WO2013155963A1 - 基于emmc芯片的移动终端安全信息存储方法及系统 - Google Patents

基于emmc芯片的移动终端安全信息存储方法及系统 Download PDF

Info

Publication number
WO2013155963A1
WO2013155963A1 PCT/CN2013/074300 CN2013074300W WO2013155963A1 WO 2013155963 A1 WO2013155963 A1 WO 2013155963A1 CN 2013074300 W CN2013074300 W CN 2013074300W WO 2013155963 A1 WO2013155963 A1 WO 2013155963A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
rpmb
key
emmc chip
information storage
Prior art date
Application number
PCT/CN2013/074300
Other languages
English (en)
French (fr)
Inventor
苏宇鑫
黄常科
李斌
Original Assignee
惠州Tcl移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 惠州Tcl移动通信有限公司 filed Critical 惠州Tcl移动通信有限公司
Publication of WO2013155963A1 publication Critical patent/WO2013155963A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot

Definitions

  • the present invention relates to the field of information technology, and in particular, to a method and system for storing security information of a mobile terminal based on an EMMC chip.
  • the EMMC chip refers to the embedded multimedia file storage device, which has gradually become the mainstream solution in the current smart phone market.
  • the EMMC chip is an embedded storage standard specification established by the MMC Association.
  • the EMMC chip 100 consists of 4 physical partitions: USER DATA, BOOT1, BOOT2, RPMB (Replay Protected Memory Block).
  • USER DATA physical partition is a physical partition provided by the manufacturer to store firmware, user data and security files, as shown in Figure 2.
  • BOOT1 and BOOT2 are additional physical partitions provided by the manufacturer. Because of their independent operation interface, it is not conducive to software.
  • RPMB physical partition is a secure area, and special protocols are required to read and write the RPMB information.
  • OTP refers to one-time programmable secure storage interface, such as carrier information in the EMMC chip, IMEI code (international mobile device identity code) and other highly confidential information can not be protected.
  • the physical partition of the RPMB in the EMMC chip of the mobile terminal is a secure area in which the relevant security information file of the mobile terminal, such as the above-mentioned highly confidential information, is stored.
  • a special protocol is required to read and write the physical partition of the RPMB.
  • the conventional method is to set a key for modifying the RPMB information. And the key is integrated in the firmware of the mobile terminal. The key is equivalent to the passport for modifying the RPMB information. Due to the particularity of the physical partition of the RPMB, each EMMC chip can only write the key once, and the key is needed each time the RPMB information is modified. Therefore, the key is particularly important. In the conventional method, the user can modify the RPMB information by obtaining the key in the mobile terminal.
  • the security factor of the method is not high. If other users, such as hackers, crack the mobile terminal code and obtain the key, the RPMB information at this time will be in a modifiable state, that is, the hacker can modify the RPMB information, so the traditional method is not high in security. .
  • an object of the present invention is to provide a method and system for storing security information of a mobile terminal based on an EMMC chip, aiming at solving the problem that the security of the existing EMMC chip is not high.
  • the EMMC chip-based mobile terminal security information storage method comprising the steps of:
  • a key for writing a RPMB physical partition of the mobile terminal EMMC chip is created in advance on the PC side;
  • the mobile terminal When it is required to modify the RPMB information of the mobile terminal EMMC chip, the mobile terminal writes the key into the RPMB physical partition of the EMMC chip, and the mobile terminal modifies the RPMB information according to the user instruction.
  • the mobile terminal security information storage method wherein in the step A, the key is written by the socket tool to the PC end.
  • step B specifically includes:
  • the mobile terminal when the RPMB information of the mobile terminal EMMC chip needs to be modified, the mobile terminal receives an operation instruction of the user, and downloads an upgrade firmware from the PC end and stores it in the RAM of the mobile terminal;
  • the mobile terminal writes the key to the RPMB physical partition of the EMMC chip according to an instruction to upgrade the firmware
  • the mobile terminal performs corresponding modification on the RPMB information according to a user instruction.
  • step B further includes:
  • the mobile terminal After the key is successfully written, the mobile terminal automatically clears the upgrade firmware stored in the RAM.
  • the mobile terminal security information storage method wherein the upgrade firmware includes an operation control code for writing the key to an RPMB physical partition of the EMMC chip.
  • step B1 includes: the upgrade firmware is written by the socket tool to the PC end.
  • a mobile terminal security information storage system based on an EMMC chip comprising:
  • a writing module configured to pre-create a key for writing a RPMB physical partition of the mobile terminal EMMC chip on the PC side;
  • the RPMB information modification module is configured to: when the RPMB information of the mobile terminal EMMC chip needs to be modified, the mobile terminal writes the key into the RPMB physical partition of the EMMC chip, and the mobile terminal modifies the RPMB information according to the user instruction.
  • the mobile terminal security information storage system wherein the RPMB modification module includes:
  • a downloading unit configured to: when the RPMB information of the mobile terminal EMMC chip needs to be modified, the mobile terminal receives an operation instruction of the user, and downloads an upgrade firmware from the PC end and stores the firmware in the RAM of the mobile terminal;
  • a key writing unit configured to: write, by the mobile terminal, the key to the RPMB physical partition of the EMMC chip according to an instruction to upgrade the firmware
  • the RPMB information modification unit is configured to modify, by the mobile terminal, the RPMB information according to a user instruction.
  • the mobile terminal security information storage system wherein the RPMB modification module further includes:
  • the clearing unit is configured to: when the key is successfully written, the mobile terminal automatically clears the upgrade firmware stored in the RAM.
  • the present invention is based on an EMMC chip-based mobile terminal security information storage method and system.
  • EMMC chip-based mobile terminal security information storage method and system By setting a key in the PC, if the user wants to modify the RPMB information, the user needs to download the key in the PC through the mobile terminal, which greatly improves
  • the security of the relevant security information file in the mobile terminal is simple and easy to implement, and has high practicability.
  • FIG. 1 is a structural block diagram of a conventional EMMC chip.
  • FIG. 2 is a structural block diagram of a USER DATA physical partition of a conventional EMMC chip.
  • FIG. 3 is a flowchart of an embodiment of a method for storing security information of a mobile terminal based on an EMMC chip according to the present invention.
  • FIG. 4 is a flow chart of an embodiment of a method in which a mobile terminal downloads a key from a PC and writes it to an RPMB physical partition of an EMMC chip in the method of the present invention.
  • FIG. 5 is a structural block diagram of an embodiment of a mobile terminal security information storage system based on an EMMC chip according to the present invention.
  • FIG. 6 is a structural block diagram of an embodiment of an RPMB information modification module in the system according to the present invention.
  • the present invention provides a mobile terminal security information storage method and system based on an EMMC chip.
  • the present invention will be further described in detail below in order to make the objects, technical solutions and effects of the present invention more clear and clear. It is understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
  • the EMMC chip based mobile terminal security information storage method and system by writing a key on the PC side in advance, when the RPMB information of the mobile terminal EMMC chip needs to be modified, the key needs to be written from the PC end, because it is controlled by the PC.
  • the key in this way, avoids the possibility that other people crack the code of the mobile terminal to acquire the key and modify the RPMB information of the mobile terminal, thereby greatly improving the security of the EMMC chip of the mobile terminal.
  • FIG. 3 is a flowchart of an embodiment of a method for storing security information of a mobile terminal based on an EMMC chip according to the present invention, which includes the following steps:
  • the solution of the present invention is not to set the key in the mobile terminal, but in the PC (personal On the computer side, that is, the key is written in the personal computer.
  • the key needs to be obtained through the PC, thereby preventing other users from maliciously cracking the mobile terminal code and modifying the RPMB information.
  • the key can be written to the PC through the PC-side tool.
  • the PC-side tool can be a PC download tool similar to Thunder, which can be understood as a PC suite, but the function of the PC tool can be used by the developer. Redefining and developing according to requirements; or writing by means of a socket tool that burns EMMC chips during production line production, this step ensures that the key is not solidified into the code of the mobile terminal, so after the mobile terminal is sold,hackers cannot modify RPMB information by cracking the mobile terminal code.
  • the mobile terminal When the RPMB information of the mobile terminal EMMC chip needs to be modified, the mobile terminal writes the key into the RPMB physical partition of the EMMC chip, and the mobile terminal modifies the RPMB information according to the user instruction.
  • the mobile terminal When the user needs to modify the RPMB information by using the mobile terminal, the mobile terminal needs to acquire the key from the PC and write the key to the RPMB physical partition of the EMMC chip, thereby enabling the mobile terminal to obtain authorization, and modifying the RPMB physical.
  • the relevant security information file in the partition that is, the RPMB information.
  • FIG. 4 is a flowchart of an embodiment of a mobile terminal downloading a key from a PC end and writing it to an RPMB physical partition of an EMMC chip according to the present invention, which includes the following steps:
  • the mobile terminal When it is required to modify the RPMB information of the EMMC chip of the mobile terminal, the mobile terminal receives an operation instruction of the user, and downloads an upgrade firmware from the PC end and stores it in the RAM of the mobile terminal.
  • the invention is to upgrade the firmware to write the key into the physical partition of the RPMB through an upgrade firmware, and upgrade the firmware, as the name suggests, refers to hardware with software functions, but as understood now, the upgrade firmware in the present invention refers to the software. .
  • the upgrade firmware is equivalent to a small operating system that contains the operational control code for writing the PC-side key to the RPMB physical partition of the EMMC chip.
  • the upgrade firmware can also be written into the RAM of the mobile terminal through the PC-side tool, and the RAM refers to the random access memory (random Access The memory may be SRAM or DRAM.
  • the upgrade firmware may also be written into the RAM of the mobile terminal by the PC through a tool for performing EMMC chip burning, such as a socket tool, before the production line is produced.
  • the mobile terminal writes the key to the RPMB physical partition of the EMMC chip according to an instruction to upgrade the firmware.
  • the operation control code in the upgrade firmware controls the writing of the previously set key in the PC to the mobile terminal, so that the mobile terminal writes the licensable mobile terminal.
  • a key that modifies RPMB information that is written into the RPMB physical partition in the mobile terminal EMMC chip. After the key is written, the user can modify the RPMB information through the mobile terminal, that is, obtain the permission to modify the content of the physical partition of the RPMB.
  • the mobile terminal performs corresponding modification on the RPMB information according to a user instruction. After the key is successfully written, the user can make the required modifications to the RPMB information.
  • the mobile terminal downloads the upgrade firmware from the PC side to write the key.
  • the hacker may also easily obtain the key by cracking the mobile terminal code. Therefore, in order to ensure the security of the related security information file of the RPMB physical partition in the EMMC chip in the mobile terminal, the upgrade firmware in the RAM needs to be deleted. Specifically, the upgrade firmware temporarily stored in the RAM can be cleared by restarting the mobile terminal.
  • the mobile terminal in the present invention may be a portable mobile communication device such as a mobile phone or a PDA.
  • the EMMC chip in the present invention is compatible with the JEDEC-4.4 standard or higher.
  • FIG. 5 is a structural block diagram of a preferred embodiment of the mobile terminal security information storage system, which includes:
  • the writing module 21 is configured to create a key for writing a RPMB physical partition of the mobile terminal EMMC chip in advance on the PC side; the functional principle of the writing module has been described in detail above.
  • the RPMB information modification module 22 is configured to: when the RPMB information of the mobile terminal EMMC chip needs to be modified, the mobile terminal writes the key into the RPMB physical partition of the EMMC chip, and the mobile terminal modifies the RPMB information according to the user instruction.
  • the RPMB information modification module 22 specifically includes:
  • the downloading unit 221 is configured to: when the RPMB information of the mobile terminal EMMC chip needs to be modified, the mobile terminal receives an operation instruction of the user, and downloads an upgrade firmware from the PC end and stores the upgrade firmware in the RAM of the mobile terminal;
  • the key writing unit 222 is configured to: write, by the mobile terminal, the key to the RPMB physical partition of the EMMC chip according to the instruction of upgrading the firmware;
  • the RPMB information modification unit 223 is configured to modify, by the mobile terminal, the RPMB information according to a user instruction.
  • the RPMB information modification module 22 further includes:
  • the clearing unit 224 is configured to: after the key is successfully written, the mobile terminal automatically clears the upgrade firmware stored in the RAM.
  • the EMMC chip-based mobile terminal security information storage method and system by setting a key in the PC, if the user wants to modify the RPMB information, the user needs to download the key in the PC through the mobile terminal, and store the key to the RPMB.
  • the security of the related security information file in the mobile terminal is greatly improved, and the present invention is simple and practical, and has high practicability.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Telephone Function (AREA)

Abstract

本发明公开基于EMMC芯片的移动终端安全信息存储方法及系统。本发明通过在PC端中设置key,如果用户想要修改RPMB信息,需要通过移动终端下载该PC端中的key,这样极大提高了移动终端中的相关安全信息文件的安全性,本发明简单易行,并且实用性高。

Description

基于EMMC芯片的移动终端安全信息存储方法及系统
技术领域
本发明涉及信息技术领域,尤其涉及一种基于EMMC芯片的移动终端安全信息存储方法及系统。
背景技术
随着手机、PDA等移动终端行业的快速发展,市场上充斥了大量不同规格的flash存储芯片,而这些存储芯片因为没有一个固定的标准,这就导致了项目开发过程中,如果想要更换flash 存储芯片,硬件就必须重新设计布线(layout),因此给项目带来了开发成本及开发效率等多方面的浪费。
EMMC(Embedded MultiMediaCard)芯片的诞生弥补了这个缺陷,EMMC芯片是指嵌入式多媒体文件存储设备,其逐渐成为了目前智能机市场上的主流方案。EMMC芯片为MMC协会所订立的内嵌式存储标准规格,如图1所示,EMMC芯片100由4个块物理分区组成:USER DATA、BOOT1、BOOT2、RPMB(Replay Protected Memory Block)。其中,USER DATA物理分区是厂商提供的一个物理分区,用于存储固件、用户数据及安全文件等信息,如图2所示;BOOT1、BOOT2是厂商提供的额外物理分区,因其操作接口独立,不利于软件兼容,目前没有使用;RPMB物理分区是一个安全区域,读写该RPMB信息需要特殊的协议。EMMC芯片虽解决了前述存储芯片无固定标准的问题,但随之出现的新问题是,EMMC芯片并未像传统的NAND flash一样提供标准的OTP(OTP指一次性可编程)安全存储接口,那么比如EMMC芯片中的运营商信息、IMEI码(国际移动设备身份码)等高度机密信息无法得到保护。
移动终端EMMC芯片中RPMB物理分区是存储有移动终端如上述高度机密信息的相关安全信息文件的安全区域,读写该RPMB物理分区需要特殊的协议,传统的方法是设置一个修改RPMB信息的key,并将该key集成在移动终端固件内,该key相当于修改RPMB信息的通行证,因RPMB物理分区的特殊性,每款EMMC芯片只能写一次key,每次修改该RPMB信息都需要该key,因而该key显得尤为重要,传统的方法中,用户通过在移动终端中获取该key才能对RPMB信息进行修改。但该方法安全系数不高,如果其他用户例如黑客破解移动终端代码并获取该key,此时的RPMB信息将处于可修改状态,即黑客可对RPMB信息进行修改,因此传统的方法安全性不高。
因此,现有技术还有待于改进和发展。
发明内容
鉴于上述现有技术的不足,本发明的目的在于提供基于EMMC芯片的移动终端安全信息存储方法及系统,旨在解决现有EMMC芯片安全性不高的问题。
本发明的技术方案如下:
基于EMMC芯片的移动终端安全信息存储方法,其中,包括步骤:
A、预先在PC端创建用于对移动终端EMMC芯片的RPMB物理分区进行写入操作的key;
B、当需要修改移动终端EMMC芯片的RPMB信息时,移动终端将所述key写入其EMMC芯片的RPMB物理分区,移动终端根据用户指令对所述RPMB信息进行修改。
所述的移动终端安全信息存储方法,其中,所述步骤A中,所述key由socket工具写入PC端。
所述的移动终端安全信息存储方法,其中,所述步骤B具体包括:
B1、当需要修改移动终端EMMC芯片的RPMB信息时,移动终端接收用户的操作指令从PC端下载一升级固件并存储至移动终端的RAM中;
B2、移动终端根据升级固件的指令将所述key写入EMMC芯片的RPMB物理分区;
B3、移动终端根据用户指令对所述RPMB信息进行相应修改。
所述的移动终端安全信息存储方法,其中,所述步骤B还包括:
B4、当所述key写入成功后,移动终端自动将存储在RAM中的升级固件清除。
所述的移动终端安全信息存储方法,其中,所述升级固件内含有将所述key写入EMMC芯片的RPMB物理分区的操作控制代码。
所述的移动终端安全信息存储方法,其中,所述步骤B1之前包括:所述升级固件由socket工具写入PC端。
基于EMMC芯片的移动终端安全信息存储系统,其中,包括:
写入模块,用于预先在PC端创建用于对移动终端EMMC芯片的RPMB物理分区进行写入操作的key;
RPMB信息修改模块,用于当需要修改移动终端EMMC芯片的RPMB信息时,移动终端将所述key写入其EMMC芯片的RPMB物理分区,移动终端根据用户指令对所述RPMB信息进行修改。
所述的移动终端安全信息存储系统,其中,所述RPMB修改模块包括:
下载单元,用于当需要修改移动终端EMMC芯片的RPMB信息时,移动终端接收用户的操作指令从PC端下载一升级固件并存储至移动终端的RAM中;
key写入单元,用于移动终端根据升级固件的指令将所述key写入EMMC芯片的RPMB物理分区;
RPMB信息修改单元,用于移动终端根据用户指令对所述RPMB信息进行相应修改。
所述的移动终端安全信息存储系统,其中,所述RPMB修改模块还包括:
清除单元,用于当所述key写入成功后,移动终端自动将存储在RAM中的升级固件清除。
有益效果:本发明基于EMMC芯片的移动终端安全信息存储方法及系统,通过在PC端中设置key,如果用户想要修改RPMB信息,需要通过移动终端下载该PC端中的key,这样极大提高了移动终端中的相关安全信息文件的安全性,本发明简单易行,并且实用性高。
附图说明
图1为现有EMMC芯片的结构框图。
图2为现有EMMC芯片的USER DATA物理分区的结构框图。
图3为本发明基于EMMC芯片的移动终端安全信息存储方法实施例的流程图。
图4为本发明所述方法中移动终端从PC端下载key并将其写入EMMC芯片的RPMB物理分区的实施例流程图。
图5为本发明基于EMMC芯片的移动终端安全信息存储系统实施例的结构框图。
图6为本发明所述系统中RPMB信息修改模块实施例的结构框图。
具体实施方式
本发明提供基于EMMC芯片的移动终端安全信息存储方法及系统,为使本发明的目的、技术方案及效果更加清楚、明确,以下对本发明进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
本发明基于EMMC芯片的移动终端安全信息存储方法及系统,通过预先在PC端写入key,当需要修改移动终端EMMC芯片的RPMB信息时,需要从PC端写入该key,因为是由PC控制该key,这样避免了其他人破解移动终端的代码来获取该key并修改移动终端RPMB信息的可能性,大大提高了移动终端EMMC芯片的安全性。
如图3所示,图3为本发明基于EMMC芯片的移动终端安全信息存储方法的一个实施例流程图,其包括步骤:
S101、预先在PC端创建用于对移动终端EMMC芯片的RPMB物理分区进行写入操作的key;
因黑客容易破解移动终端代码并获取RPMB物理分区的key,所以本发明的方案是不在移动终端中设置该key,而是在PC(personal computer)端,即个人电脑端中写入该key,当用户需要修改RPMB信息时,需要通过PC端获取该key,从而防止其他用户恶意破解移动终端代码并修改RPMB信息。
在具体的写入过程中,可以通过PC端工具将该key写入PC端,该PC端工具可以是类似于迅雷这样的PC下载工具,可理解为PC套件,只是PC工具的功能可由开发人员根据需求重新定义和开发;或者在产线生产时通过烧录EMMC芯片的socket工具方式写入,此步骤确保了该key没有被固化到移动终端的代码中,如此,在移动终端被销售后,黑客就不能通过破解移动终端代码来修改RPMB信息。
S102、当需要修改移动终端EMMC芯片的RPMB信息时,移动终端将所述key写入其EMMC芯片的RPMB物理分区,移动终端根据用户指令对所述RPMB信息进行修改。
当用户需要通过移动终端修改所述RPMB信息时,移动终端需要获取从PC端获取该key,并将该key写入EMMC芯片的RPMB物理分区,从而使移动终端获得授权,并可修改该RPMB物理分区中的相关安全信息文件,即RPMB信息。
如图4所示,图4为本发明中移动终端从PC端下载key并将其写入EMMC芯片的RPMB物理分区的实施例流程图,其包括步骤:
S201、当需要修改移动终端EMMC芯片的RPMB信息时,移动终端接收用户的操作指令从PC端下载一升级固件并存储至移动终端的RAM中;
本发明是通过一升级固件来主导控制将key写入RPMB物理分区的,升级固件,顾名思义,指的是具有软件功能的硬件,但按现在的理解,本发明中的升级固件已经是指软件了。该升级固件相当于一个小型的操作系统,该升级固件包含了将PC端的key写入EMMC芯片的RPMB物理分区的操作控制代码。该升级固件也可通过PC端工具写入移动终端的RAM中,RAM指的是随机存储器(random access memory),具体可以是SRAM或DRAM,该升级固件也可在产线生产贴片之前,通过进行EMMC芯片烧录的工具例如socket工具由PC端写入移动终端的RAM中。
S202、移动终端根据升级固件的指令将所述key写入EMMC芯片的RPMB物理分区。
当移动终端将PC端中的升级固件下载成功后,该升级固件内的操作控制代码会控制将PC端中事先设置好的key写入移动终端中,从而使移动终端中写入可授权移动终端对RPMB信息进行修改的key,该key是写入至移动终端EMMC芯片中的RPMB物理分区内。在该key写入完成后,用户可通过移动终端进行对其RPMB信息进行修改的操作,即获得修改RPMB物理分区的内容的权限。
S203、移动终端根据用户指令对所述RPMB信息进行相应修改。在key写入成功后,用户即可对RPMB信息进行所需的修改。
在上述步骤中,还包括:
S204、当所述key写入成功后,移动终端自动将存储在RAM中的升级固件清除。
上述过程中,移动终端从PC端中下载了升级固件以便写入key。但在写入完成后,如果该升级固件继续保存在RAM中,黑客还可能较容易的通过破解移动终端代码来获取该key。所以,为了保证移动终端中EMMC芯片中RPMB物理分区的相关安全信息文件的安全性,需要将该RAM中的升级固件删除。具体可通过重新启动移动终端来清空RAM中临时存储的升级固件。
而因为读取RPMB信息并不需要key,所以当用户需要通过移动终端读取RPMB物理分区中的相关安全信息文件时,可直接从RPMB物理分区读取,并按功能(比如按用户数据文件或者安全文件)使用,而且不用担心RPMB信息被修改破坏,这样,确保了用户移动终端中的安全文件不会被轻易修改。另外,本发明中的移动终端可以是手机、PDA等便携式移动通信设备。
由于本发明中的技术是基于RPMB物理分区获得的,所以本发明中的EMMC芯片兼容JEDEC-4.4标准以上。
本发明还提供了一种基于EMMC的移动终端安全信息存储系统,图5为该移动终端安全信息存储系统的一个较佳实施例的结构框图,其包括:
写入模块21,用于预先在PC端创建用于对移动终端EMMC芯片的RPMB物理分区进行写入操作的key;关于写入模块的功能原理前面已有详述。
RPMB信息修改模块22,用于当需要修改移动终端EMMC芯片的RPMB信息时,移动终端将所述key写入其EMMC芯片的RPMB物理分区,移动终端根据用户指令对所述RPMB信息进行修改。
较佳地,如图6所示,该RPMB信息修改模块22具体包括:
下载单元221,用于当需要修改移动终端EMMC芯片的RPMB信息时,移动终端接收用户的操作指令从PC端下载一升级固件并存储至移动终端的RAM中;
key写入单元222,用于移动终端根据升级固件的指令将所述key写入EMMC芯片的RPMB物理分区;
RPMB信息修改单元223,用于移动终端根据用户指令对所述RPMB信息进行相应修改。
较佳地,该RPMB信息修改模块22还包括:
清除单元224,用于当所述key写入成功后,移动终端自动将存储在RAM中的升级固件清除。
关于上述功能模块及单元的作用原理前面都有详述,故不再赘述。
本发明基于EMMC芯片的移动终端安全信息存储方法及系统,通过在PC端中设置key,如果用户想要修改RPMB信息,需要通过移动终端下载该PC端中的key,并将该key存储至RPMB物理分区中,这样极大提高了移动终端中的相关安全信息文件的安全性,本发明简单易行,并且实用性高。
应当理解的是,本发明的应用不限于上述的举例,对本领域普通技术人员来说,可以根据上述说明加以改进或变换,所有这些改进和变换都应属于本发明所附权利要求的保护范围。

Claims (18)

  1. 基于EMMC芯片的移动终端安全信息存储方法,其特征在于,包括步骤:
    A、预先在PC端创建用于对移动终端EMMC芯片的RPMB物理分区进行写入操作的key;
    B、当需要修改移动终端EMMC芯片的RPMB信息时,移动终端将所述key写入其EMMC芯片的RPMB物理分区,移动终端根据用户指令对所述RPMB信息进行修改。
  2. 根据权利要求1所述的移动终端安全信息存储方法,其特征在于,所述步骤A中,所述key由socket工具写入PC端。
  3. 根据权利要求1所述的移动终端安全信息存储方法,其特征在于,所述步骤B具体包括:
    B1、当需要修改移动终端EMMC芯片的RPMB信息时,移动终端接收用户的操作指令从PC端下载一升级固件并存储至移动终端的RAM中;
    B2、移动终端根据升级固件的指令将所述key写入EMMC芯片的RPMB物理分区;
    B3、移动终端根据用户指令对所述RPMB信息进行相应修改。
  4. 根据权利要求3所述的移动终端安全信息存储方法,其特征在于,所述步骤B还包括:
    B4、当所述key写入成功后,移动终端自动将存储在RAM中的升级固件清除。
  5. 根据权利要求3所述的移动终端安全信息存储方法,其特征在于,所述升级固件内含有将所述key写入EMMC芯片的RPMB物理分区的操作控制代码。
  6. 根据权利要求3所述的移动终端安全信息存储方法,其特征在于,所述步骤B1之前包括:所述升级固件由socket工具写入PC端。
  7. 基于EMMC芯片的移动终端安全信息存储方法,其特征在于,包括步骤:
    A、预先在PC端创建用于对移动终端EMMC芯片的RPMB物理分区进行写入操作的key;
    B1、当需要修改移动终端EMMC芯片的RPMB信息时,移动终端接收用户的操作指令从PC端下载一升级固件并存储至移动终端的RAM中;
    B2、移动终端根据升级固件的指令将所述key写入EMMC芯片的RPMB物理分区;
    B3、移动终端根据用户指令对所述RPMB信息进行相应修改;
    B4、当所述key写入成功后,移动终端自动将存储在RAM中的升级固件清除。
  8. 根据权利要求7所述基于EMMC芯片的移动终端安全信息存储方法,其特征在于,包括步骤,所述步骤A还包括:通过烧录EMMC芯片的socket工具方式将该key写入PC端,确保了该key没有被固化到移动终端的代码中。
  9. 根据权利要求7所述基于EMMC芯片的移动终端安全信息存储方法,其特征在于,包括步骤,所述步骤B1还包括:该升级固件可在产线生产贴片之前,通过进行EMMC芯片烧录的工具socket工具由PC端写入移动终端的RAM中。
  10. 根据权利要求7所述基于EMMC芯片的移动终端安全信息存储方法,其特征在于,包括步骤,所述步骤B4还包括:通过重新启动移动终端来清空RAM中临时存储的升级固件.
  11. 基于EMMC芯片的移动终端安全信息存储方法,其特征在于,包括步骤:
    A、预先在PC端创建用于对移动终端EMMC芯片的RPMB物理分区进行写入操作的key;
    B、当需要修改移动终端EMMC芯片的RPMB信息时,移动终端将所述key写入其EMMC芯片的RPMB物理分区,移动终端根据用户指令对所述RPMB信息进行修改;
    所述步骤B具体包括:
    B1、当需要修改移动终端EMMC芯片的RPMB信息时,移动终端接收用户的操作指令从PC端下载一升级固件并存储至移动终端的RAM中;
    B2、移动终端根据升级固件的指令将所述key写入EMMC芯片的RPMB物理分区;
    B3、移动终端根据用户指令对所述RPMB信息进行相应修改;
    所述key由socket工具写入PC端。
  12. 根据权利要求11所述的移动终端安全信息存储方法,其特征在于,所述步骤B还包括:
    B4、当所述key写入成功后,移动终端自动将存储在RAM中的升级固件清除。
  13. 根据权利要求11所述的移动终端安全信息存储方法,其特征在于,所述步骤B1之前包括:所述升级固件由socket工具写入PC端。
  14. 根据权利要求12所述的移动终端安全信息存储方法,其特征在于,
    所述升级固件内含有将所述key写入EMMC芯片的RPMB物理分区的操作控制代码。
  15. 基于EMMC芯片的移动终端安全信息存储系统,其特征在于,包括:
    写入模块,用于预先在PC端创建用于对移动终端EMMC芯片的RPMB物理分区进行写入操作的key;
    RPMB信息修改模块,用于当需要修改移动终端EMMC芯片的RPMB信息时,移动终端将所述key写入其EMMC芯片的RPMB物理分区,移动终端根据用户指令对所述RPMB信息进行修改。
  16. 根据权利要求15所述的移动终端安全信息存储系统,其特征在于,所述RPMB修改模块包括:
    下载单元,用于当需要修改移动终端EMMC芯片的RPMB信息时,移动终端接收用户的操作指令从PC端下载一升级固件并存储至移动终端的RAM中;
    key写入单元,用于移动终端根据升级固件的指令将所述key写入EMMC芯片的RPMB物理分区;
    RPMB信息修改单元,用于移动终端根据用户指令对所述RPMB信息进行相应修改。
  17. 根据权利要求15所述的移动终端安全信息存储系统,其特征在于,所述RPMB修改模块还包括:
    清除单元,用于当所述key写入成功后,移动终端自动将存储在RAM中的升级固件清除。
  18. 根据权利要求16所述的移动终端安全信息存储系统,其特征在于,所述RPMB修改模块还包括:
    清除单元,用于当所述key写入成功后,移动终端自动将存储在RAM中的升级固件清除。
PCT/CN2013/074300 2012-04-17 2013-04-17 基于emmc芯片的移动终端安全信息存储方法及系统 WO2013155963A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210112204.5A CN102663471B (zh) 2012-04-17 2012-04-17 基于emmc芯片的移动终端安全信息存储方法及系统
CN201210112204.5 2012-04-17

Publications (1)

Publication Number Publication Date
WO2013155963A1 true WO2013155963A1 (zh) 2013-10-24

Family

ID=46772954

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/074300 WO2013155963A1 (zh) 2012-04-17 2013-04-17 基于emmc芯片的移动终端安全信息存储方法及系统

Country Status (2)

Country Link
CN (1) CN102663471B (zh)
WO (1) WO2013155963A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110096908A (zh) * 2018-01-31 2019-08-06 爱思开海力士有限公司 存储装置及存储装置的操作方法
CN112328561A (zh) * 2020-11-26 2021-02-05 广东小天才科技有限公司 一种日志传递方法、系统、电子设备和存储介质

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102663471B (zh) * 2012-04-17 2015-09-23 惠州Tcl移动通信有限公司 基于emmc芯片的移动终端安全信息存储方法及系统
KR101919903B1 (ko) * 2012-09-14 2018-11-19 삼성전자 주식회사 임베디드 멀티미디어 카드, 이를 제어하는 호스트, 및 이들의 동작 방법
CN105868651A (zh) * 2015-01-19 2016-08-17 中兴通讯股份有限公司 工作模式配置方法及装置
CN106384042B (zh) * 2016-09-13 2019-06-04 北京豆荚科技有限公司 一种电子设备以及安全系统
CN107871090B (zh) * 2017-09-28 2020-11-27 泾县谷声信息科技有限公司 一种终端生产方法、终端及计算机可读存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110302358A1 (en) * 2007-02-22 2011-12-08 Super Talent Technology Corp. Flash-Memory Device with RAID-type Controller
CN102411480A (zh) * 2010-05-11 2012-04-11 马维尔国际贸易有限公司 具有嵌入有控制模块的固态存储器的混合存储系统
CN102419807A (zh) * 2010-09-27 2012-04-18 擎泰科技股份有限公司 固态非挥发性内存装置的安全抹除系统
CN102663471A (zh) * 2012-04-17 2012-09-12 惠州Tcl移动通信有限公司 基于emmc芯片的移动终端安全信息存储方法及系统

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4965512B2 (ja) * 2008-06-02 2012-07-04 株式会社バッファロー 認証システム、情報処理装置、記憶装置、認証方法及びそのプログラム

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110302358A1 (en) * 2007-02-22 2011-12-08 Super Talent Technology Corp. Flash-Memory Device with RAID-type Controller
CN102411480A (zh) * 2010-05-11 2012-04-11 马维尔国际贸易有限公司 具有嵌入有控制模块的固态存储器的混合存储系统
CN102419807A (zh) * 2010-09-27 2012-04-18 擎泰科技股份有限公司 固态非挥发性内存装置的安全抹除系统
CN102663471A (zh) * 2012-04-17 2012-09-12 惠州Tcl移动通信有限公司 基于emmc芯片的移动终端安全信息存储方法及系统

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110096908A (zh) * 2018-01-31 2019-08-06 爱思开海力士有限公司 存储装置及存储装置的操作方法
US11580033B2 (en) 2018-01-31 2023-02-14 SK Hynix Inc. Storage device and method of operating the same
US11914526B2 (en) 2018-01-31 2024-02-27 SK Hynix Inc. Memory controller for RPMB-inclusive memory device, operating method thereof and electronic device including the same
CN110096908B (zh) * 2018-01-31 2024-06-11 爱思开海力士有限公司 存储装置及存储装置的操作方法
CN112328561A (zh) * 2020-11-26 2021-02-05 广东小天才科技有限公司 一种日志传递方法、系统、电子设备和存储介质

Also Published As

Publication number Publication date
CN102663471B (zh) 2015-09-23
CN102663471A (zh) 2012-09-12

Similar Documents

Publication Publication Date Title
WO2013155963A1 (zh) 基于emmc芯片的移动终端安全信息存储方法及系统
TWI667590B (zh) 資料儲存裝置以及韌體加密及更新方法
JP3724577B2 (ja) 情報処理装置、情報処理装置用制御方法、及び情報処理装置用制御プログラム
EP2488987B1 (en) Secure storage of temporary secrets
KR101705550B1 (ko) 보안 저장 영역에 대한 응용 프로그램의 접근 제어 방법 및 장치
JP4994903B2 (ja) 暗号鍵復旧方法、情報処理装置及び暗号鍵復旧プログラム
WO2015176531A1 (zh) 终端数据写入、读取的方法及装置
JP2012128536A (ja) データ保護処理プログラム
US10848305B2 (en) Key generation information trees
TW201826159A (zh) 資料處理的方法與裝置
WO2013155800A1 (zh) 一种移动终端信息安全管理的方法、装置和移动终端
WO2020111517A1 (en) Server and method for identifying integrity of application
JP2009181460A (ja) シンクライアントシステム
JP2006139489A (ja) 共同利用パソコンシステムの環境復元方法および共同利用パソコン
CN104915266A (zh) 一种应用程序保护方法及装置
CN104346299A (zh) 一种移动终端更新的控制方法和装置
CN103853988A (zh) 半导体器件及访问限制方法
JP2016103217A (ja) 情報処理端末および情報処理端末の制御プログラム
CN112131537B (zh) 一种对zynq芯片程序镜像文件的加解密的方法
WO2021233351A1 (zh) 数据转移方法及装置、终端和计算机可读存储介质
CN110781527B (zh) 一种控制寄存器保护方法与装置
JP6949338B2 (ja) 電子データ管理装置、電子データ管理システム、そのためのプログラム及び記録媒体
EP2731007A1 (en) Information processing device, information processing method, and computer program
TWI741271B (zh) 資料保護方法以及相關儲存裝置
JP2014022944A (ja) 情報処理装置およびその起動方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13779085

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13779085

Country of ref document: EP

Kind code of ref document: A1