CN108650261A - Mobile terminal system software method for burn-recording based on remote encryption interaction - Google Patents

Mobile terminal system software method for burn-recording based on remote encryption interaction Download PDF

Info

Publication number
CN108650261A
CN108650261A CN201810438753.9A CN201810438753A CN108650261A CN 108650261 A CN108650261 A CN 108650261A CN 201810438753 A CN201810438753 A CN 201810438753A CN 108650261 A CN108650261 A CN 108650261A
Authority
CN
China
Prior art keywords
mobile terminal
remote server
ciphertext
burning program
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810438753.9A
Other languages
Chinese (zh)
Other versions
CN108650261B (en
Inventor
黄萍
卢谢吉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Information Science and Technology
Original Assignee
Nanjing University of Information Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Information Science and Technology filed Critical Nanjing University of Information Science and Technology
Priority to CN201810438753.9A priority Critical patent/CN108650261B/en
Publication of CN108650261A publication Critical patent/CN108650261A/en
Application granted granted Critical
Publication of CN108650261B publication Critical patent/CN108650261B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of mobile terminal system software method for burn-recording based on remote encryption interaction.Burning program is first carried out, logs in remote server, completes the register of server.Burning program sends handshake request to mobile terminal, mobile terminal is responded, and is forwarded to remote server, and remote server, which generates, to be responded ciphertext and be sent to mobile terminal, mobile terminal is then decrypted it, judges whether to return to successful message of shaking hands to burning program.Burning program sends interaction request to mobile terminal, and mobile terminal generates request ciphertext and is sent to remote server, and remote server, which receives to generate by processing after message, responds ciphertext, it is sent to mobile terminal again, ciphertext is responded in mobile terminal decryption, and whether judgement is receiveed the response legal, and does respective handling.The present invention more can effectively prevent arbitrarily distorting for mobile terminal system software compared with prior art, reached guarantee system and information security, avoided property and the damaged effect of interests.

Description

Mobile terminal system software method for burn-recording based on remote encryption interaction
Technical field
The invention belongs to program control technology fields, are related to system safety and the software burning of mobile terminal, and in particular to Mobile terminal system software method for burn-recording based on remote encryption interaction.
Background technology
With the development of mobile internet era, mobile terminal (including the equipment such as mobile phone, tablet) is popularized, carrying Information is more and more, also increasing to people's work, the influence of life.Therefore, the system of mobile terminal also becomes to get over safely Come more important, user is not intended to the information on oneself mobile terminal to be deleted, rewrite, and equipment manufacturer is also not intended to the production of oneself By random burning into other system software in product.
The safety for ensureing mobile terminal system, it is not the one of network information security work by malice burning program to make system Part.The main stream approach of mobile device burning program is to use system signature verification mode at present, all to be installed to answering for system With program all must there are one digital certificate, system requirements each be installed into systematic difference program and pass through digital certificate label Name.This digital certificate is only used for the author of identification application and establishes trusting relationship among applications, for allowing application Program bag self identity, and for judging whether the application is cracked by others.But digital certificate does not need to the number of authority Word certificate signature agency qualification, therefore signature can not prevent from being cracked by system.So this method does not ensure that burning data Legitimacy, not can effectively prevent the generation of the illegal recordable event of software, and this may result in system software or user information It is destroyed.
Invention content
It is an object of the invention to overcome drawbacks described above in the prior art, a kind of system software making mobile terminal is proposed The method that can not be maliciously tampered, refresh with user information, by with remote server encryption interact, the mobile end of safety verification End system software method for burn-recording, can effectively prevent system software to be maliciously tampered, and ensure the safety of system.
To achieve the above object, the technical solution adopted by the present invention is a kind of mobile terminal system based on remote encryption interaction System software method for burn-recording, specifically includes following steps:
S1:Burning program is executed, remote server is logged in, inputs the account and password of mandate, complete the login of server Operation;If the account and password bad of input, can not complete subsequent operation;
S2:Mobile terminal and remote server are shaken hands, and burning program sends handshake request to mobile terminal, mobile whole End is responded, and burning program, which receives the response this, is forwarded to remote server, and remote server communicates by searching for generation Key ultimately generates response ciphertext, is sent to mobile terminal via burning program, mobile terminal is then decrypted it, sentences It is disconnected whether to shake hands successful message to burning program return;
S3:Mobile terminal is interacted with remote server, completes software burning, and burning program sends interaction to mobile terminal and asks It asks, mobile terminal, which receives, to be generated request ciphertext after request and be sent to remote server, and remote server receives after message by processing It generates and responds ciphertext, then be sent to mobile terminal, ciphertext is responded in mobile terminal decryption, and whether judgement is receiveed the response legal, and does phase It should handle, primary interaction is completed between mobile terminal and remote server.
Further, step 2 is specific includes the following steps again:
S21:Burning program sends handshake request to mobile terminal, and mobile terminal generates a random number, and together with equipment ID is sent to burning program together;
S22:Burning program forwards the message to remote server, and remote server is searched by device id, obtains The corresponding private key of equipment;
S23:Remote server generates a communication key, which is interaction between mobile terminal and remote server Symmetric cryptographic key, random number and communication key that mobile terminal is sent composition are receiveed the response in plain text, are used in combination private key to it It is encrypted, generates and respond ciphertext;
S24:It is sent to mobile terminal via burning program, after mobile terminal receives message, it is decrypted with public key, Then judge whether the random number received is consistent with original random number, if unanimously, preserving communication key, and give burning journey Sequence returns to successful message of shaking hands;Otherwise, failure information is returned.
Step 3 specifically includes following steps again:
S31:Burning program sends interaction request to mobile terminal;
S32:Mobile terminal generates a random number after receiving above-mentioned request, then with communication key in random number and request Appearance is encrypted, and generates request ciphertext, and forward it to remote server;
S33:After remote server receives message, handled with communication key decoding request ciphertext, and to request, then To random number and content-encrypt is responded with communication key, generates and responds ciphertext, then be sent to mobile terminal;
S34:After mobile terminal receives response, ciphertext is responded in decryption, then compares the random number after decryption and original random Whether number is consistent, if unanimously, it is legal to illustrate to receive the response, and is then handled receiveing the response;Otherwise, description messages It is abnormal;
S35:So far primary interaction is completed between mobile terminal and remote server.
Above-mentioned burning program is located in PC machine.
Above-mentioned remote server preserves account and the information of mobile terminal device, establishment, modification, deletion with information And authentication function.
Compared with prior art, the present invention has advantageous effects below:
1. using the method for the invention, mobile terminal can be effectively prevent by the new software of random burning or data.
2. can ensure the correctness of burn recording software or data, burning mistake or illegal information are prevented.
3. effective management of equipment can be realized by preserving mobile terminal device information in server end.
Description of the drawings
Fig. 1 burning program login sequence figures;
Handshake sequence figure between Fig. 2 mobile terminals and remote server;
Sequence chart once interactive between Fig. 3 mobile terminals and remote server.
Specific implementation mode
The implementation of technical solution is described in further detail below in conjunction with the accompanying drawings:
Mobile terminal system software method for burn-recording of the present invention refers to the software method for burn-recording after equipment manufacture, Without refer to production when burning for the first time.The information such as device id and equipment public key are written in burning for the first time for mobile terminal To region OTP (One Time Programable) in memory space, while by information preservations such as device id and private keys remote In journey server, the contents of the section is not introduced in the present invention in range.
The burning of mobile terminal system software is interacted by mobile terminal, burning program and remote server three, jointly Come what is completed.Have the region one piece of OTP (One Time Programable) in mobile terminal memory space, house device id and The information such as equipment public key can not be changed and be deleted again after the region carries out a burning;Other memory spaces house system Software information and user information.Burning program is located at PC machine, connects mobile terminal and remote server, controls entire burning stream Journey.Remote server preserves account and the information of mobile terminal device, can be with establishment, modification, deletion and the verification of information Etc. functions.
First, ensure that PC machine can be connected (connection type includes but not limited to LAN, internet) with remote server, and Burning program is executed in PC machine.Before executing system software burning, burning program needs to complete the login behaviour of remote server Make, otherwise burning program login sequence with remote server as shown in Figure 1, can not carry out subsequent interaction, and then complete software Burning.This login account can be understood as administrator's account, and by mobile terminal business men or department holds after sale, believe for equipment Breath inquiry and the maintenance of system software, upgrading.
Before carrying out burning, need to complete handshake operation before mobile terminal and remote server.
First, burning program sends handshake request to mobile terminal, and mobile terminal is read after receiving request from OTP region Go out device id, then generates a random number, it is sent to burning program together with device id.Burning program turns the message It is dealt into remote server.It after remote server receives message, is searched by device id, obtains the corresponding private key of equipment;With Remote server generates a communication key afterwards, which is the symmetric cryptography of interaction between mobile terminal and remote server Key;Following remote server receives the response random number and the communication key composition that mobile terminal is sent in plain text, is used in combination and sets It is encrypted in standby corresponding private key, generates and responds ciphertext;Then it is sent to burning program and goes to mobile terminal.Mobile terminal After receiving message, it is decrypted with public key, then judges whether the random number received is consistent with original random number, if Unanimously, illustrate to receive the response correct, mobile terminal preserves communication key, and returns to successful message of shaking hands to burning program;It is no Then, illustrate that mistake of receiveing the response, return are shaken hands unsuccessfully.Flow entirely between mobile terminal and remote server is as shown in Figure 2.
After mobile terminal and remote server complete handshake operation, you can carry out the burning of system software, this process Belong to the interactive process between mobile terminal and remote server.Interaction between mobile terminal and remote server is question-response Mode, in order to ensure data that mobile terminal receives all be it is legal, interaction message use communication key encrypted random number and The mode of message content.
The burning process of mobile terminal system software can be regarded as several friendships between mobile terminal and remote server Mutual process.Sequence chart once interactive between mobile terminal and remote server is burnt as shown in figure 3, for each interactive process Record program and first send interaction request to mobile terminal, mobile terminal generates a random number after receiving request, then by random number and Request content merges composition message in plain text, is used in combination communication key that it is encrypted, and generates request ciphertext, will then ask ciphertext It is forwarded to remote server via burning program.After remote server receives message, with communication key decoding request ciphertext, and it is right Request is handled, and is subsequently generated receive the response (including random number and response content) in plain text, is added to it with communication key It is close, it generates and responds ciphertext, be then sent to mobile terminal.After mobile terminal receives response, ciphertext is responded in decryption, and after comparing decryption Random number it is whether consistent with original random number, if unanimously, it is legal to illustrate to receive the response, and is located to receiveing the response Reason, and return to interaction success to burning program;Otherwise, description messages are abnormal, return to interaction failure.So far, mobile terminal and remote Primary interaction is just completed between journey server.
It should be noted that the description of the above specific implementation mode is not intended to limit the invention, all essences in the present invention God and any modification, equivalent replacement, improvement and so within principle, should all be included in the protection scope of the present invention.

Claims (5)

1. the mobile terminal system software method for burn-recording based on remote encryption interaction, it is characterised in that include the following steps:
S1:Burning program is executed, the account and password of mandate is inputted, completes the register of server;If the account of input And password bad, then it can not complete subsequent operation;
S2:Mobile terminal and remote server are shaken hands, burning program to mobile terminal send handshake request, mobile terminal into Row respond, burning program, which receives the response this, is forwarded to remote server, remote server by searching for generate communication key, Response ciphertext is ultimately generated, is sent to mobile terminal via burning program, movement is then decrypted it, judges whether to burning Record program returns to successful message of shaking hands;
S3:Mobile terminal is interacted with remote server, completes software burning, and burning program sends interaction request to mobile terminal, Generation request ciphertext is sent to remote server after mobile terminal receives request, and remote server generates after receiving message by processing Ciphertext is responded, then is sent to mobile terminal, ciphertext is responded in mobile terminal decryption, and whether judgement is receiveed the response legal, and does corresponding position Reason completes primary interaction between mobile terminal and remote server.
2. the mobile terminal system software method for burn-recording according to claim 1 based on remote encryption interaction, feature exist In step 2 specifically includes following steps:
S21:Burning program sends handshake request to mobile terminal, and mobile terminal generates a random number, and together with device id one It rises and is sent to burning program;
S22:Burning program forwards the message to remote server, and remote server is searched by device id, obtains equipment Corresponding private key;
S23:Remote server generates a communication key, which is pair of interaction between mobile terminal and remote server Claim encryption key, random number and the communication key composition that mobile terminal is sent are receiveed the response in plain text, private key is used in combination to carry out it Encryption generates and responds ciphertext;
S24:It is sent to mobile terminal via burning program, after mobile terminal receives message, it is decrypted with public key, then Judge whether the random number received is consistent with original random number, if unanimously, preserving communication key, and return to burning program Return successful message of shaking hands;Otherwise, failure information is returned.
3. the mobile terminal system software method for burn-recording according to claim 1 based on remote encryption interaction, feature exist In step 3 specifically includes following steps:
S31:Burning program sends interaction request to mobile terminal;
S32:Mobile terminal generates a random number after receiving above-mentioned request, then with communication key to random number and request content into Row encryption generates request ciphertext, and forwards it to remote server;
S33:It after remote server receives message, is handled with communication key decoding request ciphertext, and to request, then with logical It interrogates key pair random number and responds content-encrypt, generate and respond ciphertext, then be sent to mobile terminal;
S34:After mobile terminal receives response, ciphertext is responded in decryption, and then comparing random number and original random number after decryption is It is no consistent, if unanimously, it is legal to illustrate to receive the response, and is then handled receiveing the response;Otherwise, description messages are different Often;
S35:So far primary interaction is completed between mobile terminal and remote server.
4. the mobile terminal system software method for burn-recording according to claim 1 based on remote encryption interaction, feature exist It is located in PC machine in the burning program.
5. the mobile terminal system software method for burn-recording according to claim 1 based on remote encryption interaction, feature exist Account and the information of mobile terminal device are preserved in the remote server, establishment, modification, deletion and verification with information Function.
CN201810438753.9A 2018-05-09 2018-05-09 Mobile terminal system software burning method based on remote encryption interaction Active CN108650261B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810438753.9A CN108650261B (en) 2018-05-09 2018-05-09 Mobile terminal system software burning method based on remote encryption interaction

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810438753.9A CN108650261B (en) 2018-05-09 2018-05-09 Mobile terminal system software burning method based on remote encryption interaction

Publications (2)

Publication Number Publication Date
CN108650261A true CN108650261A (en) 2018-10-12
CN108650261B CN108650261B (en) 2021-03-05

Family

ID=63754155

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810438753.9A Active CN108650261B (en) 2018-05-09 2018-05-09 Mobile terminal system software burning method based on remote encryption interaction

Country Status (1)

Country Link
CN (1) CN108650261B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109150526A (en) * 2018-11-02 2019-01-04 美的集团股份有限公司 Cryptographic key negotiation method, equipment, terminal, storage medium and system
CN110109683A (en) * 2019-03-29 2019-08-09 广州市星翼电子科技有限公司 A method of long-range burning is realized by networking
CN110816089A (en) * 2019-10-15 2020-02-21 佛山普瑞威尔科技有限公司 Safe burning method of printing program, chip and printing consumable
CN111797038A (en) * 2020-07-03 2020-10-20 深圳市慧为智能科技股份有限公司 Burning control method, system, device, equipment and computer readable storage medium
CN112463175A (en) * 2020-11-24 2021-03-09 海光信息技术股份有限公司 Chip burning method and system and electronic equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1960363A (en) * 2006-09-12 2007-05-09 北京飞天诚信科技有限公司 Method and equipment for implementing remote updating information security devices through network
CN102970305A (en) * 2012-12-07 2013-03-13 成都康禾科技有限公司 Deployment method suitable for automatic software installation
CN104065482A (en) * 2014-06-06 2014-09-24 宇龙计算机通信科技(深圳)有限公司 Method and device for improving terminalself-flashing safety through ciphertext handshaking
CN105323062A (en) * 2014-06-03 2016-02-10 北京收付宝科技有限公司 Mobile terminal digital certificate electronic signature method
US20160164863A1 (en) * 2013-03-11 2016-06-09 Amazon Technologies, Inc. Proxy server-based network site account management
CN106161368A (en) * 2015-04-07 2016-11-23 阿里巴巴集团控股有限公司 It is a kind of for cloud application is carried out remote access method, Apparatus and system
US20170111334A1 (en) * 2011-12-16 2017-04-20 Akamai Technologies, Inc. Providing forward secrecy in a terminating TLS connection proxy
CN107395634A (en) * 2017-08-25 2017-11-24 中南大学 A kind of wearable device without password authentication method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1960363A (en) * 2006-09-12 2007-05-09 北京飞天诚信科技有限公司 Method and equipment for implementing remote updating information security devices through network
US20170111334A1 (en) * 2011-12-16 2017-04-20 Akamai Technologies, Inc. Providing forward secrecy in a terminating TLS connection proxy
CN102970305A (en) * 2012-12-07 2013-03-13 成都康禾科技有限公司 Deployment method suitable for automatic software installation
US20160164863A1 (en) * 2013-03-11 2016-06-09 Amazon Technologies, Inc. Proxy server-based network site account management
CN105323062A (en) * 2014-06-03 2016-02-10 北京收付宝科技有限公司 Mobile terminal digital certificate electronic signature method
CN104065482A (en) * 2014-06-06 2014-09-24 宇龙计算机通信科技(深圳)有限公司 Method and device for improving terminalself-flashing safety through ciphertext handshaking
CN106161368A (en) * 2015-04-07 2016-11-23 阿里巴巴集团控股有限公司 It is a kind of for cloud application is carried out remote access method, Apparatus and system
CN107395634A (en) * 2017-08-25 2017-11-24 中南大学 A kind of wearable device without password authentication method

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109150526A (en) * 2018-11-02 2019-01-04 美的集团股份有限公司 Cryptographic key negotiation method, equipment, terminal, storage medium and system
CN110109683A (en) * 2019-03-29 2019-08-09 广州市星翼电子科技有限公司 A method of long-range burning is realized by networking
CN110816089A (en) * 2019-10-15 2020-02-21 佛山普瑞威尔科技有限公司 Safe burning method of printing program, chip and printing consumable
CN110816089B (en) * 2019-10-15 2021-11-05 佛山普瑞威尔科技有限公司 Safe burning method of printing program, chip and printing consumable
CN111797038A (en) * 2020-07-03 2020-10-20 深圳市慧为智能科技股份有限公司 Burning control method, system, device, equipment and computer readable storage medium
CN111797038B (en) * 2020-07-03 2021-12-10 深圳市慧为智能科技股份有限公司 Burning control method, system, device, equipment and computer readable storage medium
CN112463175A (en) * 2020-11-24 2021-03-09 海光信息技术股份有限公司 Chip burning method and system and electronic equipment

Also Published As

Publication number Publication date
CN108650261B (en) 2021-03-05

Similar Documents

Publication Publication Date Title
CN109858262B (en) Process approval method, device and system based on block chain system and storage medium
CN108650261A (en) Mobile terminal system software method for burn-recording based on remote encryption interaction
CN104520805B (en) According to the security application ecosystem with key and data exchange of company information control strategy
JP4668619B2 (en) Device key
CN108064440A (en) FIDO authentication method, device and system based on block chain
US9235731B2 (en) Trusted data relay
CN108537046A (en) A kind of online contract signature system and method based on block chain technology
CN106104562A (en) Safety of secret data stores and recovery system and method
CN105103488A (en) Policy enforcement with associated data
CN104662870A (en) Data security management system
CN104868998B (en) A kind of system, apparatus and method that encryption data is supplied to electronic equipment
US9356787B2 (en) Secure communication architecture including sniffer
CN101727558B (en) Method for clearing password of computer, computer and server
CN105471901A (en) Industrial information security authentication system
US9350736B2 (en) System and method for isolating mobile data
CN114697082B (en) Production and application method of encryption and decryption device in server-free environment
CN114036495B (en) Method and device for updating privatized deployment verification code system
CN106790036A (en) A kind of information tamper resistant method, device, server and terminal
CN106529216B (en) Software authorization system and software authorization method based on public storage platform
CN110708155A (en) Copyright information protection method, copyright information protection system, copyright confirming method, copyright confirming device, copyright confirming equipment and copyright confirming medium
WO2011058629A1 (en) Information management system
Derksen et al. Backup and Recovery of IRMA Credentials
KR101693085B1 (en) Device and method for approval of file export
CN116112167B (en) Key management system, method and device
WO2024088145A1 (en) Data processing method and apparatus, and program product, computer device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant