CN106657551A - Method and system for preventing mobile terminal from being unlocked - Google Patents

Method and system for preventing mobile terminal from being unlocked Download PDF

Info

Publication number
CN106657551A
CN106657551A CN201611105262.XA CN201611105262A CN106657551A CN 106657551 A CN106657551 A CN 106657551A CN 201611105262 A CN201611105262 A CN 201611105262A CN 106657551 A CN106657551 A CN 106657551A
Authority
CN
China
Prior art keywords
mobile terminal
print data
finger print
internal memory
brom
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611105262.XA
Other languages
Chinese (zh)
Inventor
姜海辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huizhou TCL Mobile Communication Co Ltd
Original Assignee
Huizhou TCL Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huizhou TCL Mobile Communication Co Ltd filed Critical Huizhou TCL Mobile Communication Co Ltd
Priority to CN201611105262.XA priority Critical patent/CN106657551A/en
Publication of CN106657551A publication Critical patent/CN106657551A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method and system for preventing a mobile terminal from being unlocked. The method comprises the following steps: A, transmitting fingerprint data input by a user in advance to a TEE TA to encrypt the fingerprint data, and then writing the encrypted fingerprint data in a RMPB storage region; B, when needing to be unlocked, receiving the fingerprint data input by the user at present, and acquiring the fingerprint stored in the RPMB storage region, and then decrypting the fingerprint data, comparing the fingerprint data input at present with the decrypted fingerprint data, and then judging whether to unlock according to a comparison result. By use of the method disclosed by the invention, the fingerprint data of the user is encrypted in advance and then written in the RMPB storage region, even though other person picks up the user mobile phone, the user important information cannot be stolen, and the equipment security of the mobile terminal is improved.

Description

A kind of method and system for preventing mobile terminal from unlocking
Technical field
The present invention relates to terminal security protection field, more particularly to a kind of method and system for preventing mobile terminal from unlocking.
Background technology
With the development of mobile terminal and mobile Internet, fingerprint function is increasingly becoming the standard configuration of each mobile terminal ;Because fingerprint has specific specificity, bring convenience in terms of unblock and payment fast, instead of traditional numerical ciphers defeated The trouble for entering and insecurity.But current unlocked by fingerprint still suffers from the greater risk that violence nature is cracked, user is set to lose handss After machine there is the risk being exposed in significant data.
Therefore, prior art has yet to be improved and developed.
The content of the invention
In view of above-mentioned the deficiencies in the prior art, it is an object of the invention to provide a kind of method for preventing mobile terminal from unlocking And system, it is intended to solve the problems, such as that existing unlocked by fingerprint mode still suffers from the risk of violence unblock after mobile terminal loss.
Technical scheme is as follows:
A kind of method for preventing mobile terminal from unlocking, wherein, including step:
A, the finger print data that user pre-enters is delivered to TEE TA it is encrypted, is then written to RMPB memory areas;
B, when unblock is needed, the finger print data of receive user currently input, and obtain the finger being stored in RPMB memory areas Stricture of vagina data are simultaneously decrypted, and the finger print data of current input and the finger print data after decryption are compared, according to comparison result Judge whether unblock.
The described method for preventing mobile terminal from unlocking, wherein, step A is specifically included:
A1, startup typing finger print data;
A2, collection finger print data;
A3, finger print data is delivered to by TEE TA by REE interfaces;
A4, TEE TA is encrypted to finger print data;
A5, the finger print data after encryption is write to RPMB memory areas;
A6, return storage result.
The described method for preventing mobile terminal from unlocking, wherein, step B is specifically included:
Mobile terminal screen is lighted in B1, control;
The finger print data of B2, receive user currently input;
B3, startup fingerprint verification operation;
B4, interact to obtain with TEE TA by REE interfaces and be stored in finger print data in RPMB memory areas;
B5, the finger print data read in RPMB memory areas;
B6, the finger print data in RPMB memory areas is decrypted;
B7, by the finger print data of current input with decrypt after finger print data compare;
B8, return comparison result, and unblock is judged whether according to comparison result.
The described method for preventing mobile terminal from unlocking, wherein, also include before step A:
S, in mobile terminal-opening, the internal memory ID being infused in BROM is compared with the internal memory ID in mobile terminal, if The two is inconsistent, then control mobile terminal and restart, if the two is consistent, control mobile terminal enters holding state.
The described method for preventing mobile terminal from unlocking, wherein, step S is specifically included:
S1, BROM start;
S2, judge the first inspection mark whether is injected with BROM, the internal memory ID in BROM is read if having, and start prestrain Program, directly initiates prestrain program if not;
S3, judge mobile terminal whether need check internal memory ID, if desired check then read mobile terminal in internal memory ID, and will The internal memory ID being infused in BROM compares with the internal memory ID in mobile terminal, if the two is inconsistent, controls mobile terminal Restart, if the two is consistent, control mobile terminal enters holding state;Mobile terminal is controlled if it need not check and enters standby State.
The described method for preventing mobile terminal from unlocking, wherein, also include before step S:
T, the internal memory ID for obtaining mobile terminal, the internal memory ID for getting is written in the memory area of BROM, and is locked.
The described method for preventing mobile terminal from unlocking, wherein, step T is specifically included:
T1, mobile terminal is connected by ADB;
T2, the device id for obtaining mobile terminal;
T3, according to device id send read internal memory ID instruction to mobile terminal;
T4, mobile terminal receive and read after the instruction internal memory ID and return;
Order that T5, transmission equipment are restarted simultaneously is transferred to BROM;
T6, BROM map PORT COM;
T7, mapping result is returned;
T8, internal memory ID is written in the memory area of BROM;
T9, return write state.
A kind of system for preventing mobile terminal from unlocking, wherein, including:
Writing module, the finger print data for user to be pre-entered is delivered to TEE TA and is encrypted, and is then written to RMPB Memory area;
Comparing module, for when unblock is needed, the finger print data of receive user currently input, and obtain and be stored in RPMB storages Finger print data in region is simultaneously decrypted, by the finger print data of current input with decrypt after finger print data compare, root Judge whether unblock according to comparison result.
The described system for preventing mobile terminal from unlocking, wherein, also include:
Module is checked, in mobile terminal-opening, by the internal memory ID in the internal memory ID being infused in BROM and mobile terminal Compare, if the two is inconsistent, control mobile terminal is restarted, if the two is consistent, control mobile terminal enters standby shape State.
The described system for preventing mobile terminal from unlocking, wherein, also include:
Binding module, for obtaining the internal memory ID of mobile terminal, the internal memory ID for getting is written in the memory area of BROM, And locked.
Beneficial effect:By the finger print data of user, in advance encryption is then written to RMPB memory areas to the present invention, so i.e. Make other people find customer mobile terminal, cannot also steal user's important information, improve the device security of mobile terminal.
Description of the drawings
Fig. 1 is a kind of flow chart of the method preferred embodiment for preventing mobile terminal from unlocking of the present invention.
Fig. 2 is the particular flow sheet of step S1 in method shown in Fig. 1.
Fig. 3 is the particular flow sheet of step S2 in method shown in Fig. 1.
Fig. 4 is the particular flow sheet of checking step in the inventive method.
Fig. 5 is the particular flow sheet that step is bound in the inventive method.
Fig. 6 is a kind of structured flowchart of the system preferred embodiment for preventing mobile terminal from unlocking of the present invention.
Specific embodiment
The present invention provides a kind of method and system for preventing mobile terminal from unlocking, to make the purpose of the present invention, technical scheme And effect is clearer, clear and definite, below the present invention is described in more detail.It should be appreciated that described herein be embodied as Example is not intended to limit the present invention only to explain the present invention.
Fig. 1 is referred to, Fig. 1 is a kind of flow chart of the method preferred embodiment for preventing mobile terminal from unlocking of the present invention, such as Shown in figure, it includes step:
S1, the finger print data that user pre-enters is delivered to TEE TA it is encrypted, is then written to RMPB memory areas;
S2, when unblock is needed, the finger print data of receive user currently input, and obtain the finger being stored in RPMB memory areas Stricture of vagina data are simultaneously decrypted, and the finger print data of current input and the finger print data after decryption are compared, according to comparison result Judge whether unblock.
The present invention compare it is traditional swipe and numeral, pattern unlocking method, safety is more secure;Meanwhile, finger print data In being not stored in system, but Choice encryption is stored in RPMB safety zones, even if so that it is guaranteed that mobile terminal lose, Will not be stolen important information.
Specifically, as shown in Fig. 2 step S1 is specifically included:
S11, startup typing finger print data;
S12, collection finger print data;
S13, finger print data is delivered to by TEE TA by REE interfaces;
S14, TEE TA is encrypted to finger print data;
S15, the finger print data after encryption is write to RPMB memory areas;
S16, return storage result.
During using mobile terminal, needs activate unlocked by fingerprint by arranging to user, and guarantee fingerprint as only One unlocking manner.First, the operation of typing finger print data is started(Application end), then fingerprint number is gathered by fingerprint sensor According to finger print data is delivered to REE interfaces the TA under TEE environment at mobile terminal system REE ends(TEE TA), so that TEE TA completes the encryption of finger print data(Specifically can be encrypted by AES), TA in TEE environment lower-pilot RMPB memory areas, and By in the finger print data write RMPB memory areas after encryption, most at last result returns to REE ends and notifies that application completes operation. Wherein, TEE(Trusted Execution Environment)Refer to that believable safety can perform environment;TA(Trusted Applicaton)Refer to the program run under TEE environment;REE(Rich Execution Environment)Refer to unsafe Performing environment, generally just refers to Linux android systems;RPMB(Replay Protect Memory Block)Refer to winding Protection subregion, user can use the subregion when needing to store significant data, and the subregion employs the mechanism for authorizing encryption to be come Protection data, are a specific safety regions on MEMORY memory blocks, and storage and read-write are required for specific cryptosystem to operate; MEMORY refers to equipment memory area(That is internal memory), point RAM/ROM parts, equivalent to the internal memory and hard disk of computer, follow-up internal memory ID refers to MEMORY ID.AES(Advanced Encryption Standard)It is Advanced Encryption Standard, in cryptography again Claim Rijndael enciphered methods, be a kind of block encryption standard that Federal Government is adopted.
Specifically, as shown in figure 3, step S2 is specifically included:
Mobile terminal screen is lighted in S21, control;
The finger print data of S22, receive user currently input;
S23, startup fingerprint verification operation;
S24, interact to obtain with TEE TA by REE interfaces and be stored in finger print data in RPMB memory areas;
S25, the finger print data read in RPMB memory areas;
S26, the finger print data in RPMB memory areas is decrypted;
S27, by the finger print data of current input with decrypt after finger print data compare;
S28, return comparison result, and unblock is judged whether according to comparison result.
During using mobile terminal, such as start needs to be verified by instant fingerprint typing user.It is mobile whole lighting After the screen of end, the finger print data of currently used person is gathered by fingerprint sensor, then start fingerprint verification operation.
After fingerprint verification operation starts, application end is interacted by TEE interfaces with TEE TA, and acquisition is stored in RPMB storages Finger print data in region, that is, notify that TEE TA read the finger print data in RPMB memory areas.Then AES keys pair are passed through Finger print data in RMPB memory areas is decrypted, and returns to application end, by the finger print data of the currently used person of collection Compare with the finger print data for returning(Fingerprint sensor can be specifically transferred to compare), and comparison result is returned to Application end, if fingerprint is mismatched, application end will inform unblock failure, keep current state, if fingerprint matching, unlock successfully.
Further, also include before step S1:
S0, in mobile terminal-opening, the internal memory ID being infused in BROM is compared with the internal memory ID in mobile terminal, if The two is inconsistent, then control mobile terminal and restart, if the two is consistent, control mobile terminal enters holding state.
Above-mentioned flow process is after powering, to check MEMORY matching Uniqueness(Referred to as checking step).So, when other people After finding mobile terminal, when start is restarted, if changing internal memory, can cause to start failure, and constantly restart, until shutting down.
Further, as shown in figure 4, step S0 is specifically included:
S01, BROM start;
S02, judge the first inspection mark whether is injected with BROM, the internal memory ID in BROM is read if having, and start pre-add Load program, directly initiates prestrain program if not;
S03, judge mobile terminal whether need check internal memory ID, if desired check then read mobile terminal in internal memory ID, and The internal memory ID being infused in BROM is compared with the internal memory ID in mobile terminal, if the two is inconsistent, control is mobile eventually End is restarted, if the two is consistent, control mobile terminal enters holding state;Control mobile terminal is entered and treated if it need not check Machine state.
Specifically, BROM is in CPU(Chip)The inside, wherein there is a memory area of very little, production of dispatching from the factory when Time has operation to inject internal memory ID corresponding with mobile terminal originally toward this region;Manufacturer gives each Memory Allocation different one String number, and cannot change, this data is injected before mobile terminal dispatches from the factory and change is will be unable to after BROM.BROM is referred in CPU cores There is a small amount of disposable memory area first operation program after upper electricity in piece, the inside, and data cannot be wiped.Mobile terminal Internal memory ID can be by when program be run, by preloader programs(Prestrain program)This information can be obtained. Preloader programs refer to the operation program of a startup of initialization in mobile terminal.
When mobile terminal is started shooting every time, first start BROM, judge whether it has injection first to check mark, according to whether There is injection first to check mark to judge whether to read the internal memory ID in BROM, that is to say, that first judge whether injected in BROM Internal memory ID.Then judge whether to need to check internal memory ID by prestrain program, if desired, then dynamic reads movement The internal memory ID of terminal, and be compared, activation system Kernel, if inconsistent, returns weight subsequently into standby if consistent Open, lead to not start, so as to avoid information from being stolen.If internal memory ID need not be checked, system Kernel is directly initiated, just Enter after normally open standby.System Kernel therein refers to operating system nucleus, and operating system nucleus refers to most of operations The core of system;It in operating system by being used to manage those part groups of memorizer, file, peripheral hardware and system resource Into.Operating system nucleus generally runs process, and provides the communication between process.
Further, also include before step S0:
T, the internal memory ID for obtaining mobile terminal, the internal memory ID for getting is written in the memory area of BROM, and is locked.
Above-mentioned steps are to bind cpu chip and MEMMORY(Referred to as bind step), so as to increase movement is found or steals Terminal person steals the difficulty of user's important information.I.e. the present invention makes CPU and memory have High relevancy, enhances illegal point Son replaces the cost and difficulty of single device, while importing Portable safety in production link.
Specifically, as shown in figure 5, step T is specifically included:
T1, mobile terminal is connected by ADB;
T2, the device id for obtaining mobile terminal;
T3, according to device id send read internal memory ID instruction to mobile terminal;
T4, mobile terminal receive and read after the instruction internal memory ID and return;
Order that T5, transmission equipment are restarted simultaneously is transferred to BROM;
T6, BROM map PORT COM;
T7, mapping result is returned;
T8, internal memory ID is written in the memory area of BROM;
T9, return write state.
Injection internal memory ID needs to be carried out in mobile terminal initial power-on, so need to allow again mobile phone to restart start, and During internal memory ID injection BROM memory areas are completed in the BROM courses of work, and locked, it is ensured that cannot change again.
First mobile terminal-opening, then connects mobile terminal by PC programming efuse instruments by ADB, and mobile terminal will Device id returns to PC programming efuse instruments, and then the instruction of PC programmings efuse instruments transmission reading internal memory ID is whole to movement End, mobile terminal reads internal memory ID from device memory, and returns it to PC programming efuse instruments, PC programming efuse instruments The order that transmission equipment is restarted is to mobile terminal and is transferred to BROM, and mapping result is simultaneously returned PC burnings by BROM mapping PORT COM Efuse instruments are write, the data of PC programming efuse tool organizing internal memory ID are simultaneously written in the memory area of BROM, BROM is returned Write state is to PC programming efuse instruments.
Wherein, efuse (Electronic fuse) refers to electronics fusing small storage in CPU chips, deposits The following important flag of storage and data, on MTK platforms can only programming once, there is multiple programming chance in high-pass platform, can not To wipe, and ad hoc fashion is needed to read.
ADB (Android Debug Bridge) refers to and plays a part of to debug bridge.
Based on said method, the present invention also provides a kind of system preferred embodiment for preventing mobile terminal from unlocking, such as Fig. 6 institutes Show, it includes:
Writing module 100, the finger print data for user to be pre-entered is delivered to TEE TA and is encrypted, and is then written to RMPB memory areas;
Comparing module 200, for when unblock is needed, the finger print data of receive user currently input, and obtain and be stored in RPMB Finger print data in memory area is simultaneously decrypted, by the finger print data of current input with decrypt after finger print data compared It is right, unblock is judged whether according to comparison result.
Specifically, said write module 100 is specifically included:
Typing start unit, for starting typing finger print data;
Fingerprint collecting unit, for gathering finger print data;
Fingerprint transfer unit, for finger print data to be delivered to into TEE TA by REE interfaces;
Encrypting fingerprint unit, for being encrypted to finger print data;
Fingerprint writing unit, for the finger print data after encryption to be write to RPMB memory areas;
Storage returning unit, for returning storage result.
Specifically, the comparing module 200 is specifically included:
Screen lighting unit, for control mobile terminal screen is lighted;
Fingerprint receiving unit, for the finger print data that receive user is currently input into;
Start authentication unit, for starting fingerprint verification operation;
Fingerprint acquiring unit, for interacting with TEE TA by REE interfaces the fingerprint number being stored in RPMB memory areas is obtained According to;
Fingerprint reader, for reading RPMB memory areas in finger print data;
Fingerprint decryption unit, for being decrypted to the finger print data in RPMB memory areas;
Fingerprint comparison unit, for the finger print data of current input and the finger print data after decryption to be compared;
Unlocked by fingerprint unit, for returning comparison result, and judges whether unblock according to comparison result.
Further, system also includes:
Module is checked, in mobile terminal-opening, by the internal memory ID in the internal memory ID being infused in BROM and mobile terminal Compare, if the two is inconsistent, control mobile terminal is restarted, if the two is consistent, control mobile terminal enters standby shape State.
Specifically, the inspection module is specifically included:
BROM start units, for starting BROM;
First judging unit, for judging BROM in whether be injected with the first inspection mark, the internal memory in BROM is read if having ID, and start prestrain program, prestrain program is directly initiated if not;
Second judging unit, for judging whether mobile terminal needs to check internal memory ID, if desired checks, reads mobile terminal In internal memory ID, and the internal memory ID being infused in BROM is compared with the internal memory ID in mobile terminal, if the two is inconsistent, Then control mobile terminal to restart, if the two is consistent, control mobile terminal enters holding state;The control if it need not check is moved Dynamic terminal enters holding state.
Further, system also includes:
Binding module, for obtaining the internal memory ID of mobile terminal, the internal memory ID for getting is written in the memory area of BROM, And locked.
Specifically, the binding module is specifically included:
Connection unit, for connecting mobile terminal by ADB;
Device id acquiring unit, for obtaining the device id of mobile terminal;
Instruction sending unit, for sending the instruction for reading internal memory ID to mobile terminal according to device id;
ID receiving units, receive for mobile terminal and read after the instruction internal memory ID and return;
Order transfer unit, for sending order that equipment restarts and being transferred to BROM;
Map unit, for BROM PORT COM is mapped;
Mapping returning unit, for mapping result to be returned;
ID writing units, for internal memory ID to be written in the memory area of BROM;
State returning unit, for returning write state.
It is described in detail in method above with regard to the ins and outs of above-mentioned modular unit, therefore repeats no more.
In sum, by the finger print data of user, in advance encryption is then written to RMPB memory areas to the present invention, so i.e. Make other people find user mobile phone, cannot also steal user's important information, improve the device security of mobile terminal.The present invention is right Mobile terminal user does not increase in routine use complex operations, very convenient in mobile terminal production operation flow process, Also allow for inquiry;Other people cannot read fingerprint and be parsed from RPMB memory areas.
It should be appreciated that the application of the present invention is not limited to above-mentioned citing, and for those of ordinary skills, can To be improved according to the above description or be converted, all these modifications and variations should all belong to the guarantor of claims of the present invention Shield scope.

Claims (10)

1. it is a kind of prevent mobile terminal unlock method, it is characterised in that including step:
A, the finger print data that user pre-enters is delivered to TEE TA it is encrypted, is then written to RMPB memory areas;
B, when unblock is needed, the finger print data of receive user currently input, and obtain the finger being stored in RPMB memory areas Stricture of vagina data are simultaneously decrypted, and the finger print data of current input and the finger print data after decryption are compared, according to comparison result Judge whether unblock.
2. it is according to claim 1 prevent mobile terminal unlock method, it is characterised in that step A is specifically included:
A1, startup typing finger print data;
A2, collection finger print data;
A3, finger print data is delivered to by TEE TA by REE interfaces;
A4, TEE TA is encrypted to finger print data;
A5, the finger print data after encryption is write to RPMB memory areas;
A6, return storage result.
3. it is according to claim 1 prevent mobile terminal unlock method, it is characterised in that step B is specifically included:
Mobile terminal screen is lighted in B1, control;
The finger print data of B2, receive user currently input;
B3, startup fingerprint verification operation;
B4, interact to obtain with TEE TA by REE interfaces and be stored in finger print data in RPMB memory areas;
B5, the finger print data read in RPMB memory areas;
B6, the finger print data in RPMB memory areas is decrypted;
B7, by the finger print data of current input with decrypt after finger print data compare;
B8, return comparison result, and unblock is judged whether according to comparison result.
4. it is according to claim 1 prevent mobile terminal unlock method, it is characterised in that also wrap before step A Include:
S, in mobile terminal-opening, the internal memory ID being infused in BROM is compared with the internal memory ID in mobile terminal, if The two is inconsistent, then control mobile terminal and restart, if the two is consistent, control mobile terminal enters holding state.
5. it is according to claim 4 prevent mobile terminal unlock method, it is characterised in that step S is specifically included:
S1, BROM start;
S2, judge the first inspection mark whether is injected with BROM, the internal memory ID in BROM is read if having, and start prestrain Program, directly initiates prestrain program if not;
S3, judge mobile terminal whether need check internal memory ID, if desired check then read mobile terminal in internal memory ID, and will The internal memory ID being infused in BROM compares with the internal memory ID in mobile terminal, if the two is inconsistent, controls mobile terminal Restart, if the two is consistent, control mobile terminal enters holding state;Mobile terminal is controlled if it need not check and enters standby State.
6. it is according to claim 4 prevent mobile terminal unlock method, it is characterised in that also wrap before step S Include:
T, the internal memory ID for obtaining mobile terminal, the internal memory ID for getting is written in the memory area of BROM, and is locked.
7. it is according to claim 6 prevent mobile terminal unlock method, it is characterised in that step T is specifically included:
T1, mobile terminal is connected by ADB;
T2, the device id for obtaining mobile terminal;
T3, according to device id send read internal memory ID instruction to mobile terminal;
T4, mobile terminal receive and read after the instruction internal memory ID and return;
Order that T5, transmission equipment are restarted simultaneously is transferred to BROM;
T6, BROM map PORT COM;
T7, mapping result is returned;
T8, internal memory ID is written in the memory area of BROM;
T9, return write state.
8. it is a kind of prevent mobile terminal unlock system, it is characterised in that include:
Writing module, the finger print data for user to be pre-entered is delivered to TEE TA and is encrypted, and is then written to RMPB Memory area;
Comparing module, for when unblock is needed, the finger print data of receive user currently input, and obtain and be stored in RPMB storages Finger print data in region is simultaneously decrypted, by the finger print data of current input with decrypt after finger print data compare, root Judge whether unblock according to comparison result.
9. it is according to claim 8 prevent mobile terminal unlock system, it is characterised in that also include:
Module is checked, in mobile terminal-opening, by the internal memory ID in the internal memory ID being infused in BROM and mobile terminal Compare, if the two is inconsistent, control mobile terminal is restarted, if the two is consistent, control mobile terminal enters standby shape State.
10. it is according to claim 9 prevent mobile terminal unlock system, it is characterised in that also include:
Binding module, for obtaining the internal memory ID of mobile terminal, the internal memory ID for getting is written in the memory area of BROM, And locked.
CN201611105262.XA 2016-12-05 2016-12-05 Method and system for preventing mobile terminal from being unlocked Pending CN106657551A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611105262.XA CN106657551A (en) 2016-12-05 2016-12-05 Method and system for preventing mobile terminal from being unlocked

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611105262.XA CN106657551A (en) 2016-12-05 2016-12-05 Method and system for preventing mobile terminal from being unlocked

Publications (1)

Publication Number Publication Date
CN106657551A true CN106657551A (en) 2017-05-10

Family

ID=58818528

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611105262.XA Pending CN106657551A (en) 2016-12-05 2016-12-05 Method and system for preventing mobile terminal from being unlocked

Country Status (1)

Country Link
CN (1) CN106657551A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109495885A (en) * 2017-09-13 2019-03-19 ***通信有限公司研究院 Authentication method, mobile terminal, management system and Bluetooth IC
CN109508532A (en) * 2017-09-14 2019-03-22 展讯通信(上海)有限公司 Equipment safety starting method, apparatus and terminal based on TEE
CN110598384A (en) * 2019-09-16 2019-12-20 Oppo(重庆)智能科技有限公司 Information protection method, information protection device and mobile terminal
WO2020133500A1 (en) * 2018-12-29 2020-07-02 华为技术有限公司 Method and device for unlocking terminal device, and storage medium
CN112347833A (en) * 2020-06-19 2021-02-09 深圳Tcl新技术有限公司 Fingerprint protection method of intelligent door lock, intelligent door lock and readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090037720A1 (en) * 2007-07-31 2009-02-05 Wistron Corp. Hard Disk Security Method in a Computer System
CN202870831U (en) * 2012-08-20 2013-04-10 潘力 Novel computer and networking certification system
CN103729597A (en) * 2014-01-16 2014-04-16 宇龙计算机通信科技(深圳)有限公司 System starting verifying method and device and terminal
CN104615938A (en) * 2015-02-25 2015-05-13 山东超越数控电子有限公司 Power-on authentication method based on solid-state hard disk drive
CN105447406A (en) * 2015-11-10 2016-03-30 华为技术有限公司 Method and apparatus for accessing storage space
CN105915686A (en) * 2016-06-16 2016-08-31 青岛海信移动通信技术股份有限公司 Device detection method and device of mobile terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090037720A1 (en) * 2007-07-31 2009-02-05 Wistron Corp. Hard Disk Security Method in a Computer System
CN202870831U (en) * 2012-08-20 2013-04-10 潘力 Novel computer and networking certification system
CN103729597A (en) * 2014-01-16 2014-04-16 宇龙计算机通信科技(深圳)有限公司 System starting verifying method and device and terminal
CN104615938A (en) * 2015-02-25 2015-05-13 山东超越数控电子有限公司 Power-on authentication method based on solid-state hard disk drive
CN105447406A (en) * 2015-11-10 2016-03-30 华为技术有限公司 Method and apparatus for accessing storage space
CN105915686A (en) * 2016-06-16 2016-08-31 青岛海信移动通信技术股份有限公司 Device detection method and device of mobile terminal

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109495885A (en) * 2017-09-13 2019-03-19 ***通信有限公司研究院 Authentication method, mobile terminal, management system and Bluetooth IC
CN109495885B (en) * 2017-09-13 2021-09-14 ***通信有限公司研究院 Authentication method, mobile terminal, management system and Bluetooth IC card
CN109508532A (en) * 2017-09-14 2019-03-22 展讯通信(上海)有限公司 Equipment safety starting method, apparatus and terminal based on TEE
WO2020133500A1 (en) * 2018-12-29 2020-07-02 华为技术有限公司 Method and device for unlocking terminal device, and storage medium
CN110598384A (en) * 2019-09-16 2019-12-20 Oppo(重庆)智能科技有限公司 Information protection method, information protection device and mobile terminal
CN110598384B (en) * 2019-09-16 2022-02-22 Oppo(重庆)智能科技有限公司 Information protection method, information protection device and mobile terminal
CN112347833A (en) * 2020-06-19 2021-02-09 深圳Tcl新技术有限公司 Fingerprint protection method of intelligent door lock, intelligent door lock and readable storage medium
CN112347833B (en) * 2020-06-19 2024-06-04 深圳Tcl新技术有限公司 Fingerprint protection method for intelligent door lock, intelligent door lock and readable storage medium

Similar Documents

Publication Publication Date Title
CN106657551A (en) Method and system for preventing mobile terminal from being unlocked
TWI524275B (en) Storage device and method of operating a storage device
US8060925B2 (en) Processor, memory, computer system, and method of authentication
US20150207626A1 (en) Communication secured between a medical device and its remote control device
US8122172B2 (en) Portable information security device
CN105531710A (en) Method of authorizing an operation to be performed on a targeted computing device
US11087000B2 (en) Controlled starting of an electronic circuit
US11086999B2 (en) Secure starting of an electronic circuit
CN102063591A (en) Methods for updating PCR (Platform Configuration Register) reference values based on trusted platform
US20170118641A1 (en) Communication device, communication method, and communication system
CN101419557A (en) Program downloading control method
US8328104B2 (en) Storage device management systems and methods
CN103198247A (en) Computer safety protection method and computer safety protection system
CN101888627B (en) Mobile terminal and system data protection method thereof
JP2018508063A (en) Secure element
CN105512520B (en) Anti-cloning vehicle-mounted system and working method thereof
JP4993114B2 (en) Shared management method for portable storage device and portable storage device
CN109075974B (en) Binding authentication method of fingerprint algorithm library and fingerprint sensor and fingerprint identification system
CN111093190B (en) Method, device, system, electronic equipment and storage medium for writing key data
JP2007072957A (en) Read/write device and debugging system
JP2001118042A (en) Card monitoring method
CN101883357A (en) Method, device and system for mutual authentication between terminal and intelligent card
JP2003022216A (en) Storage device
KR101711024B1 (en) Method for accessing temper-proof device and apparatus enabling of the method
KR101836236B1 (en) User authentication method and apparatus using authentication between applications, program therefor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170510