CN113242288B - Internet of things equipment firmware upgrading method, system and device and storage medium - Google Patents

Internet of things equipment firmware upgrading method, system and device and storage medium Download PDF

Info

Publication number
CN113242288B
CN113242288B CN202110492403.2A CN202110492403A CN113242288B CN 113242288 B CN113242288 B CN 113242288B CN 202110492403 A CN202110492403 A CN 202110492403A CN 113242288 B CN113242288 B CN 113242288B
Authority
CN
China
Prior art keywords
firmware
virtual machine
upgrading
upgraded
installation package
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110492403.2A
Other languages
Chinese (zh)
Other versions
CN113242288A (en
Inventor
袁静
李政
李承泽
范乐君
李高超
金暐
陈燕呢
赵怀瑾
肖佃艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National Computer Network and Information Security Management Center
Original Assignee
National Computer Network and Information Security Management Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National Computer Network and Information Security Management Center filed Critical National Computer Network and Information Security Management Center
Priority to CN202110492403.2A priority Critical patent/CN113242288B/en
Publication of CN113242288A publication Critical patent/CN113242288A/en
Application granted granted Critical
Publication of CN113242288B publication Critical patent/CN113242288B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y10/00Economic sectors
    • G16Y10/75Information technology; Communication
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/50Safety; Security of things, users, data or systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • H04L41/082Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45595Network integration; Enabling network access in virtual machine instances

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Stored Programmes (AREA)

Abstract

The application discloses a firmware upgrading method for equipment of the internet of things, which is used for solving the problems that when the firmware of the equipment of the internet of things is upgraded by adopting the existing firmware upgrading method, an attacker can easily acquire a complete firmware updating package, so that the updating package is replaced, and further a system is tampered or damaged, the safety of the system is greatly influenced, and the normal operation of the equipment of the internet of things is not facilitated. The method comprises the following steps: starting the virtual machine in response to the received firmware upgrading instruction; determining a firmware to be upgraded, and simulating an operating environment corresponding to the firmware to be upgraded through a virtual machine; acquiring an update installation package corresponding to the firmware to be upgraded, running the update installation package through a virtual machine, and finishing upgrading the firmware to be upgraded in the virtual machine; running the first upgrading firmware through a virtual machine, and monitoring the running state of the first upgrading firmware; and after the first upgrading firmware is determined to be safe through the running state, upgrading the firmware to be upgraded on the physical machine through the virtual machine.

Description

Internet of things equipment firmware upgrading method, system and device and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method, a system, an apparatus, and a storage medium for upgrading a firmware of an internet of things device.
Background
With the continuous development of the Internet of Things (IoT), embedded devices are largely put into use in the Internet of Things scenario.
As with all devices or software, after the internet of things device is used for a period of time, the requirements and functions of the user may change, and in particular, the firmware in the device (mainly including an operating system, a device driver and middleware, which are collectively referred to as "firmware" of the device because they are directly embedded in the static flash memory of the device) is used as a main module responsible for coordinating the internal resources of the system and the information interaction between the inside and the outside, and the security and stability of the device are extremely important, and the security of the device can be ensured only by providing a continuous update service, so as to meet the requirements of the user on the functions of the device.
Currently, in the related art, an over-the-air firmware upgrading technology is generally used for upgrading firmware, and the over-the-air firmware upgrading technology is a technology for downloading a remote firmware updating package by using a specific network communication protocol so as to update firmware of deployed internet of things equipment.
In the related art, protection schemes for the security of the firmware update package are mostly performed in a communication encryption manner, or plaintext transmission is directly performed. The communication encryption mode can increase the time and memory overhead of the terminal decryption process, a certain memory is occupied by the decryption algorithm, and the use environment that the memory resources of the small embedded terminal in the embedded terminal are limited and the computing capability is limited is considered, so that the mode has use limitation. And under the condition of plaintext transmission, an attacker can easily acquire a complete firmware update package, so that the update package is easily replaced, the system is further tampered or damaged, the safety of the system is greatly influenced, and the normal operation of the equipment of the internet of things is not facilitated.
Therefore, how to ensure that the firmware of the internet of things equipment which is already put on the market can be safely upgraded becomes a problem to be solved urgently.
Disclosure of Invention
The embodiment of the application provides an Internet of things equipment firmware upgrading method, which is used for solving the problems that when the existing firmware upgrading method is adopted for upgrading the Internet of things equipment firmware, an attacker can easily acquire a complete firmware updating package, so that the updating package is replaced, and a system is tampered or damaged, the safety of the system is greatly influenced, and the normal operation of the Internet of things equipment is not facilitated.
The embodiment of the application further provides an internet of things equipment firmware upgrading system, which is used for solving the problems that when the existing firmware upgrading method is adopted for upgrading the internet of things equipment firmware, an attacker can easily acquire a complete firmware updating package, so that the updating package is replaced, and the system is tampered or damaged, the safety of the system is greatly influenced, and the normal operation of the internet of things equipment is not facilitated.
The embodiment of the application further provides an internet of things equipment firmware upgrading device, which is used for solving the problems that when the existing firmware upgrading method is adopted for upgrading the internet of things equipment firmware, an attacker can easily acquire a complete firmware updating package, so that the updating package is replaced, and the system is tampered or damaged, the safety of the system is greatly influenced, and the normal operation of the internet of things equipment is not facilitated.
The embodiment of the application further provides a computer-readable storage medium, which is used for solving the problems that when the firmware of the internet of things equipment is upgraded by using the existing firmware upgrading method, an attacker can easily acquire a complete firmware updating package, so that the updating package is replaced, and the system is tampered or damaged, so that the safety of the system is greatly influenced, and the normal operation of the internet of things equipment is not facilitated.
The embodiment of the application adopts the following technical scheme:
an Internet of things equipment firmware upgrading method comprises the following steps: starting the virtual machine in response to the received firmware upgrading instruction; the firmware upgrading instruction carries an identifier of firmware to be upgraded, and the virtual machine runs in a physical machine for installing the firmware; determining a firmware to be upgraded according to the firmware upgrading instruction, and simulating an operating environment corresponding to the firmware to be upgraded through the virtual machine; acquiring an update installation package corresponding to the firmware to be upgraded, running the update installation package through the virtual machine, and completing the upgrade of the firmware to be upgraded in the virtual machine to obtain a first upgrade firmware; running the first upgrading firmware through the virtual machine, and monitoring the running state of the first upgrading firmware; and after the first upgrading firmware is determined to be safe through the running state, upgrading the firmware to be upgraded on the physical machine through the virtual machine.
An internet of things equipment firmware upgrading system is characterized by comprising:
the virtual machine starting unit is used for responding to the received firmware upgrading instruction and starting the virtual machine; the firmware upgrading instruction carries an identifier of firmware to be upgraded, and the virtual machine runs in a physical machine for installing the firmware; the operating environment simulation unit is used for determining the firmware to be upgraded according to the firmware upgrading instruction and simulating an operating environment corresponding to the firmware to be upgraded through the virtual machine; the virtual upgrading unit is used for acquiring an updating installation package corresponding to the firmware to be upgraded, running the updating installation package through the virtual machine, and finishing upgrading the firmware to be upgraded in the virtual machine to obtain first upgraded firmware; the state monitoring unit is used for running the first upgrading firmware through the virtual machine and monitoring the running state of the first upgrading firmware; and the upgrading unit is used for upgrading the firmware to be upgraded on the physical machine through the virtual machine after the first upgraded firmware is determined to be safe through the running state.
An thing networking equipment firmware upgrading device includes:
a processor; and a memory arranged to store computer executable instructions that, when executed, cause the processor to: starting the virtual machine in response to the received firmware upgrading instruction; the firmware upgrading instruction carries an identifier of firmware to be upgraded, and the virtual machine runs in a physical machine for installing the firmware; determining a firmware to be upgraded according to the firmware upgrading instruction, and simulating an operating environment corresponding to the firmware to be upgraded through the virtual machine; acquiring an update installation package corresponding to the firmware to be upgraded, running the update installation package through the virtual machine, and completing the upgrade of the firmware to be upgraded in the virtual machine to obtain a first upgrade firmware; running the first upgrading firmware through the virtual machine, and monitoring the running state of the first upgrading firmware; and after the first upgrading firmware is determined to be safe through the running state, upgrading the firmware to be upgraded on the physical machine through the virtual machine.
A computer-readable storage medium storing one or more programs that, when executed by an electronic device including a plurality of application programs, cause the electronic device to: starting the virtual machine in response to the received firmware upgrading instruction; the firmware upgrading instruction carries an identifier of firmware to be upgraded, and the virtual machine runs in a physical machine for installing the firmware; determining a firmware to be upgraded according to the firmware upgrading instruction, and simulating an operating environment corresponding to the firmware to be upgraded through the virtual machine; acquiring an update installation package corresponding to the firmware to be upgraded, running the update installation package through the virtual machine, and completing the upgrade of the firmware to be upgraded in the virtual machine to obtain a first upgrade firmware; running the first upgrading firmware through the virtual machine, and monitoring the running state of the first upgrading firmware; and after the first upgrading firmware is determined to be safe through the running state, upgrading the firmware to be upgraded on the physical machine through the virtual machine.
The embodiment of the application adopts at least one technical scheme which can achieve the following beneficial effects:
by adopting the method for upgrading the firmware of the internet of things equipment, after the internet of things equipment receives a firmware upgrading instruction, the virtual machine is started in response to the firmware upgrading instruction, the firmware to be upgraded is determined according to the firmware upgrading instruction, the operating environment corresponding to the firmware to be upgraded is simulated through the virtual machine, and then the firmware to be upgraded is updated and upgraded in the virtual machine in a mode of operating the updating installation package on the virtual machine, so that first upgraded firmware is obtained; furthermore, the first upgrade firmware can be run through the virtual machine, and the running state of the first upgrade firmware is monitored; and when the virtual machine determines that the first upgrading firmware is safe according to the monitored running state, upgrading and updating the firmware to be upgraded on the physical machine through the virtual machine. By adopting the firmware upgrading method provided by the embodiment of the application, before the firmware on the physical machine is upgraded, firstly, the following steps are simulated on the virtual machine: the updating installation package downloaded from the server is used for updating the firmware to be updated, operation monitoring is carried out on the updated firmware on the virtual machine, and the updating installation package is used for updating the firmware on the physical machine only after the safety of the updating installation package is fully guaranteed and the updated firmware runs normally. By adopting the scheme for upgrading the firmware through the virtual machine, due to the fact that the production environment and the upgrading environment are isolated, the virtual machine is used for carrying out safety detection and operation monitoring on the updating installation package, so that the safety of upgrading the firmware on the physical machine can be guaranteed, and the safe operation of the Internet of things equipment is further guaranteed.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic specific flowchart of a method for upgrading a firmware of an internet of things device according to an embodiment of the present disclosure;
fig. 2 is a schematic structural diagram of a firmware upgrading system of an internet of things device according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of a firmware upgrading apparatus for internet of things equipment according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
The method for upgrading the firmware of the equipment of the internet of things is used for solving the problems that when the firmware of the equipment of the internet of things is upgraded by adopting the existing firmware upgrading method, an attacker can easily acquire a complete firmware updating package, so that the updating package is replaced, and the system is tampered or damaged, so that the safety of the system is greatly influenced, and the normal operation of the equipment of the internet of things is not facilitated.
A specific implementation flow diagram of the method for upgrading the firmware of the internet of things device is shown in fig. 1, and the method mainly includes the following steps:
step 11, responding to the received firmware upgrading instruction, starting a virtual machine;
wherein, the firmware upgrading instruction carries the identifier of the firmware to be upgraded. Specifically, after the developer completes the development of the new firmware version, the new firmware version update package is uploaded to the upgrade server, and the upgrade server may generate a firmware upgrade instruction corresponding to the firmware update package, where the firmware upgrade instruction includes information such as firmware version information, an identifier (name or ID) of the firmware to be upgraded, and update on-line time, and issue the firmware upgrade instruction to each piece of internet of things equipment to be updated.
The Virtual Machine (VM) runs in a physical Machine in which firmware is installed.
Step 12, determining the firmware to be upgraded according to the firmware upgrading instruction received by the step 11, and simulating the operating environment corresponding to the firmware to be upgraded through the virtual machine;
the virtual machine may determine the firmware to be upgraded according to the firmware identifier carried in the firmware upgrade instruction received by the step 11, and further simulate the operating environment of the firmware to be upgraded.
In this embodiment of the application, the virtual machine may simulate an actual operating environment of the firmware to be updated by running a basic environment required by the firmware to be updated, so as to run the firmware to be updated in the virtual machine.
Specifically, the virtual machine may implement simulation of the firmware operating base environment by operating a firmware file system, a customized version system kernel on which firmware operates, specific virtual hardware on which firmware operates, and the like.
In one embodiment, the virtual machine may extract the embedded file system from the firmware image using the open source firmware extraction tool Binwalk. And extracting a file system of the device firmware from the device firmware code in the binary format by using the Binwalk component, and separating an operating system file and a user program file. The virtual machine may determine the instruction architecture and endianness of the firmware by querying the firmware Executable and Linkable Format (ELF) header. The virtual machine may determine the kernel that needs to compile the configuration by querying the library on which the firmware program depends. The virtual machine may configure the virtual hardware by querying the hardware interface called when the firmware program is running. And further simulating a basic environment required by the running of the firmware to be upgraded in the virtual machine according to the acquired information.
In addition, it should be noted that, after the virtual machine has configured all the environments required for running the firmware to be upgraded, the virtual machine may also copy the data in the physical machine and input the copied data into the virtual machine, so that the firmware to be upgraded is run in the virtual machine.
Step 13, obtaining an update installation package corresponding to the firmware to be upgraded, running the update installation package through a virtual machine, and completing the upgrade of the firmware to be upgraded in the virtual machine to obtain a first upgrade firmware;
in an implementation manner, the internet of things device may download, according to the received firmware upgrade instruction, the update installation package corresponding to the firmware to be upgraded from the upgrade server, decompress the update installation package on the virtual machine configured in the execution step 12, and update the firmware to be upgraded running in the virtual machine according to the firmware update installation package.
It should be noted that, in order to ensure the security of the update installation package, before the update installation package is executed, the virtual machine may first perform security detection on the update installation package, and in an embodiment, the executing, by the virtual machine, the update installation package may include: based on the virtual machine, carrying out security detection on the update installation package; and when the safety detection is passed, the virtual machine runs the update installation package.
In this embodiment of the present application, the virtual machine may perform security detection on the downloaded update installation package according to the metadata of the firmware to be upgraded, and in this embodiment of the present application, the virtual machine may perform security detection on the update installation package according to the following method: the virtual machine acquires metadata corresponding to the firmware to be upgraded; the metadata comprises unpacking rules corresponding to the firmware to be upgraded; unpacking the update installation package according to the unpacking rule to obtain a file system corresponding to the update installation package; decompiling the file system to obtain an assembly code of the update installation package; and scanning the assembly codes of the updating installation package to perform security detection on the updating installation package.
Specifically, the virtual machine may perform security detection on the update installation package in the following manner:
the virtual machine collects metadata of current Internet of things equipment (before firmware upgrade is carried out), wherein the metadata comprises a firmware name, a firmware type, a manufacturer corresponding to the firmware, a digital signature preset by the manufacturer and unpacking rules corresponding to all the firmware, which are contained in the Internet of things equipment, and generates a firmware list of the Internet of things equipment according to the collected metadata.
After the internet of things device downloads the firmware update installation package from the upgrade server, before unpacking and updating through the virtual machine, the virtual machine first decrypts and verifies a signature of the received firmware update package, generally, in the process of packing the firmware update installation package by the upgrade server, a manufacturer encrypts the firmware update installation package and adds a digital signature corresponding to the manufacturer, so as to ensure the safety of the firmware update installation package. After the internet of things device downloads the update installation package, the virtual machine can decrypt the firmware upgrade package and perform primary security detection by executing a decryption algorithm and signature verification.
After the decryption and the preliminary security detection of the update installation package are completed, the virtual machine can acquire a firmware name corresponding to the firmware update installation package, search the firmware metadata corresponding to the current firmware update installation package in a pre-generated firmware list according to the firmware name, unpack the firmware update installation package according to unpacking rules in the searched firmware metadata to acquire a file system corresponding to the firmware update installation package, and convert machine language codes of the file system obtained by unpacking into assembly language codes in a decompiling mode. And scanning the assembly language code of the firmware update package, wherein the scanning method comprises matching the feature code, positioning a core function, extracting an associated file, and detecting and analyzing whether the bug exists in the code according to the existing bug feature library. And then determining whether the firmware update installation package has a security risk according to the scanning and detecting results.
Through the two rounds of safety detection, the virtual machine can ensure that the update installation package downloaded from the upgrade server is not tampered as far as possible, and no safety risk exists, so that the safety of subsequent simulation update upgrading on the virtual machine is ensured.
After the virtual machine passes the security verification of the update installation package in the above manner, the virtual machine can run the update installation package, and complete the update of the firmware to be updated in the virtual machine, so as to obtain the first updated firmware.
Step 14, running the first upgrade firmware obtained by executing the step 13 through a virtual machine, and monitoring the running state of the first upgrade firmware;
in an embodiment, in order to simulate the operating state of the first upgrade firmware in the actual generation environment through the operating state of the first upgrade firmware running in the virtual machine, in this embodiment of the application, the virtual machine may copy the service data in the actual generation environment, and run the first upgrade firmware through the service data obtained by the copying, so as to achieve an effect of simulating the operating state of the first upgrade firmware in the actual generation environment.
Specifically, the virtual machine may monitor the running state of the upgraded firmware in the following manner: copying business data generated by a production environment; and sending the service data obtained after copying to the virtual machine, so that the virtual machine performs operation test on the first upgrading firmware based on the service data, and obtains the operation state of the first upgrading firmware.
In the embodiment of the application, the virtual machine may determine whether the first upgraded firmware normally operates by determining whether an abnormal state (such as an abnormal shutdown, an abnormal restart, and other faults) occurs in the first upgraded firmware during the operation process within a preset time period (such as within 1 hour from the update and upgrade completion). When the virtual machine does not detect that the first upgrading firmware is in an abnormal state within a preset time period, determining that the first upgrading firmware is a safe firmware, and executing the step 15; and when the virtual machine detects that the first upgrade firmware is in an abnormal state within a preset time period, determining that the first upgrade firmware is an unsafe firmware, and executing step 16.
Step 15, after the first upgrading firmware is determined to be safe according to the running state obtained by executing the step 14, upgrading the firmware to be upgraded on the physical machine through the virtual machine;
in order to avoid that the internet of things equipment cannot be normally used due to firmware update when the firmware to be upgraded on the physical machine is updated by using the update installation package, in the embodiment of the application, during the updating of the firmware on the physical machine, the upgraded firmware running on the virtual machine can be accessed into the production environment, during the updating of the firmware on the physical machine, the upgraded firmware replaces the firmware of the physical machine to execute tasks, after the firmware of the physical machine is upgraded, the firmware of the physical machine is accessed into the production environment again, and the virtual machine is closed, so that equipment resources are saved.
Specifically, the method provided by the embodiment of the present application may include: in a production environment, switching the firmware to be upgraded into a first upgraded firmware running on the virtual machine; upgrading the firmware to be upgraded in the physical machine through the updating installation package corresponding to the firmware to be upgraded to obtain second upgraded firmware; and after the firmware to be upgraded in the physical machine is upgraded, switching the first upgraded firmware running on the virtual machine to the second upgraded firmware in the physical machine in a production environment, and closing the virtual machine.
And step 16, when the first upgraded firmware is determined to be unsafe according to the running state obtained by executing the step 14, closing the virtual machine.
When it is determined that the firmware running in the virtual machine has a security risk according to the running state obtained by executing step 14, the virtual machine is turned off to ensure the security of the running environment of the physical machine, and a security alarm is sent to the upgrade server to prompt the upgrade server that the transmission link of the update package or the encryption scheme of the update package may have been hacked, so that the upgrade server updates the encryption policy and the encryption scheme of the transmission link, and the security of the subsequent transmission process of the update package is ensured.
By adopting the method for upgrading the firmware of the internet of things equipment, after the internet of things equipment receives a firmware upgrading instruction, the virtual machine is started in response to the firmware upgrading instruction, the firmware to be upgraded is determined according to the firmware upgrading instruction, the operating environment corresponding to the firmware to be upgraded is simulated through the virtual machine, and then the firmware to be upgraded is updated and upgraded in the virtual machine in a mode of operating the updating installation package on the virtual machine, so that first upgraded firmware is obtained; furthermore, the first upgrade firmware can be run through the virtual machine, and the running state of the first upgrade firmware is monitored; and when the virtual machine determines that the first upgrading firmware is safe according to the monitored running state, upgrading and updating the firmware to be upgraded on the physical machine through the virtual machine. By adopting the firmware upgrading method provided by the embodiment of the application, before the firmware on the physical machine is upgraded, firstly, the following steps are simulated on the virtual machine: the updating installation package downloaded from the server is used for updating the firmware to be updated, operation monitoring is carried out on the updated firmware on the virtual machine, and the updating installation package is used for updating the firmware on the physical machine only after the safety of the updating installation package is fully guaranteed and the updated firmware runs normally. By adopting the scheme for upgrading the firmware through the virtual machine, due to the fact that the production environment and the upgrading environment are isolated, the virtual machine is used for carrying out safety detection and operation monitoring on the updating installation package, so that the safety of upgrading the firmware on the physical machine can be guaranteed, and the safe operation of the Internet of things equipment is further guaranteed.
In addition, the internet of things equipment firmware upgrading system provided by the embodiment of the application is used for solving the problems that when the existing firmware upgrading method is adopted for upgrading the internet of things equipment firmware, an attacker can easily obtain a complete firmware updating package, so that the updating package is replaced, the system is tampered or damaged, the safety of the system is greatly influenced, and the normal operation of the internet of things equipment is not facilitated. A specific structural schematic diagram of the internet of things device firmware upgrading system is shown in fig. 2, and includes: a virtual machine starting unit 21, a running environment simulation unit 22, a virtual upgrade unit 23, a state monitoring unit 24, and an upgrade unit 25.
The virtual machine starting unit 21 is configured to start a virtual machine in response to the received firmware upgrade instruction; the firmware upgrading instruction carries an identifier of firmware to be upgraded, and the virtual machine runs in a physical machine for installing the firmware;
the operating environment simulation unit 22 is configured to determine the firmware to be upgraded according to the firmware upgrade instruction, and simulate an operating environment corresponding to the firmware to be upgraded through the virtual machine;
the virtual upgrading unit 23 is configured to obtain an update installation package corresponding to the firmware to be upgraded, run the update installation package through the virtual machine, and complete upgrading of the firmware to be upgraded in the virtual machine, so as to obtain a first upgraded firmware;
a state monitoring unit 24, configured to run the first upgrade firmware through the virtual machine, and monitor a running state of the first upgrade firmware;
and the upgrading unit 25 is configured to upgrade, by the virtual machine, the firmware to be upgraded on the physical machine after the first upgraded firmware is determined to be safe by the operating state.
In an embodiment, the virtual upgrade unit 23 is specifically configured to: based on the virtual machine, carrying out security detection on the updating installation package; and when the safety detection is passed, the updating installation package is operated through the virtual machine.
In an embodiment, the virtual upgrade unit 23 is specifically configured to: acquiring metadata corresponding to the firmware to be upgraded; the metadata comprises unpacking rules corresponding to the firmware to be upgraded; unpacking the update installation package according to the unpacking rule to obtain a file system corresponding to the update installation package; decompiling the file system to obtain an assembly code of the update installation package; and scanning the assembly codes of the updating installation package to perform security detection on the updating installation package.
In one embodiment, the status monitoring unit 24 is specifically configured to: copying business data generated by a production environment; and sending the service data obtained after copying to the virtual machine, so that the virtual machine performs operation test on the first upgrading firmware based on the service data, and obtains the operation state of the first upgrading firmware.
In an embodiment, the upgrade unit 25 is specifically configured to: in a production environment, switching the firmware to be upgraded into a first upgraded firmware running on the virtual machine; upgrading the firmware to be upgraded in the physical machine through the updating installation package corresponding to the firmware to be upgraded to obtain second upgraded firmware; and after the firmware to be upgraded in the physical machine is upgraded, switching the first upgraded firmware running on the virtual machine to the second upgraded firmware in the physical machine in a production environment, and closing the virtual machine.
By adopting the firmware upgrading system of the internet of things equipment provided by the embodiment of the application, after the internet of things equipment receives a firmware upgrading instruction, the virtual machine is started in response to the firmware upgrading instruction, the firmware to be upgraded is determined according to the firmware upgrading instruction, the operating environment corresponding to the firmware to be upgraded is simulated through the virtual machine, and then the firmware to be upgraded is updated and upgraded in the virtual machine in a mode of operating the updating installation package on the virtual machine, so that the first upgraded firmware is obtained; furthermore, the first upgrade firmware can be run through the virtual machine, and the running state of the first upgrade firmware is monitored; and when the virtual machine determines that the first upgrading firmware is safe according to the monitored running state, upgrading and updating the firmware to be upgraded on the physical machine through the virtual machine. By adopting the firmware upgrading method provided by the embodiment of the application, before the firmware on the physical machine is upgraded, firstly, the following steps are simulated on the virtual machine: the updating installation package downloaded from the server is used for updating the firmware to be updated, operation monitoring is carried out on the updated firmware on the virtual machine, and the updating installation package is used for updating the firmware on the physical machine only after the safety of the updating installation package is fully guaranteed and the updated firmware runs normally. By adopting the scheme for upgrading the firmware through the virtual machine, due to the fact that the production environment and the upgrading environment are isolated, the virtual machine is used for carrying out safety detection and operation monitoring on the updating installation package, so that the safety of upgrading the firmware on the physical machine can be guaranteed, and the safe operation of the Internet of things equipment is further guaranteed.
Fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present application. Referring to fig. 3, at a hardware level, the electronic device includes a processor, and optionally further includes an internal bus, a network interface, and a memory. The Memory may include a Memory, such as a Random-Access Memory (RAM), and may further include a non-volatile Memory, such as at least 1 disk Memory. Of course, the electronic device may also include hardware required for other services.
The processor, the network interface, and the memory may be connected to each other via an internal bus, which may be an ISA (Industry Standard Architecture) bus, a PCI (Peripheral Component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 3, but this does not indicate only one bus or one type of bus.
And the memory is used for storing programs. In particular, the program may include program code comprising computer operating instructions. The memory may include both memory and non-volatile storage and provides instructions and data to the processor.
The processor reads the corresponding computer program from the nonvolatile memory into the memory and then runs the computer program to form the data synchronization device on the logic level. The processor is used for executing the program stored in the memory and is specifically used for executing the following operations:
starting the virtual machine in response to the received firmware upgrading instruction; the firmware upgrading instruction carries an identifier of firmware to be upgraded, and the virtual machine runs in a physical machine for installing the firmware;
determining a firmware to be upgraded according to the firmware upgrading instruction, and simulating an operating environment corresponding to the firmware to be upgraded through the virtual machine;
acquiring an update installation package corresponding to the firmware to be upgraded, running the update installation package through the virtual machine, and completing the upgrade of the firmware to be upgraded in the virtual machine to obtain a first upgrade firmware;
running the first upgrading firmware through the virtual machine, and monitoring the running state of the first upgrading firmware;
and after the first upgrading firmware is determined to be safe through the running state, upgrading the firmware to be upgraded on the physical machine through the virtual machine.
The method for upgrading the firmware of the internet of things device, which is disclosed by the embodiment of fig. 3 of the present application, may be applied to a processor, or implemented by the processor. The processor may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
Of course, besides the software implementation, the electronic device of the present application does not exclude other implementations, such as a logic device or a combination of software and hardware, and the like, that is, the execution subject of the following processing flow is not limited to each logic unit, and may also be hardware or a logic device.
Embodiments of the present application also provide a computer-readable storage medium storing one or more programs, where the one or more programs include instructions, which when executed by a portable electronic device including a plurality of application programs, enable the portable electronic device to perform the method of the embodiment shown in fig. 1, and are specifically configured to:
starting the virtual machine in response to the received firmware upgrading instruction; the firmware upgrading instruction carries an identifier of firmware to be upgraded, and the virtual machine runs in a physical machine for installing the firmware; determining a firmware to be upgraded according to the firmware upgrading instruction, and simulating an operating environment corresponding to the firmware to be upgraded through the virtual machine; acquiring an update installation package corresponding to the firmware to be upgraded, running the update installation package through the virtual machine, and completing the upgrade of the firmware to be upgraded in the virtual machine to obtain a first upgrade firmware; running the first upgrading firmware through the virtual machine, and monitoring the running state of the first upgrading firmware; and after the first upgrading firmware is determined to be safe through the running state, upgrading the firmware to be upgraded on the physical machine through the virtual machine.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (7)

1. An Internet of things equipment firmware upgrading method is characterized by comprising the following steps:
starting the virtual machine in response to the received firmware upgrading instruction; the firmware upgrading instruction carries an identifier of firmware to be upgraded, and the virtual machine runs in a physical machine for installing the firmware;
determining a firmware to be upgraded according to the firmware upgrading instruction, and simulating an operating environment corresponding to the firmware to be upgraded through the virtual machine;
acquiring an update installation package corresponding to the firmware to be upgraded, and operating the update installation package through the virtual machine, wherein the method specifically comprises the following steps: based on the virtual machine, carrying out security detection on the updating installation package; when the safety detection is passed, the virtual machine runs the updating installation package, and the updating of the firmware to be updated is completed in the virtual machine, so that first updated firmware is obtained; running the first upgrading firmware through the virtual machine, and monitoring the running state of the first upgrading firmware; the method specifically comprises the following steps: copying business data generated by a production environment; sending the service data obtained after copying to the virtual machine, so that the virtual machine performs operation test on the first upgrading firmware based on the service data and obtains the operation state of the first upgrading firmware;
and after the first upgrading firmware is determined to be safe through the running state, upgrading the firmware to be upgraded on the physical machine through the virtual machine, wherein the first upgrading firmware running on the virtual machine is accessed to a production environment during the upgrading of the firmware to be upgraded on the physical machine.
2. The method according to claim 1, wherein the performing security detection on the update installation package based on the virtual machine specifically includes:
the virtual machine acquires metadata corresponding to the firmware to be upgraded; the metadata comprises unpacking rules corresponding to the firmware to be upgraded;
unpacking the update installation package according to the unpacking rule to obtain a file system corresponding to the update installation package;
decompiling the file system to obtain an assembly code of the update installation package;
and scanning the assembly codes of the updating installation package to perform security detection on the updating installation package.
3. The method according to claim 1, wherein upgrading the firmware to be upgraded on the physical machine by the virtual machine specifically includes: in a production environment, switching the firmware to be upgraded into a first upgraded firmware running on the virtual machine;
upgrading the firmware to be upgraded in the physical machine through the updating installation package corresponding to the firmware to be upgraded to obtain second upgraded firmware;
and after the firmware to be upgraded in the physical machine is upgraded, switching the first upgraded firmware running on the virtual machine to the second upgraded firmware in the physical machine in a production environment, and closing the virtual machine.
4. An internet of things equipment firmware upgrading system is characterized by comprising:
the virtual machine starting unit is used for responding to the received firmware upgrading instruction and starting the virtual machine; the firmware upgrading instruction carries an identifier of firmware to be upgraded, and the virtual machine runs in a physical machine for installing the firmware;
the operating environment simulation unit is used for determining the firmware to be upgraded according to the firmware upgrading instruction and simulating an operating environment corresponding to the firmware to be upgraded through the virtual machine;
the virtual upgrading unit is used for acquiring an updating installation package corresponding to the firmware to be upgraded and carrying out safety detection on the updating installation package based on the virtual machine; after the safety detection is passed, running the updating installation package through the virtual machine, and finishing the updating of the firmware to be updated in the virtual machine to obtain a first updated firmware;
the state monitoring unit is used for running the first upgrading firmware through the virtual machine and monitoring the running state of the first upgrading firmware; the method specifically comprises the following steps: copying business data generated by a production environment; sending the service data obtained after copying to the virtual machine, so that the virtual machine performs operation test on the first upgrading firmware based on the service data and obtains the operation state of the first upgrading firmware; and the upgrading unit is used for upgrading the firmware to be upgraded on the physical machine through the virtual machine after the first upgrading firmware is determined to be safe through the running state, wherein the first upgrading firmware running on the virtual machine is accessed to a production environment during the upgrading of the firmware to be upgraded on the physical machine.
5. The internet of things equipment firmware upgrading system of claim 4, wherein the upgrading unit is specifically configured to:
in a production environment, switching the firmware to be upgraded into a first upgraded firmware running on the virtual machine;
upgrading the firmware to be upgraded in the physical machine through the updating installation package corresponding to the firmware to be upgraded to obtain second upgraded firmware;
and after the firmware to be upgraded in the physical machine is upgraded, switching the first upgraded firmware running on the virtual machine to the second upgraded firmware in the physical machine in a production environment, and closing the virtual machine.
6. An thing networking equipment firmware upgrading device includes:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
starting the virtual machine in response to the received firmware upgrading instruction; the firmware upgrading instruction carries an identifier of firmware to be upgraded, and the virtual machine runs in a physical machine for installing the firmware;
determining a firmware to be upgraded according to the firmware upgrading instruction, and simulating an operating environment corresponding to the firmware to be upgraded through the virtual machine;
acquiring an update installation package corresponding to the firmware to be upgraded, and operating the update installation package through the virtual machine, wherein the method specifically comprises the following steps: based on the virtual machine, carrying out security detection on the updating installation package; when the safety detection is passed, the virtual machine runs the updating installation package, and the updating of the firmware to be updated is completed in the virtual machine, so that first updated firmware is obtained;
running the first upgrading firmware through the virtual machine, and monitoring the running state of the first upgrading firmware; the method specifically comprises the following steps: copying business data generated by a production environment; sending the service data obtained after copying to the virtual machine, so that the virtual machine performs operation test on the first upgrading firmware based on the service data and obtains the operation state of the first upgrading firmware;
and after the first upgrading firmware is determined to be safe through the running state, upgrading the firmware to be upgraded on the physical machine through the virtual machine, wherein the first upgrading firmware running on the virtual machine is accessed to a production environment during the upgrading of the firmware to be upgraded on the physical machine.
7. A computer-readable storage medium storing one or more programs that, when executed by an electronic device including a plurality of application programs, cause the electronic device to:
starting the virtual machine in response to the received firmware upgrading instruction; the firmware upgrading instruction carries an identifier of firmware to be upgraded, and the virtual machine runs in a physical machine for installing the firmware;
determining a firmware to be upgraded according to the firmware upgrading instruction, and simulating an operating environment corresponding to the firmware to be upgraded through the virtual machine;
acquiring an update installation package corresponding to the firmware to be upgraded, and operating the update installation package through the virtual machine, wherein the method specifically comprises the following steps: based on the virtual machine, carrying out security detection on the updating installation package; when the safety detection is passed, the virtual machine runs the updating installation package, and the updating of the firmware to be updated is completed in the virtual machine, so that first updated firmware is obtained;
running the first upgrading firmware through the virtual machine, and monitoring the running state of the first upgrading firmware; the method specifically comprises the following steps: copying business data generated by a production environment; sending the service data obtained after copying to the virtual machine, so that the virtual machine performs operation test on the first upgrading firmware based on the service data and obtains the operation state of the first upgrading firmware;
and after the first upgrading firmware is determined to be safe through the running state, upgrading the firmware to be upgraded on the physical machine through the virtual machine, wherein the first upgrading firmware running on the virtual machine is accessed to a production environment during the upgrading of the firmware to be upgraded on the physical machine.
CN202110492403.2A 2021-05-06 2021-05-06 Internet of things equipment firmware upgrading method, system and device and storage medium Active CN113242288B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110492403.2A CN113242288B (en) 2021-05-06 2021-05-06 Internet of things equipment firmware upgrading method, system and device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110492403.2A CN113242288B (en) 2021-05-06 2021-05-06 Internet of things equipment firmware upgrading method, system and device and storage medium

Publications (2)

Publication Number Publication Date
CN113242288A CN113242288A (en) 2021-08-10
CN113242288B true CN113242288B (en) 2022-03-08

Family

ID=77132162

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110492403.2A Active CN113242288B (en) 2021-05-06 2021-05-06 Internet of things equipment firmware upgrading method, system and device and storage medium

Country Status (1)

Country Link
CN (1) CN113242288B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114996693A (en) * 2022-07-19 2022-09-02 深圳市美力高集团有限公司 Information safety protection method and device, vehicle and storage medium
CN116521199B (en) * 2023-04-14 2024-05-17 北京百度网讯科技有限公司 Component upgrading method, device, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108108177A (en) * 2018-01-02 2018-06-01 联想(北京)有限公司 Firmware upgrade method, physical host and the virtual machine of physical host
CN110392103A (en) * 2019-07-18 2019-10-29 上海擎感智能科技有限公司 Method for uploading, device, the server of upgrade package for mobile unit
CN111381844A (en) * 2018-12-27 2020-07-07 中兴通讯股份有限公司 Method and device for updating vehicle ECU firmware
CN112579114A (en) * 2019-09-27 2021-03-30 阿里巴巴集团控股有限公司 Program upgrading method and device for Internet of things equipment and Internet of things equipment

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8453144B1 (en) * 2008-09-23 2013-05-28 Gogrid, LLC System and method for adapting a system configuration using an adaptive library
CN106470114B (en) * 2015-08-20 2019-09-20 青岛海信移动通信技术股份有限公司 A kind of configuration method and device of OTA upgrade package
US11157265B2 (en) * 2017-12-11 2021-10-26 Microsoft Technology Licensing, Llc Firmware update
CN108304209B (en) * 2018-02-28 2021-01-15 联想(北京)有限公司 Firmware upgrading method and firmware upgrading system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108108177A (en) * 2018-01-02 2018-06-01 联想(北京)有限公司 Firmware upgrade method, physical host and the virtual machine of physical host
CN111381844A (en) * 2018-12-27 2020-07-07 中兴通讯股份有限公司 Method and device for updating vehicle ECU firmware
CN110392103A (en) * 2019-07-18 2019-10-29 上海擎感智能科技有限公司 Method for uploading, device, the server of upgrade package for mobile unit
CN112579114A (en) * 2019-09-27 2021-03-30 阿里巴巴集团控股有限公司 Program upgrading method and device for Internet of things equipment and Internet of things equipment

Also Published As

Publication number Publication date
CN113242288A (en) 2021-08-10

Similar Documents

Publication Publication Date Title
CN113242288B (en) Internet of things equipment firmware upgrading method, system and device and storage medium
CN108196878B (en) Method and device for generating application program installation package, electronic equipment and storage medium
US9027014B2 (en) Updating firmware compatibility data
JP6953424B2 (en) Mobile device application update method and device
US10846073B2 (en) Methods, apparatuses, terminals, servers, and systems for container generation
CN105302711B (en) Application restoration method and device and terminal
CN111382048B (en) Management method and device for mobile equipment on true machine test platform
CN107092824B (en) Application program running method and device
US9513762B1 (en) Static content updates
CN107797818A (en) Application program updating method and device
CN103793248A (en) Method and device for upgrading application program
CN111625260A (en) Method and system based on mixed mobile application program upgrading
CN112148297A (en) Intelligent server encryption and packaging method and device
CN108197469B (en) Method and device for verifying application program, storage medium and electronic equipment
CN106709281B (en) Patch granting and acquisition methods, device
CN106960138B (en) Virtual machine instruction verification method, device and system
CN113535194A (en) Installation package updating method and device, computer equipment and storage medium
WO2018166322A1 (en) Repairing method and device for system partition
CN110826074A (en) Application vulnerability detection method and device and computer readable storage medium
CN113641389B (en) Software upgrading method, device and equipment based on OpenCPU
CN106778270B (en) Malicious application detection method and system
CN114706706A (en) Application software repairing method and device and electronic equipment
CN113553271A (en) Method for generating and testing internal test program of application program
CN109428936B (en) APP upgrading method, device, system, electronic equipment and storage medium
CN108345461B (en) Application updating method and device and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant