CN102609650B - Realize the system and method that in electronic equipment, software cryptography is downloaded - Google Patents

Realize the system and method that in electronic equipment, software cryptography is downloaded Download PDF

Info

Publication number
CN102609650B
CN102609650B CN201210025116.1A CN201210025116A CN102609650B CN 102609650 B CN102609650 B CN 102609650B CN 201210025116 A CN201210025116 A CN 201210025116A CN 102609650 B CN102609650 B CN 102609650B
Authority
CN
China
Prior art keywords
unit
electronic equipment
software
unique
download
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210025116.1A
Other languages
Chinese (zh)
Other versions
CN102609650A (en
Inventor
吴志恒
刘丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Unistrong Science & Technology Co., Ltd.
Original Assignee
Beijing Unistrong Science & Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Unistrong Science & Technology Co Ltd filed Critical Beijing Unistrong Science & Technology Co Ltd
Priority to CN201210025116.1A priority Critical patent/CN102609650B/en
Publication of CN102609650A publication Critical patent/CN102609650A/en
Application granted granted Critical
Publication of CN102609650B publication Critical patent/CN102609650B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a kind of realize the system that software cryptography in electronic equipment is downloaded, including softdog unit, software unit and download unit, softdog unit and software unit have all stored original encryption information, and download unit connects the electronic equipment with unique device number.The invention still further relates to utilize this system to realize the method that in electronic equipment, software cryptography is downloaded, original encryption information and unique device number are combined into unique encryption device identifier by download unit, and write in the systems soft ware downloading to electronic equipment, make electronic equipment can judge whether this software is bootlegging according to unique encryption device identifier and unique device number, realize the encryption to software section and the binding with hardware components, thus effectively prevent that hardware is identical but equipment that software is different is mutually upgraded, guarantee equipment will not be copied illegally, the system of the present invention is without increasing extra hardware cost, with low cost, the method application mode of the present invention is easy, range of application is relatively broad.

Description

Realize the system and method that in electronic equipment, software cryptography is downloaded
Technical field
The present invention relates to software encryption technique field, particularly to software cryptography download technology field, specifically refer to a kind of realize the system and method that in electronic equipment, software cryptography is downloaded.
Background technology
Electronic equipment is increasingly appearing in daily life now, such as mobile phone, navigator, PAD etc..These electronic equipments all can be divided into hardware components and software section.These electronic equipments need software to be burnt in hardware device dispatching from the factory when, and equipment can normally use.But there are some lawless persons can replicate hardware components on a large scale by flight or other illegal measureses.Software section is read by reading equipment again, replicate the most on a large scale, it is not necessary to too many technology and fund input, it is possible to obtain equipment development person and put into the biggest manpower, exploitation equipment for many years, thus the intellectual property of the person that damages equipment development and interests.
In order to prevent the abuse of lawless person, occur in that some encryption chips in the market.The designer of electronic equipment can add these encryption chips designing hardware components when, and encryption chip is the most a piece of the most unique and cannot replicate, and hardware device therefore can be avoided to be copied illegally.But its shortcoming is to add encryption chip to be added significantly to the production cost of equipment, so that the application of this encryption technology of encryption chip receives serious restriction.
Summary of the invention
It is an object of the invention to overcome above-mentioned shortcoming of the prior art, there is provided a kind of without increasing extra hardware cost, the encryption to software section and the binding with hardware components can be realized, thus effectively prevent that hardware is identical but equipment that software is different is mutually upgraded, further can be limited for each equipment by the equipment unique identifier of each equipment of differentiation, it is thus possible to effectively prevent bootlegging, application mode is easy, with low cost, and range of application relatively broad realize the system and method that software cryptography in electronic equipment is downloaded.
In order to realize above-mentioned purpose, the system that software cryptography in electronic equipment downloads that realizes of the present invention has a following composition:
It includes softdog unit, software unit and download unit, described softdog unit and software unit are all connected with described download unit, described download unit is also connected with an electronic equipment, described softdog unit and software unit have all stored original encryption information, described software unit also stores systems soft ware, and described electronic equipment has unique device number;Described download unit is used for from the unique device number described in described electronic equipment reading, and described original encryption information and described unique device number are combined into unique encryption device identifier.
System described in utilization realizes the method that in electronic equipment, software cryptography is downloaded and includes that software cryptography download process operates, and the operation of this software cryptography download process comprises the following steps:
(11) download unit described in from described softdog unit read described in original encryption information as the first original encryption information;
(12) download unit described in from described software unit read described in original encryption information as the second original encryption information;
(13) relatively described the first original encryption information of the download unit described in is the most consistent with the second described original encryption information, if unanimously, then enters step (15), if inconsistent, then enters step (14);
(14) download unit described in is pointed out error message and exits this method;
(15) download unit described in is from the unique device number described in described electronic equipment reading;
(16) described original encryption information and described unique device number are combined into unique encryption device identifier by the download unit described in;
(17) download unit described in is from the systems soft ware described in described software unit reading;
(18) download unit described in is by the systems soft ware described in described unique encryption device identifier write;
(19) the described systems soft ware being written with unique encryption device identifier and original encryption information are downloaded to described electronic equipment by the download unit described in.
This realizes in the method that in electronic equipment, software cryptography is downloaded, and described method also includes that electronic equipment starts operation, and described electronic equipment starts operation and comprises the following steps:
(21) electronic equipment described in read from described systems soft ware described in unique encryption device identifier as the first encryption device identifier;
(22) described original encryption information and described unique device number are combined into an encryption device identifier as the second encryption device identifier by the electronic equipment described in;
(23) the first encryption device identifier described in electronic equipment judgement described in is the most consistent with the second described encryption device identifier, if unanimously, then enters step (24), if inconsistent, then enters step (25);
(24) electronic equipment described in starts;
(25) electronic equipment described in shuts down or reports that this electronic equipment is illegality equipment.This realizes in the method that in electronic equipment, software cryptography is downloaded, and also includes that systemic presupposition operates, and comprised the following steps before described software cryptography download process operation:
(01) according to user operation by the softdog unit described in described original encryption information write;
(02) according to user operation by the software unit described in described original encryption information write.
This realizes in the method that in electronic equipment, software cryptography is downloaded, and described systemic presupposition operation is further comprising the steps of after described step (02):
(03) according to user operation, described softdog unit is stored in default encryption device quantity.
This realizes in the method that in electronic equipment, software cryptography is downloaded, in described software cryptography download process operation, further comprising the steps of before described step (11):
(10) the encryption device quantity in the softdog unit described in download unit reading described in, and judge whether it is 0, the most then enter step (14), if it is not, then enter step (11);
In described software cryptography download process operation, further comprising the steps of after described step (19):
(20) it is that former quantity subtracts 1 that the download unit described in resets the encryption device quantity in described softdog unit.
Have employed this invention realizes the system and method that in electronic equipment, software cryptography is downloaded, its system includes softdog unit, software unit and download unit, softdog unit and software unit have all stored original encryption information, download unit connects an electronic equipment, and this electronic equipment has unique device number.In the method for the invention, described original encryption information and described unique device number are combined into unique encryption device identifier by download unit, and be written into downloading in the systems soft ware of electronic equipment, make electronic equipment can judge whether this systems soft ware is bootlegging according to described unique encryption device identifier and unique device number, realize the encryption to software section and the binding with hardware components, effectively prevent that hardware is identical but equipment that software is different is mutually upgraded, and ensure that equipment will not be copied illegally, this invention realize system and method that software cryptography in electronic equipment downloads without increasing extra hardware cost, and application mode is easy, with low cost, range of application is relatively broad.
Accompanying drawing explanation
Fig. 1 be the present invention realize the flow chart of steps of software cryptography download process operation in the method that software cryptography in electronic equipment is downloaded.
Fig. 2 is that the electronic equipment in the method that in electronic equipment, software cryptography is downloaded that realizes of the present invention starts the flow chart of steps of operation.
Fig. 3 be the present invention realize method that software cryptography in electronic equipment downloads encryption download process flow chart in actual applications.
Fig. 4 be the present invention realize method that software cryptography in electronic equipment downloads equipment Booting sequence figure in actual applications.
Detailed description of the invention
In order to be more clearly understood that the technology contents of the present invention, describe in detail especially exemplified by following example.
In one embodiment, the system that in electronic equipment, software cryptography is downloaded that realizes of the present invention includes softdog unit, software unit and download unit, described softdog unit and software unit are all connected with described download unit, described download unit is also connected with an electronic equipment, described softdog unit and software unit have all stored original encryption information, described software unit also stores systems soft ware, and described electronic equipment has unique device number.
Utilize the system described in this embodiment to realize the method that in electronic equipment, software cryptography is downloaded and include that the operation of software cryptography download process and electronic equipment startup operate, described software cryptography download process operation, as it is shown in figure 1, comprise the following steps:
(11) download unit described in from described softdog unit read described in original encryption information as the first original encryption information;
(12) download unit described in from described software unit read described in original encryption information as the second original encryption information;
(13) relatively described the first original encryption information of the download unit described in is the most consistent with the second described original encryption information, if unanimously, then enters step (15), if inconsistent, then enters step (14);
(14) download unit described in is pointed out error message and exits this method;
(15) download unit described in is from the unique device number described in described electronic equipment reading;
(16) described original encryption information and described unique device number are combined into unique encryption device identifier by the download unit described in;
(17) download unit described in is from the systems soft ware described in described software unit reading;
(18) download unit described in is by the systems soft ware described in described unique encryption device identifier write;
(19) the described systems soft ware being written with unique encryption device identifier and original encryption information are downloaded to described electronic equipment by the download unit described in.
Described electronic equipment starts operation, as in figure 2 it is shown, comprise the following steps:
(21) electronic equipment described in read from described systems soft ware described in unique encryption device identifier as the first encryption device identifier;
(22) described original encryption information and described unique device number are combined into an encryption device identifier as the second encryption device identifier by the electronic equipment described in;
(23) the first encryption device identifier described in electronic equipment judgement described in is the most consistent with the second described encryption device identifier, if unanimously, then enters step (24), if inconsistent, then enters step (25);
(24) electronic equipment described in starts;
(25) electronic equipment described in shuts down or reports that this electronic equipment is illegality equipment.
In one more preferably embodiment, also including that systemic presupposition operates in described method before the operation of software cryptography download process, the operation of this systemic presupposition comprises the following steps:
(01) according to user operation by the softdog unit described in described original encryption information write;
(02) according to user operation by the software unit described in described original encryption information write.In a progress preferred embodiment, described systemic presupposition operation is further comprising the steps of after described step (02):
(03) according to user operation, described softdog unit is stored in default encryption device quantity.
In preferred embodiment, in described software cryptography download process operation, further comprising the steps of before described step (11):
(10) the encryption device quantity in the softdog unit described in download unit reading described in, and judge whether it is 0, the most then enter step (14), if it is not, then enter step (11);
In described software cryptography download process operation, further comprising the steps of after described step (19):
(20) it is that former quantity subtracts 1 that the download unit described in resets the encryption device quantity in described softdog unit.
In actual applications, the system that in electronic equipment, software cryptography is downloaded that realizes of the present invention mainly includes softdog unit, download unit, unit, software unit.Above-mentioned each unit includes following characteristics:
1, softdog unit has computing capability, can calculate the most encrypted number of devices;
2, softdog unit has storage capacity, can store original encryption information;
3, software unit comprises original encryption information, and headspace storage encryption device identifier;
4, the original encryption information during download unit reads softdog unit compares with the original encryption information in software unit, if consistent, is encrypted download;
5, the unique device number during download unit reads unit, becomes unique encryption device identifier, the headspace being stored in software unit after encryption;
6, the software unit processed is downloaded in equipment by download unit, and notifies that quantity therein is subtracted one by softdog unit;
7, the software in equipment can go to read unique encryption device identification number in headspace starting when, and the unique device number in unit is encrypted compares afterwards, if consistent, software starts, if inconsistent, illustrates that this unit is illegality equipment, inaccurate startup.
Wherein, softdog unit can use and compare common blank softdog in the market, and a set of software of self-developing is stored in softdog, it is possible to use the equipment of independent development, as softdog unit, develops a set of software thereon.This set software at least needs following functions and interface:
1, original encryption information A1 can be stored in;
2, the number of devices B1 needing to encrypt can be set;
3, the number of devices needing encryption can be subtracted one automatically, if returning error message when of zero.
The pre-treatment flow process that encryption is downloaded is as follows:
1, in softdog unit, original encryption information A1 it is stored in;
2, in softdog unit, it is stored in the number of devices B1 needing to encrypt;
3, software unit is stored in original encryption information A2;
4, the space of reserved storage unique encryption device identification number D1 in software unit.
Main handling process is downloaded in encryption, as it is shown on figure 3, comprise the steps:
1, download unit reads the number of devices B1 needing encryption from softdog unit, if B1 is 0, then exits encryption and downloads;
2, download unit reads original encryption information A1 from softdog unit;
3, download unit reads original encryption information A2 from software unit;
4, contrast A1 and A2, if the same continues to download, if difference, exits download;
5, download unit reads equipment unique identifier C1 from unit;
6, equipment unique identifier C1 and original encryption information A1 are combined into unique encryption device identification number D1;
7, download unit reads in software unit;
8, unique encryption device identification number D1 is stored in software unit reserved space;
9, download unit notice softdog, subtracts 1 by the number of devices B1 needing encryption in softdog unit;
10, the software unit being stored into D1 downloads to unit.
11, complete encryption to download
Equipment Booting sequence after encryption is downloaded, as shown in Figure 4, comprises the steps:
1, software unit starts
2, software unit reads unique encryption device identification number D1;
3, software unit reads equipment unique identifier C1;
4, equipment unique identifier C1 and original encryption information A2 are combined into unique encryption device identification number D2 by software unit;
5, compare D1 and D2, if the same continue to start, if difference, shut down or point out illegality equipment.
Through the equipment that this encryption method processed, if there being lawless person to take or copy unit by means such as flights, and read the software unit in some equipment E1 by reading software, then this software unit is burnt to unit on a large scale and forms illegality equipment.The software unit of this illegality equipment, starting when, can read unique encryption device identification number D1 and equipment unique identifier C1, and equipment unique identifier C1 and original encryption information A2 are combined into unique encryption device identification number D2.Owing to unique encryption device number D1 is the unique encryption device number D1 in some equipment E1, the unique encryption device number D2 calculated with the machine also differs, and therefore software unit will not normally start, thus has stopped the use of illegality equipment.
Unit downloaded software unit for the first time when, the most unique encryption device identification number is written in unit, and unique encryption device identification number comprises the original encryption information distinguishing unit type and the equipment unique identifier distinguishing each equipment, therefore after download again or upgrade software unit when, avoid the need for re-using softdog unit, after-sales service and customer upgrade can be facilitated.Simultaneously because containing the original encryption information distinguishing unit type in unique encryption device identification number, it is possible to prevent identical device unit but the different equipment of software unit is mutually upgraded, can accomplish to limit for each equipment, so that market sale has more preferable motility even with the equipment unique identifier distinguishing each equipment.
Have employed this invention realizes the system and method that in electronic equipment, software cryptography is downloaded, its system includes softdog unit, software unit and download unit, softdog unit and software unit have all stored original encryption information, download unit connects an electronic equipment, and this electronic equipment has unique device number.In the method for the invention, described original encryption information and described unique device number are combined into unique encryption device identifier by download unit, and be written into downloading in the systems soft ware of electronic equipment, make electronic equipment can judge whether this systems soft ware is bootlegging according to described unique encryption device identifier and unique device number, realize the encryption to software section and the binding with hardware components, effectively prevent that hardware is identical but equipment that software is different is mutually upgraded, and ensure that equipment will not be copied illegally, this invention realize system and method that software cryptography in electronic equipment downloads without increasing extra hardware cost, and application mode is easy, with low cost, range of application is relatively broad.
In this description, the present invention is described with reference to its specific embodiment.But it is clear that still may be made that various modifications and alterations are without departing from the spirit and scope of the present invention.Therefore, specification and drawings is regarded in an illustrative, rather than a restrictive.

Claims (6)

1. one kind realizes the system that in electronic equipment, software cryptography is downloaded, it is characterized in that, described system includes softdog unit, software unit and download unit, described softdog unit and software unit are all connected with described download unit, described download unit is also connected with an electronic equipment, described softdog unit and software unit have all stored original encryption information, and described software unit also stores systems soft ware, and described electronic equipment has unique device number;Described download unit is for reading described unique device number from described electronic equipment, and described original encryption information and described unique device number are combined into unique encryption device identifier;Described unique encryption device identifier is write in described systems soft ware, and the systems soft ware and original encryption information that are written with described unique encryption device identifier are all downloaded in described electronic equipment.
2. one kind utilizes the system described in claim 1 to realize the method that in electronic equipment, software cryptography is downloaded, it is characterised in that described method includes that software cryptography download process operates, and comprises the following steps:
(11) download unit described in from described softdog unit read described in original encryption information as the first original encryption information;
(12) download unit described in from described software unit read described in original encryption information as the second original encryption information;
(13) relatively described the first original encryption information of the download unit described in is the most consistent with the second described original encryption information, if unanimously, then enters step (15), if inconsistent, then enters step (14);
(14) download unit described in is pointed out error message and exits this method;
(15) download unit described in is from the unique device number described in described electronic equipment reading;
(16) described original encryption information and described unique device number are combined into unique encryption device identifier by the download unit described in;
(17) download unit described in is from the systems soft ware described in described software unit reading;
(18) download unit described in is by the systems soft ware described in described unique encryption device identifier write;
(19) the described systems soft ware being written with unique encryption device identifier and original encryption information are downloaded to described electronic equipment by the download unit described in.
The most according to claim 2 realize the method that software cryptography in electronic equipment is downloaded, it is characterised in that described method also includes that electronic equipment starts operation, and described electronic equipment starts operation and comprises the following steps:
(21) electronic equipment described in read from described systems soft ware described in unique encryption device identifier as the first encryption device identifier;
(22) described original encryption information and described unique device number are combined into an encryption device identifier as the second encryption device identifier by the electronic equipment described in;
(23) the first encryption device identifier described in electronic equipment judgement described in is the most consistent with the second described encryption device identifier, if unanimously, then enters step (24), if inconsistent, then enters step (25);
(24) electronic equipment described in starts;
(25) electronic equipment described in shuts down or reports that this electronic equipment is illegality equipment.
4. according to realizing, described in Claims 2 or 3, the method that software cryptography in electronic equipment is downloaded, it is characterised in that in described method, also included that systemic presupposition operates, and comprised the following steps before described software cryptography download process operation:
(01) according to user operation by the softdog unit described in described original encryption information write;
(02) according to user operation by the software unit described in described original encryption information write.
The most according to claim 4 realize the method that software cryptography in electronic equipment is downloaded, it is characterised in that described systemic presupposition operation is further comprising the steps of after described step (02):
(03) according to user operation, described softdog unit is stored in default encryption device quantity.
The most according to claim 4 realize the method that software cryptography in electronic equipment is downloaded, it is characterised in that in described software cryptography download process operation, the most further comprising the steps of before described step (11):
(10) the encryption device quantity in the softdog unit described in download unit reading described in, and judge whether it is 0, the most then enter step (14), if it is not, then enter step (11);
In described software cryptography download process operation, further comprising the steps of after described step (19):
(20) it is that former quantity subtracts 1 that the download unit described in resets the encryption device quantity in described softdog unit.
CN201210025116.1A 2012-02-06 2012-02-06 Realize the system and method that in electronic equipment, software cryptography is downloaded Active CN102609650B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210025116.1A CN102609650B (en) 2012-02-06 2012-02-06 Realize the system and method that in electronic equipment, software cryptography is downloaded

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210025116.1A CN102609650B (en) 2012-02-06 2012-02-06 Realize the system and method that in electronic equipment, software cryptography is downloaded

Publications (2)

Publication Number Publication Date
CN102609650A CN102609650A (en) 2012-07-25
CN102609650B true CN102609650B (en) 2016-08-03

Family

ID=46527011

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210025116.1A Active CN102609650B (en) 2012-02-06 2012-02-06 Realize the system and method that in electronic equipment, software cryptography is downloaded

Country Status (1)

Country Link
CN (1) CN102609650B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103425910B (en) * 2013-07-31 2016-09-07 福建天晴数码有限公司 The detection method that in program, whether function is illegally called
CN105975272A (en) * 2016-05-05 2016-09-28 北京元心科技有限公司 Method and system for generating unique device number of device
CN106650325B (en) * 2016-10-14 2019-07-05 杭州优稳自动化系统有限公司 A kind of software platform management method based on softdog
CN107526947A (en) * 2017-09-26 2017-12-29 重庆市珞宾信息技术有限公司 A kind of embedded software active control method
CN107609415A (en) * 2017-09-26 2018-01-19 重庆市珞宾信息技术有限公司 A kind of equipment Serial Number write protection method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101082950A (en) * 2007-07-10 2007-12-05 侯同济 Software encrypting registration piracy-preventing method
CN101414263A (en) * 2007-10-17 2009-04-22 鸿富锦精密工业(深圳)有限公司 Storage medium, software installation method and anti-pirate module
CN101661545A (en) * 2009-09-22 2010-03-03 江汉大学 Anti-pirate method and device for software capable of unloading and reinstalling

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100422946C (en) * 2003-09-12 2008-10-01 联华电子股份有限公司 System and method for detecting illegal software loading by using hardware and used chips thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101082950A (en) * 2007-07-10 2007-12-05 侯同济 Software encrypting registration piracy-preventing method
CN101414263A (en) * 2007-10-17 2009-04-22 鸿富锦精密工业(深圳)有限公司 Storage medium, software installation method and anti-pirate module
CN101661545A (en) * 2009-09-22 2010-03-03 江汉大学 Anti-pirate method and device for software capable of unloading and reinstalling

Also Published As

Publication number Publication date
CN102609650A (en) 2012-07-25

Similar Documents

Publication Publication Date Title
US10936719B2 (en) Preserving trust data during operating system updates of a secure element of an electronic device
EP2988470B1 (en) Automatic purposed-application creation
CN105900104B (en) Applet migration in safety element
US10002246B2 (en) Hardware isolated secure processing system within a secure element
CN102609650B (en) Realize the system and method that in electronic equipment, software cryptography is downloaded
CN105335181A (en) OTA upgrade realization method and terminal
CN109726067B (en) Process monitoring method and client device
CN105531710A (en) Method of authorizing an operation to be performed on a targeted computing device
US10021213B2 (en) Systems and methods for adaptive cloning of mobile devices
CN110990820B (en) Tax disk authorization method and device, electronic equipment and storage medium
CN103365682A (en) Information handling device and information handling method
CN106020868B (en) A kind of smart card firmware update and system
KR101352132B1 (en) Unauthorized operation judgment system for software of smart-phone
CN112000382B (en) Linux system starting method and device and readable storage medium
CN112015448A (en) System upgrading method and device based on over-the-air technology
Afonin et al. Mobile Forensics–Advanced Investigative Strategies
US20180248947A1 (en) Metered Network Synchronization
CN105868639A (en) Kernel vulnerability repair method and device
CN109756527B (en) Data sharing method, device and system
CN107957887A (en) A kind of component loading method of equipment, device and Internet of things system
CN115688120A (en) Secure chip firmware importing method, secure chip and computer readable storage medium
CN103052060A (en) Method for improving information security of mobile terminal and mobile terminal
CN104918234A (en) Mobile phone wallet client and application processing method thereof and terminal device
KR101556831B1 (en) Input method of permission for application development and recording medium storing program for executing method of developing android application
CN108345461B (en) Application updating method and device and computer readable storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C41 Transfer of patent application or patent right or utility model
CB03 Change of inventor or designer information

Inventor after: Wu Zhiheng

Inventor after: Liu Dan

Inventor before: Wu Zhiheng

COR Change of bibliographic data
TA01 Transfer of patent application right

Effective date of registration: 20160406

Address after: 100086 Beijing City, Haidian District Zhichun Road No. 118 building room 1501

Applicant after: Beijing Unistrong Science & Technology Co., Ltd.

Address before: 200233 Shanghai City, Xuhui District Road No. 159 12 Tianzhou unit 2 floor

Applicant before: Shanghai Yiluo Information Science and Technology Co., Ltd.

C14 Grant of patent or utility model
GR01 Patent grant