CN105160241A - Method for preventing Android mobile phone from being recovered - Google Patents
Method for preventing Android mobile phone from being recovered Download PDFInfo
- Publication number
- CN105160241A CN105160241A CN201410849239.6A CN201410849239A CN105160241A CN 105160241 A CN105160241 A CN 105160241A CN 201410849239 A CN201410849239 A CN 201410849239A CN 105160241 A CN105160241 A CN 105160241A
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- file
- rom
- checking routine
- unpacking
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a method for preventing an Android mobile phone from being recovered. The method is characterized by comprising following steps of 101 operating decompression software on a PC terminal, decompressing rom compressed files of the mobile phone, and obtaining the decompressed files; 102 carrying out encryption calculation to all decompressed files by means of an alder32 algorithm, and obtaining a unique signing message and a unique checking program; 103 preserving the signing message and the checking program to the end of any of the decompressed files; 104 selecting a file of the elf format randomly, inserting a chained address which points to the checking program into the file header; 105 operating the decompression software, and repacking the file attached with the signing message and the checking program; 106 writing packed rom package into a memory of the mobile phone through USB and a fastboot function; 107 starting up the mobile phone, and operating the rom package automatically; and 108 operating a file with an elf format beginning in the rom package automatically and calling the checking program. The method for preventing the Android mobile phone from being recovered solves problems that after an existing official rom package is modified, preloaded applications are deleted, repair of the mobile phone is not guaranteed, and the system is not stable.
Description
Technical field
The present invention relates to field of computer technology, especially relate to a kind of method preventing Android mobile phone brush machine.
Background technology
Rom is the abbreviation of read-only memory read-onlymemory, it is a kind of solid state semiconductor memory that can only read prior stored data, in order to the use safety of mobile phone, the operating system of mobile phone will be arranged on rom and wrap, the benefit done like this to avoid the operating system of mobile phone to cause mobile phone to use because of the maloperation of user, and brush machine refers to by certain method change or replaces intrinsic some language, picture, the tinkle of bells and software version or operation system in mobile phone master system, brush machine can be official, also can be unofficial.
Current mobile phone upgrade has two kinds of modes.One is card brush mode, exactly brush machine rom bag is copied in mobile phone EMS memory card, and then utilizes Recovery backup and reduction program to carry out the write operation of rom.Another kind is exactly line brush mode, and simple is exactly the online brush machine utilizing fastboot to realize mobile phone.
Summary of the invention
Object of the present invention is exactly that the pre-installed applications caused after official rom bag is modified is deleted, mobile phone is not guaranteed to keep in good repair, the problem of system instability, a kind of method preventing Android mobile phone brush machine provided in order to solve.
For achieving the above object, the invention provides a kind of method preventing Android mobile phone brush machine, it is characterized in that comprising the following steps:
101, run decoder software at PC end, decompress(ion) is carried out to mobile phone rom compressed package files, obtains the file after unpacking;
102, utilize alder32 algorithm to be encrypted calculating to the file after all unpacking, draw unique signing messages and checking routine;
103, signing messages and checking routine are saved in the ending of any one file unpacking gained;
104, the file of a Stochastic choice elf form, inserts chained address in its file header, makes it point to checking routine;
105, run decoder software will repack with the file of signing messages and checking routine;
106, by USB and fastboot function, the rom bag after packing is write on mobile phone EMS memory;
107, by mobile phone power-on, rom bag runs automatically;
108, will automatically run with the file of elf form beginning and call checking routine in rom bag;
109, checking routine carries out decompress(ion) to mobile phone rom compressed package files, and utilizes alder32 algorithm to re-start computations to the file after unpacking, and result of calculation and former signature is compared, if unanimously, then this rom is surrounded by effect, handset starting; If inconsistent, mobile phone cannot start.
Concrete, described in the present invention decompress(ion) is carried out to mobile phone rom compressed package files, fastboot function, alder32 algorithm all can adopt known schemes of the prior art, relevant above-mentioned known solution, those skilled in the art understands all, does not repeat them here.
Compared with prior art, effect of the present invention is actively significantly, specifically, the present invention solve official rom bag be modified after the pre-installed applications that causes deleted, mobile phone is not guaranteed to keep in good repair, the problem of system instability, a kind of android mobile phone that prevents provided is by the method for brush machine.
Accompanying drawing explanation
Fig. 1 is method flow Fig. 1 of the present invention;
Embodiment
Below in conjunction with the drawings and specific embodiments, the present invention is described in detail.
Prevent a method for Android mobile phone brush machine, it is characterized in that, comprise the following steps:
101, run decoder software at PC end, decompress(ion) is carried out to mobile phone rom compressed package files, obtains the file after unpacking;
102, utilize alder32 algorithm to be encrypted calculating to the file after all unpacking, draw unique signing messages and checking routine;
103, signing messages and checking routine are saved in the ending of any one file unpacking gained;
104, the file of a Stochastic choice elf form, inserts chained address in its file header, makes it point to checking routine;
105, run decoder software will repack with the file of signing messages and checking routine;
106, by USB and fastboot function, the rom bag after packing is write on mobile phone EMS memory;
107, by mobile phone power-on, rom bag runs automatically;
108, will automatically run with the file of elf form beginning and call checking routine in rom bag;
109, checking routine carries out decompress(ion) to mobile phone rom compressed package files, and utilizes alder32 algorithm to re-start computations to the file after unpacking, and result of calculation and former signature is compared, if unanimously, then this rom is surrounded by effect, handset starting; If inconsistent, mobile phone cannot start.
Claims (1)
1. prevent a method for Android mobile phone brush machine, it is characterized in that, comprise the following steps:
101, run decoder software at PC end, decompress(ion) is carried out to mobile phone rom compressed package files, obtains the file after unpacking;
102, utilize alder32 algorithm to be encrypted calculating to the file after all unpacking, draw unique signing messages and checking routine;
103, signing messages and checking routine are saved in the ending of any one file unpacking gained;
104, the file of a Stochastic choice elf form, inserts chained address in its file header, makes it point to checking routine;
105, run decoder software will repack with the file of signing messages and checking routine;
106, by USB and fastboot function, the rom bag after packing is write on mobile phone EMS memory;
107, by mobile phone power-on, rom bag runs automatically;
108, will automatically run with the file of elf form beginning and call checking routine in rom bag;
109, checking routine carries out decompress(ion) to mobile phone rom compressed package files, and utilizes alder32 algorithm to re-start computations to the file after unpacking, and result of calculation and former signature is compared, if unanimously, then this rom is surrounded by effect, handset starting; If inconsistent, mobile phone cannot start.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410849239.6A CN105160241A (en) | 2014-09-03 | 2014-12-31 | Method for preventing Android mobile phone from being recovered |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410445334 | 2014-09-03 | ||
CN201410445334X | 2014-09-03 | ||
CN201410849239.6A CN105160241A (en) | 2014-09-03 | 2014-12-31 | Method for preventing Android mobile phone from being recovered |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105160241A true CN105160241A (en) | 2015-12-16 |
Family
ID=54801095
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410849239.6A Pending CN105160241A (en) | 2014-09-03 | 2014-12-31 | Method for preventing Android mobile phone from being recovered |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105160241A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107391972A (en) * | 2017-07-06 | 2017-11-24 | 北京小米移动软件有限公司 | software control method, device and mobile terminal |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0848325A2 (en) * | 1996-11-13 | 1998-06-17 | Sun Microsystems, Inc. | System, method and apparatus of directly executing an architecture independent binary program |
CN101436141A (en) * | 2008-11-21 | 2009-05-20 | 深圳创维数字技术股份有限公司 | Firmware upgrading and encapsulating method and device based on digital signing |
CN102830999A (en) * | 2012-09-05 | 2012-12-19 | 深圳市网卓信息科技有限公司 | Method and device for updating of Android system |
CN103761329A (en) * | 2014-02-08 | 2014-04-30 | 广东欧珀移动通信有限公司 | Method and device for flashing mobile device |
-
2014
- 2014-12-31 CN CN201410849239.6A patent/CN105160241A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0848325A2 (en) * | 1996-11-13 | 1998-06-17 | Sun Microsystems, Inc. | System, method and apparatus of directly executing an architecture independent binary program |
CN101436141A (en) * | 2008-11-21 | 2009-05-20 | 深圳创维数字技术股份有限公司 | Firmware upgrading and encapsulating method and device based on digital signing |
CN102830999A (en) * | 2012-09-05 | 2012-12-19 | 深圳市网卓信息科技有限公司 | Method and device for updating of Android system |
CN103761329A (en) * | 2014-02-08 | 2014-04-30 | 广东欧珀移动通信有限公司 | Method and device for flashing mobile device |
Non-Patent Citations (1)
Title |
---|
刘祖亮: "《UNIX技术—***程序设计篇》", 31 March 2000 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107391972A (en) * | 2017-07-06 | 2017-11-24 | 北京小米移动软件有限公司 | software control method, device and mobile terminal |
CN107391972B (en) * | 2017-07-06 | 2020-11-10 | 北京小米移动软件有限公司 | Software control method and device and mobile terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108399319B (en) | Source code protection method, application server and computer readable storage medium | |
CN109598107B (en) | Code conversion method and device based on application installation package file | |
CN105975311B (en) | Application starting method and device | |
CN104318155A (en) | Dynamic loading method capable of guarding against reverse APK file | |
CN103123588A (en) | Method and system for obtaining difference upgrade patch | |
CN105511911A (en) | System firmware upgrade package generation method and device | |
JP2019510315A (en) | Application updating method and apparatus for mobile terminal | |
US10296728B2 (en) | Method and system for providing cloud-based application security service | |
US20160170735A1 (en) | Operating system updating method by using a checklist | |
CN111008034B (en) | Patch generation method and device | |
CN109787768B (en) | Identity authentication configuration method and device and computer readable storage medium | |
CN104331522B (en) | OEM information method for customizing and OEM equipment | |
CN105302711A (en) | Application repairing method and apparatus and terminal | |
CN103645918A (en) | Software upgrading method and device for industrial endoscope | |
CN111596938A (en) | Embedded equipment firmware safety upgrading method, system, terminal and storage medium | |
CN108037932B (en) | SPI-NAND configuration file acquisition method and device | |
CN102663471A (en) | Mobile terminal safety information storage method and system on basis of EMMC (Embedded MultiMedia Card) chip | |
WO2018049798A1 (en) | Method and apparatus for reconstructing cache partition | |
CN111045686A (en) | Method for improving application decompilation speed, intelligent terminal and storage medium | |
CN105160241A (en) | Method for preventing Android mobile phone from being recovered | |
WO2018036166A1 (en) | Upgrade package reading method and device | |
CN107092472B (en) | Dynamic publishing method and device | |
KR101667774B1 (en) | Apparatus and Method of Providing Security for Script Program | |
CN111737057A (en) | APFS file system data recovery method and device and electronic equipment | |
US20160306548A1 (en) | A method for increasing burning speed of a system firmware |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20151216 |
|
WD01 | Invention patent application deemed withdrawn after publication |