WO2022087949A1 - 一种电子设备及进入强制加载模式的方法 - Google Patents

一种电子设备及进入强制加载模式的方法 Download PDF

Info

Publication number
WO2022087949A1
WO2022087949A1 PCT/CN2020/124710 CN2020124710W WO2022087949A1 WO 2022087949 A1 WO2022087949 A1 WO 2022087949A1 CN 2020124710 W CN2020124710 W CN 2020124710W WO 2022087949 A1 WO2022087949 A1 WO 2022087949A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic device
peer
short
wireless communication
range wireless
Prior art date
Application number
PCT/CN2020/124710
Other languages
English (en)
French (fr)
Inventor
赵谦
陈光跃
贾波
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2020/124710 priority Critical patent/WO2022087949A1/zh
Priority to CN202080006482.5A priority patent/CN114730265A/zh
Publication of WO2022087949A1 publication Critical patent/WO2022087949A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating

Definitions

  • the embodiments of the present application relate to the field of communication technologies, and in particular, to an electronic device and a method for entering a forced loading mode.
  • the mobile terminal When the mobile terminal is faulty, it is usually necessary to send the mobile terminal to a maintenance point for maintenance, and the faults include various types of failure to boot normally or failure to operate normally after booting. During maintenance, the mobile terminal can enter the forced loading mode to start up for subsequent maintenance.
  • the design scheme for the mobile terminal to enter the forced loading mode is to design a dedicated pin in the chip in the mobile terminal, such as a system on chip (SOC, system on chip), named as the boot mode selection (BOOT_MODE) pin, in the SOC
  • SOC system on chip
  • BOOT_MODE boot mode selection
  • the solidified boot code (BootROM) will detect the state of the BOOT_MODE pin, and perform different follow-up processes according to the different level states: when the BOOT_MODE pin is at a high level, the boot is normally started, and the SOC is stored from the external storage device.
  • a test point and a docking device port are generally reserved for the BOOT_MODE pin on the mobile terminal.
  • Method 1 Using a test point, short-circuit the test point corresponding to the BOOT_MODE pin with the ground terminal of the wire through a fixture, and power on the mobile terminal at the same time, so that the mobile terminal enters the forced loading mode.
  • Method 2. Insert a custom circuit board, such as a specific flexible printed circuit (FPC, flexible printed circuit) soft board, into the mobile terminal user identification card (SIM, subscriber identity module) slot, and control the BOOT_MODE tube by customizing the configuration on the circuit board. The pin is pulled low to make the mobile terminal enter the forced loading mode.
  • FPC flexible printed circuit
  • the mobile terminal In the research and development process of the mobile terminal, the mobile terminal is generally equipped with a special security shell and a data port seal to protect the information security of the mobile terminal in the research and development process.
  • a special security shell and a data port seal to protect the information security of the mobile terminal in the research and development process.
  • Embodiments of the present application provide an electronic device and a method for entering a forced loading mode, which are used to enter the forced loading mode through a wireless connection and complete version image loading and upgrade.
  • a first aspect of the embodiments of the present application provides an electronic device, including a short-range wireless communication module and a processing device.
  • the electronic device needs to establish a connection with the peer device to complete the version image loading.
  • the above short-range wireless communication module may be configured to receive the forced loading information sent by the opposite end device through the air interface, and perform security authentication on the opposite end device. After the peer device passes the security authentication, it indicates that the peer device is a legal device. Then the processing device can be used to control the electronic device to enter the forced loading mode, so as to load the version image.
  • the electronic device receives the forced loading information sent by the peer device through the short-range wireless communication module, and after performing security authentication on the peer device, enters the forced loading mode to complete the version image loading. Therefore, when the electronic device enters the forced loading mode, it is not necessary to remove the security shell and the data port seal of the electronic device, thereby avoiding the hidden danger of information leakage during the research and development process.
  • the security authentication of the peer device can also prevent any illegal device from arbitrarily controlling the electronic device to enter the forced loading mode, which strengthens the hardware security and data security of the electronic device.
  • the short-range wireless communication module may include a radio frequency system and a security authentication module.
  • the radio frequency system is specifically used to transmit air interface information with the peer device, including the mandatory loading information sent by the peer device and the version image;
  • the security authentication module is used to authenticate the peer device. If the security authentication is successful, then Make sure that the peer device is a legitimate device. If the security authentication fails, it is determined that the peer device is an illegal device.
  • the radio frequency system may also be used to send encrypted packets to the peer device, and the peer device receives the encrypted message. After the encrypted message is decrypted, an authentication message is obtained, and the authentication message is sent to the radio frequency system.
  • the security authentication module can be used to judge whether the received authentication message is decrypted correctly to authenticate the peer device. If the security authentication module determines that the authentication packet is decrypted correctly, the peer device passes the security authentication. If the security authentication module determines that the authentication packet is decrypted incorrectly, the peer device cannot pass the security authentication.
  • the short-range wireless communication module may further include a power supply module. Used to power RF systems and security authentication modules.
  • each module in the short-range wireless communication module can be directly powered by the power supply module. Therefore, even when the electronic device is in a shutdown state or cannot be turned on normally, each module in the short-range wireless communication module can still obtain power supply, work normally, and improve the reliability of the solution.
  • the short-range wireless communication module may further include a universal type Input and output (GPIO, general-purpose input/output), when the security authentication module successfully authenticates the peer device, the GPIO can be used to send the successfully authenticated instruction information to the processing device, so that the processor controls the electronic device to enter the forced loading mode .
  • GPIO universal type Input and output
  • the processing device may be an SOC, and the SOC may include a BOOT_MODE pin and a processor.
  • the BOOT_MODE pin can be used to receive the instruction information sent by the GPIO to successfully authenticate the peer device.
  • the processor can be used to control the electronic device to enter the forced loading mode.
  • the short The distance wireless communication module may be a near-field communication (NFC, near-field communication) controller.
  • a second aspect of the embodiments of the present application provides a method for entering a forced loading mode, the method is applied to an electronic device, and the method may specifically include: the electronic device receives, through a short-range wireless communication module, forced loading information sent by a peer device, and Perform security authentication on the peer device that sends the mandatory loading information. If the security authentication is successful, it is determined that the peer device is a legitimate device, and the electronic device enters the forced loading mode to load the version image. If the security authentication fails, it is determined that the peer device is an illegal device, and the electronic device refuses to enter the forced loading mode.
  • the data interaction between the electronic device and the peer device is completed through the air interface. Therefore, when the electronic device enters the forced loading mode, it is not necessary to remove the security shell and the data port seal of the electronic device. Avoid the hidden danger of information leakage during the research and development process. At the same time, the security authentication of the peer device can also prevent any illegal device from arbitrarily controlling the electronic device to enter the forced loading mode, which strengthens the hardware security and data security of the electronic device.
  • the electronic device may send an encrypted message to the opposite end device through the short-range wireless communication module.
  • the peer device decrypts it to obtain an authentication message, and sends the authentication message to the short-range wireless communication module in the electronic device.
  • the electronic device can determine whether the authentication message is decrypted correctly to authenticate the peer device, and if it is correct, the peer device is determined to be a legitimate device, and the electronic device enters the forced loading mode to load the version image. If it is not correct, it is determined that the peer device is an illegal device, and the electronic device refuses to enter the forced loading mode.
  • the short-range wireless communication module may be an NFC controller.
  • the short-range wireless communication module may be an NFC controller.
  • FIG. 1 is a schematic diagram of a scenario in which an electronic device loads a version image in an embodiment of the present application
  • FIG. 2 is a schematic diagram of NFC technology
  • FIG. 3 is an embodiment of an electronic device in an embodiment of the application
  • FIG. 4A is another embodiment of an electronic device in an embodiment of the present application.
  • 4B is a schematic diagram of a scenario in which an electronic device receives forced loading information after approaching a PC in an embodiment of the present application;
  • FIG. 5 is another embodiment of an electronic device in the embodiment of the application.
  • FIG. 6 is a schematic diagram of a polling mode of an NFC controller in an embodiment of the present application.
  • FIG. 7 is a schematic diagram of an embodiment of a method for entering a forced loading mode in an embodiment of the present application.
  • An embodiment of the present application provides an electronic device for entering a forced loading mode.
  • an electronic device such as a mobile phone or a tablet
  • the electronic device enters the fastboot mode to load the version image.
  • fastboot mode is a low-level flashing mode, which requires the electronic device to be connected to a personal computer (PC, personal computer) through a data cable to load a version image.
  • PC personal computer
  • the electronic device enters the forced loading mode to load the version image.
  • the above method 1 is applicable to all electronic devices that can be booted normally to fastboot mode.
  • method 2 can be used to make the electronic device enter the forced loading mode. Load the version image, but still need to rely on the data cable to establish the connection between the electronic device and the PC.
  • FIG. 1 shows a schematic diagram of an electronic device loading a version image in an embodiment of the present application.
  • the electronic device establishes a connection with a peer device (such as a PC) that stores the version image to be loaded through a short-range wireless communication module.
  • the electronic device can receive the forced loading information sent by the peer device through the air interface, thereby entering the forced loading mode.
  • the PC transmits the version image to be loaded to the electronic device through the air interface, and the electronic device performs the version image loading.
  • each module described in this application and the connection and composition relationship between the various modules are not limited to describing physical hardware modules or software modules.
  • the description of each module is described by taking a physical hardware module as an example.
  • each module may include functional circuits for implementing corresponding functions, and may also work under suitable software drivers.
  • the short-range wireless communication module may be an NFC controller, a Bluetooth module, or other short-range wireless communication modules, such as an infrared module, which is not specifically limited here.
  • the embodiments of the present application take an NFC controller as an example for description.
  • NFC is a short-range wireless connection technology based on radio frequency identification (RFID, radio frequency identification) technology.
  • RFID radio frequency identification
  • NFC technology uses radio frequency field induction to realize short-range communication of NFC terminals. Two NFC terminals can exchange information, content and transactions quickly, safely and contactlessly by touching or approaching.
  • the NFC standard specifies a flexible gateway system, which is divided into three working modes: peer-to-peer mode (P2P, peer-to-peer), reader mode and card emulation mode (CE, card emulation).
  • P2P peer-to-peer mode
  • CE card emulation mode
  • Peer-to-peer mode In this mode, two NFC devices can exchange data. For example, multiple digital cameras and mobile phones with NFC function can be wirelessly interconnected by using NFC technology to realize data exchange such as virtual business cards or digital photos.
  • the key point is to connect two devices with NFC function, so that the data transmission between points can be realized.
  • NFC-enabled mobile phones and computers and other related devices can truly achieve point-to-point wireless connection and data transmission, and in subsequent associated applications, not only local applications, but also network applications.
  • Card emulation mode simulates an NFC-enabled device into a tag or a contactless card.
  • an NFC-enabled mobile phone can be read as an access control card or a bank card.
  • the key point of the card simulation form is to simulate the device with NFC function to make it into a contactless card mode, such as bank card, bus card and access control card.
  • This form is mainly used in non-contact mobile payment such as shopping malls or transportation. In the specific application process, users only need to put their mobile phones or other related electronic devices close to the card reader, and enter the corresponding password to complete the transaction. .
  • data can be collected in a related device with NFC function, and then the data can be transmitted to the corresponding processing system for relevant processing.
  • Card reader mode In this mode, the NFC device is used as a contactless reader.
  • a mobile phone that supports the NFC function plays the role of a reader when interacting with the tag, and a mobile phone that enables the NFC function can read and write tags that support the NFC data format standard.
  • the NFC communication of the card reader mode is used as a contactless card reader.
  • the application fields of NFC based on the card reader mode include advertisement reading, ticket reading and movie theater ticket sales, etc., and can also support bus station information and tourist attraction map information. It can improve the convenience of users' travel and transportation.
  • an electronic device 300 provided by the present application includes: a short-range wireless communication module 301 , a processing device 302 , a security case 303 and a data port seal 304 .
  • the security shell 303 is generally used to prevent the appearance of the electronic device 300 from leaking, and the data port seal 304 protects the data interface of the electronic device 300 to prevent data information leakage of the electronic device 300 .
  • the security shell 303 or the data port seal 304 needs to be removed, so as to pull down the level of the BOOT_MODE pin to enter the forced loading mode, and use the data line to establish the electronic device 300 Connect with the peer device (such as PC) to load the version image.
  • the electronic device 300 may establish a wireless connection with the opposite end device through the short-range wireless communication module 301 .
  • the opposite device can send the forced loading information to the short-range wireless communication module 301 through the air interface.
  • the short-range wireless communication module 301 may also be used to authenticate whether the peer device is a legitimate device. For a specific security authentication process, refer to the embodiment described in FIG. 4 . After the security authentication is passed, the electronic device 300 can determine that the peer device is a legitimate device, and the processing device 302 can control the electronic device 300 to enter the forced loading mode.
  • the processing device may be a chip, a chipset, or a circuit system that performs forced loading and starts the system, which is not limited in this embodiment.
  • the short-range wireless communication module 301 also receives the version image sent by the peer device through the air interface, so that the electronic device performs version image loading again.
  • the information exchange between the short-range wireless communication module 301 and the peer device is completed through the air interface. Therefore, it is not necessary to remove the security shell 303 and the data port seal 303 of the electronic device, thereby reducing the number of electronic devices.
  • the short-range wireless communication module 301 can also perform security authentication on the peer device to ensure that the peer device that establishes a connection with the electronic device is legal, and ensures the hardware security and data security of the electronic device. .
  • the short-range wireless communication module as an NFC controller as an example.
  • the "peer device” mentioned in the embodiments of this application is only a general term for devices that perform functions such as sending forced loading information and participating in data interaction in which the electronic device enters the forced loading mode, and does not specifically refer to one or some devices. equipment.
  • the device performing the above functions may not be referred to as a "peer device”, but replaced by other names, such as server, PC, controller, or dedicated upgrade device, etc., which is not specifically limited here.
  • the server and the PC work jointly, and the interaction between the "peer device” and the electronic device is taken as an example for description.
  • FIG. 4A is an application scenario diagram of an electronic device provided by an embodiment of the present application.
  • the electronic device includes an NFC controller 401 and a processing device 402 .
  • the NFC controller 401 includes a security authentication module.
  • an embedded secure element (eSE, embedded secure element) module 4011 is used as an example for the security authentication module for illustration.
  • the eSE module 4011 is mainly used for security authentication in the forced loading process to authenticate whether the PC 404 is a legal device.
  • the processing device 402 is configured to control the electronic device to enter the forced loading mode after the eSE module 4011 authenticates the PC 404 as a legitimate device.
  • the PC 404 is connected with the dongle 405 to complete the authentication of the PC 404 by the server 403 , so that the PC 404 establishes a connection with the server 403 .
  • the dongle 405 is used as one of the implementation manners for the PC 404 to complete the authentication process. It is conceivable that, in the actual application process, the PC 404 can also complete the authentication in other ways, such as The authentication is completed by entering a specific account password, and other specific authentication forms will not be repeated here.
  • the PC 404 is also connected with the card reader 406.
  • the card reader 406 has the NFC function and can be used as an air interface to transmit the air interface information between the PC 404 and the NFC controller 401.
  • the NFC controller 401 when the electronic device is close to the PC 404, the NFC controller 401 can receive the forced loading information sent by the PC 404 through the card reader 406. As shown in FIG. 4B , after the operating user executes the instruction to send the forced loading information on the PC, the PC can send the forced loading information to the outside. When the electronic device is close to the PC and enters the transmission range of the forced loading information, the NFC controller in the electronic device can receive the forced loading information.
  • the eSE module 4011 can perform security authentication on the PC 404, and only after the security authentication is passed, the processing device 402 can control the electronic device to enter the forced loading mode.
  • the security authentication process is described below.
  • the server 403 may write a common preset key to the eSE module 4011 of the electronic device.
  • the NFC controller 401 can send the encrypted message encrypted by the preset key to the PC 404 .
  • the NFC controller 401 can encrypt the device serial number of the electronic device or the die ID (DieID) of the chip in the electronic device by using the preset key, and send it to the PC 404 as the above encrypted message.
  • DieID die ID
  • the present application does not limit the content form of the encrypted message.
  • it can also be other related identifiers of the electronic device, which are not specifically limited here.
  • the PC 404 After receiving the encrypted message, the PC 404 needs to decrypt the encrypted message. Since the connection between the server 403 and the PC 404 has been established through the dongle 405, the PC 404 can obtain the preset key corresponding to the electronic device from the server 403, decrypt the encrypted message, obtain the device serial number or DieID, and send the NFC Controller 401 sends.
  • the NFC controller 401 After the NFC controller 401 receives the device serial number or DieID sent by the PC 404, it is authenticated by the eSE module 4011. If the received device serial number or DieID is correct, the eSE module 4011 can determine that the PC 404 is a legal device, that is, the authentication is passed. Then the processor 402 can control the electronic device to enter the forced loading mode; if it is incorrect, the eSE module 4011 can determine that the PC 404 is not a legal device, that is, the authentication fails, the processor 402 will not control the electronic device to enter the forced loading mode, and can terminate subsequent process.
  • the eSE module will initiate the mandatory loading information device for security authentication. If the security authentication is passed, the electronic device will enter the mandatory loading mode, which ensures the hardware security of the electronic device. and data security.
  • the processing device described in this application may include an SOC 502 , and the SOC 502 includes a BOOT_MODE pin 5021 and a processor 5022 .
  • the BOOT_MODE pin 5021 is used to receive the instruction information that the peer device is authenticated successfully, and the processor 5022 is used to control the electronic device to enter the forced loading mode when the BOOT_MODE pin 5021 receives the instruction information.
  • the BOOT_MODE pin 5021 when the BOOT_MODE pin 5021 receives a high level, the electronic device starts normally; when the BOOT_MODE pin 5021 receives a low level, the processor 5022 controls the electronic device to enter the forced loading mode.
  • the BOOT_MODE pin 5021 receives a high/low level as an example to illustrate whether the command information is received. It is conceivable that, in an actual application process, the instruction information may also be in other content forms, which are not limited in this embodiment of the present application.
  • the processor 5022 includes various possible processor types including, but not limited to, central processing units, digital signal processors, microprocessors, microcontrollers, artificial intelligence processors, or heterogeneous processors, and the like.
  • the NFC controller 501 includes: an eSE module 5011 , a low dropout regulator (LDO, low dropout regulator) 5012 , a radio frequency system 5013 and a GPIO 5014 .
  • LDO low dropout regulator
  • the eSE module 5011 is specifically used for security protection in the forced loading process, and the work process can refer to the corresponding embodiment in FIG. 4 .
  • the LDO5012 can be used as the power supply module described in this application to perform the function of supplying power to other parts in the system. Specifically, the LDO 5012 is connected to the battery 503 , and converts the voltage of the battery 503 , which is specifically used to supply power to each sub-module in the NFC controller 501 . Therefore, even when the electronic device is turned off or cannot be turned on, as long as the battery 503 can work normally, each sub-module in the NFC control 501 can obtain the power supply of the LDO 5012 to work normally.
  • the radio frequency system 5013 is specifically used to connect the antenna matching network 504, so as to realize the data interaction of the air interface, for example, to realize the previous short-range wireless communication function.
  • the GPIO5014 is connected to the BOOT_MODE pin 5021 in the SOC502.
  • the GPIO5014 can send the instruction information of successful authentication to the BOOT_MODE pin 5021.
  • a specific implementation may be that, when the GPIO 5014 inputs a low level to the BOOT_MODE pin 5021, the processor 5022 can control the electronic device to enter the forced loading mode.
  • the GPIO5014 is directly powered by the LDO5012, even when the device is turned off or cannot be turned on, the GPIO5014 can handle the high and low voltage output.
  • the NFC controller can perform data interaction with the PC through the air interface through two functional modes, the point-to-point mode and the card emulation mode. Each of them will be described below.
  • the NFC controller can start the polling mode.
  • the polling mode of the NFC controller supports multiple protocols, such as TypeA, TypeB, TypeF or ISO15693. Since the NFC controller can only use one protocol to interact at the same time, when the electronic device is turned on and the screen is on, the NFC controller needs to use the polling mode to switch between different protocols and different functions, so as to achieve different business compatibility.
  • the target protocol is used to identify and transmit mandatory loading information.
  • the target protocol may be TypeA, or may be other transmission protocols that can be applied to the NFC controller, such as TypeB or TypeF, which is not specifically limited here.
  • the weight occupied by the target protocol in each polling closed loop of the NFC controller is 5%. It should be noted that, in practical applications, the weight ratio of the target protocol can be adjusted accordingly according to actual needs, which is not limited in this application.
  • the PC side also needs to be configured with a corresponding NFC-capable card reader running the above target protocol. After the card reader is connected with the PC, the PC can send out the forced loading information through the air interface. When the electronic device is close, the NFC controller can receive the forced loading information through the above-mentioned target protocol.
  • the NFC controller can still continue to work.
  • a target detection process needs to be added to the existing card simulation software process of the NFC controller, and the target detection process is used to identify the air interface data sent by the card reader.
  • the PC is connected with the card reader with NFC function
  • the forced loading information is sent out through the air interface.
  • the NFC controller can receive the forced loading information through the target detection process.
  • an embodiment of the present application provides a method for entering a forced loading mode, including: 701.
  • the PC sends forced loading information to an electronic device; a version image to be loaded is stored on the PC, and the PC can interact with an NFC-enabled device.
  • the card reader is connected, and the forced loading information is sent out through the air interface.
  • the NFC controller can receive the forced loading information through the peer-to-peer mode or the card emulation mode.
  • the NFC controller sends an encrypted message to the PC.
  • the server may write a common preset key to the eSE module of the electronic device.
  • the NFC controller After the NFC controller receives the forced loading information, it can send the encrypted message encrypted by the preset key to the PC.
  • the NFC controller can encrypt the device serial number of the electronic device or the DieID of the SOC with the preset key, and send it to the PC as the above encrypted message.
  • the server sends a preset key to the PC.
  • the PC can be connected with a specific dongle to complete the authentication, thereby establishing a connection with the PC.
  • the PC may request a preset key corresponding to the electronic device from the server. Since the PC has completed the authentication by connecting to a specific dongle, the server can determine that the PC is a legitimate device, and can send the preset key to the PC.
  • the PC decrypts the encrypted message. After receiving the preset key, the PC decrypts the encrypted message to obtain the device serial number of the electronic device or the DieID of the SOC. 705.
  • the PC sends the decrypted authentication message to the NFC controller; the PC sends the decrypted device serial number or the DieID of the SOC as the authentication message to the NFC controller of the electronic device. 706.
  • the NFC controller determines whether the authentication message is decrypted correctly to authenticate the peer device; an eSE module exists in the NFC controller, and the eSE module can determine whether the device serial number sent by the PC or the DieID of the SOC is correct.
  • the eSE module can determine that the PC is a legal device, that is, the authentication is passed, and the NFC controller executes step 707; if not, the eSE module can determine that the PC is an illegal device, that is, the authentication fails, and the NFC controller executes step 707 Step 708.
  • the NFC controller controls the electronic device to enter the forced loading mode; when the eSE module determines that the authentication message is decrypted correctly, indicating that the PC is a legal device, the NFC controller can pull down the level of the BOOT_MODE pin to make the electronic device enter the Force loading mode. 708.
  • the NFC controller does not control the electronic device to enter the forced loading mode; when the eSE module determines that the authentication message is decrypted incorrectly, indicating that the PC is an illegal device, the NFC controller will not control the electronic device to enter the forced loading mode, and can terminate subsequent process.
  • Each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
  • the above-mentioned integrated units may be implemented in the form of hardware, or may be implemented in the form of software functional units.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

一种电子设备以及进入强制加载模式的方法,其中,电子设备包括短距无线通信模块以及安全认证模块。短距无线通信模块可以用于接收对端设备通过空中接口发送的强制加载信息,并对对端设备进行安全认证。当该对端设备通过安全认证之后,说明对端设备属于合法设备。则处理设备可以用于控制电子设备进入强制加载模式,从而进行版本镜像加载。与现有技术相比,不需要对电子设备的保密壳以及数据端口封条进行拆除,从而避免了研发过程中的信息泄漏的隐患。同时,对对端设备进行安全认证,也能够防止任意不合法的设备随意控制电子设备进入强制加载模式,加强了电子设备的硬件安全和数据安全。

Description

一种电子设备及进入强制加载模式的方法 技术领域
本申请实施例涉及通信技术领域,尤其涉及一种电子设备及进入强制加载模式的方法。
背景技术
当移动终端出现故障时,通常需要将该移动终端送到维修点进行维修,所述故障包括各类无法正常开机或开机后不能正常运行。在维修中,移动终端可以进入强制加载模式进行开机以便后续维修。目前移动终端进入强制加载模式的设计方案为,在移动终端内芯片,如片上系统(SOC,system on chip),中设计一根专用管脚,命名为启动模式选择(BOOT_MODE)管脚,在SOC上电后,固化启动代码(BootROM)会检测BOOT_MODE管脚状态,根据高低不同的电平状态进行不同的后续流程:当BOOT_MODE管脚为高电平时,正常启动开机,SOC从外置存储器件中读取镜像并校验和启动;当BOOT_MODE管脚为低电平时,则移动终端启动强制加载模式,芯片切换镜像加载通道为通用串行总线(USB,universal serial bus)接口,移动终端通过接口的数据线连接到保存有待加载版本镜像的设备,便可以进行版本镜像加载和升级。
在移动终端上一般为BOOT_MODE管脚预留有测试点和对接器件端口。目前存在两种进入强制加载模式的方法。方法1:使用测试点,通过夹具将BOOT_MODE管脚对应的测试点与电线接地端短接,同时给移动终端上电,使移动终端进入强制加载模式。方法2、将定制电路板,如特定的柔性电路(FPC,flexible printed circuit)软板,插入移动终端用户识别卡(SIM,subscriber identity module)卡槽,通过定制电路板上的配置,控制BOOT_MODE管脚拉低电平,使移动终端进入强制加载模式。
在移动终端的研发过程中,移动终端一般会配备专用的保密壳和数据端口封条,用于保护移动终端在研发过程中的信息安全。由于使用上述方法1进入强制加载模式时,需要拆除移动终端的保密壳,这样会带来研发过程中的信息泄漏的隐患;当使用上述方法2进入强制加载模式时,则需要除拆除移动终端的数据端口封条,同样也会造成移动终端的数据泄露的风险。
发明内容
本申请实施例提供了一种电子设备以及进入强制加载模式的方法,用于通过无线连接的方式进入强制加载模式并且完成版本镜像加载和升级。
本申请实施例第一方面提供了一种电子设备,包括短距无线通信模块以及处理设备。电子设备需要与对端设备建立连接完成版本镜像加载。本申请实施例中,上述短距无线通信模块可以用于接收对端设备通过空中接口发送的强制加载信息,并对对端设备进行安全认证。当对端设备通过安全认证之后,说明对端设备属于合法设备。则处理设备可以用于控制电子设备进入强制加载模式,从而进行版本镜像加载。
本申请实施例中,电子设备通过短距无线通信模块接收对端设备发送的强制加载信息,并对该对端设备进行安全认证之后,进入强制加载模式,完成版本镜像加载。因此电子设 备进入强制加载模式的过程中,不需要对电子设备的保密壳以及数据端口封条进行拆除,从而避免了研发过程中的信息泄漏的隐患。同时,对对端设备进行安全认证,也能够防止任意不合法的设备随意控制电子设备进入强制加载模式,加强了电子设备的硬件安全和数据安全。
基于本申请实施例第一方面,本发明实施例第一方面的第一种实现方式中,短距无线通信模块可以包括射频系统以及安全认证模块。该射频系统具体用于传输与对端设备之间的空中接口信息,包括传输对端设备发送的强制加载信息以及版本镜像;安全认证模块用于认证所述对端设备,若安全认证成功,则确定对端设备为合法设备。若安全认证失败,则确定对端设备为非法设备。
基于本申请实施例第一方面的第一种实现方式,本申请实施例第一方面的第二种实现方式中,射频系统还可以用于向对端设备发送加密报文,对端设备接收到加密报文后进行解密得到认证报文,并向射频系统发送该认证报文。安全认证模块可以用于判断接收到的认证报文是否解密正确以认证所述对端设备。若安全认证模块确定该认证报文解密正确,则对端设备通过安全认证,若安全认证模块确定该认证报文解密错误,则对端设备不能通过安全认证。
基于本申请实施例第一方面的第一种实现方式或第二种实现方式,本申请实施例第一方面的第三种实现方式中,短距无线通信模块还可以包括供电模块,供电模块用于为射频系统以及安全认证模块供电。
本实施例中,短距无线通信模块中的各个模块都可以由供电模块直接供电。因此即使当电子设备处于关机状态或者无法正常开机时,短距无线通信模块中的各个模块仍然可以获得供电,正常工作,提升了方案的可靠性。
基于本申请实施例第一方面的第一种实现方式至第三种实现方式中的任意一种,本申请实施例第一方面第四种实现方式中,短距无线通信模块还可以包括通用型输入输出(GPIO,general-purpose input/output),当安全认证模块成功认证该对端设备后,GPIO可以用于向处理设备发送成功认证的指令信息,从而使处理器控制电子设备进入强制加载模式。
基于本申请实施例第一方面的第四种实现方式,本申请实施例第一方面的第五种实现方式中,处理设备可以是SOC,SOC可以包括BOOT_MODE管脚以及处理器。具体的,BOOT_MODE管脚可以用于接收GPIO发送的成功认证对端设备的指令信息,当BOOT_MODE管脚接收到该指令信息后,处理器可以用于控制电子设备进入所述强制加载模式。
基于本申请实施例第一方面,或本申请实施例第一方面的第一种实现方式至第五种实现方式中的任意一种,本申请实施例第一方面第六种实现方式中,短距无线通信模块可以是近场通信(NFC,near-field communication)控制器。
本申请实施例第二方面提供了一种进入强制加载模式的方法,该方法应用于电子设备,该方法具体可以包括:电子设备通过短距无线通信模块接收对端设备发送的强制加载信息,并对发送该强制加载信息的对端设备进行安全认证。若安全认证成功,则确定对端设备为合法设备,电子设备进入强制加载模式,加载版本镜像。若安全认证失败,则确定对端设 备为不合法的设备,电子设备拒绝进入强制加载模式。
本实施例中,电子设备与对端设备的数据交互都是通过空中接口完成的,因此在电子设备进入强制加载模式的过程中,不需要对电子设备的保密壳以及数据端口封条进行拆除,从而避免了研发过程中的信息泄漏的隐患。同时,对对端设备进行安全认证,也能够防止任意不合法的设备随意控制电子设备进入强制加载模式,加强了电子设备的硬件安全和数据安全。
基于本申请实施例第二方面,本申请实施例第二方面的第一种实现方式中,电子设备接收到强制加载信息后,可以通过短距无线通信模块向对端设备发送加密报文。对端设备接收到加密报文后进行解密,得到认证报文,并将该认证报文发送到电子设备中的短距无线通信模块。电子设备可以判断该认证报文是否解密正确以认证所述对端设备,若正确,则确定对端设备为合法设备,电子设备进入强制加载模式,加载版本镜像。若不正确,则确定对端设备为不合法的设备,电子设备拒绝进入强制加载模式。
短距无线通信模块可以是NFC控制器。
基于本申请实施例第二方面或第二方面的第一种实现方式,本申请实施例第二方面的第二种实现方式中,短距无线通信模块可以是NFC控制器。
附图说明
图1为本申请实施例中电子设备加载版本镜像的场景示意图;
图2为NFC技术示意图;
图3为本申请实施例中一种电子设备的一个实施例;
图4A为本申请实施例中一种电子设备的另一个实施例;
图4B为本申请实施例中电子设备靠近PC后接收强制加载信息的场景示意图;
图5为本申请实施例中一种电子设备的另一个实施例;
图6为本申请实施例中NFC控制器的轮询模式示意图;
图7为本申请实施例中进入强制加载模式的方法的一个实施例示意图。
具体实施方式
本申请实施例提供了一种电子设备,用于进入强制加载模式。
为使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请实施方式作进一步地详细描述。一般来说,电子设备(例如手机或平板电脑)进入加载版本镜像模式的方式主要有以下两种。1、电子设备进入快速启动(fastboot)模式进行加载版本镜像。在安卓电子设备中,fastboot模式是一种底层的刷机模式,需要电子设备通过数据线连接个人计算机(PC,personal computer),进行加载版本镜像。2、电子设备进入强制加载模式进行加载版本镜像。上述方法1适用于所有可以正常开机启动到fastboot模式的电子设备,当电子设备出现异常场景,例如无法正常开机,导致无法进入fastboot模式时,则可以使用方法2,使电子设备进入强制加载模式进行加载版本镜像,但依然需要依赖数据线建立电子设备与PC的连接。
本实施例提出了一种使用短距无线通信代替数据线的处理方式。如图1所示本申请实 施例的电子设备加载版本镜像的示意图,电子设备通过短距无线通信模块与保存有待加载版本镜像的对端设备(例如PC)建立连接。电子设备可以接收对端设备通过空中接口发送的强制加载信息,从而进入强制加载模式。PC通过空中接口传输待加载版本镜像到电子设备,由电子设备进行版本镜像加载。
需要说明的是,本申请中所述的各个模块以及各个模块之间连接和组成关系,并不限定于描述实体硬件模块或者软件模块。本实施例以及后续实施例中,对各个模块的描述,以实体硬件模块为例进行阐述。例如,每个模块可包括功能电路,用于实现对应功能,也可以在适合的软件驱动下工作。
其中,短距无线通信模块可以是NFC控制器,也可以是蓝牙模块,还可以是其他短距无线通信模块,例如红外模块,具体此处不做限定。本申请实施例以NFC控制器作为例子,进行阐述。
下面对本申请实施例所涉及的NFC技术进行介绍。请参阅图2,NFC是一种基于射频识别(RFID,radio frequency identification)技术的短距无线连接技术。NFC技术利用射频场感应实现NFC终端的近距离通信,两个NFC终端通过触碰或者靠近,即可实现快速、安全和非接触式的交换信息、内容和交易。
NFC标准为了和非接触式智能卡兼容,规定了一种灵活的网关系统,具体分为三种工作模式:点对点模式(P2P,peer-to-peer)、读写器模式和卡模拟模式(CE,card emulation)。
点对点模式:这种模式下两个NFC设备可以交换数据。例如多个具有NFC功能的数字相机、手机之间可以利用NFC技术进行无线互联,实现虚拟名片或数字相片等数据交换。针对点对点模式来讲,其关键指的是把两个均具有NFC功能的设备进行连接,从而使点和点之间的数据传输得以实现。经过把点对点形式作为前提,让具备NFC功能的手机与计算机等相关设备,真正达成点对点的无线连接与数据传输,并且在后续的关联应用中,不仅可为本地应用,同时也可为网络应用。
卡模拟模式:这种模式就是将具有NFC功能的设备模拟成一张标签或非接触卡,例如支持NFC的手机可以作为门禁卡或银行卡等被读取。卡模拟形式关键指的是把具有NFC功能的设备进行模拟,使之变成非接触卡的模式,例如银行卡、公交卡和门禁卡等。这种形式关键应用于商场或者交通等非接触性移动支付当中,在具体应用过程中,用户仅需把自身的手机或者其他有关的电子设备贴近读卡器,同时输入相应密码则可使交易达成。另外,针对卡模拟形式的应用,还可经过在具备NFC功能的相关设备中采集数据,进而把数据传输至对应处理系统中做出有关处理。
读卡器模式:这种模式下,NFC设备作为非接触读写器使用。例如支持NFC功能的手机在与标签交互时扮演读写器的角色,开启NFC功能的手机可以读写支持NFC数据格式标准的标签。读卡器模式的NFC通信作为非接触读卡器使用,基于读卡器模式的NFC应用领域包括广告读取、车票读取和电影院门票销售等,还可以支持公交车站点信息和旅游景点地图信息的获取,提高用户旅游交通的便捷性。
下面对本申请实施例所提供的一种电子设备进行介绍。请参阅图3,本申请提供的一种电子设备300包括:短距无线通信模块301、处理设备302、保密壳303以及数据端口封 条304。
在电子设备的研发过程中,厂商一般会对电子设备添加保密壳以及数据端口封条。其中,保密壳303一般用于防止该电子设备300的外观泄露,而数据端口封条304则对电子设备300的数据接口进行保护,防止电子设备300的数据信息泄露。在现有的电子设备进入强制加载模式的方案中,需要对该保密壳303或数据端口封条304进行拆除,从而拉低BOOT_MODE管脚的电平进入强制加载模式,并且使用数据线建立电子设备300与对端设备(例如PC)的连接,进行版本镜像加载。本申请实施例中,电子设备300可以通过短距无线通信模块301建立与对端设备的无线连接。对端设备可以通过空中接口向该短距无线通信模块301发送强制加载信息。为了防止任意非法设备随意地控制电子设备300进入强制加载模式,造成硬件安全以及数据安全的隐患。本申请实施例中,短距无线通信模块301还可以用于认证该对端设备是否为合法设备,具体的安全认证流程可以参阅图4所述实施例。当安全认证通过后,电子设备300可以确定对端设备为合法设备,则处理设备302可以控制电子设备300进入强制加载模式。其中所述处理设备可以是执行强制加载并启动系统的芯片、芯片组或电路系统,本实施例对此不限定。
进一步的,电子设备300进入强制加载模式后,也是通过该短距无线通信模块301接收对端设备通过空中接口发送的版本镜像,从而电子设备再进行版本镜像加载。本申请实施例中,短距无线通信模块301与对端设备的信息交互,是通过空中接口完成的,因此,不需要对电子设备的保密壳303以及数据端口封条303进行拆除,从而减少了电子设备研发过程中的信息泄露的风险,短距无线通信模块301还能够对对端设备进行安全认证,确保与电子设备建立连接的对端设备是合法的,保证了电子设备的硬件安全和数据安全。
基于图3所示的电子设备,下面以该短距无线通信模块为NFC控制器为例子做进一步的介绍。需要说明的是,本申请实施例所述“对端设备”只是对执行发送强制加载信息以及参与电子设备进入强制加载模式的数据交互等功能的设备的统称,并不特指某个或某些设备。在实际应用中,也可能对执行上述功能的设备不称之为“对端设备”,而以其他名称代替,例如服务器、PC、控制器或专用的升级设备等,具体此处不做限定。为了方便理解,本实施例及后续实施例中,服务器和PC联合工作,作为“对端设备”与电子设备进行交互为例,进行阐述。
图4A为本申请实施例提供的一种电子设备的应用场景图。如图4A所示,电子设备包括NFC控制器401以及处理设备402。其中,NFC控制器401包括安全认证模块,在本实施例及后续实施例中,以嵌入式安全元件(eSE,embedded secure element)模块4011作为所述安全认证模块为例,进行阐述。具体的,该eSE模块4011主要用于强制加载流程中的安全认证,认证PC404是否为合法设备。处理设备402用于当eSE模块4011认证所述PC404为合法设备后,控制电子设备进入强制加载模式。PC404与加密狗405连接,可以完成服务器403对于PC404的鉴权,从而PC404与服务器403建立连接。需要说明的是,本申请实施例中,加密狗405是作为PC404完成鉴权流程的其中一种实施方式,可以想到的是,在实际应用过程中,PC404还可以通过其他方式完成鉴权,例如通过输入特定账号密码完成鉴权,具体其他的鉴权形式,此处不再赘述。同时,PC404还与读卡器406连接,该读 卡器406具有NFC功能,可以作为空中接口,传输PC404与NFC控制器401之间的空中接口信息。
本申请实施例中,当电子设备靠近PC404,此时NFC控制器401便可以接收到PC404通过读卡器406向外发送的强制加载信息。如图4B所示,当操作用户在PC上执行发送强制加载信息的指令后,PC便可以向外发送强制加载信息。当电子设备靠近PC,进入该强制加载信息的传输范围时,电子设备中的NFC控制器便可以接收到该强制加载信息。
在传统的进入强制加载模式的方法中,任何用户都可以随意地使设备进入强制加载模式,这样会对电子设备的硬件安全和数据安全造成风险。本申请实施例中,NFC控制器401接收到强制加载信息后,eSE模块4011可以对PC404进行安全认证,只有当安全认证通过后,处理设备402才能控制电子设备进入强制加载模式。下面对该安全认证过程进行描述。
在电子设备的生产过程中,服务器403可以向电子设备的eSE模块4011写入共同的预设密钥。当NFC控制器401接收到强制加载信息后,可以向PC404发送经过该预设密钥加密的加密报文。本申请实施例中,NFC控制器401可以利用预设密钥对电子设备的设备序列号或者电子设备中芯片的裸片标识(DieID)进行加密,作为上述加密报文,发送给PC404。需要说明的是,本申请并不限定加密报文的内容形式,除了可以是上述设备序列号或者DieID之外,还可以是该电子设备其他相关的标识,具体此处不做限定。
PC404接收到加密报文后,需要对该加密报文进行解密。由于服务器403与PC404已经通过密码狗405建立连接,所以PC404可以从服务器403获取该电子设备对应的预设密钥,并对该加密报文进行解密,得到上述设备序列号或DieID后,向NFC控制器401发送。
NFC控制器401接收到PC404发送的设备序列号或DieID后,由eSE模块4011进行认证,若接收到的设备序列号或DieID正确,eSE模块4011可以确定该PC404是合法的设备,即认证通过,则处理器402可以控制电子设备进入强制加载模式;若不正确,则eSE模块4011可以确定该PC404不是合法的设备,即认证不通过,处理器402不会控制电子设备进入强制加载模式,可以终止后续流程。
本实施例中,NFC控制器在接收到强制加载信息后,eSE模块会发起强制加载信息的设备进行安全认证,若安全认证通过,电子设备才会进入强制加载模式,保证了电子设备的硬件安全和数据安全。
请参阅图5,下面对本申请提供的一种电子设备的硬件方案进行说明。本申请所述处理设备可以包括SOC502,SOC502包括BOOT_MODE管脚5021以及处理器5022。BOOT_MODE管脚5021用于接收对端设备认证成功的指令信息,处理器5022用于当BOOT_MODE管脚5021接收到该指令信息时,控制电子设备进入强制加载模式。具体的,本实施例中,当BOOT_MODE管脚5021接收到高电平时,电子设备正常启动开机;当BOOT_MODE管脚5021接收到低电平时,则处理器5022控制电子设备进入强制加载模式。需要说明的是,本实施例中,以BOOT_MODE管脚5021接收到高/低电平作为是否接收到指令信息为例进行阐述。可以想到的是,在实际应用过程中,该指令信息还可以是其他的内容形式,本申请实施例并不对此进行限定。处理器5022包括各种可能的处理器类型,包括但不限于中央处理单元、数字信号处理器、微处理器、微控制器、人工智能处理器或异构处理器等。
NFC控制器501,包括:eSE模块5011、低压差线性稳压器(LDO,low dropout regulator)5012、射频系统5013及GPIO5014。
eSE模块5011具体用于强制加载流程中的安全防护,工作流程可参照图4对应实施例。LDO5012可以作为本申请所述的供电模块,执行为系统内其他部分供电的功能。具体的,LDO5012与电池503相连,将电池503的电压进行转化,具体用于为NFC控制器501内的各个子模块供电。因此即使当电子设备关机状态下或者无法开机时,只要电池503能够正常工作,NFC控制501内的各个子模块,都能够获得LDO5012的供电,从而正常工作。
射频系统5013具体用于连接天线匹配网络504,从而实现空中接口的数据交互,例如实现之前的短距无线通信功能。GPIO5014与SOC502中的BOOT_MODE管脚5021相连,当eSE模块成功认证对端设备为合法设备时,GPIO5014可以向BOOT_MODE管脚5021发送认证成功的指令信息。具体的实施方式可以是,GPIO5014向BOOT_MODE管脚5021输入低电平,则处理器5022可以控制电子设备进入强制加载模式。同时因为GPIO5014直接由LDO5012供电,所以即使当设备关机状态下或者无法开机时,GPIO5014都能够处理电压的高低输出。
进一步的,本申请实施例中,NFC控制器可以通过点对点模式或卡模拟模式这两种功能模式,与PC进行空中接口的数据交互。下面分别进行说明。
一、点对点模式:
当电子设备为开机亮屏状态时,NFC控制器可以启动轮询模式。现有的NFC技术中,NFC控制器的轮询模式支持多种协议,例如TypeA、TypeB、TypeF或ISO15693等。由于NFC控制器在同一时间只能使用一种协议进行交互,所以电子设备在开机亮屏状态时,NFC控制器需要使用轮询模式,来进行不同协议和不同功能之间的切换,从而实现不同业务的兼容。
请参阅图6,本申请实施例中,在NFC控制器现有的轮询模式基础上,添加了一种目标协议,该目标协议用于识别和传输强制加载信息。具体的,该目标协议可以是TypeA,也可以是其他可以应用于NFC控制器的传输协议,例如TypeB或TypeF,具体此处不做限定。本实施例中,该目标协议在NFC控制器的每个轮询闭环中所占用的权重为5%。需要说明的是,在实际应用中,该目标协议的权重占比可以根据实际需要进行相应的调整,本申请并不对此进行限定。需要说明的是,PC端也需要配置相应的运行上述目标协议的具有NFC功能的读卡器。该读卡器与PC连接后,PC便可以通过空中接口向外发送强制加载信息。当电子设备靠近时,NFC控制器便可以通过上述目标协议接收到该强制加载信息。
二、卡模拟模式:
当电子设备处于关机状态下或者无法开机时,由于NFC控制器直接由电池直接供电,所以NFC控制器还是可以继续工作。在卡模拟模式下,需要在NFC控制器现有的卡模拟软件流程中,增加一个目标检测流程,该目标检测流程用于识别读卡器发送的空中接口数据。PC与具有NFC功能的读卡器连接后,通过空中接口向外发送强制加载信息。当电子设备靠近时,NFC控制器便可以通过目标检测流程接收到该强制加载信息。
请参阅图7,本申请实施例提供了一种进入强制加载模式的方法,包括:701、PC向电子设备发送强制加载信息;PC上存储有待加载的版本镜像,该PC可以与具有NFC功能的 读卡器连接,通过空中接口,向外发送强制加载信息。当电子设备靠近时,NFC控制器可以通过点对点模式或者卡模拟模式接收到该强制加载信息。
702、NFC控制器向PC发送加密报文。在传统的进入强制加载模式的方法中,任何用户都可以随意地使设备进入强制加载模式,这样会对电子设备的硬件安全和数据安全造成风险。本申请实施例中,在电子设备的生产过程中,服务器可以向电子设备的eSE模块写入共同的预设密钥。当NFC控制器接收到强制加载信息后,可以向PC发送经过该预设密钥加密的加密报文。具体的,NFC控制器可以将预设密钥对电子设备的设备序列号或者SOC的DieID进行加密,作为上述加密报文,发送给PC。
703、服务器向PC发送预设密钥。PC可以与特定的密码狗进行连接,完成鉴权,从而建立与PC的连接。PC可以向服务器请求该电子设备对应的预设密钥。由于PC已经通过连接特定的密码狗完成鉴权,则服务器可以确定该PC为合法设备,可以将预设密钥发送给PC。
704、PC对加密报文进行解密。PC接收到预设密钥后,对加密报文进行解密,得到电子设备的设备序列号或者SOC的DieID。705、PC向NFC控制器发送解密后的认证报文;PC将解密后得到的设备序列号或者SOC的DieID作为认证报文,发送给电子设备的NFC控制器。706、NFC控制器判断认证报文是否解密正确以认证所述对端设备;NFC控制器中存在eSE模块,该eSE模块可以判断PC发送过来的设备序列号或者SOC的DieID是否正确。若正确,则eSE模块可以确定该PC为合法设备,即认证通过,NFC控制器执行步骤707;若不正确,则eSE模块可以确定该PC为不合法设备,即认证不通过,NFC控制器执行步骤708。
707、NFC控制器控制电子设备进入强制加载模式;当eSE模块确定该认证报文解密正确后,说明该PC为合法设备,则NFC控制器可以拉低BOOT_MODE管脚的电平,使电子设备进入强制加载模式。708、NFC控制器不控制电子设备进入强制加载模式;当eSE模块确定该认证报文解密不正确后,说明该PC为非法设备,则NFC控制器不会控制电子设备进入强制加载模式,可终止后续流程。
本实施例中,对于NFC控制器中各模块的组成结构及所具备的功能可以参考图5对应的描述,具体此处不再赘述。
在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。

Claims (10)

  1. 一种电子设备,包括:
    短距无线通信模块,用于接收对端设备发送的强制加载信息,并认证所述对端设备;
    处理设备,用于在所述短距无线通信模块成功认证所述对端设备后,控制所述电子设备进入强制加载模式。
  2. 根据权利要求1所述的电子设备,其特征在于,所述短距无线通信模块包括射频系统以及安全认证模块;
    所述射频系统用于接收所述对端设备发送的强制加载信息;
    所述安全认证模块用于认证所述对端设备。
  3. 根据权利要求2所述的电子设备,其特征在于,所述射频系统还用于向所述对端设备发送加密报文;接收所述对端设备发送的认证报文,所述认证报文为所述对端设备对所述加密报文解密后得到的;
    所述安全认证模块用于判断所述认证报文是否解密正确以认证所述对端设备。
  4. 根据权利要求2或3所述的电子设备,其特征在于,所述短距无线通信模块还包括供电模块,用于为所述射频系统以及所述安全认证模块供电。
  5. 根据权利要求2至4中任一项所述的电子设备,其特征在于,所述短距无线通信模块还包括通用型输入输出GPIO,所述GPIO用于在安全认证模块成功认证所述对端设备后,向所述处理设备发送成功认证的指示信息。
  6. 根据权利要求5所述的电子设备,其特征在于,所述处理设备为片上系统SOC,所述SOC包括:
    启动模式BOOT_MODE管脚,用于接收所述指示信息;
    处理器,用于响应于所述指示信息,控制所述电子设备进入所述强制加载模式。
  7. 根据权利要求1至6中任一项所述的电子设备,其特征在于,所述短距无线通信模块为近场通信NFC控制器。
  8. 一种进入强制加载模式的方法,其特征在于,所述方法应用于电子设备,所述方法包括:
    所述电子设备通过短距无线通信模块接收对端设备发送的强制加载信息;
    所述电子设备判断所述对端设备是否通过安全认证;
    若所述对端设备通过安全认证,则所述电子设备进入强制加载模式。
  9. 根据权利要求8所述的强制加载模式的方法,其特征在于,所述电子设备判断所述对端设备是否通过安全认证包括:
    所述电子设备通过所述短距无线通信模块向所述对端设备发送加密报文;
    所述电子设备通过所述短距无线通信模块接收所述对端设备发送的认证报文,所述认证报文为所述对端设备对所述加密报文解密后得到的;
    所述电子设备判断所述认证报文是否解密正确;
    若所述认证报文解密正确,则所述电子设备确定所述对端设备通过安全认证。
  10. 根据权利要求8或9所述的强制加载模式的方法,其特征在于,所述短距无线通 信模块为NFC控制器。
PCT/CN2020/124710 2020-10-29 2020-10-29 一种电子设备及进入强制加载模式的方法 WO2022087949A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2020/124710 WO2022087949A1 (zh) 2020-10-29 2020-10-29 一种电子设备及进入强制加载模式的方法
CN202080006482.5A CN114730265A (zh) 2020-10-29 2020-10-29 一种电子设备及进入强制加载模式的方法

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/124710 WO2022087949A1 (zh) 2020-10-29 2020-10-29 一种电子设备及进入强制加载模式的方法

Publications (1)

Publication Number Publication Date
WO2022087949A1 true WO2022087949A1 (zh) 2022-05-05

Family

ID=81381734

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/124710 WO2022087949A1 (zh) 2020-10-29 2020-10-29 一种电子设备及进入强制加载模式的方法

Country Status (2)

Country Link
CN (1) CN114730265A (zh)
WO (1) WO2022087949A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120331279A1 (en) * 2011-06-22 2012-12-27 Konica Minolta Business Technologies, Inc. Information processing device, information processing device startup method, and computer readable recording medium
CN104428751A (zh) * 2014-06-27 2015-03-18 华为技术有限公司 程序数据的更新方法及设备
CN105446762A (zh) * 2014-09-28 2016-03-30 比亚迪股份有限公司 电池管理系统的程序更新方法和程序更新系统
CN108234160A (zh) * 2016-12-14 2018-06-29 中国航空工业集团公司西安航空计算技术研究所 一种机载核心处理计算机无线升级方法
CN109445828A (zh) * 2018-12-12 2019-03-08 上海伟世通汽车电子系统有限公司 车载终端系统的升级方法

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8688987B2 (en) * 2012-07-30 2014-04-01 Honeywell International Inc. Secure key distribution with general purpose mobile device
CN105871873A (zh) * 2016-04-29 2016-08-17 国家电网公司 一种用于配电终端通信的安全加密认证模块及其方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120331279A1 (en) * 2011-06-22 2012-12-27 Konica Minolta Business Technologies, Inc. Information processing device, information processing device startup method, and computer readable recording medium
CN104428751A (zh) * 2014-06-27 2015-03-18 华为技术有限公司 程序数据的更新方法及设备
CN105446762A (zh) * 2014-09-28 2016-03-30 比亚迪股份有限公司 电池管理系统的程序更新方法和程序更新系统
CN108234160A (zh) * 2016-12-14 2018-06-29 中国航空工业集团公司西安航空计算技术研究所 一种机载核心处理计算机无线升级方法
CN109445828A (zh) * 2018-12-12 2019-03-08 上海伟世通汽车电子系统有限公司 车载终端系统的升级方法

Also Published As

Publication number Publication date
CN114730265A (zh) 2022-07-08

Similar Documents

Publication Publication Date Title
US20190156323A1 (en) Method, device, add-on and secure element for conducting a secured financial transaction on a device
EP2064649B1 (en) Near field connection establishment
EP2770782B1 (en) Wireless data communication
US20090144456A1 (en) Interface Device for Securely Extending Computer Functionality
US20150271677A1 (en) Secure nfc routing
US9262711B2 (en) NFC tag, communication method and system
WO2013071711A1 (zh) 一种处理支付业务的方法和终端
US20160149616A1 (en) Near-Field Communications and Routing
TW201325117A (zh) 近場通訊裝置、通訊裝置及用於近場通訊裝置的方法
US20160260087A1 (en) System and method of realizing dual logic channels of secure element
WO2019147054A1 (en) Electronic device and method for supporting automatic wi-fi connection with enhanced security method when making electronic wallet payment
CN103559523A (zh) 基于swp se实现的非接触读写设备及方法
US11398849B2 (en) Continuous communication method and apparatus of contactless communication device
CN109151777B (zh) 一种非接通信方法以及通信装置
AU2020202166B2 (en) Multi-use near field communication front end on a point of sale system
WO2022087949A1 (zh) 一种电子设备及进入强制加载模式的方法
CN103701505A (zh) Nfc装置
US20190172051A1 (en) Electronic device and method for processing remote payment
US20220253819A1 (en) Multi-use near field communication front end on a point of sale system
US20240005319A1 (en) Method for secure payment, secure payment terminal, and non-transitory computer readable storage medium
WO2015161558A1 (zh) 近距离通信识别芯片的信息传输方法、装置及系统
US9489668B2 (en) Electronic payment device
EP2996368B1 (en) Mobile electronic device
CN205540909U (zh) 智能pos机安全模块
KR101686631B1 (ko) 스마트 보안 데이터 저장 장치

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20959112

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20959112

Country of ref document: EP

Kind code of ref document: A1