CN113901485B - Application program loading method, electronic device and storage medium - Google Patents

Application program loading method, electronic device and storage medium Download PDF

Info

Publication number
CN113901485B
CN113901485B CN202111485751.3A CN202111485751A CN113901485B CN 113901485 B CN113901485 B CN 113901485B CN 202111485751 A CN202111485751 A CN 202111485751A CN 113901485 B CN113901485 B CN 113901485B
Authority
CN
China
Prior art keywords
firmware
electronic device
trusted
interface
processor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111485751.3A
Other languages
Chinese (zh)
Other versions
CN113901485A (en
Inventor
侯智
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Spreadtrum Communications Tianjin Co Ltd
Original Assignee
Spreadtrum Communications Tianjin Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Spreadtrum Communications Tianjin Co Ltd filed Critical Spreadtrum Communications Tianjin Co Ltd
Priority to CN202111485751.3A priority Critical patent/CN113901485B/en
Publication of CN113901485A publication Critical patent/CN113901485A/en
Application granted granted Critical
Publication of CN113901485B publication Critical patent/CN113901485B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the application provides an application program loading method, electronic equipment and a storage medium, and relates to the technical field of information, wherein the method comprises the following steps: after the electronic equipment is started, statically loading one or more second trusted application programs in second firmware based on the mark; wherein the indicia is to identify a second trusted application in the second firmware obtained by writing the one or more second trusted applications in a first firmware comprising one or more first trusted applications. The method provided by the embodiment of the application can realize the static loading of the trusted application program in the safe operating system.

Description

Application program loading method, electronic device and storage medium
Technical Field
The embodiment of the application relates to the technical field of information, in particular to an application program loading method, electronic equipment and a storage medium.
Background
The secure operating system is used to provide an API interface to enable development of Trusted Applications (TAs) and specific security functions. The TA is an application program running under a secure operating system and can complete processing of various private and sensitive data. With the rapid spread of smart devices, a large number of applications are developed and used, and it has become a necessary method to secure data using TA.
The safety operation systems of the current manufacturer platforms are closed sources, and application programs are difficult to add in firmware of the closed source operation systems, so that the problem that the application programs cannot be loaded statically can be caused, other platforms need to contact original manufacturers to develop complex processes when developing the TA, negotiation support work is carried out, and the completion efficiency is low, and the processes are prone to errors.
Disclosure of Invention
The embodiment of the application provides an application program loading method, electronic equipment and a storage medium, and aims to provide a way of embedding a TA in a secure operating system, so that static loading of a trusted application program in firmware of a closed-source secure operating system can be realized.
In a first aspect, an embodiment of the present application provides an application program loading method, which is applied to an electronic device, and includes:
loading one or more second trusted application programs in second firmware based on the mark after the electronic equipment is started; wherein the flag is to identify a second trusted application in the second firmware obtained by writing the one or more second trusted applications in the first firmware.
In the embodiment of the application, static loading of the trusted application program in the firmware of the closed-source secure operating system can be realized by a mode of embedding the TA in the secure operating system.
In one possible implementation manner, the first firmware is a closed source operating system firmware, and includes one or more first trusted application programs.
In one possible implementation manner, the method further includes:
and in response to the detected deletion operation of the user, deleting one or more second trusted application programs in the second firmware.
In one possible implementation manner, the one or more second trusted applications are written from an ending memory address of a last first trusted application in the first firmware.
In one possible implementation manner, the method further includes:
and responding to the detected browsing operation of the user, and displaying the first trusted application program and the second trusted application program in the second firmware.
In one possible implementation manner, the first firmware includes a reserved memory area, the reserved memory area is used for writing the one or more second trusted applications, and a starting memory address of the reserved memory area is determined by a memory address of an end position of a last first trusted application in the first firmware.
In a second aspect, an embodiment of the present application provides a chip applied to an electronic device, including:
the loading module is used for loading one or more second trusted application programs in second firmware based on the mark after the electronic equipment is started; wherein the flag is to identify a second trusted application in the second firmware obtained by writing the one or more second trusted applications in the first firmware.
In one possible implementation manner, the first firmware is a closed source operating system firmware, and includes one or more first trusted application programs.
In one possible implementation manner, the chip further includes:
and the deleting module is used for deleting one or more second trusted application programs in the second firmware in response to the detected deleting operation of the user.
In one possible implementation manner, the one or more second trusted applications are written from an ending memory address of a last first trusted application in the first firmware.
In one possible implementation manner, the chip further includes:
and the browsing module is used for responding to the detected browsing operation of the user and displaying the first trusted application program and the second trusted application program in the second firmware.
In one possible implementation manner, the first firmware includes a reserved memory area, the reserved memory area is used for writing the one or more second trusted applications, and a starting memory address of the reserved memory area is determined by a memory address of an end position of a last first trusted application in the first firmware.
In a third aspect, an embodiment of the present application provides an electronic device, including:
a memory, wherein the memory is used for storing a computer program code, and the computer program code includes instructions, and when the electronic device reads the instructions from the memory, the electronic device executes the following steps:
loading one or more second trusted application programs in second firmware based on the mark after the electronic equipment is started; wherein the flag is to identify a second trusted application in the second firmware obtained by writing the one or more second trusted applications in the first firmware.
In one possible implementation manner, the first firmware is a closed source operating system firmware, and includes one or more first trusted application programs.
In one possible implementation manner, when the instruction is executed by the electronic device, the electronic device further performs the following steps:
and in response to the detected deletion operation of the user, deleting one or more second trusted application programs in the second firmware.
In one possible implementation manner, the one or more second trusted applications are written from an ending memory address of a last first trusted application in the first firmware.
In one possible implementation manner, when the instruction is executed by the electronic device, the electronic device further performs the following steps:
and responding to the detected browsing operation of the user, and displaying the first trusted application program and the second trusted application program in the second firmware.
In one possible implementation manner, the first firmware includes a reserved memory area, the reserved memory area is used for writing the one or more second trusted applications, and a starting memory address of the reserved memory area is determined by a memory address of an end position of a last first trusted application in the first firmware.
In a fourth aspect, embodiments of the present application provide a computer-readable storage medium having stored thereon a computer program, which, when run on a computer, causes the computer to perform the method according to the first aspect.
In a fifth aspect, embodiments of the present application provide a computer program, which is configured to perform the method according to the first aspect when the computer program is executed by a computer.
In a possible design, the program of the fifth aspect may be stored in whole or in part on a storage medium packaged with the processor, or in part or in whole on a memory not packaged with the processor.
Drawings
Fig. 1 is a schematic hardware structure diagram of an electronic device according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of an application loading method according to an embodiment of the present application;
fig. 3 is a schematic diagram of TA display effect provided in the embodiment of the present application;
fig. 4 is a schematic structural diagram of a chip provided in an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. In the description of the embodiments herein, "/" means "or" unless otherwise specified, for example, a/B may mean a or B; "and/or" herein is merely an association describing an associated object, and means that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone.
In the following, the terms "first", "second" are used for descriptive purposes only and are not to be understood as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the embodiments of the present application, "a plurality" means two or more unless otherwise specified.
The secure operating system is used to provide an API interface to enable development of Trusted Applications (TAs) and specific security functions. The TA is an application program running under a secure operating system and can complete processing of various private and sensitive data. With the rapid spread of smart devices, a large number of applications are developed and used, and it has become a necessary method to secure data using TA.
The safety operation systems of the current manufacturer platforms are closed sources, and application programs are difficult to add in firmware of the closed source operation systems, so that the problem that the application programs cannot be loaded statically can be caused, other platforms need to contact original manufacturers to develop complex processes when developing the TA, negotiation support work is carried out, and the completion efficiency is low, and the processes are prone to errors.
Based on the above problem, the embodiment of the present application provides an application loading method, which is applied to the electronic device 100. The electronic device 100 may be a mobile terminal. A mobile terminal can also be called a terminal device, User Equipment (UE), an access terminal, a subscriber unit, a subscriber station, a mobile station, a remote terminal, a mobile device, a User terminal, a wireless communication device, a User agent, or a User Equipment. The mobile terminal may also be a wearable device, e.g., a smart watch, a smart bracelet, etc. The embodiment of the present application does not particularly limit the specific form of the electronic device 100 for implementing the technical solution.
An exemplary electronic device provided in the following embodiments of the present application is first described below with reference to fig. 1. Fig. 1 shows a schematic structural diagram of an electronic device 100.
Fig. 1 shows a schematic structural diagram of an electronic device 100.
The electronic device 100 may include a processor 110, an external memory interface 120, an internal memory 121, a Universal Serial Bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, a mobile communication module 150, a wireless communication module 160, an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, a sensor module 180, a key 190, a motor 191, an indicator 192, a camera 193, a display screen 194, a Subscriber Identification Module (SIM) card interface 195, and the like. The sensor module 180 may include a pressure sensor 180A, a gyroscope sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity light sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, an ambient light sensor 180L, a bone conduction sensor 180M, and the like.
It is to be understood that the illustrated structure of the embodiment of the present invention does not specifically limit the electronic device 100. In other embodiments of the present application, electronic device 100 may include more or fewer components than shown, or some components may be combined, some components may be split, or a different arrangement of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
Processor 110 may include one or more processing units, such as: the processor 110 may include an Application Processor (AP), a modem processor, a Graphics Processing Unit (GPU), an Image Signal Processor (ISP), a controller, a video codec, a Digital Signal Processor (DSP), a baseband processor, and/or a neural-Network Processing Unit (NPU), etc. The different processing units may be separate devices or may be integrated into one or more processors.
The controller can generate an operation control signal according to the instruction operation code and the timing signal to complete the control of instruction fetching and instruction execution.
A memory may also be provided in processor 110 for storing instructions and data. In some embodiments, the memory in the processor 110 is a cache memory. The memory may hold instructions or data that have just been used or recycled by the processor 110. If the processor 110 needs to reuse the instruction or data, it can be called directly from the memory. Avoiding repeated accesses reduces the latency of the processor 110, thereby increasing the efficiency of the system.
In some embodiments, processor 110 may include one or more interfaces. The interface may include an integrated circuit (I2C) interface, an integrated circuit built-in audio (I2S) interface, a Pulse Code Modulation (PCM) interface, a universal asynchronous receiver/transmitter (UART) interface, a Mobile Industry Processor Interface (MIPI), a general-purpose input/output (GPIO) interface, a Subscriber Identity Module (SIM) interface, and/or a Universal Serial Bus (USB) interface, etc.
The I2C interface is a bi-directional synchronous serial bus that includes a serial data line (SDA) and a Serial Clock Line (SCL). In some embodiments, processor 110 may include multiple sets of I2C buses. The processor 110 may be coupled to the touch sensor 180K, the charger, the flash, the camera 193, etc. through different I2C bus interfaces, respectively. For example: the processor 110 may be coupled to the touch sensor 180K via an I2C interface, such that the processor 110 and the touch sensor 180K communicate via an I2C bus interface to implement the touch functionality of the electronic device 100.
The I2S interface may be used for audio communication. In some embodiments, processor 110 may include multiple sets of I2S buses. The processor 110 may be coupled to the audio module 170 via an I2S bus to enable communication between the processor 110 and the audio module 170. In some embodiments, the audio module 170 may communicate audio signals to the wireless communication module 160 via the I2S interface, enabling answering of calls via a bluetooth headset.
The PCM interface may also be used for audio communication, sampling, quantizing and encoding analog signals. In some embodiments, audio module 170 and wireless communication module 160 may be coupled by a PCM bus interface. In some embodiments, the audio module 170 may also transmit audio signals to the wireless communication module 160 through the PCM interface, so as to implement a function of answering a call through a bluetooth headset. Both the I2S interface and the PCM interface may be used for audio communication.
The UART interface is a universal serial data bus used for asynchronous communications. The bus may be a bidirectional communication bus. It converts the data to be transmitted between serial communication and parallel communication. In some embodiments, a UART interface is generally used to connect the processor 110 with the wireless communication module 160. For example: the processor 110 communicates with a bluetooth module in the wireless communication module 160 through a UART interface to implement a bluetooth function. In some embodiments, the audio module 170 may transmit the audio signal to the wireless communication module 160 through a UART interface, so as to realize the function of playing music through a bluetooth headset.
MIPI interfaces may be used to connect processor 110 with peripheral devices such as display screen 194, camera 193, and the like. The MIPI interface includes a Camera Serial Interface (CSI), a Display Serial Interface (DSI), and the like. In some embodiments, processor 110 and camera 193 communicate through a CSI interface to implement the capture functionality of electronic device 100. Processor 110 and display screen 194 communicate via a DSI interface to implement display functions of electronic device 100.
The GPIO interface may be configured by software. The GPIO interface may be configured as a control signal and may also be configured as a data signal. In some embodiments, a GPIO interface may be used to connect the processor 110 with the camera 193, the display 194, the wireless communication module 160, the audio module 170, the sensor module 180, and the like. The GPIO interface may also be configured as an I2C interface, an I2S interface, a UART interface, a MIPI interface, and the like.
The USB interface 130 is an interface conforming to the USB standard specification, and may specifically be a Mini USB interface, a Micro USB interface, a USB Type C interface, or the like. The USB interface 130 may be used to connect a charger to charge the electronic device 100, and may also be used to transmit data between the electronic device 100 and a peripheral device. And the earphone can also be used for connecting an earphone and playing audio through the earphone. The interface may also be used to connect other electronic devices, such as AR devices and the like.
It should be understood that the connection relationship between the modules according to the embodiment of the present invention is only illustrative, and is not limited to the structure of the electronic device 100. In other embodiments of the present application, the electronic device 100 may also adopt different interface connection manners or a combination of multiple interface connection manners in the above embodiments.
The charging management module 140 is configured to receive charging input from a charger. The charger may be a wireless charger or a wired charger. In some wired charging embodiments, the charging management module 140 may receive charging input from a wired charger via the USB interface 130. In some wireless charging embodiments, the charging management module 140 may receive a wireless charging input through a wireless charging coil of the electronic device 100. The charging management module 140 may also supply power to the electronic device through the power management module 141 while charging the battery 142.
The power management module 141 is used to connect the battery 142, the charging management module 140 and the processor 110. The power management module 141 receives input from the battery 142 and/or the charge management module 140, and supplies power to the processor 110, the internal memory 121, the display 194, the camera 193, the wireless communication module 160, and the like. The power management module 141 may also be used to monitor parameters such as battery capacity, battery cycle count, battery state of health (leakage, impedance), etc. In some other embodiments, the power management module 141 may also be disposed in the processor 110. In other embodiments, the power management module 141 and the charging management module 140 may be disposed in the same device.
The wireless communication function of the electronic device 100 may be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, a modem processor, a baseband processor, and the like.
The antennas 1 and 2 are used for transmitting and receiving electromagnetic wave signals. Each antenna in the electronic device 100 may be used to cover a single or multiple communication bands. Different antennas can also be multiplexed to improve the utilization of the antennas. For example: the antenna 1 may be multiplexed as a diversity antenna of a wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
The mobile communication module 150 may provide a solution including 2G/3G/4G/5G wireless communication applied to the electronic device 100. The mobile communication module 150 may include at least one filter, a switch, a power amplifier, a Low Noise Amplifier (LNA), and the like. The mobile communication module 150 may receive the electromagnetic wave from the antenna 1, filter, amplify, etc. the received electromagnetic wave, and transmit the electromagnetic wave to the modem processor for demodulation. The mobile communication module 150 may also amplify the signal modulated by the modem processor, and convert the signal into electromagnetic wave through the antenna 1 to radiate the electromagnetic wave. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be disposed in the processor 110. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be disposed in the same device as at least some of the modules of the processor 110.
The modem processor may include a modulator and a demodulator. The modulator is used for modulating a low-frequency baseband signal to be transmitted into a medium-high frequency signal. The demodulator is used for demodulating the received electromagnetic wave signal into a low-frequency baseband signal. The demodulator then passes the demodulated low frequency baseband signal to a baseband processor for processing. The low frequency baseband signal is processed by the baseband processor and then transferred to the application processor. The application processor outputs a sound signal through an audio device (not limited to the speaker 170A, the receiver 170B, etc.) or displays an image or video through the display screen 194. In some embodiments, the modem processor may be a stand-alone device. In other embodiments, the modem processor may be provided in the same device as the mobile communication module 150 or other functional modules, independent of the processor 110.
The wireless communication module 160 may provide a solution for wireless communication applied to the electronic device 100, including Wireless Local Area Networks (WLANs) (e.g., wireless fidelity (Wi-Fi) networks), bluetooth (bluetooth, BT), Global Navigation Satellite System (GNSS), Frequency Modulation (FM), Near Field Communication (NFC), Infrared (IR), and the like. The wireless communication module 160 may be one or more devices integrating at least one communication processing module. The wireless communication module 160 receives electromagnetic waves via the antenna 2, performs frequency modulation and filtering processing on electromagnetic wave signals, and transmits the processed signals to the processor 110. The wireless communication module 160 may also receive a signal to be transmitted from the processor 110, perform frequency modulation and amplification on the signal, and convert the signal into electromagnetic waves via the antenna 2 to radiate the electromagnetic waves.
In some embodiments, antenna 1 of electronic device 100 is coupled to mobile communication module 150 and antenna 2 is coupled to wireless communication module 160 so that electronic device 100 can communicate with networks and other devices through wireless communication techniques. The wireless communication technology may include global system for mobile communications (GSM), General Packet Radio Service (GPRS), code division multiple access (code division multiple access, CDMA), Wideband Code Division Multiple Access (WCDMA), time-division code division multiple access (time-division code division multiple access, TD-SCDMA), Long Term Evolution (LTE), LTE, BT, GNSS, WLAN, NFC, FM, and/or IR technologies, etc. The GNSS may include a Global Positioning System (GPS), a global navigation satellite system (GLONASS), a beidou navigation satellite system (BDS), a quasi-zenith satellite system (QZSS), and/or a Satellite Based Augmentation System (SBAS).
The electronic device 100 implements display functions via the GPU, the display screen 194, and the application processor. The GPU is a microprocessor for image processing, and is connected to the display screen 194 and an application processor. The GPU is used to perform mathematical and geometric calculations for graphics rendering. The processor 110 may include one or more GPUs that execute program instructions to generate or alter display information.
The display screen 194 is used to display images, video, and the like. The display screen 194 includes a display panel. The display panel may adopt a Liquid Crystal Display (LCD), an organic light-emitting diode (OLED), an active-matrix organic light-emitting diode (active-matrix organic light-emitting diode, AMOLED), a flexible light-emitting diode (FLED), a miniature, a Micro-oeld, a quantum dot light-emitting diode (QLED), and the like. In some embodiments, the electronic device 100 may include 1 or N display screens 194, with N being a positive integer greater than 1.
The electronic device 100 may implement a shooting function through the ISP, the camera 193, the video codec, the GPU, the display 194, the application processor, and the like.
The ISP is used to process the data fed back by the camera 193. For example, when a photo is taken, the shutter is opened, light is transmitted to the camera photosensitive element through the lens, the optical signal is converted into an electrical signal, and the camera photosensitive element transmits the electrical signal to the ISP for processing and converting into an image visible to naked eyes. The ISP can also carry out algorithm optimization on the noise, brightness and skin color of the image. The ISP can also optimize parameters such as exposure, color temperature and the like of a shooting scene. In some embodiments, the ISP may be provided in camera 193.
The camera 193 is used to capture still images or video. The object generates an optical image through the lens and projects the optical image to the photosensitive element. The photosensitive element may be a Charge Coupled Device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor. The light sensing element converts the optical signal into an electrical signal, which is then passed to the ISP where it is converted into a digital image signal. And the ISP outputs the digital image signal to the DSP for processing. The DSP converts the digital image signal into image signal in standard RGB, YUV and other formats. In some embodiments, the electronic device 100 may include 1 or N cameras 193, N being a positive integer greater than 1.
The digital signal processor is used for processing digital signals, and can process digital image signals and other digital signals. For example, when the electronic device 100 selects a frequency bin, the digital signal processor is used to perform fourier transform or the like on the frequency bin energy.
Video codecs are used to compress or decompress digital video. The electronic device 100 may support one or more video codecs. In this way, the electronic device 100 may play or record video in a variety of encoding formats, such as: moving Picture Experts Group (MPEG) 1, MPEG2, MPEG3, MPEG4, and the like.
The NPU is a neural-network (NN) computing processor that processes input information quickly by using a biological neural network structure, for example, by using a transfer mode between neurons of a human brain, and can also learn by itself continuously. Applications such as intelligent recognition of the electronic device 100 can be realized through the NPU, for example: image recognition, face recognition, speech recognition, text understanding, and the like.
The external memory interface 120 may be used to connect an external memory card, such as a Micro SD card, to extend the memory capability of the electronic device 100. The external memory card communicates with the processor 110 through the external memory interface 120 to implement a data storage function. For example, files such as music, video, etc. are saved in an external memory card.
The internal memory 121 may be used to store computer-executable program code, which includes instructions. The internal memory 121 may include a program storage area and a data storage area. The storage program area may store an operating system, an application program (such as a sound playing function, an image playing function, etc.) required by at least one function, and the like. The storage data area may store data (such as audio data, phone book, etc.) created during use of the electronic device 100, and the like. In addition, the internal memory 121 may include a high-speed random access memory, and may further include a nonvolatile memory, such as at least one magnetic disk storage device, a flash memory device, a universal flash memory (UFS), and the like. The processor 110 executes various functional applications of the electronic device 100 and data processing by executing instructions stored in the internal memory 121 and/or instructions stored in a memory provided in the processor.
The electronic device 100 may implement audio functions via the audio module 170, the speaker 170A, the receiver 170B, the microphone 170C, the headphone interface 170D, and the application processor. Such as music playing, recording, etc.
The audio module 170 is used to convert digital audio information into an analog audio signal output and also to convert an analog audio input into a digital audio signal. The audio module 170 may also be used to encode and decode audio signals. In some embodiments, the audio module 170 may be disposed in the processor 110, or some functional modules of the audio module 170 may be disposed in the processor 110.
The speaker 170A, also called a "horn", is used to convert the audio electrical signal into an acoustic signal. The electronic apparatus 100 can listen to music through the speaker 170A or listen to a handsfree call.
The receiver 170B, also called "earpiece", is used to convert the electrical audio signal into an acoustic signal. When the electronic apparatus 100 receives a call or voice information, it can receive voice by placing the receiver 170B close to the ear of the person.
The microphone 170C, also referred to as a "microphone," is used to convert sound signals into electrical signals. When making a call or transmitting voice information, the user can input a voice signal to the microphone 170C by speaking the user's mouth near the microphone 170C. The electronic device 100 may be provided with at least one microphone 170C. In other embodiments, the electronic device 100 may be provided with two microphones 170C to achieve a noise reduction function in addition to collecting sound signals. In other embodiments, the electronic device 100 may further include three, four or more microphones 170C to collect sound signals, reduce noise, identify sound sources, perform directional recording, and so on.
The headphone interface 170D is used to connect a wired headphone. The headset interface 170D may be the USB interface 130, or may be a 3.5mm open mobile electronic device platform (OMTP) standard interface, a cellular telecommunications industry association (cellular telecommunications industry association of the USA, CTIA) standard interface.
The pressure sensor 180A is used for sensing a pressure signal, and converting the pressure signal into an electrical signal. In some embodiments, the pressure sensor 180A may be disposed on the display screen 194. The pressure sensor 180A can be of a wide variety, such as a resistive pressure sensor, an inductive pressure sensor, a capacitive pressure sensor, and the like. The capacitive pressure sensor may be a sensor comprising at least two parallel plates having an electrically conductive material. When a force acts on the pressure sensor 180A, the capacitance between the electrodes changes. The electronic device 100 determines the strength of the pressure from the change in capacitance. When a touch operation is applied to the display screen 194, the electronic apparatus 100 detects the intensity of the touch operation according to the pressure sensor 180A. The electronic apparatus 100 may also calculate the touched position from the detection signal of the pressure sensor 180A. In some embodiments, the touch operations that are applied to the same touch position but different touch operation intensities may correspond to different operation instructions. For example: and when the touch operation with the touch operation intensity smaller than the first pressure threshold value acts on the short message application icon, executing an instruction for viewing the short message. And when the touch operation with the touch operation intensity larger than or equal to the first pressure threshold value acts on the short message application icon, executing an instruction of newly building the short message.
The gyro sensor 180B may be used to determine the motion attitude of the electronic device 100. In some embodiments, the angular velocity of electronic device 100 about three axes (i.e., the x, y, and z axes) may be determined by gyroscope sensor 180B. The gyro sensor 180B may be used for photographing anti-shake. For example, when the shutter is pressed, the gyro sensor 180B detects a shake angle of the electronic device 100, calculates a distance to be compensated for by the lens module according to the shake angle, and allows the lens to counteract the shake of the electronic device 100 through a reverse movement, thereby achieving anti-shake. The gyroscope sensor 180B may also be used for navigation, somatosensory gaming scenes.
The air pressure sensor 180C is used to measure air pressure. In some embodiments, electronic device 100 calculates altitude, aiding in positioning and navigation, from barometric pressure values measured by barometric pressure sensor 180C.
The magnetic sensor 180D includes a hall sensor. The electronic device 100 may detect the opening and closing of the flip holster using the magnetic sensor 180D. In some embodiments, when the electronic device 100 is a flip phone, the electronic device 100 may detect the opening and closing of the flip according to the magnetic sensor 180D. And then according to the opening and closing state of the leather sheath or the opening and closing state of the flip cover, the automatic unlocking of the flip cover is set.
The acceleration sensor 180E may detect the magnitude of acceleration of the electronic device 100 in various directions (typically three axes). The magnitude and direction of gravity can be detected when the electronic device 100 is stationary. The method can also be used for recognizing the posture of the electronic equipment, and is applied to horizontal and vertical screen switching, pedometers and other applications.
A distance sensor 180F for measuring a distance. The electronic device 100 may measure the distance by infrared or laser. In some embodiments, taking a picture of a scene, electronic device 100 may utilize range sensor 180F to range for fast focus.
The proximity light sensor 180G may include, for example, a Light Emitting Diode (LED) and a light detector, such as a photodiode. The light emitting diode may be an infrared light emitting diode. The electronic device 100 emits infrared light to the outside through the light emitting diode. The electronic device 100 detects infrared reflected light from nearby objects using a photodiode. When sufficient reflected light is detected, it can be determined that there is an object near the electronic device 100. When insufficient reflected light is detected, the electronic device 100 may determine that there are no objects near the electronic device 100. The electronic device 100 can utilize the proximity light sensor 180G to detect that the user holds the electronic device 100 close to the ear for talking, so as to automatically turn off the screen to achieve the purpose of saving power. The proximity light sensor 180G may also be used in a holster mode, a pocket mode automatically unlocks and locks the screen.
The ambient light sensor 180L is used to sense the ambient light level. Electronic device 100 may adaptively adjust the brightness of display screen 194 based on the perceived ambient light level. The ambient light sensor 180L may also be used to automatically adjust the white balance when taking a picture. The ambient light sensor 180L may also cooperate with the proximity light sensor 180G to detect whether the electronic device 100 is in a pocket to prevent accidental touches.
The fingerprint sensor 180H is used to collect a fingerprint. The electronic device 100 can utilize the collected fingerprint characteristics to unlock the fingerprint, access the application lock, photograph the fingerprint, answer an incoming call with the fingerprint, and so on.
The temperature sensor 180J is used to detect temperature. In some embodiments, electronic device 100 implements a temperature processing strategy using the temperature detected by temperature sensor 180J. For example, when the temperature reported by the temperature sensor 180J exceeds a threshold, the electronic device 100 performs a reduction in performance of a processor located near the temperature sensor 180J, so as to reduce power consumption and implement thermal protection. In other embodiments, the electronic device 100 heats the battery 142 when the temperature is below another threshold to avoid the low temperature causing the electronic device 100 to shut down abnormally. In other embodiments, when the temperature is lower than a further threshold, the electronic device 100 performs boosting on the output voltage of the battery 142 to avoid abnormal shutdown due to low temperature.
The touch sensor 180K is also called a "touch device". The touch sensor 180K may be disposed on the display screen 194, and the touch sensor 180K and the display screen 194 form a touch screen, which is also called a "touch screen". The touch sensor 180K is used to detect a touch operation applied thereto or nearby. The touch sensor may communicate the detected touch operation to the application processor to determine the touch event type. Visual output associated with the touch operation may be provided through the display screen 194. In other embodiments, the touch sensor 180K may be disposed on a surface of the electronic device 100, different from the position of the display screen 194.
The bone conduction sensor 180M may acquire a vibration signal. In some embodiments, the bone conduction sensor 180M may acquire a vibration signal of the human vocal part vibrating the bone mass. The bone conduction sensor 180M may also contact the human pulse to receive the blood pressure pulsation signal. In some embodiments, the bone conduction sensor 180M may also be disposed in a headset, integrated into a bone conduction headset. The audio module 170 may analyze a voice signal based on the vibration signal of the bone mass vibrated by the sound part acquired by the bone conduction sensor 180M, so as to implement a voice function. The application processor can analyze heart rate information based on the blood pressure beating signal acquired by the bone conduction sensor 180M, so as to realize the heart rate detection function.
The keys 190 include a power-on key, a volume key, and the like. The keys 190 may be mechanical keys. Or may be touch keys. The electronic apparatus 100 may receive a key input, and generate a key signal input related to user setting and function control of the electronic apparatus 100.
The motor 191 may generate a vibration cue. The motor 191 may be used for incoming call vibration cues, as well as for touch vibration feedback. For example, touch operations applied to different applications (e.g., photographing, audio playing, etc.) may correspond to different vibration feedback effects. The motor 191 may also respond to different vibration feedback effects for touch operations applied to different areas of the display screen 194. Different application scenes (such as time reminding, receiving information, alarm clock, game and the like) can also correspond to different vibration feedback effects. The touch vibration feedback effect may also support customization.
Indicator 192 may be an indicator light that may be used to indicate a state of charge, a change in charge, or a message, missed call, notification, etc.
The SIM card interface 195 is used to connect a SIM card. The SIM card can be brought into and out of contact with the electronic apparatus 100 by being inserted into the SIM card interface 195 or being pulled out of the SIM card interface 195. The electronic device 100 may support 1 or N SIM card interfaces, N being a positive integer greater than 1. The SIM card interface 195 may support a Nano SIM card, a Micro SIM card, a SIM card, etc. The same SIM card interface 195 can be inserted with multiple cards at the same time. The types of the plurality of cards may be the same or different. The SIM card interface 195 may also be compatible with different types of SIM cards. The SIM card interface 195 may also be compatible with external memory cards. The electronic device 100 interacts with the network through the SIM card to implement functions such as communication and data communication. In some embodiments, the electronic device 100 employs esims, namely: an embedded SIM card. The eSIM card can be embedded in the electronic device 100 and cannot be separated from the electronic device 100.
The application loading method provided by the embodiment of the present application is now described with reference to fig. 2 and 3.
Fig. 2 is a schematic flowchart illustrating an embodiment of an application program loading method according to an embodiment of the present application, including:
in step 201, a first device obtains operating system firmware.
Specifically, the first device may be a personal computer (e.g., a computer) or the like, and the operating system firmware is a closed-source operating system firmware. For convenience of description, the closed-source operating system firmware obtained in this step 201 is hereinafter referred to as "first firmware", and the trusted application TA included in the above-mentioned first firmware may be referred to as "first TA".
For convenience of description, the memory area storing the first firmware is hereinafter referred to as a "first memory area", and the first memory area may include a first start address and a first end address, where the first start address is used to represent a start memory address of the first memory area, and the first end address is used to represent an end memory address of the first memory area.
In addition, since the first firmware further includes one or more first TAs, an end position of an ending first TA in the first firmware may include a tag, where the ending first TA may be a last first TA of all the first TAs in the first firmware. The tag may correspond to an ending memory address of the ending first TA, and the tag may be used to characterize an ending location of the ending first TA. Each first TA may also include a universally Unique Identifier (uuid), which may be used to identify the identity of the TA.
In step 202, the first device obtains a TA to be loaded.
Specifically, the number of TAs to be loaded may be one or more. For convenience of illustration, the following is an exemplary illustration through one TA to be loaded, but the TA is not limited to the embodiment of the present application, and in some embodiments, a scenario including multiple TAs to be loaded may also be included. The TA to be loaded this time will be referred to as "second TA" hereinafter.
After the first device acquires the second TA, a universal unique identification code uuid may be allocated to the second TA; wherein, in order to effectively distinguish the first TA from the second TA, uuid of the second TA is different from uuid of the first TA. It is understood that the second TA is an executable file, and does not occupy memory space when not written to the first firmware.
In response to the detected addition operation by the user, the first device adds the second TA to the first firmware, step 203.
Specifically, in response to the adding operation of the user, the first device finds, in the first firmware, a tag of the ending first TA through parsing, and the tag may obtain a memory address of an ending location of the ending first TA corresponding to the tag, that is, an ending memory address of a last TA in all first TAs in the first firmware. Then, the first device may further parse the first firmware, so as to obtain a first start address (i.e., a start memory address of the first firmware in the first memory area).
Next, the first device may create a new firmware based on the first firmware, and for convenience of description, the new firmware will be referred to as "second firmware" hereinafter. The second firmware may be written with the second TA. In a specific implementation, the writing operation of the second TA into the second firmware may be to copy the data of the first firmware to obtain copied data of the first firmware, where a starting memory address of the copied data of the first firmware is the same as a starting memory address of the data of the first firmware, that is, in the copied data of the first firmware, the starting memory address of the first firmware is not changed, and a memory address of the first TA in the first firmware is not changed. Next, writing of the second TA is started from the end position of the first TA in the copied data of the first firmware. It is to be understood that the above-mentioned end position of the end first TA may be regarded as the start position of the second TA. After the second TA to be loaded is written after the copied data of the first firmware, the second firmware can be obtained. For convenience of description, the memory area occupied by the second firmware may be referred to as a "second memory area", the second memory area includes a starting memory address and an ending memory address corresponding to the second memory area, and for convenience of description, the starting memory address of the second memory area is hereinafter referred to as a "second starting address", and the ending memory address of the second memory area is hereinafter referred to as a "second ending address". It can be understood that a first start address of a first memory area occupied by the first firmware is the same as a second start address of a second memory area occupied by the second firmware, and a first end address of the first memory area occupied by the first firmware is different from a second end address of the second memory area occupied by the second firmware.
Since another code may be inserted and run after the end position of the first TA is ended in the first firmware, there is a possibility that the second TA cannot be written after the end position of the first TA is ended in the first firmware. Preferably, before the second TA is written into the first firmware, a blank memory area may be reserved in the first firmware, the reserved blank memory area may not include any data, and the reserved blank memory area may be reserved for the second TA, that is, the second TA may be written into the reserved blank memory area. The starting memory address of the reserved blank memory area may be determined by an ending position of the ending first TA in the first firmware, for example, the starting memory address of the reserved blank memory area is from the ending memory address of the ending first TA in the first firmware. It can be understood that the data size of the second TA is about tens of KB, and thus, the size of the reserved blank memory area may be about several MB. The size of the reserved blank memory area is merely an exemplary illustration and is not limited to the embodiment of the present application, and in some embodiments, the size of the reserved blank memory area may also be other values. By reserving the memory area, the problem that the second TA cannot be written in the first firmware can be avoided.
After the first device writes the second TA in the second firmware, information such as the unique and universal identification code uuid of the second TA may be encapsulated in the second firmware. Further, the second TA may be marked, where the mark is used to indicate that the TA is the second TA (i.e., a newly added TA), so that the second TA may be built in the second firmware, and the subsequent electronic device 100 may smoothly perform static loading on the newly added TA.
In step 204, after the electronic device 100 is started, the TA is loaded.
Specifically, after the first device completes the initialization of the second TA, that is, writes the second TA into the second firmware, the second firmware written into the second TA may be pushed into the electronic device 100. The user may then boot up the electronic device 100, whereby the newly written second TA may be loaded. When the electronic device 100 is booted, a newly added TA (e.g., the second TA) in the firmware (e.g., the second firmware) may be statically loaded. In a specific implementation, after the electronic device 100 is started, whether the TA is a newly added TA may be determined by a flag of a second TA in the second firmware, and if the TA in the second firmware is the second TA (that is, the newly added TA), the static loading operation may be performed by searching a starting memory address and an ending memory address of the second TA.
Optionally, before the electronic device 100 is started, a loading manner of the TA may be configured in advance. For example, the static loading manner may be static loading in a manner of embedding a TA described in steps 201 to 203, and the dynamic loading manner may be dynamic loading in which a TA is developed by using a Software Development Kit (SDK), which needs to be described. Therefore, after the electronic device 100 is started, the TA may be loaded according to the configured loading mode, so as to implement configurable loading.
In step 205, in response to the detected deletion operation of the user, the electronic device 100 deletes the second TA in the second firmware.
Specifically, when the user no longer needs to statically load one or more second TAs in the second firmware, the one or more second TAs may also be deleted from the second firmware. In response to the user's deletion operation, the electronic device 100 may delete the second TA in the second firmware. In a specific implementation, after detecting the deletion operation of the user, the electronic device 100 may obtain the unique universal identification code uuid of the second TA to be deleted this time, and find the tag ending the first TA in the second firmware, and may obtain, from the tag, the memory address corresponding to the end position of the ending first TA corresponding to the tag, that is, the ending start memory address of the ending first TA, and may further determine the starting memory address of the first second TA. It is to be understood that the deletion operation may be performed on one or more second TAs, and for convenience of description, the following description is only exemplary through deletion of one second TA, but does not limit the embodiments of the present application.
Then, the electronic device 100 parses the second firmware, so as to obtain a start memory address and an end memory address of the second TA to be deleted.
Then, the electronic device 100 determines whether the TA to be deleted includes a flag, that is, whether the TA to be deleted is a second TA, it is understood that in this embodiment of the application, the second TA may be deleted, but the first TA is not deleted. Further, after determining that the TA to be deleted includes the mark (that is, the TA to be deleted this time is the second TA), it may also be determined whether the unique universal identification code uuid of the TA to be deleted matches the unique universal identification code uuid of the second TA in the second firmware, and if the unique universal identification code uuid of the TA to be deleted matches the unique universal identification code uuid of the second TA in the second firmware, the second TA to be deleted in the second firmware may be determined by the unique universal identification code uuid.
It should be noted that, the processes of determining the mark and matching the unique universal identification code uuid are not in sequence, for example, the determining mark may be executed first, then the unique universal identification code uuid matching is executed, or the unique universal identification code uuid matching is executed first, and then the determining mark is executed, which is not limited in this embodiment of the present application.
When the second TA to be deleted in the second firmware is determined, the second TA to be deleted may be deleted, and the start memory address and the end memory address of the second TA to be deleted are recorded. It can be understood that, after the second TA to be deleted is deleted, the memory space from the starting memory address to the ending memory address of the deleted second TA is no longer occupied, so that the second TA subsequent to the deleted second TA may cover the memory area, that is, the memory space originally occupied by the second TA subsequent to the deleted second TA is replaced by the memory space from the starting memory address to the ending memory address of the deleted second TA.
In step 206, in response to the detected browsing operation of the user, the electronic device 100 presents the TA.
Specifically, the user may also browse all TAs in the second firmware in the electronic device 100, where the all TAs may include the first TA and the second TA. In response to the detected browsing operation of the user, the electronic device 100 may expose all TAs in the second firmware. Fig. 3 shows the effect of all TAs.
Optionally, the user may also browse all TAs in the first firmware in the first device, that is, before the second TA is built into the second firmware, the user may also browse all TAs in the first firmware in the first device. In response to the detected browsing operation of the user, the first device may present all TAs in the first firmware, and it is understood that all TAs in the first firmware only include the first TA. For the illustration of the first TA, refer to fig. 3, which is not described herein again.
Fig. 4 is a schematic structural diagram of an embodiment of a chip of the present application, and as shown in fig. 4, the chip 40 applied to an electronic device may include: a loading module 41; wherein the content of the first and second substances,
a loading module 41, configured to load one or more second trusted applications in the second firmware based on the flag after the electronic device is started; wherein the flag is to identify a second trusted application in the second firmware obtained by writing the one or more second trusted applications in the first firmware.
In one possible implementation manner, the first firmware is a closed source operating system firmware, and includes one or more first trusted application programs.
In one possible implementation manner, the chip 40 further includes:
a deleting module 42, configured to delete one or more second trusted applications in the second firmware in response to the detected user's deletion operation.
In one possible implementation manner, the one or more second trusted applications are written from an ending memory address of a last first trusted application in the first firmware.
In one possible implementation manner, the chip 40 further includes:
and the browsing module 43 is configured to display the first trusted application program and the second trusted application program in the second firmware in response to the detected browsing operation of the user.
In one possible implementation manner, the first firmware includes a reserved memory area, the reserved memory area is used for writing the one or more second trusted applications, and a starting memory address of the reserved memory area is determined by a memory address of an end position of a last first trusted application in the first firmware.
It should be understood that the interface connection relationship between the modules illustrated in the embodiments of the present application is only an illustration, and does not limit the structure of the electronic device 100. In other embodiments of the present application, the electronic device 100 may also adopt different interface connection manners or a combination of multiple interface connection manners in the above embodiments.
It is to be understood that the electronic device 100 and the like described above include corresponding hardware structures and/or software modules for performing the respective functions in order to realize the functions described above. Those of skill in the art will readily appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the embodiments of the present application.
In the embodiment of the present application, the electronic device 100 and the like may be divided into functional modules according to the method example, for example, each functional module may be divided for each function, or two or more functions may be integrated into one processing module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. It should be noted that, in the embodiment of the present application, the division of the module is schematic, and is only one logic function division, and there may be another division manner in actual implementation.
Through the description of the foregoing embodiments, it will be clear to those skilled in the art that, for convenience and simplicity of description, only the division of the functional modules is illustrated, and in practical applications, the above function distribution may be completed by different functional modules as needed, that is, the internal structure of the apparatus may be divided into different functional modules to complete all or part of the above described functions. For the specific working processes of the system, the apparatus and the unit described above, reference may be made to the corresponding processes in the foregoing method embodiments, and details are not described here again.
Each functional unit in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially implemented or make a contribution to the prior art, or all or part of the technical solutions may be implemented in the form of a software product stored in a storage medium and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) or a processor to execute all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: flash memory, removable hard drive, read only memory, random access memory, magnetic or optical disk, and the like.
The above description is only an embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions within the technical scope of the present disclosure should be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (8)

1. An application program loading method applied to an electronic device is characterized by comprising the following steps:
loading one or more second trusted application programs in second firmware based on the mark after the electronic equipment is started; wherein the flag is used to identify a second trusted application in the second firmware obtained by writing the one or more second trusted applications in the first firmware, the first firmware includes a reserved memory area for writing the one or more second trusted applications, and a starting memory address of the reserved memory area is determined by a memory address of an ending location of a last first trusted application in the first firmware.
2. The method of claim 1, wherein the first firmware is a closed source operating system firmware comprising one or more first trusted applications.
3. The method according to claim 1 or 2, characterized in that the method further comprises:
and in response to the detected user's deletion operation, deleting one or more second trusted applications in the second firmware.
4. The method according to claim 1 or 2,
the one or more second trusted applications are written from an ending memory address of a last first trusted application in the first firmware.
5. The method according to claim 1 or 2, characterized in that the method further comprises:
and responding to the detected browsing operation of the user, and displaying the first trusted application program and the second trusted application program in the second firmware.
6. A chip for performing the method of any one of claims 1-5.
7. An electronic device, comprising: a memory for storing computer program code, the computer program code comprising instructions that, when read from the memory by the electronic device, cause the electronic device to perform the method of any of claims 1-5.
8. A computer readable storage medium comprising computer instructions which, when run on the electronic device, cause the electronic device to perform the method of any of claims 1-5.
CN202111485751.3A 2021-12-07 2021-12-07 Application program loading method, electronic device and storage medium Active CN113901485B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111485751.3A CN113901485B (en) 2021-12-07 2021-12-07 Application program loading method, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111485751.3A CN113901485B (en) 2021-12-07 2021-12-07 Application program loading method, electronic device and storage medium

Publications (2)

Publication Number Publication Date
CN113901485A CN113901485A (en) 2022-01-07
CN113901485B true CN113901485B (en) 2022-05-10

Family

ID=79025616

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111485751.3A Active CN113901485B (en) 2021-12-07 2021-12-07 Application program loading method, electronic device and storage medium

Country Status (1)

Country Link
CN (1) CN113901485B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116048710B (en) * 2023-04-03 2023-09-29 荣耀终端有限公司 Application identifier display method, electronic device and readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1429224A1 (en) * 2002-12-10 2004-06-16 Texas Instruments Incorporated Firmware run-time authentication
CN112783564A (en) * 2019-11-01 2021-05-11 华为技术有限公司 Method for accelerating starting of application program and electronic equipment
CN113747060A (en) * 2021-08-12 2021-12-03 荣耀终端有限公司 Method, apparatus, storage medium, and computer program product for image processing

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008014004A2 (en) * 2006-07-28 2008-01-31 Brown University Load-balanced distributed authentication structures
CN105260663B (en) * 2015-09-15 2017-12-01 中国科学院信息工程研究所 A kind of safe storage service system and method based on TrustZone technologies
CN112817657B (en) * 2021-01-29 2023-07-18 北京奇艺世纪科技有限公司 Application program starting item loading method, device, system and storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1429224A1 (en) * 2002-12-10 2004-06-16 Texas Instruments Incorporated Firmware run-time authentication
CN112783564A (en) * 2019-11-01 2021-05-11 华为技术有限公司 Method for accelerating starting of application program and electronic equipment
CN113747060A (en) * 2021-08-12 2021-12-03 荣耀终端有限公司 Method, apparatus, storage medium, and computer program product for image processing

Also Published As

Publication number Publication date
CN113901485A (en) 2022-01-07

Similar Documents

Publication Publication Date Title
CN113704014B (en) Log acquisition system, method, electronic device and storage medium
CN110347269B (en) Empty mouse mode realization method and related equipment
CN113498124B (en) SIM card and eSIM card switching method and electronic equipment
CN110515646B (en) Differential upgrading method and related equipment
CN113704205B (en) Log storage method, chip, electronic device and readable storage medium
CN114189846B (en) Method, system, electronic device and storage medium for avoiding missed call
CN113254409A (en) File sharing method, system and related equipment
WO2022089000A1 (en) File system check method, electronic device, and computer readable storage medium
CN110742580A (en) Sleep state identification method and device
CN115589051B (en) Charging method and terminal equipment
CN111865646A (en) Terminal upgrading method and related device
CN111343326A (en) Method and related device for acquiring test log
CN114880251B (en) Memory cell access method, memory cell access device and terminal equipment
CN113973398A (en) Wireless network connection method, electronic equipment and chip system
WO2022170856A1 (en) Method for establishing connection, and electronic device
CN111104295A (en) Method and equipment for testing page loading process
CN111492678B (en) File transmission method and electronic equipment
CN113126948A (en) Audio playing method and related equipment
CN114077519B (en) System service recovery method and device and electronic equipment
CN110806994B (en) Signal transmission method and device
CN113901485B (en) Application program loading method, electronic device and storage medium
CN113467735A (en) Image adjusting method, electronic device and storage medium
CN113918003A (en) Method and device for detecting time length of skin contacting screen and electronic equipment
CN114466238A (en) Frame demultiplexing method, electronic device and storage medium
CN113364067B (en) Charging precision calibration method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant