CN105187410A - Application self-upgrading method and system - Google Patents

Application self-upgrading method and system Download PDF

Info

Publication number
CN105187410A
CN105187410A CN201510506442.8A CN201510506442A CN105187410A CN 105187410 A CN105187410 A CN 105187410A CN 201510506442 A CN201510506442 A CN 201510506442A CN 105187410 A CN105187410 A CN 105187410A
Authority
CN
China
Prior art keywords
application
data
cloud server
agent
backup
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510506442.8A
Other languages
Chinese (zh)
Inventor
李川川
陈恒生
郑君
韩医徽
姜波
方琍
赵晨曦
张海洋
王巨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Snowball Technology Co Ltd
Original Assignee
Shenzhen Snowball Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Snowball Technology Co Ltd filed Critical Shenzhen Snowball Technology Co Ltd
Priority to CN201510506442.8A priority Critical patent/CN105187410A/en
Publication of CN105187410A publication Critical patent/CN105187410A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Stored Programmes (AREA)

Abstract

The invention relates to an application self-upgrading method and system. The method uses a proxy application and a cloud server to realize self-upgrading from an old application to a new application. The method comprises a preset step, a legal authentication step, a backup step and a recovery step. In the preset step, an authentication secret key and an encryption secret key are respectively preset in the application and the cloud server. In the legal authentication step, the legal identity of the application is authenticated through switching by the proxy application. In the backup step, after the legal identity of the application is authenticated, the data of the application is backed up in the proxy application. In the recovery step, the old application is deleted, the new application is downloaded and installed, and the data backed up in the proxy application is recovered in the new application. Through adoption of the application self-upgrading method and system, it is guaranteed that only legal entity can initiate self-upgrading, furthermore, data security and integrity are guaranteed in self-upgrading, and the consistency, uniqueness and atomicity of the data can be guaranteed.

Description

A kind of application from upgrade method and system thereof
Technical field
The present invention relates to data processing field, relate to the method from upgrading and the system thereof that realize JavaCard application based on JavaCard platform particularly.
Background technology
Along with constantly universal, the development of mobile Internet, the demand of user to the storage of personal data, migration and management is more and more stronger, and user can need regularly the application on mobile terminal to be upgraded.
On the other hand, along with mobile payment is advanced by leaps and bounds, occupy very important role in daily life.Such as, mass transit card, bank card, Stored Value member card, reward voucher etc. can be installed to SE chip by the aerial mode downloaded and support in the mobile device of NFC technique.Make mobile device can be used as all kinds of conventional cards to use, improve the facility of Consumer's Experience and life greatly.
In routine use process, there are the following special circumstances: such as, in order to provide new function, repairing existing problem, need to be solved by the upgrading of application, also will ensure the integrality of legacy data, consistency simultaneously.Such as, retain original relevant information when the application of renewal mass transit card, recover again after upgrading to go back.Although these are not normality service conditions, but also there is certain use scenes, the application real-time update in user's hand is particularly made from upgrade function, without the need to the operating process of complexity, only tap button, check and can obtain new service, significantly reduce the operation costs of trade company, also conveniently experience for user brings.
But the data in these application often all relate to the data of user's fund, if only carry out common upgrading certainly, the problem of fail safe may be there is.The problem of these fail safes comprises:
(1) entity authentication problem: need to ensure to only have legal entity could initiate from upgrading;
(2) problem of data safety: need to ensure the fail safe of data in transmitting procedure and integrality;
(3) data synchronization problems: need the consistency of guarantee data, uniqueness and atomicity.
Summary of the invention
In view of the above problems, the present invention aim to provide a kind of can assuring data security, integrality and uniqueness application from upgrade method and system thereof.
Application of the present invention be utilize agent application and Cloud Server to realize, from the old method from upgrading being applied to new opplication, it is characterized in that, comprising the steps: from upgrade method
Initialization step, the preset authenticate key of difference and encryption key in application and Cloud Server;
Legitimate authentication step, is applied and to be cooperated with Cloud Server certification legal identity by the switching of agent application;
Backup-step, when have authenticated legal identity, by the data backup of application in agent application; And
Recovering step, deletes old application, downloads and installs new application, by the date restoring of backup in agent application in new application.
Preferably, described application realizes sharing interface,
Data interaction between described application and described agent application is by described shared Interface realization.
Preferably, described legitimate authentication step comprises:
(1) user initiates to be dealt into Cloud Server from upgrade request by client end interface, and Cloud Server is initiated generating random number request and is forwarded to application by agent application;
(2) application produces random number according to described generating random number request and this random number is sent to Cloud Server by agent application;
(3) Cloud Server adopts described authenticate key be encrypted random number and generate random number ciphertext, and this random number ciphertext is returned to application by agent application;
(4) authenticate key that applications exploiting is preset verifies this random number ciphertext, when by verifying, be judged as that entity authentication is legal.
Preferably, described backup-step comprises:
Data backup step, when have authenticated entity and being legal, encryption key described in the data separate of application is encrypted and by enciphered data by described shared interface backup to agent application;
Application deactivating step, makes the application having carried out data backup lose efficacy after completing described data backup step.
Preferably, in described data backup step, agent application is set to be exported data.
Preferably, in described data backup step, 3DES encryption method is adopted to be encrypted for data.
Preferably, described recovering step comprises:
(1) deletion of old application is completed;
(2) new application is downloaded and installed;
(3) by the date restoring that backed up in agent application in new application;
(4) in new application, application recovery after data decryption, is made to be called;
(5) after being successfully recovered, the data in agent application are deleted.
The system from upgrading realizing application of the present invention, is characterized in that possessing:
One or more application, presets authenticate key and encryption key in the application, and realizes sharing interface;
Cloud Server, presets described authenticate key and described encryption key in described Cloud Server;
Agent application, for carrying out the switching of data between described application and Cloud Server, and for the data of buffer memory from described application,
Wherein, described application is used for the legal identity being carried out certification entity by the switching of described agent application, and when have authenticated the legal identity of entity, described agent application is for backing up the data of described application.
Preferably, described agent application makes described application lose efficacy after the data of the described application of backup, and described agent application is making described application recovery become can be called after in the date restoring of backup to described application.
Preferably, after the data of described application are backuped to described agent application, described agent application is set to be exported data.
Utilize the method from upgrading and the system thereof that realize application of the present invention, owing to carrying out entity authentication by random number, therefore, can ensure to only have legal entity can initiate from upgrading, and all utilize encryption key to be encrypted data in the transmission, backup of data, and calculate HASH value, therefore, it is possible to ensure fail safe and the integrality of carrying out the data backed up.And, when backing up, stopping the called of old application, therefore also can ensure the consistency of data, uniqueness and atomicity.Especially, for relate to finance data application from upgrading, the present invention can ensure the fail safe of finance data, synchronism and integrality effectively.
Accompanying drawing explanation
Fig. 1 represents the structure block diagram for realizing the system from upgrading applied of the present invention.
Fig. 2 is the flow chart representing the key step for realizing the method from upgrading applied of the present invention.
The JAVA program of an example of the legitimate authentication step S102 in the method for realizing upgrading certainly, backup-step S103 is represented respectively in Fig. 3 a, Fig. 3 b.
Embodiment
What introduce below is some in multiple embodiment of the present invention, aims to provide basic understanding of the present invention.Be not intended to confirm key of the present invention or conclusive key element or limit claimed scope.
JAVACARD is a subset of JAVA technology, is specifically designed in the embedded equipment of smart card, can say that JAVACARD is a kind of smart card running JAVA program.Application in JAVACARD is called " application " hereinafter applet().There is fire compartment wall between each application in JAVACARD, can not mutually access, such as, under normal circumstances, application A can not access application B.Therefore, in JAVACARD, the direct access of the data between different application is strictly forbidden, realizes such logic isolation by the fire compartment wall of JAVACARD platform.
On the other hand, at " JavaCard3PlatformRuntimeEnvironmentSpecification, ClassicEdition " 6.2.4 joint describes ShareableInterface(here in Version3.0.4, we are called " sharing interface ") this feature.Particularly mainly: shared interface is a feature of JavaCardAPI, for realizing the mutual of application.Share a set of shared interface method of interface definition.This interface method can call from context, even when realize this interface method to as if belong to another contextual application.In this standard, as the object instance of class realizing this shared interface, be referred to as shared interface object (SIO).For context itself, SIO is the common object that its member variable (field) and method can be accessed.And for another context, SIO is the example of shared interface and the method be only defined in shared interface could be accessed.The every other member variable of SIO and method are by firewall protection.
In the present invention, inventor just mainly make use of above-mentioned shared interface in JAVACARD to make can carry out data interaction between two methods, such as, make to apply the application that A(is equivalent to hereinafter) and apply the agent application that B(is equivalent to hereinafter) between shared interface can be utilized to stride across fire compartment wall carry out data interaction, realize thus application of the present invention from upgrade method and system thereof.
Below, first for of the present invention for realize apply be described from upgrade-system.
Fig. 1 represents of the present invention for realizing the structure block diagram from upgrade-system applied.
As shown in Figure 1, of the present invention for realizing comprising from upgrade-system of application: multiple application 100, agent application 200 and Cloud Server 300.
In the present invention, application 100 can be one, also can be multiple, as the example of application, such as, can be the various application of public transport application, bank card application, reward voucher application etc.Authenticate key and encryption key is previously provided with in application 100.Application 100 can realize above-mentioned shared interface in design, and the realization sharing interface is realized by programming usually.
Cloud Server 300 is with at the preset authenticate key of application 100 and encryption key accordingly, and also preset authenticate key and encryption key, whether Cloud Server 300 is initiated from the entity of upgrading for certification legal.
Between application 100 and Cloud Server 300, being provided with agent application 200, utilizing agent application 200 can carry out the switching of data and the data for backing up self-application 100 between application 100 and Cloud Server 300.Particularly, on the one hand, application 100 by agent application 200 can and Cloud Server 300 between carry out transfer of data, come thus certification initiate from upgrading entity whether legal.On the other hand, carry out from upgrading when, the data in application 100 can stride across fire compartment wall by its shared interface and backup to agent application 200.In the present invention, agent application 200 is equivalent to an intermediate transit part, can carry out data switch between application 100 and Cloud Server 300, and the data (data in application 100) in card can back up by agent application 200.Agent application 200 can correspond to multiple application 100 concerning in card, concerning card outward, agent application 200 is the external uniform outlets of multiple application 100.
Under regard to being described from upgrade method of the application utilizing said system to realize.
Fig. 2 is the flow chart representing the key step for realizing the method from upgrading applied of the present invention.
As shown in Figure 2, the method comprises the steps:
Initialization step S101: the preset authenticate key of difference and encryption key in application 100 and Cloud Server 300;
Legitimate authentication step S102: application 100 is cooperated with Cloud Server 300 by the switching of agent application 200 legal identity of certification entity;
Backup-step S103: apply 100 when have authenticated the legal identity of entity, by the data backup of application 100 in agent application 200; And
Recovering step S104: delete old application, download and install new application, by the date restoring of backup in agent application 200 to (application old here or new being applied in texturally can see application 100 as, therefore at this with not carrying out differentiations label) in new application.
Then, initialization step S101, legitimate authentication step S102, backup-step S103 and recovering step S104 are specifically described respectively.
In above-mentioned initialization step S101, the preset authenticate key of difference and encryption key in application 100 and Cloud Server 300.For application 100, authenticate key and encryption key can be that it just pre-sets when dispatching from the factory, the mobile terminal of this application 100 mounted is not needed to know, because only have application 100 itself can knowledge of secret keys, so the fail safe of data in application 100 can be improved yet.
Above-mentioned legitimate authentication step S102 specifically comprises:
(1) user does not need to be initiated from upgrade request to Cloud Server 300 by agency from client end interface;
(2) Cloud Server 300 initiates generating random number request be forwarded to application 100 by agent application 200 according to this from upgrade request;
(3) application 100 produces random number according to this generating random number request and this random number is sent to Cloud Server 300 by agent application 200;
(4) Cloud Server 300 adopts the authenticate key pre-set wherein be encrypted random number and generate random number ciphertext, and this random number ciphertext is returned to application 100 by agent application 200;
(5) applying 100 utilizes the authenticate key be preset in advance wherein to verify this random number ciphertext, when legal by being judged as the entity of initiating upgrading certainly when checking.
By utilizing above-mentioned legitimate authentication step S102 to carry out certification, can ensure to only have legal entity can initiate, from upgrading, the fail safe of data in application 100 can be ensured thus.
Then, the particular content for above-mentioned backup-step S103 is described.Above-mentioned backup-step S103 comprises the steps:
(1) when have authenticated Cloud Server 300 and being legal, encryption key described in the data separate of application 100 is encrypted and enciphered data is passed through share interface backup to agent application 200;
(2) after completing the data of encryption are backuped to agent application 200, in order to avoid backup, recover after data inconsistent, agent application 200 calls the application inefficacy that disableAppSelect function makes to have backed up, and can guarantee that the application after backing up is not being used like this.
Wherein, in above-mentioned backup-step S103, the encryption of data such as can adopt 3DES, by being encrypted data, can ensure the fail safe of data.On the other hand, in above-mentioned backup-step S103, also HASH value is calculated to the data backed up, here calculating HASH value is to verify the integrality of data, after confirmation data are by full backup, just agent application 200 makes the application backed up lose efficacy.Therefore, by adopting encryption and calculating HASH value, fail safe and the integrality of data can be kept, especially under the data of application relate to the data cases of user's fund, effectively can ensure fail safe and the integrality of user's fund.
And, in above-mentioned backup-step S103, after data have backuped to agent application 200, just making application to be selected by calling disableAppSelect function, having performed the operation different under non-backup instances, such as: the state do not backed up can perform transactional operation, query manipulation etc., and under the state backed up, application just cannot be selected, this makes it possible to the integrality ensureing data, only there is portion in synchronization data.
And, in above-mentioned backup-step S103, while data backup to agent application 200, do not provide the interface of reading in agent application 200.This can realize by arranging a flag when Backup Data, such as, suppose this flag bit to be set to 0 expression can derived data, this flag bit being set to 1 expression cannot derived data, in the present invention, arranging this flag bit is 1.Thus, can not derived data in the process of data backup, the integrality of data can be guaranteed.
And in above-mentioned backup-step S103, in agent application 200, the target application for backup is specified by AID (applicationidentifier).
Then, the particular content for above-mentioned recovering step S104 is described.Above-mentioned recovering step S104 specifically comprises following content:
Described recovering step comprises:
(1) user initiates data recovery request from client end interface to Cloud Server 300;
(2) Cloud Server 300 is initiated generating random number request according to this data recovery request and is forwarded to application 100 by agent application 200;
(3) application 100 produces random number according to this generating random number request and this random number is sent to Cloud Server 300 by agent application 200;
(4) Cloud Server 300 adopts the authenticate key pre-set wherein be encrypted random number and generate random number ciphertext, and this random number ciphertext is returned to application 100 by agent application 200;
(5) applying 100 utilizes the authenticate key be preset in advance wherein to verify this random number ciphertext, when legal by being judged as the entity of initiating data recovery request when checking;
(6) deletion of old application is completed;
(7) new application is downloaded and installed;
(8) by the date restoring that backed up in agent application 200 in new application;
(9) recover after data decryption in new application;
(10) after being successfully recovered, the data in agent application are deleted.
Here, as enforcement an example of the present invention, the JAVA program sample for realizing shared interface section definition in upgrade method, backup-step S103 is represented respectively in Fig. 3 a, Fig. 3 b, wherein, program in accompanying drawing is only usability of program fragments, is not complete, and interface definition neither be complete, be only a part, only exemplarily enumerate here.Therefore, illustrated program is only an execution mode here, for protection scope of the present invention not any restriction.
As the method from upgrading of the present invention and systematic difference example thereof, it can be such as smart machine holder upgrade application on this smart machine, holder by the old application in smart machine data (these application examples as, mass transit card is applied, Bank application, or the application of various member card) utilize of the present invention from upgrade method and system thereof, first back up in agent application, then new opplication is downloaded and installed after old application being deleted, and then by the date restoring of backup in agent application in mounted new opplication, like this after applications automatic upgrade, just can use new service at once, to original information such as account balance, Transaction Informations etc. are without any impact.
In the present invention, owing to carrying out certification from the random number that have employed during upgrading to entity, therefore, it is possible to ensure that legal entity could be initiated from upgrading.And, in the transmission, backup procedure of data, also encrypt/decrypt is carried out to data, also carried out the verification of HASH value, therefore, it is possible to effectively ensure fail safe and the integrality of data simultaneously.Moreover, carrying out namely the data in old application being backuped to agent application wherein during upgrading, old application was lost efficacy, and makes agent application not provide the interface of data reading, the consistency of data, uniqueness and atomicity can be ensured thus.Therefore, as mentioned above, utilize application of the present invention from upgrade method and system thereof, effectively can ensure the fail safe of data, uniqueness and synchronous consistency.
Above example mainly describe application of the present invention from upgrade method and system thereof.Although be only described some of them the specific embodiment of the present invention, those of ordinary skill in the art should understand, and the present invention can implement with other forms many not departing from its purport and scope.Therefore, the example shown and execution mode are regarded as illustrative and not restrictive, when do not depart from as appended each claim define the present invention spirit and scope, the present invention may contain various amendments and replacement.

Claims (10)

1. application from a upgrade method, the method utilizes agent application and Cloud Server to realize, from the old method from upgrading being applied to new opplication, it is characterized in that, comprising the steps:
Initialization step, the preset authenticate key of difference and encryption key in application and Cloud Server;
Legitimate authentication step, applies the legal identity of the certification Cloud Server that to be cooperated with Cloud Server by the switching of agent application;
Backup-step, when have authenticated the legal identity of entity, by the data backup of application in agent application; And
Recovering step, deletes old application, downloads and installs new application, by the date restoring of backup in agent application in new application.
2. application as claimed in claim 1 from upgrade method, it is characterized in that,
Described application realizes sharing interface,
Data interaction between described application and described agent application is by described shared Interface realization.
3. application as claimed in claim 2 from upgrade method, it is characterized in that,
Described legitimate authentication step comprises:
User initiates from upgrade request to Cloud Server by client end interface, and Cloud Server is initiated generating random number request and is forwarded to application by agent application;
Apply according to described generating random number request generation random number and this random number is sent to Cloud Server by agent application;
Cloud Server adopts described authenticate key be encrypted random number and generate random number ciphertext, and this random number ciphertext is returned to application by agent application;
The preset authenticate key of applications exploiting verifies this random number ciphertext, when being judged as that entity is legal by when checking.
4. application as claimed in claim 3 from upgrade method, it is characterized in that,
Described backup-step comprises:
Data backup step, when have authenticated entity and being legal, encryption key described in the data separate of application is encrypted and by enciphered data by described shared interface backup to agent application;
Application deactivating step, makes the application having carried out data backup lose efficacy after completing described data backup step.
5. application as claimed in claim 4 from upgrade method, it is characterized in that,
In described data backup step, agent application is set to be exported data.
6. application as claimed in claim 4 from upgrade method, it is characterized in that,
In described data backup step, 3DES encryption method is adopted to be encrypted for data.
7. application as claimed in claim 6 from upgrade method, it is characterized in that,
Described recovering step comprises:
(1) application is cooperated with Cloud Server by the switching of agent application the legal identity of certification entity;
(2) when certification entity is legal, the deletion of old application is completed;
(3) new application is downloaded and installed;
(4) by the date restoring that backed up in agent application in new application;
(5) in new application, application recovery after data decryption, is made to be called;
(6) after being successfully recovered, the data in agent application are deleted.
8. realize the system from upgrading applied, it is characterized in that possessing:
One or more application, presets authenticate key and encryption key in the application, and realizes sharing interface;
Cloud Server, presets described authenticate key and described encryption key in described Cloud Server;
Agent application, for carrying out the switching of data between described application and Cloud Server, and for the data of buffer memory from described application,
Wherein, described application is used for the legal identity being carried out certification entity by the switching of described agent application, and when have authenticated the legal identity of entity, described agent application is for backing up the data of described application.
9. the system from upgrading realizing application as claimed in claim 8, is characterized in that,
After the data of described application are backuped to described agent application, described agent application makes described application lose efficacy,
After the date restoring that will back up in described agent application is in described application, described agent application makes described application recovery become can be called.
10. the system from upgrading realizing application as claimed in claim 9, is characterized in that,
The data of described application backuped in the process of described agent application, described agent application is set to be exported data.
CN201510506442.8A 2015-08-18 2015-08-18 Application self-upgrading method and system Pending CN105187410A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510506442.8A CN105187410A (en) 2015-08-18 2015-08-18 Application self-upgrading method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510506442.8A CN105187410A (en) 2015-08-18 2015-08-18 Application self-upgrading method and system

Publications (1)

Publication Number Publication Date
CN105187410A true CN105187410A (en) 2015-12-23

Family

ID=54909254

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510506442.8A Pending CN105187410A (en) 2015-08-18 2015-08-18 Application self-upgrading method and system

Country Status (1)

Country Link
CN (1) CN105187410A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105302666A (en) * 2015-10-13 2016-02-03 东信和平科技股份有限公司 JAVA CARD based backup and recovery method for data in application
CN106445593A (en) * 2016-09-22 2017-02-22 广州华多网络科技有限公司 Gray level upgrading method and device in distributed system communication
CN107945858A (en) * 2017-12-14 2018-04-20 无锡祥生医疗科技股份有限公司 Upgrading backup method, the apparatus and system of diasonograph
CN109445815A (en) * 2018-10-15 2019-03-08 江苏恒宝智能系统技术有限公司 A kind of smart card and its application upgrade method
CN109446785A (en) * 2018-10-15 2019-03-08 江苏恒宝智能系统技术有限公司 A kind of memory management method of smart card and its personal data

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859125A (en) * 2006-03-31 2006-11-08 华为技术有限公司 System and its method for central remote automatic upgrading software
CN102427466A (en) * 2011-08-24 2012-04-25 厦门雅迅网络股份有限公司 Long-distance updating system and long-distance software automatic updating method based on same
CN102638565A (en) * 2012-02-27 2012-08-15 无锡华赛信息技术有限公司 Mobile phone cloud encryption backup and recovery method based on cloud architecture
CN103607600A (en) * 2013-11-19 2014-02-26 乐视致新电子科技(天津)有限公司 Method and device for cloud backup
CN103763631A (en) * 2014-01-07 2014-04-30 青岛海信信芯科技有限公司 Authentication method, server and television
WO2014123898A1 (en) * 2013-02-05 2014-08-14 Apple Inc. Automatic updating of applications
US9038056B1 (en) * 2009-03-31 2015-05-19 Avaya Inc. Method and apparatus for performing automatable software upgrades using a lightweight serviceless install agent

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859125A (en) * 2006-03-31 2006-11-08 华为技术有限公司 System and its method for central remote automatic upgrading software
US9038056B1 (en) * 2009-03-31 2015-05-19 Avaya Inc. Method and apparatus for performing automatable software upgrades using a lightweight serviceless install agent
CN102427466A (en) * 2011-08-24 2012-04-25 厦门雅迅网络股份有限公司 Long-distance updating system and long-distance software automatic updating method based on same
CN102638565A (en) * 2012-02-27 2012-08-15 无锡华赛信息技术有限公司 Mobile phone cloud encryption backup and recovery method based on cloud architecture
WO2014123898A1 (en) * 2013-02-05 2014-08-14 Apple Inc. Automatic updating of applications
CN103607600A (en) * 2013-11-19 2014-02-26 乐视致新电子科技(天津)有限公司 Method and device for cloud backup
CN103763631A (en) * 2014-01-07 2014-04-30 青岛海信信芯科技有限公司 Authentication method, server and television

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105302666A (en) * 2015-10-13 2016-02-03 东信和平科技股份有限公司 JAVA CARD based backup and recovery method for data in application
CN106445593A (en) * 2016-09-22 2017-02-22 广州华多网络科技有限公司 Gray level upgrading method and device in distributed system communication
CN107945858A (en) * 2017-12-14 2018-04-20 无锡祥生医疗科技股份有限公司 Upgrading backup method, the apparatus and system of diasonograph
CN109445815A (en) * 2018-10-15 2019-03-08 江苏恒宝智能系统技术有限公司 A kind of smart card and its application upgrade method
CN109446785A (en) * 2018-10-15 2019-03-08 江苏恒宝智能系统技术有限公司 A kind of memory management method of smart card and its personal data
CN109446785B (en) * 2018-10-15 2019-11-08 江苏恒宝智能系统技术有限公司 A kind of memory management method of smart card and its personal data

Similar Documents

Publication Publication Date Title
CN107111500B (en) Wireless provisioning of application libraries
KR101533787B1 (en) Writing application data to a secure element
JP5443659B2 (en) Local trusted service manager for contactless smart cards
EP3410326B1 (en) Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements
US9173102B2 (en) Method for updating a data carrier
US9734091B2 (en) Remote load and update card emulation support
CN110326266B (en) Data processing method and device
EP3780484B1 (en) Cryptographic operation and working key creation method and cryptographic service platform and device
CN105531710A (en) Method of authorizing an operation to be performed on a targeted computing device
CN105187410A (en) Application self-upgrading method and system
EP2919413A2 (en) Data security verification method and device
EP2736214B1 (en) Controlling application access to mobile device functions
CN103873440A (en) Application program upgrading method and system
CN105678192A (en) Smart card based secret key application method and application apparatus
CN105516948A (en) Device control method and device control unit
CN105101169A (en) Method and apparatus of information processing by trusted execution environment, terminal and SIM card
CN105183584A (en) Application cloud backup method and system thereof
CN113329041B (en) Method, apparatus, electronic device and storage medium for controlling a secure element
CN105847000A (en) Token generation method and communication system based on same
CN112669104A (en) Data processing method of rental equipment
CN107995230B (en) A kind of method for down loading and terminal
JP2010212805A (en) Method and system for distributing security information of settlement processing, center apparatus thereof, settlement device and program
EP3021516A1 (en) Method and server for providing transaction keys
KR102026279B1 (en) How to manage your application
CN110427203B (en) SIM card, updating method of SIM card and updating method of SIM card operating system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20151223