CN116321173A - Port authentication method, device, electronic equipment and storable medium - Google Patents

Port authentication method, device, electronic equipment and storable medium Download PDF

Info

Publication number
CN116321173A
CN116321173A CN202211705933.1A CN202211705933A CN116321173A CN 116321173 A CN116321173 A CN 116321173A CN 202211705933 A CN202211705933 A CN 202211705933A CN 116321173 A CN116321173 A CN 116321173A
Authority
CN
China
Prior art keywords
electronic device
port
ciphertext
electronic equipment
preloader
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211705933.1A
Other languages
Chinese (zh)
Inventor
赵聪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Wingtech Electronic Technology Co Ltd
Original Assignee
Shanghai Wingtech Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Wingtech Electronic Technology Co Ltd filed Critical Shanghai Wingtech Electronic Technology Co Ltd
Priority to CN202211705933.1A priority Critical patent/CN116321173A/en
Publication of CN116321173A publication Critical patent/CN116321173A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/35Protecting application or service provisioning, e.g. securing SIM application provisioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the application discloses a port authentication method, a device, an electronic device and a storable medium, wherein the method is applied to first electronic equipment, the first electronic equipment is provided with a preload mode preloader port, the preload port is in a default closing state, and the method comprises the following steps: authenticating the second electronic device in the fastboot mode; and when the authentication result of the second electronic equipment is that the second electronic equipment passes, opening a preloader port so that the second electronic equipment uses a brushing tool to brush the first electronic equipment through the preloader port. By implementing the embodiment of the application, the second electronic device can brush the first electronic device through the preloader port, so that the situation that the port commonly used in the process of brushing the first electronic device is easy to attack and maliciously brush the first electronic device due to the fact that the port is in an open state is avoided, and the safety of the electronic device can be improved.

Description

Port authentication method, device, electronic equipment and storable medium
Technical Field
The present invention relates to the field of electronic technologies, and in particular, to a port authentication method, a device, an electronic device, and a storable medium.
Background
With the large-scale popularization of intelligent electronic devices and the diversification of means for hacking the intelligent electronic devices, the importance of protecting ports of the intelligent electronic devices is increasingly enhanced. Taking an MTK electronic device as an example, a pre-loader port is closed, a self-starting download mode (BootRom Download Mode, boom) port is opened by default, and a public key digest of an encryption algorithm is written into the boom port, so that security verification of the boom port is realized, a private key of a corresponding encryption algorithm must be configured to start corresponding permission through the boom port, but the boom port opened by default has a risk of being cracked and verified by a hacker.
Disclosure of Invention
The embodiment of the application discloses a port authentication method, a port authentication device, electronic equipment and a storable medium, which can improve the security of the electronic equipment.
The first aspect of the embodiment of the application discloses a port authentication method, which is applied to a first electronic device, wherein the first electronic device is provided with a preload mode preloader port, the preload port is in a default closing state, and the method comprises the following steps:
authenticating the second electronic device in the fastboot mode;
And when the authentication result of the second electronic equipment is that the second electronic equipment passes, opening the preloader port so that the second electronic equipment uses a brushing tool to brush the first electronic equipment through the preloader port.
As an optional implementation manner, in the first aspect of the present embodiment, the method further includes:
when the second electronic equipment finishes the brushing of the first electronic equipment, authenticating the second electronic equipment again in the Fastboot mode;
and closing the preloader port after the second electronic equipment is authenticated again.
As an optional implementation manner, in the first aspect of the present embodiment, the self-starting download mode boom port of the first electronic device is set to a permanently closed state.
As an optional implementation manner, in a first aspect of the present embodiment, the authenticating the second electronic device in the fast boot mode includes:
transmitting a first ciphertext to a second electronic device, the first ciphertext comprising first data encrypted by a public key of an encryption algorithm;
receiving a second ciphertext transmitted by the second electronic device for the first ciphertext, the second ciphertext comprising second data encrypted by a private key of the encryption algorithm;
Decrypting the second ciphertext through a public key of the encryption algorithm, and comparing second data in the second ciphertext with the first data;
and determining the authentication result of the second electronic equipment according to the comparison result.
As an optional implementation manner, in the first aspect of the present embodiment, the first data included in the first ciphertext is encrypted by a first public key of the encryption algorithm;
the second data included in the second ciphertext is determined by the second electronic device through decrypting the first ciphertext through a first private key of the encryption algorithm and according to the first data obtained through decryption;
the second ciphertext is obtained by encrypting the second data through a second private key of the encryption algorithm by the second electronic equipment;
the decrypting the second ciphertext by the public key of the encryption algorithm and comparing the second data in the second ciphertext with the first data includes:
decrypting the second ciphertext through a second public key of the encryption algorithm, and comparing second data in the second ciphertext with the first data, wherein the first private key and the first public key are one key pair obtained through the encryption algorithm, and the second private key and the second public key are the other key pair obtained through the encryption algorithm.
As an optional implementation manner, in the first aspect of the present embodiment, the first ciphertext includes a random number encrypted by a first public key of an encryption algorithm;
the second ciphertext comprises equipment information and a random number obtained by decrypting the first ciphertext through a first private key of the encryption algorithm by the second electronic equipment;
the decrypting the second ciphertext with the second public key of the encryption algorithm and comparing the second data in the second ciphertext with the first data includes:
decrypting the second ciphertext through a second public key of the encryption algorithm, comparing the device information in the second ciphertext with the device information of the first electronic device, and comparing the random number in the second ciphertext with the random number in the first ciphertext;
and when the authentication result of the second electronic device is that the second electronic device passes, opening the preloader port, so that the second electronic device uses a brushing tool to brush the first electronic device through the preloader port, and the method comprises the following steps:
under the condition that the equipment information in the second secret is the same as the equipment information of the first electronic equipment and the second random number in the second secret is the same as the random number in the first secret, modifying the authority of the first electronic equipment to the preloader port in the fastboot mode;
And responding to an opening command, and opening the preloader port according to the changed authority.
The second aspect of the embodiment of the application discloses a port authentication method, which is applied to a second electronic device, wherein the second electronic device is in signaling connection with the first electronic device, the first electronic device is provided with a preload mode preloader port, the preload port is in a default closed state, and the method comprises the following steps:
and when the first electronic equipment authenticates the second electronic equipment in the fast startup fastboot mode and the authentication result is that the second electronic equipment passes, the second electronic equipment uses a brushing tool to brush the first electronic equipment through a preloader port opened by the first electronic equipment.
The third aspect of the embodiment of the application discloses a port authentication device, which is applied to a first electronic device, wherein the first electronic device is provided with a preload mode preloader port, the preload port is in a default closing state, and the device comprises:
the authentication module is used for authenticating the second electronic equipment in the fast startup fastboot mode;
and the port module is used for opening the preloader port when the authentication result of the second electronic equipment is that the second electronic equipment passes, so that the second electronic equipment uses a brushing tool to brush the first electronic equipment through the preloader port.
The fourth aspect of the present application discloses an electronic device, including a memory and a processor, where the memory stores a computer program, and when the computer program is executed by the processor, the processor is caused to implement any one of the port authentication methods disclosed in the embodiments of the present application.
A fifth aspect of the embodiments of the present application discloses a computer-readable storage medium storing a computer program, wherein the computer program, when executed by a processor, implements a port authentication method disclosed in the embodiments of the present application.
Compared with the related art, the embodiment of the application has the following beneficial effects:
the first electronic equipment authenticates the second electronic equipment in the fastboot mode, and under the condition that authentication passes, the first electronic equipment opens a preloader port in a default closing state, so that the second electronic equipment can swipe the first electronic equipment through the preloader port, thereby avoiding the conditions that the port commonly used in the process of swipe is in an opening state, which is easy to attack and maliciously swipe the electronic equipment, and improving the safety of the electronic equipment.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is an application scenario diagram of a port authentication method in one embodiment;
FIG. 2 is a flow chart of a port authentication method according to one embodiment;
FIG. 3 is a flow diagram of another port authentication method disclosed in one embodiment;
FIG. 4 is a flow diagram of a specific port authentication process disclosed in one embodiment;
FIG. 5 is an interactive schematic diagram of a specific port authentication and preloader port opening process as disclosed in one embodiment;
FIG. 6 is a flow diagram of yet another port authentication method disclosed in one embodiment;
FIG. 7 is a flow diagram of yet another specific port authentication process disclosed by one embodiment;
fig. 8 is a schematic structural diagram of a port authentication device disclosed in an embodiment of the present application;
fig. 9 is a schematic structural diagram of another port authentication device disclosed in an embodiment of the present application;
fig. 10 is a schematic structural diagram of an electronic device according to an embodiment of the disclosure.
Detailed Description
The following description of the technical solutions in the embodiments of the present application will be made clearly and completely with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
It should be noted that the terms "comprising" and "having" and any variations thereof in the embodiments and figures herein are intended to cover a non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those listed steps or elements but may include other steps or elements not listed or inherent to such process, method, article, or apparatus.
The embodiment of the application discloses a port authentication method, a port authentication device, electronic equipment and a storable medium, which can improve the security of the electronic equipment. The following will describe in detail.
Referring to fig. 1, fig. 1 is an application scenario diagram of a port authentication method in one embodiment. As shown in fig. 1, the electronic device may include a first electronic device 10 and a second electronic device 20, where the first electronic device 10 may be a desktop computer, a tablet computer, a notebook computer, a mobile phone, etc., and the second electronic device 20 may be a desktop computer, a tablet computer, a notebook computer, etc. At least a central processor may be included in both the first electronic device 10 and the second electronic device 20. The computer systems in the first electronic device 10 and the second electronic device 20 may be Windows, linux, MTK, IOS or Unix, which are not particularly limited herein. A preload mode (preloader) port is provided in the first electronic device 10, and the preloader port is in a default off state. The first electronic device 10 authenticates the second electronic device 20 under the fast startup fastboot mode, and when the authentication result of the first electronic device 10 to the second electronic device 20 is that the first electronic device 10 passes, the first electronic device 10 opens a preloader port, and the second electronic device 10 uses a brushing tool to brush the first electronic device 10 through the opened preloader port.
Taking a mobile phone based on a chip developed by a concurrency department (MTK) as an example, a mainstream scheme at present is to close a preloader port of a user version of shipment, open a self-starting download mode (BootRom Download Mode, bore) port by default, write a public key abstract in an RSA encryption algorithm into the bore port by blowing a Service-Level agent (SLA) field in a one-time programmable memory (eFuse), and thus perform security verification of the bore port. The private key of the corresponding SLA encryption algorithm is required to be configured by using the MTK Flash brushing tool to finish brushing through the boom port, so that the private key is prevented from being leaked, and the safety of the boom port can be guaranteed theoretically. However, because the related codes of the boom ports are solidified in the platform chip, besides the verification scheme that the boom ports provided by the platform fuse the SLA, other complex verification schemes cannot be customized, and the default open boom ports have the risk of being cracked and verified by a hacker or bypassing the authorization.
Referring to fig. 2, fig. 2 is a flow chart illustrating a port authentication method according to an embodiment, which may be applied to the first electronic device 10 in the application scenario shown in fig. 1, where the first electronic device is provided with a preload port in a default closed state. As shown in fig. 2, the method may include the steps of:
210. And authenticating the second electronic equipment in the fast start fastboot mode.
In this embodiment of the present application, the preloader port in the first electronic device may be a brusher port cured inside the chip. The Preloader port is in a default closed state, that is, in the case that the first electronic device does not perform security verification on the Preloader port, the Preloader port is in a closed state.
The first electronic device starts a fastboot mode in advance, and verifies whether the connected second electronic device has the right to access the system of the first electronic device in the fastboot mode. The fastboot is a firmware communication protocol for the second electronic device to perform writing, erasing/formatting, debugging and transmitting various instructions on the mobile phone firmware through the USB data line, and is also a command line tool in Android SDK Platform Tools of Google. A USB driver suitable for a mobile phone needs to be installed on a computer. Therefore, the fastboot mode is a line brush which is fast guided, and is a brushing mode for connecting the mobile phone by using the USB data line.
220. And when the authentication result of the second electronic equipment is that the second electronic equipment passes, opening a preloader port so that the second electronic equipment uses a brushing tool to brush the first electronic equipment through the preloader port.
In the embodiment of the present application, if the result of the authentication of the first electronic device to the second electronic device is that the second electronic device does not pass, that is, if the first electronic device verifies that the second electronic device does not have the right to access the system of the first electronic device in the fastboot mode, the first electronic device does not operate the preloader port, so that the preloader port remains in a default closed state, and the second electronic device cannot swipe the first electronic device.
In the case that the first electronic device authenticates the second electronic device, that is, the first electronic device verifies that the second electronic device has the right to access the system of the first electronic device in the fastboot mode, the first electronic device may automatically execute the related command, such as fastboot oem zeroflag clr command, to open the preloader port. After the first electronic device opens the preloader port, the second electronic device may use a brushing tool, such as a flash tool, to brush the first electronic device through the opened preloader port.
By adopting the embodiment, the second electronic equipment can brush the first electronic equipment such as the mobile phone based on the MTK product through the preloader port, so that the situation that the port commonly used in the process of brushing the mobile phone such as the boom port is in an open state and is easy to attack and maliciously brush the mobile phone is avoided, and the safety of the electronic equipment can be improved.
In some embodiments, the self-initiated download mode boom port of the first electronic device is set to a permanently closed state.
In this embodiment of the present application, the first electronic device is further provided with a boom port, and the boom port is in a permanently closed state, that is, the boom port cannot be opened. Because the boom port is a brush port which is cured in the chip by default on the system-in-chip and has higher authority, the boom port is permanently closed, and compared with the way of permanently closing the preloader port and using the boom port to brush the first electronic device, other electronic devices cannot attack or maliciously brush the first electronic device through the boom port with higher authority, and the safety of the electronic device is further improved.
In one embodiment, referring to fig. 3, fig. 3 is a flow chart of another port authentication method disclosed in one embodiment. The method can be applied to the first electronic device 10 in the application scenario shown in fig. 1, where the first electronic device is provided with a preload mode preloader port, and the preload port is in a default closed state. As shown in fig. 3, the method may include the steps of:
310. and authenticating the second electronic equipment in the fast start fastboot mode.
320. And when the authentication result of the second electronic equipment is that the second electronic equipment passes, opening a preloader port so that the second electronic equipment uses a brushing tool to brush the first electronic equipment through the preloader port.
330. And when the second electronic equipment finishes the brushing of the first electronic equipment, authenticating the second electronic equipment again in the fastboot mode.
In the embodiment of the application, after the second electronic device uses the brushing tool, such as a flash tool, and finishes brushing the first electronic device through the opened preloader port, in the fastboot mode, the right of whether the connected second electronic device has the system for accessing the first electronic device is verified again.
In some embodiments, when the second electronic device completes the brushing of the first electronic device, the first electronic device reenters the fastboot mode, and the second electronic device is authenticated again in the fastboot mode.
In this embodiment of the present application, before the first electronic device re-authenticates the second electronic device to re-close the preloader port, the first electronic device needs to re-enter the fastboot mode to re-authenticate in the fastboot mode. The security of performing the re-authentication process in the fastboot mode can be improved.
340. And closing the preloader port after the second electronic device is authenticated again.
In the embodiment of the present application, if the result of the second electronic device re-authentication by the first electronic device is that the second electronic device does not pass, that is, the first electronic device verifies that the second electronic device does not have the right to access the system of the first electronic device in the re-authentication process in the fastboot mode, then the first electronic device does not operate the preloader port, so that the preloader port is kept in an open state.
If the result of the authentication of the first electronic device to the second electronic device is passing, that is, the first electronic device verifies that the second electronic device still has the right to access the system of the first electronic device in the process of re-authentication in the fastboot mode, then the first electronic device may automatically execute a related command, such as a fastboot oem zeroflag set command, to close the preloader port, so that the electronic device cannot access the system of the first electronic device through the preloader port.
By adopting the embodiment, the preloader port can be closed again after the machine brushing is completed, so that other devices are prevented from attacking or maliciously brushing the first electronic device through the preloader port, the first electronic device authenticates the second electronic device again before closing the preloader port, and the safety of the closing process of the preloader port can be enhanced.
In one embodiment, referring to fig. 4, fig. 4 is a flow chart illustrating a specific port authentication procedure disclosed in one embodiment. The method can be applied to the first electronic device 10 in the application scenario shown in fig. 1, where the first electronic device is provided with a preload mode preloader port, and the preload port is in a default closed state. As shown in fig. 4, the method may include the steps of:
410. the first ciphertext is transmitted to the second electronic device, the first ciphertext comprising first data encrypted by a public key of an encryption algorithm.
In the embodiment of the application, the first electronic device may generate the first data in response to the authentication request initiated by the second electronic device, encrypt the first data by using the stored public key of the encryption algorithm to obtain the first ciphertext, and send the first ciphertext to the second electronic device.
420. And receiving a second ciphertext transmitted by the second electronic device for the first ciphertext, wherein the second ciphertext comprises second data encrypted by a private key of an encryption algorithm.
In the embodiment of the application, after receiving the first ciphertext sent by the first electronic device, the second electronic device generates second data, encrypts the second data through the stored private key of the encryption algorithm to obtain a second ciphertext, sends the second ciphertext to the first electronic device, and the first electronic device receives the second ciphertext sent by the second electronic device. The public key stored in the first electronic device and the private key stored in the second electronic device are a key pair based on the same encryption algorithm, and the adopted encryption algorithm can be a symmetric encryption type encryption algorithm or an asymmetric encryption type encryption algorithm. In this application, the RSA encryption algorithm is used for illustration, but the encryption algorithm is not limited, in consideration of security and code implementation.
430. And decrypting the second ciphertext through a public key of the encryption algorithm, and comparing the second data in the second ciphertext with the first data.
In this embodiment of the present application, the first electronic device decrypts the received second ciphertext sent by the second electronic device, by using the stored public key of the encryption algorithm, to obtain the second data in the second ciphertext. The first electronic device compares the second data with the first data in the first secret sent to the second electronic device.
In some embodiments, the first ciphertext includes first data encrypted by a first public key of an encryption algorithm;
the second data included in the second ciphertext is determined by decrypting the first ciphertext by the second electronic device through a first private key of an encryption algorithm and according to the first data obtained by decryption;
the second ciphertext is obtained by encrypting second data through a second private key of an encryption algorithm by the second electronic device;
step 430 of decrypting the second ciphertext with the public key of the encryption algorithm and comparing the second data in the second ciphertext with the first data may comprise the steps of:
decrypting the second ciphertext through a second public key of the encryption algorithm, and comparing second data in the second ciphertext with the first data, wherein the first private key and the first public key are one key pair obtained through the encryption algorithm, and the second private key and the second public key are the other key pair obtained through the encryption algorithm.
In the embodiment of the application, the first electronic device may generate the first data in response to the authentication request initiated by the second electronic device, encrypt the first data by using the stored first public key of the encryption algorithm to obtain the first ciphertext, and send the first ciphertext to the second electronic device. After receiving the first ciphertext transmitted by the first electronic device, the second electronic device decrypts the first ciphertext through a first private key of a stored encryption algorithm, which belongs to the same key pair as the first public key, determines second data according to the first data in the first ciphertext, encrypts the determined second data through a second private key of the stored encryption algorithm to obtain a second ciphertext, and transmits the second ciphertext to the first electronic device, and the first electronic device receives the second ciphertext transmitted by the second electronic device.
After receiving the second ciphertext, the first electronic device decrypts the second ciphertext through a second public key which belongs to the same key pair as the second private key in the stored encryption algorithm to obtain second data, and then compares the second data with the generated first data. The key pair described by the first public key and the first private key and the key pair described by the second private key and the second public key are not the same key pair.
By adopting the embodiment, the data can be encrypted through different key pairs in the process of interaction between the first electronic equipment and the second electronic equipment, so that the security of the authentication process is improved, the second data is determined according to the first data, the second data and the first data can be compared more easily, and the comparison efficiency is improved.
440. And determining the authentication result of the second electronic equipment according to the comparison result.
In this embodiment of the present application, when the second data in the second secret received by the first electronic device matches the first data generated by the first electronic device, the result of authentication of the first electronic device on the second electronic device is that the second data passes, and the subsequent first electronic device may execute the related command to open the preloader port.
And under the condition that the second data in the second secret received by the first electronic equipment is not matched with the first data generated by the first electronic equipment, the authentication result of the first electronic equipment on the second electronic equipment is that the second data does not pass, and the first electronic equipment does not operate the preloader port subsequently, so that the preloader port keeps a default closed state.
By adopting the embodiment, the first electronic equipment and the second electronic equipment interact through the encryption algorithm to realize the authentication of the second electronic equipment, so that the security of the authentication process can be improved, and the security of the first electronic equipment is further improved.
In one embodiment, referring to fig. 5, fig. 5 is an interactive schematic diagram of a specific port authentication and preloader port opening process disclosed in one embodiment. The method can be applied to the first electronic device 10 and the second electronic device 20 in the application scenario shown in fig. 1, where the first electronic device is provided with a preload mode preloader port, and the preload port is in a default closed state. As shown in fig. 5, the method may include the steps of:
510. the first ciphertext is transmitted to the second electronic device, the first ciphertext comprising a random number encrypted by a first public key of an encryption algorithm.
In the embodiment of the application, the first electronic device generates a random number in response to an authentication request initiated by the second electronic device, encrypts the random number through a stored first public key of an encryption algorithm to obtain a first ciphertext, and sends the first ciphertext to the second electronic device.
520. And receiving a second ciphertext sent by the second electronic device aiming at the first ciphertext, wherein the second ciphertext comprises device information and a random number obtained by decrypting the first ciphertext by the second electronic device through a first private key of an encryption algorithm, and the second ciphertext is obtained by encrypting the device information and the random number by the second electronic device through a second private key of the encryption algorithm.
In the embodiment of the application, after receiving the first ciphertext, the second electronic device decrypts the first ciphertext through the stored first private key which belongs to the same key pair as the first public key, so as to obtain the random number generated by the first electronic device. The second electronic device obtains the stored device information about the first electronic device, encrypts the obtained device information and the random number obtained by decryption through a second private key of the stored encryption algorithm to obtain a second ciphertext, and sends the second ciphertext to the first electronic device.
The first electronic device receives a second ciphertext transmitted by the second electronic device.
530. Decrypting the second ciphertext through a second public key of the encryption algorithm, comparing the device information in the second ciphertext with the device information of the first electronic device, and comparing the random number in the second ciphertext with the random number in the first ciphertext.
In this embodiment of the present application, the first electronic device decrypts the second ciphertext through the stored second public key that belongs to the same key pair as the second private key, to obtain the device information in the second ciphertext and the random number in the second ciphertext. The first electronic device compares the device information in the second secret with the device information related to the first electronic device, and compares the random number in the second secret with the random number which is generated.
540. And determining the authentication result of the second electronic equipment according to the comparison result.
In the embodiment of the present application, when the device information in the second secret is the same as the device information of the first electronic device, and the random number in the second secret is the same as the random number that starts to be generated, the result of the authentication of the first electronic device to the second electronic device is passing.
In the case that the device information in the second secret is different from the device information of the first electronic device, and the random number in the second secret is the same as the random number generated at the beginning, the result of the authentication of the first electronic device to the second electronic device is not passed.
In the case that the device information in the second secret is different from the device information of the first electronic device, and the random number in the second secret is the same as the random number generated at the beginning, the result of the authentication of the first electronic device to the second electronic device is not passed.
By adopting the embodiment, the encryption and decryption operations of the interaction process are carried out by using different key pairs of the encryption algorithm, and the random number and the equipment information are used as the compared data, so that the comparison efficiency is improved, and meanwhile, the security of the authentication process is also improved.
550. And under the condition that the equipment information in the second secret is the same as the equipment information of the first electronic equipment and the second random number in the second secret is the same as the random number in the first secret, modifying the authority of the first electronic equipment to the preloader port in the fastboot mode.
In the embodiment of the application, when the device information in the second secret is the same as the device information of the first electronic device, and the random number in the second secret is the same as the random number generated at the beginning, the first electronic device considers that the result of authentication of the second electronic device is passing, and then the first electronic device can change the authority about the preloader port in the fastboot mode, so that the first electronic device has the authority for changing the state of the preloader port.
560. And responding to the opening command, and opening the preloader port according to the changed authority.
In the embodiment of the application, the second electronic device sends an opening command to the first electronic device in advance, and the first electronic device responds to the opening command sent in advance by the second electronic device when the authentication result of the second electronic device is passed, and opens the preloader port according to the changed authority about the preloader port, so that the second electronic device can brush the first electronic device through the preloader port subsequently.
For example, the first electronic device is a mobile phone terminal, the second electronic device is a computer terminal, the computer terminal executes a fastboot auth_start command to initiate an authentication request, the mobile phone terminal generates a 32-bit random number, encrypts the 32-bit random number by using an authpubkey in an RSA encryption manner to obtain encrypted data nonce, and sends the encrypted data nonce to the computer terminal. The computer end decrypts the noise data sent by the mobile phone end by using the auth privkey to obtain the play noise data. The computer end executes fastboot getvar serialno command to obtain the product serial number servailno of the mobile phone end, generates response data through another privkey encryption according to the plan non data and the product serial number servailno, executes command fastboot oem permission command, and sends the response data to the mobile phone end. The mobile phone terminal decrypts the obtained response data by using the corresponding pubkey, compares the value of the plan node data obtained by decryption with the value of the node data, and compares the product serial number servalno with the product serial number of the mobile phone terminal, and under the condition that the product serial number servalno is consistent with the product serial number of the mobile phone terminal, the mobile phone terminal changes the authority of the fastboot mode, which belongs to the first electronic equipment, on the preloader port. The specific command used in this example is only one example, and is not limited to the specific command.
By adopting the embodiment, under the condition that the equipment information in the second secret is the same as the equipment information of the first electronic equipment, and the random number in the second secret is the same as the random number generated at the beginning, only the permission about the preloader port in the fastboot mode is changed to open the preloader port, the unsafe condition of the electronic equipment caused by excessive permission change is avoided, and the safety of the electronic equipment is improved.
In one embodiment, referring to fig. 6, fig. 6 is a flow chart of another port authentication method disclosed in one embodiment. The method can be applied to a second electronic device 20 in the application scenario shown in fig. 1, where the second electronic device is in signaling connection with a first electronic device, and the first electronic device is provided with a preload port in a preload mode, and the preload port is in a default closed state. As shown in fig. 6, the method may include the steps of:
610. when the first electronic equipment authenticates the second electronic equipment in the fastboot mode and the authentication result is that the second electronic equipment passes, the second electronic equipment uses a brushing tool to brush the first electronic equipment through a preloader port opened by the first electronic equipment.
In the embodiment of the present application, the specific execution steps of the port authentication method applied to the second electronic device are the same as those of the above embodiment, and are not described herein again.
In some embodiments, the self-initiated download mode boom port of the first electronic device is set to a permanently closed state.
In one embodiment, referring to fig. 7, fig. 7 is a flow chart illustrating another specific port authentication procedure disclosed in one embodiment. The method can be applied to a second electronic device 20 in the application scenario shown in fig. 1, where the second electronic device is in signaling connection with a first electronic device, and the first electronic device is provided with a preload port in a preload mode, and the preload port is in a default closed state. As shown in fig. 7, the method may include the steps of:
710. receiving a first ciphertext transmitted by a first electronic device, wherein the first ciphertext comprises first data encrypted by the first electronic device through a public key of an encryption algorithm;
720. encrypting the second data through the private key of the encryption algorithm to obtain a second ciphertext, and sending the second ciphertext to the first electronic device, so that the first electronic device decrypts the second ciphertext through the public key of the encryption algorithm, compares the second data in the second ciphertext with the first data, and determines an authentication result of the second electronic device according to the comparison result.
In the embodiment of the present application, the specific execution steps of the specific port authentication process applied to the second electronic device are the same as those of the above embodiment, and are not described herein again.
In some embodiments, the first ciphertext includes first data encrypted by the first electronic device with a first public key of an encryption algorithm;
step 720, encrypting the second data through a private key of an encryption algorithm to obtain a second ciphertext, and sending the second ciphertext to the first electronic device, so that the first electronic device decrypts the second ciphertext through a public key of the encryption algorithm, compares the second data in the second ciphertext with the first data, and determines an authentication result of the second electronic device according to a comparison result, wherein the step comprises the following steps:
the second electronic device decrypts the first ciphertext through a first private key of an encryption algorithm to obtain first data;
the second electronic device determines second data according to the first data obtained through decryption, encrypts the second data through a second private key of an encryption algorithm to obtain a second ciphertext, and sends the second ciphertext to the first electronic device, so that the first electronic device decrypts the second ciphertext through a second public key of the encryption algorithm, compares the second data in the second ciphertext with the first data, and determines an authentication result of the second electronic device according to a comparison result, wherein the first private key and the first public key are one key pair obtained through the encryption algorithm, and the second private key and the second public key are the other key pair obtained through the encryption algorithm.
In some embodiments, the first ciphertext comprises a random number encrypted by a first public key of an encryption algorithm;
the second ciphertext comprises equipment information and a random number obtained by decrypting the first ciphertext through a first private key of an encryption algorithm by the second electronic equipment;
the second electronic device determines second data according to the first data obtained through decryption, encrypts the second data through a second private key of an encryption algorithm to obtain a second ciphertext, and sends the second ciphertext to the first electronic device, so that the first electronic device decrypts the second ciphertext through a second public key of the encryption algorithm, compares the second data in the second ciphertext with the first data, and determines an authentication result of the second electronic device according to a comparison result, wherein the first private key and the first public key are a key pair obtained through the encryption algorithm, and the second private key and the second public key are another key pair obtained through the encryption algorithm, and the method can comprise the following steps:
the second electronic device determines second data according to the first data obtained through decryption, encrypts the second data through a second private key of an encryption algorithm to obtain a second ciphertext, and sends the second ciphertext to the first electronic device, so that the first electronic device decrypts the second ciphertext through a second public key of the encryption algorithm, compares device information in the second ciphertext with device information of the first electronic device, compares random numbers in the second ciphertext with random numbers in the first ciphertext, and determines an authentication result of the second electronic device according to a comparison result. The first private key and the first public key are one key pair obtained through an encryption algorithm, and the second private key and the second public key are the other key pair obtained through the encryption algorithm.
In some embodiments, when the first electronic device authenticates the second electronic device in the fastboot mode and the authentication result is that the second electronic device passes, step 610 uses a brushing tool to brush the first electronic device through a preloader port opened by the first electronic device, and the process of brushing the first electronic device may include the following steps:
when the first electronic device judges that the device information in the second secret is the same as the device information of the first electronic device, and the second random number in the second secret is the same as the random number in the first secret, so that the first electronic device changes the authority of the preloader port in the fastboot mode, the second electronic device sends an opening command to the first electronic device, so that the first electronic device responds to the opening command and opens the preloader port according to the changed authority;
and the second electronic equipment uses a brushing tool to brush the first electronic equipment through the preloader port opened by the first electronic equipment.
Referring to fig. 8, fig. 8 is a schematic structural diagram of a port authentication device disclosed in an embodiment of the present application, where the port authentication device may be applied to a first electronic device 10 in an application scenario shown in fig. 1, and the first electronic device is provided with a preload port in a preload mode, and the preload port is in a default closed state. As shown in fig. 8, the port authentication device 800 may include: authentication module 810 and port module 820.
An authentication module 810, configured to authenticate the second electronic device in the fastboot mode;
and the port module 820 is configured to open the preloader port when the authentication result of the second electronic device is that the second electronic device passes, so that the second electronic device uses the brushing tool to brush the first electronic device through the preloader port.
In some embodiments, the authentication module 810 is further configured to:
when the second electronic equipment finishes the brushing of the first electronic equipment, authenticating the second electronic equipment again in the fastboot mode;
port module 820, further for:
and closing the preloader port after the second electronic device is authenticated again.
In some embodiments, the self-initiated download mode boom port of the first electronic device is set to a permanently closed state.
In some embodiments, the authentication module 810 is further configured to:
transmitting a first ciphertext to the second electronic device, the first ciphertext comprising first data encrypted by a public key of an encryption algorithm;
receiving a second ciphertext transmitted by the second electronic device for the first ciphertext, the second ciphertext comprising second data encrypted by a private key of an encryption algorithm;
Decrypting the second ciphertext through a public key of an encryption algorithm, and comparing second data in the second ciphertext with the first data;
and determining the authentication result of the second electronic equipment according to the comparison result.
In some embodiments, the first ciphertext includes first data encrypted by a first public key of an encryption algorithm;
the second data included in the second ciphertext is determined by decrypting the first ciphertext by the second electronic device through a first private key of an encryption algorithm and according to the first data obtained by decryption;
the second ciphertext is obtained by encrypting second data through a second private key of an encryption algorithm by the second electronic device;
the authentication module 810 is further configured to:
decrypting the second ciphertext through a second public key of the encryption algorithm, and comparing second data in the second ciphertext with the first data, wherein the first private key and the first public key are one key pair obtained through the encryption algorithm, and the second private key and the second public key are the other key pair obtained through the encryption algorithm.
In some embodiments, the first ciphertext comprises a random number encrypted by a first public key of an encryption algorithm;
the second ciphertext comprises equipment information and a random number obtained by decrypting the first ciphertext through a first private key of an encryption algorithm by the second electronic equipment;
The authentication module 810 is further configured to:
decrypting the second ciphertext through a second public key of the encryption algorithm, comparing the device information in the second ciphertext with the device information of the first electronic device, and comparing the random number in the second ciphertext with the random number in the first ciphertext.
In some embodiments, port module 820 is further configured to:
under the condition that the equipment information in the second secret is the same as the equipment information of the first electronic equipment and the second random number in the second secret is the same as the random number in the first secret, modifying the authority of the first electronic equipment to the preloader port in the fastboot mode;
and responding to the opening command, and opening the preloader port according to the changed authority.
Referring to fig. 9, fig. 9 is a schematic structural diagram of another port authentication device disclosed in the embodiment of the present application, where the port authentication device may be applied to a second electronic device 20 in an application scenario shown in fig. 1, where the second electronic device is in signaling connection with a first electronic device, and the first electronic device is provided with a preload port in a default closed state. As shown in fig. 9, the port authentication device 900 may include: the brusher module 910.
And the brushing module 910 is configured to, when the first electronic device authenticates the second electronic device in the fastboot mode and the authentication result is that the first electronic device passes, use a brushing tool to brush the first electronic device through a preloader port opened by the first electronic device.
In some embodiments, the self-initiated download mode boom port of the first electronic device is set to a permanently closed state.
In some embodiments, the brusher module 910 is further configured to:
receiving a first ciphertext transmitted by a first electronic device, wherein the first ciphertext comprises first data encrypted by the first electronic device through a public key of an encryption algorithm;
encrypting the second data through the private key of the encryption algorithm to obtain a second ciphertext, and sending the second ciphertext to the first electronic device, so that the first electronic device decrypts the second ciphertext through the public key of the encryption algorithm, compares the second data in the second ciphertext with the first data, and determines an authentication result of the second electronic device according to the comparison result.
In some embodiments, the first ciphertext includes first data encrypted by the first electronic device with a first public key of an encryption algorithm;
The brushing module 910 is further configured to:
decrypting the first ciphertext through a first private key of an encryption algorithm to obtain first data;
determining second data according to the first data obtained through decryption, encrypting the second data through a second private key of an encryption algorithm to obtain a second ciphertext, sending the second ciphertext to the first electronic device, enabling the first electronic device to decrypt the second ciphertext through a second public key of the encryption algorithm, comparing the second data in the second ciphertext with the first data, and determining an authentication result of the second electronic device according to a comparison result, wherein the first private key and the first public key are a key pair obtained through the encryption algorithm, and the second private key and the second public key are another key pair obtained through the encryption algorithm.
In some embodiments, the first ciphertext comprises a random number encrypted by a first public key of an encryption algorithm;
the second ciphertext comprises equipment information and a random number obtained by decrypting the first ciphertext through a first private key of an encryption algorithm by the second electronic equipment;
the brushing module 910 is further configured to:
determining second data according to the first data obtained through decryption, encrypting the second data through a second private key of an encryption algorithm to obtain a second ciphertext, sending the second ciphertext to the first electronic device, enabling the first electronic device to decrypt the second ciphertext through a second public key of the encryption algorithm, comparing device information in the second ciphertext with device information of the first electronic device, comparing a random number in the second ciphertext with a random number in the first ciphertext, and determining an authentication result of the second electronic device according to a comparison result. The first private key and the first public key are one key pair obtained through an encryption algorithm, and the second private key and the second public key are the other key pair obtained through the encryption algorithm.
In some embodiments, the brusher module 910 is further configured to:
when the first electronic device judges that the device information in the second secret is the same as the device information of the first electronic device, and the second random number in the second secret is the same as the random number in the first secret, so that when the first electronic device changes the authority of the preloader port in the fastboot mode, an opening command is sent to the first electronic device, and the first electronic device responds to the opening command and opens the preloader port according to the changed authority;
and brushing the first electronic equipment through a preloader port opened by the first electronic equipment by using a brushing tool.
Referring to fig. 10, fig. 10 is a schematic structural diagram of an electronic device according to an embodiment of the disclosure.
As shown in fig. 10, the electronic device 1000 may include:
a memory 1010 in which executable program code is stored.
A processor 1020 coupled with the memory 1010.
The processor 1020 invokes executable program code stored in the memory 1010 to perform any of the port authentication methods disclosed in the embodiments of the present application.
It should be noted that, the electronic device shown in fig. 10 may further include components not shown, such as a power supply, an input key, a camera, a speaker, a screen, an RF circuit, a Wi-Fi module, a bluetooth module, etc., which are not described in detail in this embodiment.
The embodiment of the application discloses a computer readable storage medium storing a computer program, wherein the computer program enables a computer to execute any port authentication method disclosed in the embodiment of the application.
Embodiments of the present application disclose a computer program product comprising a non-transitory computer readable storage medium storing a computer program, and the computer program is operable to cause a computer to perform any of the port authentication methods disclosed in the embodiments of the present application.
It should be appreciated that reference throughout this specification to "one embodiment" or "an embodiment" means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present application. Thus, the appearances of the phrases "in one embodiment" or "in an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. Those skilled in the art will also appreciate that the embodiments described in the specification are all alternative embodiments and that the acts and modules referred to are not necessarily required in the present application.
In various embodiments of the present application, it should be understood that the size of the sequence numbers of the above processes does not mean that the execution sequence of the processes is necessarily sequential, and the execution sequence of the processes should be determined by the functions and internal logic thereof, and should not constitute any limitation on the implementation process of the embodiments of the present application.
The units described above as separate components may or may not be physically separate, and components shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units described above, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer-accessible memory. Based on such understanding, the technical solution of the present application, or a part contributing to the prior art or all or part of the technical solution, may be embodied in the form of a software product stored in a memory, including several requests for a computer device (which may be a personal computer, a server or a network device, etc., in particular may be a processor in the computer device) to perform part or all of the steps of the above-mentioned method of the various embodiments of the present application.
Those of ordinary skill in the art will appreciate that all or part of the steps of the various methods of the above embodiments may be implemented by a program that instructs associated hardware, the program may be stored in a computer readable storage medium including Read-Only Memory (ROM), random access Memory (Random Access Memory, RAM), programmable Read-Only Memory (Programmable Read-Only Memory, PROM), erasable programmable Read-Only Memory (Erasable Programmable Read Only Memory, EPROM), one-time programmable Read-Only Memory (OTPROM), electrically erasable programmable Read-Only Memory (EEPROM), compact disc Read-Only Memory (Compact Disc Read-Only Memory, CD-ROM) or other optical disk Memory, magnetic disk Memory, tape Memory, or any other medium that can be used for carrying or storing data that is readable by a computer.
The port authentication method, device, electronic equipment and storable medium disclosed in the embodiments of the present application are described in detail above, and specific examples are applied herein to illustrate the principles and embodiments of the present application, where the description of the above embodiments is only used to help understand the method and core idea of the present application. Meanwhile, as those skilled in the art will have modifications in the specific embodiments and application scope according to the ideas of the present application, the present disclosure should not be construed as limiting the present application in view of the above description.

Claims (10)

1. A port authentication method, applied to a first electronic device, where the first electronic device is provided with a preload mode preloader port, and the preload port is in a default closed state, the method includes:
authenticating the second electronic device in the fastboot mode;
and when the authentication result of the second electronic equipment is that the second electronic equipment passes, opening the preloader port so that the second electronic equipment uses a brushing tool to brush the first electronic equipment through the preloader port.
2. The method according to claim 1, wherein the method further comprises:
when the second electronic device finishes the brushing of the first electronic device, authenticating the second electronic device again in the fastboot mode;
and closing the preloader port after the second electronic equipment is authenticated again.
3. The method according to claim 1 or 2, wherein the self-initiated download mode boom port of the first electronic device is set to a permanently closed state.
4. The method according to claim 1 or 2, wherein authenticating the second electronic device in the fast start fastboot mode comprises:
Transmitting a first ciphertext to a second electronic device, the first ciphertext comprising first data encrypted by a public key of an encryption algorithm;
receiving a second ciphertext transmitted by the second electronic device for the first ciphertext, the second ciphertext comprising second data encrypted by a private key of the encryption algorithm;
decrypting the second ciphertext through a public key of the encryption algorithm, and comparing second data in the second ciphertext with the first data;
and determining the authentication result of the second electronic equipment according to the comparison result.
5. The method of claim 4, wherein the first ciphertext comprises first data encrypted by a first public key of the encryption algorithm;
the second data included in the second ciphertext is determined by the second electronic device through decrypting the first ciphertext through a first private key of the encryption algorithm and according to the first data obtained through decryption;
the second ciphertext is obtained by encrypting the second data through a second private key of the encryption algorithm by the second electronic equipment;
the decrypting the second ciphertext by the public key of the encryption algorithm and comparing the second data in the second ciphertext with the first data includes:
Decrypting the second ciphertext through a second public key of the encryption algorithm, and comparing second data in the second ciphertext with the first data, wherein the first private key and the first public key are one key pair obtained through the encryption algorithm, and the second private key and the second public key are the other key pair obtained through the encryption algorithm.
6. The method of claim 5, wherein the first ciphertext comprises a random number encrypted by a first public key of an encryption algorithm;
the second ciphertext comprises equipment information and a random number obtained by decrypting the first ciphertext through a first private key of the encryption algorithm by the second electronic equipment;
the decrypting the second ciphertext with the second public key of the encryption algorithm and comparing the second data in the second ciphertext with the first data includes:
decrypting the second ciphertext through a second public key of the encryption algorithm, comparing the device information in the second ciphertext with the device information of the first electronic device, and comparing the random number in the second ciphertext with the random number in the first ciphertext;
And when the authentication result of the second electronic device is that the second electronic device passes, opening the preloader port, so that the second electronic device uses a brushing tool to brush the first electronic device through the preloader port, and the method comprises the following steps:
under the condition that the equipment information in the second secret is the same as the equipment information of the first electronic equipment and the second random number in the second secret is the same as the random number in the first secret, modifying the authority of the first electronic equipment to the preloader port in the fastboot mode;
and responding to an opening command, and opening the preloader port according to the changed authority.
7. The port authentication method is characterized by being applied to a second electronic device, wherein the second electronic device is in signaling connection with the first electronic device, the first electronic device is provided with a preload mode preloader port, and the preload port is in a default closed state, and the method comprises the following steps:
and when the first electronic equipment authenticates the second electronic equipment in the fast startup fastboot mode and the authentication result is that the second electronic equipment passes, the second electronic equipment uses a brushing tool to brush the first electronic equipment through a preloader port opened by the first electronic equipment.
8. A port authentication device, applied to a first electronic device, where the first electronic device is provided with a preload mode preloader port, and the preload port is in a default closed state, the device includes:
the authentication module is used for authenticating the second electronic equipment in the fast startup fastboot mode;
and the port module is used for opening the preloader port when the authentication result of the second electronic equipment is that the second electronic equipment passes, so that the second electronic equipment uses a brushing tool to brush the first electronic equipment through the preloader port.
9. An electronic device comprising a memory and a processor, the memory having stored therein a computer program which, when executed by the processor, causes the processor to implement the method of any one of claims 1 to 6 or claim 7.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the method of any one of claims 1 to 6 or claim 7.
CN202211705933.1A 2022-12-29 2022-12-29 Port authentication method, device, electronic equipment and storable medium Pending CN116321173A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211705933.1A CN116321173A (en) 2022-12-29 2022-12-29 Port authentication method, device, electronic equipment and storable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211705933.1A CN116321173A (en) 2022-12-29 2022-12-29 Port authentication method, device, electronic equipment and storable medium

Publications (1)

Publication Number Publication Date
CN116321173A true CN116321173A (en) 2023-06-23

Family

ID=86815667

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211705933.1A Pending CN116321173A (en) 2022-12-29 2022-12-29 Port authentication method, device, electronic equipment and storable medium

Country Status (1)

Country Link
CN (1) CN116321173A (en)

Similar Documents

Publication Publication Date Title
US20180082050A1 (en) Method and a system for secure login to a computer, computer network, and computer website using biometrics and a mobile computing wireless electronic communication device
US9294279B2 (en) User authentication system
US9264426B2 (en) System and method for authentication via a proximate device
US8295484B2 (en) System and method for securing data from a remote input device
TWI582638B (en) Electronic device, method for establishing and enforcing a security policy associated with an access control element, and secure element
EP3099090B1 (en) Network locking or card locking method and device for a mobile terminal, terminal, sim card, storage media
CN107004083B (en) Device key protection
US9141776B2 (en) Method and apparatus for secure hardware analysis
EP2741548A2 (en) Method for changing mno in embedded sim on basis of dynamic key generation and embedded sim and recording medium therefor
WO2018014760A1 (en) Method and device for providing and obtaining graphic code information, and terminal
JP2004538584A (en) Information processing method and system in electronic device, electronic device, and processing block
WO2009137371A2 (en) Enterprise device recovery
WO2013182154A1 (en) Method, system and terminal for encrypting/decrypting application program on communication terminal
WO2010089723A1 (en) A circuit, system, device and method of authenticating a communication session and encrypting data thereof
US11609979B2 (en) Secure element for processing and authenticating digital key and operation method therefor
CN111401901B (en) Authentication method and device of biological payment device, computer device and storage medium
CN115943381A (en) Data encryption and decryption method and device
US9977907B2 (en) Encryption processing method and device for application, and terminal
CN116321173A (en) Port authentication method, device, electronic equipment and storable medium
JP2023517551A (en) Mobile device lock function
CN107862209B (en) File encryption and decryption method, mobile terminal and device with storage function
CN111246480A (en) Application communication method, system, equipment and storage medium based on SIM card
CN114582048A (en) NFC-based vehicle door control method, mobile terminal and vehicle
CN115175179A (en) Access authorization method, device, terminal and storage medium
CN115146251A (en) Processor security authentication method, security module and authentication tool

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination