CN109889589A - One kind realizing embedded hardware OTA upgrade-system and method based on block chain - Google Patents
One kind realizing embedded hardware OTA upgrade-system and method based on block chain Download PDFInfo
- Publication number
- CN109889589A CN109889589A CN201910119485.9A CN201910119485A CN109889589A CN 109889589 A CN109889589 A CN 109889589A CN 201910119485 A CN201910119485 A CN 201910119485A CN 109889589 A CN109889589 A CN 109889589A
- Authority
- CN
- China
- Prior art keywords
- firmware
- node
- service node
- block chain
- intelligent terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses one kind to realize embedded hardware OTA upgrade-system and method based on block chain, this method: the P2P network topology structure of one service node including the downloading of multiple firmwares of building;Using a service node as the first block node, a block node on block chain is one by one converted other service nodes in P2P network to by block chain common recognition authentication mechanism;Latest firmware software is stored on service node, and the hash value that the service node is calculated is carried out using hash algorithm to node content;Wherein, node content includes the characteristic information of service node and the firmware software stored thereon;Intelligent terminal downloads corresponding hash value from the service node of P2P network, carries out firmware version safety check according to the hash value, and downloads, saves the firmware software for passing through verification, and upgraded using the firmware software.The present invention establishes safe and reliable P2P network topology structure using block chain technology, improves intelligent terminal OTA and upgrades reliability and safety.
Description
Technical field
The present invention relates to intelligent terminal remote upgrade technical fields, and in particular to one kind is realized embedded hard based on block chain
Part OTA upgrade-system and method.
Background technique
With the fast development of current Intelligent terminal for Internet of things, occur various types of intelligent terminals, such as intelligence in the market
Energy household electrical appliances, smart home, intelligent sound box etc., and most intelligent terminal all supports wireless (WiFi) function, to facilitate this
A little equipment networkings.Due to the upgrading of later product function or the reparation etc. of system safety problem, intelligent terminal software
Remote upgrade (OTA:Over-the-Air) its firmware under connected state is needed, to facilitate user and reduce intelligent terminal life
Produce the operation maintenance cost of manufacturer;There are following several common technology schemes at present:
(1) intelligent terminal production firm provides a fixed network service address, directly uploads and updates firmware, and is indefinite
Phase pushes OTA upgrading message to the intelligent terminal networked;Intelligent terminal opens automatically after comparing version number after receiving that message
Dynamic firmware upgrade procedure;
(2) user can be searched by the network service address for the fixation that intelligent terminal production firm provides and need to be upgraded most
New firmware software, and be downloaded to local, then it is triggered by the external interface (such as USB or serial ports) of intelligent terminal itself
Built-in firmware upgrade procedure;
(3) user applies APP by mobile terminal matched with intelligent terminal, is directly connected to firmware background server, finds
And download or push corresponding intelligent terminal firmware, reuse wireless or be locally-downloaded, then being pushed in a manner of importing needs to rise
The firmware of grade completes OTA upgrading.
Although existing technology can allow its intelligent terminal firmware of user's remote upgrade, have the disadvantage in that once raw
It produces manufacturer to decide not to safeguard the intelligent terminal firmware or production firm's break, user not only may lost its intelligence eventually
Firmware upgrade is held to the final opportunity of latest edition, the networking intelligent terminal not upgraded is made to be faced with various functional or safeties
Potential risk, it is often more important that, the third company of some malice or individual, it is easy to solid by establishing its imitated OTA
Part upgrade service continues as the intelligent terminal networked and carries out OTA upgrading, if intelligent terminal OTA firmware upgrade procedure lacks one
Fixed secure authentication mechanisms may make equipment occur maliciously being controlled after upgrading third party's firmware automatically and cause personal hidden
The major safety problems such as private leakage.
In view of this, being badly in need of improving existing intelligent terminal OTA upgrading scheme, intelligent terminal OTA upgrading is improved
Reliability and safety, prevent OTA firmware by third party malice distort.
Summary of the invention
The technical problem to be solved by the present invention is to existing intelligent terminal OTA upgrading scheme, it is easy by third party's malice
It distorts, and not can guarantee OTA firmware long continuance, the problem of reliability and safety difference.
In order to solve the above-mentioned technical problem, the technical scheme adopted by the invention is that providing a kind of embedding based on the realization of block chain
Enter formula hardware OTA upgrade method, comprising the following steps:
Step S10, the P2P network topology knot of the decentralization for the service node that one includes the downloading of multiple firmwares is constructed
Structure, each service node are used for intelligent terminal hardware OTA upgrade service;
Step S20, using a service node as the first block node, one by one will by block chain common recognition authentication mechanism
Other service nodes in P2P network topology structure are converted into a block node on block chain;
Step S30, latest firmware software is stored on service node, and node content is calculated using hash algorithm
The hash value of the service node is obtained, firmware version safety check mechanism is constructed;Wherein, node content includes service node and its
The characteristic information of the firmware software of upper storage;
Step S40, intelligent terminal downloads corresponding hash value from the service node of P2P network topology structure, according to this
Hash value carries out firmware version safety check, and downloads, saves the firmware software for passing through verification, and the firmware software is utilized to carry out
Upgrading.
In the above-mentioned methods, when firmware software when being uploaded to the service node of firmware downloading for the first time, by firmware software
Multiple portions are split into, are respectively stored on more firmware download service nodes, and generate corresponding index file;
Intelligent terminal connects a service node, download part firmware software;According to the group of the portion firmware software of downloading
Part mark, successively searches the service node for having other parts firmware software, and successively download institute from P2P network topology structure
There is the component of firmware software;Complete firmware software is assembled into according to index file.
In the above-mentioned methods, node content includes: the node ID for storing the service node of firmware software, device type, sets
Standby model;Address is locally-downloaded in the firmware version number of the firmware software stored on the service node, firmware size byte value, firmware
Hash value, firmware storage time stamp;The service node downloads the hash value of a upper service node for firmware software;
If the hash value of not upper service node, this part value is 0.
In the above-mentioned methods, after intelligent terminal saves the firmware software by verification, firmware sheet is generated using hash algorithm
Ground download address hash value;
It recycles hash algorithm to calculate the node content of the intelligent terminal, obtains the hash value of the intelligent terminal,
And a block node on block chain is converted for the intelligent terminal by block chain common recognition authentication mechanism, become P2P network
The service node that a firmware is downloaded in topological structure.
In the above-mentioned methods, step S40 specifically includes the following steps:
Step S41, user opens intelligent terminal, and after networking, declares and find P2P net according to corresponding P2P agreement
Service node in network topological structure;
Step S42, any one of intelligent terminal and discovery service node establish connection, and download from the service node
The hash value of the service node parses the hash value and obtains corresponding node content;
Step S43, address is locally-downloaded according to the firmware in node content and obtains the firmware software stored on service node
Characteristic information;
Step S44, judge whether the characteristic information of the firmware software obtained and the node content that parsing obtains are consistent, if
Unanimously, step S45 is executed;Otherwise, step S48 is executed;
Step S45, firmware software is downloaded and saved, and is locally-downloaded using the firmware that hash algorithm generates intelligent terminal
Address hash value;
Step S46, it is calculated using node content of the hash algorithm to the intelligent terminal, obtains the intelligent terminal
Hash value, and known together the block node that authentication mechanism converts the intelligent terminal on block chain by block chain;
Step S47, intelligent terminal upgrading is carried out using the firmware software of downloading, then executes step S49;
Step S48, the service node is removed by P2P network and block according to P2P agreement and block chain common recognition authentication mechanism
Chain;
Step S49, terminate this upgrading.
In the above-mentioned methods, before the calculating for carrying out hash value to node content, using public private key pair in whole nodes
Hold or only the part of nodes content of agreement is encrypted.
In the above-mentioned methods, hash algorithm includes AES, SHA, RSA, ECC.
In the above-mentioned methods, block chain common recognition authentication mechanism include proof of work, equity prove, equity authorisation verification.
The present invention also provides one kind to realize embedded hardware OTA upgrade-system based on block chain, including multiple for being
Intelligent terminal hardware OTA upgrading provides the service node of firmware download service, constitutes one between multiple service nodes and goes
The P2P network topology structure of centralization;
Each service node is equipped with common recognition verification algorithm module in the P2P network topology structure and safe encrypted authentication is calculated
Method and downloading release module;
Block chain common recognition authentication mechanism of the common recognition verification algorithm module by P2P network topology structure, certification addition
The service node of P2P network is a block node of block chain;
The safe encrypted authentication algorithm and downloading release module are calculated node content using hash algorithm
The hash value of the service node, and hash value is issued;The firmware software stored on the service node is by other intelligence
When terminal downloads, firmware version safety check is carried out to current firmware software using hash value, and check results are issued into the intelligence
It can terminal;Wherein, node content includes the characteristic information of service node and the firmware software stored thereon.
Compared with prior art, the present invention establishes safe and reliable firmware download service node using block chain technology
P2P network topology structure, and taken by certain more distributed trusted firmwares downloadings of block chain common recognition authentication mechanism addition
Business node, thus the invention has the following advantages that
(1) entire intelligent terminal hardware OTA upgrading process is without relying on certain specific central server, even if P2P network is opened up
Flutterring in structure has firmware download service node failure, not online or thereon firmware software to be tampered, and does not influence intelligent end still
OTA upgrading is held, simply by the presence of the firmware download service node of corresponding intelligent terminal firmware OTA upgrading, block chain can be real
The upgrade mechanism of existing permanent stabilization safety improves intelligent terminal OTA and upgrades reliability;
(2) all firmware download service nodes use secure authentication mechanisms (verifying of block chain common recognition and the firmware of block chain
Software security authentication mechanism) storage firmware software, having can not distort, and prevent the firmware upgrade procedure of malice from leading to equipment safety
Loophole improves the safety of intelligent terminal OTA upgrading
(3) scheme requires lower, therefore the intelligent terminal each networked for a long time is likely to become Intelligent hardware firmware OTA
A block node on upgrade service block chain improves the enforceability of firmware OTA upgrade service and realisation.
Detailed description of the invention
Fig. 1 is a kind of structural block diagram that embedded hardware OTA upgrade-system is realized based on block chain provided by the invention;
Fig. 2 is the structural block diagram of the service node of firmware downloading in the present invention;
Fig. 3 is a kind of flow chart that embedded hardware OTA upgrade method is realized based on block chain provided by the invention;
Fig. 4 is the specific flow chart of step S40 in the present invention;
Fig. 5 is the flow chart that intelligent terminal carries out firmware OTA upgrading using the present invention.
Specific embodiment
Block chain is a kind of a kind of chain type number for being sequentially in time combined into data block in such a way that sequence is connected
According to structure, and use cryptography.The distributed data of method associated data block;Block chain technology utilizes block linked data structure
To verify algorithm is known together with storing data, using distributed node generate and more new data, guaranteed in the way of cryptography
The safety of data transmission and access is programmed using the intelligent contract being made of automatized script code and one kind of operation data
Completely new distributed basis framework and calculation paradigm, having can not the spy such as tamper, decentralization, anonymity, trackability
Sign, has been widely used in financial industry, and wide application prospect is all shown in various fields at present
The present invention provides one kind to realize embedded hardware OTA upgrade method based on block chain, first using block chain technology
P2P (Peer-to-peer, point-to-point or reciprocity) network topology structure of a decentralization is established, then passes through certain block
After chain common recognition mechanism identification each P2P node is converted to corresponding firmware OTA upgrade service block node one by one, recycles and breathe out
Uncommon (Hash) algorithm, such as AES-128 (Advanced Encryption Standard 128), SHA-256 (Secure
Hash Algorithm 256) etc. formed firmware version safety certification verification scheme;Need to do the intelligence of firmware OTA upgrading eventually
End need to only establish connection with the block node of block chain, then can carry out firmware OTA liter by safety check and version confirmation
Grade operation.Entire firmware OTA escalation process is not rely on some central server, even if in P2P firmware download service node
There are multiple failures or offline node, as long as there is normal online block node, intelligent terminal would not be influenced and upgraded, not only
Keep OTA upgrade mechanism more reliable, and due to being based on block chain technology, characteristic can not be distorted by having, and safety is more preferable.It ties below
Specification drawings and specific embodiments are closed to be described in detail the present invention.
As shown in Figure 1, a kind of block chain that is based on provided by the invention realizes embedded hardware OTA upgrade-system, including more
It is a to provide the service node 10 of firmware download service for upgrading for intelligent terminal hardware OTA, the service section of multiple firmwares downloadings
The P2P network topology structure of a decentralization is constituted between point 10;
The service node 10 of each firmware downloading is equipped with common recognition verification algorithm module 11 and safety in P2P network topology structure
Encrypted authentication algorithm and downloading release module 12;
P2P is added by the block chain common recognition authentication mechanism certification of P2P network topology structure in verification algorithm module 11 of knowing together
The service node of network is a block node of block chain, and all service nodes of P2P network topology structure is made to constitute an area
Block chain;
Safe encrypted authentication algorithm and downloading release module 12 carry out node content using hash algorithm this is calculated
The hash value of service node, and hash value is issued;The firmware software stored on the service node 10 is by other intelligence
When terminal downloads, firmware version safety check is carried out to current firmware software using hash value, and check results are issued into the intelligence
It can terminal;Wherein, node content includes the characteristic information of service node and the firmware software stored thereon.
As it can be seen that as shown in Fig. 2, the service node of each firmware downloading at least needs if to guarantee that the present invention can be realized
Include:
Main control module (CPU or MCU) 13, the module are the core processing modules of the service node based on block chain technology,
System operations all on the node, data storage and network service function can be handled;
Memory 14 supports the based process such as whole operations on the node, data storage read-write, network connection and data interaction
Function;
Memory module 15 is mainly used for firmware software and corresponding block chain distribution that record saves related intelligent terminal
The hash value of storage service node;The access for supporting file on external pluggable equipment simultaneously, can be USB device, card reader
Equipment etc.;
Network service module 16 (including HTTP, TCP, UDP, FTP etc.) is the foundation structure for establishing P2P network, main right
There is provided attachable network address and serve port for portion's equipment or service node, and according to respective protocol provide network service,
Equipment identification, publication, connection and the functions such as data downloading and interaction;
Common recognition verification algorithm module 11, the module support that new firmware download service is created and confirmed using block chain technology
Node, when P2P network is added in service node, by certain common recognition algorithm mechanism (consensus) to the service section of addition
Point is authenticated.In block chain technology, common common recognition mechanism includes proof of work (POW Proof of Work), power
Benefit proves (POS Proof of Stake), equity authorisation verification (DPOS Delegated Proof of Stake) etc.;
Safe encrypted authentication algorithm and downloading release module 12, support key schedule and certain Hash Encryption Algorithm
Mechanism;(a variety of common symmetrically or non-symmetrically Encryption Algorithm, such as AES, SHA, RSA, ECC can be used using hash algorithm
Etc.) the hash value that the service node is calculated is carried out to node content, and hash value is issued;In the service node
When the firmware software of upper storage is downloaded by other intelligent terminals, firmware version safety is carried out to current firmware software using hash value
Verification, and check results are issued into the intelligent terminal, make the system that there are the safe tamper-proof mechanisms of certain firmware (for example, at least to need
Compare firmware version information, firmware size, the information of a upper credible block the methods of to compare), i.e., it is calculated using corresponding Hash
Hash value is decrypted in method, if the node content of decryption arrived and currently stored firmware software characteristic information and service save
Point feature information is consistent, it was demonstrated that the firmware software is not tampered with, and intelligent terminal downloads firmware software, otherwise, the service node
Remove P2P network and block chain;Wherein, node content includes the characteristic information of service node and the firmware software stored thereon,
It specifically includes: storing the node ID, device type, device model of the service node of firmware software;It is stored on the service node
Address hash value, firmware storage time stamp time is locally-downloaded in the firmware version number of firmware software, firmware size byte value, firmware
stamp;The service node downloads the hash value of a upper service node for firmware software, used here as firmware download address hash value
It is the Internet download address for being not intended to be directly acquired firmware software with plaintext;If the hash of not upper service node
Value, this part value are 0.
As shown in figure 3, it is provided by the invention a kind of based on block chain realization embedded hardware OTA upgrade method, including with
Lower step:
Step S10, the P2P network topology knot of the decentralization for the service node that one includes the downloading of multiple firmwares is constructed
Structure, each service node are used for intelligent terminal hardware OTA upgrade service;
Step S20, using a service node as the first block node, one by one will by block chain common recognition authentication mechanism
Other service nodes in P2P network topology structure are converted into a block node on block chain;
Step S30, latest firmware software is stored on service node, and node content is calculated using hash algorithm
The hash value of the service node is obtained, firmware version safety check mechanism is constructed;Wherein, node content includes service node and its
The characteristic information of the firmware software of upper storage;
Step S40, intelligent terminal downloads corresponding hash value from the service node of P2P network topology structure, according to this
Hash value carries out firmware version safety check, and downloads, saves the firmware software for passing through verification, and the firmware software is utilized to carry out
Upgrading.
The present invention establishes the P2P network topology structure of safe and reliable firmware download service node using block chain technology,
And determine that more distributed trusted service nodes are added by certain common recognition mechanism, to ensure P2P network topology structure
Robustness;Meanwhile the safety of firmware software is safeguarded by the safe encrypted authentication mechanism of the service node of firmware downloading itself
Credible anti-tamper characteristic.
In the present invention, as intelligent terminal itself have it is as shown in Figure 2 have the ability, when intelligent terminal preservation passes through school
After the firmware software tested, firmware is generated using hash algorithm, address hash value is locally-downloaded;Recycle hash algorithm to the intelligence
The node content of terminal is calculated, and the hash value of the intelligent terminal is obtained, and passes through block chain common recognition authentication mechanism for the intelligence
Energy terminal conversion is a trusted block node on block chain, becomes what a firmware in P2P network topology structure was downloaded
Service node provides firmware OTA upgrade service for other intelligent terminals.
In the present invention, to promote network transmission efficiency, associated firmware software is being uploaded to firmware download service for the first time
When node, firmware software is split into multiple portions, is respectively stored on more firmware download service nodes, and generate corresponding rope
Draw (Index) file;
Intelligent terminal connects a service node, download part firmware software;According to the group of the portion firmware software of downloading
Part mark successively searches the service node for having other parts firmware software from P2P network topology structure and (is downloading each portion
Timesharing carries out firmware version safety check to every part respectively), and successively download the component of all firmware softwares;According to index
File is assembled into complete firmware software.If the intelligent terminal is had the ability with as shown in Figure 2, completed, simultaneously in assembly
After preservation, node content is calculated using hash algorithm, obtains hash value, authentication mechanism is known together for the intelligence by block chain
Energy terminal conversion is a block node on block chain, becomes the service section that a firmware is downloaded in P2P network topology structure
Point.
As shown in figure 4, step S40 specifically includes the following steps:
Step S41, user opens intelligent terminal, and after networking, declares and find P2P net according to corresponding P2P agreement
Service node in network topological structure;
Step S42, any one of intelligent terminal and discovery service node establish connection, and download from the service node
The hash value of the service node parses the hash value and obtains corresponding node content;
Step S43, address is locally-downloaded according to the firmware in node content and obtains the firmware software stored on service node
Characteristic information;
Step S44, judge whether the characteristic information of the firmware software obtained and the node content that parsing obtains are consistent, if
Unanimously, step S45 is executed;Otherwise, step S48 is executed;
Step S45, firmware software is downloaded and saved, and is locally-downloaded using the firmware that hash algorithm generates intelligent terminal
Address hash value;
Step S46, it is calculated using node content of the hash algorithm to the intelligent terminal, obtains the intelligent terminal
Hash value, and known together the block node that authentication mechanism converts the intelligent terminal on block chain by block chain;
Step S47, intelligent terminal upgrading is carried out using the firmware software of downloading, then executes step S49;
Step S48, the service node is removed by P2P network and block according to P2P agreement and block chain common recognition authentication mechanism
Chain;
Step S49, terminate this upgrading.
In the present invention, before the calculating for carrying out hash value to node content, public private key pair first can be used to node content
Method carry out whole encryptions or only the part of nodes content of agreement encrypted, to promote the tamper-resistance properties of firmware.
As shown in figure 5, as follows using the firmware OTA upgrading process of intelligent terminal when the present invention:
001: user opens intelligent terminal, and intelligent terminal is networked automatically in the state that distribution is completed;
002: after intelligent terminal networking, declaring and find other firmware downloadings in P2P network according to corresponding P2P agreement
Service node;
003: after intelligent terminal finds any one firmware download service node, establishing and connect with the firmware download service node
Connect (can be based on agreements such as TCP, UDP, HTTP, FTP);
004: the hash value of the firmware download service node is downloaded from firmware download service node, parsing node content obtains
The characteristic information of firmware software download address and corresponding firmware software (stores the firmware download service node of the firmware software
ID and its device type, device model, firmware version number, firmware size byte value, timestamp time stamp etc.), then
Firmware software is downloaded according to firmware software download address, and is compared with the firmware software characteristic information of parsing, if unanimously,
The firmware software for indicating downloading is to be tampered, and intelligent terminal saves the firmware software, and hash algorithm is called to generate intelligent terminal
Node content, recycle block chain common recognition verification algorithm carry out be added P2P network topology structure certification, corresponding area is added
Block chain becomes credible block node;If inconsistent, the firmware is downloaded and is taken according to P2P agreement and block chain common recognition authentication mechanism
Business node removes P2P network and block chain;
005: storage firmware software to upgrading space starts general upgrading process, first parses firmware software relevant information
Content;
006: the newer firmware software safety verification process of starting is to ensure that new firmware is securely and reliably not tampered with;It is (main
It is checked as follows: checking firmware device type, device model, firmware version number, the firmware of firmware size etc. and actual download
It is all consistent);
007: if the firmware software received is partial software, successively being searched directly from P2P network and have other portions
Divide the firmware download service node of firmware software, and step 003 need to be returned to, it is each that downloading is connect with each firmware download service node
A portion firmware software carries out assembled and is identified through final firmware version peace after obtaining all files further according to index file
Full verifying;
008: starting device firmware upgrade procedure;
009: then restarting equipment after upgrading is completed successfully;It needs to be rolled back to original version if failure.
The invention is not limited to above-mentioned preferred forms, and anyone should learn that is made under the inspiration of the present invention
Structure change, the technical schemes that are same or similar to the present invention are fallen within the scope of protection of the present invention.
Claims (9)
1. one kind realizes embedded hardware OTA upgrade method based on block chain, which comprises the following steps:
Step S10, the P2P network topology structure of the decentralization for the service node that one includes the downloading of multiple firmwares is constructed, often
A service node is used for intelligent terminal hardware OTA upgrade service;
Step S20, using a service node as the first block node, authentication mechanism is known together one by one by P2P net by block chain
Other service nodes in network topological structure are converted into a block node on block chain;
Step S30, latest firmware software is stored on service node, and node content is calculated using hash algorithm
The hash value of the service node constructs firmware version safety check mechanism;Wherein, node content includes service node and deposits thereon
The characteristic information of the firmware software of storage;
Step S40, intelligent terminal downloads corresponding hash value from the service node of P2P network topology structure, according to the hash value
Firmware version safety check is carried out, and downloads, save the firmware software for passing through verification, and upgraded using the firmware software.
2. the method according to claim 1, wherein when firmware software is in the clothes for being uploaded to firmware downloading for the first time
When business node, firmware software is split into multiple portions, is respectively stored on more firmware download service nodes, and generated corresponding
Index file;
Intelligent terminal connects a service node, download part firmware software;According to the component mark of the portion firmware software of downloading
Know, the service node for having other parts firmware software is successively searched from P2P network topology structure, and successively download all solid
The component of part software;Complete firmware software is assembled into according to index file.
3. the method according to claim 1, wherein node content includes: the service node for storing firmware software
Node ID, device type, device model;Firmware version number, the firmware size of the firmware software stored on the service node
Address hash value, firmware storage time stamp is locally-downloaded in byte value, firmware;The service node downloads a upper service for firmware software
The hash value of node;
If the hash value of not upper service node, this part value is 0.
4. according to the method described in claim 3, it is characterized in that, intelligent terminal save by verification firmware software after, benefit
Firmware is generated with hash algorithm, and address hash value is locally-downloaded;
It recycles hash algorithm to calculate the node content of the intelligent terminal, obtains the hash value of the intelligent terminal, and lead to
The block node that block chain common recognition authentication mechanism converts the intelligent terminal on block chain is crossed, P2P network topology is become
The service node that a firmware is downloaded in structure.
5. according to the method described in claim 4, it is characterized in that, step S40 specifically includes the following steps:
Step S41, user opens intelligent terminal, and after networking, declares according to corresponding P2P agreement and finds that P2P network is opened up
Flutter the service node in structure;
Step S42, any one of intelligent terminal and discovery service node establish connection, and the clothes are downloaded from the service node
The hash value of business node, parses the hash value and obtains corresponding node content;
Step S43, the spy that address obtains the firmware software stored on service node is locally-downloaded according to the firmware in node content
Reference breath;
Step S44, judge whether the characteristic information of the firmware software obtained and the node content that parsing obtains are consistent, if one
It causes, executes step S45;Otherwise, step S48 is executed;
Step S45, firmware software is downloaded and saved, and address is locally-downloaded using the firmware that hash algorithm generates intelligent terminal
Hash value;
Step S46, it is calculated using node content of the hash algorithm to the intelligent terminal, obtains the hash of the intelligent terminal
Value, and a block node on block chain is converted the intelligent terminal to by block chain common recognition authentication mechanism;
Step S47, intelligent terminal upgrading is carried out using the firmware software of downloading, then executes step S49;
Step S48, the service node is removed by P2P network and block chain according to P2P agreement and block chain common recognition authentication mechanism;
Step S49, terminate this upgrading.
6. the method according to claim 1, wherein being used before the calculating for carrying out hash value to node content
Public private key pair is encrypted to whole node contents or only to the part of nodes content of agreement.
7. the method according to claim 1, wherein hash algorithm includes AES, SHA, RSA, ECC.
8. the method according to claim 1, wherein block chain common recognition authentication mechanism includes proof of work, power
Benefit proof, equity authorisation verification.
9. one kind realizes embedded hardware OTA upgrade-system based on block chain, which is characterized in that be used for including multiple as intelligence eventually
It holds hardware OTA upgrading to provide the service node of firmware download service, constitutes a decentralization between multiple service nodes
P2P network topology structure;
In the P2P network topology structure each service node be equipped with common recognition verification algorithm module and safe encrypted authentication algorithm and
Download release module;
Block chain common recognition authentication mechanism of the common recognition verification algorithm module by P2P network topology structure, certification addition P2P net
The service node of network is a block node of block chain;
The safe encrypted authentication algorithm and downloading release module carry out node content using hash algorithm the clothes are calculated
The hash value of business node, and hash value is issued;The firmware software stored on the service node is by other intelligent terminals
When downloading, firmware version safety check is carried out to current firmware software using hash value, and check results are issued into the intelligence eventually
End;Wherein, node content includes the characteristic information of service node and the firmware software stored thereon.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910119485.9A CN109889589B (en) | 2019-02-18 | 2019-02-18 | System and method for realizing embedded hardware OTA (over the air) upgrading based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910119485.9A CN109889589B (en) | 2019-02-18 | 2019-02-18 | System and method for realizing embedded hardware OTA (over the air) upgrading based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109889589A true CN109889589A (en) | 2019-06-14 |
CN109889589B CN109889589B (en) | 2021-11-23 |
Family
ID=66928374
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910119485.9A Active CN109889589B (en) | 2019-02-18 | 2019-02-18 | System and method for realizing embedded hardware OTA (over the air) upgrading based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109889589B (en) |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110493345A (en) * | 2019-08-23 | 2019-11-22 | 北京智芯微电子科技有限公司 | Internet-of-things terminal method for upgrading software and system based on block chain |
CN110704392A (en) * | 2019-08-21 | 2020-01-17 | 平安科技(深圳)有限公司 | Block chain network upgrading method and device, storage medium and electronic equipment |
CN110730079A (en) * | 2019-10-16 | 2020-01-24 | 北京仁信证科技有限公司 | Embedded system safe starting and credibility measuring system based on credible computing module |
CN111522563A (en) * | 2020-04-20 | 2020-08-11 | 中国工商银行股份有限公司 | Block chain-based terminal upgrade protection system and method |
WO2020011287A3 (en) * | 2019-10-15 | 2020-08-20 | Alipay (Hangzhou) Information Technology Co., Ltd. | Indexing and recovering encoded blockchain data |
CN111782238A (en) * | 2020-05-27 | 2020-10-16 | 华帝股份有限公司 | Software upgrading method and system for intelligent household electrical appliance |
CN111984295A (en) * | 2020-08-22 | 2020-11-24 | 暗链科技(深圳)有限公司 | Block chain software whole-network updating method, storage medium and electronic equipment |
CN112148333A (en) * | 2020-10-10 | 2020-12-29 | 上海聪链信息科技有限公司 | Block chain server firmware updating system |
CN112162770A (en) * | 2020-10-20 | 2021-01-01 | 深圳技术大学 | Firmware version upgrading method and device for realizing integrity verification based on block chain |
CN112256596A (en) * | 2020-10-23 | 2021-01-22 | 英业达科技有限公司 | Method for refreshing signal repeater in electronic device firmware |
CN112328291A (en) * | 2020-12-11 | 2021-02-05 | 上海市民信箱信息服务有限公司 | APP light application market software version control method |
WO2021036545A1 (en) * | 2019-08-29 | 2021-03-04 | 腾讯科技(深圳)有限公司 | Smart contract-based data processing method, and device and storage medium |
CN112559005A (en) * | 2020-11-27 | 2021-03-26 | 南京南瑞信息通信科技有限公司 | Internet of things equipment firmware updating method and system based on block chain and distributed storage |
CN112947967A (en) * | 2021-03-08 | 2021-06-11 | 中国联合网络通信集团有限公司 | Software updating method, block chain application store and software uploading terminal |
CN113190252A (en) * | 2021-05-14 | 2021-07-30 | 广州国联通信有限公司 | Remote online firmware updating method and device based on train broadcasting system |
CN113434170A (en) * | 2021-06-22 | 2021-09-24 | 重庆长安汽车股份有限公司 | Finished automobile OTA data downloading and deploying method and device |
CN113849213A (en) * | 2021-10-15 | 2021-12-28 | 四川启睿克科技有限公司 | OTA (over the air) upgrading system and method of edge device |
CN114095538A (en) * | 2021-11-18 | 2022-02-25 | 四川启睿克科技有限公司 | Bidirectional authentication method for OTA (over the air) upgrading of Internet of things equipment based on block chain technology |
CN114168176A (en) * | 2021-12-15 | 2022-03-11 | 四川启睿克科技有限公司 | Block chain-based cross-manufacturer equipment upgrading system and method |
TWI757934B (en) * | 2020-10-27 | 2022-03-11 | 英業達股份有限公司 | Method for updating redriver in firmware of electronic device |
WO2022111214A1 (en) * | 2020-11-30 | 2022-06-02 | 青岛海尔电冰箱有限公司 | Blockchain-based refrigerator program upgrade method and refrigerator |
CN114637987A (en) * | 2022-05-18 | 2022-06-17 | 广州万协通信息技术有限公司 | Security chip firmware downloading method and system based on platform verification |
WO2022183371A1 (en) * | 2021-03-02 | 2022-09-09 | 深圳大学 | Firmware update method, apparatus and system for internet of things device, and storage medium |
US11645303B2 (en) | 2019-07-15 | 2023-05-09 | Tencent Technology (Shenzhen) Company Limited | Data synchronization method and apparatus of distributed system, medium, and electronic device |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101247416A (en) * | 2008-03-25 | 2008-08-20 | 中兴通讯股份有限公司 | Firmware downloading method, preprocessing method and integrality verification method based on OTA |
CN103092657A (en) * | 2013-01-18 | 2013-05-08 | 郑州威科姆科技股份有限公司 | Embedded device upgrade method based on peer-to-peer (P2P) |
CN104836848A (en) * | 2015-04-14 | 2015-08-12 | 闪联信息技术工程中心有限公司 | Method for remotely upgrading intelligent household electrical appliances |
CN105653315A (en) * | 2015-12-23 | 2016-06-08 | 北京工业大学 | Block chain technology-based node operation system downloading method |
US20160261690A1 (en) * | 2015-03-02 | 2016-09-08 | Dell Products L.P. | Computing device configuration and management using a secure decentralized transaction ledger |
CN106789236A (en) * | 2016-12-20 | 2017-05-31 | 深圳盈达信息科技有限公司 | A kind of method of the FOTA remote onlines upgrading of fusion WiFiP2P |
CN107077557A (en) * | 2016-12-29 | 2017-08-18 | 深圳前海达闼云端智能科技有限公司 | The method and device that software application is issued and verified |
CN108270573A (en) * | 2018-01-12 | 2018-07-10 | 西安电子科技大学 | The method for secret protection of pilotless automobile |
CN108270874A (en) * | 2018-02-05 | 2018-07-10 | 武汉斗鱼网络科技有限公司 | The update method and device of application program |
CN108737498A (en) * | 2018-04-18 | 2018-11-02 | 中国地质大学(武汉) | A kind of P2P safety download detection method and system based on block chain |
-
2019
- 2019-02-18 CN CN201910119485.9A patent/CN109889589B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101247416A (en) * | 2008-03-25 | 2008-08-20 | 中兴通讯股份有限公司 | Firmware downloading method, preprocessing method and integrality verification method based on OTA |
CN103092657A (en) * | 2013-01-18 | 2013-05-08 | 郑州威科姆科技股份有限公司 | Embedded device upgrade method based on peer-to-peer (P2P) |
US20160261690A1 (en) * | 2015-03-02 | 2016-09-08 | Dell Products L.P. | Computing device configuration and management using a secure decentralized transaction ledger |
CN104836848A (en) * | 2015-04-14 | 2015-08-12 | 闪联信息技术工程中心有限公司 | Method for remotely upgrading intelligent household electrical appliances |
CN105653315A (en) * | 2015-12-23 | 2016-06-08 | 北京工业大学 | Block chain technology-based node operation system downloading method |
CN106789236A (en) * | 2016-12-20 | 2017-05-31 | 深圳盈达信息科技有限公司 | A kind of method of the FOTA remote onlines upgrading of fusion WiFiP2P |
CN107077557A (en) * | 2016-12-29 | 2017-08-18 | 深圳前海达闼云端智能科技有限公司 | The method and device that software application is issued and verified |
CN108270573A (en) * | 2018-01-12 | 2018-07-10 | 西安电子科技大学 | The method for secret protection of pilotless automobile |
CN108270874A (en) * | 2018-02-05 | 2018-07-10 | 武汉斗鱼网络科技有限公司 | The update method and device of application program |
CN108737498A (en) * | 2018-04-18 | 2018-11-02 | 中国地质大学(武汉) | A kind of P2P safety download detection method and system based on block chain |
Cited By (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11645303B2 (en) | 2019-07-15 | 2023-05-09 | Tencent Technology (Shenzhen) Company Limited | Data synchronization method and apparatus of distributed system, medium, and electronic device |
CN110704392A (en) * | 2019-08-21 | 2020-01-17 | 平安科技(深圳)有限公司 | Block chain network upgrading method and device, storage medium and electronic equipment |
CN110704392B (en) * | 2019-08-21 | 2023-03-31 | 平安科技(深圳)有限公司 | Block chain network upgrading method and device, storage medium and electronic equipment |
CN110493345A (en) * | 2019-08-23 | 2019-11-22 | 北京智芯微电子科技有限公司 | Internet-of-things terminal method for upgrading software and system based on block chain |
US11733991B2 (en) | 2019-08-29 | 2023-08-22 | Tencent Technology (Shenzhen) Company Limited | Data processing method based on intelligent contract, device, and storage medium |
JP2022502738A (en) * | 2019-08-29 | 2022-01-11 | ▲騰▼▲訊▼科技(深▲セン▼)有限公司 | Data processing methods based on smart contracts, data processing equipment, node equipment, and computer programs |
JP7199775B2 (en) | 2019-08-29 | 2023-01-06 | ▲騰▼▲訊▼科技(深▲セン▼)有限公司 | Data processing method, data processing device, node device, and computer program based on smart contract |
WO2021036545A1 (en) * | 2019-08-29 | 2021-03-04 | 腾讯科技(深圳)有限公司 | Smart contract-based data processing method, and device and storage medium |
US11307927B2 (en) | 2019-10-15 | 2022-04-19 | Alipay (Hangzhou) Information Technology Co., Ltd. | Indexing and recovering encoded blockchain data |
KR102412024B1 (en) | 2019-10-15 | 2022-06-22 | 알리페이 (항저우) 인포메이션 테크놀로지 씨오., 엘티디. | Indexing and recovery of encoded blockchain data |
US10977114B2 (en) | 2019-10-15 | 2021-04-13 | Alipay (Hangzhou) Information Technology Co., Ltd. | Indexing and recovering encoded blockchain data |
WO2020011287A3 (en) * | 2019-10-15 | 2020-08-20 | Alipay (Hangzhou) Information Technology Co., Ltd. | Indexing and recovering encoded blockchain data |
KR20210045353A (en) * | 2019-10-15 | 2021-04-26 | 알리페이 (항저우) 인포메이션 테크놀로지 씨오., 엘티디. | Indexing and recovery of encoded blockchain data |
CN110730079B (en) * | 2019-10-16 | 2023-06-02 | 北京信长城科技发展有限公司 | System for safe starting and trusted measurement of embedded system based on trusted computing module |
CN110730079A (en) * | 2019-10-16 | 2020-01-24 | 北京仁信证科技有限公司 | Embedded system safe starting and credibility measuring system based on credible computing module |
CN111522563B (en) * | 2020-04-20 | 2023-09-19 | 中国工商银行股份有限公司 | Terminal upgrading protection system and method based on block chain |
CN111522563A (en) * | 2020-04-20 | 2020-08-11 | 中国工商银行股份有限公司 | Block chain-based terminal upgrade protection system and method |
CN111782238A (en) * | 2020-05-27 | 2020-10-16 | 华帝股份有限公司 | Software upgrading method and system for intelligent household electrical appliance |
CN111984295B (en) * | 2020-08-22 | 2021-04-13 | 暗链科技(深圳)有限公司 | Block chain software whole-network updating method, storage medium and electronic equipment |
CN111984295A (en) * | 2020-08-22 | 2020-11-24 | 暗链科技(深圳)有限公司 | Block chain software whole-network updating method, storage medium and electronic equipment |
CN112148333B (en) * | 2020-10-10 | 2023-11-03 | 上海聪链信息科技有限公司 | Block chain server firmware updating system |
CN112148333A (en) * | 2020-10-10 | 2020-12-29 | 上海聪链信息科技有限公司 | Block chain server firmware updating system |
CN112162770B (en) * | 2020-10-20 | 2023-11-10 | 深圳技术大学 | Firmware version upgrading method and device for realizing integrity verification based on block chain |
CN112162770A (en) * | 2020-10-20 | 2021-01-01 | 深圳技术大学 | Firmware version upgrading method and device for realizing integrity verification based on block chain |
CN112256596A (en) * | 2020-10-23 | 2021-01-22 | 英业达科技有限公司 | Method for refreshing signal repeater in electronic device firmware |
CN112256596B (en) * | 2020-10-23 | 2022-07-05 | 英业达科技有限公司 | Method for refreshing signal repeater in electronic device firmware |
TWI757934B (en) * | 2020-10-27 | 2022-03-11 | 英業達股份有限公司 | Method for updating redriver in firmware of electronic device |
CN112559005A (en) * | 2020-11-27 | 2021-03-26 | 南京南瑞信息通信科技有限公司 | Internet of things equipment firmware updating method and system based on block chain and distributed storage |
WO2022111214A1 (en) * | 2020-11-30 | 2022-06-02 | 青岛海尔电冰箱有限公司 | Blockchain-based refrigerator program upgrade method and refrigerator |
CN112328291A (en) * | 2020-12-11 | 2021-02-05 | 上海市民信箱信息服务有限公司 | APP light application market software version control method |
WO2022183371A1 (en) * | 2021-03-02 | 2022-09-09 | 深圳大学 | Firmware update method, apparatus and system for internet of things device, and storage medium |
CN112947967B (en) * | 2021-03-08 | 2023-09-26 | 中国联合网络通信集团有限公司 | Software updating method, blockchain application store and software uploading terminal |
CN112947967A (en) * | 2021-03-08 | 2021-06-11 | 中国联合网络通信集团有限公司 | Software updating method, block chain application store and software uploading terminal |
CN113190252A (en) * | 2021-05-14 | 2021-07-30 | 广州国联通信有限公司 | Remote online firmware updating method and device based on train broadcasting system |
CN113434170B (en) * | 2021-06-22 | 2023-03-14 | 重庆长安汽车股份有限公司 | Finished automobile OTA data downloading and deploying method and device |
CN113434170A (en) * | 2021-06-22 | 2021-09-24 | 重庆长安汽车股份有限公司 | Finished automobile OTA data downloading and deploying method and device |
CN113849213A (en) * | 2021-10-15 | 2021-12-28 | 四川启睿克科技有限公司 | OTA (over the air) upgrading system and method of edge device |
CN113849213B (en) * | 2021-10-15 | 2024-05-14 | 四川启睿克科技有限公司 | OTA upgrading system and method for edge equipment |
CN114095538A (en) * | 2021-11-18 | 2022-02-25 | 四川启睿克科技有限公司 | Bidirectional authentication method for OTA (over the air) upgrading of Internet of things equipment based on block chain technology |
CN114095538B (en) * | 2021-11-18 | 2023-03-07 | 四川启睿克科技有限公司 | Bidirectional authentication method for OTA (over the air) upgrading of Internet of things equipment based on block chain technology |
CN114168176A (en) * | 2021-12-15 | 2022-03-11 | 四川启睿克科技有限公司 | Block chain-based cross-manufacturer equipment upgrading system and method |
CN114637987A (en) * | 2022-05-18 | 2022-06-17 | 广州万协通信息技术有限公司 | Security chip firmware downloading method and system based on platform verification |
CN114637987B (en) * | 2022-05-18 | 2022-08-12 | 广州万协通信息技术有限公司 | Security chip firmware downloading method and system based on platform verification |
Also Published As
Publication number | Publication date |
---|---|
CN109889589B (en) | 2021-11-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109889589A (en) | One kind realizing embedded hardware OTA upgrade-system and method based on block chain | |
US11943376B1 (en) | Template based credential provisioning | |
CN107770182B (en) | Data storage method of home gateway and home gateway | |
CN102271042B (en) | Certificate authorization method, system, universal serial bus (USB) Key equipment and server | |
US11128647B2 (en) | Cryptocurrencies malware based detection | |
KR101956486B1 (en) | Method and system for facilitating terminal identifiers | |
US20200106775A1 (en) | Method, device, system for authenticating an accessing terminal by server, server and computer readable storage medium | |
CN111182525B (en) | Method and device for storing data | |
CN110362990A (en) | Using the security processing of installation, apparatus and system | |
CN102982257A (en) | Digital rights management using trusted processing techniques | |
WO2010085781A1 (en) | Provisioned firmware updates using object identifiers | |
CN110601815B (en) | Block chain data processing method and equipment | |
CN111815321A (en) | Transaction proposal processing method, device, system, storage medium and electronic device | |
CN105099705B (en) | A kind of safety communicating method and its system based on usb protocol | |
CN109829294A (en) | A kind of firmware validation method, system, server and electronic equipment | |
US20160330030A1 (en) | User Terminal For Detecting Forgery Of Application Program Based On Hash Value And Method Of Detecting Forgery Of Application Program Using The Same | |
CN108171019B (en) | Anti-counterfeiting verification method, anti-counterfeiting verification system, anti-counterfeiting verification device and storage medium | |
US10263980B2 (en) | Network node, device and methods for providing an authentication module | |
CN112527912A (en) | Data processing method and device based on block chain network and computer equipment | |
WO2018086276A1 (en) | Method and device used for verifying application security | |
WO2017066995A1 (en) | Method and device for preventing unauthorized access to server | |
CN109600451A (en) | A kind of terminal device firmware upgrade method and system based on Websocket long connection | |
BR102019005184B1 (en) | METHOD AND SYSTEM FOR PROVISIONING A SAFE TERMINAL | |
CN111367923A (en) | Data processing method, data processing device, node equipment and storage medium | |
CN114338054B (en) | Block chain trusted data transmission, verification and acquisition method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |