WO2016115808A1 - 工作模式配置方法及装置 - Google Patents

工作模式配置方法及装置 Download PDF

Info

Publication number
WO2016115808A1
WO2016115808A1 PCT/CN2015/081009 CN2015081009W WO2016115808A1 WO 2016115808 A1 WO2016115808 A1 WO 2016115808A1 CN 2015081009 W CN2015081009 W CN 2015081009W WO 2016115808 A1 WO2016115808 A1 WO 2016115808A1
Authority
WO
WIPO (PCT)
Prior art keywords
working mode
terminal
storage area
specified
secure storage
Prior art date
Application number
PCT/CN2015/081009
Other languages
English (en)
French (fr)
Inventor
蒋长东
黄颖
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016115808A1 publication Critical patent/WO2016115808A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Definitions

  • the present invention relates to the field of communications, and in particular, to a working mode configuration method and apparatus.
  • Terminals for example, mobile phones
  • the phone usually has multiple modes of operation, such as normal mode, lock mode, flight mode, and car mode.
  • the wireless communication module of the mobile phone the Wireless Fidelity (WiFi) module, the Bluetooth module, the screen protection module, the navigation module, and other modules included in the mobile phone may be in different states.
  • the mode identification information is stored in the regular data area, and the software switches between the modes according to the user's settings. There are two problems with this situation. First, after the factory settings are restored, the data area is erased and the mode information is cleared and will be restored to the factory default state.
  • the conventional data area is less secure due to no special protection. Even with encryption, an attacker can tamper with a binary copy of the pattern data. If the mobile phone is attacked or tampered with by malware, it is easy for the mobile phone to exit from the state set by the user and return to the normal mode, causing inconvenience to the user, loss of information, or even causing a vicious accident. Exiting from airplane mode to normal mode will cause possible interference to other devices; exiting from car mode will affect the user's navigation usage; exiting from lock mode will affect the leakage or loss of user privacy information.
  • the embodiment of the invention provides a working mode configuration method and device, so as to at least solve the problem that the working mode of the terminal in the related art is vulnerable to attack and easy to be tampered with.
  • a working mode configuration method including: obtaining a specified working mode from a secure storage area of a terminal, where the secure storage area is data that needs to be read and written by a specified algorithm. And configuring an operating mode of the terminal to the specified working mode.
  • the method before acquiring the specified working mode from the secure storage area of the terminal, includes: acquiring the current working mode of the terminal; acquiring the specified working mode in which the terminal should be located; performing the current working mode and the designated working The specified operating mode is stored to the secure storage area if the modes are different.
  • acquiring the specified working mode that the terminal should be located includes: determining, according to information of at least one of the following, the specified working mode corresponding to the information: a network instruction, a current status of the specified application in the terminal or the terminal Operating status, user's operating instructions.
  • the method includes: restarting the terminal.
  • the secure storage area is a secure storage area based on the loopback protection partition RPMB technology.
  • an apparatus for configuring a working mode including: a first acquiring module, configured to obtain a specified working mode from a secure storage area of the terminal, where the secure storage area is required to pass The data area of the specified algorithm completes the read/write control; the configuration module is configured to configure the working mode of the terminal to the specified working mode.
  • the device further includes: a second obtaining module, configured to acquire a current working mode of the terminal; and a third acquiring module, configured to acquire the specified working mode in which the terminal should be located; and a storage module, configured to And in the case that the current working mode is different from the specified working mode, storing the specified working mode to the secure storage area.
  • the third obtaining module is further configured to determine, according to the information of at least one of the following, the specified working mode corresponding to the information: a network instruction, a current running state of the specified application in the terminal or the terminal, and an operation of the user. instruction.
  • the apparatus further includes: a startup module configured to restart the terminal.
  • the secure storage area is a secure storage area based on the loopback protection partition RPMB technology.
  • the specified working mode is obtained from the secure storage area of the terminal, wherein the secure storage area is a data area that needs to complete read and write control by using a specified algorithm; and the working mode of the terminal is configured to the specified working mode. Therefore, the problem that the working mode of the terminal in the related art is vulnerable to attack and easy to be tampered with is solved, thereby effectively improving the security problem in the configuration process of the terminal working mode.
  • FIG. 1 is a flow chart of a working mode configuration method according to an embodiment of the present invention.
  • FIG. 2 is a block diagram showing the structure of an operation mode configuration apparatus according to an embodiment of the present invention.
  • FIG. 3 is a structural block diagram (1) of an operation mode configuration apparatus according to an embodiment of the present invention.
  • FIG. 4 is a structural block diagram (2) of an operation mode configuration apparatus according to an embodiment of the present invention.
  • FIG. 5 is a flowchart of pattern recognition and configuration after a mobile phone is powered on according to an embodiment of the present invention
  • FIG. 6 is a flowchart of pattern recognition and configuration when a mobile phone is started according to an embodiment of the present invention.
  • FIG. 1 is a flowchart of a working mode configuration method according to an embodiment of the present invention. As shown in FIG. 1, the process includes the following steps:
  • Step S102 Obtain a specified working mode from a secure storage area of the terminal, where the secure storage area is a data area that needs to complete read and write control by using a specified algorithm;
  • Step S104 configuring the working mode of the terminal to the designated working mode.
  • the specified working mode that the terminal needs to be configured is stored in the secure storage area of the terminal.
  • the terminal working mode identification information is stored in the regular data area, which may easily cause the working mode to be incorrectly switched.
  • the specified working mode Before the specified working mode is obtained from the secure storage area of the terminal, the specified working mode needs to be stored in the secure storage area.
  • the current working mode of the terminal is obtained, and the acquiring terminal should acquire When the specified working mode is set, the specified working mode is stored to the secure storage area if the current working mode is different from the specified working mode. This ensures the security of the specified working mode stored in the secure storage area.
  • the specified working mode in which the terminal should be located may be obtained in a plurality of manners.
  • the designation corresponding to the foregoing information may be determined according to the network instruction, the current running state of the specified application in the terminal or the terminal, and the operation instruction of the user.
  • the terminal is restarted before the specified mode of operation is obtained from the secure storage area of the terminal.
  • the secure storage area is a secure storage area based on a Replay Protect Memory Block (RPMB) technology.
  • RPMB Replay Protect Memory Block
  • a working mode configuration device is also provided, which is configured to implement the above-mentioned embodiments and preferred embodiments, and has not been described again.
  • the term "module” may implement a combination of software and/or hardware of a predetermined function.
  • the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
  • the apparatus includes: a first acquisition module 22 configured to acquire a specified working mode from a secure storage area of the terminal, wherein, The storage area is a data area that needs to complete read and write control by a specified algorithm; the configuration module 24 is configured to configure the working mode of the terminal to a specified working mode.
  • FIG. 3 is a structural block diagram (1) of an operation mode configuration apparatus according to an embodiment of the present invention.
  • the apparatus further includes: a second acquisition module 32 configured to acquire a current working mode of the terminal; and a third obtaining module 34. And setting to obtain the specified working mode in which the terminal should be located; the storage module 36 is configured to store the specified working mode to the secure storage area if the current working mode is different from the specified working mode.
  • the third obtaining module 34 is further configured to determine the specified working mode corresponding to the information according to the information of at least one of: a network instruction, a current running state of the specified application in the terminal or the terminal, and an operation instruction of the user.
  • FIG. 4 is a structural block diagram (2) of an operation mode configuration apparatus according to an embodiment of the present invention. As shown in FIG. 4, the apparatus further includes: a startup module 42 configured to restart the terminal.
  • the secure storage area is a secure storage area based on the loopback protected partition RPMB technology.
  • each of the above modules may be implemented by software or hardware.
  • the foregoing may be implemented by, but not limited to, the foregoing modules are all located in the same processor; or, the above modules are respectively located.
  • the first processor, the second processor, and the third processor In the first processor, the second processor, and the third processor.
  • the optional embodiment solves the problem that the current mobile phone mode is vulnerable to attack and tampering, and provides a reliable mobile phone mode implementation method.
  • RPMB Secure storage area based on RPMB technology.
  • RPMB is a special partition defined by the Embedded Multi Media Card (abbreviated as eMMC) specification. It can prevent unauthorized users from tampering with partition information by using key authentication and counter reading and writing control.
  • eMMC Embedded Multi Media Card
  • Pattern recognition module monitors the state of the mobile phone by receiving network commands, or identifies the mode in which the mobile phone should currently be located according to the user's operation. If the current mode of the mobile phone is inconsistent with the mode that the mode recognition module determines that the mode should be located, the mode in which the mobile phone should be stored is stored in the secure storage area, and the mode configuration module is notified to configure the current mode of the mobile phone as the mode in which the mobile phone should be located.
  • the mode configuration module sets the wireless communication module, the navigation module, the screen protection module, and other modules included in the mobile phone, and configures the mobile phone to be in the mode in which it should be located.
  • the mobile phone determines the mode in which the current mobile phone should be located through the mode recognition module.
  • the pattern recognition module When the mobile phone is cold-started, the pattern recognition module first reads the mode parameters in the secure storage area, identifies the mode in which the mobile phone should be located, and enters the correct mode through the mode configuration module.
  • the pattern recognition module first reads the mode parameter in the secure storage area, identifies the mode in which the mobile phone should be located, and enters the correct mode through the mode configuration module.
  • FIG. 5 is a flowchart of pattern recognition and configuration after the mobile phone is booted according to an embodiment of the present invention. As shown in FIG. 5, the workflow is as follows:
  • step S502 the mobile phone is in a power-on state and operates in a specific working mode.
  • the mobile phone receives an instruction from the network, or according to the user's operation, or according to the operation of the application, the judgment is triggered, and the mobile phone should be in a certain mode.
  • Step S504 if the current mode of the mobile phone is inconsistent with the mode that the mode recognition module determines that the mode should be located, the parameter of the mode in which the mobile phone should be stored is stored in the secure storage area.
  • Step S506 the secure storage area feeds back the storage to the pattern recognition module.
  • Step S508 the pattern recognition module notifies the mode configuration module to perform mode configuration.
  • Step S510 the mode configuration module sets a module included in the mobile phone, such as a wireless communication module, a navigation module, a screen protection module, and the like, and configures the mobile phone to be in a mode in which the mobile phone should be located.
  • a module included in the mobile phone such as a wireless communication module, a navigation module, a screen protection module, and the like.
  • FIG. 6 is a flowchart of pattern recognition and configuration when a mobile phone is started according to an embodiment of the present invention. As shown in FIG. 6, the workflow is as follows:
  • step S602 the mobile phone starts from a shutdown state or an initial phase of a hot start.
  • Step S604 after the mobile phone performs the memory read only memory (ROM) and the non-volatile storage device read only memory (ROM), the pattern recognition module reads from the secure storage area. Take the mode parameter.
  • ROM memory read only memory
  • ROM non-volatile storage device read only memory
  • Step S606 the secure storage area feeds back the mode parameter to the pattern recognition module.
  • Step S608 the pattern recognition module notifies the read mode parameter to the mode configuration module.
  • Step S610 the mode configuration module sets a module included in a mobile phone, a wireless communication module, a navigation module, a screen protection module, and the like, and configures the mobile phone to be in a mode in which the mobile phone should be located.
  • the present invention introduces a secure storage area, which can effectively prevent the mode configuration parameters from being maliciously falsified, and effectively improves the security problem in the mobile phone mode configuration process.
  • a storage medium is further provided, wherein the software includes the above-mentioned software, including but not limited to: an optical disk, a floppy disk, a hard disk, an erasable memory, and the like.
  • modules or steps of the present invention described above can be implemented by a general-purpose computing device that can be centralized on a single computing device or distributed across a network of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.
  • the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps thereof are fabricated as a single integrated circuit module.
  • the invention is not limited to any specific combination of hardware and software.
  • the working mode configuration method and apparatus provided by the embodiments of the present invention have the following beneficial effects: reducing the probability that the working mode of the terminal is attacked and being tampered with, thereby effectively improving the security during the configuration of the terminal working mode. problem.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

一种工作模式配置方法及装置,其中,该方法包括:从终端的安全存储区中获取指定工作模式,其中,安全存储区为需要通过指定算法完成读写控制的数据区(S102);将终端的工作模式配置为该指定工作模式(S104)。解决了相关技术中终端的工作模式易被攻击、易被篡改的问题,进而有效地改善了终端工作模式配置过程中的安全问题。

Description

工作模式配置方法及装置 技术领域
本发明涉及通信领域,具体而言,涉及工作模式配置方法及装置。
背景技术
终端(例如,手机)作为人们日常生活不可缺少的日常工具,集成了通讯、导航、照相机、录音机等多种功能。根据使用场景的不同,手机通常具备多种工作模式,如普通模式、锁定模式、飞行模式、车载模式等。不同的模式下,手机的无线通讯模块、无线保真(Wireless Fidelity,简称为WiFi)模块、蓝牙模块、屏幕保护模块、导航模块、以及手机包含的其他模块可能处于不同的状态。通常情况下,模式标识信息存储在常规数据区,各模式之间由软件根据用户的设置进行切换。这种情况存在两个问题。第一,恢复出厂设置后,数据区被擦除,模式信息即被清除,将恢复到出厂默认状态。第二,常规数据区由于无特殊保护,安全性较差。即使进行加密,攻击者也可以通过模式数据二进制拷贝进行篡改。如果手机被恶意软件攻击或篡改,很容易导致手机从用户设定的状态退出,返回正常模式,引起用户使用不便、信息丢失、甚至是引起恶性事故等。如从飞行模式退出返回到普通模式,将引起对其他设备的可能干扰;从车载模式退出将影响用户的导航使用;从锁定模式退出将影响用户隐私信息的泄漏或丢失。
针对相关技术中,终端的工作模式易被攻击、易被篡改的问题,还未提出有效的解决方案。
发明内容
本发明实施例提供了一种工作模式配置方法及装置,以至少解决相关技术中终端的工作模式易被攻击、易被篡改的问题。
根据本发明实施例的一个方面,提供了一种工作模式配置方法,包括:从终端的安全存储区中获取指定工作模式,其中,所述安全存储区为需要通过指定算法完成读写控制的数据区;将所述终端的工作模式配置为所述指定工作模式。
进一步地,从终端的安全存储区中获取指定工作模式之前包括:获取所述终端当前工作模式;获取所述终端应当所处的所述指定工作模式;在所述当前工作模式与所述指定工作模式不同的情况下,将所述指定工作模式存储至所述安全存储区。
进一步地,获取所述终端应当所处的所述指定工作模式包括:根据以下至少之一的信息确定与该信息对应的所述指定工作模式:网络指令、所述终端或终端中指定应用的当前运行状态、用户的操作指令。
进一步地,从所述终端的所述安全存储区中获取所述指定工作模式之前,包括:重新启动所述终端。
进一步地,所述安全存储区为基于回环保护分区RPMB技术的安全存储区。
根据本发明实施例的另一个方面,提供了一种工作模式配置装置,包括:第一获取模块,设置为从终端的安全存储区中获取指定工作模式,其中,所述安全存储区为需要通过指定算法完成读写控制的数据区;配置模块,设置为将所述终端的工作模式配置为所述指定工作模式。
进一步地,所述装置还包括:第二获取模块,设置为获取所述终端当前工作模式;第三获取模块,设置为获取所述终端应当所处的所述指定工作模式;存储模块,设置为在所述当前工作模式与所述指定工作模式不同的情况下,将所述指定工作模式存储至所述安全存储区。
进一步地,所述第三获取模块还设置为根据以下至少之一的信息确定与该信息对应的所述指定工作模式:网络指令、所述终端或终端中指定应用的当前运行状态、用户的操作指令。
进一步地,所述装置还包括:启动模块,设置为重新启动所述终端。
进一步地,所述安全存储区为基于回环保护分区RPMB技术的安全存储区。
通过本发明实施例,采用从终端的安全存储区中获取指定工作模式,其中,安全存储区为需要通过指定算法完成读写控制的数据区;将终端的工作模式配置为该指定工作模式。由此解决了相关技术中终端的工作模式易被攻击、易被篡改的问题,进而有效地改善了终端工作模式配置过程中的安全问题。
附图说明
此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:
图1是根据本发明实施例的工作模式配置方法的流程图;
图2是根据本发明实施例的工作模式配置装置的结构框图;
图3是根据本发明实施例的工作模式配置装置的结构框图(一);
图4是根据本发明实施例的工作模式配置装置的结构框图(二);
图5是根据本发明实施例的手机开机完成后的模式识别、配置流程图;
图6是根据本发明实施例的手机启动时的模式识别、配置流程图。
具体实施方式
下文中将参考附图并结合实施例来详细说明本发明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。
在本实施例中提供了一种工作模式配置方法,图1是根据本发明实施例的工作模式配置方法的流程图,如图1所示,该流程包括如下步骤:
步骤S102,从终端的安全存储区中获取指定工作模式,其中,安全存储区为需要通过指定算法完成读写控制的数据区;
步骤S104,将终端的工作模式配置为该指定工作模式。
通过上述步骤,将终端需要配置的指定工作模式存储在终端的安全存储区内,相比于现有技术中,将终端工作模式标识信息存储在常规数据区,容易导致工作模式误切换的现象,上述步骤解决了相关技术中终端的工作模式易被攻击、易被篡改的问题,进而有效地改善了终端工作模式配置过程中的安全问题。
从终端的安全存储区中获取指定工作模式之前,需要将上述指定工作模式存储在上述安全存储区内,在一个可选实施例中,获取终端当前工作模式,并且获取终端应 当所处的该指定工作模式,在当前工作模式与指定工作模式不同的情况下,将指定工作模式存储至安全存储区。从而保证了存储在安全存储区内的指定工作模式的安全性。
可以通过多种方式获取终端应当所处的指定工作模式,在一个可选实施例中,可以根据网络指令、终端或终端中指定应用的当前运行状态、用户的操作指令确定与上述信息对应的指定工作模式:
在一个可选实施例中,从终端的安全存储区中获取该指定工作模式之前,重新启动终端。
在一个可选实施例中,上述安全存储区为基于回环保护分区(Replay Protect Memory Block,简称为RPMB)技术的安全存储区。
在本实施例中还提供了一种工作模式配置装置,该装置设置为实现上述实施例及优选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。
图2是根据本发明实施例的工作模式配置装置的结构框图,如图2所示,该装置包括:第一获取模块22,设置为从终端的安全存储区中获取指定工作模式,其中,安全存储区为需要通过指定算法完成读写控制的数据区;配置模块24,设置为将终端的工作模式配置为指定工作模式。
图3是根据本发明实施例的工作模式配置装置的结构框图(一),如图3所示,该装置还包括:第二获取模块32,设置为获取终端当前工作模式;第三获取模块34,设置为获取终端应当所处的该指定工作模式;存储模块36,设置为在当前工作模式与该指定工作模式不同的情况下,将该指定工作模式存储至安全存储区。
可选地,第三获取模块34还设置为根据以下至少之一的信息确定与该信息对应的该指定工作模式:网络指令、该终端或终端中指定应用的当前运行状态、用户的操作指令。
图4是根据本发明实施例的工作模式配置装置的结构框图(二),如图4所示,该装置还包括:启动模块42,设置为重新启动该终端。
可选地,安全存储区为基于回环保护分区RPMB技术的安全存储区。
需要说明的是,上述各个模块是可以通过软件或硬件来实现的,对于后者,可以通过以下方式实现,但不限于此:上述各个模块均位于同一处理器中;或者,上述各个模块分别位于第一处理器、第二处理器和第三处理器…中。
针对相关技术中存在的上述问题,下面结合可选实施例进行说明,下述可选实施例结合了上述可选实施例及其可选实施方式。
本可选实施例为解决当前手机模式实现过程中易被攻击、易被篡改的问题,提供了一种可靠的手机模式实现方法。
本可选实施例所述的可靠的手机模式实现方法包含以下模块:
(1)基于RPMB技术的安全存储区。RPMB是Embedded Multi Media Card(简称为eMMC)规范所定义的特殊分区,通过密钥鉴权、计数器进行读写控制,可有效防止非法用户篡改分区信息。
(2)模式识别模块。模式识别模块通过接收网络指令,监控手机状态,或者根据用户的操作,识别手机当前应当所处的模式。如果手机当前模式与模式识别模块判断出的应当所处的模式不一致,则将手机应当所处的模式存储到安全存储区,并通知模式配置模块将手机当前模式配置为应当所处的模式。
(3)模式配置模块。模式配置模块对手机的无线通讯模块、导航模块、屏幕保护模块以及手机包含的其他模块进行设置,将手机配置为应当所处的模式下。
本可选实施例的可靠的手机模式实现方法包括以下步骤:
(1)手机通过模式识别模块判断当前手机应当所处的模式。
(2)手机将当前应当所处的模式参数写入安全存储区。
(3)手机进入对应的模式。
(4)手机冷启动时,模式识别模块先读取安全存储区中的模式参数,识别出手机应当所处的模式,通过模式配置模块进入正确的模式。
(5)手机重启时,模式识别模块先读取安全存储区中的模式参数,识别出手机应当所处的模式,通过模式配置模块进入正确的模式。
图5是根据本发明实施例的手机开机完成后的模式识别、配置流程图,如图5所示,其工作流程为:
步骤S502,手机处于开机状态,工作于某一特定的工作模式下。当手机从网络接收到指令,或者根据用户的操作,或者根据应用程序运行的情况,触发判断,认为手机应当处于某一种模式下。
步骤S504,如果手机当前模式与模式识别模块判断出的应当所处的模式不一致,则将手机应当所处的模式的参数存储到安全存储区。
步骤S506,安全存储区向模式识别模块反馈存储成功。
步骤S508,模式识别模块通知模式配置模块进行模式配置。
步骤S510,模式配置模块对手机的无线通讯模块、导航模块、屏幕保护模块等手机包含的模块进行设置,将手机配置为应当所处的模式下。
图6是根据本发明实施例的手机启动时的模式识别、配置流程图,如图6所示,其工作流程如下:
步骤S602,手机从关机状态,或热启动的初始阶段开始。
步骤S604,当手机进行内存只读存储器(Read Only Memory,简称为ROM)以及非易失性存储设备只读存储器(Read Only Memory,简称为ROM)初始化完成后,模式识别模块从安全存储区读取模式参数。
步骤S606,安全存储区向模式识别模块反馈模式参数。
步骤S608,模式识别模块将读取到的模式参数通知到模式配置模块。
步骤S610,模式配置模块对手机的无线通讯模块、导航模块、屏幕保护模块等手机包含的模块进行设置,将手机配置为应当所处的模式下。
综上所述,本发明引入了安全存储区,可有效防止模式配置参数被恶意篡改,有效改善了手机模式配置过程中的安全问题。
在另外一个实施例中,还提供了一种软件,该软件用于执行上述实施例及优选实施方式中描述的技术方案。
在另外一个实施例中,还提供了一种存储介质,该存储介质中存储有上述软件,该存储介质包括但不限于:光盘、软盘、硬盘、可擦写存储器等。
显然,本领域的技术人员应该明白,上述的本发明的各模块或各步骤可以用通用的计算装置来实现,它们可以集中在单个的计算装置上,或者分布在多个计算装置所组成的网络上,可选地,它们可以用计算装置可执行的程序代码来实现,从而,可以将它们存储在存储装置中由计算装置来执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤,或者将它们分别制作成各个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。这样,本发明不限制于任何特定的硬件和软件结合。
以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。
工业实用性
如上所述,本发明实施例提供的一种工作模式配置方法及装置具有以下有益效果:降低了终端的工作模式被攻击以及被篡改的概率,进而有效地改善了终端工作模式配置过程中的安全问题。

Claims (10)

  1. 一种工作模式配置方法,包括:
    从终端的安全存储区中获取指定工作模式,其中,所述安全存储区为需要通过指定算法完成读写控制的数据区;
    将所述终端的工作模式配置为所述指定工作模式。
  2. 根据权利要求1所述的方法,其中,从终端的安全存储区中获取指定工作模式之前包括:
    获取所述终端当前工作模式;
    获取所述终端应当所处的所述指定工作模式;
    在所述当前工作模式与所述指定工作模式不同的情况下,将所述指定工作模式存储至所述安全存储区。
  3. 根据权利要求2所述的方法,其中,获取所述终端应当所处的所述指定工作模式包括:
    根据以下至少之一的信息确定与该信息对应的所述指定工作模式:
    网络指令、所述终端或终端中指定应用的当前运行状态、用户的操作指令。
  4. 根据权利要求1所述的方法,其中,从所述终端的所述安全存储区中获取所述指定工作模式之前,包括:
    重新启动所述终端。
  5. 根据权利要求1至4中任一项所述的方法,其中,所述安全存储区为基于回环保护分区RPMB技术的安全存储区。
  6. 一种工作模式配置装置,包括:
    第一获取模块,设置为从终端的安全存储区中获取指定工作模式,其中,所述安全存储区为需要通过指定算法完成读写控制的数据区;
    配置模块,设置为将所述终端的工作模式配置为所述指定工作模式。
  7. 根据权利要求6所述的装置,其中,所述装置还包括:
    第二获取模块,设置为获取所述终端当前工作模式;
    第三获取模块,设置为获取所述终端应当所处的所述指定工作模式;
    存储模块,设置为在所述当前工作模式与所述指定工作模式不同的情况下,将所述指定工作模式存储至所述安全存储区。
  8. 根据权利要求7所述的装置,其中,所述第三获取模块还设置为根据以下至少之一的信息确定与该信息对应的所述指定工作模式:
    网络指令、所述终端或终端中指定应用的当前运行状态、用户的操作指令。
  9. 根据权利要求6所述的装置,其中,所述装置还包括:
    启动模块,设置为重新启动所述终端。
  10. 根据权利要求6至9中任一项所述的装置,其中,所述安全存储区为基于回环保护分区RPMB技术的安全存储区。
PCT/CN2015/081009 2015-01-19 2015-06-08 工作模式配置方法及装置 WO2016115808A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510026008.X 2015-01-19
CN201510026008.XA CN105868651A (zh) 2015-01-19 2015-01-19 工作模式配置方法及装置

Publications (1)

Publication Number Publication Date
WO2016115808A1 true WO2016115808A1 (zh) 2016-07-28

Family

ID=56416339

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/081009 WO2016115808A1 (zh) 2015-01-19 2015-06-08 工作模式配置方法及装置

Country Status (2)

Country Link
CN (1) CN105868651A (zh)
WO (1) WO2016115808A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108228299B (zh) * 2018-01-02 2021-07-16 联想(北京)有限公司 显示方法及电子设备
CN111898115A (zh) * 2020-07-16 2020-11-06 四川爱联科技股份有限公司 防止模组固件的参数被篡改的方法及装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1960535A (zh) * 2005-09-01 2007-05-09 Lg电子株式会社 用于控制移动终端的独立模式的装置和方法
US20110296194A1 (en) * 2010-05-26 2011-12-01 Ncr Corporaiton Secure authentication at a self-service terminal
CN102663471A (zh) * 2012-04-17 2012-09-12 惠州Tcl移动通信有限公司 基于emmc芯片的移动终端安全信息存储方法及系统
CN103532938A (zh) * 2013-09-29 2014-01-22 东莞宇龙通信科技有限公司 应用数据保护的方法和系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1960535A (zh) * 2005-09-01 2007-05-09 Lg电子株式会社 用于控制移动终端的独立模式的装置和方法
US20110296194A1 (en) * 2010-05-26 2011-12-01 Ncr Corporaiton Secure authentication at a self-service terminal
CN102663471A (zh) * 2012-04-17 2012-09-12 惠州Tcl移动通信有限公司 基于emmc芯片的移动终端安全信息存储方法及系统
CN103532938A (zh) * 2013-09-29 2014-01-22 东莞宇龙通信科技有限公司 应用数据保护的方法和系统

Also Published As

Publication number Publication date
CN105868651A (zh) 2016-08-17

Similar Documents

Publication Publication Date Title
US10447839B2 (en) Device locator disable authentication
CN108307674B (zh) 一种保障终端安全的方法和设备
EP2812842B1 (en) Security policy for device data
US9560026B1 (en) Secure computer operations
CN105519038B (zh) 用户输入的数据保护方法及系统
US8566610B2 (en) Methods and apparatus for restoration of an anti-theft platform
US9891969B2 (en) Method and apparatus for device state based encryption key
EP2693789A1 (en) Mobile terminal encryption method, hardware encryption device and mobile terminal
US9800577B2 (en) Method and apparatus for controlling communications terminal and corresponding communications terminal
US20100308962A1 (en) Method and electronic device capable of user identification
EP3267304A1 (en) Storage partition method and terminal
US11475123B2 (en) Temporary removal of software programs to secure mobile device
CN106599115B (zh) 数据保护方法、装置及终端
US11849038B2 (en) Self-service device encryption key access
US11928450B2 (en) Mobile terminal, method for uninstalling pre-installed application therein, and memory
EP4036775A1 (en) Data processing method and apparatus, and system chip
CN111352862A (zh) 一种密钥销毁方法、系统、密码卡及密码机
WO2016115808A1 (zh) 工作模式配置方法及装置
KR20160058375A (ko) 단말 내장형 보안 요소와의 안전한 통신
KR20190033930A (ko) 보안 정보를 암호화하는 전자 장치 및 그 작동 방법
CN111353150B (zh) 一种可信启动方法、装置、电子设备及可读存储介质
CN104346299A (zh) 一种移动终端更新的控制方法和装置
CN110727940A (zh) 一种电子设备密码管理方法、装置、设备及存储介质
WO2016187966A1 (zh) 一种终端及保护终端数据安全的方法
WO2021233351A1 (zh) 数据转移方法及装置、终端和计算机可读存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15878482

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15878482

Country of ref document: EP

Kind code of ref document: A1