WO2017036212A1 - Terminal starting method and apparatus - Google Patents

Terminal starting method and apparatus Download PDF

Info

Publication number
WO2017036212A1
WO2017036212A1 PCT/CN2016/084552 CN2016084552W WO2017036212A1 WO 2017036212 A1 WO2017036212 A1 WO 2017036212A1 CN 2016084552 W CN2016084552 W CN 2016084552W WO 2017036212 A1 WO2017036212 A1 WO 2017036212A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
terminal
memory
built
matching
Prior art date
Application number
PCT/CN2016/084552
Other languages
French (fr)
Chinese (zh)
Inventor
张昊
Original Assignee
深圳Tcl数字技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳Tcl数字技术有限公司 filed Critical 深圳Tcl数字技术有限公司
Publication of WO2017036212A1 publication Critical patent/WO2017036212A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/75Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation

Definitions

  • the present invention relates to the field of multimedia technologies, and in particular, to a terminal starting method and apparatus.
  • the main purpose of the present invention is to provide a method and device for starting a terminal, which aims to solve the technical problem that the startup mode of the terminal is too simple and the security of use is low.
  • the present invention provides a terminal startup method, and the terminal startup method includes the following steps:
  • Reading a memory readable by the terminal determining whether there is key information matching the first key in the memory, wherein the readable memory comprises a built-in memory of the terminal and/or with the terminal Connected mobile storage device;
  • the alarm information is output when there is no key information matching the first key in the memory.
  • the reading terminal readable memory determining whether the key information matching the first key exists in the memory comprises:
  • Reading a built-in memory of the terminal determining whether there is a second key matching the first key in the built-in memory
  • the step of starting the terminal includes:
  • the third key is encrypted and stored as a second key in a built-in memory of the terminal;
  • the terminal is activated according to the second key stored in the built-in memory.
  • the present invention further provides a terminal startup method, where the terminal startup method includes the following steps:
  • the terminal is activated when there is key information matching the first key in the memory.
  • the readable memory comprises a built-in memory of the terminal and/or a mobile storage device connected to the terminal.
  • the reading terminal readable memory determining whether the key information matching the first key exists in the memory comprises:
  • Reading a built-in memory of the terminal determining whether there is a second key matching the first key in the built-in memory
  • the step of starting the terminal includes:
  • the third key is encrypted and stored as a second key in a built-in memory of the terminal;
  • the terminal is activated according to the second key stored in the built-in memory.
  • the terminal startup method further includes:
  • the alarm information is output when there is no key information matching the first key in the memory.
  • the present invention further provides a terminal starting device, where the terminal starting device includes:
  • An acquiring module configured to acquire, according to the terminal startup instruction, a first key preset in an integrated chip of the terminal, when the terminal startup instruction is detected;
  • a processing module configured to read a memory readable by the terminal, and determine whether there is key information matching the first key in the memory
  • a startup module configured to start the terminal when there is key information matching the first key in the memory.
  • the readable memory comprises a built-in memory of the terminal and/or a mobile storage device connected to the terminal.
  • the processing module comprises:
  • a processing unit configured to read a built-in memory of the terminal, and determine whether a second key matching the first key exists in the built-in memory
  • a reading unit configured to: if there is no second key matching the first key in the built-in memory, read a mobile storage device connected to the terminal;
  • a determining unit configured to determine whether a third key matching the first key exists in the mobile storage device.
  • the startup module comprises:
  • a storage unit configured to: when the third key matching the first key exists in the mobile storage device, encrypt the third key as a second key into a built-in memory of the terminal;
  • an activation unit configured to start the terminal according to the second key stored in the built-in memory.
  • the terminal activation device further includes:
  • an output module configured to output alarm information when there is no key information matching the first key in the memory.
  • the method and device for starting a terminal acquires a first key preset in an integrated chip of a terminal, and then reads the first key in the integrated chip of the terminal when detecting the terminal startup command on the basis of configuring the software and hardware data of the terminal.
  • a memory determining whether there is key information matching the first key in the memory, and when there is key information matching the first key in the memory, starting the terminal instead of The terminal startup command is detected on the basis of configuring the software and hardware data, and the terminal is directly started.
  • the scheme presets the first key in the integrated chip of the terminal, only in the memory readable by the reading terminal. When the key information matching the first key exists, the terminal is started, even if the software and hardware data of the terminal is leaked, and the terminal cannot be started due to lack of the key information, the present invention improves the use of the terminal. Security.
  • FIG. 1 is a schematic flowchart of a first embodiment of a method for starting a terminal according to the present invention
  • FIG. 2 is a schematic flow chart of a preferred embodiment of the present invention for reading a memory readable by a read terminal, and determining whether there is key information matching the first key in the memory;
  • FIG. 3 is a schematic flowchart of a preferred embodiment of starting the terminal when there is key information matching the first key in the memory according to the present invention
  • FIG. 4 is a schematic flowchart of a fourth embodiment of a method for starting a terminal according to the present invention.
  • FIG. 5 is a schematic diagram of functional modules of a first embodiment of a terminal starting device according to the present invention.
  • FIG. 6 is a schematic diagram of functional modules of the preferred embodiment of the processing module of FIG. 5;
  • FIG. 7 is a schematic diagram of functional modules of the preferred embodiment of the boot module of FIG. 5;
  • FIG. 8 is a schematic diagram of functional modules of a fourth embodiment of a terminal starting device according to the present invention.
  • the invention provides a terminal starting method.
  • FIG. 1 is a schematic flowchart diagram of a first embodiment of a method for starting a terminal according to the present invention.
  • This embodiment provides a terminal startup method, where the terminal startup method includes:
  • Step S10 When detecting the terminal startup instruction, acquire the first key preset in the integrated chip of the terminal based on the terminal startup instruction;
  • the step S10 includes the step of: storing the first key when detecting the first key based on the integrated chip configuration.
  • the integrated chip of the terminal is also an integrated circuit board (integrated Circuit, IC), when the integrated chip is generated, the first key of the configuration is first stored, and the first key is a security key, which is equivalent to one of the security passwords when the terminal is started, and combined with another matching
  • the group key can be used to start the terminal.
  • it is preferable to configure different first keys in different integrated chips that is, IC chips, for example, there are 12,000 IC chips, and preferably one first key is configured for every 1000 IC chips.
  • the 12000 IC chips can be configured with 12 different first keys.
  • the terminal in this embodiment includes not only mobile terminals such as a television, a computer, a mobile phone, or a set top box, but also a refrigerator, an air conditioner, and other types of mobile terminals.
  • the triggering mode of the terminal startup command is preferably that the user triggers the power button preset by the terminal to trigger the terminal startup command, or triggers the terminal startup command by using a preset voice command.
  • the terminal acquires a first key preset in the integrated chip of the terminal based on the terminal startup instruction, and it is noted that when the first key is stored in the terminal integration
  • the chip is stored in an encrypted form, and the encryption is encrypted by a preset AES encryption algorithm, and when the terminal is ready to read the first key, the terminal first encrypts the first key. Decrypt, and then read the decrypted first key.
  • the terminal decrypts and reads the first key, and stores it by encryption during storage, thereby improving the security of the first key storage.
  • Step S20 reading a memory readable by the terminal, determining whether there is key information matching the first key in the memory;
  • the readable memory includes a built-in memory of the terminal and/or a mobile storage device connected to the terminal.
  • the built-in memory preferably includes a memory, a flash memory or a cache, and the mobile storage device preferably includes a USB flash drive or a mobile hard disk or the like.
  • the implementation manner of the step S20 includes:
  • Method 1 When the read memory is a built-in memory of the terminal, the terminal reads the built-in memory of the terminal, and determines whether there is a second key in the built-in memory that matches the first key. key.
  • flash memory such as flash, full name flash
  • the method for determining whether the second key matching the first key exists in the flash memory is preferably: the terminal decrypts the second key first, and the second key is After the key is decrypted, the decrypted second key is compared with the decrypted first key to determine whether the decrypted first key matches the decrypted second key. The data corresponding to the decrypted second key is completely consistent with the data corresponding to the decrypted first key.
  • the first key and the second key are Key match. It can be understood that, when the terminal is powered on for the first time, the second key does not exist in the flash memory of the terminal, that is, the second key that matches the first key is not saved in the flash memory of the terminal. . If the second key matching the first key exists in the flash memory, the terminal has completed initial power-on, and after completing the initial power-on startup, stores the first secret in the flash memory. The key matching the second key, the terminal may directly match the first key and the second key to start the terminal in a later terminal startup process.
  • the method for determining whether the third key matching the first key exists in the mobile storage device in the embodiment is preferably: firstly, reading each key information pre-stored by the mobile storage device, Preferably, the reading mode first decrypts each key information one by one, and compares the decrypted key information with the decrypted first key in the integrated chip of the terminal, after detecting the decryption Key information of the first key matching, the matching key information is used as a third key, and the third key is obtained, and the matching represents the decrypted third key corresponding to The data is completely consistent with the data corresponding to the decrypted first key.
  • the mobile storage device stores a plurality of different key information, and a plurality of different key information stored in the mobile storage device, so that a key corresponding to a plurality of different terminal copies of the mobile storage device can be implemented. Information that increases the flexibility of mobile storage device usage.
  • Step S30 When there is key information matching the first key in the memory, the terminal is started.
  • start And the terminal is started when the third key matching the first key exists in the mobile storage device.
  • the terminal startup method in the embodiment when the terminal startup command is detected on the basis of the configuration of the software and hardware data, the first key preset in the integrated chip of the terminal is acquired first, and then the read terminal is readable. a memory, determining whether there is key information matching the first key in the memory, and when there is key information matching the first key in the memory, starting the terminal instead of After the hardware and software data is configured, the terminal startup command is detected, and the terminal is directly started.
  • the first key is preset in the integrated chip of the terminal, and only exists in the memory readable by the reading terminal. When the key information is matched with the first key, the terminal is started, and even if the software and hardware data of the terminal is leaked, the terminal cannot be started due to lack of key information, and the present invention improves the use of the terminal. safety.
  • the step S20 includes:
  • Step S21 reading a built-in memory of the terminal, determining whether there is a second key matching the first key in the built-in memory;
  • Step S22 if there is no second key matching the first key in the built-in memory, reading a mobile storage device connected to the terminal;
  • Step S23 determining whether a third key matching the first key exists in the mobile storage device.
  • the terminal preferably reads the built-in memory of the terminal, and determines whether there is a second key that matches the first key in the built-in memory, where the determining manner is the terminal first. Decrypting the second key, after decrypting the second key, comparing the decrypted second key with the decrypted first key to determine the decrypted first key Whether the data corresponding to the decrypted second key is completely consistent with the data corresponding to the decrypted first key, if the decrypted second key matches, if the data is inconsistent The first key does not match the second key, that is, the second key that matches the first key does not exist in the built-in memory of the terminal.
  • the terminal reads the mobile storage device connected to the terminal, and determines whether there is a third key that matches the first key in the mobile storage device, and the determining the mobile storage device
  • the manner in which the third key matching the first key is present is: firstly, each key information pre-stored by the mobile storage device is read in a round-robin manner, and the reading manner is preferably first for each key.
  • the information is decrypted one by one, and the decrypted key information is compared with the decrypted first key in the integrated chip of the terminal, and after detecting the key information matching the decrypted first key, And using the matched key information as a third key, and acquiring the third key, where the matching indicates that the data corresponding to the decrypted third key corresponds to the decrypted first key
  • the data is completely consistent, according to whether the two data are consistent, to determine whether the first key matches the third key.
  • the step S30 includes:
  • Step S31 when there is a third key matching the first key in the mobile storage device, the third key is encrypted and stored as a second key in a built-in memory of the terminal;
  • Step S32 starting the terminal according to the second key stored in the built-in memory.
  • the mobile storage device when there is no second key matching the first key in the built-in memory of the terminal, the mobile storage device has a third match with the first key.
  • the key information matching the first key is stored in the memory.
  • the third key in the mobile storage device is preferably used as the first key.
  • the two-key encryption is stored in the built-in memory of the terminal. It can be understood that the second key and the third key are exactly the same, but the third key in the mobile storage device is stored in the built-in memory.
  • the terminal is activated according to the second key stored in the built-in memory, and the encrypted storage is realized when the data is stored, and the decryption is read when the data is read, thereby improving The security of the terminal startup.
  • the key information and the mobile storage device are first determined. Whether the third key is consistent, the determining manner is preferably to decrypt the third key and the key information, and then the data corresponding to the decrypted third key and the Comparing the data corresponding to the key information to determine whether the third key is consistent with the key information, and if the key information is inconsistent with the third key in the mobile storage device, If the third key stored in the mobile storage device has been updated, the key information in the built-in memory may be preferably updated to a third key in the mobile storage device, and then the updated third key is used as The second key is stored in the built-in memory of the terminal and the terminal is activated.
  • the first key of the integrated chip may be preferably modified, and the new key and the first one are re-copied with the mobile storage device.
  • the key is matched, that is, the key information in the built-in memory is updated to the third key in the mobile storage device as described in this embodiment.
  • the terminal startup method further includes:
  • Step S60 When there is no key information matching the first key in the memory, the alarm information is output.
  • the terminal when there is no key information matching the first key in the memory, it is indicated that all the key information in the memory does not match the first key pre-stored in the integrated chip. Then, the terminal can be determined to fail to start, and the alarm information is output. If a flashing signal is sent on the preset LED of the mobile storage device to prompt the user that the current terminal fails to start, the terminal can be connected to other mobile storage devices.
  • the invention further provides a terminal starting device.
  • FIG. 5 is a schematic diagram of functional modules of a first embodiment of a terminal starting device according to the present invention.
  • the functional block diagram shown in FIG. 5 is merely an exemplary embodiment of a preferred embodiment, and those skilled in the art can surround the functional modules of the terminal starting device shown in FIG. It is easy to add a new function module; the name of each function module is a custom name, which is only used to assist in understanding the various program function blocks of the terminal activation device, and is not used to limit the technical solution of the present invention.
  • the core of the technical solution of the present invention is , the function to be achieved by the function module of each name.
  • This embodiment provides a terminal starting device, where the terminal starting device includes:
  • the obtaining module 10 is configured to acquire, according to the terminal startup instruction, a first key preset in an integrated chip of the terminal, when the terminal startup instruction is detected;
  • the terminal activation device includes a storage module, and the storage module is configured to store the first key when detecting the first key based on the integrated chip configuration.
  • the integrated chip of the terminal is also an integrated circuit board (integrated Circuit, IC), when the integrated chip is generated, the storage module first stores the first key configured, and the first key is a security key, which is equivalent to one of the security passwords when the terminal is started, and is combined Match another set of keys to start the terminal.
  • IC chips integrated circuit board
  • the storage module when the integrated chip is generated, the storage module first stores the first key configured, and the first key is a security key, which is equivalent to one of the security passwords when the terminal is started, and is combined Match another set of keys to start the terminal.
  • it is preferable to configure different first keys in different integrated chips that is, IC chips, for example, there are 12,000 IC chips, and preferably one first key is configured for every 1000 IC chips.
  • the 12000 IC chips can be configured with 12 different first keys.
  • the terminal activation device in this embodiment includes not only mobile terminals such as a television, a computer, a mobile phone, or a set top box, but also a refrigerator, an air conditioner, and other types of mobile terminals.
  • the triggering mode of the terminal startup command is preferably that the user triggers the power button preset by the terminal to trigger the terminal startup command, or triggers the terminal startup command by using a preset voice command.
  • the acquiring module 10 acquires a first key preset in the integrated chip of the terminal based on the terminal startup instruction, and it is noted that when the first key is stored in the terminal.
  • the encryption is encrypted by a preset AES encryption algorithm, and when the terminal is ready to read the first key, the encrypted first secret is first
  • the key is decrypted and then the decrypted first key is read.
  • the terminal decrypts and reads the first key, and stores it by encryption during storage, thereby improving the security of the first key storage.
  • the processing module 20 is configured to read a memory readable by the terminal, and determine whether there is key information in the memory that matches the first key;
  • the readable memory includes a built-in memory of the terminal and/or a mobile storage device connected to the terminal.
  • the built-in memory preferably includes a memory, a flash memory or a cache, and the mobile storage device preferably includes a USB flash drive or a mobile hard disk or the like.
  • the processing module 20 reads the memory readable by the terminal, and determines whether the key information matching the first key exists in the memory, including:
  • mode 1 When the read memory is a built-in memory of the terminal, the processing module 20 reads the built-in memory of the terminal, and determines whether the built-in memory matches the first key. The second key.
  • flash memory such as flash, full name flash
  • the processing module 20 determines whether the second key matching the first key exists in the flash memory. The processing module 20 first decrypts the second key.
  • the matching indicates that the data corresponding to the decrypted second key is completely consistent with the data corresponding to the decrypted first key, and if the two data are completely consistent, the first secret is indicated
  • the key matches the second key. It can be understood that, when the terminal is powered on for the first time, the second key does not exist in the flash memory of the terminal, that is, the second key that matches the first key is not saved in the flash memory of the terminal. .
  • the processing module 20 stores in the flash memory.
  • the second key matched by the first key, in the subsequent terminal startup process, the processing module 20 may directly match the first key and the second key to start the terminal.
  • the processing module 20 reads the mobile storage device, and determines whether the mobile storage device exists and the first The third key that the key matches.
  • the method for determining, by the processing module 20 in the embodiment, whether the third key matching the first key exists in the mobile storage device is: firstly reading the pre-stored secrets of the mobile storage device
  • the key information is preferably obtained by first decrypting each key information one by one, and comparing the decrypted key information with the decrypted first key in the integrated chip of the terminal, and detecting the Defining the decrypted first key matching key information, using the matched key information as a third key, and acquiring the third key, the matching indicating the decrypted third secret
  • the data corresponding to the key is completely consistent with the data corresponding to the decrypted first key.
  • the mobile storage device stores a plurality of different key information, and a plurality of different key information stored in the mobile storage device, so that a key corresponding to a plurality of different terminal copies of the mobile storage device can be implemented. Information that increases the flexibility of mobile storage device usage.
  • the startup module 30 is configured to start the terminal when there is key information matching the first key in the memory.
  • the startup module 30 when there is key information matching the first key in the memory, that is, when there is a second key matching the first key in the built-in memory, the startup module 30 starts the terminal; or when the third key matching the first key exists in the mobile storage device, the startup module 30 starts the terminal.
  • the terminal starting device of the present embodiment first acquires a first key preset in the integrated chip of the terminal when the terminal starts the command, and then reads the readable terminal at the reading terminal.
  • a memory determining whether there is key information matching the first key in the memory, and when there is key information matching the first key in the memory, starting the terminal instead of After the hardware and software data is configured, the terminal startup command is detected, and the terminal is directly started.
  • the first key is preset in the integrated chip of the terminal, and only exists in the memory readable by the reading terminal. When the key information is matched with the first key, the terminal is started, and even if the software and hardware data of the terminal is leaked, the terminal cannot be started due to lack of key information, and the present invention improves the use of the terminal. safety.
  • the processing module 20 includes:
  • the processing unit 21 is configured to read a built-in memory of the terminal, and determine whether a second key matching the first key exists in the built-in memory;
  • the reading unit 22 is configured to: if there is no second key matching the first key in the built-in memory, read a mobile storage device connected to the terminal;
  • the determining unit 23 is configured to determine whether a third key matching the first key exists in the mobile storage device.
  • the processing unit 21 preferably reads the built-in memory of the terminal first, and determines whether there is a second key in the built-in memory that matches the first key, and the processing unit 21 The determining manner is that the terminal first decrypts the second key, and after decrypting the second key, comparing the decrypted second key with the decrypted first key to determine the decrypted Whether the first key matches the decrypted second key, and the matching indicates that the data corresponding to the decrypted second key is completely consistent with the data corresponding to the decrypted first key. If the data of the two are inconsistent, the first key does not match the second key, that is, the second key that matches the first key does not exist in the built-in memory of the terminal.
  • the reading unit 22 reads the mobile storage device connected to the terminal, and determines whether there is a third key matching the first key in the mobile storage device, and the determining unit 23 Determining whether the third key matching the first key exists in the mobile storage device is preferably: firstly reading each key information pre-stored by the mobile storage device, the reading mode is preferred First, each key information is decrypted one by one, and the decrypted key information is compared with the decrypted first key in the integrated chip of the terminal, and the first key that is decrypted is detected to be matched.
  • the matching key information is used as a third key, and the third key is obtained, and the matching represents data corresponding to the decrypted third key and the decrypted
  • the data corresponding to the first key is completely consistent, according to whether the two data are consistent, to determine whether the first key matches the third key.
  • the startup module 30 includes:
  • the storage unit 31 is configured to: when the third key matching the first key exists in the mobile storage device, encrypt the third key as a second key into a built-in memory of the terminal;
  • the startup unit 32 is configured to start the terminal according to the second key stored in the built-in memory.
  • the mobile storage device when there is no second key matching the first key in the built-in memory of the terminal, the mobile storage device has a third match with the first key.
  • the key In the case of the key, the key information matching the first key is stored in the memory.
  • the storage unit 31 preferably selects the first in the mobile storage device.
  • the third key is stored as a second key in the built-in memory of the terminal. It can be understood that the second key and the third key are exactly the same, except that the third key in the mobile storage device is used.
  • the key is stored in the built-in memory and is named as the second key.
  • the booting unit 32 starts the terminal, and implements encrypted storage when storing data. The decryption is read only when the data is read, which improves the security of the terminal startup.
  • the key information and the mobile storage device are first determined. Whether the third key is consistent, the determining manner is preferably to decrypt the third key and the key information, and then the data corresponding to the decrypted third key and the Comparing the data corresponding to the key information to determine whether the third key is consistent with the key information, and if the key information is inconsistent with the third key in the mobile storage device, If the third key stored in the mobile storage device has been updated, the key information in the built-in memory may be preferably updated to a third key in the mobile storage device, and then the storage unit 31 will be updated.
  • the third key is stored as a second key in the built-in memory of the terminal, and the boot unit 32 activates the terminal. That is, when the first key information in the terminal integrated chip is leaked, the first key of the integrated chip may be preferably modified, and the new key and the first one are re-copied with the mobile storage device. The key is matched, that is, the key information in the built-in memory is updated to the third key in the mobile storage device as described in this embodiment.
  • the terminal activation device further include:
  • the output module 40 is configured to output alarm information when there is no key information matching the first key in the memory.
  • the output module 40 outputs alarm information, such as a flashing signal on the preset LED of the mobile storage device, to prompt the user that the current terminal fails to be started, and the terminal may be connected to other mobiles. Storage device.
  • the foregoing embodiment method can be implemented by means of software plus a necessary general hardware platform, and of course, can also be through hardware, but in many cases, the former is better.
  • Implementation Based on such understanding, the technical solution of the present invention, which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk,
  • the optical disc includes a number of instructions for causing a terminal device (which may be a cell phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the methods described in various embodiments of the present invention.

Abstract

A terminal starting method and apparatus. The method comprises: when a terminal starting instruction is detected, acquiring a preset first key in an integrated chip of a terminal based on the terminal starting instruction (S10); reading a terminal-readable memory, and determining whether key information matching the first key exists in the memory (S20); and if the key information matching the first key exists in the memory, starting the terminal (S30). The method improves the use security of the terminal.

Description

终端启动方法及装置  Terminal starting method and device
技术领域Technical field
本发明涉及多媒体技术领域,尤其涉及一种终端启动方法及装置。The present invention relates to the field of multimedia technologies, and in particular, to a terminal starting method and apparatus.
背景技术Background technique
随着科学技术的发展,山寨企业也越来越多,很多电子产品都很容易被仿制,如电视,电脑,pad或手机等设备,电子产品被山寨企业仿制生产,会给企业带来较大的损失。也就是说,现在的电子产品在生产过程中,仅仅是配置相关的硬件以及软件数据,将软硬件都配置成功后即可启动终端并运行,显然,这种启动方式过于简单,使用的安全性低。With the development of science and technology, there are more and more cottage enterprises. Many electronic products are easy to be copied, such as TV, computer, pad or mobile phone. The electronic products are copied by the cottage enterprises and will bring greater Loss. That is to say, in the production process, the current electronic products are only configured with relevant hardware and software data. After the software and hardware are successfully configured, the terminal can be started and run. Obviously, the startup method is too simple and the security used. low.
发明内容Summary of the invention
本发明的主要目的在于提出一种终端启动方法及装置,旨在解决终端的启动方式过于简单,导致使用的安全性低的技术问题。The main purpose of the present invention is to provide a method and device for starting a terminal, which aims to solve the technical problem that the startup mode of the terminal is too simple and the security of use is low.
为实现上述目的,本发明提供的一种终端启动方法,所述终端启动方法包括以下步骤:To achieve the above objective, the present invention provides a terminal startup method, and the terminal startup method includes the following steps:
在检测到终端启动指令时,基于所述终端启动指令获取终端的集成芯片中预设的第一密钥;When the terminal startup instruction is detected, acquiring a first key preset in the integrated chip of the terminal based on the terminal startup instruction;
读取终端可读取的存储器,确定所述存储器中是否存在与所述第一密钥匹配的密钥信息,其中,所述可读取的存储器包括终端的内置存储器和/或与所述终端连接的移动存储设备;Reading a memory readable by the terminal, determining whether there is key information matching the first key in the memory, wherein the readable memory comprises a built-in memory of the terminal and/or with the terminal Connected mobile storage device;
在所述存储器中存在与所述第一密钥匹配的密钥信息时,启动所述终端;When the key information matching the first key exists in the memory, starting the terminal;
在所述存储器中不存在与所述第一密钥匹配的密钥信息时,输出告警信息。The alarm information is output when there is no key information matching the first key in the memory.
优选地,所述读取终端可读取的存储器,确定所述存储器中是否存在与所述第一密钥匹配的密钥信息的步骤包括:Preferably, the reading terminal readable memory, determining whether the key information matching the first key exists in the memory comprises:
读取终端的内置存储器,确定所述内置存储器中是否存在与所述第一密钥匹配的第二密钥;Reading a built-in memory of the terminal, determining whether there is a second key matching the first key in the built-in memory;
若所述内置存储器中不存在与所述第一密钥匹配的第二密钥,读取与所述终端连接的移动存储设备;Reading a mobile storage device connected to the terminal if the second key matching the first key does not exist in the built-in memory;
确定所述移动存储设备中是否存在与所述第一密钥匹配的第三密钥。Determining whether there is a third key in the mobile storage device that matches the first key.
优选地,所述在所述存储器中存在与所述第一密钥匹配的密钥信息时,启动所述终端的步骤包括:Preferably, when the key information matching the first key exists in the memory, the step of starting the terminal includes:
在所述移动存储设备中存在与所述第一密钥匹配的第三密钥时,将所述第三密钥作为第二密钥加密存储至终端的内置存储器中;When the third key matching the first key exists in the mobile storage device, the third key is encrypted and stored as a second key in a built-in memory of the terminal;
根据所述内置存储器中存储的所述第二密钥,启动所述终端。The terminal is activated according to the second key stored in the built-in memory.
此外,为实现上述目的,本发明还提出一种终端启动方法,所述终端启动方法包括以下步骤:In addition, to achieve the above object, the present invention further provides a terminal startup method, where the terminal startup method includes the following steps:
在检测到终端启动指令时,基于所述终端启动指令获取终端的集成芯片中预设的第一密钥;When the terminal startup instruction is detected, acquiring a first key preset in the integrated chip of the terminal based on the terminal startup instruction;
读取终端可读取的存储器,确定所述存储器中是否存在与所述第一密钥匹配的密钥信息;Reading a memory readable by the terminal, determining whether there is key information matching the first key in the memory;
在所述存储器中存在与所述第一密钥匹配的密钥信息时,启动所述终端。The terminal is activated when there is key information matching the first key in the memory.
优选地,所述可读取的存储器包括终端的内置存储器和/或与所述终端连接的移动存储设备。Preferably, the readable memory comprises a built-in memory of the terminal and/or a mobile storage device connected to the terminal.
优选地,所述读取终端可读取的存储器,确定所述存储器中是否存在与所述第一密钥匹配的密钥信息的步骤包括:Preferably, the reading terminal readable memory, determining whether the key information matching the first key exists in the memory comprises:
读取终端的内置存储器,确定所述内置存储器中是否存在与所述第一密钥匹配的第二密钥;Reading a built-in memory of the terminal, determining whether there is a second key matching the first key in the built-in memory;
若所述内置存储器中不存在与所述第一密钥匹配的第二密钥,读取与所述终端连接的移动存储设备;Reading a mobile storage device connected to the terminal if the second key matching the first key does not exist in the built-in memory;
确定所述移动存储设备中是否存在与所述第一密钥匹配的第三密钥。Determining whether there is a third key in the mobile storage device that matches the first key.
优选地,所述在所述存储器中存在与所述第一密钥匹配的密钥信息时,启动所述终端的步骤包括:Preferably, when the key information matching the first key exists in the memory, the step of starting the terminal includes:
在所述移动存储设备中存在与所述第一密钥匹配的第三密钥时,将所述第三密钥作为第二密钥加密存储至终端的内置存储器中;When the third key matching the first key exists in the mobile storage device, the third key is encrypted and stored as a second key in a built-in memory of the terminal;
根据所述内置存储器中存储的所述第二密钥,启动所述终端。The terminal is activated according to the second key stored in the built-in memory.
优选地,所述读取终端可读取的存储器,确定所述存储器中是否存在与所述第一密钥匹配的密钥信息的步骤之后,所述终端启动方法还包括:Preferably, after the step of reading the readable memory of the terminal and determining whether the key information matching the first key exists in the memory, the terminal startup method further includes:
在所述存储器中不存在与所述第一密钥匹配的密钥信息时,输出告警信息。The alarm information is output when there is no key information matching the first key in the memory.
此外,为实现上述目的,本发明还提出一种终端启动装置,所述终端启动装置包括:In addition, in order to achieve the above object, the present invention further provides a terminal starting device, where the terminal starting device includes:
获取模块,用于在检测到终端启动指令时,基于所述终端启动指令获取终端的集成芯片中预设的第一密钥;An acquiring module, configured to acquire, according to the terminal startup instruction, a first key preset in an integrated chip of the terminal, when the terminal startup instruction is detected;
处理模块,用于读取终端可读取的存储器,确定所述存储器中是否存在与所述第一密钥匹配的密钥信息;a processing module, configured to read a memory readable by the terminal, and determine whether there is key information matching the first key in the memory;
启动模块,用于在所述存储器中存在与所述第一密钥匹配的密钥信息时,启动所述终端。And a startup module, configured to start the terminal when there is key information matching the first key in the memory.
优选地,所述可读取的存储器包括终端的内置存储器和/或与所述终端连接的移动存储设备。Preferably, the readable memory comprises a built-in memory of the terminal and/or a mobile storage device connected to the terminal.
优选地,所述处理模块包括:Preferably, the processing module comprises:
处理单元,用于读取终端的内置存储器,确定所述内置存储器中是否存在与所述第一密钥匹配的第二密钥;a processing unit, configured to read a built-in memory of the terminal, and determine whether a second key matching the first key exists in the built-in memory;
读取单元,用于若所述内置存储器中不存在与所述第一密钥匹配的第二密钥,读取与所述终端连接的移动存储设备;a reading unit, configured to: if there is no second key matching the first key in the built-in memory, read a mobile storage device connected to the terminal;
确定单元,用于确定所述移动存储设备中是否存在与所述第一密钥匹配的第三密钥。And a determining unit, configured to determine whether a third key matching the first key exists in the mobile storage device.
优选地,所述启动模块包括:Preferably, the startup module comprises:
存储单元,用于在所述移动存储设备中存在与所述第一密钥匹配的第三密钥时,将所述第三密钥作为第二密钥加密存储至终端的内置存储器中;a storage unit, configured to: when the third key matching the first key exists in the mobile storage device, encrypt the third key as a second key into a built-in memory of the terminal;
启动单元,用于根据所述内置存储器中存储的所述第二密钥,启动所述终端。And an activation unit, configured to start the terminal according to the second key stored in the built-in memory.
优选地,所述终端启动装置还包括:Preferably, the terminal activation device further includes:
输出模块,用于在所述存储器中不存在与所述第一密钥匹配的密钥信息时,输出告警信息。And an output module, configured to output alarm information when there is no key information matching the first key in the memory.
本发明提出的终端启动方法及装置,在终端配置好软硬件数据的基础上检测到终端启动指令时,先获取终端的集成芯片中预设的第一密钥,然后在读取终端可读取的存储器,确定所述存储器中是否存在与所述第一密钥匹配的密钥信息,在所述存储器中存在与所述第一密钥匹配的密钥信息时,启动所述终端,而不是在配置好软硬件数据的基础上检测到终端启动指令,直接就启动所述终端,本方案在终端的集成芯片中预设了第一密钥,仅当读取终端可读取的存储器中,存在与所述第一密钥匹配的密钥信息时,才启动所述终端,即使终端的软硬件数据被泄露,而由于缺少密钥信息,也无法启动所述终端,本发明提高了终端使用的安全性。The method and device for starting a terminal according to the present invention acquires a first key preset in an integrated chip of a terminal, and then reads the first key in the integrated chip of the terminal when detecting the terminal startup command on the basis of configuring the software and hardware data of the terminal. a memory, determining whether there is key information matching the first key in the memory, and when there is key information matching the first key in the memory, starting the terminal instead of The terminal startup command is detected on the basis of configuring the software and hardware data, and the terminal is directly started. The scheme presets the first key in the integrated chip of the terminal, only in the memory readable by the reading terminal. When the key information matching the first key exists, the terminal is started, even if the software and hardware data of the terminal is leaked, and the terminal cannot be started due to lack of the key information, the present invention improves the use of the terminal. Security.
附图说明DRAWINGS
图1为本发明终端启动方法第一实施例的流程示意图;1 is a schematic flowchart of a first embodiment of a method for starting a terminal according to the present invention;
图2为本发明读取终端可读取的存储器,确定所述存储器中是否存在与所述第一密钥匹配的密钥信息较佳实施例的流程示意图;2 is a schematic flow chart of a preferred embodiment of the present invention for reading a memory readable by a read terminal, and determining whether there is key information matching the first key in the memory;
图3为本发明在所述存储器中存在与所述第一密钥匹配的密钥信息时,启动所述终端较佳实施例的流程示意图;3 is a schematic flowchart of a preferred embodiment of starting the terminal when there is key information matching the first key in the memory according to the present invention;
图4为本发明终端启动方法第四实施例的流程示意图;4 is a schematic flowchart of a fourth embodiment of a method for starting a terminal according to the present invention;
图5为本发明终端启动装置第一实施例的功能模块示意图;5 is a schematic diagram of functional modules of a first embodiment of a terminal starting device according to the present invention;
图6为图5中处理模块较佳实施例的功能模块示意图;6 is a schematic diagram of functional modules of the preferred embodiment of the processing module of FIG. 5;
图7为图5中启动模块较佳实施例的功能模块示意图;7 is a schematic diagram of functional modules of the preferred embodiment of the boot module of FIG. 5;
图8为本发明终端启动装置第四实施例的功能模块示意图。FIG. 8 is a schematic diagram of functional modules of a fourth embodiment of a terminal starting device according to the present invention.
本发明目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。The implementation, functional features, and advantages of the present invention will be further described in conjunction with the embodiments.
具体实施方式detailed description
应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。It is understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
本发明提供一种终端启动方法。The invention provides a terminal starting method.
参照图1,图1为本发明终端启动方法第一实施例的流程示意图。Referring to FIG. 1, FIG. 1 is a schematic flowchart diagram of a first embodiment of a method for starting a terminal according to the present invention.
本实施例提出一种终端启动方法,所述终端启动方法包括:This embodiment provides a terminal startup method, where the terminal startup method includes:
步骤S10,在检测到终端启动指令时,基于所述终端启动指令获取终端的集成芯片中预设的第一密钥;Step S10: When detecting the terminal startup instruction, acquire the first key preset in the integrated chip of the terminal based on the terminal startup instruction;
在本实施例中,所述步骤S10之前包括步骤:在检测到基于所述集成芯片配置的第一密钥时,存储所述第一密钥。终端的集成芯片也就是集成电路板(integrated circuit,IC),集成芯片在生成时,先存储配置的第一密钥,所述第一密钥就是安全key,相当于启动终端时的安全密码中的其中一组,并结合匹配的另一组密钥才能启动终端。进一步地,为提高终端使用的安全性,优选在不同集成芯片即IC芯片中配置不同的第一密钥,例如,有12000个IC芯片,优选对每1000个IC芯片配置一种第一密钥,则12000个IC芯片即可配置12种不同的第一密钥,可以理解的是,所述12种不同的第一密钥仅仅是根据具体的情况进行设置的,可以设置为1种,也可设置为更多种。本实施例中的终端不仅包括电视、电脑、手机或机顶盒等移动终端,还可包括冰箱、空调以及其它各类移动终端。In this embodiment, the step S10 includes the step of: storing the first key when detecting the first key based on the integrated chip configuration. The integrated chip of the terminal is also an integrated circuit board (integrated Circuit, IC), when the integrated chip is generated, the first key of the configuration is first stored, and the first key is a security key, which is equivalent to one of the security passwords when the terminal is started, and combined with another matching The group key can be used to start the terminal. Further, in order to improve the security of the terminal, it is preferable to configure different first keys in different integrated chips, that is, IC chips, for example, there are 12,000 IC chips, and preferably one first key is configured for every 1000 IC chips. The 12000 IC chips can be configured with 12 different first keys. It can be understood that the 12 different first keys are only set according to specific conditions, and can be set to one type. Can be set to more species. The terminal in this embodiment includes not only mobile terminals such as a television, a computer, a mobile phone, or a set top box, but also a refrigerator, an air conditioner, and other types of mobile terminals.
在本实施例中,所述终端启动指令的触发方式优选为用户触发终端预设的开机按钮以触发终端启动指令,或者是通过预设的语音指令触发终端的启动指令。在检测到终端启动指令时,所述终端基于所述终端启动指令获取终端的集成芯片中预设的第一密钥,值得注意的是,当所述第一密钥存储在所述终端的集成芯片时,是以加密的形式存储的,所述加密通过预设的AES加密算法进行加密的,而在终端准备读取所述第一密钥时,终端先对所述加密的第一密钥进行解密,然后读取解密后的第一密钥。本实施例中的第一密钥在读取时,终端对所述第一密钥进行解密读取,在存储时通过加密进行存储,提高了第一密钥存储的安全性。In this embodiment, the triggering mode of the terminal startup command is preferably that the user triggers the power button preset by the terminal to trigger the terminal startup command, or triggers the terminal startup command by using a preset voice command. When detecting the terminal startup instruction, the terminal acquires a first key preset in the integrated chip of the terminal based on the terminal startup instruction, and it is noted that when the first key is stored in the terminal integration The chip is stored in an encrypted form, and the encryption is encrypted by a preset AES encryption algorithm, and when the terminal is ready to read the first key, the terminal first encrypts the first key. Decrypt, and then read the decrypted first key. When the first key in this embodiment is read, the terminal decrypts and reads the first key, and stores it by encryption during storage, thereby improving the security of the first key storage.
步骤S20,读取终端可读取的存储器,确定所述存储器中是否存在与所述第一密钥匹配的密钥信息;Step S20, reading a memory readable by the terminal, determining whether there is key information matching the first key in the memory;
在本实施例中,所述可读取的存储器包括终端的内置存储器和/或与所述终端连接的移动存储设备。所述内置存储器优选包括内存、闪存或缓存,所述移动存储设备优选包括U盘或移动硬盘等。In this embodiment, the readable memory includes a built-in memory of the terminal and/or a mobile storage device connected to the terminal. The built-in memory preferably includes a memory, a flash memory or a cache, and the mobile storage device preferably includes a USB flash drive or a mobile hard disk or the like.
在本实施例中,所述步骤S20的实施方式包括:In this embodiment, the implementation manner of the step S20 includes:
1)方式一、当所述读取的存储器为终端的内置存储器时,则终端读取所述终端的内置存储器,确定所述内置存储器中是否存在与所述第一密钥匹配的第二密钥。本实施例中以闪存(如flash,全名Flash EEPROM Memory)为例,则所述确定所述闪存中是否存在与所述第一密钥匹配的第二密钥的方式优选为:终端先解密所述第二密钥,在对所述第二密钥解密后,将解密后的第二密钥与解密后的第一密钥进行比对,以确定所述解密后的第一密钥与所述解密后的第二密钥是否匹配,所述匹配表示所述解密后的第二密钥对应的数据与所述解密后的第一密钥对应的数据完全一致,如果两者数据完全一致,说明所述第一密钥与所述第二密钥匹配。可以理解的是,在终端初次上电时,所述终端的闪存中不存在所述第二密钥,也就是在终端的闪存中未保存有与所述第一密钥匹配的第二密钥。若所述闪存中存在与所述第一密钥匹配的第二密钥,说明所述终端已经完成初次上电,并在完成初次上电启动后,会在闪存中存储与所述第一密钥匹配的第二密钥,则在以后的终端启动过程中,终端可直接将所述第一密钥和所述第二密钥进行匹配,以启动所述终端。1) Method 1: When the read memory is a built-in memory of the terminal, the terminal reads the built-in memory of the terminal, and determines whether there is a second key in the built-in memory that matches the first key. key. In this embodiment, flash memory (such as flash, full name flash) EEPROM For example, the method for determining whether the second key matching the first key exists in the flash memory is preferably: the terminal decrypts the second key first, and the second key is After the key is decrypted, the decrypted second key is compared with the decrypted first key to determine whether the decrypted first key matches the decrypted second key. The data corresponding to the decrypted second key is completely consistent with the data corresponding to the decrypted first key. If the data is completely consistent, the first key and the second key are Key match. It can be understood that, when the terminal is powered on for the first time, the second key does not exist in the flash memory of the terminal, that is, the second key that matches the first key is not saved in the flash memory of the terminal. . If the second key matching the first key exists in the flash memory, the terminal has completed initial power-on, and after completing the initial power-on startup, stores the first secret in the flash memory. The key matching the second key, the terminal may directly match the first key and the second key to start the terminal in a later terminal startup process.
2)方式二、当所述读取的存储器为与终端连接的移动存储设备时,则终端读取所述移动存储设备,确定所述移动存储设备中是否存在与所述第一密钥匹配的第三密钥。本实施例中所述确定所述移动存储设备中是否存在与所述第一密钥匹配的第三密钥的方式优选为:先轮循读取所述移动存储设备预存的各个密钥信息,所述读取方式优选为先对各个密钥信息进行逐个解密,并将解密后的密钥信息与终端的集成芯片中解密后的第一密钥进行比对,在检测到与所述解密后的第一密钥匹配的密钥信息,则将所述匹配的密钥信息作为第三密钥,并获取所述第三密钥,所述匹配表示所述解密后的第三密钥对应的数据与所述解密后的第一密钥对应的数据完全一致,如果两者数据完全一致,说明所述第一密钥与所述第三密钥匹配。本实施例中,优选所述移动存储设备存储多种不同的密钥信息,移动存储设备中存储的多种不同密钥信息,可以实现一个移动存储设备对多种不同的终端拷贝对应的密钥信息,提高了移动存储设备使用的灵活性。2) mode 2, when the read memory is a mobile storage device connected to the terminal, the terminal reads the mobile storage device, and determines whether the mobile storage device has a match with the first key. The third key. The method for determining whether the third key matching the first key exists in the mobile storage device in the embodiment is preferably: firstly, reading each key information pre-stored by the mobile storage device, Preferably, the reading mode first decrypts each key information one by one, and compares the decrypted key information with the decrypted first key in the integrated chip of the terminal, after detecting the decryption Key information of the first key matching, the matching key information is used as a third key, and the third key is obtained, and the matching represents the decrypted third key corresponding to The data is completely consistent with the data corresponding to the decrypted first key. If the two data are completely consistent, the first key is matched with the third key. In this embodiment, the mobile storage device stores a plurality of different key information, and a plurality of different key information stored in the mobile storage device, so that a key corresponding to a plurality of different terminal copies of the mobile storage device can be implemented. Information that increases the flexibility of mobile storage device usage.
步骤S30,在所述存储器中存在与所述第一密钥匹配的密钥信息时,启动所述终端。Step S30: When there is key information matching the first key in the memory, the terminal is started.
在本实施例中,在所述存储器中存在与所述第一密钥匹配的密钥信息时,即在所述内置存储器中存在与所述第一密钥匹配的第二密钥时,启动所述终端;或者是在所述移动存储设备中存在与所述第一密钥匹配的第三密钥时,启动所述终端。In this embodiment, when there is key information matching the first key in the memory, that is, when there is a second key matching the first key in the built-in memory, start And the terminal is started when the third key matching the first key exists in the mobile storage device.
本实施例提出的终端启动方法,在终端配置好软硬件数据的基础上检测到终端启动指令时,先获取终端的集成芯片中预设的第一密钥,然后在读取终端可读取的存储器,确定所述存储器中是否存在与所述第一密钥匹配的密钥信息,在所述存储器中存在与所述第一密钥匹配的密钥信息时,启动所述终端,而不是在配置好软硬件数据的基础上检测到终端启动指令,直接就启动所述终端,本方案在终端的集成芯片中预设了第一密钥,仅当读取终端可读取的存储器中,存在与所述第一密钥匹配的密钥信息时,才启动所述终端,即使终端的软硬件数据被泄露,而由于缺少密钥信息,也无法启动所述终端,本发明提高了终端使用的安全性。The terminal startup method in the embodiment, when the terminal startup command is detected on the basis of the configuration of the software and hardware data, the first key preset in the integrated chip of the terminal is acquired first, and then the read terminal is readable. a memory, determining whether there is key information matching the first key in the memory, and when there is key information matching the first key in the memory, starting the terminal instead of After the hardware and software data is configured, the terminal startup command is detected, and the terminal is directly started. The first key is preset in the integrated chip of the terminal, and only exists in the memory readable by the reading terminal. When the key information is matched with the first key, the terminal is started, and even if the software and hardware data of the terminal is leaked, the terminal cannot be started due to lack of key information, and the present invention improves the use of the terminal. safety.
进一步地,为了提高终端启动的灵活性,基于第一实施例提出本发明终端启动方法的第二实施例,在本实施例中,参照图2,所述步骤S20包括:Further, in order to improve the flexibility of the terminal startup, a second embodiment of the terminal activation method of the present invention is proposed based on the first embodiment. In this embodiment, referring to FIG. 2, the step S20 includes:
步骤S21,读取终端的内置存储器,确定所述内置存储器中是否存在与所述第一密钥匹配的第二密钥;Step S21, reading a built-in memory of the terminal, determining whether there is a second key matching the first key in the built-in memory;
步骤S22,若所述内置存储器中不存在与所述第一密钥匹配的第二密钥,读取与所述终端连接的移动存储设备;Step S22, if there is no second key matching the first key in the built-in memory, reading a mobile storage device connected to the terminal;
步骤S23,确定所述移动存储设备中是否存在与所述第一密钥匹配的第三密钥。Step S23, determining whether a third key matching the first key exists in the mobile storage device.
在本实施例中,所述终端优选先读取所述终端的内置存储器,并确定所述内置存储器中是否存在与所述第一密钥匹配的第二密钥,所述确定方式为终端先解密所述第二密钥,在对所述第二密钥解密后,将解密后的第二密钥与解密后的第一密钥进行比对,以确定所述解密后的第一密钥与所述解密后的第二密钥是否匹配,所述匹配表示所述解密后的第二密钥对应的数据与所述解密后的第一密钥对应的数据完全一致,如果两者数据不一致,说明所述第一密钥与所述第二密钥不匹配,即所述终端的内置存储器中不存在与所述第一密钥匹配的第二密钥。此时,所述终端读取与所述终端连接的移动存储设备,并确定所述移动存储设备中是否存在与所述第一密钥匹配的第三密钥,所述确定所述移动存储设备中是否存在与所述第一密钥匹配的第三密钥的方式优选为:先轮循读取所述移动存储设备预存的各个密钥信息,所述读取方式优选为先对各个密钥信息进行逐个解密,并将解密后的密钥信息与终端的集成芯片中解密后的第一密钥进行比对,在检测到与所述解密后的第一密钥匹配的密钥信息,则将所述匹配的密钥信息作为第三密钥,并获取所述第三密钥,所述匹配表示所述解密后的第三密钥对应的数据与所述解密后的第一密钥对应的数据完全一致,根据两者数据是否一致,以确定说明所述第一密钥与所述第三密钥是否匹配。In this embodiment, the terminal preferably reads the built-in memory of the terminal, and determines whether there is a second key that matches the first key in the built-in memory, where the determining manner is the terminal first. Decrypting the second key, after decrypting the second key, comparing the decrypted second key with the decrypted first key to determine the decrypted first key Whether the data corresponding to the decrypted second key is completely consistent with the data corresponding to the decrypted first key, if the decrypted second key matches, if the data is inconsistent The first key does not match the second key, that is, the second key that matches the first key does not exist in the built-in memory of the terminal. At this time, the terminal reads the mobile storage device connected to the terminal, and determines whether there is a third key that matches the first key in the mobile storage device, and the determining the mobile storage device Preferably, the manner in which the third key matching the first key is present is: firstly, each key information pre-stored by the mobile storage device is read in a round-robin manner, and the reading manner is preferably first for each key. The information is decrypted one by one, and the decrypted key information is compared with the decrypted first key in the integrated chip of the terminal, and after detecting the key information matching the decrypted first key, And using the matched key information as a third key, and acquiring the third key, where the matching indicates that the data corresponding to the decrypted third key corresponds to the decrypted first key The data is completely consistent, according to whether the two data are consistent, to determine whether the first key matches the third key.
进一步地,为了提高终端启动的灵活性,基于第二实施例提出本发明终端启动方法的第三实施例,在本实施例中,参照图3,所述步骤S30包括:Further, in order to improve the flexibility of the terminal startup, a third embodiment of the terminal activation method of the present invention is proposed based on the second embodiment. In this embodiment, referring to FIG. 3, the step S30 includes:
步骤S31,在所述移动存储设备中存在与所述第一密钥匹配的第三密钥时,将所述第三密钥作为第二密钥加密存储至终端的内置存储器中;Step S31, when there is a third key matching the first key in the mobile storage device, the third key is encrypted and stored as a second key in a built-in memory of the terminal;
步骤S32,根据所述内置存储器中存储的所述第二密钥,启动所述终端。Step S32, starting the terminal according to the second key stored in the built-in memory.
在本实施例中,若所述移动存储设备中存在与所述第一密钥匹配的第三密钥时,In this embodiment, if there is a third key in the mobile storage device that matches the first key,
在本实施例中,在所述终端的内置存储器中不存在与所述第一密钥匹配的第二密钥时,而所述移动存储设备中存在与所述第一密钥匹配的第三密钥时,说明所述存储器中存储与所述第一密钥匹配的密钥信息了,此时,为提高数据存储的安全性,优选将所述移动存储设备中的第三密钥作为第二密钥加密存储至终端的内置存储器中,可以理解的是,所述第二密钥和所述第三密钥是完全一样的,只是把移动存储设备中的第三密钥存储到内置存储器中,命名为第二密钥,最后,根据所述内置存储器中存储的所述第二密钥,启动所述终端,实现了在存储数据时加密存储,读取数据时才解密读取,提高了终端启动的安全性。In this embodiment, when there is no second key matching the first key in the built-in memory of the terminal, the mobile storage device has a third match with the first key. In the case of a key, the key information matching the first key is stored in the memory. In this case, to improve the security of the data storage, the third key in the mobile storage device is preferably used as the first key. The two-key encryption is stored in the built-in memory of the terminal. It can be understood that the second key and the third key are exactly the same, but the third key in the mobile storage device is stored in the built-in memory. Named as the second key, and finally, the terminal is activated according to the second key stored in the built-in memory, and the encrypted storage is realized when the data is stored, and the decryption is read when the data is read, thereby improving The security of the terminal startup.
进一步地,在终端的内置存储器中未保存有与所述第一密钥匹配的第二密钥且所述内置存储器中存在密钥信息时,先确定所述密钥信息与所述移动存储设备中的第三密钥是否一致,所述确定方式优选为先对所述第三密钥与所述密钥信息进行解密,然后将解密后的的所述第三密钥对应的数据与所述密钥信息对应的数据进行比对,以确定所述第三密钥与所述密钥信息是否一致,若所述密钥信息与所述移动存储设备中的第三密钥不一致,说明所述移动存储设备中存储的第三密钥已经更新,则可优选将所述内置存储器中的密钥信息更新为所述移动存储设备中的第三密钥,然后将更新后的第三密钥作为第二密钥存储至终端的内置存储器中,并启动所述终端。也就是说,当终端集成芯片中的第一密钥信息泄露时,可优选对所述集成芯片的第一密钥进行更改,并用所述移动存储设备重新拷贝新的密钥与所述第一密钥进行匹配,即本实施例中所述的将所述内置存储器中的密钥信息更新为所述移动存储设备中的第三密钥。Further, when the second key matching the first key is not stored in the built-in memory of the terminal and the key information exists in the built-in memory, the key information and the mobile storage device are first determined. Whether the third key is consistent, the determining manner is preferably to decrypt the third key and the key information, and then the data corresponding to the decrypted third key and the Comparing the data corresponding to the key information to determine whether the third key is consistent with the key information, and if the key information is inconsistent with the third key in the mobile storage device, If the third key stored in the mobile storage device has been updated, the key information in the built-in memory may be preferably updated to a third key in the mobile storage device, and then the updated third key is used as The second key is stored in the built-in memory of the terminal and the terminal is activated. That is, when the first key information in the terminal integrated chip is leaked, the first key of the integrated chip may be preferably modified, and the new key and the first one are re-copied with the mobile storage device. The key is matched, that is, the key information in the built-in memory is updated to the third key in the mobile storage device as described in this embodiment.
进一步地,为了提高终端启动的灵活性,基于第一、第二、第三实施例提出本发明终端启动方法的第四实施例,在本实施例中,参照图4,所述步骤S20之后,所述终端启动方法还包括:Further, in order to improve the flexibility of the terminal startup, a fourth embodiment of the terminal activation method of the present invention is proposed based on the first, second, and third embodiments. In this embodiment, referring to FIG. 4, after the step S20, The terminal startup method further includes:
步骤S60,在所述存储器中不存在与所述第一密钥匹配的密钥信息时,输出告警信息。Step S60: When there is no key information matching the first key in the memory, the alarm information is output.
在本实施例中,在所述存储器中不存在与所述第一密钥匹配的密钥信息时,说明所述存储器中的所有密钥信息与集成芯片中预存的第一密钥都不匹配,则可确定终端启动失败,并输出告警信息,如在所述移动存储设备预设的LED等发出闪烁信号,以提示用户当前终端启动失败,可以将所述终端连接其它的移动存储设备。In this embodiment, when there is no key information matching the first key in the memory, it is indicated that all the key information in the memory does not match the first key pre-stored in the integrated chip. Then, the terminal can be determined to fail to start, and the alarm information is output. If a flashing signal is sent on the preset LED of the mobile storage device to prompt the user that the current terminal fails to start, the terminal can be connected to other mobile storage devices.
本发明进一步提供一种终端启动装置。The invention further provides a terminal starting device.
参照图5,图5为本发明终端启动装置第一实施例的功能模块示意图。Referring to FIG. 5, FIG. 5 is a schematic diagram of functional modules of a first embodiment of a terminal starting device according to the present invention.
需要强调的是,对本领域的技术人员来说,图5所示功能模块图仅仅是一个较佳实施例的示例图,本领域的技术人员围绕图5所示的终端启动装置的功能模块,可轻易进行新的功能模块的补充;各功能模块的名称是自定义名称,仅用于辅助理解该终端启动装置的各个程序功能块,不用于限定本发明的技术方案,本发明技术方案的核心是,各自定义名称的功能模块所要达成的功能。It should be emphasized that, for those skilled in the art, the functional block diagram shown in FIG. 5 is merely an exemplary embodiment of a preferred embodiment, and those skilled in the art can surround the functional modules of the terminal starting device shown in FIG. It is easy to add a new function module; the name of each function module is a custom name, which is only used to assist in understanding the various program function blocks of the terminal activation device, and is not used to limit the technical solution of the present invention. The core of the technical solution of the present invention is , the function to be achieved by the function module of each name.
本实施例提出一种终端启动装置,所述终端启动装置包括:This embodiment provides a terminal starting device, where the terminal starting device includes:
获取模块10,用于在检测到终端启动指令时,基于所述终端启动指令获取终端的集成芯片中预设的第一密钥;The obtaining module 10 is configured to acquire, according to the terminal startup instruction, a first key preset in an integrated chip of the terminal, when the terminal startup instruction is detected;
在本实施例中,所述终端启动装置包括存储模块,所述存储模块用于在检测到基于所述集成芯片配置的第一密钥时,存储所述第一密钥。终端的集成芯片也就是集成电路板(integrated circuit,IC),集成芯片在生成时,所述存储模块先存储配置的第一密钥,所述第一密钥就是安全key,相当于启动终端时的安全密码中的其中一组,并结合匹配的另一组密钥才能启动终端。进一步地,为提高终端使用的安全性,优选在不同集成芯片即IC芯片中配置不同的第一密钥,例如,有12000个IC芯片,优选对每1000个IC芯片配置一种第一密钥,则12000个IC芯片即可配置12种不同的第一密钥,可以理解的是,所述12种不同的第一密钥仅仅是根据具体的情况进行设置的,可以设置为1种,也可设置为更多种。本实施例中的终端启动装置不仅包括电视、电脑、手机或机顶盒等移动终端,还可包括冰箱、空调以及其它各类移动终端。In this embodiment, the terminal activation device includes a storage module, and the storage module is configured to store the first key when detecting the first key based on the integrated chip configuration. The integrated chip of the terminal is also an integrated circuit board (integrated Circuit, IC), when the integrated chip is generated, the storage module first stores the first key configured, and the first key is a security key, which is equivalent to one of the security passwords when the terminal is started, and is combined Match another set of keys to start the terminal. Further, in order to improve the security of the terminal, it is preferable to configure different first keys in different integrated chips, that is, IC chips, for example, there are 12,000 IC chips, and preferably one first key is configured for every 1000 IC chips. The 12000 IC chips can be configured with 12 different first keys. It can be understood that the 12 different first keys are only set according to specific conditions, and can be set to one type. Can be set to more species. The terminal activation device in this embodiment includes not only mobile terminals such as a television, a computer, a mobile phone, or a set top box, but also a refrigerator, an air conditioner, and other types of mobile terminals.
在本实施例中,所述终端启动指令的触发方式优选为用户触发终端预设的开机按钮以触发终端启动指令,或者是通过预设的语音指令触发终端的启动指令。在检测到终端启动指令时,所述获取模块10基于所述终端启动指令获取终端的集成芯片中预设的第一密钥,值得注意的是,当所述第一密钥存储在所述终端的集成芯片时,是以加密的形式存储的,所述加密通过预设的AES加密算法进行加密的,而在终端准备读取所述第一密钥时,先对所述加密的第一密钥进行解密,然后读取解密后的第一密钥。本实施例中的第一密钥在读取时,终端对所述第一密钥进行解密读取,在存储时通过加密进行存储,提高了第一密钥存储的安全性。In this embodiment, the triggering mode of the terminal startup command is preferably that the user triggers the power button preset by the terminal to trigger the terminal startup command, or triggers the terminal startup command by using a preset voice command. When the terminal startup command is detected, the acquiring module 10 acquires a first key preset in the integrated chip of the terminal based on the terminal startup instruction, and it is noted that when the first key is stored in the terminal When the integrated chip is stored in an encrypted form, the encryption is encrypted by a preset AES encryption algorithm, and when the terminal is ready to read the first key, the encrypted first secret is first The key is decrypted and then the decrypted first key is read. When the first key in this embodiment is read, the terminal decrypts and reads the first key, and stores it by encryption during storage, thereby improving the security of the first key storage.
处理模块20,用于读取终端可读取的存储器,确定所述存储器中是否存在与所述第一密钥匹配的密钥信息;The processing module 20 is configured to read a memory readable by the terminal, and determine whether there is key information in the memory that matches the first key;
在本实施例中,所述可读取的存储器包括终端的内置存储器和/或与所述终端连接的移动存储设备。所述内置存储器优选包括内存、闪存或缓存,所述移动存储设备优选包括U盘或移动硬盘等。In this embodiment, the readable memory includes a built-in memory of the terminal and/or a mobile storage device connected to the terminal. The built-in memory preferably includes a memory, a flash memory or a cache, and the mobile storage device preferably includes a USB flash drive or a mobile hard disk or the like.
在本实施例中,所述处理模块20读取终端可读取的存储器,确定所述存储器中是否存在与所述第一密钥匹配的密钥信息的实施方式包括:In this embodiment, the processing module 20 reads the memory readable by the terminal, and determines whether the key information matching the first key exists in the memory, including:
1)方式一、当所述读取的存储器为终端的内置存储器时,则所述处理模块20读取所述终端的内置存储器,确定所述内置存储器中是否存在与所述第一密钥匹配的第二密钥。本实施例中以闪存(如flash,全名Flash EEPROM Memory)为例,则所述处理模块20确定所述闪存中是否存在与所述第一密钥匹配的第二密钥的方式优选为:所述处理模块20先解密所述第二密钥,在对所述第二密钥解密后,将解密后的第二密钥与解密后的第一密钥进行比对,以确定所述解密后的第一密钥与所述解密后的第二密钥是否匹配,所述匹配表示所述解密后的第二密钥对应的数据与所述解密后的第一密钥对应的数据完全一致,如果两者数据完全一致,说明所述第一密钥与所述第二密钥匹配。可以理解的是,在终端初次上电时,所述终端的闪存中不存在所述第二密钥,也就是在终端的闪存中未保存有与所述第一密钥匹配的第二密钥。若所述闪存中存在与所述第一密钥匹配的第二密钥,说明所述终端已经完成初次上电,并在完成初次上电启动后,所述处理模块20会在闪存中存储与所述第一密钥匹配的第二密钥,则在以后的终端启动过程中,所述处理模块20可直接将所述第一密钥和所述第二密钥进行匹配,以启动所述终端。1) mode 1. When the read memory is a built-in memory of the terminal, the processing module 20 reads the built-in memory of the terminal, and determines whether the built-in memory matches the first key. The second key. In this embodiment, flash memory (such as flash, full name flash) EEPROM For example, the processing module 20 determines whether the second key matching the first key exists in the flash memory. The processing module 20 first decrypts the second key. After decrypting the second key, comparing the decrypted second key with the decrypted first key to determine the decrypted first key and the decrypted second key Whether the key matches, the matching indicates that the data corresponding to the decrypted second key is completely consistent with the data corresponding to the decrypted first key, and if the two data are completely consistent, the first secret is indicated The key matches the second key. It can be understood that, when the terminal is powered on for the first time, the second key does not exist in the flash memory of the terminal, that is, the second key that matches the first key is not saved in the flash memory of the terminal. . If the second key matching the first key exists in the flash memory, the terminal has completed initial power-on, and after completing the initial power-on startup, the processing module 20 stores in the flash memory. The second key matched by the first key, in the subsequent terminal startup process, the processing module 20 may directly match the first key and the second key to start the terminal.
2)方式二、当所述读取的存储器为与终端连接的移动存储设备时,则所述处理模块20读取所述移动存储设备,确定所述移动存储设备中是否存在与所述第一密钥匹配的第三密钥。本实施例中所述处理模块20确定所述移动存储设备中是否存在与所述第一密钥匹配的第三密钥的方式优选为:先轮循读取所述移动存储设备预存的各个密钥信息,所述读取方式优选为先对各个密钥信息进行逐个解密,并将解密后的密钥信息与终端的集成芯片中解密后的第一密钥进行比对,在检测到与所述解密后的第一密钥匹配的密钥信息,则将所述匹配的密钥信息作为第三密钥,并获取所述第三密钥,所述匹配表示所述解密后的第三密钥对应的数据与所述解密后的第一密钥对应的数据完全一致,如果两者数据完全一致,说明所述第一密钥与所述第三密钥匹配。本实施例中,优选所述移动存储设备存储多种不同的密钥信息,移动存储设备中存储的多种不同密钥信息,可以实现一个移动存储设备对多种不同的终端拷贝对应的密钥信息,提高了移动存储设备使用的灵活性。2) mode 2, when the read memory is a mobile storage device connected to the terminal, the processing module 20 reads the mobile storage device, and determines whether the mobile storage device exists and the first The third key that the key matches. The method for determining, by the processing module 20 in the embodiment, whether the third key matching the first key exists in the mobile storage device is: firstly reading the pre-stored secrets of the mobile storage device The key information is preferably obtained by first decrypting each key information one by one, and comparing the decrypted key information with the decrypted first key in the integrated chip of the terminal, and detecting the Defining the decrypted first key matching key information, using the matched key information as a third key, and acquiring the third key, the matching indicating the decrypted third secret The data corresponding to the key is completely consistent with the data corresponding to the decrypted first key. If the two data are completely consistent, the first key is matched with the third key. In this embodiment, the mobile storage device stores a plurality of different key information, and a plurality of different key information stored in the mobile storage device, so that a key corresponding to a plurality of different terminal copies of the mobile storage device can be implemented. Information that increases the flexibility of mobile storage device usage.
启动模块30,用于在所述存储器中存在与所述第一密钥匹配的密钥信息时,启动所述终端。The startup module 30 is configured to start the terminal when there is key information matching the first key in the memory.
在本实施例中,在所述存储器中存在与所述第一密钥匹配的密钥信息时,即在所述内置存储器中存在与所述第一密钥匹配的第二密钥时,所述启动模块30启动所述终端;或者是在所述移动存储设备中存在与所述第一密钥匹配的第三密钥时,所述启动模块30启动所述终端。In this embodiment, when there is key information matching the first key in the memory, that is, when there is a second key matching the first key in the built-in memory, The startup module 30 starts the terminal; or when the third key matching the first key exists in the mobile storage device, the startup module 30 starts the terminal.
本实施例提出的终端启动装置,在终端配置好软硬件数据的基础上检测到终端启动指令时,先获取终端的集成芯片中预设的第一密钥,然后在读取终端可读取的存储器,确定所述存储器中是否存在与所述第一密钥匹配的密钥信息,在所述存储器中存在与所述第一密钥匹配的密钥信息时,启动所述终端,而不是在配置好软硬件数据的基础上检测到终端启动指令,直接就启动所述终端,本方案在终端的集成芯片中预设了第一密钥,仅当读取终端可读取的存储器中,存在与所述第一密钥匹配的密钥信息时,才启动所述终端,即使终端的软硬件数据被泄露,而由于缺少密钥信息,也无法启动所述终端,本发明提高了终端使用的安全性。The terminal starting device of the present embodiment first acquires a first key preset in the integrated chip of the terminal when the terminal starts the command, and then reads the readable terminal at the reading terminal. a memory, determining whether there is key information matching the first key in the memory, and when there is key information matching the first key in the memory, starting the terminal instead of After the hardware and software data is configured, the terminal startup command is detected, and the terminal is directly started. The first key is preset in the integrated chip of the terminal, and only exists in the memory readable by the reading terminal. When the key information is matched with the first key, the terminal is started, and even if the software and hardware data of the terminal is leaked, the terminal cannot be started due to lack of key information, and the present invention improves the use of the terminal. safety.
进一步地,为了提高终端启动的灵活性,基于第一实施例提出本发明终端启动装置的第二实施例,在本实施例中,参照图6,所述处理模块20包括:Further, in order to improve the flexibility of the terminal startup, a second embodiment of the terminal activation device of the present invention is proposed based on the first embodiment. In this embodiment, referring to FIG. 6, the processing module 20 includes:
处理单元21,用于读取终端的内置存储器,确定所述内置存储器中是否存在与所述第一密钥匹配的第二密钥;The processing unit 21 is configured to read a built-in memory of the terminal, and determine whether a second key matching the first key exists in the built-in memory;
读取单元22,用于若所述内置存储器中不存在与所述第一密钥匹配的第二密钥,读取与所述终端连接的移动存储设备;The reading unit 22 is configured to: if there is no second key matching the first key in the built-in memory, read a mobile storage device connected to the terminal;
确定单元23,用于确定所述移动存储设备中是否存在与所述第一密钥匹配的第三密钥。The determining unit 23 is configured to determine whether a third key matching the first key exists in the mobile storage device.
在本实施例中,所述处理单元21优选先读取所述终端的内置存储器,并确定所述内置存储器中是否存在与所述第一密钥匹配的第二密钥,所述处理单元21确定方式为终端先解密所述第二密钥,在对所述第二密钥解密后,将解密后的第二密钥与解密后的第一密钥进行比对,以确定所述解密后的第一密钥与所述解密后的第二密钥是否匹配,所述匹配表示所述解密后的第二密钥对应的数据与所述解密后的第一密钥对应的数据完全一致,如果两者数据不一致,说明所述第一密钥与所述第二密钥不匹配,即所述终端的内置存储器中不存在与所述第一密钥匹配的第二密钥。此时,所述读取单元22读取与所述终端连接的移动存储设备,并确定所述移动存储设备中是否存在与所述第一密钥匹配的第三密钥,所述确定单元23确定所述移动存储设备中是否存在与所述第一密钥匹配的第三密钥的方式优选为:先轮循读取所述移动存储设备预存的各个密钥信息,所述读取方式优选为先对各个密钥信息进行逐个解密,并将解密后的密钥信息与终端的集成芯片中解密后的第一密钥进行比对,在检测到与所述解密后的第一密钥匹配的密钥信息,则将所述匹配的密钥信息作为第三密钥,并获取所述第三密钥,所述匹配表示所述解密后的第三密钥对应的数据与所述解密后的第一密钥对应的数据完全一致,根据两者数据是否一致,以确定说明所述第一密钥与所述第三密钥是否匹配。In this embodiment, the processing unit 21 preferably reads the built-in memory of the terminal first, and determines whether there is a second key in the built-in memory that matches the first key, and the processing unit 21 The determining manner is that the terminal first decrypts the second key, and after decrypting the second key, comparing the decrypted second key with the decrypted first key to determine the decrypted Whether the first key matches the decrypted second key, and the matching indicates that the data corresponding to the decrypted second key is completely consistent with the data corresponding to the decrypted first key. If the data of the two are inconsistent, the first key does not match the second key, that is, the second key that matches the first key does not exist in the built-in memory of the terminal. At this time, the reading unit 22 reads the mobile storage device connected to the terminal, and determines whether there is a third key matching the first key in the mobile storage device, and the determining unit 23 Determining whether the third key matching the first key exists in the mobile storage device is preferably: firstly reading each key information pre-stored by the mobile storage device, the reading mode is preferred First, each key information is decrypted one by one, and the decrypted key information is compared with the decrypted first key in the integrated chip of the terminal, and the first key that is decrypted is detected to be matched. Key information, the matching key information is used as a third key, and the third key is obtained, and the matching represents data corresponding to the decrypted third key and the decrypted The data corresponding to the first key is completely consistent, according to whether the two data are consistent, to determine whether the first key matches the third key.
进一步地,为了提高终端启动的灵活性,基于第二实施例提出本发明终端启动装置的第三实施例,在本实施例中,参照图7,所述启动模块30包括:Further, in order to improve the flexibility of the terminal startup, a third embodiment of the terminal activation device of the present invention is proposed based on the second embodiment. In this embodiment, referring to FIG. 7, the startup module 30 includes:
存储单元31,用于在所述移动存储设备中存在与所述第一密钥匹配的第三密钥时,将所述第三密钥作为第二密钥加密存储至终端的内置存储器中;The storage unit 31 is configured to: when the third key matching the first key exists in the mobile storage device, encrypt the third key as a second key into a built-in memory of the terminal;
启动单元32,用于根据所述内置存储器中存储的所述第二密钥,启动所述终端。The startup unit 32 is configured to start the terminal according to the second key stored in the built-in memory.
在本实施例中,在所述终端的内置存储器中不存在与所述第一密钥匹配的第二密钥时,而所述移动存储设备中存在与所述第一密钥匹配的第三密钥时,说明所述存储器中存储与所述第一密钥匹配的密钥信息了,此时,为提高数据存储的安全性,优选所述存储单元31将所述移动存储设备中的第三密钥作为第二密钥加密存储至终端的内置存储器中,可以理解的是,所述第二密钥和所述第三密钥是完全一样的,只是把移动存储设备中的第三密钥存储到内置存储器中,命名为第二密钥,最后,根据所述内置存储器中存储的所述第二密钥,所述启动单元32启动所述终端,实现了在存储数据时加密存储,读取数据时才解密读取,提高了终端启动的安全性。In this embodiment, when there is no second key matching the first key in the built-in memory of the terminal, the mobile storage device has a third match with the first key. In the case of the key, the key information matching the first key is stored in the memory. In this case, to improve the security of the data storage, the storage unit 31 preferably selects the first in the mobile storage device. The third key is stored as a second key in the built-in memory of the terminal. It can be understood that the second key and the third key are exactly the same, except that the third key in the mobile storage device is used. The key is stored in the built-in memory and is named as the second key. Finally, according to the second key stored in the built-in memory, the booting unit 32 starts the terminal, and implements encrypted storage when storing data. The decryption is read only when the data is read, which improves the security of the terminal startup.
进一步地,在终端的内置存储器中未保存有与所述第一密钥匹配的第二密钥且所述内置存储器中存在密钥信息时,先确定所述密钥信息与所述移动存储设备中的第三密钥是否一致,所述确定方式优选为先对所述第三密钥与所述密钥信息进行解密,然后将解密后的的所述第三密钥对应的数据与所述密钥信息对应的数据进行比对,以确定所述第三密钥与所述密钥信息是否一致,若所述密钥信息与所述移动存储设备中的第三密钥不一致,说明所述移动存储设备中存储的第三密钥已经更新,则可优选将所述内置存储器中的密钥信息更新为所述移动存储设备中的第三密钥,然后所述存储单元31将更新后的第三密钥作为第二密钥存储至终端的内置存储器中,并且所述启动单元32启动所述终端。也就是说,当终端集成芯片中的第一密钥信息泄露时,可优选对所述集成芯片的第一密钥进行更改,并用所述移动存储设备重新拷贝新的密钥与所述第一密钥进行匹配,即本实施例中所述的将所述内置存储器中的密钥信息更新为所述移动存储设备中的第三密钥。Further, when the second key matching the first key is not stored in the built-in memory of the terminal and the key information exists in the built-in memory, the key information and the mobile storage device are first determined. Whether the third key is consistent, the determining manner is preferably to decrypt the third key and the key information, and then the data corresponding to the decrypted third key and the Comparing the data corresponding to the key information to determine whether the third key is consistent with the key information, and if the key information is inconsistent with the third key in the mobile storage device, If the third key stored in the mobile storage device has been updated, the key information in the built-in memory may be preferably updated to a third key in the mobile storage device, and then the storage unit 31 will be updated. The third key is stored as a second key in the built-in memory of the terminal, and the boot unit 32 activates the terminal. That is, when the first key information in the terminal integrated chip is leaked, the first key of the integrated chip may be preferably modified, and the new key and the first one are re-copied with the mobile storage device. The key is matched, that is, the key information in the built-in memory is updated to the third key in the mobile storage device as described in this embodiment.
进一步地,为了提高终端启动的灵活性,基于第一、第二、第三实施例提出本发明终端启动装置的第四实施例,在本实施例中,参照图8,所述终端启动装置还包括:Further, in order to improve the flexibility of the terminal startup, a fourth embodiment of the terminal activation device of the present invention is proposed based on the first, second, and third embodiments. In this embodiment, referring to FIG. 8, the terminal activation device further include:
输出模块40,用于在所述存储器中不存在与所述第一密钥匹配的密钥信息时,输出告警信息。The output module 40 is configured to output alarm information when there is no key information matching the first key in the memory.
在本实施例中,在所述存储器中不存在与所述第一密钥匹配的密钥信息时,说明所述存储器中的所有密钥信息与集成芯片中预存的第一密钥都不匹配,则可确定终端启动失败,所述输出模块40输出告警信息,如在所述移动存储设备预设的LED等发出闪烁信号,以提示用户当前终端启动失败,可以将所述终端连接其它的移动存储设备。In this embodiment, when there is no key information matching the first key in the memory, it is indicated that all the key information in the memory does not match the first key pre-stored in the integrated chip. If the terminal fails to start, the output module 40 outputs alarm information, such as a flashing signal on the preset LED of the mobile storage device, to prompt the user that the current terminal fails to be started, and the terminal may be connected to other mobiles. Storage device.
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其它变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其它要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。It is to be understood that the term "comprises", "comprising", or any other variants thereof, is intended to encompass a non-exclusive inclusion, such that a process, method, article, or device comprising a series of elements includes those elements. It also includes other elements not explicitly listed, or elements that are inherent to such a process, method, article, or device. An element that is defined by the phrase "comprising a ..." does not exclude the presence of additional equivalent elements in the process, method, item, or device that comprises the element.
上述本发明实施例序号仅仅为了描述,不代表实施例的优劣。The serial numbers of the embodiments of the present invention are merely for the description, and do not represent the advantages and disadvantages of the embodiments.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本发明各个实施例所述的方法。Through the description of the above embodiments, those skilled in the art can clearly understand that the foregoing embodiment method can be implemented by means of software plus a necessary general hardware platform, and of course, can also be through hardware, but in many cases, the former is better. Implementation. Based on such understanding, the technical solution of the present invention, which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk, The optical disc includes a number of instructions for causing a terminal device (which may be a cell phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the methods described in various embodiments of the present invention.
以上仅为本发明的优选实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其它相关的技术领域,均同理包括在本发明的专利保护范围内。The above are only the preferred embodiments of the present invention, and are not intended to limit the scope of the present invention, and the equivalent structure or equivalent process transformations made by the description of the present invention and the drawings are directly or indirectly applied to other related technical fields. The same is included in the scope of patent protection of the present invention.

Claims (13)

  1. 一种终端启动方法,其特征在于,所述终端启动方法包括以下步骤: A terminal startup method, characterized in that the terminal startup method comprises the following steps:
    在检测到终端启动指令时,基于所述终端启动指令获取终端的集成芯片中预设的第一密钥;When the terminal startup instruction is detected, acquiring a first key preset in the integrated chip of the terminal based on the terminal startup instruction;
    读取终端可读取的存储器,确定所述存储器中是否存在与所述第一密钥匹配的密钥信息,其中,所述可读取的存储器包括终端的内置存储器和/或与所述终端连接的移动存储设备;Reading a memory readable by the terminal, determining whether there is key information matching the first key in the memory, wherein the readable memory comprises a built-in memory of the terminal and/or with the terminal Connected mobile storage device;
    在所述存储器中存在与所述第一密钥匹配的密钥信息时,启动所述终端;When the key information matching the first key exists in the memory, starting the terminal;
    在所述存储器中不存在与所述第一密钥匹配的密钥信息时,输出告警信息。The alarm information is output when there is no key information matching the first key in the memory.
  2. 如权利要求1所述的终端启动方法,其特征在于,所述读取终端可读取的存储器,确定所述存储器中是否存在与所述第一密钥匹配的密钥信息的步骤包括:The terminal startup method according to claim 1, wherein the reading the readable memory of the terminal, and determining whether the key information matching the first key exists in the memory comprises:
    读取终端的内置存储器,确定所述内置存储器中是否存在与所述第一密钥匹配的第二密钥;Reading a built-in memory of the terminal, determining whether there is a second key matching the first key in the built-in memory;
    若所述内置存储器中不存在与所述第一密钥匹配的第二密钥,读取与所述终端连接的移动存储设备;Reading a mobile storage device connected to the terminal if the second key matching the first key does not exist in the built-in memory;
    确定所述移动存储设备中是否存在与所述第一密钥匹配的第三密钥。Determining whether there is a third key in the mobile storage device that matches the first key.
  3. 如权利要求2所述的终端启动方法,其特征在于,所述在所述存储器中存在与所述第一密钥匹配的密钥信息时,启动所述终端的步骤包括:The terminal activation method according to claim 2, wherein when the key information matching the first key exists in the memory, the step of starting the terminal comprises:
    在所述移动存储设备中存在与所述第一密钥匹配的第三密钥时,将所述第三密钥作为第二密钥加密存储至终端的内置存储器中;When the third key matching the first key exists in the mobile storage device, the third key is encrypted and stored as a second key in a built-in memory of the terminal;
    根据所述内置存储器中存储的所述第二密钥,启动所述终端。The terminal is activated according to the second key stored in the built-in memory.
  4. 一种终端启动方法,其特征在于,所述终端启动方法包括以下步骤:A terminal startup method, characterized in that the terminal startup method comprises the following steps:
    在检测到终端启动指令时,基于所述终端启动指令获取终端的集成芯片中预设的第一密钥;When the terminal startup instruction is detected, acquiring a first key preset in the integrated chip of the terminal based on the terminal startup instruction;
    读取终端可读取的存储器,确定所述存储器中是否存在与所述第一密钥匹配的密钥信息;Reading a memory readable by the terminal, determining whether there is key information matching the first key in the memory;
    在所述存储器中存在与所述第一密钥匹配的密钥信息时,启动所述终端。The terminal is activated when there is key information matching the first key in the memory.
  5. 如权利要求4所述的终端启动方法,其特征在于,所述可读取的存储器包括终端的内置存储器和/或与所述终端连接的移动存储设备。The terminal activation method according to claim 4, wherein the readable memory comprises a built-in memory of the terminal and/or a mobile storage device connected to the terminal.
  6. 如权利要求5所述的终端启动方法,其特征在于,所述读取终端可读取的存储器,确定所述存储器中是否存在与所述第一密钥匹配的密钥信息的步骤包括:The terminal startup method according to claim 5, wherein the reading the readable memory of the terminal, determining whether the key information matching the first key exists in the memory comprises:
    读取终端的内置存储器,确定所述内置存储器中是否存在与所述第一密钥匹配的第二密钥;Reading a built-in memory of the terminal, determining whether there is a second key matching the first key in the built-in memory;
    若所述内置存储器中不存在与所述第一密钥匹配的第二密钥,读取与所述终端连接的移动存储设备;Reading a mobile storage device connected to the terminal if the second key matching the first key does not exist in the built-in memory;
    确定所述移动存储设备中是否存在与所述第一密钥匹配的第三密钥。Determining whether there is a third key in the mobile storage device that matches the first key.
  7. 如权利要求6所述的终端启动方法,其特征在于,所述在所述存储器中存在与所述第一密钥匹配的密钥信息时,启动所述终端的步骤包括:The terminal activation method according to claim 6, wherein when the key information matching the first key exists in the memory, the step of starting the terminal comprises:
    在所述移动存储设备中存在与所述第一密钥匹配的第三密钥时,将所述第三密钥作为第二密钥加密存储至终端的内置存储器中;When the third key matching the first key exists in the mobile storage device, the third key is encrypted and stored as a second key in a built-in memory of the terminal;
    根据所述内置存储器中存储的所述第二密钥,启动所述终端。The terminal is activated according to the second key stored in the built-in memory.
  8. 如权利要求4所述的终端启动方法,其特征在于,所述读取终端可读取的存储器,确定所述存储器中是否存在与所述第一密钥匹配的密钥信息的步骤之后,所述终端启动方法还包括:The terminal startup method according to claim 4, wherein the reading terminal readable memory determines whether there is a key information matching the first key in the memory, The terminal startup method further includes:
    在所述存储器中不存在与所述第一密钥匹配的密钥信息时,输出告警信息。The alarm information is output when there is no key information matching the first key in the memory.
  9. 一种终端启动装置,其特征在于,所述终端启动装置包括:A terminal activation device, wherein the terminal activation device comprises:
    获取模块,用于在检测到终端启动指令时,基于所述终端启动指令获取终端的集成芯片中预设的第一密钥;An acquiring module, configured to acquire, according to the terminal startup instruction, a first key preset in an integrated chip of the terminal, when the terminal startup instruction is detected;
    处理模块,用于读取终端可读取的存储器,确定所述存储器中是否存在与所述第一密钥匹配的密钥信息;a processing module, configured to read a memory readable by the terminal, and determine whether there is key information matching the first key in the memory;
    启动模块,用于在所述存储器中存在与所述第一密钥匹配的密钥信息时,启动所述终端。And a startup module, configured to start the terminal when there is key information matching the first key in the memory.
  10. 权利要求9所述的终端启动装置,其特征在于,所述可读取的存储器包括终端的内置存储器和/或与所述终端连接的移动存储设备。The terminal activation device of claim 9, wherein the readable memory comprises a built-in memory of the terminal and/or a mobile storage device connected to the terminal.
  11. 如权利要求10所述的终端启动装置,其特征在于,所述处理模块包括:The terminal activation device of claim 10, wherein the processing module comprises:
    处理单元,用于读取终端的内置存储器,确定所述内置存储器中是否存在与所述第一密钥匹配的第二密钥;a processing unit, configured to read a built-in memory of the terminal, and determine whether a second key matching the first key exists in the built-in memory;
    读取单元,用于若所述内置存储器中不存在与所述第一密钥匹配的第二密钥,读取与所述终端连接的移动存储设备;a reading unit, configured to: if there is no second key matching the first key in the built-in memory, read a mobile storage device connected to the terminal;
    确定单元,用于确定所述移动存储设备中是否存在与所述第一密钥匹配的第三密钥。And a determining unit, configured to determine whether a third key matching the first key exists in the mobile storage device.
  12. 如权利要求11所述的终端启动装置,其特征在于,所述启动模块包括:The terminal activation device according to claim 11, wherein the startup module comprises:
    存储单元,用于在所述移动存储设备中存在与所述第一密钥匹配的第三密钥时,将所述第三密钥作为第二密钥加密存储至终端的内置存储器中;a storage unit, configured to: when the third key matching the first key exists in the mobile storage device, encrypt the third key as a second key into a built-in memory of the terminal;
    启动单元,用于根据所述内置存储器中存储的所述第二密钥,启动所述终端。And an activation unit, configured to start the terminal according to the second key stored in the built-in memory.
  13. 如权利要求9所述的终端启动装置,其特征在于,所述终端启动装置还包括:The terminal activation device according to claim 9, wherein the terminal activation device further comprises:
    输出模块,用于在所述存储器中不存在与所述第一密钥匹配的密钥信息时,输出告警信息。And an output module, configured to output alarm information when there is no key information matching the first key in the memory.
PCT/CN2016/084552 2015-08-28 2016-06-02 Terminal starting method and apparatus WO2017036212A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510543582.2 2015-08-28
CN201510543582.2A CN105184117A (en) 2015-08-28 2015-08-28 Terminal starting method and apparatus

Publications (1)

Publication Number Publication Date
WO2017036212A1 true WO2017036212A1 (en) 2017-03-09

Family

ID=54906191

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/084552 WO2017036212A1 (en) 2015-08-28 2016-06-02 Terminal starting method and apparatus

Country Status (2)

Country Link
CN (1) CN105184117A (en)
WO (1) WO2017036212A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105184117A (en) * 2015-08-28 2015-12-23 深圳Tcl数字技术有限公司 Terminal starting method and apparatus
CN106203124A (en) * 2016-06-29 2016-12-07 宇龙计算机通信科技(深圳)有限公司 Operational approach and operation device, terminal are installed

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7243227B1 (en) * 2001-09-07 2007-07-10 Xilinx, Inc. Method and apparatus to copy protect software programs
CN101118577A (en) * 2006-08-04 2008-02-06 大唐移动通信设备有限公司 Process and device for preventing fraudulent use of terminal software
CN101854243A (en) * 2010-04-30 2010-10-06 株洲南车时代电气股份有限公司 Circuit system design encryption circuit and encryption method thereof
CN103390140A (en) * 2013-06-20 2013-11-13 上海鼎为通讯电子有限公司 Mobile terminal and information security control method thereof
CN105184117A (en) * 2015-08-28 2015-12-23 深圳Tcl数字技术有限公司 Terminal starting method and apparatus

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7243227B1 (en) * 2001-09-07 2007-07-10 Xilinx, Inc. Method and apparatus to copy protect software programs
CN101118577A (en) * 2006-08-04 2008-02-06 大唐移动通信设备有限公司 Process and device for preventing fraudulent use of terminal software
CN101854243A (en) * 2010-04-30 2010-10-06 株洲南车时代电气股份有限公司 Circuit system design encryption circuit and encryption method thereof
CN103390140A (en) * 2013-06-20 2013-11-13 上海鼎为通讯电子有限公司 Mobile terminal and information security control method thereof
CN105184117A (en) * 2015-08-28 2015-12-23 深圳Tcl数字技术有限公司 Terminal starting method and apparatus

Also Published As

Publication number Publication date
CN105184117A (en) 2015-12-23

Similar Documents

Publication Publication Date Title
WO2019227557A1 (en) Key management method, device, storage medium and apparatus
WO2016192270A1 (en) Method and device for rapid opencast of media file
WO2017177524A1 (en) Audio and video playing synchronization method and device
WO2019196213A1 (en) Interface test method, apparatus and device, and computer-readable storage medium
WO2019051902A1 (en) Terminal control method, air conditioner and computer-readable storage medium
WO2019033904A1 (en) Login authentication method and system, and computer-readable storage medium
WO2016173259A1 (en) Bluetooth pairing method and bluetooth pairing device
WO2017071352A1 (en) Password push method, push system, and terminal device
WO2018023926A1 (en) Interaction method and system for television and mobile terminal
WO2016058258A1 (en) Terminal remote control method and system
WO2018126888A1 (en) Method and apparatus for configuring a shortcut for a television function
WO2017088444A1 (en) Method and device for prompting electric quantity information of terminal
WO2012028079A1 (en) Method and device for importing backup data of mobile terminal
WO2017121066A1 (en) Application program display method and system
WO2017036204A1 (en) Focus positioning method and device for application switching
WO2019051897A1 (en) Terminal operating parameter adjustment method and device, and computer readable storage medium
WO2019085301A1 (en) Missed call feedback method, apparatus and device for fixed phone, and readable storage medium
WO2016090991A1 (en) Method and apparatus for downloading streaming media data
WO2015158032A1 (en) Method and system for unlocking screen of mobile terminal by means of retina information matching
WO2017059686A1 (en) Desktop displaying method and device
WO2018090452A1 (en) Method and apparatus for protecting root permission
WO2017036212A1 (en) Terminal starting method and apparatus
WO2019051901A1 (en) Terminal control method and device, and computer readable storage medium
WO2017096764A1 (en) Audio data output method and device
WO2017041546A1 (en) Television bluetooth connection method and apparatus

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16840641

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC DATED 12.07.2018 F1205A)

122 Ep: pct application non-entry in european phase

Ref document number: 16840641

Country of ref document: EP

Kind code of ref document: A1