CN115913714A - Information security verification method, device and equipment based on OTA (over-the-air technology) upgrading and storage medium - Google Patents

Information security verification method, device and equipment based on OTA (over-the-air technology) upgrading and storage medium Download PDF

Info

Publication number
CN115913714A
CN115913714A CN202211435184.5A CN202211435184A CN115913714A CN 115913714 A CN115913714 A CN 115913714A CN 202211435184 A CN202211435184 A CN 202211435184A CN 115913714 A CN115913714 A CN 115913714A
Authority
CN
China
Prior art keywords
mac address
verified
upgraded
ota
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211435184.5A
Other languages
Chinese (zh)
Inventor
黄雅雯
卢伟超
王琼
梁志高
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Kaihong Digital Industry Development Co Ltd
Original Assignee
Shenzhen Kaihong Digital Industry Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Kaihong Digital Industry Development Co Ltd filed Critical Shenzhen Kaihong Digital Industry Development Co Ltd
Priority to CN202211435184.5A priority Critical patent/CN115913714A/en
Publication of CN115913714A publication Critical patent/CN115913714A/en
Pending legal-status Critical Current

Links

Images

Abstract

The application relates to the technical field of Internet and discloses an information security verification method, device, equipment and a storage medium based on OTA (over the air) upgrading, wherein the information security verification method based on OTA upgrading comprises the steps of reading an MAC (media access control) address of a system controller of the equipment to be upgraded and generating SN (serial number) based on a time random value and a standard MAC address; generating an MAC address to be verified through the OTA controller and the SN by using a space download technology, and matching the MAC address to be verified with a standard MAC address; and under the condition that the MAC address to be verified is matched with the standard MAC address, determining that the equipment to be upgraded is successfully verified. According to the method and the device, the standard MAC address of the device to be upgraded is compared with the MAC address to be verified generated after the serial number is decrypted, the device to be upgraded is determined to be successfully verified under the condition that the standard MAC address of the device to be upgraded is matched with the MAC address to be verified, OTA upgrading is carried out, the reliability of the device to be upgraded which is verified in the OTA upgrading process is improved, and the problem that the reliability of the device to be upgraded which is verified in the OTA upgrading process is low is solved.

Description

Information security verification method, device and equipment based on OTA (over-the-air technology) upgrading and storage medium
Technical Field
The present application relates to the field of internet technologies, and in particular, to an information security verification method, apparatus, device, and storage medium based on OTA upgrade.
Background
OTA (Over-the-air technology) upgrading is a common mobile equipment system upgrading technology, and can be completed on line by means of a Wi fi wireless network or a mobile phone mobile network without updating. By applying the OTA technology, the mobile communication can not only provide voice and data services, but also can detect whether a manufacturer has a new system or not on line and can upgrade, thereby providing better services for users. However, in the process of on-line upgrade of the mobile device through OTA, the mobile device is likely to be attacked by external attacks on the upgrade task due to over-the-air transmission, so that it is necessary to ensure that the device to be upgraded is the designated target device and not the third-party device.
At present, in the aspect of implementing information security of OTA upgrading, most of technologies maintain the self loophole of a server or the security of an upgrading packet, and ensure that the repair of the self loophole of the server and the transmission of the upgrading packet cannot be maliciously tampered and replaced in the OTA upgrading process, thereby promoting the smooth operation of OTA upgrading. However, in the process, the target device to be upgraded is not verified, and the possibility that the OTA service is updated to a third-party device other than the specified device is not eliminated, so that the reliability of verifying the device to be upgraded in the OTA upgrading process is low. Therefore, how to improve the reliability of the device to be upgraded in the OTA upgrading process becomes a technical problem to be solved urgently.
Disclosure of Invention
The application provides an information security verification method, device, equipment and storage medium based on OTA (over the air) upgrading, so that the reliability of equipment to be upgraded is verified in the OTA upgrading process.
In a first aspect, the present application provides an information security verification method based on OTA upgrade, which includes: reading a standard local area network MAC address of a system controller of equipment to be upgraded, and generating a serial number SN of the equipment to be upgraded based on a time random value and the standard MAC address; generating an MAC address to be verified through an OTA controller and the SN by using a space download technology, and matching the MAC address to be verified with the standard MAC address; and under the condition that the MAC address to be verified is matched with the standard MAC address, determining that the equipment to be upgraded is successfully verified.
Further, reading a standard local area network MAC address of a system controller of a device to be upgraded, and generating a serial number SN of the device to be upgraded based on a time random value and the standard MAC address, including:
and generating an asymmetric encryption key based on the preset number and the preset protocol of the equipment to be upgraded, wherein the asymmetric encryption key comprises a public key and a private key.
Further, based on an operation platform, generating an asymmetric encryption key of the device to be upgraded, where the asymmetric encryption key includes a public key and a private key, and includes:
storing the private key to a network link corresponding to the equipment to be upgraded;
burning the public key to the system controller, and encrypting the public key through the system controller.
Further, before generating a MAC address to be verified by using the OTA controller and the SN according to a space download technology and matching the MAC address to be verified with the standard MAC address, the method includes:
the SN is stored to a network link corresponding to the equipment to be upgraded through the system controller;
and sending the private key to the OTA controller through an HTTP channel, and storing the private key through the OTA controller.
Further, after sending the private key to the OTA controller through an HTTP channel and saving the private key by the OTA controller, the method includes:
and decrypting the SN through the private key to generate the MAC address to be verified.
Further, after generating a MAC address to be verified by the OTA controller and the SN through the space download technology and matching the MAC address to be verified with the standard MAC address, the method further includes:
and determining that the equipment to be upgraded fails to be verified under the condition that the MAC address to be verified is not matched with the standard MAC address.
Further, the information security verification method based on OTA upgrade further comprises the following steps:
under the condition that the verification of the equipment to be upgraded is determined to be failed, a signal of the failure of the verification is sent to the equipment to be verified;
and under the condition that the verification of the equipment to be upgraded is determined to be successful, sending a signal of successful verification to the equipment to be verified so as to enable the equipment to be verified to carry out OTA upgrading.
In a second aspect, the present application further provides an information security verification apparatus based on OTA upgrade, which includes:
the serial number generation module is used for reading a standard local area network MAC address of a system controller of the equipment to be upgraded and generating a serial number SN of the equipment to be upgraded based on a time random value and the standard MAC address;
the MAC address matching module is used for generating an MAC address to be verified through the OTA controller and the SN and matching the MAC address to be verified with the standard MAC address;
and the verification success judging module is used for determining that the equipment to be upgraded is verified successfully under the condition that the MAC address to be verified is matched with the standard MAC address.
In a third aspect, the present application further provides an apparatus comprising a memory and a processor; the memory is used for storing a computer program; the processor is used for executing the computer program and realizing the information security verification method based on OTA upgrading when the computer program is executed.
In a fourth aspect, the present application further provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the computer program causes the processor to implement the OTA upgrade based information security verification method as described above.
The application discloses an information security verification method, device, equipment and storage medium based on OTA upgrading, wherein the information security verification method based on OTA upgrading comprises the steps of reading a standard local area network MAC address of a system controller of equipment to be upgraded, and generating a serial number SN of the equipment to be upgraded based on a time random value and the standard MAC address; generating an MAC address to be verified through an OTA controller and the SN by using a space download technology, and matching the MAC address to be verified with the standard MAC address; and under the condition that the MAC address to be verified is matched with the standard MAC address, determining that the equipment to be upgraded is successfully verified. According to the method and the device, the standard MAC address of the device to be upgraded is compared with the MAC address to be verified generated after the serial number is decrypted, the device to be upgraded is determined to be successfully verified under the condition that the standard MAC address of the device to be upgraded is matched with the MAC address to be verified, OTA upgrading is carried out, the reliability of the device to be upgraded which is verified in the OTA upgrading process is improved, and the problem that the reliability of the device to be upgraded which is verified in the OTA upgrading process is low is solved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings required to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the description below are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a schematic flow chart of an information security verification method based on OTA upgrade according to a first embodiment of the present application;
fig. 2 is a schematic flowchart of an information security verification method based on OTA upgrade according to a second embodiment of the present application;
fig. 3 is a schematic block diagram of an information security verification apparatus based on OTA upgrade according to an embodiment of the present application;
fig. 4 is a block diagram schematically illustrating a structure of an apparatus according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The flow diagrams depicted in the figures are merely illustrative and do not necessarily include all of the elements and operations/steps, nor do they necessarily have to be performed in the order depicted. For example, some operations/steps may be decomposed, combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
It is to be understood that the terminology used in the description of the present application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification of the present application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
The embodiment of the application provides an information security verification method, device, equipment and storage medium based on OTA upgrading. The information security verification method based on the OTA upgrading can be applied to a server, the standard MAC address of the equipment to be upgraded is compared with the MAC address to be verified generated after the serial number is decrypted, the equipment to be upgraded is determined to be successfully verified under the condition that the standard MAC address of the equipment to be upgraded is matched with the MAC address to be verified, the OTA upgrading is carried out, the reliability of verifying the equipment to be upgraded in the OTA upgrading process is improved, and the problem that the reliability of verifying the equipment to be upgraded in the OTA upgrading process is low is solved. The server may be an independent server or a server cluster.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments described below and the features of the embodiments can be combined with each other without conflict.
Referring to fig. 1, fig. 1 is a schematic flow chart of an information security verification method based on OTA upgrade according to a first embodiment of the present application. The information security verification method based on OTA upgrading can be applied to a server and is used for comparing a standard MAC address of equipment to be upgraded with an MAC address to be verified generated after the serial number is decrypted, and under the condition that the standard MAC address of the equipment to be upgraded is matched with the MAC address to be verified, the equipment to be upgraded is determined to be successfully verified, OTA upgrading is carried out, and the reliability of verifying the equipment to be upgraded in the OTA upgrading process is improved.
As shown in fig. 1, the information security verification method based on OTA upgrade specifically includes steps S10 to S30.
Step S10, reading a standard local area network MAC address of a system controller of equipment to be upgraded, and generating a serial number SN of the equipment to be upgraded based on a time random value and the standard MAC address;
s20, generating an MAC address to be verified through a space download technology OTA controller and the SN, and matching the MAC address to be verified with the standard MAC address;
and S30, determining that the equipment to be upgraded is successfully verified under the condition that the MAC address to be verified is matched with the standard MAC address.
In a specific embodiment, the MAC (Med i um/Med i a Access control l) address is represented by a hexadecimal number, and has six bytes (48 bits). The first three bytes are codes assigned to different manufacturers by the registration authority RA of the ieee e, and the last three bytes are assigned to the adapter interface of production by each manufacturer. The MAC code of the network card is fixedly distributed by a registration management mechanism of the I EEE, so that each host has a MAC address and has global uniqueness.
And reading the MAC address of the system controller through the system controller, encrypting the programmed public key by the system controller, generating a unique SN by using the read MAC address and the time random value, and storing the unique SN in the system controller. A regular matching rule may be selected in the method selection for matching MAC addresses.
The embodiment discloses an information security verification method, an information security verification device and a storage medium based on OTA upgrading, wherein the information security verification method based on OTA upgrading comprises the steps of reading a standard local area network MAC address of a system controller of equipment to be upgraded, and generating a serial number SN of the equipment to be upgraded based on a time random value and the standard MAC address; generating an MAC address to be verified through an OTA controller and the SN by using a space download technology, and matching the MAC address to be verified with the standard MAC address; and under the condition that the MAC address to be verified is matched with the standard MAC address, determining that the equipment to be upgraded is successfully verified. In the embodiment, the standard MAC address of the equipment to be upgraded is compared with the MAC address to be verified generated after the serial number is decrypted, and the equipment to be upgraded is determined to be successfully verified under the condition that the standard MAC address of the equipment to be upgraded is matched with the MAC address to be verified, so that the reliability of the equipment to be upgraded in the OTA upgrading process is improved, and the problem of low reliability of the equipment to be upgraded in the OTA upgrading process is solved.
Based on the embodiment shown in fig. 1, in this embodiment, before the step S10, the method includes:
and generating an asymmetric encryption key based on the preset number and the preset protocol of the equipment to be upgraded, wherein the asymmetric encryption key comprises a public key and a private key.
Based on the foregoing embodiments, the present embodiment specifically includes:
storing the private key to a network link corresponding to the equipment to be upgraded;
burning the public key to the system controller, and encrypting the public key through the system controller.
In a specific embodiment, the cloud administrator enters the enterprise number and the contract into the operation platform, and the operation platform generates the asymmetric encryption key according to the preset number and the preset agreement entered by the cloud administrator, wherein the preset number can be the enterprise number, and the preset agreement can be the contract.
The operation platform saves the generated private key to an official network and writes the generated public key into a system controller.
The embodiment discloses an information security verification method, an information security verification device, information security verification equipment and a storage medium based on OTA upgrading. Storing the private key to a network link corresponding to the equipment to be upgraded; burning the public key to the system controller, and encrypting the public key through the system controller. In the embodiment, the standard MAC address of the equipment to be upgraded is compared with the MAC address to be verified generated after the serial number is decrypted, and the equipment to be upgraded is determined to be successfully verified and subjected to OTA upgrading under the condition that the standard MAC address of the equipment to be upgraded is matched with the MAC address to be verified, so that the reliability of the equipment to be upgraded verified in the OTA upgrading process is improved, and the problem of low reliability of the equipment to be upgraded verified in the OTA upgrading process is solved.
Referring to fig. 2, fig. 2 is a schematic flowchart of an information security verification method based on OTA upgrade according to a second embodiment of the present application. The information security verification method based on OTA upgrading can be applied to a server and is used for comparing a standard MAC address of equipment to be upgraded with an MAC address to be verified generated after a serial number is decrypted, and under the condition that the standard MAC address of the equipment to be upgraded is matched with the MAC address to be verified, the equipment to be upgraded is determined to be successfully verified and OTA upgrading is carried out, so that the reliability of verifying the equipment to be upgraded in the OTA upgrading process is improved.
Based on the above embodiment, the present embodiment specifically includes step S01 to step S02.
S01, storing the SN to a network link corresponding to the equipment to be upgraded through the system controller;
and S02, sending the private key to the OTA controller through an HTTP channel, and storing the private key through the OTA controller.
In a specific embodiment, the system controller encrypts the written public key, generates a unique SN by using the read MAC address and the time random value, and stores the unique SN in the system controller, and the system controller reports the generated unique SN to a network link corresponding to the device to be upgraded and stores the SN in the network link corresponding to the device to be upgraded, where the network link corresponding to the device to be upgraded may be an official website corresponding to the device to be upgraded.
The embodiment discloses an information security verification method, an information security verification device and a storage medium based on OTA upgrading, wherein the information security verification method based on OTA upgrading comprises the steps of storing the SN to a network link corresponding to equipment to be upgraded through the system controller; and sending the private key to the OTA controller through an HTTP channel, and storing the private key through the OTA controller. In the embodiment, the standard MAC address of the equipment to be upgraded is compared with the MAC address to be verified generated after the serial number is decrypted, and the equipment to be upgraded is determined to be successfully verified under the condition that the standard MAC address of the equipment to be upgraded is matched with the MAC address to be verified, so that the reliability of the equipment to be upgraded in the OTA upgrading process is improved, and the problem of low reliability of the equipment to be upgraded in the OTA upgrading process is solved.
Based on the embodiment shown in fig. 2, in this embodiment, after the step S02, the method further includes:
and decrypting the SN through the private key to generate the MAC address to be verified.
In the specific embodiment, the system controller reports the read MAC address and the generated unique SN to the OTA server for authentication, the OTA server calls an authentication mechanism, the SN is decrypted through a private key, the MAC address to be verified is obtained, the MAC address to be verified is compared with a standard MAC address, if the addresses are the same, the authentication is passed, the equipment to be upgraded is determined to be successfully verified, and therefore the upgrade callback is agreed to be registered.
Based on the embodiment shown in fig. 1, in this embodiment, after the step S20, the method further includes:
and determining that the equipment to be upgraded fails to be verified under the condition that the MAC address to be verified is not matched with the standard MAC address.
Based on all the above embodiments, in this embodiment, the information security verification method based on OTA upgrade further includes:
under the condition that the verification of the equipment to be upgraded is determined to be failed, a signal of the failure of the verification is sent to the equipment to be verified;
and under the condition that the verification of the equipment to be upgraded is determined to be successful, sending a signal of successful verification to the equipment to be verified so as to enable the equipment to be verified to carry out OTA upgrading.
In the process of verifying the equipment to be upgraded by the operation platform, the operation platform comprises the following specific operation steps:
(1) Generating an asymmetric encryption key according to the enterprise number and the contract input by the cloud administrator;
(2) Saving the private key generated in the step (1) to an official website;
(3) Burning the public key generated in the step (1) into a system controller;
(4) Synchronizing the device SN uploaded by the system controller into the OTA server;
(5) And (3) synchronizing the private key generated in the step (1) to the OTA server through https transmission.
In the process of verifying the equipment to be upgraded, the system controller specifically comprises the following operation steps:
(1) Reading the MAC address of a system controller;
(2) Carrying out encryption operation on the public key programmed by the operation platform;
(3) Generating a unique SN from the MAC address and the time random value read in the step (1) and storing the unique SN in a system controller;
(4) Reporting the network connection corresponding to the equipment to be upgraded, and storing the equipment SN generated in the step (3);
(5) And (4) reporting the MAC address read in the step (1) and the equipment SN generated in the step (3) to the OTA server.
In the process of verifying the device to be upgraded by the OTA server, the specific operation steps are as follows:
and the OTA server calls an authentication mechanism, decrypts the SN by using a private key synchronized with the operation platform, then obtains the decrypted MAC address and compares the decrypted MAC address with the MAC address reported by the system controller, if the decrypted MAC address is the same as the MAC address reported by the system controller, the authentication is passed, the registration upgrading callback is agreed, and if the decrypted MAC address is not the next step, the next step is not carried out.
When the third-party equipment triggers the system controller to carry out OTA upgrading verification equipment, the specific operation steps are as follows:
third party's equipment is through "bumping one and bumping" operation with the help of the operation and maintenance panel distribution network of building good and issue the required relevant parameter of OTA upgrading to the application APP of waiting to upgrade the controller, then the APP can be with the parameter and the log server address of receiving convey the system controller on, system controller alright according to the relevant parameter analysis who receives at last and go out corresponding upgrading address to accomplish the upgrading of controller.
Referring to fig. 3, fig. 3 is a schematic block diagram of an OTA upgrade based information security verification apparatus according to an embodiment of the present application, which is configured to perform the foregoing OTA upgrade based information security verification method. Wherein, the information security verifying device based on OTA upgrade can be configured on the server.
As shown in fig. 3, the OTA upgrade based information security verification apparatus 400 includes:
a serial number generation module 10, configured to read a standard local area network MAC address of a system controller of a device to be upgraded, and generate a serial number SN of the device to be upgraded based on a time random value and the standard MAC address;
the MAC address matching module 20 is used for generating an MAC address to be verified through the OTA controller and the SN, and matching the MAC address to be verified with the standard MAC address;
and the verification success judging module 30 is configured to determine that the device to be upgraded is verified successfully when the MAC address to be verified matches the standard MAC address.
Further, the information security verifying apparatus based on OTA upgrade further includes a key module, specifically including:
and the encryption key generation unit is used for generating an asymmetric encryption key based on the preset number and the preset protocol of the equipment to be upgraded, wherein the asymmetric encryption key comprises a public key and a private key.
Further, the key module further comprises:
the private key storage unit is used for storing the private key to a network link corresponding to the equipment to be upgraded;
and the public key burning unit is used for burning the public key to the system controller and encrypting the public key through the system controller.
Further, the information security verifying attachment based on OTA upgrade still includes the SN module, specifically includes:
the SN storing unit is used for storing the SN to a network link corresponding to the equipment to be upgraded through the system controller;
and the private key sending unit is used for sending the private key to the OTA controller through an HTTP channel and storing the private key through the OTA controller.
Further, the SN module further includes:
and the MAC address generation unit to be verified is used for decrypting the SN through the private key to generate the MAC address to be verified.
Further, the OTA upgrade based information security verification apparatus further includes a verification failure module, specifically including:
and the verification failure unit is used for determining that the equipment to be upgraded fails to verify under the condition that the MAC address to be verified is not matched with the standard MAC address.
Further, the information security verifying attachment based on OTA upgrade still includes signal prompt module, specifically includes:
the verification failure signal unit is used for sending a verification failure signal to the equipment to be verified under the condition that the equipment to be upgraded is determined to be failed in verification;
and the verification success signal unit is used for sending a signal of successful verification to the equipment to be verified under the condition that the equipment to be upgraded is determined to be successfully verified so as to enable the equipment to be verified to perform OTA upgrading.
It should be noted that, as will be clear to those skilled in the art, for convenience and brevity of description, the specific working processes of the apparatus and the modules described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The apparatus described above may be implemented in the form of a computer program which may be run on a device as shown in figure 4.
Referring to fig. 4, fig. 4 is a schematic block diagram of a structure of an apparatus according to an embodiment of the present application. The device may be a server.
Referring to fig. 4, the apparatus includes a processor, a memory, and a network interface connected by a system bus, wherein the memory may include a nonvolatile storage medium and an internal memory.
The non-volatile storage medium may store an operating system and a computer program. The computer program includes program instructions that, when executed, cause a processor to perform any of a variety of OTA upgrade based information security verification methods.
The processor is used for providing calculation and control capability and supporting the operation of the whole equipment.
The internal memory provides an environment for running a computer program in the non-volatile storage medium, and the computer program can cause the processor to execute any information security verification method based on OTA upgrading when being executed by the processor.
The network interface is used for network communication, such as sending assigned tasks. Those skilled in the art will appreciate that the configuration shown in fig. 4 is a block diagram of only a portion of the configuration associated with the present application and does not constitute a limitation on the devices to which the present application applies, and that a particular device may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
It should be understood that the processor may be a Central Processing Unit (CPU), which may also be other general purpose processors, a digital signal processor (Di gita Si gna l processor, DSP), an application specific integrated circuit (App I cat I on specific f I integrated Ci it, AS ic), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. Wherein a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Wherein, in one embodiment, the processor is configured to execute a computer program stored in the memory to implement the steps of:
reading a standard local area network MAC address of a system controller of equipment to be upgraded, and generating a serial number SN of the equipment to be upgraded based on a time random value and the standard MAC address;
generating an MAC address to be verified through a space download technology OTA controller and the SN, and matching the MAC address to be verified with the standard MAC address;
and under the condition that the MAC address to be verified is matched with the standard MAC address, determining that the equipment to be upgraded is verified successfully.
In one embodiment, reading a standard local area network MAC address of a system controller of a device to be upgraded, and before generating a serial number SN of the device to be upgraded based on a time random value and the standard MAC address, implementing:
and generating an asymmetric encryption key based on the preset number and the preset protocol of the equipment to be upgraded, wherein the asymmetric encryption key comprises a public key and a private key.
In one embodiment, based on an operation platform, an asymmetric encryption key of the device to be upgraded is generated, where the asymmetric encryption key includes a public key and a private key, and is used to implement:
storing the private key to a network link corresponding to the equipment to be upgraded;
burning the public key to the system controller, and encrypting the public key through the system controller.
In one embodiment, generating a MAC address to be verified by using an OTA controller and the SN according to a space download technology, and before matching the MAC address to be verified with the standard MAC address, implementing:
the SN is stored to a network link corresponding to the equipment to be upgraded through the system controller;
and sending the private key to the OTA controller through an HTTP channel, and storing the private key through the OTA controller.
In one embodiment, after sending the private key to the OTA controller through an HTTP channel and saving the private key by the OTA controller, the method is implemented to:
and decrypting the SN through the private key to generate the MAC address to be verified.
In one embodiment, after the OTA controller and the SN generate a MAC address to be verified and match the MAC address to be verified with the standard MAC address, the OTA controller and the SN are further configured to:
and determining that the equipment to be upgraded fails to be verified under the condition that the MAC address to be verified is not matched with the standard MAC address.
In one embodiment, the information security verification method based on OTA upgrade is further used for realizing:
under the condition that the verification of the equipment to be upgraded is determined to be failed, a signal of the failure of the verification is sent to the equipment to be verified;
and under the condition that the verification of the equipment to be upgraded is determined to be successful, sending a signal of successful verification to the equipment to be verified so as to enable the equipment to be verified to carry out OTA upgrading.
The embodiment of the application further provides a computer-readable storage medium, wherein a computer program is stored in the computer-readable storage medium, the computer program comprises program instructions, and the processor executes the program instructions to implement any OTA upgrade-based information security verification method provided by the embodiment of the application.
The computer-readable storage medium may be an internal storage unit of the device according to the foregoing embodiment, for example, a hard disk or a memory of the device. The computer readable storage medium may also be an external storage device of the device, such as a plug-in hard disk, a Smart Memory Card (SMC), a Secure digital (Secure Di gita l, SD) Card, a flash memory Card (F l ash Card), and the like, provided on the device.
While the invention has been described with reference to specific embodiments, the scope of the invention is not limited thereto, and those skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the invention. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. An information security verification method based on OTA upgrading is characterized by comprising the following steps:
reading a standard local area network MAC address of a system controller of equipment to be upgraded, and generating a serial number SN of the equipment to be upgraded based on a time random value and the standard MAC address;
generating an MAC address to be verified through a space download technology OTA controller and the SN, and matching the MAC address to be verified with the standard MAC address;
and under the condition that the MAC address to be verified is matched with the standard MAC address, determining that the equipment to be upgraded is verified successfully.
2. The OTA upgrade based information security verification method of claim 1, wherein before reading a standard local area network (MAC) address of a system controller of a device to be upgraded and generating a Serial Number (SN) of the device to be upgraded based on a time nonce and the standard MAC address, the method comprises:
and generating an asymmetric encryption key based on the preset number and the preset protocol of the equipment to be upgraded, wherein the asymmetric encryption key comprises a public key and a private key.
3. The OTA upgrade based information security verification method of claim 2, wherein the generating of the asymmetric encryption key of the device to be upgraded based on the operating platform, wherein the asymmetric encryption key comprises a public key and a private key, comprises:
storing the private key to a network link corresponding to the equipment to be upgraded;
burning the public key to the system controller, and encrypting the public key through the system controller.
4. The OTA upgrade based information security verification method of claim 2, wherein before the OTA controller and the SN generate a MAC address to be verified by a space download technology and match the MAC address to be verified with the standard MAC address, the method comprises:
the SN is stored to a network link corresponding to the equipment to be upgraded through the system controller;
and sending the private key to the OTA controller through an HTTP channel, and storing the private key through the OTA controller.
5. The OTA upgrade based information security verification method according to any of claims 4, wherein after sending the private key to the OTA controller via the HTTP channel and saving the private key via the OTA controller, the method comprises:
and decrypting the SN through the private key to generate the MAC address to be verified.
6. The OTA upgrade based information security verification method of claim 1, wherein after the OTA controller and the SN generate a MAC address to be verified through a spatial download technology and match the MAC address to be verified with the standard MAC address, further comprising:
and determining that the equipment to be upgraded fails to be verified under the condition that the MAC address to be verified is not matched with the standard MAC address.
7. The OTA upgrade based information security verification method according to any of claims 1 to 6, further comprising:
under the condition that the verification of the equipment to be upgraded is determined to be failed, a signal of the failure of the verification is sent to the equipment to be verified;
and under the condition that the verification of the equipment to be upgraded is determined to be successful, sending a signal of successful verification to the equipment to be verified so as to enable the equipment to be verified to carry out OTA upgrading.
8. The utility model provides an information security verifying attachment based on OTA upgrades which characterized in that includes:
the serial number generation module is used for reading a standard local area network MAC address of a system controller of the equipment to be upgraded and generating a serial number SN of the equipment to be upgraded based on a time random value and the standard MAC address;
the MAC address matching module is used for generating an MAC address to be verified through the OTA controller and the SN and matching the MAC address to be verified with the standard MAC address;
and the verification success judging module is used for determining that the equipment to be upgraded is verified successfully under the condition that the MAC address to be verified is matched with the standard MAC address.
9. An apparatus, characterized in that the apparatus comprises a memory and a processor;
the memory is used for storing a computer program;
the processor, configured to execute the computer program and to implement the OTA upgrade based information security verification method according to any of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, wherein a computer program is stored, which, when executed by a processor, causes the processor to implement the OTA upgrade based information security verification method as claimed in any one of claims 1 to 7.
CN202211435184.5A 2022-11-16 2022-11-16 Information security verification method, device and equipment based on OTA (over-the-air technology) upgrading and storage medium Pending CN115913714A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211435184.5A CN115913714A (en) 2022-11-16 2022-11-16 Information security verification method, device and equipment based on OTA (over-the-air technology) upgrading and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211435184.5A CN115913714A (en) 2022-11-16 2022-11-16 Information security verification method, device and equipment based on OTA (over-the-air technology) upgrading and storage medium

Publications (1)

Publication Number Publication Date
CN115913714A true CN115913714A (en) 2023-04-04

Family

ID=86487294

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211435184.5A Pending CN115913714A (en) 2022-11-16 2022-11-16 Information security verification method, device and equipment based on OTA (over-the-air technology) upgrading and storage medium

Country Status (1)

Country Link
CN (1) CN115913714A (en)

Similar Documents

Publication Publication Date Title
US9766914B2 (en) System and methods for remote maintenance in an electronic network with multiple clients
US20170250818A1 (en) Method and System for Securely Updating Field Upgradeable Units
CN112527912B (en) Data processing method and device based on block chain network and computer equipment
US20170300696A1 (en) Software verification method and apparatus
CN109829294A (en) A kind of firmware validation method, system, server and electronic equipment
CN115913714A (en) Information security verification method, device and equipment based on OTA (over-the-air technology) upgrading and storage medium
CN112732676A (en) Data migration method, device, equipment and storage medium based on block chain
CN115167887B (en) Upgrading method and device, storage medium and electronic equipment
CN113438598B (en) Terminal positioning method and device, computer equipment and storage medium
CN111212042B (en) Data transmission method, device and system
KR102364737B1 (en) Method of auto-installing of agent using dynamic url
CN107749878B (en) Method and device for synchronizing files
CN111858333A (en) Copyright management system interface test method and device based on real data
CN117880814A (en) Reliability verification method, computer equipment and storage medium
KR20230000852A (en) Apparatus for updating software of vehicle and control method thereof
CN113987510A (en) Updating method and device of software development kit, electronic equipment and storage medium
CN116501340A (en) Method and system for constructing release system of embedded system
CN116915603A (en) OTA upgrading method and device and electronic equipment
US9912771B2 (en) Real time key collection in device provisioning
CN113900684A (en) Terminal equipment upgrading method and device, computer equipment and storage medium
CN116107612A (en) Firmware air upgrading device, charging pile, device, method and program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination