The method according to claim 5, wherein the random number is a time stamp for the control terminal to generate the factory reset request message.
9. The method according to claim 8, wherein before verifying the first obfuscated value in the factory reset request message based on a preset rule, the method further comprises:
determining whether the timestamp exceeds a preset threshold;
and under the condition that the timestamp does not exceed a preset threshold value, determining that the factory reset request message is an effective factory reset request message.
10. An apparatus for restoring factory settings, the apparatus comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
the target device receives a factory resetting request message from a control terminal, wherein the factory resetting request message comprises: restoring the factory setting instruction, the equipment identity identification and the first confusion value;
the first confusion value is obtained by encrypting the factory reset instruction and the equipment identity identifier by the control terminal based on a preset algorithm and a preset first key;
verifying the first confusion value according to the factory restoration request based on a preset rule;
and executing the factory setting restoration instruction under the condition that the first obfuscated value is verified.
CN202010032607.3A 2020-01-13 2020-01-13 Factory setting restoration method and equipment Active CN111193751B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010032607.3A CN111193751B (en) 2020-01-13 2020-01-13 Factory setting restoration method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010032607.3A CN111193751B (en) 2020-01-13 2020-01-13 Factory setting restoration method and equipment

Publications (2)

Publication Number Publication Date
CN111193751A true CN111193751A (en) 2020-05-22
CN111193751B CN111193751B (en) 2022-02-08

Family

ID=70710081

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010032607.3A Active CN111193751B (en) 2020-01-13 2020-01-13 Factory setting restoration method and equipment

Country Status (1)

Country Link
CN (1) CN111193751B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050251865A1 (en) * 2004-05-07 2005-11-10 Mont Marco C Data privacy management system and method
US20090193250A1 (en) * 2005-11-08 2009-07-30 Kaoru Yokota Authentication system, signature creating device, and signature verifying device
US20160063269A1 (en) * 2014-09-03 2016-03-03 Microsoft Corporation Outsourcing Document-Transformation Tasks while Protecting Sensitive Information
CN107480485A (en) * 2016-11-02 2017-12-15 深圳市波普安创技术有限公司 The factory reset system and method for information safety devices
CN108737431A (en) * 2018-05-28 2018-11-02 深圳职业技术学院 Based on graduation distributed authentication method, the apparatus and system obscured under IoT scenes
CN109728914A (en) * 2019-01-23 2019-05-07 北京奇艺世纪科技有限公司 Digital signature authentication method, system, device and computer readable storage medium
US20190253262A1 (en) * 2016-10-27 2019-08-15 Denso Corporation System and method for authenticating and authorizing devices

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050251865A1 (en) * 2004-05-07 2005-11-10 Mont Marco C Data privacy management system and method
US20090193250A1 (en) * 2005-11-08 2009-07-30 Kaoru Yokota Authentication system, signature creating device, and signature verifying device
US20160063269A1 (en) * 2014-09-03 2016-03-03 Microsoft Corporation Outsourcing Document-Transformation Tasks while Protecting Sensitive Information
US20190253262A1 (en) * 2016-10-27 2019-08-15 Denso Corporation System and method for authenticating and authorizing devices
CN107480485A (en) * 2016-11-02 2017-12-15 深圳市波普安创技术有限公司 The factory reset system and method for information safety devices
CN108737431A (en) * 2018-05-28 2018-11-02 深圳职业技术学院 Based on graduation distributed authentication method, the apparatus and system obscured under IoT scenes
CN109728914A (en) * 2019-01-23 2019-05-07 北京奇艺世纪科技有限公司 Digital signature authentication method, system, device and computer readable storage medium

Also Published As

Publication number Publication date
CN111193751B (en) 2022-02-08

Similar Documents

Publication Publication Date Title
CN106612180B (en) Method and device for realizing session identification synchronization
CN108173662B (en) Equipment authentication method and device
CN112000975B (en) Key management system
US7043636B2 (en) Data integrity mechanisms for static and dynamic data
CN106452764B (en) Method for automatically updating identification private key and password system
CN111031047B (en) Device communication method, device, computer device and storage medium
WO2020173332A1 (en) Trusted execution environment-based application activation method and apparatus
CN107733636B (en) Authentication method and authentication system
CN107920052B (en) Encryption method and intelligent device
JP2007511810A (en) Proof of execution using random number functions
US20130097427A1 (en) Soft-Token Authentication System
CN107124279B (en) Method and device for erasing terminal data
CN107368737A (en) A kind of processing method for preventing copy-attack, server and client
CN110362984B (en) Method and device for operating service system by multiple devices
CN113472793A (en) Personal data protection system based on hardware password equipment
CN112565205B (en) Credible authentication and measurement method, server, terminal and readable storage medium
CN113239363A (en) Firmware updating method, device, equipment, readable storage medium and memory system
CN113378119A (en) Software authorization method, device, equipment and storage medium
CN108667800B (en) Access authority authentication method and device
US7869793B2 (en) Method and apparatus for preventing unauthorized use of mobile terminal
CN109302442B (en) Data storage proving method and related equipment
CN111193751B (en) Factory setting restoration method and equipment
CN110971610A (en) Control system identity verification method and device, computer equipment and storage medium
CN107343276B (en) Method and system for protecting SIM card locking data of terminal
CN114239000A (en) Password processing method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Fu Deqian

Inventor after: Wu Chuankun

Inventor before: Wu Chuankun

Inventor before: Fu Deqian