Secure booting method and mobile terminal for the same
First Claim
1. A secure booting method for a mobile terminal, the secure booting method comprising:
- checking whether configuration information is stored in a non-volatile memory in the mobile terminal when the mobile terminal is booted;
determining whether the configuration information is effective;
connecting the mobile terminal with a host to copy a downloader and a downloader certificate from the host when the checking determines that the configuration information is not stored in the non-volatile memory or the determining determines that the configuration information is not effective;
performing authentication of the copied downloader using the downloader certificate and an authentication key stored in the mobile terminal; and
downloading a program stored in the host to the non-volatile memory by using the downloader when the downloader is authenticated.
1 Assignment
0 Petitions
Accused Products
Abstract
A secure booting method for a mobile terminal comprising: checking configuration information stored in a non-volatile memory embedded in the mobile terminal to determine whether the configuration information is effective when the mobile terminal is booted, connecting the mobile terminal with a host to copy a downloader and a downloader certificate from the host when it is determined that the configuration information is not effective, performing authentication of the copied downloader using the downloader certificate and an authentication key stored in the mobile terminal, and downloading a program stored in the host to the non-volatile memory using the downloader when the downloader is authenticated.
-
Citations
14 Claims
-
1. A secure booting method for a mobile terminal, the secure booting method comprising:
-
checking whether configuration information is stored in a non-volatile memory in the mobile terminal when the mobile terminal is booted; determining whether the configuration information is effective; connecting the mobile terminal with a host to copy a downloader and a downloader certificate from the host when the checking determines that the configuration information is not stored in the non-volatile memory or the determining determines that the configuration information is not effective; performing authentication of the copied downloader using the downloader certificate and an authentication key stored in the mobile terminal; and downloading a program stored in the host to the non-volatile memory by using the downloader when the downloader is authenticated. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A mobile terminal comprising:
-
a memory storing a first program; a non-volatile memory; and a processor to execute the first program, wherein, according to the program, the processor checks whether configuration information is stored in the non-volatile memory in the mobile terminal and determines whether the configuration information is effective when the mobile terminal is booted;
connects the mobile terminal with a host and copies a downloader and a downloader certificate from the host when the processor determines that the configuration information is not effective;
performs authentication of the copied downloader using the downloader certificate and an authentication key stored in the mobile terminal; and
downloads a second program stored in the host to the non-volatile memory using the downloader when the downloader is authenticated.
-
Specification