CN113987548A - Engineering mode encryption method and device for electronic equipment, electronic equipment and storage medium - Google Patents

Engineering mode encryption method and device for electronic equipment, electronic equipment and storage medium Download PDF

Info

Publication number
CN113987548A
CN113987548A CN202111320585.1A CN202111320585A CN113987548A CN 113987548 A CN113987548 A CN 113987548A CN 202111320585 A CN202111320585 A CN 202111320585A CN 113987548 A CN113987548 A CN 113987548A
Authority
CN
China
Prior art keywords
decryption
mode
encryption
tool
electronic equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111320585.1A
Other languages
Chinese (zh)
Inventor
沈伊伶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Wingtech Electronic Technology Co Ltd
Original Assignee
Shanghai Wingtech Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Wingtech Electronic Technology Co Ltd filed Critical Shanghai Wingtech Electronic Technology Co Ltd
Priority to CN202111320585.1A priority Critical patent/CN113987548A/en
Publication of CN113987548A publication Critical patent/CN113987548A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Abstract

The disclosure relates to an engineering mode encryption method and device for electronic equipment, the electronic equipment and a storage medium. The engineering mode encryption method of the electronic equipment comprises the following steps: the electronic equipment enters a guide mode based on the control instruction; receiving an encryption instruction sent by a production tool, wherein the encryption instruction comprises identity information of the production tool, and the identity information is encrypted by the production tool in advance through a first encryption mode; and decrypting the identity information based on a first decryption mode agreed in advance, and encrypting the engineering mode of the electronic equipment based on the encryption instruction after the decryption is successful. According to the method and the device, only the production tool authorized to pass verification has the authority of encrypting the engineering mode of the electronic equipment, so that the random encryption of the engineering mode of the electronic equipment is effectively avoided, the encryption process is safer and more reliable, and the safety and the reliability of the electronic equipment are ensured.

Description

Engineering mode encryption method and device for electronic equipment, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of electronic devices, and in particular, to an engineering mode encryption method and apparatus for an electronic device, and a storage medium.
Background
In the related art, for electronic devices such as smart phones equipped with android systems, it is sometimes necessary to enter an engineering mode to implement functions such as maintenance of the electronic devices through functions opened in the engineering mode. However, these functions and engineering modes are usually not open to users, and in order to avoid users entering the engineering mode, it is common practice to encrypt the engineering mode, and when some functions of the engineering mode need to be used, such as after-sales personnel, the engineering mode is decrypted and operated. Thus, the user can be prevented from using the engineering mode.
However, for the above mentioned encryption and decryption behavior of the power supply mode, the current practice is generally: encryption is achieved by instruction writing and decryption is achieved by flashing the image partition. However, the instruction in the encryption process can be used conveniently, the security is not high, the image decryption is carried out, the manufacture is complicated, the requirement on the uniqueness of the version is high, and the operability is low.
Disclosure of Invention
In view of the above, it is desirable to provide an engineering mode encryption method and apparatus for an electronic device, and a storage medium.
An embodiment of a first aspect of the present application provides an engineering mode encryption method for an electronic device, including:
the electronic equipment enters a guide mode based on the control instruction;
receiving an encryption instruction sent by a production tool, wherein the encryption instruction comprises identity information of the production tool, and the identity information is encrypted by the production tool in advance through a first encryption mode;
and decrypting the identity information based on a first decryption mode agreed in advance, and encrypting the engineering mode of the electronic equipment based on the encryption instruction after the decryption is successful.
In some examples, before the electronic device enters the boot mode based on the control instruction, the method further includes:
and receiving a first public key of the production tool sent by the production tool, so as to obtain the first decryption mode based on the first public key.
In some examples, the identity information is previously encrypted by the production tool with a first private key in the production tool that matches the first public key.
An embodiment of a second aspect of the present application provides an engineering mode decryption method for an electronic device, including:
receiving a decryption request sent by a decryption tool;
sending authentication information to the decryption tool, wherein the authentication information is encrypted by the electronic equipment in a second encryption mode, and the authentication information is used for identifying the identity of the decryption tool;
and after the decryption tool decrypts the authentication information through a second decryption mode and completes authentication, decrypting the engineering mode of the electronic equipment based on the input of the decryption tool.
In some examples, the electronic device has a second public key of the decryption tool pre-stored therein, so as to encrypt the authentication information through the second public key, and the decryption tool decrypts the authentication information through a second private key of the decryption tool matching the second public key.
An embodiment of a third aspect of the present application provides an engineering mode encryption system for an electronic device, including:
the control module is used for controlling the electronic equipment to enter a guide mode based on the control instruction;
the system comprises a first receiving module, a second receiving module and a first encryption module, wherein the first receiving module is used for receiving an encryption instruction sent by a production tool, the encryption instruction comprises identity information of the production tool, and the identity information is encrypted by the production tool in advance in a first encryption mode;
and the engineering mode encryption module is used for decrypting the identity information based on a first decryption mode agreed in advance and encrypting the engineering mode of the electronic equipment based on the encryption instruction after the decryption is successful.
An embodiment of a fourth aspect of the present application provides an engineering mode decryption apparatus for an electronic device, including:
the second receiving module is used for receiving a decryption request sent by the decryption tool;
the sending module is used for sending authentication information to the decryption tool, wherein the authentication information is encrypted by the electronic equipment in a second encryption mode, and the authentication information is used for identifying the identity of the decryption tool;
and the engineering mode decryption module is used for decrypting the engineering mode of the electronic equipment based on the input of the decryption tool after the decryption tool decrypts the authentication information through a second decryption mode and completes authentication.
An embodiment of a fifth aspect of the present application provides an electronic device, including a processor and a memory, where the memory stores at least one instruction, at least one program, a set of codes, or a set of instructions, and the instruction, the program, the set of codes, or the set of instructions is loaded and executed by the processor to implement the steps of the engineering mode encryption method of the electronic device provided in the embodiment of the first aspect described above in the present application, and/or the steps of the engineering mode decryption method of the electronic device provided in the embodiment of the second aspect.
Embodiments of the sixth aspect of the present application provide a non-transitory computer-readable storage medium, wherein instructions, when executed by a processor of a mobile terminal, enable the mobile terminal to perform the steps of the engineering mode encryption method for an electronic device provided in embodiments of the first aspect of the present application described above and/or the steps of the engineering mode decryption method for an electronic device provided in embodiments of the second aspect of the present application.
An embodiment of the seventh aspect of the present application provides a computer program product, wherein instructions that, when executed by a processor of a mobile terminal, enable the mobile terminal to perform the steps of the engineering mode encryption method for an electronic device provided in the embodiment of the first aspect of the present application described above and/or the steps of the engineering mode decryption method for an electronic device provided in the embodiment of the second aspect of the present application.
According to the engineering mode encryption method and device for the electronic equipment, the electronic equipment and the storage medium, the electronic equipment is controlled to enter the boot mode, then the encryption instruction sent by the production tool is received, the identity information of the production tool is decrypted according to the pre-agreed first decryption mode, and the engineering mode of the electronic equipment is encrypted after decryption is successful. Therefore, only the production tool which is authorized to pass the verification has the authority of encrypting the engineering mode of the electronic equipment, the random encryption of the engineering mode of the electronic equipment is effectively avoided, the encryption process is safer and more reliable, and the safety and the reliability of the electronic equipment are ensured.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
FIG. 1 is a flowchart illustrating an engineering mode encryption method for an electronic device according to an embodiment;
FIG. 2 is a flowchart illustrating an engineering mode decryption method of an electronic device according to an embodiment;
FIG. 3 is a block diagram showing an example of an engineering mode encryption apparatus of an electronic device;
FIG. 4 is a block diagram of an embodiment of an apparatus for decrypting engineering mode of an electronic device
FIG. 5 is a diagram illustrating an internal structure of an electronic device in one embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
An engineering mode encryption method and apparatus for an electronic device, and a storage medium according to embodiments of the present invention are described below with reference to the accompanying drawings.
Fig. 1 is a flowchart of an engineering mode encryption method of an electronic device according to one embodiment of the present invention. As shown in fig. 1, an engineering mode encryption method for an electronic device according to an embodiment of the present invention includes the following steps:
s101: the electronic device enters a boot mode based on the control instruction.
The electronic device is, but not limited to, a smart phone, a tablet computer, an electronic book, and the like.
Taking a smart phone with an android system as an example, the smart phone can be controlled to enter a guidance mode by sending an instruction (namely, a control instruction) to the smart phone, namely: fastboot mode.
In a specific example, an instruction may be sent to the smart phone through an external tool, such as a production tool used in producing the smart phone, so as to enable the smart phone to enter the fastboot mode.
S102: receiving an encryption instruction sent by a production tool, wherein the encryption instruction comprises identity information of the production tool, and the identity information is encrypted by the production tool in advance through a first encryption mode.
Specifically, after the smart phone is controlled to enter the fastboot mode, an encryption instruction can be issued to the smart phone in the fastboot mode, and the encryption instruction is used for encrypting the engineering mode of the smart phone.
In a specific example, the encrypted instruction includes, but is not limited to, identity information of the production tool, the identity information being encrypted by the production tool in advance through a first encryption manner, where the identity information is used to identify the production tool, that is: through the identity information, it can be determined that only a production tool with a specific identity can encrypt the engineering mode of the electronic equipment. The identity information may be a serial number of the production tool, or the like, or may be a specific identifier agreed in advance.
In this example, the first encryption mode may be encryption by a private key of the production tool, and specifically, the identity information may be encrypted by the production tool in advance by the first private key of the production tool. In this case, the production tool may give the public key matching the first private key, i.e., the first public key, to the electronic device. Then, the electronic device can complete the decryption of the identity information through the first public key.
S103: and decrypting the identity information based on a first decryption mode agreed in advance, and encrypting the engineering mode of the electronic equipment based on the encryption instruction after the decryption is successful.
Specifically, before the electronic device enters the boot mode based on the control instruction, the method further includes: and receiving a first public key of the production tool sent by the production tool, so as to obtain the first decryption mode based on the first public key. After the identity information of the production tool is obtained, whether the production tool is authorized to implement the encryption work of the engineering mode of the electronic equipment can be determined.
In the above example, it is assumed that a certain production tool a has the authority to implement the encryption work of the engineering mode of the electronic device, the production tool a may inform the electronic device of its first public key in advance, so that, after receiving the encryption command sent by the production tool, the identity information decrypted by the production tool a through its own first private key can be decrypted, and further, determining that the production tool A has the authority to realize the encryption work of the engineering mode of the electronic equipment according to the identity information of the production tool A, thus, the encryption work of the engineering mode of the electronic equipment can be completed according to the operation of the production tool A, the encryption of the engineering mode of the electronic device includes, but is not limited to, encryption of dialer module ciphers, encryption of bsp module ports, and encryption of other modules that can implement functions through the engineering mode. Therefore, when the engineering mode of the electronic device needs to be used, the electronic device needs to be decrypted before being used.
In a specific application, for example, in a customer version of a production line of an electronic device, functions such as a secret code and an AT port need to be used, which cannot be opened to a customer in the customer version, but after sale, or in some special scenes, need to be used, and therefore, the engineering mode needs to be returned to this state. Therefore, the safety and the reliability of the electronic equipment are improved. The following steps are repeated: when after-sale maintenance needs to enter an engineering mode for function test, decryption is needed first, and then related work of after-sale service is carried out.
According to the engineering mode encryption method of the electronic equipment, the electronic equipment is controlled to enter a boot mode, then an encryption instruction sent by a production tool is received, the identity information of the production tool is decrypted according to a first decryption mode which is agreed in advance, and the engineering mode of the electronic equipment is encrypted after decryption is successful. Therefore, only the production tool which is authorized to pass the verification has the authority of encrypting the engineering mode of the electronic equipment, the random encryption of the engineering mode of the electronic equipment is effectively avoided, the encryption process is safer and more reliable, and the safety and the reliability of the electronic equipment are ensured.
Fig. 2 is a flowchart of an engineering mode decryption method of an electronic device according to one embodiment of the present invention. As shown in fig. 2, an engineering mode decryption method for an electronic device according to an embodiment of the present invention includes:
s201: and receiving a decryption request sent by a decryption tool.
The decryption is an external tool, and may be some after-sales detection device.
S202: and sending authentication information to the decryption tool, wherein the authentication information is encrypted by the electronic equipment in a second encryption mode, and the authentication information is used for authenticating the identity of the decryption tool.
Specifically, the electronic device prestores a second public key of the decryption tool, so as to encrypt the authentication information through the second public key, and the decryption tool decrypts the authentication information through a second private key of the decryption tool matched with the second public key. Namely: the authorized decrypting tool informs the electronic device of the second public key of the authorized decrypting tool in advance, so that when the decrypting tool needs to decrypt the engineering mode of the electronic device, the electronic device sends authentication information to the decrypting work, and the authentication information is encrypted by the electronic device according to the second public key of the authorized decrypting tool, so that after the decrypting tool receives the authentication information, if the decrypting tool can decrypt through the second private key of the decrypting tool, the decrypting tool has the authority of decrypting the engineering mode of the electronic device.
S203: and after the decryption tool decrypts the authentication information through a second decryption mode and completes authentication, decrypting the engineering mode of the electronic equipment based on the input of the decryption tool. Namely: if the decryption tool can decrypt, the decryption tool has the authority of decrypting the engineering mode of the electronic equipment, and further can complete decryption of the engineering mode of the electronic equipment, and further can smoothly use functions of some secret codes, AT ports and the like in the engineering mode.
According to the engineering mode decryption method of the electronic equipment, the decryption request sent by the decryption tool is received, the authentication information is sent to the decryption tool, and after the decryption tool decrypts the authentication information through the second decryption mode and completes authentication, the engineering mode of the electronic equipment is decrypted according to the input of the decryption tool. Therefore, only the authorized decryption tool has the authority to decrypt the engineering mode of the electronic equipment and use some functions of the engineering mode, and further, the decryption complexity of the engineering mode of the electronic equipment is effectively avoided, so that the decryption process is simple, safe and reliable, and the safety and the reliability of the electronic equipment are ensured.
Fig. 3 is a block diagram of an engineering mode encryption apparatus of an electronic device according to an embodiment of the present invention. As shown in fig. 3, an engineering mode encryption apparatus of an electronic device according to an embodiment of the present invention includes: a control module 310, a first receiving module 320, and an engineering mode encryption module 330, wherein:
the control module 310 is configured to control the electronic device to enter a boot mode based on the control instruction;
the first receiving module 320 is configured to receive an encryption instruction sent by a production tool, where the encryption instruction includes identity information of the production tool, and the identity information is encrypted by the production tool in advance in a first encryption manner;
the engineering mode encryption module 330 is configured to decrypt the identity information based on a first decryption manner agreed in advance, and encrypt the engineering mode of the electronic device based on the encryption instruction after the decryption is successful.
According to the engineering mode encryption device of the electronic equipment, the electronic equipment is controlled to enter a boot mode, then an encryption instruction sent by a production tool is received, the identity information of the production tool is decrypted according to a first decryption mode which is agreed in advance, and the engineering mode of the electronic equipment is encrypted after decryption is successful. Therefore, only the production tool which is authorized to pass the verification has the authority of encrypting the engineering mode of the electronic equipment, the random encryption of the engineering mode of the electronic equipment is effectively avoided, the encryption process is safer and more reliable, and the safety and the reliability of the electronic equipment are ensured.
For specific limitations of the engineering mode encryption apparatus of the electronic device, refer to the above limitations on the engineering mode encryption method of the electronic device, which are not described herein again. The modules in the engineering mode encryption device of the electronic equipment can be completely or partially realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
Fig. 4 is a block diagram of an engineering mode decryption apparatus of an electronic device according to an embodiment of the present invention. As shown in fig. 4, an engineering mode decryption apparatus of an electronic device according to an embodiment of the present invention includes: a second receiving module 410, a sending module 420 and an engineering mode decrypting module 430, wherein:
the second receiving module 410 is used for receiving a decryption request sent by a decryption tool;
the sending module 420 is configured to send authentication information to the decryption tool, where the authentication information is encrypted by the electronic device in a second encryption manner, and the authentication information is used to authenticate the identity of the decryption tool;
the engineering mode decryption module 430 is configured to decrypt the engineering mode of the electronic device based on the input of the decryption tool after the decryption tool decrypts the authentication information through the second decryption method and completes authentication.
According to the engineering mode decryption method of the electronic equipment, the decryption request sent by the decryption tool is received, the authentication information is sent to the decryption tool, and after the decryption tool decrypts the authentication information through the second decryption mode and completes authentication, the engineering mode of the electronic equipment is decrypted according to the input of the decryption tool. Therefore, only the authorized decryption tool has the authority to decrypt the engineering mode of the electronic equipment and use some functions of the engineering mode, and further, the decryption complexity of the engineering mode of the electronic equipment is effectively avoided, so that the decryption process is simple, safe and reliable, and the safety and the reliability of the electronic equipment are ensured.
For the specific definition of the engineering mode decryption apparatus of the electronic device, refer to the above definition of the engineering mode decryption method of the electronic device, and are not described herein again. The modules in the engineering mode encryption device of the electronic equipment can be completely or partially realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, an electronic device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 5. The electronic device comprises a processor, a memory, a communication interface, a display screen and an input device which are connected through a system bus. Wherein the processor of the electronic device is configured to provide computing and control capabilities. The memory of the electronic equipment comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless communication can be realized through WIFI, an operator network, Near Field Communication (NFC) or other technologies. The computer program is executed by a processor to implement an engineering mode encryption method for an electronic device. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 5 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
At least one instruction, at least one program, a set of codes, or a set of instructions is stored in a memory of the electronic device, and the instruction, the program, the set of codes, or the set of instructions is loaded and executed by the processor to implement the engineering mode encryption method of the electronic device and/or the engineering mode decryption method of the electronic device according to any one of the above embodiments.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of: controlling the electronic equipment to enter a guide mode; receiving an encryption instruction sent by a production tool, wherein the encryption instruction comprises identity information of the production tool, and the identity information is encrypted by the production tool in advance through a first encryption mode; decrypting the identity information based on a first decryption mode which is agreed in advance, and after the decryption is successful, encrypting the engineering mode of the electronic equipment based on the encryption instruction, and/or receiving a decryption request sent by a decryption tool; sending authentication information to the decryption tool, wherein the authentication information is encrypted by the electronic equipment in a second encryption mode, and the authentication information is used for identifying the identity of the decryption tool; and after the decryption tool decrypts the authentication information through a second decryption mode and completes authentication, decrypting the engineering mode of the electronic equipment based on the input of the decryption tool.
In one embodiment, a computer program product is provided, the instructions in which, when executed by a processor of a mobile terminal, enable the mobile terminal to perform the steps of: controlling the electronic equipment to enter a guide mode; receiving an encryption instruction sent by a production tool, wherein the encryption instruction comprises identity information of the production tool, and the identity information is encrypted by the production tool in advance through a first encryption mode; decrypting the identity information based on a first decryption mode which is agreed in advance, and after the decryption is successful, encrypting the engineering mode of the electronic equipment based on the encryption instruction, and/or receiving a decryption request sent by a decryption tool; sending authentication information to the decryption tool, wherein the authentication information is encrypted by the electronic equipment in a second encryption mode, and the authentication information is used for identifying the identity of the decryption tool; and after the decryption tool decrypts the authentication information through a second decryption mode and completes authentication, decrypting the engineering mode of the electronic equipment based on the input of the decryption tool.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware related to instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, database, or other medium used in the embodiments provided herein may include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM is available in many forms, such as Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), and the like.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above examples only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. An engineering mode encryption method for an electronic device, comprising:
the electronic equipment enters a guide mode based on the control instruction;
receiving an encryption instruction sent by a production tool, wherein the encryption instruction comprises identity information of the production tool, and the identity information is encrypted by the production tool in advance through a first encryption mode;
and decrypting the identity information based on a first decryption mode agreed in advance, and encrypting the engineering mode of the electronic equipment based on the encryption instruction after the decryption is successful.
2. The method for encrypting the engineering mode of the electronic device according to claim 1, further comprising, before the electronic device enters the boot mode based on the control instruction:
and receiving a first public key of the production tool sent by the production tool, so as to obtain the first decryption mode based on the first public key.
3. The method according to claim 2, wherein the identity information is encrypted in advance by the production tool using a first private key matching the first public key in the production tool.
4. An engineering mode decryption method of an electronic device, comprising:
receiving a decryption request sent by a decryption tool;
sending authentication information to the decryption tool, wherein the authentication information is encrypted by the electronic equipment in a second encryption mode, and the authentication information is used for identifying the identity of the decryption tool;
and after the decryption tool decrypts the authentication information through a second decryption mode and completes authentication, decrypting the engineering mode of the electronic equipment based on the input of the decryption tool.
5. The engineering mode decryption method for electronic equipment according to claim 4, wherein the electronic equipment has a second public key of the decryption tool pre-stored therein, so that the authentication information is encrypted by the second public key, and the decryption tool decrypts the authentication information by a second private key of the decryption tool matching the second public key.
6. An engineering mode encryption system for an electronic device, comprising:
the control module is used for controlling the electronic equipment to enter a guide mode based on the control instruction;
the system comprises a first receiving module, a second receiving module and a first encryption module, wherein the first receiving module is used for receiving an encryption instruction sent by a production tool, the encryption instruction comprises identity information of the production tool, and the identity information is encrypted by the production tool in advance in a first encryption mode;
and the engineering mode encryption module is used for decrypting the identity information based on a first decryption mode agreed in advance and encrypting the engineering mode of the electronic equipment based on the encryption instruction after the decryption is successful.
7. An engineering mode decryption apparatus for an electronic device, comprising:
the second receiving module is used for receiving a decryption request sent by the decryption tool;
the sending module is used for sending authentication information to the decryption tool, wherein the authentication information is encrypted by the electronic equipment in a second encryption mode, and the authentication information is used for identifying the identity of the decryption tool;
and the engineering mode decryption module is used for decrypting the engineering mode of the electronic equipment based on the input of the decryption tool after the decryption tool decrypts the authentication information through a second decryption mode and completes authentication.
8. An electronic device comprising a processor and a memory, wherein the memory has stored therein at least one instruction, at least one program, a set of codes, or a set of instructions, which is loaded and executed by the processor to implement the engineering mode encryption method of the electronic device according to any one of claims 1-3 and/or the engineering mode decryption method of the electronic device according to claim 4 or 5.
9. A non-transitory computer-readable storage medium, wherein instructions in the storage medium, when executed by a processor of a mobile terminal, enable the mobile terminal to perform the engineering mode encryption method of the electronic device according to any one of claims 1 to 3 and/or the engineering mode decryption method of the electronic device according to claim 4 or 5.
10. A computer program product, characterized in that instructions in the computer program product, when executed by a processor of a mobile terminal, enable the mobile terminal to perform the engineering mode encryption method of an electronic device according to any of claims 1-3 and/or the engineering mode decryption method of an electronic device according to claim 4 or 5.
CN202111320585.1A 2021-11-09 2021-11-09 Engineering mode encryption method and device for electronic equipment, electronic equipment and storage medium Pending CN113987548A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111320585.1A CN113987548A (en) 2021-11-09 2021-11-09 Engineering mode encryption method and device for electronic equipment, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111320585.1A CN113987548A (en) 2021-11-09 2021-11-09 Engineering mode encryption method and device for electronic equipment, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113987548A true CN113987548A (en) 2022-01-28

Family

ID=79747393

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111320585.1A Pending CN113987548A (en) 2021-11-09 2021-11-09 Engineering mode encryption method and device for electronic equipment, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113987548A (en)

Similar Documents

Publication Publication Date Title
RU2684584C1 (en) Device for storing information and operation method thereof
CN113055867A (en) Method and device for auxiliary network distribution of terminal and electronic equipment
CN108200078B (en) Downloading and installing method of signature authentication tool and terminal equipment
JP5380583B1 (en) Device authentication method and system
CN107733652B (en) Unlocking method and system for shared vehicle and vehicle lock
CN111401901B (en) Authentication method and device of biological payment device, computer device and storage medium
CN107124279B (en) Method and device for erasing terminal data
JP4226556B2 (en) Program execution control device, OS, client terminal, server, program execution control system, program execution control method, program execution control program
KR102574846B1 (en) Method for receiving data within an electronic entity and associated electronic entity
CN113378119B (en) Software authorization method, device, equipment and storage medium
CN109639644B (en) Authorization verification method and device, storage medium and electronic equipment
US20130073840A1 (en) Apparatus and method for generating and managing an encryption key
US11405782B2 (en) Methods and systems for securing and utilizing a personal data store on a mobile device
CN109977039A (en) HD encryption method for storing cipher key, device, equipment and readable storage medium storing program for executing
CN112087417B (en) Terminal authority control method and device, computer equipment and storage medium
EP3363215B1 (en) Method of managing an application
CN112287305B (en) Data processing method, user lock and server
CN113987548A (en) Engineering mode encryption method and device for electronic equipment, electronic equipment and storage medium
CN105245526B (en) Call the method and apparatus of SIM card application
US11516215B2 (en) Secure access to encrypted data of a user terminal
CN110287725B (en) Equipment, authority control method thereof and computer readable storage medium
CN108769989B (en) Wireless network connection method, wireless access device and equipment
CN111246480A (en) Application communication method, system, equipment and storage medium based on SIM card
KR20130041033A (en) Method and apparatus for generating and managing of encryption key portable terminal
CN113506390B (en) Access control method, device, equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination