CN108650261A - Mobile terminal system software method for burn-recording based on remote encryption interaction - Google Patents
Mobile terminal system software method for burn-recording based on remote encryption interaction Download PDFInfo
- Publication number
- CN108650261A CN108650261A CN201810438753.9A CN201810438753A CN108650261A CN 108650261 A CN108650261 A CN 108650261A CN 201810438753 A CN201810438753 A CN 201810438753A CN 108650261 A CN108650261 A CN 108650261A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- remote server
- ciphertext
- burning program
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/141—Setup of application sessions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of mobile terminal system software method for burn-recording based on remote encryption interaction.Burning program is first carried out, logs in remote server, completes the register of server.Burning program sends handshake request to mobile terminal, mobile terminal is responded, and is forwarded to remote server, and remote server, which generates, to be responded ciphertext and be sent to mobile terminal, mobile terminal is then decrypted it, judges whether to return to successful message of shaking hands to burning program.Burning program sends interaction request to mobile terminal, and mobile terminal generates request ciphertext and is sent to remote server, and remote server, which receives to generate by processing after message, responds ciphertext, it is sent to mobile terminal again, ciphertext is responded in mobile terminal decryption, and whether judgement is receiveed the response legal, and does respective handling.The present invention more can effectively prevent arbitrarily distorting for mobile terminal system software compared with prior art, reached guarantee system and information security, avoided property and the damaged effect of interests.
Description
Technical field
The invention belongs to program control technology fields, are related to system safety and the software burning of mobile terminal, and in particular to
Mobile terminal system software method for burn-recording based on remote encryption interaction.
Background technology
With the development of mobile internet era, mobile terminal (including the equipment such as mobile phone, tablet) is popularized, carrying
Information is more and more, also increasing to people's work, the influence of life.Therefore, the system of mobile terminal also becomes to get over safely
Come more important, user is not intended to the information on oneself mobile terminal to be deleted, rewrite, and equipment manufacturer is also not intended to the production of oneself
By random burning into other system software in product.
The safety for ensureing mobile terminal system, it is not the one of network information security work by malice burning program to make system
Part.The main stream approach of mobile device burning program is to use system signature verification mode at present, all to be installed to answering for system
With program all must there are one digital certificate, system requirements each be installed into systematic difference program and pass through digital certificate label
Name.This digital certificate is only used for the author of identification application and establishes trusting relationship among applications, for allowing application
Program bag self identity, and for judging whether the application is cracked by others.But digital certificate does not need to the number of authority
Word certificate signature agency qualification, therefore signature can not prevent from being cracked by system.So this method does not ensure that burning data
Legitimacy, not can effectively prevent the generation of the illegal recordable event of software, and this may result in system software or user information
It is destroyed.
Invention content
It is an object of the invention to overcome drawbacks described above in the prior art, a kind of system software making mobile terminal is proposed
The method that can not be maliciously tampered, refresh with user information, by with remote server encryption interact, the mobile end of safety verification
End system software method for burn-recording, can effectively prevent system software to be maliciously tampered, and ensure the safety of system.
To achieve the above object, the technical solution adopted by the present invention is a kind of mobile terminal system based on remote encryption interaction
System software method for burn-recording, specifically includes following steps:
S1:Burning program is executed, remote server is logged in, inputs the account and password of mandate, complete the login of server
Operation;If the account and password bad of input, can not complete subsequent operation;
S2:Mobile terminal and remote server are shaken hands, and burning program sends handshake request to mobile terminal, mobile whole
End is responded, and burning program, which receives the response this, is forwarded to remote server, and remote server communicates by searching for generation
Key ultimately generates response ciphertext, is sent to mobile terminal via burning program, mobile terminal is then decrypted it, sentences
It is disconnected whether to shake hands successful message to burning program return;
S3:Mobile terminal is interacted with remote server, completes software burning, and burning program sends interaction to mobile terminal and asks
It asks, mobile terminal, which receives, to be generated request ciphertext after request and be sent to remote server, and remote server receives after message by processing
It generates and responds ciphertext, then be sent to mobile terminal, ciphertext is responded in mobile terminal decryption, and whether judgement is receiveed the response legal, and does phase
It should handle, primary interaction is completed between mobile terminal and remote server.
Further, step 2 is specific includes the following steps again:
S21:Burning program sends handshake request to mobile terminal, and mobile terminal generates a random number, and together with equipment
ID is sent to burning program together;
S22:Burning program forwards the message to remote server, and remote server is searched by device id, obtains
The corresponding private key of equipment;
S23:Remote server generates a communication key, which is interaction between mobile terminal and remote server
Symmetric cryptographic key, random number and communication key that mobile terminal is sent composition are receiveed the response in plain text, are used in combination private key to it
It is encrypted, generates and respond ciphertext;
S24:It is sent to mobile terminal via burning program, after mobile terminal receives message, it is decrypted with public key,
Then judge whether the random number received is consistent with original random number, if unanimously, preserving communication key, and give burning journey
Sequence returns to successful message of shaking hands;Otherwise, failure information is returned.
Step 3 specifically includes following steps again:
S31:Burning program sends interaction request to mobile terminal;
S32:Mobile terminal generates a random number after receiving above-mentioned request, then with communication key in random number and request
Appearance is encrypted, and generates request ciphertext, and forward it to remote server;
S33:After remote server receives message, handled with communication key decoding request ciphertext, and to request, then
To random number and content-encrypt is responded with communication key, generates and responds ciphertext, then be sent to mobile terminal;
S34:After mobile terminal receives response, ciphertext is responded in decryption, then compares the random number after decryption and original random
Whether number is consistent, if unanimously, it is legal to illustrate to receive the response, and is then handled receiveing the response;Otherwise, description messages
It is abnormal;
S35:So far primary interaction is completed between mobile terminal and remote server.
Above-mentioned burning program is located in PC machine.
Above-mentioned remote server preserves account and the information of mobile terminal device, establishment, modification, deletion with information
And authentication function.
Compared with prior art, the present invention has advantageous effects below:
1. using the method for the invention, mobile terminal can be effectively prevent by the new software of random burning or data.
2. can ensure the correctness of burn recording software or data, burning mistake or illegal information are prevented.
3. effective management of equipment can be realized by preserving mobile terminal device information in server end.
Description of the drawings
Fig. 1 burning program login sequence figures;
Handshake sequence figure between Fig. 2 mobile terminals and remote server;
Sequence chart once interactive between Fig. 3 mobile terminals and remote server.
Specific implementation mode
The implementation of technical solution is described in further detail below in conjunction with the accompanying drawings:
Mobile terminal system software method for burn-recording of the present invention refers to the software method for burn-recording after equipment manufacture,
Without refer to production when burning for the first time.The information such as device id and equipment public key are written in burning for the first time for mobile terminal
To region OTP (One Time Programable) in memory space, while by information preservations such as device id and private keys remote
In journey server, the contents of the section is not introduced in the present invention in range.
The burning of mobile terminal system software is interacted by mobile terminal, burning program and remote server three, jointly
Come what is completed.Have the region one piece of OTP (One Time Programable) in mobile terminal memory space, house device id and
The information such as equipment public key can not be changed and be deleted again after the region carries out a burning;Other memory spaces house system
Software information and user information.Burning program is located at PC machine, connects mobile terminal and remote server, controls entire burning stream
Journey.Remote server preserves account and the information of mobile terminal device, can be with establishment, modification, deletion and the verification of information
Etc. functions.
First, ensure that PC machine can be connected (connection type includes but not limited to LAN, internet) with remote server, and
Burning program is executed in PC machine.Before executing system software burning, burning program needs to complete the login behaviour of remote server
Make, otherwise burning program login sequence with remote server as shown in Figure 1, can not carry out subsequent interaction, and then complete software
Burning.This login account can be understood as administrator's account, and by mobile terminal business men or department holds after sale, believe for equipment
Breath inquiry and the maintenance of system software, upgrading.
Before carrying out burning, need to complete handshake operation before mobile terminal and remote server.
First, burning program sends handshake request to mobile terminal, and mobile terminal is read after receiving request from OTP region
Go out device id, then generates a random number, it is sent to burning program together with device id.Burning program turns the message
It is dealt into remote server.It after remote server receives message, is searched by device id, obtains the corresponding private key of equipment;With
Remote server generates a communication key afterwards, which is the symmetric cryptography of interaction between mobile terminal and remote server
Key;Following remote server receives the response random number and the communication key composition that mobile terminal is sent in plain text, is used in combination and sets
It is encrypted in standby corresponding private key, generates and responds ciphertext;Then it is sent to burning program and goes to mobile terminal.Mobile terminal
After receiving message, it is decrypted with public key, then judges whether the random number received is consistent with original random number, if
Unanimously, illustrate to receive the response correct, mobile terminal preserves communication key, and returns to successful message of shaking hands to burning program;It is no
Then, illustrate that mistake of receiveing the response, return are shaken hands unsuccessfully.Flow entirely between mobile terminal and remote server is as shown in Figure 2.
After mobile terminal and remote server complete handshake operation, you can carry out the burning of system software, this process
Belong to the interactive process between mobile terminal and remote server.Interaction between mobile terminal and remote server is question-response
Mode, in order to ensure data that mobile terminal receives all be it is legal, interaction message use communication key encrypted random number and
The mode of message content.
The burning process of mobile terminal system software can be regarded as several friendships between mobile terminal and remote server
Mutual process.Sequence chart once interactive between mobile terminal and remote server is burnt as shown in figure 3, for each interactive process
Record program and first send interaction request to mobile terminal, mobile terminal generates a random number after receiving request, then by random number and
Request content merges composition message in plain text, is used in combination communication key that it is encrypted, and generates request ciphertext, will then ask ciphertext
It is forwarded to remote server via burning program.After remote server receives message, with communication key decoding request ciphertext, and it is right
Request is handled, and is subsequently generated receive the response (including random number and response content) in plain text, is added to it with communication key
It is close, it generates and responds ciphertext, be then sent to mobile terminal.After mobile terminal receives response, ciphertext is responded in decryption, and after comparing decryption
Random number it is whether consistent with original random number, if unanimously, it is legal to illustrate to receive the response, and is located to receiveing the response
Reason, and return to interaction success to burning program;Otherwise, description messages are abnormal, return to interaction failure.So far, mobile terminal and remote
Primary interaction is just completed between journey server.
It should be noted that the description of the above specific implementation mode is not intended to limit the invention, all essences in the present invention
God and any modification, equivalent replacement, improvement and so within principle, should all be included in the protection scope of the present invention.
Claims (5)
1. the mobile terminal system software method for burn-recording based on remote encryption interaction, it is characterised in that include the following steps:
S1:Burning program is executed, the account and password of mandate is inputted, completes the register of server;If the account of input
And password bad, then it can not complete subsequent operation;
S2:Mobile terminal and remote server are shaken hands, burning program to mobile terminal send handshake request, mobile terminal into
Row respond, burning program, which receives the response this, is forwarded to remote server, remote server by searching for generate communication key,
Response ciphertext is ultimately generated, is sent to mobile terminal via burning program, movement is then decrypted it, judges whether to burning
Record program returns to successful message of shaking hands;
S3:Mobile terminal is interacted with remote server, completes software burning, and burning program sends interaction request to mobile terminal,
Generation request ciphertext is sent to remote server after mobile terminal receives request, and remote server generates after receiving message by processing
Ciphertext is responded, then is sent to mobile terminal, ciphertext is responded in mobile terminal decryption, and whether judgement is receiveed the response legal, and does corresponding position
Reason completes primary interaction between mobile terminal and remote server.
2. the mobile terminal system software method for burn-recording according to claim 1 based on remote encryption interaction, feature exist
In step 2 specifically includes following steps:
S21:Burning program sends handshake request to mobile terminal, and mobile terminal generates a random number, and together with device id one
It rises and is sent to burning program;
S22:Burning program forwards the message to remote server, and remote server is searched by device id, obtains equipment
Corresponding private key;
S23:Remote server generates a communication key, which is pair of interaction between mobile terminal and remote server
Claim encryption key, random number and the communication key composition that mobile terminal is sent are receiveed the response in plain text, private key is used in combination to carry out it
Encryption generates and responds ciphertext;
S24:It is sent to mobile terminal via burning program, after mobile terminal receives message, it is decrypted with public key, then
Judge whether the random number received is consistent with original random number, if unanimously, preserving communication key, and return to burning program
Return successful message of shaking hands;Otherwise, failure information is returned.
3. the mobile terminal system software method for burn-recording according to claim 1 based on remote encryption interaction, feature exist
In step 3 specifically includes following steps:
S31:Burning program sends interaction request to mobile terminal;
S32:Mobile terminal generates a random number after receiving above-mentioned request, then with communication key to random number and request content into
Row encryption generates request ciphertext, and forwards it to remote server;
S33:It after remote server receives message, is handled with communication key decoding request ciphertext, and to request, then with logical
It interrogates key pair random number and responds content-encrypt, generate and respond ciphertext, then be sent to mobile terminal;
S34:After mobile terminal receives response, ciphertext is responded in decryption, and then comparing random number and original random number after decryption is
It is no consistent, if unanimously, it is legal to illustrate to receive the response, and is then handled receiveing the response;Otherwise, description messages are different
Often;
S35:So far primary interaction is completed between mobile terminal and remote server.
4. the mobile terminal system software method for burn-recording according to claim 1 based on remote encryption interaction, feature exist
It is located in PC machine in the burning program.
5. the mobile terminal system software method for burn-recording according to claim 1 based on remote encryption interaction, feature exist
Account and the information of mobile terminal device are preserved in the remote server, establishment, modification, deletion and verification with information
Function.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810438753.9A CN108650261B (en) | 2018-05-09 | 2018-05-09 | Mobile terminal system software burning method based on remote encryption interaction |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810438753.9A CN108650261B (en) | 2018-05-09 | 2018-05-09 | Mobile terminal system software burning method based on remote encryption interaction |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108650261A true CN108650261A (en) | 2018-10-12 |
CN108650261B CN108650261B (en) | 2021-03-05 |
Family
ID=63754155
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810438753.9A Active CN108650261B (en) | 2018-05-09 | 2018-05-09 | Mobile terminal system software burning method based on remote encryption interaction |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108650261B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109150526A (en) * | 2018-11-02 | 2019-01-04 | 美的集团股份有限公司 | Cryptographic key negotiation method, equipment, terminal, storage medium and system |
CN110109683A (en) * | 2019-03-29 | 2019-08-09 | 广州市星翼电子科技有限公司 | A method of long-range burning is realized by networking |
CN110816089A (en) * | 2019-10-15 | 2020-02-21 | 佛山普瑞威尔科技有限公司 | Safe burning method of printing program, chip and printing consumable |
CN111797038A (en) * | 2020-07-03 | 2020-10-20 | 深圳市慧为智能科技股份有限公司 | Burning control method, system, device, equipment and computer readable storage medium |
CN112463175A (en) * | 2020-11-24 | 2021-03-09 | 海光信息技术股份有限公司 | Chip burning method and system and electronic equipment |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1960363A (en) * | 2006-09-12 | 2007-05-09 | 北京飞天诚信科技有限公司 | Method and equipment for implementing remote updating information security devices through network |
CN102970305A (en) * | 2012-12-07 | 2013-03-13 | 成都康禾科技有限公司 | Deployment method suitable for automatic software installation |
CN104065482A (en) * | 2014-06-06 | 2014-09-24 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for improving terminalself-flashing safety through ciphertext handshaking |
CN105323062A (en) * | 2014-06-03 | 2016-02-10 | 北京收付宝科技有限公司 | Mobile terminal digital certificate electronic signature method |
US20160164863A1 (en) * | 2013-03-11 | 2016-06-09 | Amazon Technologies, Inc. | Proxy server-based network site account management |
CN106161368A (en) * | 2015-04-07 | 2016-11-23 | 阿里巴巴集团控股有限公司 | It is a kind of for cloud application is carried out remote access method, Apparatus and system |
US20170111334A1 (en) * | 2011-12-16 | 2017-04-20 | Akamai Technologies, Inc. | Providing forward secrecy in a terminating TLS connection proxy |
CN107395634A (en) * | 2017-08-25 | 2017-11-24 | 中南大学 | A kind of wearable device without password authentication method |
-
2018
- 2018-05-09 CN CN201810438753.9A patent/CN108650261B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1960363A (en) * | 2006-09-12 | 2007-05-09 | 北京飞天诚信科技有限公司 | Method and equipment for implementing remote updating information security devices through network |
US20170111334A1 (en) * | 2011-12-16 | 2017-04-20 | Akamai Technologies, Inc. | Providing forward secrecy in a terminating TLS connection proxy |
CN102970305A (en) * | 2012-12-07 | 2013-03-13 | 成都康禾科技有限公司 | Deployment method suitable for automatic software installation |
US20160164863A1 (en) * | 2013-03-11 | 2016-06-09 | Amazon Technologies, Inc. | Proxy server-based network site account management |
CN105323062A (en) * | 2014-06-03 | 2016-02-10 | 北京收付宝科技有限公司 | Mobile terminal digital certificate electronic signature method |
CN104065482A (en) * | 2014-06-06 | 2014-09-24 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for improving terminalself-flashing safety through ciphertext handshaking |
CN106161368A (en) * | 2015-04-07 | 2016-11-23 | 阿里巴巴集团控股有限公司 | It is a kind of for cloud application is carried out remote access method, Apparatus and system |
CN107395634A (en) * | 2017-08-25 | 2017-11-24 | 中南大学 | A kind of wearable device without password authentication method |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109150526A (en) * | 2018-11-02 | 2019-01-04 | 美的集团股份有限公司 | Cryptographic key negotiation method, equipment, terminal, storage medium and system |
CN110109683A (en) * | 2019-03-29 | 2019-08-09 | 广州市星翼电子科技有限公司 | A method of long-range burning is realized by networking |
CN110816089A (en) * | 2019-10-15 | 2020-02-21 | 佛山普瑞威尔科技有限公司 | Safe burning method of printing program, chip and printing consumable |
CN110816089B (en) * | 2019-10-15 | 2021-11-05 | 佛山普瑞威尔科技有限公司 | Safe burning method of printing program, chip and printing consumable |
CN111797038A (en) * | 2020-07-03 | 2020-10-20 | 深圳市慧为智能科技股份有限公司 | Burning control method, system, device, equipment and computer readable storage medium |
CN111797038B (en) * | 2020-07-03 | 2021-12-10 | 深圳市慧为智能科技股份有限公司 | Burning control method, system, device, equipment and computer readable storage medium |
CN112463175A (en) * | 2020-11-24 | 2021-03-09 | 海光信息技术股份有限公司 | Chip burning method and system and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN108650261B (en) | 2021-03-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109858262B (en) | Process approval method, device and system based on block chain system and storage medium | |
CN108650261A (en) | Mobile terminal system software method for burn-recording based on remote encryption interaction | |
CN104520805B (en) | According to the security application ecosystem with key and data exchange of company information control strategy | |
JP4668619B2 (en) | Device key | |
CN108064440A (en) | FIDO authentication method, device and system based on block chain | |
US9235731B2 (en) | Trusted data relay | |
CN108537046A (en) | A kind of online contract signature system and method based on block chain technology | |
CN106104562A (en) | Safety of secret data stores and recovery system and method | |
CN105103488A (en) | Policy enforcement with associated data | |
CN104662870A (en) | Data security management system | |
CN104868998B (en) | A kind of system, apparatus and method that encryption data is supplied to electronic equipment | |
US9356787B2 (en) | Secure communication architecture including sniffer | |
CN101727558B (en) | Method for clearing password of computer, computer and server | |
CN105471901A (en) | Industrial information security authentication system | |
US9350736B2 (en) | System and method for isolating mobile data | |
CN114697082B (en) | Production and application method of encryption and decryption device in server-free environment | |
CN114036495B (en) | Method and device for updating privatized deployment verification code system | |
CN106790036A (en) | A kind of information tamper resistant method, device, server and terminal | |
CN106529216B (en) | Software authorization system and software authorization method based on public storage platform | |
CN110708155A (en) | Copyright information protection method, copyright information protection system, copyright confirming method, copyright confirming device, copyright confirming equipment and copyright confirming medium | |
WO2011058629A1 (en) | Information management system | |
Derksen et al. | Backup and Recovery of IRMA Credentials | |
KR101693085B1 (en) | Device and method for approval of file export | |
CN116112167B (en) | Key management system, method and device | |
WO2024088145A1 (en) | Data processing method and apparatus, and program product, computer device and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |