WO2018149215A1 - Procédé et terminal de vérification de remise à neuf - Google Patents

Procédé et terminal de vérification de remise à neuf Download PDF

Info

Publication number
WO2018149215A1
WO2018149215A1 PCT/CN2017/114344 CN2017114344W WO2018149215A1 WO 2018149215 A1 WO2018149215 A1 WO 2018149215A1 CN 2017114344 W CN2017114344 W CN 2017114344W WO 2018149215 A1 WO2018149215 A1 WO 2018149215A1
Authority
WO
WIPO (PCT)
Prior art keywords
verification
preset
data
result
terminal
Prior art date
Application number
PCT/CN2017/114344
Other languages
English (en)
Chinese (zh)
Inventor
陈世雄
鲁长江
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2018149215A1 publication Critical patent/WO2018149215A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot

Definitions

  • the present disclosure relates to mobile terminal technologies, and in particular, to a flash verification method and a terminal.
  • Brushing means changing or replacing some language, pictures, data, software or operating system originally stored in the terminal by certain methods.
  • the brushing machine can make the function of the terminal more perfect and can restore the terminal to the original state. It is because the flashing or data clearing operation can restore the terminal to the original state, and therefore, the anti-theft system installed by the user in the terminal to prevent theft of the terminal becomes ineffective. That is to say, after the terminal is lost, all the data in the terminal can be cleared by the flashing or data clearing operation, so that the lost terminal is difficult to be retrieved.
  • the problem of illegal brushing is often solved by turning off the factory test mode, verifying the digital signature of the terminal version, and using the vendor download protocol.
  • the embodiment of the present disclosure provides a flashing machine verification method and a terminal, which perform flashing verification according to verification data preset by a user before performing flashing or data clearing, thereby completely solving the problem of preventing illegal brushing, and realizing the requirement of preventing data clearing.
  • Embodiments of the present disclosure provide a brush verification method, including:
  • the opening instruction corresponding to the opening operation is obtained, and determining whether the opening instruction is a normal opening type according to a preset rule;
  • the open command is not a normal open type, receiving first verification data, according to the first verification data and Determining the verification data to perform the first verification, and obtaining the first verification result; wherein the preset verification data is the verification data set after the first opening operation;
  • the first verification is performed according to the first verification data and the preset verification data, and the first verification result is obtained, including:
  • the preset verification data includes a preset biometric data or a preset verification password
  • the determining whether the first comparison result satisfies the first condition includes:
  • the first comparison result is that the first verification data is identical to at least one of the preset biometric data and the preset verification password, determining that the first comparison result satisfies the first condition;
  • the first comparison result is that the first verification data is different from any one of the preset biometric data and the preset verification password, determining that the first comparison result does not satisfy the first condition .
  • the method further includes:
  • the method further includes:
  • the opening operation is the first time
  • the second verification password is received, and the second verification is performed according to the second verification password and the pre-stored initial password, to obtain a second verification result
  • the preset verification data is set.
  • the method before the determining whether the opening operation is the first opening operation, the method further includes:
  • the method further includes:
  • the preset verification data is stored to the independent storage partition.
  • the embodiment of the present disclosure provides a terminal, where the terminal includes:
  • a determining unit configured to: when the opening operation is received, and the opening operation is not the first opening operation, obtaining an opening instruction corresponding to the opening operation, and determining, according to a preset rule, whether the opening instruction is a normal opening type;
  • a verification unit configured to receive the first verification data when the open command is not the normal open type, perform the first verification according to the first verification data and the preset verification data, to obtain a first verification result; Let the verification data be the verification data set after the first opening operation;
  • the brushing unit is configured to allow the brushing operation to be performed when the first verification result is that the verification is successful.
  • the verification unit includes:
  • Obtaining a subunit configured to obtain a first comparison result by comparing the first verification data and the preset verification data
  • a determining subunit configured to determine whether the first comparison result satisfies the first condition
  • Determining a subunit configured to determine that the first verification result is that the verification is successful when the first comparison result satisfies the first condition
  • the determining subunit is further configured to determine that the first verification result is a verification failure when the first comparison result is that the first condition is not satisfied.
  • the preset verification data includes preset biometric data or a preset verification password.
  • the determining subunit is further configured to determine the first comparison when the first comparison result is that the first verification data is the same as at least one of the preset biometric data and the preset verification password The result satisfies the first condition;
  • the determining subunit is further configured to determine the first when the first comparison result is that the first verification data is different from any one of the preset biometric data and the preset verification password. The comparison result does not satisfy the first condition.
  • the terminal further includes:
  • the opening unit is configured to perform the first verification according to the first verification data and the preset verification data, and after the first verification result is obtained, when the first verification result is the verification failure, perform a normal opening operation.
  • the terminal further includes a setting unit, a dividing unit, and a storage unit;
  • the determining unit is further configured to determine whether the opening operation is a first opening operation
  • the verification unit is further configured to receive a second verification password when the opening operation is the first opening operation, and perform a second verification according to the second verification password and the pre-stored initial password to obtain a second verification result;
  • the setting unit is configured to set the preset verification data when the second verification result is that the verification is successful
  • the dividing unit is configured to determine whether the open operation is a first open operation before dividing the independent storage partition
  • the storage unit is configured to store the preset verification data to the independent storage partition after the setting the preset verification data.
  • the embodiment of the present disclosure provides a flashing verification method and a terminal.
  • the open command corresponding to the open operation is obtained, and the open command is determined according to the preset rule.
  • the first verification result is received according to the first verification data and the preset verification data, and the first verification result is obtained, where the preset verification data is the first time.
  • the verification data set after the operation is turned on; when the first verification result is that the verification is successful, the brush operation is allowed. That is to say, in the technical solution proposed by the present disclosure, if the open command of the terminal is an abnormal open type, the verification is performed according to the preset verification data, and the terminal allows the brush operation only after the verification is successful.
  • the brush verification method and the terminal provided by the embodiments of the present disclosure perform the verification of the flashing according to the verification data preset by the user before the brushing or data clearing, thereby completely solving the problem of preventing the illegal brushing. And implement the number of prevention According to the need to clear.
  • FIG. 1 is a flow chart 1 of a method for verifying a brush machine according to an embodiment of the present disclosure
  • FIG. 2 is a second flowchart of a brush verification method according to an embodiment of the present disclosure
  • FIG. 3 is a third flowchart of a method for verifying a brush machine according to an embodiment of the present disclosure
  • FIG. 4 is a flow chart 4 of a method for verifying a brush machine according to an embodiment of the present disclosure
  • FIG. 5 is a flowchart 5 of a method for verifying a brush machine according to an embodiment of the present disclosure
  • FIG. 6 is a flowchart 6 of a method for verifying a brush machine according to an embodiment of the present disclosure
  • FIG. 7 is a schematic structural diagram of a first component of a terminal according to an embodiment of the present disclosure.
  • FIG. 8 is a schematic structural diagram of a second component of a terminal according to an embodiment of the present disclosure.
  • FIG. 9 is a schematic structural diagram of a third component of a terminal according to an embodiment of the present disclosure.
  • FIG. 10 is a schematic structural diagram of a fourth component of a terminal according to an embodiment of the present disclosure.
  • FIG. 1 is a schematic diagram of an implementation process of a flashing machine verification method according to an embodiment of the present disclosure.
  • a method for verifying a brush operation by a terminal may include the following steps:
  • Step 101 When an open operation is received, and the open operation is not the first open operation, the open instruction corresponding to the open operation is obtained, and it is determined according to the preset rule whether the open command is a normal open type.
  • the terminal after the terminal receives the opening operation, and the opening operation is not the first opening operation, the terminal acquires the opening instruction corresponding to the opening operation, and determines whether the opening instruction is a normal opening type according to a preset rule. .
  • the terminal may obtain an open command according to an operation of the user, where the first open operation refers to a setting after the terminal leaves the factory, and the user has not performed the flash verification, that is, the user is When the terminal is turned on for the first time, the flashing verification must be set first, otherwise the normal booting operation cannot be performed.
  • the user's operation is different, and the obtained opening command is different.
  • the user operates in order to use the terminal normally, and the opening command acquired by the terminal is corresponding to the normal use terminal. Turn on the command.
  • the open command may include a normal open type and an abnormal open type.
  • the normal open type refers to the open type corresponding to the normal use flow after the user starts the terminal
  • the non-normal open type refers to the open type corresponding to the process of flashing or data clearing after the user turns on the terminal.
  • the preset rule is used for determining the normal open type.
  • the open command is a normal open type
  • Step 102 When the open command is not the normal open type, receive the first verification data, perform the first verification according to the first verification data and the preset verification data, and obtain a first verification result; wherein the preset verification data is the first open operation The verification data is then set.
  • the terminal may receive the first verification data, and then according to the first verification data. And performing the first verification with the preset verification data, and obtaining the first verification result by the first verification.
  • the first verification data may include the master data or the first verification password.
  • the preset verification data may include preset bio data or a preset verification password.
  • the first verification is used to perform the verification of the abnormal opening, that is, before the process of the device is required to perform the process of flashing or data clearing, the first verification result is obtained by using the first verification.
  • the preset verification data is verification data set after the first opening operation, wherein the preset verification data may include preset biometric data or a preset verification password. That is to say, when the preset verification data is the first time that the terminal is turned on, the terminal sets according to the user's selection operation and input operation.
  • the preset biometric data is a plurality of biometric data entered by the user, and the user can input data of a plurality of biometric features, for example, eyeprint data, fingerprint data, iris data, and the like.
  • the above preset verification password is the verification password input by the user.
  • the terminal may normally start according to the normal open type open command. operating.
  • Step 103 When the first verification result is that the verification is successful, the brushing operation is allowed.
  • the terminal performs the first verification according to the first verification data and the preset verification data, and after obtaining the first verification result by using the first verification, if the first verification result is that the verification is successful, the device passes the brush Verification, then the terminal allows the brush operation.
  • the method for verifying the brush machine obtains an open command according to a user operation and performs an open operation, and determines whether the open operation is the first open operation by the open command; when the open operation is not the first open operation, the open command is obtained, and according to The preset rule determines whether the open command is a normal open type; wherein the preset rule is used for the determination of the normal open type; when the open command is not the normal open type, the first verification data is received, according to the first verification data and the preset verification data. Performing the first verification to obtain the first verification result; wherein the preset verification data is the verification data set after the first opening operation; when the first verification result is the verification success, the brushing operation is allowed.
  • the brush verification method proposed by the embodiment of the present disclosure performs the brush verification according to the verification data preset by the user before the brushing or data clearing, so that the problem of preventing the illegal brushing can be completely solved, and Achieve the need to prevent data cleanup.
  • FIG. 2 is a flow chart 2 of a method for verifying a brush machine according to an embodiment of the present disclosure.
  • FIG. 2 is a schematic diagram of an implementation process of a first verification method according to an embodiment of the present disclosure.
  • the first verification is performed according to the first verification data and the preset verification data, and after the first verification result is obtained, that is, after the step 102, the terminal performs the verification according to the preset.
  • the method of repeating the first verification of the data further includes the following steps:
  • Step 104 When the first verification result is that the verification fails, perform a normal opening operation.
  • the terminal performs the first verification according to the first verification data and the preset verification data. After the first verification result is obtained, when the first verification result is the verification failure, the terminal may perform a normal opening operation. That is to say, if the terminal does not pass the first verification, the terminal will not allow the brush operation, but directly performs the normal opening operation.
  • the terminal performs the first verification according to the preset verification data, and after obtaining the first verification result, when the first verification result is the verification failure, the terminal may record the number of times of the first verification, and according to the preset The verification data is re-executed for the first verification process, and the first verification result is obtained again. That is to say, even if the verification result of the first verification is the verification failure, the terminal may perform the first verification again; when the number of the first verification is greater than or equal to the first preset threshold, the normal startup operation is performed.
  • the terminal After the first verification result is a verification failure, the terminal records the number of times of the first verification, and the terminal can perform a normal power-on operation until the first verification number is greater than or equal to the first preset threshold. That is to say, within the range of the first preset threshold, if the terminal still fails to pass the first verification, the terminal will not allow the brush operation, but directly performs the normal boot operation.
  • the first preset threshold may be the maximum number of verifications set by the user, or may be the default maximum number of verifications by the terminal system. Specifically, when the number of the first verification is less than the first preset threshold, the terminal may repeat the first verification after the first verification result is a verification failure, until the first verification number is greater than or equal to the first preset threshold. For example, when the first preset threshold is 3, the terminal may continue to perform the third first verification after the verification result of the first two verifications is the verification failure, that is, after the first verification number is 2. And if the verification result of the third first verification is that the verification fails, that is, after the first verification number is 3, the terminal cannot continue the first verification, but performs a normal power-on operation.
  • the method for verifying the brush provided by the embodiment of the present disclosure, if the open command of the terminal is an abnormal open type, performs verification according to the preset verification data, and the terminal allows the brush operation only after the verification is successful.
  • the brush verification method proposed by the embodiment of the present disclosure performs the brush verification according to the verification data preset by the user before the brushing or data clearing, so that the problem of preventing the illegal brushing can be completely solved, and Achieve the need to prevent data cleanup.
  • FIG. 3 is a third flowchart of a method for verifying a brush machine according to an embodiment of the present disclosure.
  • a terminal performs first verification according to preset verification data, and obtains a first verification result.
  • the method includes the following steps:
  • Step 201 Obtain a first comparison result by comparing the first verification data with the preset verification data.
  • the terminal after determining whether the open command is a normal open type according to a preset rule, if the open command is not the normal open type, the terminal receives the first verification data, and the first verification data and the pre- Set the verification data for comparison and then obtain the first alignment result.
  • the terminal after determining whether the open command is a normal open type according to a preset rule, if the open command is not the normal open type, the terminal receives the first biological data, and the first biological data and the pre- Let the biological data be compared and then obtain the first alignment result.
  • the preset biometric data may be set by the terminal according to a user's selection operation when the terminal is powered on for the first time.
  • the preset biometric data is a plurality of biometric data entered by the user, and the user can input data of a plurality of biometric features, for example, eyeprint data, fingerprint data, iris data, and the like.
  • the terminal when receiving the first biometric data, may select different biometric technologies to perform acquisition of related data of different biometrics.
  • the terminal after determining whether the open command is a normal open type according to a preset rule, if the open command is not the normal open type, the terminal receives the first verification password, and the first verification password and the pre- Set the verification password to compare and then get the first comparison result.
  • the preset verification password may be set by the terminal according to an input operation of the user when the terminal is powered on for the first time.
  • the preset verification password is a plurality of types of passwords input by the user, for example, a numeric password, a text password, an alphanumeric password, and a verification password of a plurality of password combinations.
  • Step 202 Determine whether the first comparison result satisfies the first condition.
  • the terminal receives the first verification data, and compares the first verification data with the preset verification data, and then obtains the first comparison result, the terminal determines whether the first comparison result satisfies the first A condition.
  • the terminal determines that the first comparison result satisfies the first condition; If the comparison result is that the first verification data is different from any one of the preset biometric data and the preset verification password, the terminal determines that the first comparison result does not satisfy the first condition.
  • the first comparison result is that the first biometric data and the preset biometric data are different, and the first verification password and the preset verification password are different, the first determination is performed.
  • the comparison result does not satisfy the first condition.
  • Step 203 When the first comparison result satisfies the first condition, determine that the first verification result is that the verification is successful.
  • the terminal compares the first verification data with the preset verification data, and after obtaining the first comparison result, the terminal determines whether the first comparison result satisfies the first condition, if the first comparison Result satisfaction In the first condition, the first verification result is determined to be successful verification.
  • the first comparison result is the same as the first biometric data and the preset biometric data, or the first verification password and the preset verification password are the same, determining that the first comparison result satisfies the first condition, That is, the first verification result is determined to be successful.
  • Step 204 When the first comparison result does not satisfy the first condition, determine that the first verification result is a verification failure.
  • the terminal compares the first verification data with the preset verification data, and after obtaining the first comparison result, the terminal determines whether the first comparison result satisfies the first condition, if the first comparison When the result does not satisfy the first condition, it is determined that the first verification result is a verification failure.
  • the first comparison result is that the first biometric data and the preset biometric data are different, and the first verification password and the preset verification password are also different, determining that the first comparison result is not satisfied
  • the first condition is to determine that the first verification result is a verification failure.
  • the terminal may combine the foregoing two methods for obtaining the first verification result, that is, performing the first verification in combination with the preset biometric data and the preset verification password, thereby improving the security of the terminal flash verification. .
  • the first verification by using the preset biometric data can effectively reduce the cost of the user to memorize the preset verification password and the difficulty of inputting the first verification password, so that the preset biometric data can be preferably used.
  • the first verification method of obtaining the first verification result can effectively reduce the cost of the user to memorize the preset verification password and the difficulty of inputting the first verification password, so that the preset biometric data can be preferably used.
  • the method for verifying the brush provided by the embodiment of the present disclosure, if the open command is of the abnormal open type, performs verification according to the preset verification data, and the terminal allows the brush operation only after the verification is successful.
  • the brush verification method proposed by the embodiment of the present disclosure performs the brush verification according to the verification data preset by the user before the brushing or data clearing, so that the problem of preventing the illegal brushing can be completely solved, and Achieve the need to prevent data cleanup.
  • FIG. 4 is a flowchart 4 of a method for verifying a brush machine according to an embodiment of the present disclosure. As shown in FIG. 4, after the terminal receives the opening operation, the method for performing the second verification may include the following steps:
  • Step 301 Determine whether the opening operation is the first opening operation.
  • the terminal may determine, according to a user operation, whether the opening operation is the first opening operation.
  • the first opening operation refers to the setting of the terminal after the factory is shipped, and the user has not performed the setting of the flashing verification. That is to say, when the user first turns on the terminal, the user must first set the verification of the brushing, otherwise the normal starting operation cannot be performed.
  • Step 302 When the opening operation is the first time, the second verification password is received, and the second verification is performed according to the second verification password and the pre-stored initial password, to obtain a second verification result.
  • the terminal may receive the second verification password, according to the second verification password and the pre-stored initial password. Second verification, and obtaining the second verification result by the second verification.
  • the foregoing second verification is used to perform verification on the pre-stored initial password when the first time is turned on, that is, after the terminal is turned on, and before setting the preset verification data, that is, setting the preset biometric data or pre-setting Assume Before verifying the password, the second verification result needs to be obtained through the second verification. That is to say, after the terminal is turned on for the first time, the user can be guided to enter the setting of the flash verification.
  • the pre-stored initial password may be preset to a flash verification password when the terminal is shipped, and the pre-stored initial password is unique for different terminals, and the manufacturer may package in the terminal.
  • the user is separately issued to the user, and the pre-stored initial password is used as the pre-stored initial password verified by the user, and the password can also be used to retrieve the preset biometric data or the voucher of the preset verification password.
  • Step 303 When the second verification result is that the verification is successful, setting preset verification data.
  • the terminal may set the preset verification data, that is, the pre-predetermined Set the bio data or preset verification password.
  • the terminal when setting the preset biometric data, may select different biometric technologies to collect related data of different biometrics. After the preset biometric data or the preset verification password is set, the terminal can separately divide a partition as the storage partition of the pre-stored initial password and the preset biometric data or the preset verification password, and the partition can only be verified by brushing and brushing. And after-sales tools to read and write, so that users can be prevented from unintentionally clearing the data.
  • the terminal may divide the independent storage partition and store the preset verification data to the independent storage partition.
  • the terminal separately divides a partition as a storage partition of the anti-brush password and the biometric data in the biometric technology, and the partition can only be verified by the anti-brush machine, the anti-brush setting and the after-sales tool are read and written to avoid The user unintentionally cleared the data.
  • the terminal may store the preset verification data into the pre-divided independent storage partition.
  • the method for verifying the brush provided by the embodiment of the present disclosure, if the open command of the terminal is an abnormal open type, performs verification according to the preset verification data, and the terminal allows the brush operation only after the verification is successful.
  • the brush verification method proposed by the embodiment of the present disclosure performs the brush verification according to the verification data preset by the user before the brushing or data clearing, so that the problem of preventing the illegal brushing can be completely solved, and Achieve the need to prevent data cleanup.
  • FIG. 5 is a flowchart of a method for verifying a brush machine according to an embodiment of the present disclosure.
  • FIG. 5 is a schematic diagram of an implementation process of a second verification method according to an implementation of the fourth embodiment, as shown in FIG.
  • the opening operation is the first opening operation
  • the second verification is performed according to the pre-stored initial password
  • the second verification result is obtained, that is, after the step 302
  • the terminal performs the second verification according to the pre-stored initial password. It also includes the following steps:
  • Step 304 When the second verification result is that the verification fails, perform a shutdown operation.
  • the terminal performs the second verification according to the second verification password and the pre-stored initial password. After the second verification result, when the second verification result is that the verification fails, the terminal can perform the shutdown operation. That is to say, if the terminal does not pass the second verification, the terminal will not allow the operation of setting the preset verification data, but directly performs the shutdown operation.
  • the terminal may record the number of times of the second verification, and according to the pre-stored initial The password is re-executed for the second verification; the terminal records the number of times of the second verification each time the second verification result is the verification failure, and the terminal can perform the preset shutdown until the second verification number is greater than or equal to the second preset threshold. Process operation.
  • the second preset threshold may be the maximum number of verifications set by the user, or may be the default maximum number of verifications by the terminal system. Specifically, when the number of times of the second verification is less than the second preset threshold, the terminal may repeat the second verification after the second verification result is the verification failure, until the second verification number is greater than or equal to the second preset threshold. For example, when the second preset threshold is 3, the terminal may continue to perform the third second verification after the verification result of the second consecutive verification is the verification failure, that is, after the second verification number is 2. And if the verification result of the third second verification is that the verification fails, that is, after the second verification number is 3, the terminal cannot continue the second verification, but performs a preset shutdown process.
  • the terminal does not set the preset verification parameter, that is, the terminal does not perform the brush verification setting
  • the flash verification must still be set first. That is to say, when the user first turns on the terminal, the user must first set the flash verification, otherwise the normal boot operation cannot be performed. This can avoid illegal brushing or data clearing operations.
  • the method for verifying the brush provided by the embodiment of the present disclosure, if the open command of the terminal is an abnormal open type, performs verification according to the preset verification data, and the terminal allows the brush operation only after the verification is successful.
  • the brush verification method proposed by the embodiment of the present disclosure performs the brush verification according to the verification data preset by the user before the brushing or data clearing, so that the problem of preventing the illegal brushing can be completely solved, and Achieve the need to prevent data cleanup.
  • FIG. 6 is a flowchart 6 of a method for verifying a brush machine according to an embodiment of the present disclosure.
  • a terminal performs a second verification according to a pre-stored initial password to obtain a second verification result.
  • the specific method includes the following steps:
  • Step 302a Receive a second verification password, and obtain a second comparison result by comparing the second verification password with the pre-stored initial password.
  • the terminal after determining whether the open operation is the first open operation by the open command, if the open operation is the first open operation, the terminal receives the second verification password, and the second verification password and the initial storage password are initialized. The passwords are compared and then the second alignment result is obtained.
  • the foregoing types of passwords set by the initial password manufacturer are pre-stored, for example, a numeric password, a text password, an alphanumeric password, and a verification password of a plurality of password combinations.
  • Step 302b When the second comparison result is the same, determine that the second verification result is that the verification is successful.
  • the terminal receives the second verification password, and after obtaining the second comparison result by comparing the second verification password and the pre-stored initial password, if the second comparison result is the same, that is, the second verification The password matches the pre-stored initial password, and the terminal can determine that the second verification result is that the verification is successful.
  • Step 302c When the second comparison result is different, determining that the second verification result is a verification failure.
  • the terminal receives the second verification password, and after obtaining the second comparison result by comparing the second verification password and the pre-stored initial password, if the second comparison result is different, that is, the second verification If the password does not match the pre-stored initial password, the terminal may determine that the second verification result is a verification failure.
  • the terminal in the first step, may perform the second verification according to the pre-stored initial password, so that the preset verification data may be set, that is, In the first open operation of the terminal, the user can customize the flash verification only after passing the second verification. Thereby avoiding the problem of illegal brushing and data clearing operations.
  • FIG. 7 is a schematic diagram of a first component structure of a terminal according to an embodiment of the present disclosure.
  • the terminal 1 according to the specific embodiment of the present disclosure includes: a determining unit 11, a verifying unit 12, and a brushing unit 13, wherein
  • the determining unit 11 is configured to: when the opening operation is received, and the opening operation is not the first opening operation, obtain an opening instruction corresponding to the opening operation, and determine, according to the preset rule, whether the opening instruction is a normal opening type.
  • the verification unit 12 is configured to receive the first verification data when the open command is not the normal open type, perform the first verification according to the first verification data and the preset verification data, and obtain the first verification result; wherein the preset verification data is The verification data set after the first operation is turned on.
  • the brush unit 13 is arranged to allow the brushing operation to be performed when the first verification result is that the verification is successful.
  • FIG. 8 is a schematic diagram of a second component structure of a terminal according to an embodiment of the present disclosure. As shown in FIG. 8 , the terminal 1 according to the specific embodiment of the present disclosure further includes: an opening unit 14 , where
  • the opening unit 14 is configured to perform the first verification according to the first verification data and the preset verification data. After the first verification result is obtained, when the first verification result is the verification failure, the normal opening operation is performed.
  • FIG. 9 is a schematic diagram of a third component structure of a terminal according to an embodiment of the present disclosure.
  • the verification unit 12 includes: an obtaining subunit 121, a determining subunit 122, and a determining subunit 123.
  • the obtaining subunit 121 is configured to obtain a first comparison result by comparing the first verification data with the preset verification data.
  • the determining sub-unit 122 is configured to determine whether the first comparison result satisfies the first condition.
  • the preset verification data includes preset biometric data or a preset verification password
  • the determining subunit 122 is further configured to: when the first comparison result is the first verification data and the preset biometric data and the preset When the at least one of the verification passwords is the same, it is determined that the first comparison result satisfies the first condition; the determining sub-unit 122 is further configured to: when the first comparison result is any of the first verification data and the preset biometric data and the preset verification password When one is different, it is determined that the first comparison result does not satisfy the first condition.
  • the determining subunit 123 is configured to determine that the first verification result is that the verification is successful when the first comparison result satisfies the first condition.
  • the determining subunit 123 is further configured to determine that the first verification result is a verification failure when the first comparison result is that the first condition is not satisfied.
  • FIG. 10 is a schematic diagram of a fourth component structure of a terminal according to an embodiment of the present disclosure.
  • the terminal 1 further includes: a setting unit 15, a dividing unit 16, and a storage unit 17, wherein
  • the determining unit 11 is further configured to determine whether the opening operation is the first opening operation.
  • the verification unit 12 is further configured to receive the second verification password when the opening operation is the first opening operation, and perform the second verification according to the second verification password and the pre-stored initial password to obtain the second verification result.
  • the setting unit 15 is configured to set the preset verification data when the second verification result is that the verification is successful.
  • the dividing unit 16 is configured to divide the independent storage partition before determining whether the opening operation is the first opening operation.
  • the storage unit 17 is configured to store the preset verification data to the independent storage partition after setting the preset verification data.
  • the terminal acquires an open command according to a user operation and performs an open operation, and determines whether the open operation is the first open operation by the open command; when the open operation is not the first open operation, the open command is obtained, and according to the preset
  • the rule determines whether the open command is a normal open type; wherein the preset rule is used for the determination of the normal open type; when the open command is not the normal open type, the first verification is performed according to the preset verification data, and the first verification result is obtained;
  • the preset verification data is the verification data set after the first opening operation; when the first verification result is that the verification is successful, the brushing operation is allowed.
  • a terminal proposed by the embodiment of the present disclosure performs the verification of the flashing according to the verification data preset by the user before performing the flashing or data clearing, so that the problem of preventing the illegal brushing can be completely solved, and the prevention is prevented. The need for data cleanup.
  • the determining unit 11, the verifying unit 12, the brushing unit 13, the opening unit 14, the setting unit 15, the dividing unit 16, and the storage unit 17 may all be executed by the processor in the mobile terminal in the form of program code.
  • the function is implemented; of course, it can also be implemented by a specific logic circuit; in the process of the specific embodiment, the processor can be a central processing unit (CPU), a microprocessor (MPU), a digital signal processor (DSP) or a field. Programming gate arrays (FPGAs), etc.
  • embodiments of the present disclosure can be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of a hardware embodiment, a software embodiment, or a combination of software and hardware aspects. Moreover, the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) including computer usable program code.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

L'invention concerne un procédé de vérification de remise à neuf et un terminal. Le procédé consiste à : acquérir une instruction d'activation correspondant à une opération d'activation lorsque l'opération d'activation est reçue et que l'opération d'activation n'est pas la première opération d'activation, et déterminer, selon une règle prédéfinie, si l'instruction d'activation appartient à un type d'activation normal (101); recevoir des premières données de vérification lorsque l'instruction d'activation n'appartient pas à un type d'activation normal, et effectuer une première vérification en fonction des premières données de vérification et des données de vérification prédéfinies afin d'obtenir un premier résultat de vérification (102), les données de vérification prédéfinies étant des données de vérification réglées après la première opération d'activation; et permettre une opération de remise à neuf lorsque le premier résultat de vérification consiste en ce que la vérification est réussie (103).
PCT/CN2017/114344 2017-02-16 2017-12-02 Procédé et terminal de vérification de remise à neuf WO2018149215A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710083807.XA CN108446545A (zh) 2017-02-16 2017-02-16 一种刷机验证方法及终端
CN201710083807.X 2017-02-16

Publications (1)

Publication Number Publication Date
WO2018149215A1 true WO2018149215A1 (fr) 2018-08-23

Family

ID=63169151

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/114344 WO2018149215A1 (fr) 2017-02-16 2017-12-02 Procédé et terminal de vérification de remise à neuf

Country Status (2)

Country Link
CN (1) CN108446545A (fr)
WO (1) WO2018149215A1 (fr)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104021358A (zh) * 2014-05-30 2014-09-03 可牛网络技术(北京)有限公司 移动终端的防盗控制方法和装置
CN104199688A (zh) * 2014-08-15 2014-12-10 深圳市中兴移动通信有限公司 一种移动终端及其控制刷机的方法和装置
US20150341485A1 (en) * 2012-11-07 2015-11-26 Zte Corporation Version protection method and apparatus for mobile terminal
CN105740013A (zh) * 2016-01-26 2016-07-06 广东欧珀移动通信有限公司 刷机操作控制方法及装置
CN105787349A (zh) * 2016-02-29 2016-07-20 宇龙计算机通信科技(深圳)有限公司 一种安全刷机的方法及装置
CN105893811A (zh) * 2015-12-31 2016-08-24 乐视移动智能信息技术(北京)有限公司 一种电子设备刷机验证的方法和装置
CN106203124A (zh) * 2016-06-29 2016-12-07 宇龙计算机通信科技(深圳)有限公司 安装操作方法及操作装置、终端

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150341485A1 (en) * 2012-11-07 2015-11-26 Zte Corporation Version protection method and apparatus for mobile terminal
CN104021358A (zh) * 2014-05-30 2014-09-03 可牛网络技术(北京)有限公司 移动终端的防盗控制方法和装置
CN104199688A (zh) * 2014-08-15 2014-12-10 深圳市中兴移动通信有限公司 一种移动终端及其控制刷机的方法和装置
CN105893811A (zh) * 2015-12-31 2016-08-24 乐视移动智能信息技术(北京)有限公司 一种电子设备刷机验证的方法和装置
CN105740013A (zh) * 2016-01-26 2016-07-06 广东欧珀移动通信有限公司 刷机操作控制方法及装置
CN105787349A (zh) * 2016-02-29 2016-07-20 宇龙计算机通信科技(深圳)有限公司 一种安全刷机的方法及装置
CN106203124A (zh) * 2016-06-29 2016-12-07 宇龙计算机通信科技(深圳)有限公司 安装操作方法及操作装置、终端

Also Published As

Publication number Publication date
CN108446545A (zh) 2018-08-24

Similar Documents

Publication Publication Date Title
US20170193212A1 (en) Screen Interface Unlocking Method And Screen Interface Unlocking Device
CN111095213A (zh) 嵌入式程序的安全引导方法、装置、设备及存储介质
WO2017211199A1 (fr) Procédé et dispositif d'authentification d'identité
US20160234024A1 (en) Leveraging Multiple Biometrics For Enabling User Access To Security Metadata
US20140223549A1 (en) Passwords for Touch-Based Platforms Using Time-Based Finger Taps
US11783041B2 (en) Electronic device for updating firmware based on user authentication and an operating method thereof
US20110060899A1 (en) Power on certification method for personal computer and power on certification system thereof
US8386763B1 (en) System and method for locking down a capability of a computer system
CN104021358A (zh) 移动终端的防盗控制方法和装置
US8621195B2 (en) Disabling communication ports
CN110598384B (zh) 信息保护方法、信息保护装置及移动终端
US11347837B2 (en) Method and apparatus for enhancing security of vehicle controller
JP5938997B2 (ja) 情報記憶装置、情報記憶装置制御プログラム、情報記憶装置制御方法
JP4653497B2 (ja) 携帯記憶装置
WO2018149215A1 (fr) Procédé et terminal de vérification de remise à neuf
JP2004051056A (ja) 自動車用電子制御装置
CN112966276B (zh) 一种计算机的安全启动方法、装置及介质
CN110781527B (zh) 一种控制寄存器保护方法与装置
NL2010437C2 (en) Data storage device and computer system comprising such data storage device.
JP6150943B2 (ja) 制御装置
WO2016177097A1 (fr) Procédé et dispositif de conservation de la sécurité des informations d'un terminal mobile, et support de stockage
JP4838735B2 (ja) リムーバブルメモリユニット
CN107943721B (zh) 一种电子设备的数据加密方法及装置
KR101956843B1 (ko) 다차종용 통합 소프트웨어를 이용한 차량의 캘리브레이션 데이터 적용 방법 및 그 장치
US20140344562A1 (en) Method and device for preventing access to administrative privilege

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17897121

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17897121

Country of ref document: EP

Kind code of ref document: A1