WO2017148117A1 - 一种安全刷机的方法及装置 - Google Patents

一种安全刷机的方法及装置 Download PDF

Info

Publication number
WO2017148117A1
WO2017148117A1 PCT/CN2016/097042 CN2016097042W WO2017148117A1 WO 2017148117 A1 WO2017148117 A1 WO 2017148117A1 CN 2016097042 W CN2016097042 W CN 2016097042W WO 2017148117 A1 WO2017148117 A1 WO 2017148117A1
Authority
WO
WIPO (PCT)
Prior art keywords
verification information
brusher
module
terminal
information
Prior art date
Application number
PCT/CN2016/097042
Other languages
English (en)
French (fr)
Inventor
吴安峻
郭德英
叶瑞权
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宇龙计算机通信科技(深圳)有限公司 filed Critical 宇龙计算机通信科技(深圳)有限公司
Publication of WO2017148117A1 publication Critical patent/WO2017148117A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2135Metering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Definitions

  • the present invention relates to the field of anti-brushing machines, and more particularly to a method and apparatus for a safety brushing machine.
  • the terminal is safely brushed from the following aspects: on the one hand, a control switch is added from the USB interface of the terminal to control the downloading of files from the PC for brushing, which is controlled from the USB interface of the line brush;
  • the system automatically enters the Android/Recovery mode by encrypting the dynamic password data (including the system image file) required for some applications in the dynamic password module.
  • the system automatically enters the Android/Recovery mode by encrypting the dynamic password data (including the system image file) required for some applications in the dynamic password module.
  • the embodiment of the present invention provides the following technical solutions:
  • a method of safe brushing comprising:
  • the terminal is guided to enter the corresponding brush mode according to the initialization information; if it does not match, the shutdown command is issued.
  • the verification information of the acquiring brusher includes:
  • the method further includes:
  • the method further includes:
  • the method further includes:
  • a device for safe brushing comprising:
  • the first determining module is configured to determine whether the verification information of the brusher matches the verification information of the pre-stored brusher; if it matches, trigger the execution module; if not, trigger the shutdown module;
  • the execution module is configured to guide the terminal to enter a corresponding brush mode according to the initialization information
  • the shutdown module is configured to issue a shutdown command.
  • the obtaining module comprises at least one of the following units:
  • a first obtaining unit configured to obtain fingerprint verification information of the brusher
  • a second obtaining unit configured to obtain character verification information of the flasher
  • the third obtaining unit is configured to obtain graphic verification information of the flasher.
  • the device further comprises:
  • a statistics module configured to count the number of times that the verification information of the brusher does not match the verification information of the pre-stored brusher
  • the second determining module is configured to determine whether the number of mismatches is greater than a predetermined threshold; if yes, triggering the shutdown module.
  • the device further comprises:
  • the first sending module is configured to send the alert information to the pre-stored emergency contact after the number of the mismatches is greater than the predetermined threshold.
  • the device further comprises:
  • the second sending module is configured to send real-time location information of the terminal to the emergency contact.
  • the method and device for the security brushing machine provided by the embodiment of the present invention include: obtaining the verification information of the brusher after initializing the software and hardware environment of the terminal; determining the verification information of the brusher and the pre-stored flasher Whether the verification information matches; if it matches, the terminal is guided to enter the corresponding brush mode according to the initialization information; if not, the shutdown command is issued. It can be seen that, in this embodiment, after the terminal hardware and software environment is initialized and before the flash mode is entered, by verifying the identity information of the flasher, the non-owner user is effectively prevented from brushing the terminal, thereby increasing the security of the brush.
  • FIG. 1 is a schematic flow chart of a method for a safety brush according to an embodiment of the present invention
  • FIG. 2 is a schematic structural diagram of a device for a safety brush machine according to an embodiment of the present invention
  • FIG. 3 is a schematic structural diagram of a terminal of a device including a security brush according to an embodiment of the present invention.
  • the embodiment of the invention discloses a method and a device for safely brushing the machine, so as to avoid the non-owner user from brushing the terminal and increasing the safety of the brushing machine.
  • the execution body of the security brushing method provided by this embodiment may be a bootloader module in a mobile terminal of an android system.
  • a method for a security brushing machine includes:
  • the terminal hardware and software environment is initialized, and after the mobile phone is powered on, the software and hardware environment is prepared through the assembler and the c program.
  • the verification information of the acquiring brusher includes:
  • the verification information in this embodiment may be at least one of a fingerprint, a character, and a graphic, where the characters herein may include any combination of numbers, letters, or characters.
  • the fingerprint verification it is possible to set the fingerprint verification to be input; or, by setting two verification methods, the safety of the brush machine can be increased; for example, the character verification is required after the character verification is successful.
  • the flasher's verification information and other related data are stored in the TRUSTZONE security zone under the ARM architecture.
  • the method further includes: if it is detected that the verification information of the brusher does not match the verification information of the pre-stored brusher, the method further includes:
  • the number of times the flasher inputs the wrong verification information may be set. If the number of times is greater than the predetermined threshold, the shutdown command is issued to control the terminal to shut down. For example, if the predetermined threshold is set to 3, the terminal is shut down when it is detected that the number of times the verification information input by the brusher does not match the pre-stored verification information is 4.
  • the warning information may be sent to the pre-stored emergency contact.
  • the warning message may be: "The terminal type XX is not correct in the startup password entered during the startup process, and there is a danger of being brushed", and the like.
  • the method further includes: sending the real-time location information of the terminal to the emergency contact.
  • the real-time location information sent to the emergency contact may be sent by the terminal to the emergency contact, or after the terminal sends the alert information to the emergency contact, the emergency contact sends the real-time location information to the terminal. Triggered by an instruction.
  • the solution is to solve the problem of security brushing from the principle of the startup process of the android system.
  • the bootloader module In the startup process of the android system, the bootloader module must be started before the android system can be started or the boot terminal enters the flash mode; the brush mode here includes at least: recovery mode and fastboot mode. Therefore, in this embodiment, after the bootloader module initializes the terminal hardware and software environment, the bootloader module determines whether the identity information of the flasher matches the verification information of the pre-stored flasher, and only after matching, the android system or the boot terminal is started. Enter the brush mode. This ensures that the terminal will be executed after being authenticated by either the fastboot mode or the recovery mode, which increases the security of the brush.
  • a method for the security brushing machine includes: after initializing the hardware and software environment of the terminal, obtaining verification information of the brusher; determining whether the verification information of the brusher matches the verification information of the pre-stored brusher; If the match is made, the terminal is guided to enter the corresponding brush mode according to the initialization information; if not, the shutdown command is issued. It can be seen that, in this embodiment, after the terminal hardware and software environment is initialized and before the flash mode is entered, by verifying the identity information of the flasher, the non-owner user is effectively prevented from brushing the terminal, thereby increasing the security of the brush.
  • a device for a safety brush provided by an embodiment of the present invention is described below.
  • a device for a safety brush described below and a method for a safety brush described above can be cross-referenced.
  • an apparatus for a safety brush machine includes:
  • the initialization module 100 is configured to initialize the terminal hardware and software environment
  • the obtaining module 200 is configured to obtain verification information of the brusher
  • the first judging module 300 is configured to determine whether the verification information of the flasher matches the pre-stored verification information of the flasher; if it matches, the execution module 400 is triggered; if not, the shutdown module 500 is triggered;
  • the execution module 400 is configured to guide the terminal to enter a corresponding brush mode according to the initialization information
  • the shutdown module 500 is configured to issue a shutdown command.
  • An apparatus for the security brushing machine includes: an initialization module 100, configured to initialize a terminal hardware and software environment; and an obtaining module 200 configured to obtain verification information of the brusher; the first determining module 300 is configured to determine the location Whether the verification information of the brusher matches the verification information of the pre-stored brusher; if it matches, the execution module 400 is triggered; if not, the shutdown module 500 is triggered; the execution module 400 is configured to guide the instruction according to the initialization information.
  • the terminal enters a corresponding brush mode; the shutdown module 500 is configured to issue a shutdown command.
  • the obtaining module comprises at least one of the following units:
  • a first obtaining unit configured to obtain fingerprint verification information of the brusher
  • a second obtaining unit configured to obtain character verification information of the flasher
  • the third obtaining unit is configured to obtain graphic verification information of the flasher.
  • the device further comprises:
  • a statistics module configured to count the number of times that the verification information of the brusher does not match the verification information of the pre-stored brusher
  • the second determining module is configured to determine whether the number of mismatches is greater than a predetermined threshold; if yes, triggering the shutdown module.
  • the device further comprises:
  • the first sending module is configured to send the alert information to the pre-stored emergency contact after the number of the mismatches is greater than the predetermined threshold.
  • the device further comprises:
  • the second sending module is configured to send real-time location information of the terminal to the emergency contact.
  • FIG. 3 is a schematic structural diagram of a terminal of a device including a security brush according to an embodiment of the present invention.
  • the terminal 600 in the embodiment of the present invention may be different types of electronic devices, such as: smart phones, tablet computers, palmtop computers, and mobile internet devices, personal digital assistants, media players, smart televisions, smart watches, smart glasses, smart hands. Ring and so on.
  • the device of the safety brush in the various embodiments above may be applied to the terminal 600.
  • the terminal 600 in the embodiment of the present invention includes: at least one processor 610, such as a CPU, at least one receiver 613, at least one memory 614, at least one transmitter 615, and at least one communication bus 612.
  • the communication bus 612 is used to implement connection communication between these components.
  • the receiver 613 and the transmitter 615 may be wired transmission ports, or may be wireless devices, for example, including antenna devices for data communication with other devices.
  • the memory 614 may be a high speed RAM memory or a non-volatile memory such as at least one disk memory.
  • the processor 610 can execute an operating system of the terminal 600 and various installed application programs, program codes, and the like.
  • each module described above includes the initialization module 100, the obtaining module 200, and the like.
  • Program code is stored in the memory 614, and the processor 610 can invoke program code stored in the memory 614 via the communication bus 612 to perform related functions.
  • the various modules eg, the initialization module 100, the acquisition module 200, etc.
  • FIG. 2 are program code stored in the memory 614 and executed by the processor 610 to implement The functions of the individual modules are safely brushed.
  • the memory 614 stores a plurality of instructions that are executed by the processor 610 to implement a method of secure flashing. Specifically, the performing, by the processor 610, the executing, by the processor 610, acquiring the verification information of the flasher after initializing the hardware and software environment of the terminal; determining the verification information of the flasher and the verification information of the pre-stored flasher Whether it matches; if it matches, the terminal is guided to enter the corresponding brush mode according to the initialization information; if it does not match, the shutdown command is issued.
  • the obtaining, by the processor 610, the verification information of the flasher includes: acquiring fingerprint verification information of the flasher; and/or acquiring character verification information of the flasher; and/or acquiring graphic verification of the flasher information.
  • the processor 610 calculates that the verification information of the brusher and the verification information of the pre-stored flasher are not The number of matches; determining whether the number of mismatches is greater than a predetermined threshold; if so, issuing a shutdown command.
  • the processor 610 sends alert information to the pre-stored emergency contact.
  • the processor 610 sends the real-time location information of the terminal to the emergency contact.
  • the processor 610 may refer to the description of related steps in the corresponding embodiment of FIG. 1 , and details are not described herein.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
  • Telephone Function (AREA)

Abstract

一种安全刷机的方法及装置,所述方法包括:在初始化终端软硬件环境后,获取刷机者的验证信息(S101);判断所述刷机者的验证信息与预存的刷机者的验证信息是否匹配(S102);若匹配,则根据初始化信息引导所述终端进入相应的刷机模式(S103);若不匹配,则发出关机指令(S104)。该方法和装置中,在初始化终端软硬件环境之后且在进入刷机模式之前,通过验证刷机者的身份信息,有效的避免了非机主用户对终端进行刷机,增加刷机的安全性。

Description

一种安全刷机的方法及装置
本申请要求于2016年2月29日提交中国专利局,申请号为201610111752.4、发明名称为“一种安全刷机的方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及防刷机技术领域,更具体地说,涉及一种安全刷机的方法及装置。
背景技术
现有技术方案中主要从以下方面对终端进行安全刷机:一方面是从终端的USB接口处增加一个控制开关来控制从PC机上下载文件进行刷机,这是从线刷的USB接口处进行控制;另一方面是通过对动态口令模块中部分应用所需的动态口令数据(包括系统镜像文件)进行加密,从而安全引导系统进入 Android/Recovery模式。然而这两种方式都存在一些安全漏洞,例如在第一种方式中,可以直接进入recovery模式下使用update.zip包进行刷机;在第二种方式中,可以直接引导系统进入fastboot模式下进行线刷。若用户终端遗失或者被盗取,相关人员很可能通过这些安全漏洞对终端进行刷机,存在安全隐患。
因此,如何安全刷机,是本领域技术人员现在需要解决的问题。
发明内容
本发明的目的在于提供一种安全刷机的方法及装置,以避免非机主用户对终端进行刷机,增加刷机的安全性。
为实现上述目的,本发明实施例提供了如下技术方案:
一种安全刷机的方法,包括:
在初始化终端软硬件环境后,获取刷机者的验证信息;
判断所述刷机者的验证信息与预存的刷机者的验证信息是否匹配;
若匹配,则根据初始化信息引导所述终端进入相应的刷机模式;若不匹配,则发出关机指令。
优选的,所述获取刷机者的验证信息包括:
获取刷机者的指纹验证信息;和/或,
获取刷机者的字符验证信息;和/或,
获取刷机者的图形验证信息。
优选的,若检测到所述刷机者的验证信息与预存的刷机者的验证信息不匹配,则所述方法还包括:
统计所述刷机者的验证信息与预存的刷机者的验证信息不匹配的次数;
判断所述不匹配的次数是否大于预定阈值;若是,则发出关机指令。
优选的,所述不匹配的次数大于预定阈值之后,还包括:
向预存的紧急联系人发送警示信息。
优选的,所述向预存的紧急联系人发送警示信息之后,还包括:
向所述紧急联系人发送所述终端的实时位置信息。
一种安全刷机的装置,包括:
初始化模块,设置为初始化终端软硬件环境;
获取模块,设置为获取刷机者的验证信息;
第一判断模块,设置为判断所述刷机者的验证信息与预存的刷机者的验证信息是否匹配;若匹配,则触发执行模块;若不匹配,则触发关机模块;
所述执行模块,设置为根据初始化信息引导所述终端进入相应的刷机模式;
所述关机模块,设置为发出关机指令。
优选的,所述获取模块包括以下单元中的至少一者:
第一获取单元,设置为获取刷机者的指纹验证信息;
第二获取单元,设置为获取刷机者的字符验证信息;
第三获取单元,设置为获取刷机者的图形验证信息。
优选的,本装置还包括:
统计模块,设置为统计所述刷机者的验证信息与预存的刷机者的验证信息不匹配的次数;
第二判断模块,设置为判断所述不匹配的次数是否大于预定阈值;若是,则触发关机模块。
优选的,本装置还包括:
第一发送模块,设置为在所述不匹配的次数大于预定阈值之后,向预存的紧急联系人发送警示信息。
优选的,本装置还包括:
第二发送模块,设置为向所述紧急联系人发送所述终端的实时位置信息。
通过以上方案可知,本发明实施例提供的一种安全刷机的方法及装置,包括:在初始化终端软硬件环境后,获取刷机者的验证信息;判断所述刷机者的验证信息与预存的刷机者的验证信息是否匹配;若匹配,则根据初始化信息引导所述终端进入相应的刷机模式;若不匹配,则发出关机指令。可见,在本实施例中,在初始化终端软硬件环境之后且在进入刷机模式之前,通过验证刷机者的身份信息,有效的避免了非机主用户对终端进行刷机,增加刷机的安全性。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本发明实施例公开的一种安全刷机的方法流程示意图;
图2为本发明实施例公开的一种安全刷机的装置结构示意图;
图3为本发明实施例公开的一种包括安全刷机的装置的终端结构示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
本发明实施例公开了一种安全刷机的方法及装置,以避免非机主用户对终端进行刷机,增加刷机的安全性。需要说明的是,本实施例提供的这种安全刷机方法的执行主体可以为android系统的移动终端中的bootloader模块。
参见图1,本发明实施例提供的一种安全刷机的方法,包括:
S101、在初始化终端软硬件环境后,获取刷机者的验证信息;
具体的,本实施例中初始化终端软硬件环境为在手机上电后,通过汇编程序和c程序准备好软硬件环境。
其中,所述获取刷机者的验证信息包括:
获取刷机者的指纹验证信息;和/或,
获取刷机者的字符验证信息;和/或,
获取刷机者的图形验证信息。
具体的,本实施例中的验证信息可以是指纹、字符和图形中的至少一者,其中,这里的字符可以包括:数字、字母或者文字的任意组合。并且这里为了增加刷机的安全性,可以设置必须输入指纹验证;或者,可以通过设置两种验证方式,增加刷机的安全性;例如字符验证成功后需要进行图形验证。
S102、判断所述刷机者的验证信息与预存的刷机者的验证信息是否匹配;
具体的,刷机者的验证信息等相关数据存储在ARM架构下TRUSTZONE安全区域。
若匹配,则执行S103;若不匹配,则执行S104;
S103、根据初始化信息引导所述终端进入相应的刷机模式;
S104、发出关机指令。
其中,若检测到所述刷机者的验证信息与预存的刷机者的验证信息不匹配,则所述方法还包括:
统计所述刷机者的验证信息与预存的刷机者的验证信息不匹配的次数;
判断所述不匹配的次数是否大于预定阈值;若是,则发出关机指令。
具体的,在本实施例中可以设置刷机者输错验证信息的次数,若次数大于预定阈值,则发出关机指令控制终端关机。例如:设定预定阈值为3,则检测到刷机者输入的验证信息与预存的验证信息不匹配的次数为4时,就控制终端关机。
其中,在本实施例中还可以设定所述不匹配的次数大于预定阈值之后,向预存的紧急联系人发送警示信息。这个警示信息可以为:“型号为XX的终端在启动过程中输入的启动密码不正确,有被刷机危险”等类似的警示信息。并且所述向预存的紧急联系人发送警示信息之后,还包括:向所述紧急联系人发送所述终端的实时位置信息。具体的,这里向紧急联系人发送的实时位置信息可以为终端主动向紧急联系人发送的,也可以是在终端向紧急联系人发送警示信息后,通过紧急联系人向终端发送获取实时位置信息的指令而触发的。
具体的,本方案是从android系统的启动流程原理中去解决安全刷机的问题。在android系统的启动过程中,必须要启动bootloader模块后才能启动android系统或者引导终端进入刷机模式;这里的刷机模式至少包括:recovery模式和fastboot模式。因此,在本实施例中,bootloader模块初始化终端软硬件环境之后,bootloader模块会判断刷机者的身份信息与预存的刷机者的验证信息是否匹配,并且只有匹配后,才会启动android系统或者引导终端进入刷机模式。这就保证了终端无论是通过fastboot模式刷机还是通过recovery模式刷机,都必须经过身份验证后才执行,增加了刷机的安全性。
本发明实施例提供的一种安全刷机的方法,包括:在初始化终端软硬件环境后,获取刷机者的验证信息;判断所述刷机者的验证信息与预存的刷机者的验证信息是否匹配;若匹配,则根据初始化信息引导所述终端进入相应的刷机模式;若不匹配,则发出关机指令。可见,在本实施例中,在初始化终端软硬件环境之后且在进入刷机模式之前,通过验证刷机者的身份信息,有效的避免了非机主用户对终端进行刷机,增加刷机的安全性。
下面对本发明实施例提供的一种安全刷机的装置进行介绍,下文描述的一种安全刷机的装置与上文描述的一种安全刷机的方法可以相互参照。
参见图2,本发明实施例提供的一种安全刷机的装置,包括:
初始化模块100,设置为初始化终端软硬件环境;
获取模块200,设置为获取刷机者的验证信息;
第一判断模块300,设置为判断所述刷机者的验证信息与预存的刷机者的验证信息是否匹配;若匹配,则触发执行模块400;若不匹配,则触发关机模块500;
所述执行模块400,设置为根据初始化信息引导所述终端进入相应的刷机模式;
所述关机模块500,设置为发出关机指令。
本发明实施例提供的一种安全刷机的装置,包括:初始化模块100,设置为初始化终端软硬件环境;获取模块200,设置为获取刷机者的验证信息;第一判断模块300,设置为判断所述刷机者的验证信息与预存的刷机者的验证信息是否匹配;若匹配,则触发执行模块400;若不匹配,则触发关机模块500;所述执行模块400,设置为根据初始化信息引导所述终端进入相应的刷机模式;所述关机模块500,设置为发出关机指令。可见,在本实施例中,在初始化终端软硬件环境之后且在进入刷机模式之前,通过验证刷机者的身份信息,有效的避免了非机主用户对终端进行刷机,增加刷机的安全性。
优选的,所述获取模块包括以下单元中的至少一者:
第一获取单元,设置为获取刷机者的指纹验证信息;
第二获取单元,设置为获取刷机者的字符验证信息;
第三获取单元,设置为获取刷机者的图形验证信息。
优选的,本装置还包括:
统计模块,设置为统计所述刷机者的验证信息与预存的刷机者的验证信息不匹配的次数;
第二判断模块,设置为判断所述不匹配的次数是否大于预定阈值;若是,则触发关机模块。
优选的,本装置还包括:
第一发送模块,设置为在所述不匹配的次数大于预定阈值之后,向预存的紧急联系人发送警示信息。
优选的,本装置还包括:
第二发送模块,设置为向所述紧急联系人发送所述终端的实时位置信息。
图3为本发明实施例公开的一种包括安全刷机的装置的终端结构示意图。本发明实施例中的终端600可以是不同类型的电子设备,例如:智能手机、平板电脑、掌上电脑以及移动互联网设备、个人数字助理、媒体播放器、智能电视、智能手表、智能眼镜、智能手环等。上文各个实施例中的安全刷机的装置可应用于所述终端600中。
如图3所示,本发明实施例中的终端600包括:至少一个处理器610,例如CPU,至少一个接收器613,至少一个存储器614,至少一个发送器615,至少一个通信总线612。其中,所述通信总线612用于实现这些组件之间的连接通信。其中,所述接收器613和所述发送器615可以是有线发送端口,也可以为无线设备,例如包括天线装置,用于与其他设备进行数据通信。所述存储器614可以是高速RAM存储器,也可以是非不稳定的存储器(non-volatile memory),例如至少一个磁盘存储器。
所述处理器610可执行所述终端600的操作系统以及安装的各类应用程序、程序代码等,例如,上述的各个模块,包括所述初始化模块100、所述获取模块200等。
所述存储器614中存储有程序代码,且所述处理器610可通过通信总线612,调用所述存储器614中存储的程序代码以执行相关的功能。例如,图2中所述的各个模块(例如,所述初始化模块100、所述获取模块200等)是存储在所述存储器614中的程序代码,并由所述处理器610所执行,从而实现所述各个模块的功能以安全刷机。
在本发明的一个实施例中,所述存储器614存储多个指令,所述多个指令被所述处理器610所执行以实现安全刷机的方法。具体而言,所述处理器610对所述多个指令的执行包括:在初始化终端软硬件环境后,获取刷机者的验证信息;判断所述刷机者的验证信息与预存的刷机者的验证信息是否匹配;若匹配,则根据初始化信息引导所述终端进入相应的刷机模式;若不匹配,则发出关机指令。
在进一步的实施例中,所述处理器610获取刷机者的验证信息包括:获取刷机者的指纹验证信息;和/或,获取刷机者的字符验证信息;和/或,获取刷机者的图形验证信息。
在进一步的实施例中,若检测到所述刷机者的验证信息与预存的刷机者的验证信息不匹配,所述处理器610统计所述刷机者的验证信息与预存的刷机者的验证信息不匹配的次数;判断所述不匹配的次数是否大于预定阈值;若是,则发出关机指令。
在进一步的实施例中,所述不匹配的次数大于预定阈值之后,所述处理器610向预存的紧急联系人发送警示信息。
在进一步的实施例中,所述向预存的紧急联系人发送警示信息之后,所述处理器610向所述紧急联系人发送所述终端的实时位置信息。
具体地,所述处理器610对上述指令的具体实现方法可参考图1对应实施例中相关步骤的描述,在此不赘述。
本说明书中各个实施例采用递进的方式描述,每个实施例重点说明的都是与其他实施例的不同之处,各个实施例之间相同相似部分互相参见即可。
对所公开的实施例的上述说明,使本领域专业技术人员能够实现或使用本发明。对这些实施例的多种修改对本领域的专业技术人员来说将是显而易见的,本文中所定义的一般原理可以在不脱离本发明的精神或范围的情况下,在其它实施例中实现。因此,本发明将不会被限制于本文所示的这些实施例,而是要符合与本文所公开的原理和新颖特点相一致的最宽的范围。

Claims (10)

  1. 一种安全刷机的方法,其特征在于,包括:
    在初始化终端软硬件环境后,获取刷机者的验证信息;
    判断所述刷机者的验证信息与预存的刷机者的验证信息是否匹配;
    若匹配,则根据初始化信息引导所述终端进入相应的刷机模式;若不匹配,则发出关机指令。
  2. 根据权利要求1所述的方法,其特征在于,所述获取刷机者的验证信息包括:
    获取刷机者的指纹验证信息;和/或,
    获取刷机者的字符验证信息;和/或,
    获取刷机者的图形验证信息。
  3. 根据权利要求1所述的方法,其特征在于,若检测到所述刷机者的验证信息与预存的刷机者的验证信息不匹配,则所述方法还包括:
    统计所述刷机者的验证信息与预存的刷机者的验证信息不匹配的次数;
    判断所述不匹配的次数是否大于预定阈值;若是,则发出关机指令。
  4. 根据权利要求1-3中任意一项所述的方法,其特征在于,所述不匹配的次数大于预定阈值之后,还包括:
    向预存的紧急联系人发送警示信息。
  5. 根据权利要求4所述的方法,其特征在于,所述向预存的紧急联系人发送警示信息之后,还包括:
    向所述紧急联系人发送所述终端的实时位置信息。
  6. 一种安全刷机的装置,其特征在于,包括:
    初始化模块,设置为初始化终端软硬件环境;
    获取模块,设置为获取刷机者的验证信息;
    第一判断模块,设置为判断所述刷机者的验证信息与预存的刷机者的验证信息是否匹配;若匹配,则触发执行模块;若不匹配,则触发关机模块;
    所述执行模块,设置为根据初始化信息引导所述终端进入相应的刷机模式;
    所述关机模块,设置为发出关机指令。
  7. 根据权利要求6所述的装置,其特征在于,所述获取模块包括以下单元中的至少一者:
    第一获取单元,设置为获取刷机者的指纹验证信息;
    第二获取单元,设置为获取刷机者的字符验证信息;
    第三获取单元,设置为获取刷机者的图形验证信息。
  8. 根据权利要求6所述的装置,其特征在于,还包括:
    统计模块,设置为统计所述刷机者的验证信息与预存的刷机者的验证信息不匹配的次数;
    第二判断模块,设置为判断所述不匹配的次数是否大于预定阈值;若是,则触发关机模块。
  9. 根据权利要求6-8中任意一项所述的装置,其特征在于,还包括:
    第一发送模块,设置为在所述不匹配的次数大于预定阈值之后,向预存的紧急联系人发送警示信息。
  10. 根据权利要求9所述的装置,其特征在于,还包括:
    第二发送模块,设置为向所述紧急联系人发送所述终端的实时位置信息。
PCT/CN2016/097042 2016-02-29 2016-08-27 一种安全刷机的方法及装置 WO2017148117A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610111752.4A CN105787349A (zh) 2016-02-29 2016-02-29 一种安全刷机的方法及装置
CN201610111752.4 2016-02-29

Publications (1)

Publication Number Publication Date
WO2017148117A1 true WO2017148117A1 (zh) 2017-09-08

Family

ID=56403041

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/097042 WO2017148117A1 (zh) 2016-02-29 2016-08-27 一种安全刷机的方法及装置

Country Status (2)

Country Link
CN (1) CN105787349A (zh)
WO (1) WO2017148117A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020097863A1 (zh) * 2018-11-15 2020-05-22 深圳市欢太科技有限公司 一种刷机控制方法、刷机控制装置及终端设备
CN114760621A (zh) * 2022-03-23 2022-07-15 深圳市普渡科技有限公司 终端刷机方法、装置、计算机设备及存储介质

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105787349A (zh) * 2016-02-29 2016-07-20 宇龙计算机通信科技(深圳)有限公司 一种安全刷机的方法及装置
CN106203124A (zh) * 2016-06-29 2016-12-07 宇龙计算机通信科技(深圳)有限公司 安装操作方法及操作装置、终端
CN107992735B (zh) * 2016-10-26 2021-07-13 中国移动通信有限公司研究院 信息处理方法及装置
CN108205616A (zh) * 2016-12-16 2018-06-26 北京小米移动软件有限公司 身份信息校验方法及装置
CN108268760B (zh) * 2016-12-30 2020-11-03 中科创达软件股份有限公司 一种电子设备安全保护方法及系统
CN108446545A (zh) * 2017-02-16 2018-08-24 中兴通讯股份有限公司 一种刷机验证方法及终端
CN107169349A (zh) * 2017-04-26 2017-09-15 深圳天珑无线科技有限公司 移动装置的刷机检测方法及其系统
CN109699027B (zh) * 2017-10-24 2022-02-15 卓望数码技术(深圳)有限公司 一种多因子管控的智能终端防刷机方法和系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120114193A1 (en) * 2010-11-04 2012-05-10 The Go Daddy Group, Inc. Systems and Methods for Person's Verification Using Portrait Photographs Taken by a Verifier-Controlled Mobile Device
CN104199688A (zh) * 2014-08-15 2014-12-10 深圳市中兴移动通信有限公司 一种移动终端及其控制刷机的方法和装置
CN104317668A (zh) * 2014-11-18 2015-01-28 深圳市汇顶科技股份有限公司 移动终端中恶意操作的识别方法和装置
CN105117912A (zh) * 2015-09-01 2015-12-02 广东欧珀移动通信有限公司 一种被盗防刷机的移动终端及其被盗防刷机方法
CN105787349A (zh) * 2016-02-29 2016-07-20 宇龙计算机通信科技(深圳)有限公司 一种安全刷机的方法及装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120114193A1 (en) * 2010-11-04 2012-05-10 The Go Daddy Group, Inc. Systems and Methods for Person's Verification Using Portrait Photographs Taken by a Verifier-Controlled Mobile Device
CN104199688A (zh) * 2014-08-15 2014-12-10 深圳市中兴移动通信有限公司 一种移动终端及其控制刷机的方法和装置
CN104317668A (zh) * 2014-11-18 2015-01-28 深圳市汇顶科技股份有限公司 移动终端中恶意操作的识别方法和装置
CN105117912A (zh) * 2015-09-01 2015-12-02 广东欧珀移动通信有限公司 一种被盗防刷机的移动终端及其被盗防刷机方法
CN105787349A (zh) * 2016-02-29 2016-07-20 宇龙计算机通信科技(深圳)有限公司 一种安全刷机的方法及装置

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020097863A1 (zh) * 2018-11-15 2020-05-22 深圳市欢太科技有限公司 一种刷机控制方法、刷机控制装置及终端设备
CN112654964A (zh) * 2018-11-15 2021-04-13 深圳市欢太科技有限公司 一种刷机控制方法、刷机控制装置及终端设备
CN114760621A (zh) * 2022-03-23 2022-07-15 深圳市普渡科技有限公司 终端刷机方法、装置、计算机设备及存储介质

Also Published As

Publication number Publication date
CN105787349A (zh) 2016-07-20

Similar Documents

Publication Publication Date Title
WO2017148117A1 (zh) 一种安全刷机的方法及装置
WO2018000673A1 (zh) 一种终端应用程序运行的方法及装置
WO2019074326A1 (en) SECURE OFFLINE PAYMENT METHOD AND APPARATUS
WO2018062761A1 (ko) 보안 기능이 강화된 디바이스의 초기화 방법 및 디바이스의 펌웨어 업데이트 방법
CN101266638B (zh) 软件保护的方法和系统
WO2018035929A1 (zh) 一种验证码的处理方法及装置
WO2017071329A1 (zh) 密码管理方法、密码管理系统及终端设备
WO2016064041A1 (ko) 해쉬값을 이용하여 응용 프로그램의 위변조 여부를 탐지하는 사용자 단말기 및 그것을 이용한 위변조 탐지 방법
WO2020130348A1 (ko) 디바이스 고유암호키 생성기 및 방법
WO2021256669A1 (ko) 출입 보안 관리 방법 및 시스템
WO2017101252A1 (zh) 基于 Docker 的容器登录方法、服务器和系统
WO2018000675A1 (zh) 一种后台应用管理装置、终端及后台应用管理方法
WO2017105072A1 (ko) 생체 정보 기반 인증 장치 그리고 이의 동작 방법
WO2021042736A1 (zh) 一种水利工业控制系统中应用数据单元加密方法
WO2018160039A1 (ko) 분할 기능을 이용한 자동 인증 처리 방법 및 시스템
WO2020032351A1 (ko) 익명 디지털 아이덴티티 수립 방법
EP3114806A1 (en) Network node, device and methods for providing an authentication module
WO2016085050A1 (ko) 주변기기와 연동하는 사용자 단말기 및 그것을 이용한 정보 유출 방지 방법
WO2018016830A1 (ko) 파일 암호화 방지 장치 및 방법
WO2016155283A1 (zh) 基于wifi热点实现电子设备私密保护的方法及系统
WO2014185627A1 (ko) 데이터 프로세싱 시스템 보안 장치와 보안방법
WO2016076487A1 (ko) 지문센서와 장착식 스마트 카드와 메모리 카드를 구비한 유에스비 보안장치 및 그 보안 방법
WO2016064040A1 (ko) 서명정보를 이용하여 응용 프로그램의 위변조 여부를 탐지하는 사용자 단말기 및 그것을 이용한 위변조 탐지 방법
WO2015099287A1 (ko) 일회용 비밀 번호를 이용하는 사용자 인증 방법 및 그 장치
WO2022035021A1 (ko) 생체정보를 이용한 로그인방법, 장치 및 프로그램

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16892302

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 16892302

Country of ref document: EP

Kind code of ref document: A1