CN101419557A - Program downloading control method - Google Patents

Program downloading control method Download PDF

Info

Publication number
CN101419557A
CN101419557A CNA2008101173125A CN200810117312A CN101419557A CN 101419557 A CN101419557 A CN 101419557A CN A2008101173125 A CNA2008101173125 A CN A2008101173125A CN 200810117312 A CN200810117312 A CN 200810117312A CN 101419557 A CN101419557 A CN 101419557A
Authority
CN
China
Prior art keywords
download
program
file
fileinfo
upgrading
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2008101173125A
Other languages
Chinese (zh)
Inventor
陈江宁
甘景全
崔志民
张平
段帷
李万杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CNA2008101173125A priority Critical patent/CN101419557A/en
Publication of CN101419557A publication Critical patent/CN101419557A/en
Pending legal-status Critical Current

Links

Images

Abstract

A program download control method comprises a program initial writing and program upgrade download. The program initial writing comprises the following steps: a Boot program file is written in a boot sector of embedded hardware; the embedded hardware is started and the Boot program runs and writes an application program code in an application program memory area after acquiring the application program code. The program upgrade download comprises the following steps: an issue station initializes an certification device and writes certification information in the certification device; an upgrade program is loaded to a download station, and the embedded hardware is connected to the download station; the certification device is connected to the embedded hardware, and the Boot program performs certification; certification is judged; if the certification is successful, the Boot program downloads the upgrade program and writes an upgrade program code to the application program memory area for ending; and if the certification fails, the step is directly finished, therefore, flexible right control on the program download is realized in two aspects which are the software and the hardware.

Description

A kind of program downloading control method
Technical field
The present invention relates to the embedded hardware device, particularly relate to the program downloading control method of embedded hardware, write and control of authority is carried out in renewal with program to embedded hardware.
Background technology
The application code of embedded hardware device generally can be compiled into a binary file after development and Design is finished, this document downloads in the hardware device, is carried out by the processor and the circuit of hardware device, realizes function corresponding.No matter application code is source code or compiled binary file, if outwards reveal, the adversary's that then can constitute competition imitation, or the private data of the hardware device the inside that the client is used causes the hidden danger of leakage; On the other hand, the application code that the embedded hardware device is stored can only be downloaded and upgraded by its oneself manufacturer, and can not be other illegal operating personnel, because the code in the equipment is in case rewritten, the performed function of the equipment normal wish that also will break away from deviser and user so, concerning the user, also might bear the loss of interests aspect.
The program down-loading method of embedded hardware device can be divided into two classes from the view of safety at present:
One class is that application code is not encrypted, and the protection of code security is realized from ladder of management, does not have technological means auxiliary, in case reveal, illegal user of service can carry out code analysis, illegal operations such as counterfeit products easily; Concerning hardware device, download tool and method for down loading are the general utility tools that the CPU framework of hardware device use is determined, the equipment of producing can be used same instrument to download unused code by the third party, and the normal use of equipment itself is not protected.
The 2nd, the function that CPU framework that hardware device is selected and developing instrument itself provide encrypted code; and the chip unit of storage code has the cryptographic check function that code is downloaded; downloading earlier, the input password carries out verification; this mode has solved code and the problem of not encrypting; download can not arbitrarily be downloaded; compared with first kind of method for down loading safety a lot; but all being the suppliers by CPU and developing instrument, this download tool and method provide; the product development personnel can't change it; can only mechanically use; and every product producer of having selected this CPU framework and developing instrument for use; the instrument that uses is all identical; and the third party also can take these instruments there from CPU framework and developing instrument supplier at an easy rate; instrument is all identical; different just passwords, this part is cracked in encryption for password leakage in a single day or developing instrument, and this pipe protection barrier just performs practically no function.
Therefore, no matter be from ladder of management or according to the encrypted code function of the framework of specific hardware, all can't satisfy the demand of user to code confidentiality and the control of code down loading updating.Especially in the embedded hardware application that code is had higher security requirements, as finance, the tax, gate inhibition etc., prior art also can't solve the problem of flexible and safe program downloading control.
Summary of the invention
Therefore, purpose of the present invention promptly is: the above-mentioned shortcoming that solves prior art, provide a kind of can and the renewal that good secret control is provided, make things convenient for the user to need not to depend on the program down-loading method of embedded hardware architecture and production firm according to the user demand flexible design again the code download.
For reaching this purpose, the present invention proposes a kind of program downloading control method, the system of the embedded hardware device by comprising issue station, download website, authenticate device and program to be downloaded realizes, described embedded hardware device comprises a boot section and an application storage district, described method comprises that program initially writes and the program upgrade download, and wherein said program initially writes and may further comprise the steps:
S110: write the Boot program file to the boot section of embedded hardware device;
S120: the embedded hardware device starts, the Boot program run;
The S130:Boot program obtains application code;
The S140:Boot program writes the application storage district with application code.
Described program upgrade is downloaded and be may further comprise the steps:
S210: the authenticate device initialization is carried out in the issue station, writes authentication information in authenticate device;
S220: the issue station is loaded into download website with ROMPaq;
S230: authenticate device is connected to the embedded hardware device, and the Boot program authenticates;
S240: judge whether authentication is passed through;
S250: authentication writes the application storage district by Boot program download and upgrade program then and with the ROMPaq code, finishes; Authentication is not by then directly finishing.
Beneficial effect of the present invention is: use this method; by being set, authenticate device carries out bi-directional verification and control of authority; make the embedded hardware device the research staff can via the boot program neatly the safeguard protection of application programs code design and manage, no longer be confined to the natural mode or the hardware structure itself of developing instrument.Avoided leakage in research and development, the distribution of code, each link of upgrading on the one hand, hardware device itself has also had flexible, changeable authority restriction to the renewal of code on the other hand, rather than uses single password restriction or the situation that does not limit.And method of the present invention is not subjected to the restriction of hardware platform, can be conveniently used in various embedded hardware devices.
Description of drawings
Fig. 1 is the construction module synoptic diagram of embedded hardware device program downloading system embodiment of the present invention;
Fig. 2 is that the program of program downloading control method of the present invention initially writes schematic flow sheet;
Fig. 3 is the program upgrade schematic flow sheet of program downloading control method of the present invention;
Fig. 4 is the program upgrade schematic flow sheet of program downloading control method one embodiment of the present invention.
Description of reference numerals:
The 1-issue station; 101-issue station storer; 102-issue station CPU; The 103-IC card reader; The 2-download website; 201-download website storer; The CPU of 202-download website; 203-download website communication interface; 3-embedded hardware device; 301-embedded hardware storer; The 3011-boot section; 3012-application storage district; The 302-flush bonding processor; The 303-IC card; The 305-communication interface; The 4-IC card.
Embodiment
The construction module synoptic diagram of embedded hardware program downloading system embodiment of the present invention as shown in Figure 1.Can be clear that from figure the embedded hardware program downloading system comprises issue station 1, download website 2 and embedded hardware device 3, and as the IC-card 4 of authenticate device.Wherein, the issue station 1 IC-card read write line 103 that includes issue station storer 101, issue station CPU102 at least and be used for communicating with IC-card 4; The download website communication interface 203 that download website 2 includes download website storer 201, the CPU202 of download website at least and is used for communicating with embedded hardware device 3.And can carry out data communication between issue station 1 and the download website 2.Preferably, issue station 1 also comprises and is used for the issue station communication interface 104 that communicates with embedded hardware device 3.Wherein, the communication interface that connects between described download website or issue station and the embedded hardware device can be the interface that has communication function in the prior art arbitrarily.Embedded hardware device 3 comprises embedded hardware storer 301, flush bonding processor 302 and IC-card interface 303, communication interface 305 at least.Here, the IC-card 4 as authenticate device can also be any hardware units with memory function such as USB storage, Flash storer.But with IC-card, the intellective IC card that particularly has card CPU and Chip Operating System is a preferred implementation.
According to one embodiment of present invention, issue station 1 and download website 2 can use PC (PC) to realize.Wherein, issue station 1 is provided by the manufacturer of embedded hardware device 3, before device is sold to the user it is carried out initialization and first dress of application program or user's PC, is carried out the initialization of embedded hardware device voluntarily by the user; Download website is user's a PC, and it communicates and obtain ROMPaq by internet or other approach and issue station, afterwards ROMPaq is loaded into the embedded hardware device.Issue station 1 and download website 2 can also be arranged on same the PC main frame, realize separately function by two kinds of different functional software (below be referred to as distributed software and downloaded software) and respective peripheral device, it is divided into two parts is a kind of division in logic from function, way of realization not thereby limiting the invention.
Usually, embedded hardware storer 301 comprises two parts: boot section 3011 and application storage district 3012.Boot in the boot section (guiding) program is called when the embedded hardware device starts, and guides to finish hardware initialization, and resides among the hardware internal memory, carries out corresponding function.By to boot section write realize just by code segment with predetermined function for control method of the present invention.
The program of program downloading control method of the present invention initially writes schematic flow sheet as shown in Figure 2.The embedded hardware product is not when downloading any program, and embedded hardware storer 301 is empty, at first the code storage zoning is divided into boot section 3011 and application storage district 3012.
Program initially writes and may further comprise the steps:
S100: beginning
S110: the communication interface of embedded hardware device is connected with the communication interface of issue station or download website, writes the Boot program file to the boot section of embedded hardware device;
S120: the embedded hardware device starts, the Boot program run;
The S130:Boot program obtains application code, and the communication interface by the embedded hardware device sends compiled in advance application code file to the Boot program; Wherein, initial application code can be sent to the embedded hardware device by issue station or download website;
The S140:BOOT program writes the application storage district with application code;
S150: finish, this moment, the BOOT district and the application code district of embedded hardware device all write complete code, finished download.
When there has been code the code area of embedded hardware device, carry out upgrading when needing upgrade code and download, as shown in Figure 3, upgrading is downloaded and be may further comprise the steps:
S200: beginning
S210: the authenticate device initialization is carried out in the issue station, writes authentication information in authenticate device;
S220: the issue station is loaded into download website with ROMPaq;
S230: authenticate device is connected to the embedded hardware device, and the Boot program authenticates;
S240: judge whether authentication is passed through;
S250: authentication writes the application storage district by Boot program download and upgrade program then and with the ROMPaq code, finishes upgrading and downloads; Authentication is not downloaded by then directly finishing upgrading this time.
According to method flow shown in Figure 3, the present invention upgrades the specific embodiment downloaded as shown in Figure 4.Upgrading is downloaded and be may further comprise the steps:
S300: beginning at this moment, copies compiled ROMPaq code file to issue station.
S310: the issue station connects authenticate device and reads its ID, be that IC-card is an example with the authenticate device in the present embodiment, in the IC-card read write line 103 of issue station, insert and authorize IC-card 4, distributed software reads the identity information (ID) of authorizing IC-card 4 by IC-card read write line 103, for example, this identity information comprises the numbering of IC-card, but is not limited thereto, and described ID can also be any information that can show its special characteristic for IC-card.
S315: the issue station generates upgrading file in download and its fileinfo that comprises authenticate device ID, described upgrading file in download is with this authenticate device ID by distributed software, as authorize the ID of IC-card 4 and ROMPaq code file to merge, and the packing generation, promptly this upgrading file in download comprises authenticate device ID and program code two parts at least.The fileinfo of upgrading file in download can comprise the filename, version number, ROMPaq code file size, issuing date etc. of ROMPaq code file, and authenticate device ID; But be not limited thereto, for example, described fileinfo can also comprise at the upgrading file in download of this IC-card can use times N, with the upgrading download time of control use authority IC-card 4.Wherein, preferably embodiment is that upgrading file in download and its fileinfo are all encrypted.
S320: will the upgrade fileinfo of file in download of issue station writes authenticate device, and the fileinfo of upgrading file in download writes by IC-card read write line 103 and authorizes IC-card 4.
S325: the issue station file in download of will upgrading copies to download website.It should be noted that this step after step S300 begins, can carry out at any time, before the download website data transmission relevant with the upgrading download, finish getting final product with embedded hardware device connection beginning to be upgraded.And can obtain the fileinfo and the program code of upgrading file in download according to the upgrading file in download by download website 2.
S330: authenticate device is connected to embedded hardware device to be upgraded, the embedded hardware device is connected to download website, be about to authorize IC-card 4 to insert the IC-card interface 303 of embedded hardware device 3 to be upgraded, and the communication interface 305 of this embedded hardware device 3 and the communication interface 203 of download website 2 are connected.
The S335:Boot program from download website obtain the upgrading file in download fileinfo, be the BOOT program that sends hardware device by the fileinfo that the communication interface 203,305 of download website 2 and embedded hardware device 3 will be upgraded file in download to.
The S340:Boot program is extracted authenticate device ID from the fileinfo of upgrading file in download, as encrypting in step S315, then the Boot program will be decrypted the fileinfo of upgrading file in download in this step.
S345:Boot program and authenticate device carry out the ID authentication, this ID authentication can be the unilateral authentication of being finished by the Boot program, whether promptly consistent with the ID of the authenticate device that is connected to hardware by the ID that extracts among the Boot program determining step S340, unanimity then return authentication is passed through information; Also by Boot program and authenticate device, as IC-card 4, the two-way authentication of finishing jointly, promptly when the Boot program is judged, whether the ID that IC-card 4 also extracts among ID and the step S340 to himself is consistent judges, has only all to judge consistent just return authentication when Boot program and IC-card and pass through information.
S350: judge whether the ID authentication is passed through, not by then finishing this time to upgrade downloading process; By then continuing next step;
S355: embedded hardware device Boot program reads the fileinfo of upgrading file in download from authenticate device, the authentication of the style of writing of going forward side by side part, be about to compare from the fileinfo with from download website of authenticate device, the two unanimity then authenticates to be passed through, continue next step, inconsistently then stop to carry out down operation, finish this time to upgrade downloading process.
S360: download website transmits the upgrading file in download to the Boot program, this step is given download website 2 by the response data that the Boot program backspace file authentification of message of embedded hardware device 3 passes through, and download website 2 transmits the program's code file of upgrading file in download to embedded hardware device 3 afterwards.
To the upgrade program's code file of file in download of S365:Boot program writes the application storage district, and renewal is finished in the ROMPaq code area.Equally, as encrypting in step S315, then the Boot program will be decrypted the fileinfo of upgrading file in download in this step.
S370: finish.
Wherein, if among the step S315, in the fileinfo of upgrading file in download, added and to have used times N at the upgrading file in download of this IC-card 4, then at step S365, after upgrading was downloaded and completed successfully, the also corresponding available number of times renewal process of a upgrading download that comprises was about to remain available times N and subtracts 1.
Wherein, relate to about each and to encrypt or the step of deciphering, step S315 for example, S340, S365 etc., those skilled in the art are when selecting the mode and the method for encryption and decryption flexibly according to content of the present invention.For example, a kind of preferred embodiment is to use identical cryptographic algorithm to encrypt to upgrading file in download and its fileinfo in described step S315, with conserve system resources; And carry out control of authority by key.For example, the upgrading file in download is encrypted at every turn and use different cipher key index, the root key that will encrypt used algorithm is solidificated among the described Boot program, described cipher key index is joined in the fileinfo of upgrading file in download.The Boot program can be directly be decrypted the fileinfo of upgrading file in download, but after must obtaining " cipher key index " from described fileinfo, could be decrypted the file in download of upgrading.
Certainly, also can use different cryptographic algorithm that upgrading file in download and its fileinfo are encrypted respectively respectively.For example, in step S315, when encrypting generation upgrading file in download, use cryptographic algorithm one, preferably, the upgrading file in download is encrypted the different index key of use at every turn, and its index key is write its fileinfo; And use cryptographic algorithm two to encrypt to this document information; And using the decipherment algorithm corresponding to be decrypted with cryptographic algorithm two at step S340, this decipherment algorithm is solidificated in the Boot program, and the index key of acquisition cryptographic algorithm one; And after authentication is passed through, the root key of index key that the Boot program obtains according to the fileinfo from the upgrading file in download and the cryptographic algorithm one of wherein solidifying, file in download is decrypted to upgrading.And employed enciphering and deciphering algorithm can be any general enciphering and deciphering algorithm in the prior art in the cryptographic algorithm one, cryptographic algorithm two.
And, from above-mentioned steps as can be seen, based on the contingent issue of securities software that install the issue station of PC, its function that has comprise import compiled ROMPaq code file, to the authenticate device input information, call cryptographic algorithm and the ROMPaq code file encrypted, read the identity information (as card number ID) of authorizing IC-card etc.; And the corresponding downloaded software of installing in the download website based on PC, its function that has comprise import that the upgrading file in download is communicated by letter with the embedded hardware device, code file and mandate IC-card information separated in the file in download of will upgrade pass to the Boot program respectively down, in the process that passes down, need to obtain the response of Boot program, judge whether to continue down-transmitting data according to the state that responds.And described Boot program except that the general guiding function of existing embedded hardware device, is also forgiven subfunction and/or the program code segments that can carry out various functions related in the program download step of the present invention at least.Concerning persons skilled in the art; under the prerequisite of understanding described program function and flow process; concrete code is realized need not performing creative labour; therefore; which kind of which kind of no matter realize with program language or code form; as long as its employed method does not exceed thought of the present invention and scope, all will fall within the claim protection domain of the present invention.
The above description of this invention is illustrative, and nonrestrictive, and those skilled in the art is understood, and can carry out many modifications, variation or equivalence to it within spirit that claim limits and scope, but they will fall within the scope of protection of the present invention all.

Claims (10)

1, a kind of program downloading control method, the system of the embedded hardware device by comprising issue station, download website, authenticate device and program to be downloaded realizes, described embedded hardware device comprises a boot section and an application storage district, it is characterized in that, described method comprises that program initially writes and the program upgrade download, and wherein said program initially writes and may further comprise the steps:
S110: write the Boot program file to the boot section of embedded hardware device;
S120: the embedded hardware device starts, the Boot program run;
The S130:Boot program obtains application code;
The S140:Boot program writes the application storage district with application code.
2, program downloading control method according to claim 1 is characterized in that, described program upgrade is downloaded and be may further comprise the steps:
S210: the authenticate device initialization is carried out in the issue station, writes authentication information in authenticate device;
S220: the issue station is loaded into download website with ROMPaq; The embedded hardware device is connected to download website;
S230: authenticate device is connected to the embedded hardware device, and the Boot program authenticates;
S240: judge whether authentication is passed through;
S250: authentication writes the application storage district by Boot program download and upgrade program then and with the ROMPaq code, finishes; Authentication is not by then directly finishing.
3, program downloading control method according to claim 1 and 2 is characterized in that, described program upgrade is downloaded and be may further comprise the steps:
S310: the issue station connects authenticate device and reads its ID;
S315: the issue station generates upgrading file in download and its fileinfo that comprises authenticate device ID;
S320: will the upgrade fileinfo of file in download of issue station writes authenticate device;
S325: the issue station file in download of will upgrading copies to download website;
S330: authenticate device is connected to embedded hardware device to be upgraded, the embedded hardware device is connected to download website;
The S335:Boot program is obtained the fileinfo of upgrading file in download from download website;
The S340:Boot program is extracted authenticate device ID from the fileinfo of upgrading file in download;
S345:Boot program and authenticate device carry out the ID authentication;
S350: judge whether the ID authentication is passed through, not by then finishing this time to upgrade downloading process; By then continuing next step;
S355: embedded hardware device Boot program reads the fileinfo of upgrading file in download from authenticate device, the authentication of the style of writing of going forward side by side part, and authentication is by then continuing next step, and authentication is not by then finishing this time to upgrade downloading process.
S360: download website transmits the upgrading file in download to the Boot program;
To the upgrade program's code file of file in download of S365:Boot program writes the application storage district.
4, program downloading control method according to claim 3, it is characterized in that, the issue station generates in the upgrading file in download and its fileinfo that comprises authenticate device ID among the described step S315, also comprise upgrading file in download and its fileinfo of described generation are encrypted, and in step 340 and step 365, respectively the fileinfo of upgrading file in download and the file in download of upgrading are decrypted.
5, program downloading control method according to claim 4 is characterized in that, uses different cryptographic algorithm to encrypt the upgrading file in download respectively with its fileinfo among the described step S315.
6, program downloading control method according to claim 4, it is characterized in that, among the described step S315 upgrading file in download and the identical cryptographic algorithm of its fileinfo use are encrypted, and the root key that will encrypt used algorithm is solidificated among the described Boot program.
7, program downloading control method according to claim 6, it is characterized in that, the upgrading file in download is encrypted among the described step S315 at every turn and use different cipher key index, and described cipher key index is joined among the fileinfo of this upgrading file in download.
8, program downloading control method according to claim 3, it is characterized in that, ID authentication among the described step S345 is directly to be compared from its ID that authenticate device obtains by authenticate device ID and embedded hardware device that the Boot program will be extracted from the fileinfo of upgrading file in download, and the two unanimity then authenticates to be passed through.
9, program downloading control method according to claim 3, it is characterized in that, ID authentication among the described step S345 is to carry out two-way authentication by Boot program and authenticate device, the two all compares the authenticate device ID that extracts and the actual ID of authenticate device from the fileinfo of upgrading file in download, and the comparative result of Boot program and authenticate device is consistent then authentication of above-mentioned two kinds of ID to be passed through.
10, program downloading control method according to claim 3 is characterized in that, among the described step S315, comprises the available times N of the file in download of upgrading in the fileinfo of upgrading file in download; After upgrading was downloaded and completed successfully in step S365, the also corresponding available number of times step of updating of a upgrading download that comprises should available times N subtract 1.
CNA2008101173125A 2008-07-29 2008-07-29 Program downloading control method Pending CN101419557A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2008101173125A CN101419557A (en) 2008-07-29 2008-07-29 Program downloading control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2008101173125A CN101419557A (en) 2008-07-29 2008-07-29 Program downloading control method

Publications (1)

Publication Number Publication Date
CN101419557A true CN101419557A (en) 2009-04-29

Family

ID=40630352

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2008101173125A Pending CN101419557A (en) 2008-07-29 2008-07-29 Program downloading control method

Country Status (1)

Country Link
CN (1) CN101419557A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102750172A (en) * 2012-06-27 2012-10-24 苏州奇可思信息科技有限公司 Software update method
CN102831357A (en) * 2012-08-24 2012-12-19 深圳市民德电子科技有限公司 Encryption and authentication protection method and system of secondary development embedded type application program
CN103455358A (en) * 2013-09-18 2013-12-18 杭州海兴电力科技股份有限公司 Upgrading method of electric energy meter program
CN104361290A (en) * 2014-11-28 2015-02-18 山东鲁能智能技术有限公司 Program encryption downloader and working method thereof
CN104486355A (en) * 2014-12-30 2015-04-01 大连楼兰科技股份有限公司 Method and device for preventing malicious manipulation of codes
CN104915235A (en) * 2015-06-15 2015-09-16 深圳市九洲电器有限公司 Terminal device application program upgrading method and terminal device application program upgrading system
CN105938433A (en) * 2015-03-03 2016-09-14 罗伯特·博世有限公司 Method for programming a control unit of a motor vehicle
CN106445578A (en) * 2016-07-19 2017-02-22 北京华海隆科技有限公司 Remote hardware upgrading method and apparatus, and wireless temperature and humidity monitor
CN107784226A (en) * 2016-08-25 2018-03-09 大连楼兰科技股份有限公司 The method and system that code is maliciously tampered are prevented using rivest, shamir, adelman
CN110764813A (en) * 2019-10-31 2020-02-07 京东方科技集团股份有限公司 Upgrading method of system software and running method thereof
CN110825414A (en) * 2019-11-06 2020-02-21 许继集团有限公司 Program upgrading device, embedded device and program upgrading method thereof
CN111124461A (en) * 2019-12-12 2020-05-08 青岛海尔科技有限公司 Method and device for OTA (over the air) upgrade of single chip microcomputer and single chip microcomputer
CN111143854A (en) * 2019-12-25 2020-05-12 眸芯科技(上海)有限公司 Device, system and method for starting chip secure download
CN106445578B (en) * 2016-07-19 2024-05-03 北京华海隆科技有限公司 Remote hardware upgrading method and device and wireless temperature and humidity monitor

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102750172A (en) * 2012-06-27 2012-10-24 苏州奇可思信息科技有限公司 Software update method
CN102831357A (en) * 2012-08-24 2012-12-19 深圳市民德电子科技有限公司 Encryption and authentication protection method and system of secondary development embedded type application program
CN102831357B (en) * 2012-08-24 2015-01-07 深圳市民德电子科技有限公司 Encryption and authentication protection method and system of secondary development embedded type application program
CN103455358A (en) * 2013-09-18 2013-12-18 杭州海兴电力科技股份有限公司 Upgrading method of electric energy meter program
CN104361290A (en) * 2014-11-28 2015-02-18 山东鲁能智能技术有限公司 Program encryption downloader and working method thereof
CN104486355A (en) * 2014-12-30 2015-04-01 大连楼兰科技股份有限公司 Method and device for preventing malicious manipulation of codes
CN105938433B (en) * 2015-03-03 2021-07-23 罗伯特·博世有限公司 Method for programming a control device of a motor vehicle
CN105938433A (en) * 2015-03-03 2016-09-14 罗伯特·博世有限公司 Method for programming a control unit of a motor vehicle
CN104915235A (en) * 2015-06-15 2015-09-16 深圳市九洲电器有限公司 Terminal device application program upgrading method and terminal device application program upgrading system
CN106445578A (en) * 2016-07-19 2017-02-22 北京华海隆科技有限公司 Remote hardware upgrading method and apparatus, and wireless temperature and humidity monitor
CN106445578B (en) * 2016-07-19 2024-05-03 北京华海隆科技有限公司 Remote hardware upgrading method and device and wireless temperature and humidity monitor
CN107784226A (en) * 2016-08-25 2018-03-09 大连楼兰科技股份有限公司 The method and system that code is maliciously tampered are prevented using rivest, shamir, adelman
CN110764813A (en) * 2019-10-31 2020-02-07 京东方科技集团股份有限公司 Upgrading method of system software and running method thereof
CN110825414A (en) * 2019-11-06 2020-02-21 许继集团有限公司 Program upgrading device, embedded device and program upgrading method thereof
CN110825414B (en) * 2019-11-06 2024-03-01 许继集团有限公司 Program upgrading device, embedded device and program upgrading method thereof
CN111124461A (en) * 2019-12-12 2020-05-08 青岛海尔科技有限公司 Method and device for OTA (over the air) upgrade of single chip microcomputer and single chip microcomputer
CN111124461B (en) * 2019-12-12 2023-08-18 青岛海尔科技有限公司 Method and device for upgrading OTA (over the air) of singlechip and singlechip
CN111143854A (en) * 2019-12-25 2020-05-12 眸芯科技(上海)有限公司 Device, system and method for starting chip secure download
CN111143854B (en) * 2019-12-25 2021-11-30 眸芯科技(上海)有限公司 Safe starting device, system and method of chip

Similar Documents

Publication Publication Date Title
CN101419557A (en) Program downloading control method
KR101712784B1 (en) System and method for key management for issuer security domain using global platform specifications
CN101501642B (en) Use the method for the portable mass storage of virtual machine activation
CN101300583B (en) Simple scalable and configurable secure boot for trusted mobile phones
CN101241527B (en) System and method for ordinary authentication
JP4562464B2 (en) Information processing device
CN103210396B (en) Comprise the method and apparatus of the framework for the protection of sensitive code and data
CN1581118B (en) Secure device, information processing terminal, integrated circuit, application apparatus and method
US6749115B2 (en) Dual processor trusted computing environment
CN101872404B (en) Method for protecting Java software program
CN104794388B (en) application program access protection method and application program access protection device
CN107003866A (en) The safety establishment of encrypted virtual machine from encrypted template
CN105531710A (en) Method of authorizing an operation to be performed on a targeted computing device
CN109992987B (en) Script file protection method and device based on Nginx and terminal equipment
KR20200116009A (en) Encryption key management based on identity information
CN101578608B (en) Methods and apparatuses for accessing content based on a session ticket
CN106650506A (en) Controlled starting of an electronic circuit
KR20120080283A (en) Otp certification device
CN109598104A (en) Soft ware authorization based on timestamp and secret authentication file protects system and method
CN105577644A (en) Encryption and authentication method and system
JP5118700B2 (en) Portable mass storage with virtual machine activation
CN103154965A (en) Method, secure device, system and computer program product for securely managing user access to a file system
CN106657551A (en) Method and system for preventing mobile terminal from being unlocked
CN104537282A (en) Encryption flash disk and large data computation technology based authorization use method
CN200993803Y (en) Internet banking system safety terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20090429