WO2010130171A1 - 一种移动终端及保护其系统数据的方法 - Google Patents

一种移动终端及保护其系统数据的方法 Download PDF

Info

Publication number
WO2010130171A1
WO2010130171A1 PCT/CN2010/071626 CN2010071626W WO2010130171A1 WO 2010130171 A1 WO2010130171 A1 WO 2010130171A1 CN 2010071626 W CN2010071626 W CN 2010071626W WO 2010130171 A1 WO2010130171 A1 WO 2010130171A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
code
single chip
mobile terminal
password
Prior art date
Application number
PCT/CN2010/071626
Other languages
English (en)
French (fr)
Inventor
崔帅先
罗炜
张驰俊
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to EP10774512.7A priority Critical patent/EP2429226B1/en
Priority to US13/319,891 priority patent/US8549312B2/en
Publication of WO2010130171A1 publication Critical patent/WO2010130171A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Definitions

  • the present invention relates to the field of mobile communication technologies, and in particular, to a mobile terminal and a method for protecting data of such a mobile terminal system. Background technique
  • mobile terminals can send short messages, and now they can play games, watch movies, and even install their own functions according to their own needs, in addition to a qualitative leap in hardware devices.
  • the functions of the mobile terminal operating system are also becoming more and more powerful and complicated.
  • the mobile terminal operating system has evolved from the earliest fixed kernel module to the complex operating system used on smart mobile terminals, such as the popular LINUX system, INTER's MOBILE system, APPLE's Mac OS X operating system, NOKIA's SYBIAN. Operating system, GOOGLE's ANDORID operating system, PALM's Palm OS operating system.
  • the technical problem to be solved by the present invention is to provide a mobile terminal and a method for protecting the system data thereof, which can effectively prevent the system data of the mobile terminal from being illegally copied, and can be an open system controlled according to the level of the user.
  • the invention discloses a mobile terminal, which comprises a main control module, and the mobile terminal further comprises a single chip microcomputer;
  • the single chip microcomputer is configured to store system data of the mobile terminal;
  • the main control module is configured to prompt the user to input a public password of the mobile terminal when determining that the user requests to operate the system data stored in the single chip, and determine whether the password input by the user is correct; The user's operation request is executed when it is correct.
  • the single chip microcomputer is connected to the main control module through an internal integrated circuit bus interface (I 2 C, Inter IC Bus) or a serial peripheral interface (SPI).
  • I 2 C internal integrated circuit bus interface
  • SPI serial peripheral interface
  • the single chip is further configured to perform an irreversible secure hash operation on the stored initialization code and related parameters, and send the operation result to the main control module;
  • the main control module is further configured to perform an irreversible secure hash operation on the password and related parameters input by the user, and compare whether the operation result is consistent with the operation result of the received single-chip microcomputer, and determine whether the password input by the user is correct.
  • the related parameters include an identity (ID) code of the single chip, a system random number, and a function code corresponding to the user operation request, and the system random number is generated by the main control module and transmitted to the single chip microcomputer;
  • ID identity
  • system random number is generated by the main control module and transmitted to the single chip microcomputer;
  • the single chip is further configured to: when receiving the system random number sent by the main control module, perform irreversible on the on-chip stored ID code, the initialization code, the function code corresponding to the user operation request, and the random number Secure hash (CX-1) operation, and return the operation result to the main control module;
  • the main control module is further configured to: after the user inputs the password, read the ID code of the single-chip microcomputer from the single-chip microcomputer, and perform an irreversible secure hash operation on the read ID code and the password input by the user, and the operation result is obtained from the operation result. Extracting a preset length of the temporary storage code; generating a system random number, and sending the data to the single chip; and reading the function code corresponding to the user operation request from the single chip, for the function code, the system The random number, the temporary storage code, and the ID code of the single chip perform an irreversible safe hash operation, and compare the operation result with the received operation result of the single chip.
  • the single chip microcomputer is also used for performing the ID code stored in the chip and the public password of the single chip microcomputer.
  • an initialization code of a preset length is extracted from the operation result, and the extracted initialization code is programmed into the password storage area of the single chip microcomputer.
  • the on-chip EPROM (Erasable Programmable Read - Only Memory) of the microcontroller has a capacity of at least 2048 bits.
  • the invention further discloses a method for protecting system data of a mobile terminal, the method comprising: when the main control module receives a request for the user to operate the system data stored in the single chip, prompting the user to input a password, and determining the password input by the user Whether it is correct, and if so, the user's operation request is executed.
  • the single chip performs an irreversible secure hash operation on the stored initialization code and related parameters, and sends the operation result to the main control module;
  • the main control module performs an irreversible safe hash operation on the password and related parameters input by the user, and compares the operation result with the operation result of the received single-chip microcomputer, and determines whether the password input by the user is correct.
  • the method further includes: writing an initialization code when the microcontroller is initialized; the initialization process of the single chip is: performing an irreversible secure hash operation on the ID code stored in the single chip and the public password of the mobile terminal, from the operation result Extracting a preset length of the authentication code, and programming the extracted authentication code into the password storage area of the single chip microcomputer.
  • the main control module performs an irreversible secure hash operation on the password and related parameters input by the user.
  • the main control module performs an irreversible secure hash operation according to the password input by the user and the single-chip ID code, and extracts a preset from the operation result. The length of the temporary storage code, and then the irreversible secure hash operation of the temporary storage code and related parameters.
  • the related parameters include an ID code of the single chip microcomputer, a system random number, and a function code corresponding to the user operation request, and the system random number is generated by the main control module and transmitted to the single chip microcomputer.
  • the preset length of the initialization code is the same as the preset length value of the temporary storage code, and the value thereof The range is 64 ⁇ 320.
  • the invention stores the key system data of the mobile terminal in a single-chip computer with 128-bit ID code, and utilizes the public password encryption method of the mobile terminal, so that when the user accesses the data stored in the single-chip microcomputer, the password authentication must be implemented, and the pair is realized.
  • the protection of important system data of the mobile terminal protects the legal rights of the mobile terminal developer, avoids the stealing of the mobile terminal related technology by the mobile terminal, and promotes the formal development of the mobile terminal market.
  • FIG. 1 is a schematic structural diagram of a mobile terminal of the present invention
  • FIG. 2 is a schematic diagram of an initialization process of the single chip microcomputer of the present invention.
  • FIG. 3 is a schematic overall flow diagram of the method of the present invention. detailed description
  • FIG. 1 is a schematic structural diagram of a mobile terminal according to the present invention, including a main control module and a single chip, wherein
  • the single chip microcomputer has a 128-bit ID code, and the ID code has been written into the on-chip ROM of the single chip microcomputer at the time of shipment, and cannot be modified, and is a unique identifier of the MCU identity; and the on-chip EPROM has a minimum capacity of 2048 bits for storage.
  • System data of the mobile terminal includes system initialization parameters, correction parameters, function parameters, software version information, etc., and the stored system data is externally represented as a function code; when the single-chip microcomputer receives the system random number sent by the main control module, Performing a CX-1 operation on the on-chip stored ID code, the initialization code, the function code corresponding to the user operation request, and the random number, and transmitting the operation result to the main control module;
  • the initialization code is written when the microcontroller is initialized.
  • the initialization process of the microcontroller is: the ID code of the microcontroller and the public password of the mobile terminal (the public password is defined and provided by the mobile terminal developer, each machine Type has a specific public password, the user is buying
  • the operating system of the version the corresponding public password is obtained, the CX-1 operation is performed, the initialization code of the preset length is extracted from the operation result, and the extracted initialization code is programmed into the password storage area of the single chip microcomputer. If you do not want the initialization code stored in the password storage area to be overwritten, you can set the password storage area of the microcontroller to write protection and make the process irreversible.
  • the main control module is configured to prompt the user to input a password when receiving the user request to operate the system data stored in the single chip, and after reading the password, the user reads the ID code of the single chip from the single chip, and reads the obtained
  • the ID code and the password input by the user perform CX-1 operation, and extract a temporary storage code of a preset length from the operation result; and are used to generate a system random number and send it to the single chip microcomputer; for reading the user operation request corresponding to the single chip from the single chip microcomputer Function code, and perform CX-1 operation on the function code, the system random number, the extracted authentication code, and the ID code of the single-chip microcomputer; whether the comparison operation result is consistent with the operation result of the received single-chip microcomputer; Allow user operation when consistent; prompt user password error when two operation results are inconsistent;
  • the MCU communicates with the main control module through the I2C interface or the SPI interface.
  • FIG. 3 it is a schematic flowchart of the method of the present invention, which specifically includes:
  • Step (1) The main control module receives the user's operation request for the system data saved in the single chip microcomputer.
  • System data includes system initialization parameters, calibration parameters, function parameters, software version information, and so on.
  • the mobile terminal developer stores the mobile terminal function configuration information in the form of function code in the on-chip EPROM of the single chip.
  • Each bit of the function code represents a specific function, 1 means that the function user is available, 0 means that the function user has no right.
  • 1 means that the function user is available
  • 0 means that the function user has no right.
  • Step (3) Read the 128-bit ID code of the microcontroller.
  • Step (5) Extract the temporary storage code of the preset length (64-bit to 320-bit optional) from the operation result.
  • Step (7) After receiving the random number, the MCU performs a CX-1 operation on the random number, its own ID code, the function code corresponding to the user operation request, and the initialization code, and sends the obtained 320-bit operation result to the main control module.
  • Step (8) The main control module reads the function code corresponding to the user operation request from the single chip microcomputer.
  • Step (10) The main control module compares the operation result of the main control module with the operation result of the received single chip microcomputer. If yes, the password input by the user is correct, and step (11) is performed; otherwise, the password input by the user is incorrect, and the execution step ( 12).
  • Step (11) Execute the user's operation request.
  • the main control module of the mobile terminal reads the corresponding function code from the EPROM of the single chip microcomputer to determine whether the user has the right to use the function, and if the right is used, the corresponding function is called, otherwise, The user is prompted not to use this feature.
  • the main control module prompts the user to input the public password of the local machine. If the user input is correct, the user is a 4 authorized user, allowing the user to operate; if the user inputs an error, the user is considered as Unauthorized user, prompting the user to have no right to operate.
  • the law protects the code and key data parameters developed by the developer in the early stage, and will play an increasingly important role in the future mobile terminal circuit.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Description

一种移动终端及保护其系统数据的方法 技术领域
本发明涉及移动通信技术领域, 尤其涉及一种移动终端及保护这种移 动终端系统数据的方法。 背景技术
移动终端从最初的只有通话功能, 发展到可以发短消息, 到现在可以 玩游戏, 看电影, 甚至可以根据自己的需要安装自己想要的功能, 除了在 硬件设备上有了质的飞跃外, 移动终端操作系统的功能也越来越强大, 复 杂化。
移动终端操作系统从最早的固定的内核模块, 发展到智能移动终端上 使用的复杂操作系统, 比如常用的 LINUX 系统, INTER公司的 MOBILE 系统, APPLE公司的 Mac OS X的操作系统, NOKIA公司的 SYBIAN操作 系统, GOOGLE公司的 ANDORID操作系统, PALM公司的 Palm OS操作 系统。
由于开发这些系统需要大量的研发经费, 因此怎样保护自己所开发的 系统不被盗用, 也逐渐成为了移动终端开发商所考虑的问题之一。 发明内容
本发明所要解决的技术问题是, 提供一种移动终端及保护其系统数据 的方法, 可以有效防止移动终端的系统数据被非法复制, 并且可以根据用 户的级别有控制的开放系统。
本发明公开了一种移动终端, 包括主控模块, 所述移动终端还包括单 片机; 所述单片机, 用于存储移动终端的系统数据;
所述主控模块, 用于在收到用户请求对单片机中存储的系统数据进行 操作时, 提示用户输入移动终端的公共密码, 并判断用户输入的密码是否 正确; 还用于在用户输入的密码正确时执行用户的操作请求。
所述单片机通过内部集成电路总线接口 ( I2C , Inter IC Bus )或者串行 外围接口 (SPI, Serial Peripheral Interface ) 与所述主控模块连接。
所述单片机, 还用于对存储的初始化码及相关参数进行不可逆安全散 列运算, 将运算结果发送给所述主控模块;
所述主控模块, 还用于对用户输入的密码及相关参数进行不可逆安全 散列运算, 并比较运算结果与接收到的单片机的运算结果是否一致, 判断 用户输入的密码是否正确。
所述相关参数包括单片机的身份标识 ( ID )码、 系统随机数和用户操 作请求对应的功能码, 且所述系统随机数由所述的主控模块生成, 并传给 所述单片机;
相应的, 所述单片机, 还用于在接收到所述主控模块发送的系统随机 数时, 对片内存储的 ID码、 初始化码、 用户操作请求对应的功能码以及所 述随机数进行不可逆安全散列 (CX-1 )运算, 并将运算结果返回给所述主 控模块;
所述主控模块, 还用于在用户输入密码后, 从所述单片机中读取单片 机的 ID码, 并对读取到的 ID码和用户输入的密码进行不可逆安全散列运 算, 从运算结果中提取预设长度的暂存码; 用于生成系统随机数, 并发送 给所述单片机; 用于从所述单片机中读取所述用户操作请求对应的功能码, 对所述功能码、 系统随机数、 暂存码以及单片机的 ID码进行不可逆安全散 列运算, 并比较运算结果与接收到的所述单片机的运算结果是否一致。
所述单片机, 还用于对片内存储的 ID码和单片机的公共密码进行不可 逆安全散列运算, 从运算结果中提取预设长度的初始化码, 并将所述提取 到的初始化码烧写到所述单片机的密码存储区中。
所述单片机的片内可消除程序化只读存储器 ( EPROM , Erasable Programmable Read - Only Memory ) 的容量至少为 2048位。
本发明进一步公开了一种保护移动终端的系统数据的方法, 该方法包 括: 主控模块收到用户对单片机中存储的系统数据进行操作的请求时, 提 示用户输入密码, 并判断用户输入的密码是否正确, 若是, 则执行用户的 操作请求。
所述判断用户输入的密码是否正确的具体操作是:
所述单片机对存储的初始化码及相关参数进行不可逆安全散列运算, 将运算结果发送给所述主控模块;
所述主控模块对用户输入的密码及相关参数进行不可逆安全散列运 算, 并比较运算结果与接收到的单片机的运算结果是否一致, 判断用户输 入的密码是否正确。
该方法进一步包括: 在所述单片机初始化时被写入初始化码; 所述单片机的初始化过程为: 对所述单片机内存储的 ID码和移动终端 的公共密码进行不可逆安全散列运算, 从运算结果中提取预设长度的认证 码, 并将所述提取到的认证码烧写到所述单片机的密码存储区中。
所述主控模块对用户输入的密码及相关参数进行不可逆安全散列运算 具体为: 所述主控模块根据用户输入的密码和单片机 ID码进行不可逆安全 散列运算, 从运算结果中提取预设长度的暂存码, 再对所述暂存码与相关 参数进行不可逆安全散列运算。
所述相关参数包括单片机的 ID码、 系统随机数和用户操作请求对应的 功能码, 所述系统随机数由所述的主控模块生成, 并传给所述单片机。
所述初始化码的预设长度与所述暂存码的预设长度数值相同, 其数值 范围为 64~320。
本发明将移动终端的关键系统数据存储在具有 128位 ID码的单片机 中, 并利用移动终端的公共密码加密的方法, 使得用户访问存储在单片机 中的数据时, 必须通过密码认证, 实现了对移动终端重要的系统数据的保 护, 从而保护了移动终端开发厂商的合法权利, 避免了山寨移动终端对移 动终端相关技术的窃取, 同时促进了移动终端市场的正规化发展。 附图说明
图 1是本发明的移动终端结构示意图;
图 2是本发明中单片机的初始化过程示意图;
图 3为本发明方法的整体流程示意图。 具体实施方式
以下结合附图和优选实施例, 对本发明做进一步详细介绍。
如图 1 所示, 是本发明所述移动终端的结构示意图, 包括主控模块和 单片机, 其中,
单片机具有 128位 ID码, 该 ID码出厂时已经被写入单片机的片内只 读 ROM中, 且不可修改, 为单片机身份的唯一标识; 并且其片内 EPROM 的容量最小为 2048bit, 用于存储移动终端的系统数据; 系统数据包括系统 初始化参数、 校正参数、 功能参数、 软件版本信息等, 存储的系统数据对 外表现为功能码; 单片机用于在接收到主控模块发送的系统随机数时, 对 片内存储的 ID码、 初始化码、 用户操作请求对应的功能码以及随机数进行 CX-1运算, 并将运算结果发送给主控模块;
初始化码是在单片机初始化时被写入的, 如图 2 所示, 单片机的初始 化过程为: 对单片机 ID码和移动终端的公共密码(该公共密码由移动终端 开发厂商定义并提供, 每个机型都有一个特定的公共密码, 用户在购买正 版的操作系统时, 会得到相应的公共密码)进行 CX-1运算, 从运算结果中 提取预设长度的初始化码, 并将提取到的初始化码烧写到单片机的密码存 储区中。 若不希望密码存储区中存储的初始化码被改写, 则可将单片机的 密码存储区设置为写保护, 且使该过程不可逆。
主控模块用于在收到用户请求对单片机中存储的系统数据进行操作 时, 提示用户输入密码, 用于在用户输入密码后, 从单片机中读取单片机 的 ID码, 并对读取到的 ID码和用户输入的密码进行 CX-1运算,从运算结 果中提取预设长度的暂存码; 用于生成系统随机数, 并发送给单片机; 用 于从单片机中读取用户操作请求对应的功能码, 并对功能码、 系统随机数、 提取的认证码以及单片机的 ID码进行 CX-1运算; 用于比较运算结果与接 收到的单片机的运算结果是否一致; 用于在两个运算结果一致时允许用户 操作; 在两个运算结果不一致时, 提示用户密码错误;
单片机通过 I2C接口或者 SPI接口与主控模块进行通信。
如图 3所示, 是本发明所述方法流程示意图, 具体包括:
步骤( 1 ): 主控模块收到用户的对单片机中保存的系统数据的操作请 求。
系统数据包括系统初始化参数、 校正参数、 功能参数、 软件版本信息 等。 移动终端开发商将移动终端功能配置信息以功能码的形式存储在单片 机片内 EPROM中, 功能码的每一位都代表一个特定的功能, 1表示该功能 用户可用, 0表示该功能用户无权使用, 这样, 基于同样的硬件平台, 可以 实现针对不同的用户级别, 有控制的开放系统功能。 比如, 需要对系统化 参数进行访问时, 系统化参数以功能码的形式被封装, 功能码作为系统化 参数的外部表征。
步骤( 2 ): 提示用户输入本机密码。
步骤( 3 ): 读取单片机的 128位 ID码。 步骤( 4 ): 对接收到的密码和读取到的 128位 ID码进行 CX-1运算, 得到 320位的运算结果。
步驟( 5 ): 从运算结果中提取预设长度( 64位至 320位可选) 的暂存 码。 步骤( 6 ): 主控模块生成系统随机数, 并发送给单片机。
步骤(7 ): 单片机接收到随机数后, 对随机数、 自身的 ID码、 用户操 作请求对应的功能码以及初始化码进行 CX-1运算,将得到的 320位运算结 果发送给主控模块。
步骤(8 ): 主控模块从单片机中读取用户操作请求对应的功能码。 步骤(9 ): 主控模块对提取到的暂存码、 读取的功能码、 ID码以及生 成的随机数进行 CX-1运算, 得到 320位运算结果。
步骤(10 ): 主控模块比较自身的运算结果与接收到的单片机的运算结 果是否一致, 若是, 则用户输入的密码正确, 执行步骤(11 ); 否则, 用户 输入的密码错误, 执行步骤( 12 )。
步骤( 11 ): 执行用户的操作请求。
步骤(12 ): 提示用户密码错误, 无权进行相应操作。
下面是本发明的一个具体应用:
当用户需要调用某个功能时, 移动终端的主控模块会从单片机的 EPROM中读出相应的功能码 ,判断用户是否有权使用该功能,若有权使用, 则调用相应的函数, 否则, 提示用户无权使用该功能。 当用户想要对功能 码进行操作时, 主控模块提示用户输入本机的公共密码, 若用户输入正确, 则该用户是 4受权用户, 允许其操作; 若用户输入错误, 则认为该用户为非 授权用户, 提示用户无权操作。 法保护了开发商前期开发的代码和关键数据参数, 在今后的移动终端电路 中将会扮演越来越重要的作用。
以上所述, 仅为本发明的较佳实施例而已, 并非用于限定本发明的保 护范围。

Claims

权利要求书
1、 一种移动终端, 包括主控模块, 其特征在于, 所述移动终端还包括 单片机;
所述单片机, 用于存储移动终端的系统数据;
所述主控模块, 用于在收到用户请求对单片机中存储的系统数据进行 操作时, 提示用户输入密码, 并判断用户输入的密码是否正确; 还用于在 用户输入的密码正确时执行用户的操作请求。
2、 如权利要求 1所述的移动终端, 其特征在于, 所述单片机通过内部 集成电路总线接口 (I2C )、 或者串行外围接口 (SPI )与所述主控模块连接。
3、 如权利要求 1所述的移动终端, 其特征在于, 所述单片机, 还用于 对存储的初始化码及相关参数进行不可逆安全散列运算, 将运算结果发送 给所述主控模块;
所述主控模块, 还用于对用户输入的密码及相关参数进行不可逆安全 散列运算, 并比较运算结果与接收到的单片机的运算结果是否一致, 判断 用户输入的密码是否正确。
4、 如权利要求 3所述的移动终端, 其特征在于, 所述相关参数包括单 片机的身份标识 (ID )码、 系统随机数和用户操作请求对应的功能码, 且 所述系统随机数由所述的主控模块生成, 并传给所述单片机;
相应的, 所述单片机, 还用于在接收到所述主控模块发送的系统随机 数时, 对片内存储的 ID码、 初始化码、 用户操作请求对应的功能码以及所 述随机数进行不可逆安全散列运算, 并将运算结果返回给所述主控模块; 所述主控模块, 还用于在用户输入密码后, 从所述单片机中读取单片 机的 ID码, 并对读取到的 ID码和用户输入的密码进行不可逆安全散列运 算, 从运算结果中提取预设长度的暂存码; 用于生成系统随机数, 并发送 给所述单片机; 用于从所述单片机中读取所述用户操作请求对应的功能码, 对所述功能码、 系统随机数、 暂存码以及单片机的 ID码进行不可逆安全散 列运算, 并比较运算结果与接收到的所述单片机的运算结果是否一致。
5、 如权利要求 4所述的移动终端, 其特征在于, 所述单片机, 还用于 对片内存储的 ID码和单片机的公共密码进行不可逆安全散列运算, 从运算 结果中提取预设长度的初始化码, 并将所述提取到的初始化码烧写到所述 单片机的密码存储区中。
6、 如权利要求 1至 5任一项所述的移动终端, 其特征在于, 所述单片 机的片内可消除程序化只读存储器的容量至少为 2048位。
7、 一种保护移动终端的系统数据的方法, 其特征在于, 该方法包括: 主控模块收到用户对单片机中存储的系统数据进行操作的请求时, 提示用 户输入密码, 并判断用户输入的密码是否正确, 若是, 则执行用户的操作 请求。
8、如权利要求 7所述的保护移动终端的系统数据的方法,其特征在于, 所述判断用户输入的密码是否正确的具体操作是:
所述单片机对存储的初始化码及相关参数进行不可逆安全散列运算, 将运算结杲发送给所述主控模块;
所述主控模块对用户输入的密码及相关参数进行不可逆安全散列运 算, 并比较运算结果与接收到的单片机的运算结果是否一致, 判断用户输 入的密码是否正确。
9、如权利要求 8所述的保护移动终端的系统数据的方法,其特征在于, 该方法进一步包括: 在所述单片机初始化时写入初始化码;
所述单片机的初始化过程为: 对所述单片机内存储的 ID码和移动终端 的公共密码进行不可逆安全散列运算, 从运算结果中提取预设长度的初始 化码 , 并将所述提取到的初始化码烧写到所述单片机的密码存储区中。
10、 如权利要求 8 所述的保护移动终端的系统数据的方法, 其特征在 于, 所述主控模块对用户输入的密码及相关参数进行不可逆安全散列运算 具体为: 所述主控模块根据用户输入的密码和单片机 ID码进行不可逆安全 散列运算, 从运算结果中提取预设长度的暂存码, 再对所述暂存码与相关 参数进行不可逆安全散列运算。
11、 如权利要求 8、 9或 10所述的保护移动终端的系统数据的方法, 其特征在, 所述相关参数包括单片机的 ID码、 系统随机数和用户操作请求 对应的功能码, 所述系统随机数由所述的主控模块生成, 并传给所述单片 机。
12、 如权利要求 9或 10所述的保护移动终端的系统数据的方法, 其特 征在于, 所述初始化码的预设长度与所述暂存码的预设长度数值相同, 其 数值范围为 64~320。
PCT/CN2010/071626 2009-05-12 2010-04-08 一种移动终端及保护其系统数据的方法 WO2010130171A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP10774512.7A EP2429226B1 (en) 2009-05-12 2010-04-08 Mobile terminal and method for protecting its system data
US13/319,891 US8549312B2 (en) 2009-05-12 2010-04-08 Mobile terminal and method for protecting its system data

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200910107309.X 2009-05-12
CN200910107309XA CN101888627B (zh) 2009-05-12 2009-05-12 一种移动终端及保护其系统数据的方法

Publications (1)

Publication Number Publication Date
WO2010130171A1 true WO2010130171A1 (zh) 2010-11-18

Family

ID=43074298

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/071626 WO2010130171A1 (zh) 2009-05-12 2010-04-08 一种移动终端及保护其系统数据的方法

Country Status (4)

Country Link
US (1) US8549312B2 (zh)
EP (1) EP2429226B1 (zh)
CN (1) CN101888627B (zh)
WO (1) WO2010130171A1 (zh)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7162035B1 (en) 2000-05-24 2007-01-09 Tracer Detection Technology Corp. Authentication method and system
US8171567B1 (en) 2002-09-04 2012-05-01 Tracer Detection Technology Corp. Authentication method and system
US7995196B1 (en) 2008-04-23 2011-08-09 Tracer Detection Technology Corp. Authentication method and system
CN102651686A (zh) * 2011-02-23 2012-08-29 上海华虹集成电路有限责任公司 单片机在线可编程的身份认证方法
US9609512B2 (en) * 2014-10-09 2017-03-28 Userstar Information System Co., Ltd. Wireless authentication system and wireless authentication method
US9699594B2 (en) * 2015-02-27 2017-07-04 Plantronics, Inc. Mobile user device and method of communication over a wireless medium
CN108154039A (zh) * 2017-12-22 2018-06-12 中国电子科技集团公司第四十七研究所 单片机内部存储器加密方法

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1378403A (zh) * 2001-03-28 2002-11-06 株式会社东芝 移动通信终端及其设定数据变更方法
JP2003085466A (ja) * 2001-09-06 2003-03-20 Sony Corp 携帯型情報処理装置および情報処理方法、記録媒体、並びにプログラム
CN1758786A (zh) * 2004-10-06 2006-04-12 乐金电子(中国)研究开发中心有限公司 具有复制防止功能的移动通信终端及其控制方法
CN1811813A (zh) * 2006-03-02 2006-08-02 韩林 一种双因子动态密码认证的方法及系统
CN1980420A (zh) * 2005-12-02 2007-06-13 中兴通讯股份有限公司 一种cdma2000终端设备的网络锁定方法
CN101167394A (zh) * 2005-04-25 2008-04-23 软银移动公司 功能锁定方法和移动通信终端
CN101171866A (zh) * 2005-03-08 2008-04-30 软银移动公司 功能锁定信息通知方法和移动通信终端
CN101459516A (zh) * 2009-02-20 2009-06-17 浙江工业大学 一种动态口令安全登录方法

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ES2242957T3 (es) * 1994-03-03 2005-11-16 Boston Scientific Limited Aparato para detectar la separacion de un dispositivo de oclusion vascular.
US7269844B2 (en) * 1999-01-15 2007-09-11 Safenet, Inc. Secure IR communication between a keypad and a token
CN1407446A (zh) * 2001-08-31 2003-04-02 李光 计算机软件的防盗版技术
US6986050B2 (en) * 2001-10-12 2006-01-10 F-Secure Oyj Computer security method and apparatus
US7587608B2 (en) * 2004-11-30 2009-09-08 Sap Ag Method and apparatus for storing data on the application layer in mobile devices
CN100431384C (zh) * 2005-04-12 2008-11-05 中国电信股份有限公司 一种防止phs终端被非法并机的方法
KR100664243B1 (ko) * 2005-10-17 2007-01-04 엘지전자 주식회사 이동통신 단말기의 데이터 관리 장치 및 방법
CN100461063C (zh) * 2005-11-24 2009-02-11 厦门华侨电子股份有限公司 一种采用多用途辅助单片机的系统加密方法
US7694147B2 (en) * 2006-01-03 2010-04-06 International Business Machines Corporation Hashing method and system
US8769637B2 (en) * 2007-03-23 2014-07-01 Sap Ag Iterated password hash systems and methods for preserving password entropy
US7865950B2 (en) * 2007-06-19 2011-01-04 International Business Machines Corporation System of assigning permissions to a user by password
US9674176B2 (en) * 2007-12-26 2017-06-06 Intel Deutschland Gmbh Radio communication device and method for booting a radio communication device
TW200945865A (en) * 2008-04-23 2009-11-01 Mediatek Inc Method for handling the equipment identity requests and communication apparatus utilizing the same

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1378403A (zh) * 2001-03-28 2002-11-06 株式会社东芝 移动通信终端及其设定数据变更方法
JP2003085466A (ja) * 2001-09-06 2003-03-20 Sony Corp 携帯型情報処理装置および情報処理方法、記録媒体、並びにプログラム
CN1758786A (zh) * 2004-10-06 2006-04-12 乐金电子(中国)研究开发中心有限公司 具有复制防止功能的移动通信终端及其控制方法
CN101171866A (zh) * 2005-03-08 2008-04-30 软银移动公司 功能锁定信息通知方法和移动通信终端
CN101167394A (zh) * 2005-04-25 2008-04-23 软银移动公司 功能锁定方法和移动通信终端
CN1980420A (zh) * 2005-12-02 2007-06-13 中兴通讯股份有限公司 一种cdma2000终端设备的网络锁定方法
CN1811813A (zh) * 2006-03-02 2006-08-02 韩林 一种双因子动态密码认证的方法及系统
CN101459516A (zh) * 2009-02-20 2009-06-17 浙江工业大学 一种动态口令安全登录方法

Also Published As

Publication number Publication date
EP2429226B1 (en) 2017-01-04
US8549312B2 (en) 2013-10-01
EP2429226A4 (en) 2014-05-14
US20120060215A1 (en) 2012-03-08
EP2429226A1 (en) 2012-03-14
CN101888627B (zh) 2013-08-21
CN101888627A (zh) 2010-11-17

Similar Documents

Publication Publication Date Title
JP4954228B2 (ja) 安全キーの知識なしのブートローダーの安全更新
US7313705B2 (en) Implementation of a secure computing environment by using a secure bootloader, shadow memory, and protected memory
US8006095B2 (en) Configurable signature for authenticating data or program code
US7010684B2 (en) Method and apparatus for authenticating an open system application to a portable IC device
JP5038487B2 (ja) 電子デバイスにおいてSIMlock情報を保護する方法及び装置
US7139915B2 (en) Method and apparatus for authenticating an open system application to a portable IC device
US6223284B1 (en) Method and apparatus for remote ROM flashing and security management for a computer system
US8826405B2 (en) Trusting an unverified code image in a computing device
TWI436280B (zh) 存取基本輸入輸出系統設定的認證方法
AU2013270195B2 (en) Mobile terminal detection method and mobile terminal
EP1273996A2 (en) Secure bootloader for securing digital devices
EP3480720B1 (en) Method and system for downloading software based on mobile terminal
WO2010130171A1 (zh) 一种移动终端及保护其系统数据的方法
WO2007016395A2 (en) Computing system feature activation mechanism
JP6735872B2 (ja) コンピュータシステム及びコンピュータシステムを初期化する方法
WO2022250836A1 (en) Transfer of ownership of a computing device via a security processor
JP6639620B2 (ja) コード署名の条件付き規定に基づくセキュアクライアント認証
US11068599B2 (en) Secure initialization using embedded controller (EC) root of trust
US9262631B2 (en) Embedded device and control method thereof
US8738924B2 (en) Electronic system and digital right management methods thereof
US20210124818A1 (en) Hardware-based throttling of user access
CN113168477A (zh) 数据处理的方法、装置和系统芯片
CN111357003A (zh) 预操作系统环境中的数据保护
TWI818221B (zh) 可認證晶片外部除錯功能韌體程式與除錯使用者的晶片與方法
WO2011017844A1 (zh) 一种在芯片层实现应用程序安全升级的方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10774512

Country of ref document: EP

Kind code of ref document: A1

REEP Request for entry into the european phase

Ref document number: 2010774512

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2010774512

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 13319891

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE