[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN101888442A - Security management method for mobile terminal and mobile terminal - Google Patents

Security management method for mobile terminal and mobile terminal Download PDF

Info

Publication number
CN101888442A
CN101888442A CN2010101511186A CN201010151118A CN101888442A CN 101888442 A CN101888442 A CN 101888442A CN 2010101511186 A CN2010101511186 A CN 2010101511186A CN 201010151118 A CN201010151118 A CN 201010151118A CN 101888442 A CN101888442 A CN 101888442A
Authority
CN
China
Prior art keywords
information
chip
portable terminal
flash
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010101511186A
Other languages
Chinese (zh)
Inventor
张迪
黄翠荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN2010101511186A priority Critical patent/CN101888442A/en
Priority to PCT/CN2010/075456 priority patent/WO2011127697A1/en
Publication of CN101888442A publication Critical patent/CN101888442A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a security management method for a mobile terminal, and the mobile terminal. The mobile terminal comprises a baseband chip, a Flash chip and a trusted platform module (TPM) chip, wherein the TPM chip comprises an initialization module, a receiving module, a storage module, a verification module and a processing module, wherein the initialization module is used for receiving a drive signal of reading Flash information in the Flash chip from the baseband chip in the power-on of the mobile terminal to finish the initialization of the TPM chip; the receiving module is used for receiving first password information input by a user, and generating first user authentication information according to the first password information; the storage module is used for storing second user authentication information generated according to second password information; the verification module is used for comparing the first user authentication information with the second user authentication information to generate verification information; and the processing module is used for executing the corresponding operation of controlling the security of the mobile terminal according to the verification information. Through the method, better security protection can be provided for the mobile terminal by arranging the TPM chip in the mobile terminal.

Description

A kind of method for managing security of portable terminal and portable terminal
Technical field
The present invention relates generally to the safety management field of portable terminal, is meant a kind of method for managing security and portable terminal of portable terminal especially.
Background technology
At present, various portable terminals, as mobile phone, intercom, notebook computer etc. become people work the life in an indispensable part.With the mobile phone is example, the development of mobile phone also is to have experienced from low side to high-end, (Global System for Mobile Communications from the simulating mobile terminal to the Digital GSM, global system for mobile communications), arrive GPRS (General Packet Radio Service again, the general packet radio service technology), 3G (3rd-generation, the 3G (Third Generation) Moblie technology) process, function is sent short messages and can be surfed the Net from making a phone call, send out mail, take pictures, play games etc., its function and intellectuality from strength to strength, the memory space of mobile phone Flash (flash memory) is also increasing.High-end mobile phone is big more in the memory space that people enjoy the fast happy fail safe, particularly mobile phone of worrying it easily simultaneously again, and its Flash canned data is just many more, and fail safe is just important more.
In the prior art, have multiple mobile phone method for managing security, wherein a kind of mobile phone method for managing security is that the security management program that will contain " safety code " is stored in the mobile phone; Send first user profile to control centre then, control centre stores information; The security management program that Activates Phone; When control centre received user's release service request, control centre sent the information that contains " safety code " to this mobile phone after confirming, to the mobile phone release, and the closed safe hypervisor.
The inventor finds in realizing process of the present invention, at least there is following defective in the prior art: " safety code " and security management program must be stored among the Flash, if lawless people is carried out software refreshing to described Flash, will wipe " safety code " of storage, thereby this method for managing security was lost efficacy.
Summary of the invention
The present invention proposes a kind of method for managing security and portable terminal of portable terminal, by a credible platform module TPM chip is set in portable terminal, user authentication information is stored in the described TPM chip, and verify with first password information of user input, even therefore the Flash chip is refreshed the safety verification that does not also influence portable terminal, thereby has improved the fail safe of portable terminal.
Technical scheme of the present invention is achieved in that
A kind of portable terminal comprises baseband chip, flash memory Flash chip, also comprises credible platform module TPM chip, and an end of described TPM chip connects described baseband chip, and the other end of described TPM chip connects described Flash chip;
Described TPM chip comprises:
Initialization module is used for when described portable terminal powers on, and receives the drive signal that reads Flash information in the described Flash chip that described baseband chip sends, and finishes the initialization of described TPM chip;
Receiver module is used to receive first password information that the user imports, and generates first user authentication information according to described first password information;
Memory module is used to store second user authentication information that generates according to second password information;
Authentication module is used for more described first user authentication information and described second user authentication information, generates authorization information;
Processing module is used for carrying out according to described authorization information the operation of the described portable terminal safety of control corresponding.
Preferably, described processing module comprises:
First processing sub, be used for when described authorization information shows described first user authentication information and described second user authentication information coupling, read Flash information in the described Flash chip according to described drive signal, and send described Flash information to described baseband chip, finish the start operation of described portable terminal by described baseband chip control.
Preferably, described processing module also comprises:
Second processing sub is used for when described authorization information shows that described first user authentication information and described second user authentication information do not match, and produces information, and the prompting user imports first password information once more.
Preferably, described processing module also comprises:
Counting module is used to count the number of times that described second processing sub produces information;
Judge module is used to judge whether the counting of described counting module surpasses a threshold value;
The 3rd processing sub, be used for when described judge module judges that the counting of described counting module surpasses described threshold value, the authentication failed information that sends is to described baseband chip, finished the power-off operation of described portable terminal or destroyed Flash information in the described Flash chip by described baseband chip control.
Preferably, described TPM chip also comprises:
Module is set, is used to be provided with second password information;
Encrypting module is used for according to cryptographic algorithm described second password information being encrypted, and second password information after will encrypting and the authentication information of described portable terminal bind, and generates second user authentication information.
A kind of method for managing security of portable terminal is applied to comprise in the portable terminal of baseband chip, credible platform module TPM chip and flash memory Flash chip, comprising:
When described portable terminal powers on, receive the drive signal that reads Flash information in the described Flash chip that described baseband chip sends, finish the initialization of described TPM chip;
Receive first password information of user's input, and generate first user authentication information according to described first password information;
More described first user authentication information and second user authentication information of storing in advance generate authorization information;
Carry out the operation of the described portable terminal safety of control corresponding according to described authorization information.
Preferably, described operation according to the described portable terminal safety of described authorization information execution control corresponding specifically comprises:
When described authorization information shows described first user authentication information and described second user authentication information coupling, read Flash information in the described Flash chip according to described drive signal, and send described Flash information to described baseband chip, finish the start operation of described portable terminal by described baseband chip control.
Preferably, described operation according to the described portable terminal safety of described authorization information execution control corresponding specifically also comprises:
When described authorization information shows that described first user authentication information and described second user authentication information do not match, produce information, the prompting user imports first password information once more.
Preferably, described generation information also comprises after the prompting user imports first password information once more:
Counting produces the number of times of information;
Judge whether described counting surpasses a threshold value;
When described counting surpassed described threshold value, the authentication failed information that sends was to described baseband chip, finished the power-off operation of described portable terminal or destroyed Flash information in the described Flash chip by described baseband chip control.
Preferably, also comprise:
Second password information is set;
According to cryptographic algorithm described second password information is encrypted, and second password information after will encrypting and the authentication information of described portable terminal bind, generate second user authentication information and storage.
Technical solution of the present invention is by increasing by a credible platform module TPM chip in portable terminal, user authentication information is stored in the described TPM chip, and verify with first password information of user input, even therefore the Flash chip is refreshed the safety verification that does not also influence portable terminal, thereby has improved the fail safe of portable terminal by hardware mode.Further; because being stored in the authentication information (Chip ID and Flash ID) of user authentication information and mobile phone in the TPM chip binds; also can't be read even if the Flash chip is installed on other portable terminals, thereby realize portable terminal safety better protection.
Description of drawings
In order to be illustrated more clearly in the technical scheme of the embodiment of the invention, the accompanying drawing of required use is done to introduce simply in will describing embodiment below, apparently, accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the structural representation of a kind of portable terminal first embodiment of the present invention;
Fig. 2 is the logical construction schematic diagram of TPM chip of the present invention;
Fig. 3 is the schematic flow sheet of method for managing security first embodiment of a kind of portable terminal of the present invention;
Fig. 4 is the internal structure schematic diagram of TPM chip of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that is obtained under the creative work prerequisite.Below the present invention among each embodiment, all be that example describes with the mobile phone terminal, but, be appreciated that, technical scheme of the present invention is not limited to mobile phone terminal, can also be applied to other various portable terminals such as intercom, the net book with mobile communication function, game machine, personal digital assistant or all-in-one multifunctional machine etc.
The invention provides a kind of technical scheme based on TPM (Trusted Platform Module, credible platform module) chip protection Flash safety, it has very high fail safe based on the thought realization of hardware security as protection Flash safety.In October, 1999, many tame IT (Information Technology information technology) giant unites initiation and sets up believable calculate platform (the Trusted Computing PlatformAlliance of alliance, TCPA), this alliance is devoted to facilitate a new generation to have safe and reliable hardware calculate platform.In March, 2003, (Trusted Computing Group TCG), wishes to formulate believable computer relevant criterion and standard, and proposed the TPM standard aspect the hardware and software two of cross-platform and operating environment to be reorganized as believable computation organization.The TPM chip at first must have the function that produces the encryption and decryption secret key; must be able to carry out data encryption and decryption at a high speed in addition; and serve as the auxiliary processor that protection BIOS (Basic InputOutput System, basic input output system) and operating system are not modified.Can prevent effectively that the disabled user from visiting.
With reference to Fig. 1, show the structural representation of a kind of portable terminal first embodiment of the present invention.Described portable terminal comprises baseband chip 100, flash memory Flash chip 300 and credible platform module TPM chip 200, certainly, described portable terminal is except comprising baseband chip 100, flash memory Flash chip 300 and credible platform module TPM chip 200, can also comprise parts such as battery module 400, LCD (Liquid Crystal Display LCDs) module 500, SIM (Subscriber Identity Module, subscriber identification module) card 600, keyboard 700, radio-frequency module 800.
Wherein, one end of described TPM chip 200 connects described baseband chip 100; the other end of described TPM chip 200 connects described Flash chip 300; thereby must be when making baseband chip 100 will read Flash information in the Flash chip 300 by 200 checkings of TPM chip; thereby make TPM chip 200 erect the bridge that the Chip chip is visited Flash chip 300, can play the effect of effective protection Flash chip 300 for mobile phone.
With reference to Fig. 2, show the logical construction schematic diagram of TPM chip 200 of the present invention.Described TPM chip 200 comprises:
Initialization module 210 is used for when described portable terminal powers on, and receives the drive signal that reads Flash information in the described Flash chip 300 that described baseband chip 100 sends, and finishes the initialization of described TPM chip 200.
When portable terminal such as mobile phone power on, master clock 26M Hz (crystal) and auxiliary clock 32.768K Hz (crystal) starting of oscillation, trigger baseband chip 100 work, baseband chip 100 will read Flash information must pass through TPM chip 200, TPM chip 200 operation chip operating system COS finish the initialization of chip internal.
Receiver module 220 is used to receive first password information that the user imports, and generates first user authentication information according to described first password information.
First password information of user's input is the information such as username and password that the user imports, after receiving first password information of user's input, can encrypt by cryptographic algorithms such as symmetric cryptographic algorithm, hash algorithms, and after encryption, can bind the authentication information of mobile phone, as generating first user authentication information after the information such as baseband chip Chip ID and Flash ID.
Memory module 230 is used to store second user authentication information that generates according to second password information.
Described second user authentication information is second password information that is set in advance by the user, and encrypt by cryptographic algorithms such as symmetric cryptographic algorithm, hash algorithms, and the authentication information of binding mobile phone forms after encryption, the authentication information of described mobile phone can comprise information such as baseband chip Chip ID and Flash ID.
Authentication module 240 is used for more described first user authentication information and described second user authentication information, generates authorization information.
Processing module 250 is used for carrying out according to described authorization information the operation of the described portable terminal safety of control corresponding.
Described authorization information shows described first user authentication information and described second user authentication information coupling or do not match, thereby can carry out the operation of the described portable terminal safety of control corresponding according to different authorization informations.As described in showing as authorization information first user authentication information and as described in second user authentication information coupling, then carry out the operation of control mobile terminal-opening; As described in showing as authorization information first user authentication information and as described in second user authentication information do not match, then carry out shutdown of control portable terminal or other protection operation.
Wherein, described processing module 250 comprises:
First processing sub, be used for when described authorization information shows described first user authentication information and described second user authentication information coupling, read Flash information in the described Flash chip 300 according to described drive signal, and send described Flash information to described baseband chip 100, finish the start operation of described portable terminal by described baseband chip 100 controls.
Described processing module 250 also comprises:
Second processing sub is used for when described authorization information shows that described first user authentication information and described second user authentication information do not match, and produces information, and the prompting user imports first password information once more.
Described processing module 250 comprises also and comprising:
Counting module is used to count the number of times that described second processing sub produces information.
Judge module is used to judge whether the counting of described counting module surpasses a threshold value.
The 3rd processing sub, be used for when described judge module judges that the counting of described counting module surpasses described threshold value, the authentication failed information that sends is to described baseband chip 100, finished the power-off operation of described portable terminal or destroyed Flash information in the described Flash chip 300 by described baseband chip 100 controls.
Described threshold value can be set a numerical value according to the actual requirements, and as being 5,10 or other numerical value, the present invention does not limit this.
If verify incorrect and surpass certain number of times, illustrate that then the user is the disabled user, send an authentication failed information to described baseband chip 100 this moment, finish the power-off operation of described portable terminal or destroy Flash information in the described Flash chip 300 by 100 controls of described baseband chip, can certainly carry out other operation, as reporting to the police etc.
Further, described TPM chip 200 also comprises:
Module is set, is used to be provided with second password information.
Encrypting module is used for according to cryptographic algorithm described second password information being encrypted, and second password information after will encrypting and the authentication information of described portable terminal bind, and generates second user authentication information.
The authentication information of described portable terminal comprises information such as base band Chip ID and Flash ID; because user authentication information and Chip ID and Flash ID bind; therefore Flash chip 300 is installed on other portable terminals and also can't be read, thereby realize the portable terminal better protection.
With reference to Fig. 4, be the internal structure schematic diagram of TPM chip of the present invention, wherein, described main processor modules is finished the control to whole TPM chip; Encrypting module carries out encryption and decryption according to cryptographic algorithms such as symmetric cryptographic algorithm, hash algorithms; Interface module is used for being connected with system board or other external interfaces; RAM is used to store intermediate object program; Flash is used for the chip operating system COS of storage chip etc.In the drawings, though its part and title exist different with logical construction shown in Figure 2, but it comes down to corresponding with logical construction schematic diagram shown in Figure 2, as the primary processor correspondence in the initialization module among Fig. 2 210, processing module 250 corresponding diagram 4, therefore interface module 220 corresponding interface modules, can not be assert Fig. 2 thus and Figure 4 shows that two different TPM chips, just Fig. 2 presentation function logic is formed, and Fig. 4 represents actual internal structure.
Technical solution of the present invention is by increasing by a credible platform module TPM chip in portable terminal, user authentication information is stored in the described TPM chip, and verify with first password information of user input, even therefore the Flash chip is refreshed the safety verification that does not also influence portable terminal, thereby has improved the fail safe of portable terminal by hardware mode.Further; because being stored in the authentication information (Chip ID and Flash ID) of user authentication information and mobile phone in the TPM chip binds; also can't be read even if the Flash chip is installed on other portable terminals, thereby realize portable terminal safety better protection.
With reference to Fig. 3, the schematic flow sheet of method for managing security first embodiment of a kind of portable terminal of the present invention is shown.Described method for managing security is applied to comprise in the portable terminal of baseband chip, credible platform module TPM chip and flash memory Flash chip.
The method for managing security of described portable terminal comprises:
The drive signal that reads Flash information in the described Flash chip that step S310, the described baseband chip of reception send is finished the initialization of described TPM chip.
When described portable terminal such as mobile phone power on, receive the drive signal that reads Flash information in the described Flash chip that described baseband chip sends, finish the initialization of described TPM chip.
Step S320, receive first password information of user's input, and generate first user authentication information according to described first password information.
After the TPM chip is finished initialization, receive first password information of user's input, and generate first user authentication information according to described first password information.
Step S330, more described first user authentication information and second user authentication information of storing in advance generate authorization information.
Step S340, carry out the operation of the described portable terminal safety of control corresponding according to described authorization information.
Wherein, described step S340 specifically comprises:
Step S341, when described authorization information shows described first user authentication information and described second user authentication information coupling, read Flash information in the described Flash chip according to described drive signal, and send described Flash information to described baseband chip, finish the start operation of described portable terminal by described baseband chip control.
Step S342, when described authorization information shows that described first user authentication information and described second user authentication information do not match, produce information, the prompting user imports first password information once more.
Can also comprise behind the described step S342:
Step S343, counting produce the number of times of information.
Step S344, judge that whether described counting surpasses a threshold value.
Step S345, when described counting surpasses described threshold value, the authentication failed information that sends is to described baseband chip, finished the power-off operation of described portable terminal or destroyed Flash information in the described Flash chip by described baseband chip control.
Described threshold value can be set a numerical value according to the actual requirements, and as being 5,10 or other numerical value, the present invention does not limit this.
If verify incorrect and surpass certain number of times, illustrate that then the user is the disabled user, send an authentication failed information to described baseband chip this moment, finish the power-off operation of described portable terminal or destroy Flash information in the described Flash chip by the control of described baseband chip, can certainly carry out other operation, as reporting to the police etc.
Further, the method for managing security of described portable terminal comprises and can also comprise:
Step S350, second password information is set.
Step S360, described second password information is encrypted, and second password information after will encrypting and the authentication information of described portable terminal bind, generate second user authentication information and storage according to cryptographic algorithm.
The authentication information of described portable terminal comprises information such as base band Chip ID and Flash ID; because user authentication information and Chip ID and Flash ID bind; therefore the Flash chip is installed on other portable terminals and also can't be read, thereby realize better protection Flash information.
It will be appreciated by those skilled in the art that, when portable terminal such as mobile phone use for the first time, can carry out described step S350, described step S350 can be carried out when making mobile phone by manufacturer, as unified second password information that is set to give tacit consent to, the user also can reset second password information, thereby need import new password information when starting shooting next time.
Described method embodiment is corresponding with described device embodiment, and the part of not describing in detail in method embodiment gets final product referring to the description of device embodiment relevant portion.
Technical solution of the present invention is by increasing by a credible platform module TPM chip in portable terminal, user authentication information is stored in the described TPM chip, and verify with first password information of user input, even therefore the Flash chip is refreshed the safety verification that does not also influence portable terminal, thereby has improved the fail safe of portable terminal by hardware mode.Further; because being stored in the authentication information (Chip ID and Flash ID) of user authentication information and mobile phone in the TPM chip binds; also can't be read even if the Flash chip is installed on other portable terminals, thereby realize portable terminal safety better protection.
More than technical solution of the present invention is described in detail, from user's use angle portable terminal of the present invention (is example with the mobile phone) is elaborated below.
One, user's initialization is provided with.
The user needs the initialization setting when using mobile phone or TPM function for the first time, mainly sets initial user personal information (second password information), closes the TPM function because mobile phone may be given tacit consent in Default Value.
Specific implementation is as follows:
The first step: the mobile phone start that powers on, mobile phone base band chip sends the drive signal that reads Flash information, reads Flash information by the TPM chip, and the TPM chip carries out basic initialization.
Second step: TPM chip internal system start-up, whether interface inquiry user will open the TPM function, if the user selects "Yes", the TPM chip just requires the user that personal information (second password information) is set, as username and password, carried out for the 3rd step,, then carried out for the 4th step if the user selects "No".
The 3rd step: second password information that TPM will be provided with is with password calculation algorithm for encryption formation ciphertext and be stored among self Flash.
The 4th step: read Flash information, mobile phone enters standby interface.
Specific to MMI (Man Machine Interface, be man-machine interface) figure, the user uses mobile phone for the first time, at first by the start of start key, interface prompt then " opening the TPM function? " at this time the user can select respectively be not or not, if selection "Yes", just enter next interface, the prompting user is provided with second password information (as username and password), and the user can be no more than 10 user name and 8 password by the keyboard input, edits the back and selects to determine just to have set the userspersonal information, the mobile phone normal boot-strap enters standby interface.If the user select " opening the TPM function? " the time select "No", mobile phone is directly started shooting, and enters standby interface.
Two, personal information checking has been described the user and how normally have been used the TPM function, testing personal information how, and specific implementation is as follows:
The first step: the mobile phone start that powers on, mobile phone base band chip sends the drive signal that reads Flash information, reads Flash information by the TPM chip, and the TPM chip carries out basic initialization.
Second step: the system start-up of TPM chip internal, whether TPM chip system arbitration functions opens, if opening is just carried out user information authentication, carries out for the 3rd step, if closed condition is just opened setting operation, carries out for the 7th step.
The 3rd step: the interface prompt user imports personal information, i.e. first password information (as username and password).
The 4th step: the TPM chip forms ciphertext with the password of user's input with password calculation algorithm for encryption, then with self Flash in the ciphertext of having stored compare, if unanimity then verify and pass through, the number of times of inconsistent and counters count is during less than five times, then remind the user to import once more, the counter of inner input user password adds 1, judge whether to reach five times, if import still authentication failed the 5th time, the prompting disabled user, mobile phone directly shuts down or carries out other operation then, thereby prevents disabled user's repeatedly experiment.
The 5th step: after the user profile checking is passed through, carry out user interface, three options can be arranged, (1) enters power on mode; (2) revise password; (3) close the TPM function.As selecting (2) cryptographic function of making amendment, then carried out for the 6th step, if select (1) or (3) then carried out for the 9th step.
The 6th step: must import an Old Password and twice new password, after new password generated, Old Password lost efficacy at once, carried out for the 9th step after new password is provided with successfully.
The 7th step: whether interface inquiry user will open the TPM function, if the user selects "Yes", the TPM chip just requires the user to import personal information.
The 8th step: TPM forms ciphertext with the personal identification number that is provided with password calculation algorithm for encryption and is stored among self Flash.
The 9th step: read Flash information, mobile phone enters standby interface.
Specific to MMI (Man Machine Interface, i.e. man-machine interface) figure, in two kinds of situation, first kind of situation: the TPM function is an opening; Second kind of situation: the TPM function is a closed condition.
First kind of situation: the user enters the start interface by the start key, the interface prompt user imports user password (first password information), the user can import username and password by keyboard, and at this moment the left and right soft key in interface is respectively and determines and cancellation, edits the back and selects to determine.
If user password correctly interface prompt " personal information checking is passed through! ", the interface enters user's option of operation, has three menus available, and (1) enters power on mode; (2) revise password; (3) close the TPM function.Select (1) or (3) mobile phone directly to enter standby interface, select (2) to enter password and revise the interface, prompting " please import original password ", determine back prompting " please import new password ", the interface of these three times input passwords all is an editing interface, determine back prompting " please importing new password once more ", prompting after determining " password is revised successfully! ", mobile phone enters standby interface, and new password has just come into force, and next start will be used new cipher authentication.
" personal information authentication failed of the interface prompt if user password is incorrect! ", the number of times that prompting simultaneously can also be imported the interface that the prompting user imports once more appears; last prompting can also be imported 1 time, if at this time go back authentication failed, just point out the disabled user; mobile phone just directly shuts down or carries out other operation, thereby protects mobile phone safety.
Second kind of situation: the user enters the start interface by the start key, interface prompt " opening the TPM function? " at this time the user can select respectively by left and right soft key be not or not, if select "Yes" by left soft key, just enter next interface, the prompting user imports personal information, and checking enters standby interface by mobile phone.If select "No", the direct standby interface of mobile phone by right soft key.
One of ordinary skill in the art will appreciate that; in each method embodiment of the present invention; the sequence number of described each step can not be used to limit the sequencing of each step; for those of ordinary skills; under the prerequisite of not paying creative work, the priority of each step is changed also within protection scope of the present invention.
The above only is preferred embodiment of the present invention, and is in order to restriction the present invention, within the spirit and principles in the present invention not all, any modification of being done, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. a portable terminal comprises baseband chip, flash memory Flash chip, it is characterized in that, also comprise credible platform module TPM chip, an end of described TPM chip connects described baseband chip, and the other end of described TPM chip connects described Flash chip;
Described TPM chip comprises:
Initialization module is used for when described portable terminal powers on, and receives the drive signal that reads Flash information in the described Flash chip that described baseband chip sends, and finishes the initialization of described TPM chip;
Receiver module is used to receive first password information that the user imports, and generates first user authentication information according to described first password information;
Memory module is used to store second user authentication information that generates according to second password information;
Authentication module is used for more described first user authentication information and described second user authentication information, generates authorization information;
Processing module is used for carrying out according to described authorization information the operation of the described portable terminal safety of control corresponding.
2. portable terminal according to claim 1 is characterized in that, described processing module comprises:
First processing sub, be used for when described authorization information shows described first user authentication information and described second user authentication information coupling, read Flash information in the described Flash chip according to described drive signal, and send described Flash information to described baseband chip, finish the start operation of described portable terminal by described baseband chip control.
3. portable terminal according to claim 2 is characterized in that, described processing module also comprises:
Second processing sub is used for when described authorization information shows that described first user authentication information and described second user authentication information do not match, and produces information, and the prompting user imports first password information once more.
4. portable terminal according to claim 3 is characterized in that, described processing module also comprises:
Counting module is used to count the number of times that described second processing sub produces information;
Judge module is used to judge whether the counting of described counting module surpasses a threshold value;
The 3rd processing sub, be used for when described judge module judges that the counting of described counting module surpasses described threshold value, the authentication failed information that sends is to described baseband chip, finished the power-off operation of described portable terminal or destroyed Flash information in the described Flash chip by described baseband chip control.
5. according to each described portable terminal of claim 1 to 4, it is characterized in that described TPM chip also comprises:
Module is set, is used to be provided with second password information;
Encrypting module is used for according to cryptographic algorithm described second password information being encrypted, and second password information after will encrypting and the authentication information of described portable terminal bind, and generates second user authentication information.
6. the method for managing security of a portable terminal is applied to comprise in the portable terminal of baseband chip, credible platform module TPM chip and flash memory Flash chip, it is characterized in that, comprising:
When described portable terminal powers on, receive the drive signal that reads Flash information in the described Flash chip that described baseband chip sends, finish the initialization of described TPM chip;
Receive first password information of user's input, and generate first user authentication information according to described first password information;
More described first user authentication information and second user authentication information of storing in advance generate authorization information;
Carry out the operation of the described portable terminal safety of control corresponding according to described authorization information.
7. the method for managing security of portable terminal according to claim 6 is characterized in that, described operation according to the described portable terminal safety of described authorization information execution control corresponding specifically comprises:
When described authorization information shows described first user authentication information and described second user authentication information coupling, read Flash information in the described Flash chip according to described drive signal, and send described Flash information to described baseband chip, finish the start operation of described portable terminal by described baseband chip control.
8. the method for managing security of portable terminal according to claim 7 is characterized in that, described operation according to the described portable terminal safety of described authorization information execution control corresponding specifically also comprises:
When described authorization information shows that described first user authentication information and described second user authentication information do not match, produce information, the prompting user imports first password information once more.
9. the method for managing security of portable terminal according to claim 8 is characterized in that, described generation information also comprises after the prompting user imports first password information once more:
Counting produces the number of times of information;
Judge whether described counting surpasses a threshold value;
When described counting surpassed described threshold value, the authentication failed information that sends was to described baseband chip, finished the power-off operation of described portable terminal or destroyed Flash information in the described Flash chip by described baseband chip control.
10. according to the method for managing security of each described portable terminal of claim 6 to 9, it is characterized in that, also comprise:
Second password information is set;
According to cryptographic algorithm described second password information is encrypted, and second password information after will encrypting and the authentication information of described portable terminal bind, generate second user authentication information and storage.
CN2010101511186A 2010-04-16 2010-04-16 Security management method for mobile terminal and mobile terminal Pending CN101888442A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2010101511186A CN101888442A (en) 2010-04-16 2010-04-16 Security management method for mobile terminal and mobile terminal
PCT/CN2010/075456 WO2011127697A1 (en) 2010-04-16 2010-07-26 Security management method for mobile terminal and mobile terminal thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010101511186A CN101888442A (en) 2010-04-16 2010-04-16 Security management method for mobile terminal and mobile terminal

Publications (1)

Publication Number Publication Date
CN101888442A true CN101888442A (en) 2010-11-17

Family

ID=43074155

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010101511186A Pending CN101888442A (en) 2010-04-16 2010-04-16 Security management method for mobile terminal and mobile terminal

Country Status (2)

Country Link
CN (1) CN101888442A (en)
WO (1) WO2011127697A1 (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102340578A (en) * 2011-09-23 2012-02-01 中兴通讯股份有限公司 Mobile terminal and starting-up method thereof
CN102946384A (en) * 2012-10-24 2013-02-27 北京奇虎科技有限公司 User authentication method and device
CN103298158A (en) * 2012-02-28 2013-09-11 芯讯通无线科技(上海)有限公司 Communication module and control method thereof
CN105224885A (en) * 2015-10-08 2016-01-06 宇龙计算机通信科技(深圳)有限公司 A kind of data processing method and terminal
CN106529232A (en) * 2016-10-19 2017-03-22 广东欧珀移动通信有限公司 Startup method and device
CN107769917A (en) * 2016-08-22 2018-03-06 普天信息技术有限公司 A kind of credible platform and method for wireless terminal
CN108319848A (en) * 2017-01-17 2018-07-24 深圳兆日科技股份有限公司 Start-up control method and device
CN110223462A (en) * 2019-06-12 2019-09-10 南通百旺金赋信息科技有限公司 A kind of shared billing system of tax control tray
CN112307523A (en) * 2020-11-09 2021-02-02 维沃移动通信有限公司 Chip module, information processing method and device and electronic equipment
CN115544589A (en) * 2022-07-04 2022-12-30 中国移动通信集团四川有限公司 I/O port prevention and control method and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1822013A (en) * 2006-03-14 2006-08-23 上海一维科技有限公司 Finger print biological identifying engine system and its identifying method based on credible platform module
CN101122936A (en) * 2007-09-21 2008-02-13 武汉大学 Embed type platform guiding of credible mechanism
CN101221509A (en) * 2008-01-24 2008-07-16 武汉大学 Bus arbitration starting method of reliable embedded platform
CN101222698A (en) * 2007-01-12 2008-07-16 展讯通信(上海)有限公司 IMEI code protection method based on hardware sequence number
CN101430747A (en) * 2008-09-26 2009-05-13 武汉大学 Movable equipment based on credible embedded platform and its security storage method
US20090249014A1 (en) * 2008-03-25 2009-10-01 Spansion Llc Secure management of memory regions in a memory

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100502599C (en) * 2003-10-10 2009-06-17 高延飞 Security management method for mobile phone
CN100432890C (en) * 2005-07-12 2008-11-12 中国长城计算机深圳股份有限公司 Computer starting up identifying system and method
CN100481107C (en) * 2006-11-24 2009-04-22 深圳兆日技术有限公司 An identity control method based on credibility platform module and fingerprint identifying

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1822013A (en) * 2006-03-14 2006-08-23 上海一维科技有限公司 Finger print biological identifying engine system and its identifying method based on credible platform module
CN101222698A (en) * 2007-01-12 2008-07-16 展讯通信(上海)有限公司 IMEI code protection method based on hardware sequence number
CN101122936A (en) * 2007-09-21 2008-02-13 武汉大学 Embed type platform guiding of credible mechanism
CN101221509A (en) * 2008-01-24 2008-07-16 武汉大学 Bus arbitration starting method of reliable embedded platform
US20090249014A1 (en) * 2008-03-25 2009-10-01 Spansion Llc Secure management of memory regions in a memory
CN101430747A (en) * 2008-09-26 2009-05-13 武汉大学 Movable equipment based on credible embedded platform and its security storage method

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102340578A (en) * 2011-09-23 2012-02-01 中兴通讯股份有限公司 Mobile terminal and starting-up method thereof
CN103298158A (en) * 2012-02-28 2013-09-11 芯讯通无线科技(上海)有限公司 Communication module and control method thereof
CN102946384A (en) * 2012-10-24 2013-02-27 北京奇虎科技有限公司 User authentication method and device
CN102946384B (en) * 2012-10-24 2016-10-05 北京奇虎科技有限公司 User authentication method and equipment
CN105224885A (en) * 2015-10-08 2016-01-06 宇龙计算机通信科技(深圳)有限公司 A kind of data processing method and terminal
CN107769917A (en) * 2016-08-22 2018-03-06 普天信息技术有限公司 A kind of credible platform and method for wireless terminal
CN106529232A (en) * 2016-10-19 2017-03-22 广东欧珀移动通信有限公司 Startup method and device
CN108319848A (en) * 2017-01-17 2018-07-24 深圳兆日科技股份有限公司 Start-up control method and device
CN108319848B (en) * 2017-01-17 2020-09-29 深圳兆日科技股份有限公司 Starting-up control method and device
CN110223462A (en) * 2019-06-12 2019-09-10 南通百旺金赋信息科技有限公司 A kind of shared billing system of tax control tray
CN112307523A (en) * 2020-11-09 2021-02-02 维沃移动通信有限公司 Chip module, information processing method and device and electronic equipment
CN112307523B (en) * 2020-11-09 2024-09-24 维沃移动通信有限公司 Chip module, information processing method and device and electronic equipment
CN115544589A (en) * 2022-07-04 2022-12-30 中国移动通信集团四川有限公司 I/O port prevention and control method and electronic equipment

Also Published As

Publication number Publication date
WO2011127697A1 (en) 2011-10-20

Similar Documents

Publication Publication Date Title
CN101888442A (en) Security management method for mobile terminal and mobile terminal
CN109472166B (en) Electronic signature method, device, equipment and medium
US9501652B2 (en) Validating sensitive data from an application processor to modem processor
US8700908B2 (en) System and method for managing secure information within a hybrid portable computing device
EP2633464B1 (en) Software authentication
CN101034991B (en) Secure guiding system, method, code signature construction method and authentication method
US10237072B2 (en) Signatures for near field communications
CN102970139B (en) Data security validation method and device
CN102880560A (en) User privacy data protection method and mobile terminal using user privacy data protection method
EP3251044B1 (en) Portable security device
WO2019047148A1 (en) Password verification method, terminal, and computer readable storage medium
CN105320891B (en) A kind of method and device of computer security loading system mirror image
CA2745975C (en) Utilization of a microcode interpreter built in to a processor
CN109902477A (en) Ensure voice communication safety
CN102521169B (en) Confidential USB (universal serial bus) memory disk with display screen and security control method of confidential USB memory disk
CN113055157B (en) Biological characteristic verification method and device, storage medium and electronic equipment
EP1789873A2 (en) Non-intrusive trusted user interface
CN111125705B (en) Capability opening method and device
CN113127844A (en) Variable access method, device, system, equipment and medium
CN108182745A (en) The smart lock and its encryption method of a kind of decentralization
KR20120100342A (en) Security token device and rf module and method of authentication usable in smartphone and pc
WO2016184087A1 (en) Method and system for transmitting information inter-device, source terminal and storage medium
KR20110030515A (en) Security token device and method of authentication usable in smartphone
CN105844147A (en) Application attestation method and apparatus
CN101369254A (en) Data protection method and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20101117