CN105306505A - Data updating methods, terminal and server - Google Patents
Data updating methods, terminal and server Download PDFInfo
- Publication number
- CN105306505A CN105306505A CN201410329360.6A CN201410329360A CN105306505A CN 105306505 A CN105306505 A CN 105306505A CN 201410329360 A CN201410329360 A CN 201410329360A CN 105306505 A CN105306505 A CN 105306505A
- Authority
- CN
- China
- Prior art keywords
- data
- differential data
- descriptor
- preset algorithm
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses data updating methods, a terminal and a server, belonging to the technical field of internet. The method in one embodiment comprises steps of sending a data update request at least carrying original data-related information to the server; receiving differential data and description information related to the differential data returned from the server; determining, according to the description information, whether the differential data is legal; and if the differential data is legal, updating original data corresponding to the differential data according to the differential data. In the method, whether the updated data is legal is determined according to update data and the description information, and if the update data is legal, the original data is updated according to the update data. As the legality of the updated data can be detected, the update data with malicious code data is prevented from being obtained. The data updating security is higher.
Description
Technical field
The present invention relates to Internet technical field, particularly a kind of data-updating method, terminal and server.
Background technology
Along with developing rapidly of present Internet technology, the people of application program are used to get more and more.Related data due to application program needs irregularly to upgrade, and such as, need to upgrade the code data of scripting utility during the function of expansive approach program, therefore, how to upgrade data is the key promoting function of application.
Provide a kind of data-updating method in correlation technique, in the method, obtain the partial data needing to upgrade, will the partial data upgraded be needed to replace the corresponding initial data stored in this locality, thus complete the renewal of data.
Realizing in process of the present invention, inventor finds that said method at least exists following problem:
Due to when obtaining the data needing to upgrade, the more new data that there is malicious code data may be got, to make after application program update data to perform malicious code logic according to the malicious code data in more new data, very large potential safety hazard is there is when causing application program to be run, therefore, the fail safe of Data Update is not high.
Summary of the invention
In order to solve the problem of prior art, embodiments provide a kind of data-updating method, terminal and server.Described technical scheme is as follows:
First aspect, provides a kind of data-updating method, and described method comprises:
The Data Update request at least carrying the relevant information of initial data is sent to server, return the relevant descriptor of differential data and described differential data by described server according to the relevant information of the initial data of carrying in described Data Update request, described descriptor at least comprises encrypts according to described differential data the signed data obtained;
Receive differential data that described server returns and the relevant descriptor of described differential data;
Determine that whether described differential data is legal according to described descriptor;
If described differential data is legal, then corresponding to described differential data according to described differential data initial data upgrades.
Second aspect, provides a kind of data-updating method, and described method comprises:
The Data Update request that receiving terminal sends, at least carries the relevant information of initial data in described Data Update request;
Determine corresponding differential data according to the relevant information of initial data in described Data Update request, and determine the descriptor that described differential data is relevant, described descriptor at least comprises signed data corresponding to described differential data;
Return the relevant descriptor of described differential data and described differential data to described terminal, according to described differential data and described descriptor, described initial data is upgraded by described terminal.
The third aspect, provides a kind of terminal, and described terminal comprises:
Sending module, for sending the Data Update request at least carrying the relevant information of initial data to server, return the relevant descriptor of differential data and described differential data by described server according to the relevant information of the initial data of carrying in described Data Update request, described descriptor at least comprises encrypts according to described differential data the signed data obtained;
Receiver module, for receiving differential data that described server returns and the relevant descriptor of described differential data;
According to described descriptor, determination module, for determining that whether described differential data is legal;
Update module, for when described differential data is legal, then corresponding to described differential data according to described differential data initial data upgrades.
Fourth aspect, provides a kind of server, and described server comprises:
Receiver module, for the Data Update request that receiving terminal sends, at least carries the relevant information of initial data in described Data Update request;
First determination module, for determining corresponding differential data according to the relevant information of initial data in described Data Update request;
Second determination module, for determining the descriptor that described differential data is relevant, described descriptor at least comprises signed data corresponding to described differential data;
Return module, for returning the relevant descriptor of described differential data and described differential data to described terminal, according to described differential data and described descriptor, described initial data is upgraded by described terminal.
The beneficial effect that the technical scheme that the embodiment of the present invention provides is brought is:
By sending Data Update request to server, the differential data that reception server returns according to Data Update request and the relevant descriptor of differential data, after legal according to descriptor determination differential data, the initial data corresponding to differential data according to differential data upgrades.Due to the legitimacy of differential data can be detected, thus can avoid getting the differential data that there is malicious code data.Therefore, the fail safe of Data Update is higher.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below the accompanying drawing used required in describing embodiment is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the schematic diagram of the implementation environment of a kind of data-updating method according to an exemplary embodiment;
Fig. 2 is the flow chart of a kind of data-updating method according to an exemplary embodiment;
Fig. 3 is the flow chart of a kind of data-updating method according to an exemplary embodiment;
Fig. 4 is the flow chart of a kind of data-updating method according to an exemplary embodiment;
Fig. 5 is the block diagram of a kind of terminal according to an exemplary embodiment;
Fig. 6 is the block diagram of a kind of determination module according to an exemplary embodiment;
Fig. 7 is the block diagram of a kind of terminal according to an exemplary embodiment;
Fig. 8 is the block diagram of a kind of server according to an exemplary embodiment;
Fig. 9 is the block diagram of a kind of second determination module according to an exemplary embodiment;
Figure 10 is the block diagram of a kind of server according to an exemplary embodiment.
Embodiment
For making the object, technical solutions and advantages of the present invention clearly, below in conjunction with accompanying drawing, embodiment of the present invention is described further in detail.
Please refer to Fig. 1, it illustrates the structural representation of the implementation environment involved by method that the embodiment of the present invention provides.As shown in Figure 1, this implementation environment comprises terminal 101 and server 102, and terminal 101 can be smart mobile phone, panel computer, pocket computer on knee etc.By the implementation environment shown in Fig. 1, can be communicated by wireless network or cable network between terminal 101 and server 102.
For convenience of explanation, Fig. 1 only illustrates terminal 101 and server 102, and terminal 101 only represents one in multiple terminal, and server 102 also only represents one in multiple server.By to realize Data Update by the information interaction between terminal 101 and server 102, the embodiment of the present invention is illustrated below.
Composition graphs 1 and the implementation environment described in foregoing, embodiments provide a kind of data-updating method, and this data-updating method is applied to terminal.Terminal in the present embodiment and subsequent embodiment includes but not limited to smart mobile phone, panel computer, pocket computer on knee etc., and the present embodiment and subsequent embodiment all do not limit the specific product form of terminal.As shown in Figure 2, this data-updating method comprises the following steps.
201: send the Data Update request at least carrying the relevant information of initial data to server, return the relevant descriptor of differential data and differential data by the relevant information of the initial data of carrying in server based on data update request, descriptor at least comprises encrypts according to differential data the signed data obtained;
202: the differential data that reception server returns and the descriptor that differential data is correlated with;
203: whether legal according to descriptor determination differential data;
Alternatively, whether legal according to descriptor determination differential data, include but not limited to:
Signed data in descriptor is decrypted according to the first preset algorithm, obtains corresponding data decryption;
Whether legal according to data decryption determination differential data.
Alternatively, signed data to be encrypted according to the second preset algorithm differential data by server and to obtain, and the second preset algorithm is corresponding with the first preset algorithm;
Whether legal according to data decryption determination differential data, include but not limited to:
Data decryption and differential data are compared;
If data decryption is identical with differential data, then determine that differential data is legal.
Alternatively, signed data is calculated differential data according to the 3rd preset algorithm by server, and the result calculated is encrypted according to the second preset algorithm and obtains, and the second preset algorithm is corresponding with the first preset algorithm;
Whether legal according to data decryption determination differential data, comprising:
According to the 3rd preset algorithm, differential data is calculated, and the result calculated and data decryption are compared;
If data decryption is identical with result of calculation, then determine that differential data is legal.
204: if differential data is legal, then corresponding to differential data according to differential data initial data upgrades.
The method that the present embodiment provides, by sending Data Update request to server, the differential data that reception server returns according to Data Update request and the relevant descriptor of differential data, after legal according to descriptor determination differential data, the initial data corresponding to differential data according to differential data upgrades.Due to the legitimacy of differential data can be detected, thus can avoid getting the differential data that there is malicious code data.Therefore, the fail safe of Data Update is higher.
Composition graphs 1 and the implementation environment described in foregoing, embodiments provide a kind of data-updating method, and this data-updating method is applied to server.As shown in Figure 3, this data-updating method comprises the following steps.
301: the Data Update request that receiving terminal sends, at least carry the relevant information of initial data in Data Update request;
302: determine corresponding differential data according to the relevant information of initial data in Data Update request, and determine the descriptor that differential data is relevant, descriptor at least comprises signed data corresponding to differential data;
Alternatively, determine to include but not limited to the descriptor that differential data is relevant:
Differential data is encrypted according to the second preset algorithm, obtains the signed data that differential data is corresponding;
The descriptor relevant according to signed data determination differential data.
Alternatively, differential data is encrypted according to the second preset algorithm, comprises:
Differential data is calculated according to the 3rd preset algorithm, obtains the result of calculation that differential data is corresponding;
Result of calculation is encrypted according to the second preset algorithm.
303: return the relevant descriptor of differential data and differential data to terminal, according to differential data and descriptor, initial data is upgraded by terminal.
The method that the present embodiment provides, the Data Update request sent by receiving terminal, corresponding differential data is determined according to the relevant information of initial data in Data Update request, and determine the descriptor that differential data is relevant, the relevant descriptor of differential data and differential data is returned to terminal, after legal by terminal authentication differential data, the initial data corresponding to differential data upgrades.Because terminal can detect the legitimacy of differential data, thus can avoid getting the differential data that there is malicious code data.Therefore, the fail safe of Data Update is higher.
Composition graphs 1 and the implementation environment described in foregoing, embodiments provide a kind of data-updating method, and the method relates to terminal and server, in conjunction with the content in above-described embodiment, is illustrated the method that the present embodiment provides.See Fig. 4, the method flow that the present embodiment provides comprises:
401: terminal to server sends the Data Update request at least carrying the relevant information of initial data;
Terminal is sending before Data Update request upgrades with the initial data stored this locality to server, can by the sending action of the instruction triggers Data Update request of being correlated with, and the present embodiment does not do concrete restriction to this.About the correlation form of triggering command, the present embodiment does not do concrete restriction to this yet, include but not limited to: detect the online upgrading instruction that user inputs in related interfaces, the online upgrading instruction user detected inputted is as the triggering command sending Data Update request.
Such as, take terminal as mobile phone be example, usually can comprise the option of online upgrade system in the system option in mobile phone, what user can open system option arranges interface, and arranges in interface at this option clicking online upgrade system, i.e. Input Online upgrade command.The user detected can be clicked the operation of online upgrade system option as the triggering command sending Data Update request by mobile phone.
Certainly, triggering command, except above-mentioned form, can also have other form.Such as, terminal has pre-defined the more interval time of new data, or user is provided with the interval time of more new data, as being interval time one week.When Monday arrives weekly, terminal all can generate triggering command, sends Data Update request according to triggering command to server.
The present embodiment does not send to terminal to server the mode at least carrying the Data Update request of the relevant information of initial data and does concrete restriction, includes but not limited to: send by wireless network or cable network the Data Update request at least carrying the relevant information of initial data to server.
Wherein, at least carry the relevant information of initial data in Data Update request, the present embodiment does not do concrete restriction to the content of carrying in data update request.In addition, the present embodiment does not also do concrete restriction to the content of the relevant information of initial data, includes but not limited to: the application identities etc. of the application program of the version number that initial data is current or initial data institute subordinate.
According to the relevant information of the initial data of carrying in Data Update request, server can determine the version of initial data in the terminal of data to be updated, thus determine whether further to need the initial data in terminal to upgrade, detailed process refers to subsequent step.
402: the Data Update request that server receiving terminal sends;
By above-mentioned steps 401, after terminal to server sends Data Update request, server can receiving terminal send Data Update request, concrete receive mode can to send the send mode of Data Update request corresponding with terminal, as Data Update request is sent to server with the form of packet by network by terminal, accordingly, server then receiving terminal send packet.
403: in server based on data update request, the relevant information of initial data determines corresponding differential data, and determine the descriptor that differential data is relevant, descriptor at least comprises signed data corresponding to differential data;
To the relevant information of initial data in server based on data update request, the present embodiment does not determine that the mode of corresponding differential data does concrete restriction, include but not limited to: the version number current according to the relevant information determination initial data of initial data in Data Update request; The version number current with initial data according to the application identities of the application program of initial data institute subordinate in Data Update request determines corresponding initial data; The data of latest edition and initial data are compared, determines corresponding differential data.
Wherein, for the ease of determining corresponding differential data according to the relevant information of initial data in Data Update request, the data of all version numbers of all application programs in server, can be stored, as shown in table 1:
Table 1
Such as, the version number Version_1.0 current according to the relevant information determination initial data of initial data in Data Update request, and in Data Update request, the application identities of the application program of initial data institute subordinate is APP_1.Therefore, can search in Table 1 according to the application identities APP_1 of the application program of initial data institute subordinate in Data Update request and the current version number Version_1.0 of initial data, thus can determine that corresponding initial data is Data_1.
In addition, latest edition data under the application program that application identities APP_1 is corresponding are Data_New, the version number of this latest edition is Version_4.0, thus the data Data_New of latest edition and initial data Data_1 can be compared, as added which segment data, decreasing which segment data or have modified which segment data, thus determine corresponding differential data.
It should be noted that, if the current version number of the initial data determined according to the relevant information of initial data in Data Update request is the version number that current latest edition data are corresponding just, then now need not upgrade the initial data of end side.Alternatively, can also return related announcement to end side, need not upgrade the data that terminal local stores to notify that user is current, the present embodiment does not do concrete restriction to this.
Such as, the version number Version_4.0 current according to the relevant information determination initial data of initial data in Data Update request, and at server side, the data of latest edition are Data_New, corresponding version number is also Version_4.0.Now, show that the data of end side have been up-to-date data, then need not upgrade the data of end side.Alternatively, also can return the related announcement of " current data has been latest data " to terminal, by this related announcement of terminal demonstration, thus user be reminded.
In addition, because the data of arbitrary version are made up of several data modules usually, if inside is had the whole data module of data modification as more new data, then can owing to also there are many data of not carrying out upgrading in whole data module, make the network traffics that expend during more new data comparatively large, cause efficiency during more new data lower.And in the method provided at the present embodiment, by using differential data as more new data, according to differential data, initial data is upgraded.Such as, in a data module, in this data module, the data of latest edition only increase data compared with the initial data of last version, and namely differential data is those data increased.Because differential data is few more than the content of the data of latest edition in whole data module, using differential data after more new data, the network traffics more expended during new data are less, thus efficiency when making more new data is higher.
Server, after determine corresponding differential data according to the relevant information of initial data in Data Update request, also can determine the descriptor that differential data is relevant.Wherein, can include but not limited to the signed data that differential data is corresponding in the descriptor that differential data is correlated with, the content in the descriptor that the present embodiment is not correlated with to differential data does concrete restriction.
About the mode of the descriptor that server determination differential data is correlated with, the present embodiment does not do concrete restriction to this yet, includes but not limited to: be encrypted according to the second preset algorithm differential data, obtains the signed data that differential data is corresponding; The descriptor relevant according to signed data determination differential data.
Wherein, because rivest, shamir, adelman has higher fail safe, therefore, second preset algorithm can be rivest, shamir, adelman, as RSA (Rivest-Shamir-Adleman, Lee Vista-Sa Moer-A Deman) algorithm, knapsack algorithm, D-H (Diffe-Hellman, Di Fei-Herman) algorithm etc., the present embodiment does not do concrete restriction to the content of the second preset algorithm.It should be noted that, if differential data is character string and nonnumeric, can first according to ASCII (AmericanStandardCodeforInformationInterchange, ASCII) character string is converted to the decimal system or hexadecimal numeral, thus the numeral after conversion is encrypted.
After obtaining signed data corresponding to differential data, the descriptor that differential data is relevant can be determined, the present embodiment is to determining that the mode of the descriptor that differential data is correlated with does concrete restriction, include but not limited to: the version number determining differential data, and determine the application identities of the application program of differential data institute subordinate simultaneously; By the version number of differential data, the descriptor that the application identities of the application program of differential data institute subordinate and signed data are correlated with as differential data.
Such as, based on above-mentioned example, due to differential data be the data Data_New of latest edition and initial data Data_1 is compared after obtain, and the version number of the data of latest edition is Version_4.0.Therefore, the version number of differential data is Version_4.0.In addition, because the data Data_New of latest edition is the data under the application program that application identities APP_1 is corresponding, therefore, the application identities of the application program of differential data institute subordinate is also APP_1.In conjunction with content above, the descriptor application identities APP_1 of the application program of the version number Version_4.0 of differential data, differential data institute subordinate and signed data can be correlated with as this differential data.
Alternatively, because the content of differential data may be many, server is when being encrypted according to the second preset algorithm differential data, if be directly encrypted differential data, amount of calculation during encryption is comparatively large, thus may cause expending more hardware resource and longer time in ciphering process.In order to avoid above-mentioned situation, the data volume of encryption is needed when reducing ciphering process, first differential data can be calculated according to the 3rd preset algorithm, obtain the result of calculation that differential data is corresponding, with the data volume of differential data before minimizing, be encrypted according to the second preset algorithm result of calculation, the present embodiment does not do concrete restriction to this again.
Wherein, 3rd preset algorithm can be hashing algorithm, differential data can be compressed into summary data by hashing algorithm, data volume is diminished, thus when summary data is encrypted according to the second preset algorithm, effectively can reduce amount of calculation during encryption, and then reduce the hardware resource and time that expend in ciphering process.Certainly, the 3rd preset algorithm can also be other algorithm, and the present embodiment does not do concrete restriction to this.
404: server returns the relevant descriptor of differential data and differential data to terminal;
The present embodiment does not do concrete restriction to the mode that server returns to terminal the descriptor that differential data and differential data are correlated with, detailed process can send with reference to terminal to server in above-mentioned steps 401 send mode at least carrying the Data Update request of the relevant information of initial data, repeats no more herein.
405: the differential data that terminal reception server returns and the descriptor that differential data is correlated with;
The mode of the differential data that the present embodiment does not return terminal reception server and the descriptor that differential data is correlated with does concrete restriction, the receive mode of the Data Update request that detailed process can send with reference to server receiving terminal in above-mentioned steps 402, repeats no more herein.
406: whether terminal is legal according to descriptor determination differential data;
Whether illegal according to descriptor determination differential data to the terminal mode of the present embodiment does concrete restriction, includes but not limited to: be decrypted the signed data in descriptor, obtains corresponding data decryption; Whether legal according to data decryption determination differential data.
Wherein, terminal is when being decrypted according to the first preset algorithm the signed data in descriptor, need the decipherment algorithm that when server is encrypted differential data in employing above-mentioned steps 403, the cryptographic algorithm of employing is corresponding, namely the second preset algorithm is corresponding with the first preset algorithm.Such as, if the cryptographic algorithm adopted when server is encrypted differential data in above-mentioned steps 403 is symmetric encipherment algorithm, then the key adopted when the key needs adopted when this step is decrypted the signed data in descriptor are encrypted differential data with server in above-mentioned steps 403 is identical.If the cryptographic algorithm adopted when server is encrypted differential data in above-mentioned steps 403 is rivest, shamir, adelman, the key adopted when the key adopted when then this step is decrypted the signed data in descriptor needs and in above-mentioned steps 403, server is encrypted differential data is same group key, and the key adopted when the key namely adopted during encryption and deciphering is pair of secret keys.Wherein, the key adopted during encryption is PKI, and the key adopted during deciphering is private key.
Obtain because signed data directly can be encrypted according to the second preset algorithm differential data by server, therefore, terminal is being decrypted the signed data in descriptor, after obtaining corresponding data decryption, when whether legal according to data decryption determination differential data, data decryption and differential data can be compared.If data decryption is identical with differential data, then determine that differential data is legal.If data decryption and differential data are not identical, then determine that differential data is illegal.Certainly, whether other mode determination differential data can also be adopted legal, and the present embodiment if not doing concrete restriction to this.
Alternatively, because server side is when being encrypted differential data, first can calculates according to the 3rd preset algorithm differential data, obtaining the result of calculation that differential data is corresponding, again result of calculation is encrypted according to the second preset algorithm, thus amount of calculation when reducing encryption differential data.Accordingly, terminal, when being decrypted the signed data in descriptor, obtaining corresponding data decryption and is essentially server side when being encrypted differential data, calculate obtained result of calculation to differential data according to the 3rd preset algorithm.Because the data volume of this result of calculation is few more than the data volume of differential data, therefore, in order to reduce the amount of calculation of terminal when whether legal according to data decryption determination differential data, end side can first calculate differential data according to the 3rd preset algorithm, then the result calculated and data decryption is compared.If data decryption is identical with result of calculation, then determine that differential data is legal.If data decryption and result of calculation are not identical, then determine that differential data is illegal.Due to when comparing calculating, data volume is fewer, then the number of times compared is fewer, and amount of calculation when comparing is also fewer.Terminal is by first calculating differential data according to the 3rd preset algorithm, decrease the data volume of former differential data, again the result calculated and data decryption are compared, thus amount of calculation when comparing can be reduced, and then reduce the time and relevant hardware resource expended when calculating.
Such as, according to above-mentioned steps 403, because the 3rd preset algorithm can be hashing algorithm, therefore, differential data, when being encrypted differential data, can first carry out compressing to reduce data volume according to hashing algorithm by server side, and obtains the summary data after differential data compression, again summary data is encrypted according to the second preset algorithm, thus amount of calculation when reducing encryption differential data.Accordingly, terminal, when being decrypted the signed data in descriptor, obtaining corresponding data decryption and is essentially server side when being encrypted differential data, compress obtained summary data to differential data according to hashing algorithm.Because the data volume of this summary data is few more than the data volume of differential data, therefore, in order to reduce the amount of calculation of terminal when whether legal according to data decryption determination differential data, end side can first calculate differential data according to same hashing algorithm, then the result calculated and data decryption is compared.If data decryption is identical with result of calculation, then determine that differential data is legal.If data decryption and result of calculation are not identical, then determine that differential data is illegal.
407: if differential data is legal, then the initial data that terminal is corresponding to differential data according to differential data upgrades.
The mode that the initial data that the present embodiment is not corresponding to differential data according to differential data to terminal upgrades does concrete restriction, includes but not limited to: determine the position residing for differential data; Position residing for differential data and the differential data initial data corresponding to differential data upgrade.
Such as, based on the example in above-mentioned steps 403, the data of differential data for increasing on the basis of initial data, and the position residing for differential data is between the second row data of initial data and the third line data.Therefore, position residing for differential data and the differential data initial data corresponding to differential data can upgrade, namely between the second row data and the third line data of initial data, increase differential data.Accordingly, differential data becomes the third line data, and former the third line data of initial data become fourth line data, and the residing line number of the data of subsequent rows adds 1 simultaneously.
The method that the present embodiment provides, Data Update request is sent by terminal to server, the differential data that reception server returns according to Data Update request and the relevant descriptor of differential data, after legal according to descriptor determination differential data, the initial data corresponding to differential data according to differential data upgrades.Because terminal can detect the legitimacy of differential data, thus can avoid getting the differential data that there is malicious code data.Therefore, the fail safe of Data Update is higher.
Embodiments provide a kind of terminal, this terminal is for the function performed by terminal in the data-updating method that performs above-described embodiment and provide.See Fig. 5, this terminal comprises:
Sending module 501, for sending the Data Update request at least carrying the relevant information of initial data to server, return the relevant descriptor of differential data and differential data by the relevant information of the initial data of carrying in server based on data update request, descriptor at least comprises encrypts according to differential data the signed data obtained;
Receiver module 502, the descriptor that the differential data returned for reception server and differential data are correlated with;
Whether determination module 503, for legal according to descriptor determination differential data;
Update module 504, for when differential data is legal, then corresponding to differential data according to differential data initial data upgrades.
As a kind of embodiment, see Fig. 6, determination module 503, comprising:
Decryption unit 5031, for being decrypted according to the first preset algorithm the signed data in descriptor, obtains corresponding data decryption;
Whether determining unit 5032, for legal according to data decryption determination differential data.
As a kind of embodiment, signed data to be encrypted according to the second preset algorithm differential data by server and to obtain, and the second preset algorithm is corresponding with the first preset algorithm;
Determining unit 5032, for comparing data decryption and differential data; If data decryption is identical with differential data, then determine that differential data is legal.
As a kind of embodiment, signed data is calculated differential data according to the 3rd preset algorithm by server, and the result calculated is encrypted according to the second preset algorithm and obtains, and the second preset algorithm is corresponding with the first preset algorithm;
Determining unit 5032, for calculating differential data according to the 3rd preset algorithm, and compares the result calculated and data decryption; If data decryption is identical with result of calculation, then determine that differential data is legal.
The terminal that the present embodiment provides, by sending Data Update request to server, the differential data that reception server returns according to Data Update request and the relevant descriptor of differential data, after legal according to descriptor determination differential data, the initial data corresponding to differential data according to differential data upgrades.Because terminal can detect the legitimacy of differential data, thus can avoid getting the differential data that there is malicious code data.Therefore, the fail safe of Data Update is higher.
Present embodiments provide a kind of terminal, this terminal may be used for performing the function in each embodiment above-mentioned in data-updating method performed by terminal.See Fig. 7, this terminal 700 comprises:
Terminal 700 can comprise RF (RadioFrequency, radio frequency) circuit 110, the memory 120 including one or more computer-readable recording mediums, input unit 130, display unit 140, transducer 150, voicefrequency circuit 160, WiFi (WirelessFidelity, Wireless Fidelity) module 170, include the parts such as processor 180 and power supply 190 that more than or processes core.It will be understood by those skilled in the art that the restriction of the not structure paired terminal of the terminal structure shown in Fig. 7, the parts more more or less than diagram can be comprised, or combine some parts, or different parts are arranged.Wherein:
RF circuit 110 can be used for receiving and sending messages or in communication process, the reception of signal and transmission, especially, after being received by the downlink information of base station, transfer to more than one or one processor 180 to process; In addition, base station is sent to by relating to up data.Usually, RF circuit 110 includes but not limited to antenna, at least one amplifier, tuner, one or more oscillator, subscriber identity module (SIM) card, transceiver, coupler, LNA (LowNoiseAmplifier, low noise amplifier), duplexer etc.In addition, RF circuit 110 can also by radio communication and network and other devices communicatings.Described radio communication can use arbitrary communication standard or agreement, include but not limited to GSM (GlobalSystemofMobilecommunication, global system for mobile communications), GPRS (GeneralPacketRadioService, general packet radio service), CDMA (CodeDivisionMultipleAccess, code division multiple access), WCDMA (WidebandCodeDivisionMultipleAccess, Wideband Code Division Multiple Access (WCDMA)), LTE (LongTermEvolution, Long Term Evolution), Email, SMS (ShortMessagingService, Short Message Service) etc.
Memory 120 can be used for storing software program and module, and processor 180 is stored in software program and the module of memory 120 by running, thus performs the application of various function and data processing.Memory 120 mainly can comprise storage program district and store data field, and wherein, storage program district can storage operation system, application program (such as sound-playing function, image player function etc.) etc. needed at least one function; Store data field and can store the data (such as voice data, phone directory etc.) etc. created according to the use of terminal 700.In addition, memory 120 can comprise high-speed random access memory, can also comprise nonvolatile memory, such as at least one disk memory, flush memory device or other volatile solid-state parts.Correspondingly, memory 120 can also comprise Memory Controller, to provide the access of processor 180 and input unit 130 pairs of memories 120.
Input unit 130 can be used for the numeral or the character information that receive input, and produces and to arrange with user and function controls relevant keyboard, mouse, action bars, optics or trace ball signal and inputs.Particularly, input unit 130 can comprise Touch sensitive surface 131 and other input equipments 132.Touch sensitive surface 131, also referred to as touch display screen or Trackpad, user can be collected or neighbouring touch operation (such as user uses any applicable object or the operations of annex on Touch sensitive surface 131 or near Touch sensitive surface 131 such as finger, stylus) thereon, and drive corresponding jockey according to the formula preset.Optionally, Touch sensitive surface 131 can comprise touch detecting apparatus and touch controller two parts.Wherein, touch detecting apparatus detects the touch orientation of user, and detects the signal that touch operation brings, and sends signal to touch controller; Touch controller receives touch information from touch detecting apparatus, and converts it to contact coordinate, then gives processor 180, and the order that energy receiving processor 180 is sent also is performed.In addition, the polytypes such as resistance-type, condenser type, infrared ray and surface acoustic wave can be adopted to realize Touch sensitive surface 131.Except Touch sensitive surface 131, input unit 130 can also comprise other input equipments 132.Particularly, other input equipments 132 can include but not limited to one or more in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc.
Display unit 140 can be used for the various graphical user interface showing information or the information being supplied to user and the terminal 700 inputted by user, and these graphical user interface can be made up of figure, text, icon, video and its combination in any.Display unit 140 can comprise display floater 141, optionally, the form such as LCD (LiquidCrystalDisplay, liquid crystal display), OLED (OrganicLight-EmittingDiode, Organic Light Emitting Diode) can be adopted to configure display floater 141.Further, Touch sensitive surface 131 can cover display floater 141, when Touch sensitive surface 131 detects thereon or after neighbouring touch operation, send processor 180 to determine the type of touch event, on display floater 141, provide corresponding vision to export with preprocessor 180 according to the type of touch event.Although in the figure 7, Touch sensitive surface 131 and display floater 141 be as two independently parts realize input and input function, in certain embodiments, can by Touch sensitive surface 131 and display floater 141 integrated and realize input and output function.
Terminal 700 also can comprise at least one transducer 150, such as optical sensor, motion sensor and other transducers.Particularly, optical sensor can comprise ambient light sensor and proximity transducer, and wherein, ambient light sensor the light and shade of environmentally light can regulate the brightness of display floater 141, proximity transducer when terminal 700 moves in one's ear, can cut out display floater 141 and/or backlight.As the one of motion sensor, Gravity accelerometer can detect the size of all directions (are generally three axles) acceleration, size and the direction of gravity can be detected time static, can be used for identifying the application (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating) of mobile phone attitude, Vibration identification correlation function (such as pedometer, knock) etc.; As for terminal 700 also other transducers such as configurable gyroscope, barometer, hygrometer, thermometer, infrared ray sensor, do not repeat them here.
Voicefrequency circuit 160, loud speaker 161, microphone 162 can provide the audio interface between user and terminal 700.Voicefrequency circuit 160 can by receive voice data conversion after the signal of telecommunication, be transferred to loud speaker 161, by loud speaker 161 be converted to voice signal export; On the other hand, the voice signal of collection is converted to the signal of telecommunication by microphone 162, voice data is converted to after being received by voicefrequency circuit 160, after again voice data output processor 180 being processed, through RF circuit 110 to send to such as another terminal, or export voice data to memory 120 to process further.Voicefrequency circuit 160 also may comprise earphone jack, to provide the communication of peripheral hardware earphone and terminal 700.
WiFi belongs to short range wireless transmission technology, and by WiFi module 170, terminal 700 can help that user sends and receive e-mail, browsing page and access streaming video etc., and its broadband internet wireless for user provides is accessed.Although Fig. 7 shows WiFi module 170, be understandable that, it does not belong to must forming of terminal 700, can omit in the scope of essence not changing invention as required completely.
Processor 180 is control centres of terminal 700, utilize the various piece of various interface and the whole mobile phone of connection, software program in memory 120 and/or module is stored in by running or performing, and call the data be stored in memory 120, perform various function and the deal with data of terminal 700, thus integral monitoring is carried out to mobile phone.Optionally, processor 180 can comprise one or more process core; Preferably, processor 180 accessible site application processor and modem processor, wherein, application processor mainly processes operating system, user interface and application program etc., and modem processor mainly processes radio communication.Be understandable that, above-mentioned modem processor also can not be integrated in processor 180.
Terminal 700 also comprises the power supply 190 (such as battery) of powering to all parts, preferably, power supply can be connected with processor 180 logic by power-supply management system, thus realizes the functions such as management charging, electric discharge and power managed by power-supply management system.Power supply 190 can also comprise one or more direct current or AC power, recharging system, power failure detection circuit, power supply changeover device or the random component such as inverter, power supply status indicator.
Although not shown, terminal 700 can also comprise camera, bluetooth module etc., does not repeat them here.Specifically in the present embodiment, the display unit of terminal is touch-screen display, and terminal also includes memory, and one or more than one program, one of them or more than one program are stored in memory, and are configured to be performed by more than one or one processor.Described more than one or one program package is containing the instruction for performing following operation:
The Data Update request at least carrying the relevant information of initial data is sent to server, return the relevant descriptor of differential data and differential data by the relevant information of the initial data of carrying in server based on data update request, descriptor at least comprises encrypts according to differential data the signed data obtained;
The differential data that reception server returns and the descriptor that differential data is correlated with;
Whether legal according to descriptor determination differential data;
If differential data is legal, then corresponding to differential data according to differential data initial data upgrades.
Suppose that above-mentioned is the first possible execution mode, then, in the execution mode that the second provided based on the execution mode that the first is possible is possible, in the memory of terminal, also comprise the instruction for performing following operation:
Signed data in descriptor is decrypted according to the first preset algorithm, obtains corresponding data decryption;
Whether legal according to data decryption determination differential data.
In the third the possible execution mode provided based on the execution mode that the second is possible, in the memory of terminal, also comprise the instruction for performing following operation:
Signed data to be encrypted according to the second preset algorithm differential data by server and to obtain, and the second preset algorithm is corresponding with the first preset algorithm;
Whether legal according to data decryption determination differential data, comprising:
Data decryption and differential data are compared;
If data decryption is identical with differential data, then determine that differential data is legal.
In the 4th kind of possible execution mode provided based on the execution mode that the second is possible, in the memory of terminal, also comprise the instruction for performing following operation:
Signed data is calculated differential data according to the 3rd preset algorithm by server, and the result calculated is encrypted according to the second preset algorithm and obtains, and the second preset algorithm is corresponding with the first preset algorithm;
Whether legal according to data decryption determination differential data, comprising:
According to the 3rd preset algorithm, differential data is calculated, and the result calculated and data decryption are compared;
If data decryption is identical with result of calculation, then determine that differential data is legal.
Terminal provided by the invention, by sending Data Update request to server, the differential data that reception server returns according to Data Update request and the relevant descriptor of differential data, after legal according to descriptor determination differential data, the initial data corresponding to differential data according to differential data upgrades.Due to the legitimacy of differential data can be detected, thus can avoid getting the differential data that there is malicious code data.Therefore, the fail safe of Data Update is higher.
The embodiment of the present invention additionally provides a kind of computer-readable recording medium, and this computer-readable recording medium can be the computer-readable recording medium comprised in the memory in above-described embodiment; Also can be individualism, be unkitted the computer-readable recording medium allocated in terminal.This computer-readable recording medium stores more than one or one program, and this more than one or one program is used for execution by one or more than one processor and realizes data-updating method, and the method comprises:
The Data Update request at least carrying the relevant information of initial data is sent to server, return the relevant descriptor of differential data and differential data by the relevant information of the initial data of carrying in server based on data update request, descriptor at least comprises encrypts according to differential data the signed data obtained;
The differential data that reception server returns and the descriptor that differential data is correlated with;
Whether legal according to descriptor determination differential data;
If differential data is legal, then corresponding to differential data according to differential data initial data upgrades.
Suppose above-mentioned for the first possible execution mode, then in the execution mode that the second provided based on the execution mode that the first is possible is possible, describedly determine that whether described differential data is legal according to described descriptor, comprising:
Signed data in descriptor is decrypted according to the first preset algorithm, obtains corresponding data decryption;
Whether legal according to data decryption determination differential data.
In the third the possible execution mode provided based on the execution mode that the second is possible, described signed data to be encrypted according to the second preset algorithm described differential data by described server and to obtain, and the second preset algorithm is corresponding with the first preset algorithm;
Describedly determine that whether described differential data is legal according to described data decryption, comprising:
Data decryption and differential data are compared;
If data decryption is identical with differential data, then determine that differential data is legal.
In the 4th kind of possible execution mode provided based on the execution mode that the second is possible, described signed data is calculated described differential data according to the 3rd preset algorithm by described server, and the result calculated is encrypted according to the second preset algorithm obtains, the second preset algorithm is corresponding with the first preset algorithm;
Describedly determine that whether described differential data is legal according to described data decryption, comprising:
According to the 3rd preset algorithm, differential data is calculated, and the result calculated and data decryption are compared;
If data decryption is identical with result of calculation, then determine that differential data is legal.
The computer-readable recording medium that the embodiment of the present invention provides, by sending Data Update request to server, the differential data that reception server returns according to Data Update request and the relevant descriptor of differential data, after legal according to descriptor determination differential data, the initial data corresponding to differential data according to differential data upgrades.Due to the legitimacy of differential data can be detected, thus can avoid getting the differential data that there is malicious code data.Therefore, the fail safe of Data Update is higher.
Embodiments provide a kind of graphical user interface, described graphical user interface is used in terminal, and described terminal comprises touch-screen display, memory and one or more than one processor for performing one or more than one program; Described graphical user interface comprises:
The Data Update request at least carrying the relevant information of initial data is sent to server, return the relevant descriptor of differential data and differential data by the relevant information of the initial data of carrying in server based on data update request, descriptor at least comprises encrypts according to differential data the signed data obtained;
The differential data that reception server returns and the descriptor that differential data is correlated with;
Whether legal according to descriptor determination differential data;
If differential data is legal, then corresponding to differential data according to differential data initial data upgrades.
The graphical user interface that the embodiment of the present invention provides, by sending Data Update request to server, the differential data that reception server returns according to Data Update request and the relevant descriptor of differential data, after legal according to descriptor determination differential data, the initial data corresponding to differential data according to differential data upgrades.Due to the legitimacy of differential data can be detected, thus can avoid getting the differential data that there is malicious code data.Therefore, the fail safe of Data Update is higher.
Embodiments provide a kind of server, this server is for the function performed by server in the data-updating method that performs above-described embodiment and provide.See Fig. 8, this server comprises:
Receiver module 801, for the Data Update request that receiving terminal sends, at least carries the relevant information of initial data in Data Update request;
First determination module 802, for determining corresponding differential data according to the relevant information of initial data in Data Update request;
Second determination module 803, for determining the descriptor that differential data is relevant, descriptor at least comprises signed data corresponding to differential data;
Return module 804, for returning the relevant descriptor of differential data and differential data to terminal, according to differential data and descriptor, initial data is upgraded by terminal.
As a kind of embodiment, see Fig. 9, the second determination module 803, includes but not limited to:
Ciphering unit 8031, for being encrypted according to the second preset algorithm differential data, obtains the signed data that differential data is corresponding;
Determining unit 8032, for the descriptor relevant according to signed data determination differential data.
As a kind of embodiment, ciphering unit 8031, for differential data being calculated according to the 3rd preset algorithm, obtains the result of calculation that differential data is corresponding; Result of calculation is encrypted according to the second preset algorithm.
The server that the present embodiment provides, the Data Update request sent by receiving terminal, corresponding differential data is determined according to the relevant information of initial data in Data Update request, and determine the descriptor that differential data is relevant, the relevant descriptor of differential data and differential data is returned to terminal, after legal by terminal determination differential data, the initial data corresponding to differential data upgrades.Because terminal can detect the legitimacy of differential data, thus can avoid getting the differential data that there is malicious code data.Therefore, the fail safe of Data Update is higher.
Fig. 9 is the block diagram of a kind of server 1900 according to an exemplary embodiment.Such as, server 1900 may be provided in a server.With reference to Fig. 9, server 1900 comprises processing components 1922, and it comprises one or more processor further, and the memory resource representated by memory 1932, can such as, by the instruction of the execution of processing unit 1922, application program for storing.The application program stored in memory 1932 can comprise each module corresponding to one group of instruction one or more.In addition, processing components 1922 is configured to perform instruction, to perform the method in above-described embodiment performed by server.
Server 1900 can also comprise the power management that a power supply module 1926 is configured to perform server 1900, a wired or wireless network interface 1950 is configured to server 1900 to be connected to network, and input and output (I/O) interface 1958.Server 1900 can operate the operating system based on being stored in memory 1932, such as WindowsServerTM, MacOSXTM, UnixTM, LinuxTM, FreeBSDTM or similar.
The server that the present embodiment provides, the Data Update request sent by receiving terminal, corresponding differential data is determined according to the relevant information of initial data in Data Update request, and determine the descriptor that differential data is relevant, the relevant descriptor of differential data and differential data is returned to terminal, after legal by terminal authentication differential data, the initial data corresponding to differential data upgrades.Because terminal can detect the legitimacy of differential data, thus can avoid getting the differential data that there is malicious code data.Therefore, the fail safe of Data Update is higher.
It should be noted that: the terminal that above-described embodiment provides is when carrying out Data Update, only be illustrated with the division of above-mentioned each functional module, in practical application, can distribute as required and by above-mentioned functions and be completed by different functional modules, internal structure by terminal is divided into different functional modules, to complete all or part of function described above.In addition, the terminal that above-described embodiment provides, server and data-updating method embodiment belong to same design, and its specific implementation process refers to embodiment of the method, repeats no more here.
The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
One of ordinary skill in the art will appreciate that all or part of step realizing above-described embodiment can have been come by hardware, the hardware that also can carry out instruction relevant by program completes, described program can be stored in a kind of computer-readable recording medium, the above-mentioned storage medium mentioned can be read-only memory, disk or CD etc.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (14)
1. a data-updating method, is characterized in that, described method comprises:
The Data Update request at least carrying the relevant information of initial data is sent to server, return the relevant descriptor of differential data and described differential data by described server according to the relevant information of the initial data of carrying in described Data Update request, described descriptor at least comprises encrypts according to described differential data the signed data obtained;
Receive differential data that described server returns and the relevant descriptor of described differential data;
Determine that whether described differential data is legal according to described descriptor;
If described differential data is legal, then corresponding to described differential data according to described differential data initial data upgrades.
2. method according to claim 1, is characterized in that, describedly determines that whether described differential data is legal according to described descriptor, comprising:
Signed data in described descriptor is decrypted according to the first preset algorithm, obtains corresponding data decryption;
Determine that whether described differential data is legal according to described data decryption.
3. method according to claim 2, is characterized in that, described signed data to be encrypted according to the second preset algorithm described differential data by described server and to obtain, and described second preset algorithm is corresponding with described first preset algorithm;
Describedly determine that whether described differential data is legal according to described data decryption, comprising:
Described data decryption and described differential data are compared;
If described data decryption is identical with described differential data, then determine that described differential data is legal.
4. method according to claim 2, it is characterized in that, described signed data is calculated described differential data according to the 3rd preset algorithm by described server, and the result calculated is encrypted according to the second preset algorithm obtains, described second preset algorithm is corresponding with described first preset algorithm;
Describedly determine that whether described differential data is legal according to described data decryption, comprising:
According to described 3rd preset algorithm, described differential data is calculated, and the result calculated and described data decryption are compared;
If described data decryption is identical with described result of calculation, then determine that described differential data is legal.
5. a data-updating method, is characterized in that, described method comprises:
The Data Update request that receiving terminal sends, at least carries the relevant information of initial data in described Data Update request;
Determine corresponding differential data according to the relevant information of initial data in described Data Update request, and determine the descriptor that described differential data is relevant, described descriptor at least comprises signed data corresponding to described differential data;
Return the relevant descriptor of described differential data and described differential data to described terminal, according to described differential data and described descriptor, described initial data is upgraded by described terminal.
6. method according to claim 5, is characterized in that, describedly determines the descriptor that described differential data is relevant, comprising:
Described differential data is encrypted according to the second preset algorithm, obtains the signed data that described differential data is corresponding;
The descriptor that described differential data is relevant is determined according to described signed data.
7. method according to claim 6, is characterized in that, is describedly encrypted according to the second preset algorithm described differential data, comprising:
Described differential data is calculated according to the 3rd preset algorithm, obtains the result of calculation that described differential data is corresponding;
Described result of calculation is encrypted according to described second preset algorithm.
8. a terminal, is characterized in that, described terminal comprises:
Sending module, for sending the Data Update request at least carrying the relevant information of initial data to server, return the relevant descriptor of differential data and described differential data by described server according to the relevant information of the initial data of carrying in described Data Update request, described descriptor at least comprises encrypts according to described differential data the signed data obtained;
Receiver module, for receiving differential data that described server returns and the relevant descriptor of described differential data;
According to described descriptor, determination module, for determining that whether described differential data is legal;
Update module, for when described differential data is legal, then corresponding to described differential data according to described differential data initial data upgrades.
9. terminal according to claim 8, is characterized in that, described determination module, comprising:
Decryption unit, for being decrypted according to the first preset algorithm the signed data in described descriptor, obtains corresponding data decryption;
According to described data decryption, determining unit, for determining that whether described differential data is legal.
10. terminal according to claim 9, is characterized in that, described signed data to be encrypted according to the second preset algorithm described differential data by described server and to obtain, and described second preset algorithm is corresponding with described first preset algorithm;
Described determining unit, for comparing described data decryption and described differential data; If described data decryption is identical with described differential data, then determine that described differential data is legal.
11. terminals according to claim 9, it is characterized in that, described signed data is calculated described differential data according to the 3rd preset algorithm by described server, and the result calculated is encrypted according to the second preset algorithm obtains, described second preset algorithm is corresponding with described first preset algorithm;
Described determining unit, for calculating described differential data according to described 3rd preset algorithm, and compares the result calculated and described data decryption; If described data decryption is identical with described result of calculation, then determine that described differential data is legal.
12. 1 kinds of servers, is characterized in that, described server comprises:
Receiver module, for the Data Update request that receiving terminal sends, at least carries the relevant information of initial data in described Data Update request;
First determination module, for determining corresponding differential data according to the relevant information of initial data in described Data Update request;
Second determination module, for determining the descriptor that described differential data is relevant, described descriptor at least comprises signed data corresponding to described differential data;
Return module, for returning the relevant descriptor of described differential data and described differential data to described terminal, according to described differential data and described descriptor, described initial data is upgraded by described terminal.
13. servers according to claim 12, is characterized in that, described second determination module, comprising:
Ciphering unit, for being encrypted according to the second preset algorithm described differential data, obtains the signed data that described differential data is corresponding;
Determining unit, for determining the descriptor that described differential data is relevant according to described signed data.
14. servers according to claim 13, is characterized in that, described ciphering unit, for described differential data being calculated according to the 3rd preset algorithm, obtain the result of calculation that described differential data is corresponding; Described result of calculation is encrypted according to described second preset algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410329360.6A CN105306505A (en) | 2014-07-11 | 2014-07-11 | Data updating methods, terminal and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410329360.6A CN105306505A (en) | 2014-07-11 | 2014-07-11 | Data updating methods, terminal and server |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105306505A true CN105306505A (en) | 2016-02-03 |
Family
ID=55203254
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410329360.6A Pending CN105306505A (en) | 2014-07-11 | 2014-07-11 | Data updating methods, terminal and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105306505A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111614750A (en) * | 2020-05-19 | 2020-09-01 | 深圳市网心科技有限公司 | Data updating method, system, equipment and storage medium |
CN116112388A (en) * | 2023-01-08 | 2023-05-12 | 首钢京唐钢铁联合有限责任公司 | Method and device for transmitting weight of finished steel coil |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1574727A (en) * | 2003-05-20 | 2005-02-02 | 三星电子株式会社 | Method of preventing tampering of program, method of upgrading obfuscated program, and apparatus thereof |
CN1581110A (en) * | 2003-08-13 | 2005-02-16 | 国际商业机器公司 | Safety storage application |
CN1659494A (en) * | 2002-04-12 | 2005-08-24 | 英特尔公司 | Microcode patch authentication |
CN1720715A (en) * | 2002-12-03 | 2006-01-11 | 纳格拉影像股份有限公司 | Method of securing software updates |
US20070101417A1 (en) * | 2005-10-27 | 2007-05-03 | Samsung Electronics Co., Ltd. | Apparatus and method for automatic update |
CN101194229A (en) * | 2005-04-11 | 2008-06-04 | 索尼爱立信移动通讯股份有限公司 | Updating of data instructions |
CN101326510A (en) * | 2005-12-08 | 2008-12-17 | 微软公司 | Peer-to-peer remediation |
CN101924607A (en) * | 2010-08-27 | 2010-12-22 | 华为终端有限公司 | Firmware processing method based on firmware air transmission technology, device and system thereof |
CN102231727A (en) * | 2011-03-18 | 2011-11-02 | 杭州奕锐电子有限公司 | Crypto-delta-transfer-based remote sharing backup recovery method |
CN102707977A (en) * | 2012-05-17 | 2012-10-03 | 江苏中科梦兰电子科技有限公司 | Increment upgrading method based on Android application software |
CN102724308A (en) * | 2012-06-13 | 2012-10-10 | 腾讯科技(深圳)有限公司 | Software update method and software update system |
CN102799445A (en) * | 2012-05-03 | 2012-11-28 | 陈昊 | Application upgrading method based on Android platform and system |
CN103645910A (en) * | 2012-06-27 | 2014-03-19 | 谷歌公司 | Methods for updating applications |
CN103701930A (en) * | 2014-01-07 | 2014-04-02 | 浙江大学 | Mobile application program real-time updating method and system |
-
2014
- 2014-07-11 CN CN201410329360.6A patent/CN105306505A/en active Pending
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1659494A (en) * | 2002-04-12 | 2005-08-24 | 英特尔公司 | Microcode patch authentication |
CN1720715A (en) * | 2002-12-03 | 2006-01-11 | 纳格拉影像股份有限公司 | Method of securing software updates |
CN1574727A (en) * | 2003-05-20 | 2005-02-02 | 三星电子株式会社 | Method of preventing tampering of program, method of upgrading obfuscated program, and apparatus thereof |
CN1581110A (en) * | 2003-08-13 | 2005-02-16 | 国际商业机器公司 | Safety storage application |
CN101194229A (en) * | 2005-04-11 | 2008-06-04 | 索尼爱立信移动通讯股份有限公司 | Updating of data instructions |
US20070101417A1 (en) * | 2005-10-27 | 2007-05-03 | Samsung Electronics Co., Ltd. | Apparatus and method for automatic update |
CN101326510A (en) * | 2005-12-08 | 2008-12-17 | 微软公司 | Peer-to-peer remediation |
CN101924607A (en) * | 2010-08-27 | 2010-12-22 | 华为终端有限公司 | Firmware processing method based on firmware air transmission technology, device and system thereof |
CN102231727A (en) * | 2011-03-18 | 2011-11-02 | 杭州奕锐电子有限公司 | Crypto-delta-transfer-based remote sharing backup recovery method |
CN102799445A (en) * | 2012-05-03 | 2012-11-28 | 陈昊 | Application upgrading method based on Android platform and system |
CN102707977A (en) * | 2012-05-17 | 2012-10-03 | 江苏中科梦兰电子科技有限公司 | Increment upgrading method based on Android application software |
CN102724308A (en) * | 2012-06-13 | 2012-10-10 | 腾讯科技(深圳)有限公司 | Software update method and software update system |
CN103645910A (en) * | 2012-06-27 | 2014-03-19 | 谷歌公司 | Methods for updating applications |
CN103701930A (en) * | 2014-01-07 | 2014-04-02 | 浙江大学 | Mobile application program real-time updating method and system |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111614750A (en) * | 2020-05-19 | 2020-09-01 | 深圳市网心科技有限公司 | Data updating method, system, equipment and storage medium |
CN111614750B (en) * | 2020-05-19 | 2023-05-12 | 深圳市网心科技有限公司 | Data updating method, system, equipment and storage medium |
CN116112388A (en) * | 2023-01-08 | 2023-05-12 | 首钢京唐钢铁联合有限责任公司 | Method and device for transmitting weight of finished steel coil |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12041165B2 (en) | Key updating method, apparatus, and system | |
US10880746B2 (en) | Network connection method, apparatus, storage medium and terminal | |
CN111585760B (en) | Key retrieving method, device, terminal and readable medium | |
CN110417543B (en) | Data encryption method, device and storage medium | |
CN104580167B (en) | A kind of methods, devices and systems transmitting data | |
CN104836664A (en) | Method for executing business processing, device for executing business processing and system for executing business processing | |
CN108809906B (en) | Data processing method, system and device | |
CN107154935B (en) | Service request method and device | |
CN104821937A (en) | Token acquisition method, device and system | |
CN104967601A (en) | Data processing method and apparatus | |
CN105491067A (en) | Key-based business security verification method and device | |
US10454905B2 (en) | Method and apparatus for encrypting and decrypting picture, and device | |
CN104376353A (en) | Two-dimension code generating method, terminal and server and two-dimension code reading method, terminal and server | |
CN106845177A (en) | Cipher management method and system | |
CN105681032A (en) | Key storage method and device as well as key management method and device | |
CN104954126A (en) | Sensitive operation verification method, device and system | |
CN104935955A (en) | Live video stream transmission method, device and system | |
CN104901991A (en) | Methods, devices and system for transferring virtual resource | |
CN104965722A (en) | Method and apparatus for displaying information | |
CN104852802A (en) | Identity verification method, equipment, and system | |
CN103546887A (en) | Application software transmitting method, device and terminal and server | |
CN105530239A (en) | Multimedia data obtaining method and device | |
CN104639394A (en) | Statistical method, device and system for number of users of client | |
US11516654B2 (en) | Method for automatically encrypting short message, storage device and mobile terminal | |
CN105488433A (en) | Terminal key generating method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160203 |