CN114730265A - Electronic equipment and method for entering forced loading mode - Google Patents

Electronic equipment and method for entering forced loading mode Download PDF

Info

Publication number
CN114730265A
CN114730265A CN202080006482.5A CN202080006482A CN114730265A CN 114730265 A CN114730265 A CN 114730265A CN 202080006482 A CN202080006482 A CN 202080006482A CN 114730265 A CN114730265 A CN 114730265A
Authority
CN
China
Prior art keywords
electronic device
equipment
forced loading
wireless communication
short
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202080006482.5A
Other languages
Chinese (zh)
Inventor
赵谦
陈光跃
贾波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN114730265A publication Critical patent/CN114730265A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

An electronic device and a method for entering a forced loading mode are provided, wherein the electronic device comprises a short-distance wireless communication module and a security authentication module. The short-range wireless communication module may be configured to receive forced loading information sent by the peer device through an air interface, and perform security authentication on the peer device. And after the opposite terminal equipment passes the security authentication, indicating that the opposite terminal equipment belongs to legal equipment. The processing device may be configured to control the electronic device to enter a forced loading mode for version mirroring loading. Compared with the prior art, the confidential shell and the data port seal of the electronic equipment do not need to be dismantled, so that the hidden danger of information leakage in the research and development process is avoided. Meanwhile, the security authentication is carried out on the opposite-end equipment, the electronic equipment can be prevented from being controlled to enter a forced loading mode by any illegal equipment, and the hardware security and the data security of the electronic equipment are enhanced.

Description

Electronic equipment and method for entering forced loading mode Technical Field
The embodiment of the application relates to the technical field of communication, in particular to an electronic device and a method for entering a forced loading mode.
Background
When a mobile terminal has a fault, the mobile terminal generally needs to be sent to a maintenance point for maintenance, and the fault includes that various types of mobile terminals cannot be normally started or cannot normally run after being started. In the maintenance process, the mobile terminal can enter a forced loading mode to start up for subsequent maintenance. At present, a design scheme for a mobile terminal to enter a forced loading MODE is that a dedicated pin is designed in a chip in the mobile terminal, such as a System On Chip (SOC), and is named as a BOOT MODE select (BOOT _ MODE) pin, after the SOC is powered on, a BOOT code (BOOT rom) is cured to detect the state of the BOOT _ MODE pin, and different subsequent flows are performed according to different level states: when the BOOT _ MODE pin is in a high level, starting up normally, and reading a mirror image from an external storage device and checking and starting the mirror image by the SOC; when the BOOT _ MODE pin is at a low level, the mobile terminal starts a forced loading MODE, the chip switches the image loading channel to be a Universal Serial Bus (USB) interface, and the mobile terminal is connected to equipment storing the image of the version to be loaded through a data line of the interface, so that the version image can be loaded and upgraded.
A test point and a port of a butt joint device are reserved for a BOOT _ MODE pin on the mobile terminal. There are currently two ways to enter forced loading mode. The method comprises the following steps: and using the test point, short-circuiting the test point corresponding to the BOOT _ MODE pin with the grounding end of the wire through the clamp, and simultaneously powering on the mobile terminal to enable the mobile terminal to enter a forced loading MODE. And 2, inserting a customized circuit board, such as a specific Flexible Printed Circuit (FPC) flexible board, into a Subscriber Identity Module (SIM) card slot of the mobile terminal, and controlling a BOOT _ MODE pin to be pulled down to a low level through configuration on the customized circuit board so as to enable the mobile terminal to enter a forced loading MODE.
In the development process of the mobile terminal, the mobile terminal is generally equipped with a special confidential shell and a data port seal for protecting the information security of the mobile terminal in the development process. When the method 1 is used for entering the forced loading mode, the confidential shell of the mobile terminal needs to be removed, so that the hidden danger of information leakage in the research and development process can be brought; when the method 2 is used to enter the forced loading mode, the data port seal of the mobile terminal needs to be removed, and the risk of data leakage of the mobile terminal is also caused.
Disclosure of Invention
The embodiment of the application provides electronic equipment and a method for entering a forced loading mode, which are used for entering the forced loading mode in a wireless connection mode and completing version image loading and upgrading.
A first aspect of an embodiment of the present application provides an electronic device, which includes a short-range wireless communication module and a processing device. The electronic device needs to establish connection with the opposite terminal device to complete version mirror loading. In this embodiment of the present application, the short-range wireless communication module may be configured to receive forced loading information sent by an opposite-end device through an air interface, and perform security authentication on the opposite-end device. And after the opposite terminal equipment passes the security authentication, the opposite terminal equipment belongs to legal equipment. The processing device may be configured to control the electronic device to enter a forced loading mode for version mirroring loading.
In the embodiment of the application, the electronic device receives forced loading information sent by the opposite terminal device through the short-distance wireless communication module, and enters a forced loading mode after security authentication is performed on the opposite terminal device, so that version mirror loading is completed. Therefore, in the process that the electronic equipment enters the forced loading mode, the secrecy shell and the data port seal of the electronic equipment do not need to be dismantled, and the hidden danger of information leakage in the research and development process is avoided. Meanwhile, the security authentication is carried out on the opposite-end equipment, the electronic equipment can be prevented from being controlled to enter a forced loading mode by any illegal equipment, and the hardware security and the data security of the electronic equipment are enhanced.
Based on the first aspect of the embodiment of the present application, in a first implementation manner of the first aspect of the embodiment of the present application, the short-range wireless communication module may include a radio frequency system and a security authentication module. The radio frequency system is specifically used for transmitting air interface information between the radio frequency system and opposite-end equipment, and comprises the steps of transmitting forced loading information and version mirror images sent by the opposite-end equipment; and the safety authentication module is used for authenticating the opposite terminal equipment, and if the safety authentication is successful, the opposite terminal equipment is determined to be legal equipment. And if the security authentication fails, determining that the opposite terminal equipment is illegal equipment.
Based on the first implementation manner of the first aspect of the present application, in the second implementation manner of the first aspect of the present application, the radio frequency system may further be configured to send an encrypted message to the peer device, and the peer device decrypts the encrypted message after receiving the encrypted message to obtain an authentication message, and sends the authentication message to the radio frequency system. The security authentication module may be configured to determine whether the received authentication packet is decrypted correctly to authenticate the peer device. If the security authentication module determines that the authentication message is correctly decrypted, the opposite terminal device passes the security authentication, and if the security authentication module determines that the authentication message is incorrectly decrypted, the opposite terminal device cannot pass the security authentication.
Based on the first implementation manner or the second implementation manner of the first aspect of the embodiment of the present application, in a third implementation manner of the first aspect of the embodiment of the present application, the short-range wireless communication module may further include a power supply module, where the power supply module is configured to supply power to the radio frequency system and the security authentication module.
In this embodiment, each module in the short-range wireless communication module may be directly powered by the power supply module. Therefore, even when the electronic equipment is in a power-off state or cannot be normally started, each module in the short-distance wireless communication module can still obtain power supply and normally work, and the reliability of the scheme is improved.
Based on any one of the first implementation manner to the third implementation manner of the first aspect of the present application, in the fourth implementation manner of the first aspect of the present application, the short-range wireless communication module may further include a general-purpose input/output (GPIO), and after the security authentication module successfully authenticates the peer device, the GPIO may be used to send instruction information for successful authentication to the processing device, so that the processor controls the electronic device to enter the forced loading mode.
Based on the fourth implementation manner of the first aspect of the embodiment of the present application, in the fifth implementation manner of the first aspect of the embodiment of the present application, the processing device may be an SOC, and the SOC may include a BOOT _ MODE pin and a processor. Specifically, the BOOT _ MODE pin may be configured to receive instruction information, which is sent by the GPIO and used to successfully authenticate the peer device, and the processor may be configured to control the electronic device to enter the forced loading MODE after the BOOT _ MODE pin receives the instruction information.
Based on the first aspect of the embodiment of the present application or any one of the first implementation manner to the fifth implementation manner of the first aspect of the embodiment of the present application, in a sixth implementation manner of the first aspect of the embodiment of the present application, the short-range wireless communication module may be a near-field communication (NFC) controller.
A second aspect of the present application provides a method for entering a forced loading mode, where the method is applied to an electronic device, and the method may specifically include: the electronic equipment receives the forced loading information sent by the opposite terminal equipment through the short-distance wireless communication module, and carries out security authentication on the opposite terminal equipment sending the forced loading information. And if the security authentication is successful, determining that the opposite terminal equipment is legal equipment, and the electronic equipment enters a forced loading mode to load the version mirror image. And if the safety authentication fails, determining that the opposite-end equipment is illegal equipment, and refusing the electronic equipment to enter a forced loading mode.
In this embodiment, data interaction between the electronic device and the peer device is completed through the air interface, so that the security shell and the data port seal of the electronic device do not need to be removed when the electronic device enters the forced loading mode, thereby avoiding the hidden danger of information leakage in the research and development process. Meanwhile, the security authentication is carried out on the opposite-end equipment, the electronic equipment can be prevented from being controlled to enter a forced loading mode by any illegal equipment, and the hardware security and the data security of the electronic equipment are enhanced.
Based on the second aspect of the present embodiment, in a first implementation manner of the second aspect of the present embodiment, after receiving the forced loading information, the electronic device may send an encrypted message to the peer device through the short-range wireless communication module. And the opposite terminal equipment decrypts the encrypted message after receiving the encrypted message to obtain an authentication message, and sends the authentication message to a short-distance wireless communication module in the electronic equipment. The electronic device can judge whether the decryption of the authentication message is correct to authenticate the opposite terminal device, if so, the opposite terminal device is determined to be legal, and the electronic device enters a forced loading mode to load the version mirror image. If not, determining that the opposite terminal equipment is illegal equipment, and refusing the electronic equipment to enter a forced loading mode.
The short range wireless communication module may be an NFC controller.
Based on the second aspect of the present application or the first implementation manner of the second aspect, in a second implementation manner of the second aspect of the present application, the short-range wireless communication module may be an NFC controller.
Drawings
Fig. 1 is a schematic view of a scenario in which an electronic device loads a version image in an embodiment of the present application;
fig. 2 is a schematic diagram of NFC technology;
FIG. 3 is a diagram of an embodiment of an electronic device in an embodiment of the present application;
FIG. 4A is a diagram of another embodiment of an electronic device in an embodiment of the present application;
fig. 4B is a schematic view of a scenario in which the electronic device receives forced loading information after approaching the PC in the embodiment of the present application;
FIG. 5 is a diagram of another embodiment of an electronic device in an embodiment of the present application;
fig. 6 is a schematic diagram of a polling mode of an NFC controller in an embodiment of the present application;
fig. 7 is a schematic diagram of an embodiment of a method for entering a forced loading mode in an embodiment of the present application.
Detailed Description
The embodiment of the application provides electronic equipment which is used for entering a forced loading mode.
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings. Generally, the electronic device (e.g., a mobile phone or a tablet computer) enters the loading version mirroring mode mainly in the following two ways. 1. And the electronic equipment enters a fast boot (fastboot) mode to load the version image. In an android electronic device, the fastboot mode is a bottom-layer flash mode, and the electronic device is required to be connected with a Personal Computer (PC) through a data line to load a version image. 2. And the electronic equipment enters a forced loading mode to load the version mirror. The method 1 is applicable to all electronic devices which can be normally started to a fastboot mode, and when the electronic devices cannot enter the fastboot mode due to an abnormal scene, for example, a normal startup cannot be performed, the method 2 can be used to enable the electronic devices to enter a forced loading mode to load version images, but the electronic devices still need to be connected with a PC by means of a data line.
This embodiment proposes a processing method using short-range wireless communication instead of a data line. As shown in fig. 1, in an embodiment of the present application, an electronic device loads a version image, and establishes a connection with an opposite device (for example, a PC) storing the version image to be loaded through a short-range wireless communication module. The electronic device may receive the forced loading information sent by the peer device over the air interface, thereby entering a forced loading mode. And the PC transmits the version image to be loaded to the electronic equipment through an air interface, and the electronic equipment loads the version image.
It should be noted that the modules and the connection and composition relationship between the modules described in this application are not limited to describing physical hardware modules or software modules. In this embodiment and the following embodiments, descriptions of the modules are described by taking an entity hardware module as an example. For example, each module may include functional circuitry for implementing the corresponding functionality, and may also operate under suitable software drivers.
The short-range wireless communication module may be an NFC controller, a bluetooth module, or another short-range wireless communication module, such as an infrared module, which is not limited herein. The embodiments of the present application take an NFC controller as an example for explanation.
The following describes an NFC technology according to an embodiment of the present application. Referring to fig. 2, NFC is a short-range wireless connection technology based on Radio Frequency Identification (RFID) technology. The NFC technology utilizes radio frequency field induction to realize the near field communication of the NFC terminals, and the two NFC terminals can exchange information, content and transaction quickly, safely and in a non-contact manner through touch or approach.
The NFC standard specifies a flexible gateway system for compatibility with a contactless smart card, and is specifically divided into three operating modes: peer-to-peer (P2P), reader/writer (rp) mode, and Card Emulation (CE) mode.
Point-to-point mode in which two NFC devices can exchange data. For example, a plurality of digital cameras and mobile phones with NFC function can be wirelessly interconnected by NFC technology, so as to realize data exchange of virtual business cards or digital photos and the like. For the peer-to-peer mode, the key is to connect two NFC-enabled devices, so that data transmission between the peer and the peer is achieved. By using the point-to-point form as a premise, the point-to-point wireless connection and data transmission of related equipment such as a mobile phone with an NFC function and a computer are really achieved, and in subsequent related application, the wireless connection and data transmission can be not only local application but also network application.
Card simulation mode: this mode is to simulate a device with NFC functionality as a tag or contactless card, for example, an NFC-enabled mobile phone may be read as an access card or bank card. The key of the card simulation form is to simulate the equipment with the NFC function into a non-contact card mode, such as a bank card, a bus card, an access card and the like. The form key is applied to non-contact mobile payment in markets, transportation and the like, and in the specific application process, a user only needs to put a mobile phone or other related electronic equipment of the user close to a card reader and input a corresponding password to achieve transaction. In addition, for the application in the card simulation form, data can be collected in related equipment with an NFC function, and then the data is transmitted to a corresponding processing system to be processed.
Card reader mode: in this mode, the NFC device functions as a contactless reader/writer. For example, a mobile phone supporting the NFC function plays a role of a reader/writer when interacting with a tag, and a mobile phone starting the NFC function can read and write a tag supporting the NFC data format standard. The NFC communication of the card reader mode is used as a non-contact card reader, the NFC application field based on the card reader mode comprises advertisement reading, ticket reading, cinema ticket selling and the like, the bus stop information and the map information of tourist attractions can be acquired, and convenience of tourist traffic of a user is improved.
An electronic device provided in an embodiment of the present application is described below. Referring to fig. 3, an electronic device 300 provided in the present application includes: a short-range wireless communication module 301, a processing device 302, a privacy shell 303, and a data port seal 304.
In the development of electronic devices, manufacturers generally add a security shell and a data port seal to the electronic devices. The security shell 303 is generally used to prevent the appearance of the electronic device 300 from being leaked, and the data port seal 304 protects the data interface of the electronic device 300 to prevent the data information of the electronic device 300 from being leaked. In the existing scheme that the electronic device enters the forced loading MODE, the security shell 303 or the data port seal 304 needs to be removed, so as to pull down the level of the BOOT _ MODE pin to enter the forced loading MODE, and establish a connection between the electronic device 300 and an opposite device (for example, a PC) by using a data line, thereby performing version mirroring loading. In this embodiment, the electronic device 300 may establish a wireless connection with an opposite device through the short-range wireless communication module 301. The peer device may send forced loading information to the short-range wireless communication module 301 over an air interface. In order to prevent any illegal device from randomly controlling the electronic device 300 to enter the forced loading mode, the hardware security and the data security are hidden. In this embodiment of the application, the short-range wireless communication module 301 may also be configured to authenticate whether the peer device is a legal device, and a specific security authentication process may refer to the embodiment described in fig. 4. After the security authentication passes, the electronic device 300 may determine that the peer device is a legal device, and the processing device 302 may control the electronic device 300 to enter the forced loading mode. The processing device may be a chip, a chipset, or a circuit system that performs forced loading and starts a system, which is not limited in this embodiment.
Further, after the electronic device 300 enters the forced loading mode, the short-range wireless communication module 301 receives the version image sent by the peer device through the air interface, so that the electronic device performs version image loading again. In the embodiment of the application, the information interaction between the short-distance wireless communication module 301 and the opposite-end device is completed through an air interface, and therefore the classified shell 303 and the data port seal 303 of the electronic device do not need to be removed, so that the risk of information leakage in the research and development process of the electronic device is reduced, the short-distance wireless communication module 301 can also perform security authentication on the opposite-end device, the opposite-end device connected with the electronic device is ensured to be legal, and the hardware security and the data security of the electronic device are ensured.
Based on the electronic device shown in fig. 3, the short-range wireless communication module is further described as an example of an NFC controller. It should be noted that, the "opposite-end device" in the embodiment of the present application is only a general name of a device that performs functions of sending forced loading information and participating in data interaction of the electronic device entering the forced loading mode, and is not particularly referred to a certain device or some devices. In practical applications, the device performing the above functions may be replaced by another name, such as a server, a PC, a controller, or a dedicated upgrade device, without being limited herein. For convenience of understanding, in this embodiment and the following embodiments, the server and the PC work together, and are described as an example of interaction between the "peer device" and the electronic device.
Fig. 4A is an application scenario diagram of an electronic device according to an embodiment of the present application. As shown in fig. 4A, the electronic device includes an NFC controller 401 and a processing device 402. In this embodiment and subsequent embodiments, an embedded secure element (eSE) module 4011 is taken as an example of the secure authentication module for explanation. Specifically, the eSE module 4011 is mainly used to enforce security authentication in the loading process, and authenticate whether the PC404 is a valid device. The processing device 402 is configured to control the electronic device to enter a forced loading mode after the eSE module 4011 authenticates the PC404 as a valid device. The PC404 is connected to the dongle 405, and the server 403 can authenticate the PC404, so that the PC404 and the server 403 establish a connection. It should be noted that in this embodiment of the application, the dongle 405 is one implementation manner of the PC404 completing the authentication process, and it is conceivable that, in the actual application process, the PC404 may also complete the authentication in other manners, for example, complete the authentication by inputting a specific account password, and specific other authentication forms are not described herein again. Meanwhile, the PC404 is also connected to a card reader 406, and the card reader 406 has an NFC function and can serve as an air interface to transmit air interface information between the PC404 and the NFC controller 401.
In this embodiment of the application, when the electronic device is close to the PC404, the NFC controller 401 may receive forced loading information sent by the PC404 through the card reader 406. As shown in fig. 4B, when the operation user executes an instruction to send the forced loading information on the PC, the PC may send the forced loading information to the outside. When the electronic device approaches the PC and enters the transmission range of the forced loading information, the NFC controller in the electronic device may receive the forced loading information.
In the conventional method of entering the forced loading mode, any user can freely enter the device into the forced loading mode, which may pose a risk to the hardware security and data security of the electronic device. In this embodiment of the application, after the NFC controller 401 receives the forced loading information, the eSE module 4011 may perform security authentication on the PC404, and only after the security authentication passes, the processing device 402 may control the electronic device to enter the forced loading mode. The security authentication process is described below.
During the production of the electronic device, the server 403 can write a common preset key to the eSE module 4011 of the electronic device. When the NFC controller 401 receives the forced loading information, an encrypted message encrypted by the preset key may be sent to the PC 404. In this embodiment, the NFC controller 401 may encrypt, by using a preset key, a device serial number of the electronic device or a die identifier (DieID) of a chip in the electronic device, and send the encrypted message to the PC404 as the encrypted message. It should be noted that the present application does not limit the content form of the encrypted message, and may also be other related identifiers of the electronic device besides the device serial number or the DieID, which is not limited herein.
After receiving the encrypted message, the PC404 needs to decrypt the encrypted message. Since the server 403 and the PC404 have already established a connection through the dongle 405, the PC404 may obtain the preset key corresponding to the electronic device from the server 403, decrypt the encrypted message, obtain the device serial number or the DieID, and send the device serial number or the DieID to the NFC controller 401.
After receiving the device serial number or the DieID sent by the PC404, the NFC controller 401 authenticates with the eSE module 4011, and if the received device serial number or the DieID is correct, the eSE module 4011 may determine that the PC404 is a legitimate device, that is, the authentication passes, and then the processor 402 may control the electronic device to enter the forced loading mode; if not, the eSE module 4011 may determine that the PC404 is not a legitimate device, that is, the authentication is not passed, and the processor 402 does not control the electronic device to enter the forced loading mode, and may terminate the subsequent process.
In this embodiment, after the NFC controller receives the forced loading information, the eSE module initiates a device for forcibly loading information to perform security authentication, and if the security authentication passes, the electronic device enters the forced loading mode, thereby ensuring hardware security and data security of the electronic device.
Referring to fig. 5, a hardware solution of an electronic device provided in the present application is described below. The processing device may include an SOC502, where the SOC502 includes a BOOT _ MODE pin 5021 and a processor 5022. The BOOT _ MODE pin 5021 is configured to receive instruction information that an opposite terminal device succeeds in authentication, and the processor 5022 is configured to control the electronic device to enter a forced loading MODE when the BOOT _ MODE pin 5021 receives the instruction information. Specifically, in this embodiment, when the BOOT _ MODE pin 5021 receives a high level, the electronic device is normally started; when the BOOT _ MODE pin 5021 receives a low level, the processor 5022 controls the electronic device to enter a forced loading MODE. It should be noted that, in this embodiment, the case where the high/low level is received by the BOOT _ MODE pin 5021 is taken as an example to describe whether instruction information is received. It is conceivable that the instruction information may be in other content forms in the practical application process, and the embodiment of the present application is not limited thereto. The processor 5022 includes a variety of possible processor types including, but not limited to, a central processing unit, a digital signal processor, a microprocessor, a microcontroller, an artificial intelligence processor, a heterogeneous processor, or the like.
The NFC controller 501 includes: an eSE module 5011, a low dropout regulator (LDO) 5012, a radio frequency system 5013, and a GPIO 5014.
The eSE module 5011 is specifically configured to perform security protection in a forced loading process, and the working process may refer to the embodiment corresponding to fig. 4. LDO5012 can be implemented as a power module as described herein to perform the function of providing power to other parts of the system. Specifically, LDO5012 is connected to battery 503 to convert the voltage of battery 503, and is specifically configured to power each sub-module in NFC controller 501. Therefore, even when the electronic device is in a power-off state or cannot be powered on, as long as the battery 503 can work normally, each submodule in the NFC control 501 can be powered by the LDO5012, so that the electronic device can work normally.
The rf system 5013 is specifically configured to connect to the antenna matching network 504, so as to implement data interaction of an air interface, for example, implement a short-range wireless communication function before. The GPIO5014 is connected to a BOOT _ MODE pin 5021 in the SOC502, and when the eSE module successfully authenticates the opposite device as a valid device, the GPIO5014 may send instruction information of successful authentication to the BOOT _ MODE pin 5021. In a specific implementation manner, if the GPIO5014 inputs a low level to the BOOT _ MODE pin 5021, the processor 5022 may control the electronic device to enter a forced loading MODE. Also, because the GPIO5014 is directly powered by the LDO5012, the GPIO5014 is able to handle high and low outputs of voltage even when the device is off or unable to be powered on.
Further, in this embodiment of the application, the NFC controller may perform data interaction with the PC through an air interface in two functional modes, namely, a peer-to-peer mode and a card simulation mode. The following description will be made separately.
A point-to-point mode:
when the electronic device is in a power-on and screen-on state, the NFC controller may initiate a polling mode. In the existing NFC technology, the polling mode of the NFC controller supports a plurality of protocols, such as TypeA, TypeB, TypeF, ISO15693, or the like. Because the NFC controller can only use one protocol for interaction at the same time, when the electronic device is turned on and in a bright screen state, the NFC controller needs to use a polling mode to switch between different protocols and different functions, thereby realizing compatibility of different services.
Referring to fig. 6, in the embodiment of the present application, a target protocol is added on the basis of the existing polling mode of the NFC controller, and the target protocol is used for identifying and transmitting forced loading information. Specifically, the target protocol may be type a, or may be other transmission protocols that may be applied to the NFC controller, such as type b or type f, which is not limited herein. In this embodiment, the target protocol occupies 5% of the weight in each polling closed loop of the NFC controller. It should be noted that, in practical applications, the weight proportion of the target protocol may be adjusted accordingly according to actual needs, and the present application does not limit this. It should be noted that, the PC side also needs to configure a corresponding card reader with an NFC function running the above target protocol. After the card reader is connected with the PC, the PC can send forced loading information to the outside through an air interface. When the electronic device approaches, the NFC controller may receive the forced loading information through the target protocol.
II, card simulation mode:
when the electronic device is in a power-off state or cannot be powered on, the NFC controller can still continue to work because the NFC controller is directly powered by the battery. In the card emulation mode, an object detection process is added to an existing card emulation software process of the NFC controller, and the object detection process is used to identify air interface data sent by the card reader. And after the PC is connected with the card reader with the NFC function, the forced loading information is sent out through an air interface. When the electronic device approaches, the NFC controller may receive the forced loading information through the target detection procedure.
Referring to fig. 7, an embodiment of the present application provides a method for entering a forced loading mode, including: 701. the PC sends forced loading information to the electronic equipment; the PC is connected with a card reader with an NFC function and sends forced loading information to the outside through an air interface. When the electronic device is close, the NFC controller may receive the forced loading information through a peer-to-peer mode or a card emulation mode.
702. And the NFC controller sends the encrypted message to the PC. In the conventional method of entering the forced loading mode, any user can freely enter the device into the forced loading mode, which may pose a risk to the hardware security and data security of the electronic device. In this embodiment of the application, in a production process of the electronic device, the server may write the common preset key to the eSE module of the electronic device. After receiving the forced loading information, the NFC controller may send an encrypted message encrypted with the preset key to the PC. Specifically, the NFC controller may encrypt the device serial number of the electronic device or the DieID of the SOC with a preset key, and send the encrypted message to the PC as the encrypted message.
703. The server sends the pre-set key to the PC. The PC can connect with a specific dongle to complete authentication, thereby establishing a connection with the PC. The PC may request a preset key corresponding to the electronic device from the server. Since the PC has completed authentication by connecting a specific dongle, the server can determine that the PC is a legitimate device and can send a preset key to the PC.
704. The PC decrypts the encrypted message. And after receiving the preset key, the PC decrypts the encrypted message to obtain the equipment serial number of the electronic equipment or the DieID of the SOC. 705. The PC sends the decrypted authentication message to the NFC controller; and the PC sends the decrypted equipment serial number or the DieID of the SOC as an authentication message to an NFC controller of the electronic equipment. 706. The NFC controller judges whether the authentication message is decrypted correctly so as to authenticate the opposite terminal equipment; the NFC controller has an eSE module, and the eSE module can determine whether the device serial number sent by the PC or the DieID of the SOC is correct. If the result is correct, the eSE module may determine that the PC is a valid device, that is, the authentication is passed, and the NFC controller executes step 707; if not, the eSE module can determine that the PC is an illegal device, i.e., the authentication is not passed, and the NFC controller performs step 708.
707. The NFC controller controls the electronic equipment to enter a forced loading mode; when the eSE module determines that the authentication message is decrypted correctly, indicating that the PC is a valid device, the NFC controller may pull down the level of the BOOT _ MODE pin, so that the electronic device enters a forced loading MODE. 708. The NFC controller does not control the electronic equipment to enter a forced loading mode; when the eSE module determines that the decryption of the authentication message is incorrect, the PC is an illegal device, and the NFC controller cannot control the electronic device to enter a forced loading mode, so that the subsequent process can be terminated.
In this embodiment, for the composition structure and the functions of each module in the NFC controller, reference may be made to the description corresponding to fig. 5, and details are not described here again.
Each functional unit in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.

Claims (10)

  1. An electronic device, comprising:
    the short-distance wireless communication module is used for receiving the forced loading information sent by the opposite terminal equipment and authenticating the opposite terminal equipment;
    and the processing device is used for controlling the electronic device to enter a forced loading mode after the short-distance wireless communication module successfully authenticates the opposite-end device.
  2. The electronic device of claim 1, wherein the short-range wireless communication module comprises a radio frequency system and a security authentication module;
    the radio frequency system is used for receiving the forced loading information sent by the opposite terminal equipment;
    the security authentication module is used for authenticating the opposite terminal equipment.
  3. The electronic device of claim 2, wherein the radio frequency system is further configured to send an encrypted packet to the peer device; receiving an authentication message sent by the opposite terminal equipment, wherein the authentication message is obtained after the opposite terminal equipment decrypts the encrypted message;
    the security authentication module is used for judging whether the authentication message is decrypted correctly so as to authenticate the opposite terminal equipment.
  4. The electronic device of claim 2 or 3, wherein the short-range wireless communication module further comprises a power supply module for supplying power to the radio frequency system and the security authentication module.
  5. The electronic device of any one of claims 2 to 4, wherein the short-range wireless communication module further comprises a General Purpose Input Output (GPIO), and the GPIO is configured to send an indication of successful authentication to the processing device after the security authentication module successfully authenticates the peer device.
  6. The electronic device of claim 5, wherein the processing device is a system-on-a-chip (SOC) comprising:
    a BOOT _ MODE pin of a start MODE, configured to receive the indication information;
    and the processor is used for responding to the indication information and controlling the electronic equipment to enter the forced loading mode.
  7. The electronic device of any of claims 1-6, wherein the short-range wireless communication module is a Near Field Communication (NFC) controller.
  8. A method for entering a forced loading mode, wherein the method is applied to an electronic device, and the method comprises the following steps:
    the electronic equipment receives forced loading information sent by opposite-end equipment through a short-distance wireless communication module;
    the electronic equipment judges whether the opposite terminal equipment passes the safety certification;
    and if the opposite-end equipment passes the safety certification, the electronic equipment enters a forced loading mode.
  9. The method of claim 8, wherein the determining, by the electronic device, whether the peer device passes security authentication comprises:
    the electronic equipment sends an encrypted message to the opposite terminal equipment through the short-distance wireless communication module;
    the electronic equipment receives an authentication message sent by the opposite terminal equipment through the short-distance wireless communication module, wherein the authentication message is obtained after the opposite terminal equipment decrypts the encrypted message;
    the electronic equipment judges whether the authentication message is decrypted correctly;
    and if the authentication message is correctly decrypted, the electronic equipment determines that the opposite terminal equipment passes the safety authentication.
  10. Method of forced loading mode according to claim 8 or 9, characterized in that the short-range wireless communication module is an NFC controller.
CN202080006482.5A 2020-10-29 2020-10-29 Electronic equipment and method for entering forced loading mode Pending CN114730265A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/124710 WO2022087949A1 (en) 2020-10-29 2020-10-29 Electronic device and method for entering force loading mode

Publications (1)

Publication Number Publication Date
CN114730265A true CN114730265A (en) 2022-07-08

Family

ID=81381734

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202080006482.5A Pending CN114730265A (en) 2020-10-29 2020-10-29 Electronic equipment and method for entering forced loading mode

Country Status (2)

Country Link
CN (1) CN114730265A (en)
WO (1) WO2022087949A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140032903A1 (en) * 2012-07-30 2014-01-30 Honeywell International Inc. Secure key distribution with general purpose mobile device
CN104428751A (en) * 2014-06-27 2015-03-18 华为技术有限公司 Program data updating method and equipment
CN105871873A (en) * 2016-04-29 2016-08-17 国家电网公司 Security encryption authentication module for power distribution terminal communication and method thereof
CN108234160A (en) * 2016-12-14 2018-06-29 中国航空工业集团公司西安航空计算技术研究所 A kind of airborne core processing computer radio upgrade method

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5459270B2 (en) * 2011-06-22 2014-04-02 コニカミノルタ株式会社 Information processing apparatus, information processing apparatus activation method, and activation program
CN105446762B (en) * 2014-09-28 2019-09-13 比亚迪股份有限公司 The method for updating program and program updating system of battery management system
CN109445828A (en) * 2018-12-12 2019-03-08 上海伟世通汽车电子系统有限公司 The upgrade method of vehicle-mounted terminal system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140032903A1 (en) * 2012-07-30 2014-01-30 Honeywell International Inc. Secure key distribution with general purpose mobile device
CN104428751A (en) * 2014-06-27 2015-03-18 华为技术有限公司 Program data updating method and equipment
CN105871873A (en) * 2016-04-29 2016-08-17 国家电网公司 Security encryption authentication module for power distribution terminal communication and method thereof
CN108234160A (en) * 2016-12-14 2018-06-29 中国航空工业集团公司西安航空计算技术研究所 A kind of airborne core processing computer radio upgrade method

Also Published As

Publication number Publication date
WO2022087949A1 (en) 2022-05-05

Similar Documents

Publication Publication Date Title
US20090144456A1 (en) Interface Device for Securely Extending Computer Functionality
EP2064649B1 (en) Near field connection establishment
TWI486004B (en) Systems and methods for providing nfc secure application support in battery on and battery off modes
EP2770782B1 (en) Wireless data communication
JP4539071B2 (en) Portable wireless communication device.
US9262711B2 (en) NFC tag, communication method and system
US20130217325A1 (en) Securing of a telecommunication device equipped with a near-field communication module
EP2570972B1 (en) Information transmission implementation method and system, main control device and intelligent card
KR102453705B1 (en) Operation Method of Payment Device for Selectively Enabling Payment Function According to Validity of Host
US20160260087A1 (en) System and method of realizing dual logic channels of secure element
US20140248853A1 (en) System And Method for Smart Card Based Hardware Root of Trust on Mobile Platforms Using Near Field Communications
JP2016532170A (en) Mobile terminal, mobile payment safety certification method and apparatus
US20150373757A1 (en) Wireless connection system and wireless connection method
KR20130021745A (en) Method and system for mobile payment by using near field communication
US8522326B2 (en) System and method for authenticating a smart card using an authentication token transmitted to a smart card reader
CN109151777B (en) Non-communication method and communication device
KR20080096722A (en) A method for controlling the operation of e-transaction card in smartcard equipped with a mobile communication terminal
CN112329904A (en) Mobile phone user identification card, face identification device and identification method
CN114730265A (en) Electronic equipment and method for entering forced loading mode
US10728728B2 (en) Method and a device for managing contactless applications
US11068880B2 (en) Control of applications in a mobile terminal
KR102172855B1 (en) Method for Providing Server Type One Time Code for Medium Separation by using User’s Handheld type Medium
KR101972972B1 (en) Method for Operating Medium Division Style One Time Code by using Near Field Communication
EP2996368B1 (en) Mobile electronic device
US12022294B2 (en) Access control for Near Field Communication functions

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination