CN109889589A - One kind realizing embedded hardware OTA upgrade-system and method based on block chain - Google Patents

One kind realizing embedded hardware OTA upgrade-system and method based on block chain Download PDF

Info

Publication number
CN109889589A
CN109889589A CN201910119485.9A CN201910119485A CN109889589A CN 109889589 A CN109889589 A CN 109889589A CN 201910119485 A CN201910119485 A CN 201910119485A CN 109889589 A CN109889589 A CN 109889589A
Authority
CN
China
Prior art keywords
firmware
node
service node
block chain
intelligent terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910119485.9A
Other languages
Chinese (zh)
Other versions
CN109889589B (en
Inventor
丁路宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
IGRS ENGINEERING LAB Ltd
Original Assignee
IGRS ENGINEERING LAB Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IGRS ENGINEERING LAB Ltd filed Critical IGRS ENGINEERING LAB Ltd
Priority to CN201910119485.9A priority Critical patent/CN109889589B/en
Publication of CN109889589A publication Critical patent/CN109889589A/en
Application granted granted Critical
Publication of CN109889589B publication Critical patent/CN109889589B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses one kind to realize embedded hardware OTA upgrade-system and method based on block chain, this method: the P2P network topology structure of one service node including the downloading of multiple firmwares of building;Using a service node as the first block node, a block node on block chain is one by one converted other service nodes in P2P network to by block chain common recognition authentication mechanism;Latest firmware software is stored on service node, and the hash value that the service node is calculated is carried out using hash algorithm to node content;Wherein, node content includes the characteristic information of service node and the firmware software stored thereon;Intelligent terminal downloads corresponding hash value from the service node of P2P network, carries out firmware version safety check according to the hash value, and downloads, saves the firmware software for passing through verification, and upgraded using the firmware software.The present invention establishes safe and reliable P2P network topology structure using block chain technology, improves intelligent terminal OTA and upgrades reliability and safety.

Description

One kind realizing embedded hardware OTA upgrade-system and method based on block chain
Technical field
The present invention relates to intelligent terminal remote upgrade technical fields, and in particular to one kind is realized embedded hard based on block chain Part OTA upgrade-system and method.
Background technique
With the fast development of current Intelligent terminal for Internet of things, occur various types of intelligent terminals, such as intelligence in the market Energy household electrical appliances, smart home, intelligent sound box etc., and most intelligent terminal all supports wireless (WiFi) function, to facilitate this A little equipment networkings.Due to the upgrading of later product function or the reparation etc. of system safety problem, intelligent terminal software Remote upgrade (OTA:Over-the-Air) its firmware under connected state is needed, to facilitate user and reduce intelligent terminal life Produce the operation maintenance cost of manufacturer;There are following several common technology schemes at present:
(1) intelligent terminal production firm provides a fixed network service address, directly uploads and updates firmware, and is indefinite Phase pushes OTA upgrading message to the intelligent terminal networked;Intelligent terminal opens automatically after comparing version number after receiving that message Dynamic firmware upgrade procedure;
(2) user can be searched by the network service address for the fixation that intelligent terminal production firm provides and need to be upgraded most New firmware software, and be downloaded to local, then it is triggered by the external interface (such as USB or serial ports) of intelligent terminal itself Built-in firmware upgrade procedure;
(3) user applies APP by mobile terminal matched with intelligent terminal, is directly connected to firmware background server, finds And download or push corresponding intelligent terminal firmware, reuse wireless or be locally-downloaded, then being pushed in a manner of importing needs to rise The firmware of grade completes OTA upgrading.
Although existing technology can allow its intelligent terminal firmware of user's remote upgrade, have the disadvantage in that once raw It produces manufacturer to decide not to safeguard the intelligent terminal firmware or production firm's break, user not only may lost its intelligence eventually Firmware upgrade is held to the final opportunity of latest edition, the networking intelligent terminal not upgraded is made to be faced with various functional or safeties Potential risk, it is often more important that, the third company of some malice or individual, it is easy to solid by establishing its imitated OTA Part upgrade service continues as the intelligent terminal networked and carries out OTA upgrading, if intelligent terminal OTA firmware upgrade procedure lacks one Fixed secure authentication mechanisms may make equipment occur maliciously being controlled after upgrading third party's firmware automatically and cause personal hidden The major safety problems such as private leakage.
In view of this, being badly in need of improving existing intelligent terminal OTA upgrading scheme, intelligent terminal OTA upgrading is improved Reliability and safety, prevent OTA firmware by third party malice distort.
Summary of the invention
The technical problem to be solved by the present invention is to existing intelligent terminal OTA upgrading scheme, it is easy by third party's malice It distorts, and not can guarantee OTA firmware long continuance, the problem of reliability and safety difference.
In order to solve the above-mentioned technical problem, the technical scheme adopted by the invention is that providing a kind of embedding based on the realization of block chain Enter formula hardware OTA upgrade method, comprising the following steps:
Step S10, the P2P network topology knot of the decentralization for the service node that one includes the downloading of multiple firmwares is constructed Structure, each service node are used for intelligent terminal hardware OTA upgrade service;
Step S20, using a service node as the first block node, one by one will by block chain common recognition authentication mechanism Other service nodes in P2P network topology structure are converted into a block node on block chain;
Step S30, latest firmware software is stored on service node, and node content is calculated using hash algorithm The hash value of the service node is obtained, firmware version safety check mechanism is constructed;Wherein, node content includes service node and its The characteristic information of the firmware software of upper storage;
Step S40, intelligent terminal downloads corresponding hash value from the service node of P2P network topology structure, according to this Hash value carries out firmware version safety check, and downloads, saves the firmware software for passing through verification, and the firmware software is utilized to carry out Upgrading.
In the above-mentioned methods, when firmware software when being uploaded to the service node of firmware downloading for the first time, by firmware software Multiple portions are split into, are respectively stored on more firmware download service nodes, and generate corresponding index file;
Intelligent terminal connects a service node, download part firmware software;According to the group of the portion firmware software of downloading Part mark, successively searches the service node for having other parts firmware software, and successively download institute from P2P network topology structure There is the component of firmware software;Complete firmware software is assembled into according to index file.
In the above-mentioned methods, node content includes: the node ID for storing the service node of firmware software, device type, sets Standby model;Address is locally-downloaded in the firmware version number of the firmware software stored on the service node, firmware size byte value, firmware Hash value, firmware storage time stamp;The service node downloads the hash value of a upper service node for firmware software;
If the hash value of not upper service node, this part value is 0.
In the above-mentioned methods, after intelligent terminal saves the firmware software by verification, firmware sheet is generated using hash algorithm Ground download address hash value;
It recycles hash algorithm to calculate the node content of the intelligent terminal, obtains the hash value of the intelligent terminal, And a block node on block chain is converted for the intelligent terminal by block chain common recognition authentication mechanism, become P2P network The service node that a firmware is downloaded in topological structure.
In the above-mentioned methods, step S40 specifically includes the following steps:
Step S41, user opens intelligent terminal, and after networking, declares and find P2P net according to corresponding P2P agreement Service node in network topological structure;
Step S42, any one of intelligent terminal and discovery service node establish connection, and download from the service node The hash value of the service node parses the hash value and obtains corresponding node content;
Step S43, address is locally-downloaded according to the firmware in node content and obtains the firmware software stored on service node Characteristic information;
Step S44, judge whether the characteristic information of the firmware software obtained and the node content that parsing obtains are consistent, if Unanimously, step S45 is executed;Otherwise, step S48 is executed;
Step S45, firmware software is downloaded and saved, and is locally-downloaded using the firmware that hash algorithm generates intelligent terminal Address hash value;
Step S46, it is calculated using node content of the hash algorithm to the intelligent terminal, obtains the intelligent terminal Hash value, and known together the block node that authentication mechanism converts the intelligent terminal on block chain by block chain;
Step S47, intelligent terminal upgrading is carried out using the firmware software of downloading, then executes step S49;
Step S48, the service node is removed by P2P network and block according to P2P agreement and block chain common recognition authentication mechanism Chain;
Step S49, terminate this upgrading.
In the above-mentioned methods, before the calculating for carrying out hash value to node content, using public private key pair in whole nodes Hold or only the part of nodes content of agreement is encrypted.
In the above-mentioned methods, hash algorithm includes AES, SHA, RSA, ECC.
In the above-mentioned methods, block chain common recognition authentication mechanism include proof of work, equity prove, equity authorisation verification.
The present invention also provides one kind to realize embedded hardware OTA upgrade-system based on block chain, including multiple for being Intelligent terminal hardware OTA upgrading provides the service node of firmware download service, constitutes one between multiple service nodes and goes The P2P network topology structure of centralization;
Each service node is equipped with common recognition verification algorithm module in the P2P network topology structure and safe encrypted authentication is calculated Method and downloading release module;
Block chain common recognition authentication mechanism of the common recognition verification algorithm module by P2P network topology structure, certification addition The service node of P2P network is a block node of block chain;
The safe encrypted authentication algorithm and downloading release module are calculated node content using hash algorithm The hash value of the service node, and hash value is issued;The firmware software stored on the service node is by other intelligence When terminal downloads, firmware version safety check is carried out to current firmware software using hash value, and check results are issued into the intelligence It can terminal;Wherein, node content includes the characteristic information of service node and the firmware software stored thereon.
Compared with prior art, the present invention establishes safe and reliable firmware download service node using block chain technology P2P network topology structure, and taken by certain more distributed trusted firmwares downloadings of block chain common recognition authentication mechanism addition Business node, thus the invention has the following advantages that
(1) entire intelligent terminal hardware OTA upgrading process is without relying on certain specific central server, even if P2P network is opened up Flutterring in structure has firmware download service node failure, not online or thereon firmware software to be tampered, and does not influence intelligent end still OTA upgrading is held, simply by the presence of the firmware download service node of corresponding intelligent terminal firmware OTA upgrading, block chain can be real The upgrade mechanism of existing permanent stabilization safety improves intelligent terminal OTA and upgrades reliability;
(2) all firmware download service nodes use secure authentication mechanisms (verifying of block chain common recognition and the firmware of block chain Software security authentication mechanism) storage firmware software, having can not distort, and prevent the firmware upgrade procedure of malice from leading to equipment safety Loophole improves the safety of intelligent terminal OTA upgrading
(3) scheme requires lower, therefore the intelligent terminal each networked for a long time is likely to become Intelligent hardware firmware OTA A block node on upgrade service block chain improves the enforceability of firmware OTA upgrade service and realisation.
Detailed description of the invention
Fig. 1 is a kind of structural block diagram that embedded hardware OTA upgrade-system is realized based on block chain provided by the invention;
Fig. 2 is the structural block diagram of the service node of firmware downloading in the present invention;
Fig. 3 is a kind of flow chart that embedded hardware OTA upgrade method is realized based on block chain provided by the invention;
Fig. 4 is the specific flow chart of step S40 in the present invention;
Fig. 5 is the flow chart that intelligent terminal carries out firmware OTA upgrading using the present invention.
Specific embodiment
Block chain is a kind of a kind of chain type number for being sequentially in time combined into data block in such a way that sequence is connected According to structure, and use cryptography.The distributed data of method associated data block;Block chain technology utilizes block linked data structure To verify algorithm is known together with storing data, using distributed node generate and more new data, guaranteed in the way of cryptography The safety of data transmission and access is programmed using the intelligent contract being made of automatized script code and one kind of operation data Completely new distributed basis framework and calculation paradigm, having can not the spy such as tamper, decentralization, anonymity, trackability Sign, has been widely used in financial industry, and wide application prospect is all shown in various fields at present
The present invention provides one kind to realize embedded hardware OTA upgrade method based on block chain, first using block chain technology P2P (Peer-to-peer, point-to-point or reciprocity) network topology structure of a decentralization is established, then passes through certain block After chain common recognition mechanism identification each P2P node is converted to corresponding firmware OTA upgrade service block node one by one, recycles and breathe out Uncommon (Hash) algorithm, such as AES-128 (Advanced Encryption Standard 128), SHA-256 (Secure Hash Algorithm 256) etc. formed firmware version safety certification verification scheme;Need to do the intelligence of firmware OTA upgrading eventually End need to only establish connection with the block node of block chain, then can carry out firmware OTA liter by safety check and version confirmation Grade operation.Entire firmware OTA escalation process is not rely on some central server, even if in P2P firmware download service node There are multiple failures or offline node, as long as there is normal online block node, intelligent terminal would not be influenced and upgraded, not only Keep OTA upgrade mechanism more reliable, and due to being based on block chain technology, characteristic can not be distorted by having, and safety is more preferable.It ties below Specification drawings and specific embodiments are closed to be described in detail the present invention.
As shown in Figure 1, a kind of block chain that is based on provided by the invention realizes embedded hardware OTA upgrade-system, including more It is a to provide the service node 10 of firmware download service for upgrading for intelligent terminal hardware OTA, the service section of multiple firmwares downloadings The P2P network topology structure of a decentralization is constituted between point 10;
The service node 10 of each firmware downloading is equipped with common recognition verification algorithm module 11 and safety in P2P network topology structure Encrypted authentication algorithm and downloading release module 12;
P2P is added by the block chain common recognition authentication mechanism certification of P2P network topology structure in verification algorithm module 11 of knowing together The service node of network is a block node of block chain, and all service nodes of P2P network topology structure is made to constitute an area Block chain;
Safe encrypted authentication algorithm and downloading release module 12 carry out node content using hash algorithm this is calculated The hash value of service node, and hash value is issued;The firmware software stored on the service node 10 is by other intelligence When terminal downloads, firmware version safety check is carried out to current firmware software using hash value, and check results are issued into the intelligence It can terminal;Wherein, node content includes the characteristic information of service node and the firmware software stored thereon.
As it can be seen that as shown in Fig. 2, the service node of each firmware downloading at least needs if to guarantee that the present invention can be realized Include:
Main control module (CPU or MCU) 13, the module are the core processing modules of the service node based on block chain technology, System operations all on the node, data storage and network service function can be handled;
Memory 14 supports the based process such as whole operations on the node, data storage read-write, network connection and data interaction Function;
Memory module 15 is mainly used for firmware software and corresponding block chain distribution that record saves related intelligent terminal The hash value of storage service node;The access for supporting file on external pluggable equipment simultaneously, can be USB device, card reader Equipment etc.;
Network service module 16 (including HTTP, TCP, UDP, FTP etc.) is the foundation structure for establishing P2P network, main right There is provided attachable network address and serve port for portion's equipment or service node, and according to respective protocol provide network service, Equipment identification, publication, connection and the functions such as data downloading and interaction;
Common recognition verification algorithm module 11, the module support that new firmware download service is created and confirmed using block chain technology Node, when P2P network is added in service node, by certain common recognition algorithm mechanism (consensus) to the service section of addition Point is authenticated.In block chain technology, common common recognition mechanism includes proof of work (POW Proof of Work), power Benefit proves (POS Proof of Stake), equity authorisation verification (DPOS Delegated Proof of Stake) etc.;
Safe encrypted authentication algorithm and downloading release module 12, support key schedule and certain Hash Encryption Algorithm Mechanism;(a variety of common symmetrically or non-symmetrically Encryption Algorithm, such as AES, SHA, RSA, ECC can be used using hash algorithm Etc.) the hash value that the service node is calculated is carried out to node content, and hash value is issued;In the service node When the firmware software of upper storage is downloaded by other intelligent terminals, firmware version safety is carried out to current firmware software using hash value Verification, and check results are issued into the intelligent terminal, make the system that there are the safe tamper-proof mechanisms of certain firmware (for example, at least to need Compare firmware version information, firmware size, the information of a upper credible block the methods of to compare), i.e., it is calculated using corresponding Hash Hash value is decrypted in method, if the node content of decryption arrived and currently stored firmware software characteristic information and service save Point feature information is consistent, it was demonstrated that the firmware software is not tampered with, and intelligent terminal downloads firmware software, otherwise, the service node Remove P2P network and block chain;Wherein, node content includes the characteristic information of service node and the firmware software stored thereon, It specifically includes: storing the node ID, device type, device model of the service node of firmware software;It is stored on the service node Address hash value, firmware storage time stamp time is locally-downloaded in the firmware version number of firmware software, firmware size byte value, firmware stamp;The service node downloads the hash value of a upper service node for firmware software, used here as firmware download address hash value It is the Internet download address for being not intended to be directly acquired firmware software with plaintext;If the hash of not upper service node Value, this part value are 0.
As shown in figure 3, it is provided by the invention a kind of based on block chain realization embedded hardware OTA upgrade method, including with Lower step:
Step S10, the P2P network topology knot of the decentralization for the service node that one includes the downloading of multiple firmwares is constructed Structure, each service node are used for intelligent terminal hardware OTA upgrade service;
Step S20, using a service node as the first block node, one by one will by block chain common recognition authentication mechanism Other service nodes in P2P network topology structure are converted into a block node on block chain;
Step S30, latest firmware software is stored on service node, and node content is calculated using hash algorithm The hash value of the service node is obtained, firmware version safety check mechanism is constructed;Wherein, node content includes service node and its The characteristic information of the firmware software of upper storage;
Step S40, intelligent terminal downloads corresponding hash value from the service node of P2P network topology structure, according to this Hash value carries out firmware version safety check, and downloads, saves the firmware software for passing through verification, and the firmware software is utilized to carry out Upgrading.
The present invention establishes the P2P network topology structure of safe and reliable firmware download service node using block chain technology, And determine that more distributed trusted service nodes are added by certain common recognition mechanism, to ensure P2P network topology structure Robustness;Meanwhile the safety of firmware software is safeguarded by the safe encrypted authentication mechanism of the service node of firmware downloading itself Credible anti-tamper characteristic.
In the present invention, as intelligent terminal itself have it is as shown in Figure 2 have the ability, when intelligent terminal preservation passes through school After the firmware software tested, firmware is generated using hash algorithm, address hash value is locally-downloaded;Recycle hash algorithm to the intelligence The node content of terminal is calculated, and the hash value of the intelligent terminal is obtained, and passes through block chain common recognition authentication mechanism for the intelligence Energy terminal conversion is a trusted block node on block chain, becomes what a firmware in P2P network topology structure was downloaded Service node provides firmware OTA upgrade service for other intelligent terminals.
In the present invention, to promote network transmission efficiency, associated firmware software is being uploaded to firmware download service for the first time When node, firmware software is split into multiple portions, is respectively stored on more firmware download service nodes, and generate corresponding rope Draw (Index) file;
Intelligent terminal connects a service node, download part firmware software;According to the group of the portion firmware software of downloading Part mark successively searches the service node for having other parts firmware software from P2P network topology structure and (is downloading each portion Timesharing carries out firmware version safety check to every part respectively), and successively download the component of all firmware softwares;According to index File is assembled into complete firmware software.If the intelligent terminal is had the ability with as shown in Figure 2, completed, simultaneously in assembly After preservation, node content is calculated using hash algorithm, obtains hash value, authentication mechanism is known together for the intelligence by block chain Energy terminal conversion is a block node on block chain, becomes the service section that a firmware is downloaded in P2P network topology structure Point.
As shown in figure 4, step S40 specifically includes the following steps:
Step S41, user opens intelligent terminal, and after networking, declares and find P2P net according to corresponding P2P agreement Service node in network topological structure;
Step S42, any one of intelligent terminal and discovery service node establish connection, and download from the service node The hash value of the service node parses the hash value and obtains corresponding node content;
Step S43, address is locally-downloaded according to the firmware in node content and obtains the firmware software stored on service node Characteristic information;
Step S44, judge whether the characteristic information of the firmware software obtained and the node content that parsing obtains are consistent, if Unanimously, step S45 is executed;Otherwise, step S48 is executed;
Step S45, firmware software is downloaded and saved, and is locally-downloaded using the firmware that hash algorithm generates intelligent terminal Address hash value;
Step S46, it is calculated using node content of the hash algorithm to the intelligent terminal, obtains the intelligent terminal Hash value, and known together the block node that authentication mechanism converts the intelligent terminal on block chain by block chain;
Step S47, intelligent terminal upgrading is carried out using the firmware software of downloading, then executes step S49;
Step S48, the service node is removed by P2P network and block according to P2P agreement and block chain common recognition authentication mechanism Chain;
Step S49, terminate this upgrading.
In the present invention, before the calculating for carrying out hash value to node content, public private key pair first can be used to node content Method carry out whole encryptions or only the part of nodes content of agreement encrypted, to promote the tamper-resistance properties of firmware.
As shown in figure 5, as follows using the firmware OTA upgrading process of intelligent terminal when the present invention:
001: user opens intelligent terminal, and intelligent terminal is networked automatically in the state that distribution is completed;
002: after intelligent terminal networking, declaring and find other firmware downloadings in P2P network according to corresponding P2P agreement Service node;
003: after intelligent terminal finds any one firmware download service node, establishing and connect with the firmware download service node Connect (can be based on agreements such as TCP, UDP, HTTP, FTP);
004: the hash value of the firmware download service node is downloaded from firmware download service node, parsing node content obtains The characteristic information of firmware software download address and corresponding firmware software (stores the firmware download service node of the firmware software ID and its device type, device model, firmware version number, firmware size byte value, timestamp time stamp etc.), then Firmware software is downloaded according to firmware software download address, and is compared with the firmware software characteristic information of parsing, if unanimously, The firmware software for indicating downloading is to be tampered, and intelligent terminal saves the firmware software, and hash algorithm is called to generate intelligent terminal Node content, recycle block chain common recognition verification algorithm carry out be added P2P network topology structure certification, corresponding area is added Block chain becomes credible block node;If inconsistent, the firmware is downloaded and is taken according to P2P agreement and block chain common recognition authentication mechanism Business node removes P2P network and block chain;
005: storage firmware software to upgrading space starts general upgrading process, first parses firmware software relevant information Content;
006: the newer firmware software safety verification process of starting is to ensure that new firmware is securely and reliably not tampered with;It is (main It is checked as follows: checking firmware device type, device model, firmware version number, the firmware of firmware size etc. and actual download It is all consistent);
007: if the firmware software received is partial software, successively being searched directly from P2P network and have other portions Divide the firmware download service node of firmware software, and step 003 need to be returned to, it is each that downloading is connect with each firmware download service node A portion firmware software carries out assembled and is identified through final firmware version peace after obtaining all files further according to index file Full verifying;
008: starting device firmware upgrade procedure;
009: then restarting equipment after upgrading is completed successfully;It needs to be rolled back to original version if failure.
The invention is not limited to above-mentioned preferred forms, and anyone should learn that is made under the inspiration of the present invention Structure change, the technical schemes that are same or similar to the present invention are fallen within the scope of protection of the present invention.

Claims (9)

1. one kind realizes embedded hardware OTA upgrade method based on block chain, which comprises the following steps:
Step S10, the P2P network topology structure of the decentralization for the service node that one includes the downloading of multiple firmwares is constructed, often A service node is used for intelligent terminal hardware OTA upgrade service;
Step S20, using a service node as the first block node, authentication mechanism is known together one by one by P2P net by block chain Other service nodes in network topological structure are converted into a block node on block chain;
Step S30, latest firmware software is stored on service node, and node content is calculated using hash algorithm The hash value of the service node constructs firmware version safety check mechanism;Wherein, node content includes service node and deposits thereon The characteristic information of the firmware software of storage;
Step S40, intelligent terminal downloads corresponding hash value from the service node of P2P network topology structure, according to the hash value Firmware version safety check is carried out, and downloads, save the firmware software for passing through verification, and upgraded using the firmware software.
2. the method according to claim 1, wherein when firmware software is in the clothes for being uploaded to firmware downloading for the first time When business node, firmware software is split into multiple portions, is respectively stored on more firmware download service nodes, and generated corresponding Index file;
Intelligent terminal connects a service node, download part firmware software;According to the component mark of the portion firmware software of downloading Know, the service node for having other parts firmware software is successively searched from P2P network topology structure, and successively download all solid The component of part software;Complete firmware software is assembled into according to index file.
3. the method according to claim 1, wherein node content includes: the service node for storing firmware software Node ID, device type, device model;Firmware version number, the firmware size of the firmware software stored on the service node Address hash value, firmware storage time stamp is locally-downloaded in byte value, firmware;The service node downloads a upper service for firmware software The hash value of node;
If the hash value of not upper service node, this part value is 0.
4. according to the method described in claim 3, it is characterized in that, intelligent terminal save by verification firmware software after, benefit Firmware is generated with hash algorithm, and address hash value is locally-downloaded;
It recycles hash algorithm to calculate the node content of the intelligent terminal, obtains the hash value of the intelligent terminal, and lead to The block node that block chain common recognition authentication mechanism converts the intelligent terminal on block chain is crossed, P2P network topology is become The service node that a firmware is downloaded in structure.
5. according to the method described in claim 4, it is characterized in that, step S40 specifically includes the following steps:
Step S41, user opens intelligent terminal, and after networking, declares according to corresponding P2P agreement and finds that P2P network is opened up Flutter the service node in structure;
Step S42, any one of intelligent terminal and discovery service node establish connection, and the clothes are downloaded from the service node The hash value of business node, parses the hash value and obtains corresponding node content;
Step S43, the spy that address obtains the firmware software stored on service node is locally-downloaded according to the firmware in node content Reference breath;
Step S44, judge whether the characteristic information of the firmware software obtained and the node content that parsing obtains are consistent, if one It causes, executes step S45;Otherwise, step S48 is executed;
Step S45, firmware software is downloaded and saved, and address is locally-downloaded using the firmware that hash algorithm generates intelligent terminal Hash value;
Step S46, it is calculated using node content of the hash algorithm to the intelligent terminal, obtains the hash of the intelligent terminal Value, and a block node on block chain is converted the intelligent terminal to by block chain common recognition authentication mechanism;
Step S47, intelligent terminal upgrading is carried out using the firmware software of downloading, then executes step S49;
Step S48, the service node is removed by P2P network and block chain according to P2P agreement and block chain common recognition authentication mechanism;
Step S49, terminate this upgrading.
6. the method according to claim 1, wherein being used before the calculating for carrying out hash value to node content Public private key pair is encrypted to whole node contents or only to the part of nodes content of agreement.
7. the method according to claim 1, wherein hash algorithm includes AES, SHA, RSA, ECC.
8. the method according to claim 1, wherein block chain common recognition authentication mechanism includes proof of work, power Benefit proof, equity authorisation verification.
9. one kind realizes embedded hardware OTA upgrade-system based on block chain, which is characterized in that be used for including multiple as intelligence eventually It holds hardware OTA upgrading to provide the service node of firmware download service, constitutes a decentralization between multiple service nodes P2P network topology structure;
In the P2P network topology structure each service node be equipped with common recognition verification algorithm module and safe encrypted authentication algorithm and Download release module;
Block chain common recognition authentication mechanism of the common recognition verification algorithm module by P2P network topology structure, certification addition P2P net The service node of network is a block node of block chain;
The safe encrypted authentication algorithm and downloading release module carry out node content using hash algorithm the clothes are calculated The hash value of business node, and hash value is issued;The firmware software stored on the service node is by other intelligent terminals When downloading, firmware version safety check is carried out to current firmware software using hash value, and check results are issued into the intelligence eventually End;Wherein, node content includes the characteristic information of service node and the firmware software stored thereon.
CN201910119485.9A 2019-02-18 2019-02-18 System and method for realizing embedded hardware OTA (over the air) upgrading based on block chain Active CN109889589B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910119485.9A CN109889589B (en) 2019-02-18 2019-02-18 System and method for realizing embedded hardware OTA (over the air) upgrading based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910119485.9A CN109889589B (en) 2019-02-18 2019-02-18 System and method for realizing embedded hardware OTA (over the air) upgrading based on block chain

Publications (2)

Publication Number Publication Date
CN109889589A true CN109889589A (en) 2019-06-14
CN109889589B CN109889589B (en) 2021-11-23

Family

ID=66928374

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910119485.9A Active CN109889589B (en) 2019-02-18 2019-02-18 System and method for realizing embedded hardware OTA (over the air) upgrading based on block chain

Country Status (1)

Country Link
CN (1) CN109889589B (en)

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110493345A (en) * 2019-08-23 2019-11-22 北京智芯微电子科技有限公司 Internet-of-things terminal method for upgrading software and system based on block chain
CN110704392A (en) * 2019-08-21 2020-01-17 平安科技(深圳)有限公司 Block chain network upgrading method and device, storage medium and electronic equipment
CN110730079A (en) * 2019-10-16 2020-01-24 北京仁信证科技有限公司 Embedded system safe starting and credibility measuring system based on credible computing module
CN111522563A (en) * 2020-04-20 2020-08-11 中国工商银行股份有限公司 Block chain-based terminal upgrade protection system and method
WO2020011287A3 (en) * 2019-10-15 2020-08-20 Alipay (Hangzhou) Information Technology Co., Ltd. Indexing and recovering encoded blockchain data
CN111782238A (en) * 2020-05-27 2020-10-16 华帝股份有限公司 Software upgrading method and system for intelligent household electrical appliance
CN111984295A (en) * 2020-08-22 2020-11-24 暗链科技(深圳)有限公司 Block chain software whole-network updating method, storage medium and electronic equipment
CN112148333A (en) * 2020-10-10 2020-12-29 上海聪链信息科技有限公司 Block chain server firmware updating system
CN112162770A (en) * 2020-10-20 2021-01-01 深圳技术大学 Firmware version upgrading method and device for realizing integrity verification based on block chain
CN112256596A (en) * 2020-10-23 2021-01-22 英业达科技有限公司 Method for refreshing signal repeater in electronic device firmware
CN112328291A (en) * 2020-12-11 2021-02-05 上海市民信箱信息服务有限公司 APP light application market software version control method
WO2021036545A1 (en) * 2019-08-29 2021-03-04 腾讯科技(深圳)有限公司 Smart contract-based data processing method, and device and storage medium
CN112559005A (en) * 2020-11-27 2021-03-26 南京南瑞信息通信科技有限公司 Internet of things equipment firmware updating method and system based on block chain and distributed storage
CN112947967A (en) * 2021-03-08 2021-06-11 中国联合网络通信集团有限公司 Software updating method, block chain application store and software uploading terminal
CN113190252A (en) * 2021-05-14 2021-07-30 广州国联通信有限公司 Remote online firmware updating method and device based on train broadcasting system
CN113434170A (en) * 2021-06-22 2021-09-24 重庆长安汽车股份有限公司 Finished automobile OTA data downloading and deploying method and device
CN113849213A (en) * 2021-10-15 2021-12-28 四川启睿克科技有限公司 OTA (over the air) upgrading system and method of edge device
CN114095538A (en) * 2021-11-18 2022-02-25 四川启睿克科技有限公司 Bidirectional authentication method for OTA (over the air) upgrading of Internet of things equipment based on block chain technology
CN114168176A (en) * 2021-12-15 2022-03-11 四川启睿克科技有限公司 Block chain-based cross-manufacturer equipment upgrading system and method
TWI757934B (en) * 2020-10-27 2022-03-11 英業達股份有限公司 Method for updating redriver in firmware of electronic device
WO2022111214A1 (en) * 2020-11-30 2022-06-02 青岛海尔电冰箱有限公司 Blockchain-based refrigerator program upgrade method and refrigerator
CN114637987A (en) * 2022-05-18 2022-06-17 广州万协通信息技术有限公司 Security chip firmware downloading method and system based on platform verification
WO2022183371A1 (en) * 2021-03-02 2022-09-09 深圳大学 Firmware update method, apparatus and system for internet of things device, and storage medium
US11645303B2 (en) 2019-07-15 2023-05-09 Tencent Technology (Shenzhen) Company Limited Data synchronization method and apparatus of distributed system, medium, and electronic device

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101247416A (en) * 2008-03-25 2008-08-20 中兴通讯股份有限公司 Firmware downloading method, preprocessing method and integrality verification method based on OTA
CN103092657A (en) * 2013-01-18 2013-05-08 郑州威科姆科技股份有限公司 Embedded device upgrade method based on peer-to-peer (P2P)
CN104836848A (en) * 2015-04-14 2015-08-12 闪联信息技术工程中心有限公司 Method for remotely upgrading intelligent household electrical appliances
CN105653315A (en) * 2015-12-23 2016-06-08 北京工业大学 Block chain technology-based node operation system downloading method
US20160261690A1 (en) * 2015-03-02 2016-09-08 Dell Products L.P. Computing device configuration and management using a secure decentralized transaction ledger
CN106789236A (en) * 2016-12-20 2017-05-31 深圳盈达信息科技有限公司 A kind of method of the FOTA remote onlines upgrading of fusion WiFiP2P
CN107077557A (en) * 2016-12-29 2017-08-18 深圳前海达闼云端智能科技有限公司 The method and device that software application is issued and verified
CN108270573A (en) * 2018-01-12 2018-07-10 西安电子科技大学 The method for secret protection of pilotless automobile
CN108270874A (en) * 2018-02-05 2018-07-10 武汉斗鱼网络科技有限公司 The update method and device of application program
CN108737498A (en) * 2018-04-18 2018-11-02 中国地质大学(武汉) A kind of P2P safety download detection method and system based on block chain

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101247416A (en) * 2008-03-25 2008-08-20 中兴通讯股份有限公司 Firmware downloading method, preprocessing method and integrality verification method based on OTA
CN103092657A (en) * 2013-01-18 2013-05-08 郑州威科姆科技股份有限公司 Embedded device upgrade method based on peer-to-peer (P2P)
US20160261690A1 (en) * 2015-03-02 2016-09-08 Dell Products L.P. Computing device configuration and management using a secure decentralized transaction ledger
CN104836848A (en) * 2015-04-14 2015-08-12 闪联信息技术工程中心有限公司 Method for remotely upgrading intelligent household electrical appliances
CN105653315A (en) * 2015-12-23 2016-06-08 北京工业大学 Block chain technology-based node operation system downloading method
CN106789236A (en) * 2016-12-20 2017-05-31 深圳盈达信息科技有限公司 A kind of method of the FOTA remote onlines upgrading of fusion WiFiP2P
CN107077557A (en) * 2016-12-29 2017-08-18 深圳前海达闼云端智能科技有限公司 The method and device that software application is issued and verified
CN108270573A (en) * 2018-01-12 2018-07-10 西安电子科技大学 The method for secret protection of pilotless automobile
CN108270874A (en) * 2018-02-05 2018-07-10 武汉斗鱼网络科技有限公司 The update method and device of application program
CN108737498A (en) * 2018-04-18 2018-11-02 中国地质大学(武汉) A kind of P2P safety download detection method and system based on block chain

Cited By (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11645303B2 (en) 2019-07-15 2023-05-09 Tencent Technology (Shenzhen) Company Limited Data synchronization method and apparatus of distributed system, medium, and electronic device
CN110704392A (en) * 2019-08-21 2020-01-17 平安科技(深圳)有限公司 Block chain network upgrading method and device, storage medium and electronic equipment
CN110704392B (en) * 2019-08-21 2023-03-31 平安科技(深圳)有限公司 Block chain network upgrading method and device, storage medium and electronic equipment
CN110493345A (en) * 2019-08-23 2019-11-22 北京智芯微电子科技有限公司 Internet-of-things terminal method for upgrading software and system based on block chain
US11733991B2 (en) 2019-08-29 2023-08-22 Tencent Technology (Shenzhen) Company Limited Data processing method based on intelligent contract, device, and storage medium
JP2022502738A (en) * 2019-08-29 2022-01-11 ▲騰▼▲訊▼科技(深▲セン▼)有限公司 Data processing methods based on smart contracts, data processing equipment, node equipment, and computer programs
JP7199775B2 (en) 2019-08-29 2023-01-06 ▲騰▼▲訊▼科技(深▲セン▼)有限公司 Data processing method, data processing device, node device, and computer program based on smart contract
WO2021036545A1 (en) * 2019-08-29 2021-03-04 腾讯科技(深圳)有限公司 Smart contract-based data processing method, and device and storage medium
US11307927B2 (en) 2019-10-15 2022-04-19 Alipay (Hangzhou) Information Technology Co., Ltd. Indexing and recovering encoded blockchain data
KR102412024B1 (en) 2019-10-15 2022-06-22 알리페이 (항저우) 인포메이션 테크놀로지 씨오., 엘티디. Indexing and recovery of encoded blockchain data
US10977114B2 (en) 2019-10-15 2021-04-13 Alipay (Hangzhou) Information Technology Co., Ltd. Indexing and recovering encoded blockchain data
WO2020011287A3 (en) * 2019-10-15 2020-08-20 Alipay (Hangzhou) Information Technology Co., Ltd. Indexing and recovering encoded blockchain data
KR20210045353A (en) * 2019-10-15 2021-04-26 알리페이 (항저우) 인포메이션 테크놀로지 씨오., 엘티디. Indexing and recovery of encoded blockchain data
CN110730079B (en) * 2019-10-16 2023-06-02 北京信长城科技发展有限公司 System for safe starting and trusted measurement of embedded system based on trusted computing module
CN110730079A (en) * 2019-10-16 2020-01-24 北京仁信证科技有限公司 Embedded system safe starting and credibility measuring system based on credible computing module
CN111522563B (en) * 2020-04-20 2023-09-19 中国工商银行股份有限公司 Terminal upgrading protection system and method based on block chain
CN111522563A (en) * 2020-04-20 2020-08-11 中国工商银行股份有限公司 Block chain-based terminal upgrade protection system and method
CN111782238A (en) * 2020-05-27 2020-10-16 华帝股份有限公司 Software upgrading method and system for intelligent household electrical appliance
CN111984295B (en) * 2020-08-22 2021-04-13 暗链科技(深圳)有限公司 Block chain software whole-network updating method, storage medium and electronic equipment
CN111984295A (en) * 2020-08-22 2020-11-24 暗链科技(深圳)有限公司 Block chain software whole-network updating method, storage medium and electronic equipment
CN112148333B (en) * 2020-10-10 2023-11-03 上海聪链信息科技有限公司 Block chain server firmware updating system
CN112148333A (en) * 2020-10-10 2020-12-29 上海聪链信息科技有限公司 Block chain server firmware updating system
CN112162770B (en) * 2020-10-20 2023-11-10 深圳技术大学 Firmware version upgrading method and device for realizing integrity verification based on block chain
CN112162770A (en) * 2020-10-20 2021-01-01 深圳技术大学 Firmware version upgrading method and device for realizing integrity verification based on block chain
CN112256596A (en) * 2020-10-23 2021-01-22 英业达科技有限公司 Method for refreshing signal repeater in electronic device firmware
CN112256596B (en) * 2020-10-23 2022-07-05 英业达科技有限公司 Method for refreshing signal repeater in electronic device firmware
TWI757934B (en) * 2020-10-27 2022-03-11 英業達股份有限公司 Method for updating redriver in firmware of electronic device
CN112559005A (en) * 2020-11-27 2021-03-26 南京南瑞信息通信科技有限公司 Internet of things equipment firmware updating method and system based on block chain and distributed storage
WO2022111214A1 (en) * 2020-11-30 2022-06-02 青岛海尔电冰箱有限公司 Blockchain-based refrigerator program upgrade method and refrigerator
CN112328291A (en) * 2020-12-11 2021-02-05 上海市民信箱信息服务有限公司 APP light application market software version control method
WO2022183371A1 (en) * 2021-03-02 2022-09-09 深圳大学 Firmware update method, apparatus and system for internet of things device, and storage medium
CN112947967B (en) * 2021-03-08 2023-09-26 中国联合网络通信集团有限公司 Software updating method, blockchain application store and software uploading terminal
CN112947967A (en) * 2021-03-08 2021-06-11 中国联合网络通信集团有限公司 Software updating method, block chain application store and software uploading terminal
CN113190252A (en) * 2021-05-14 2021-07-30 广州国联通信有限公司 Remote online firmware updating method and device based on train broadcasting system
CN113434170B (en) * 2021-06-22 2023-03-14 重庆长安汽车股份有限公司 Finished automobile OTA data downloading and deploying method and device
CN113434170A (en) * 2021-06-22 2021-09-24 重庆长安汽车股份有限公司 Finished automobile OTA data downloading and deploying method and device
CN113849213A (en) * 2021-10-15 2021-12-28 四川启睿克科技有限公司 OTA (over the air) upgrading system and method of edge device
CN113849213B (en) * 2021-10-15 2024-05-14 四川启睿克科技有限公司 OTA upgrading system and method for edge equipment
CN114095538A (en) * 2021-11-18 2022-02-25 四川启睿克科技有限公司 Bidirectional authentication method for OTA (over the air) upgrading of Internet of things equipment based on block chain technology
CN114095538B (en) * 2021-11-18 2023-03-07 四川启睿克科技有限公司 Bidirectional authentication method for OTA (over the air) upgrading of Internet of things equipment based on block chain technology
CN114168176A (en) * 2021-12-15 2022-03-11 四川启睿克科技有限公司 Block chain-based cross-manufacturer equipment upgrading system and method
CN114637987A (en) * 2022-05-18 2022-06-17 广州万协通信息技术有限公司 Security chip firmware downloading method and system based on platform verification
CN114637987B (en) * 2022-05-18 2022-08-12 广州万协通信息技术有限公司 Security chip firmware downloading method and system based on platform verification

Also Published As

Publication number Publication date
CN109889589B (en) 2021-11-23

Similar Documents

Publication Publication Date Title
CN109889589A (en) One kind realizing embedded hardware OTA upgrade-system and method based on block chain
US11943376B1 (en) Template based credential provisioning
CN107770182B (en) Data storage method of home gateway and home gateway
CN102271042B (en) Certificate authorization method, system, universal serial bus (USB) Key equipment and server
US11128647B2 (en) Cryptocurrencies malware based detection
KR101956486B1 (en) Method and system for facilitating terminal identifiers
US20200106775A1 (en) Method, device, system for authenticating an accessing terminal by server, server and computer readable storage medium
CN111182525B (en) Method and device for storing data
CN110362990A (en) Using the security processing of installation, apparatus and system
CN102982257A (en) Digital rights management using trusted processing techniques
WO2010085781A1 (en) Provisioned firmware updates using object identifiers
CN110601815B (en) Block chain data processing method and equipment
CN111815321A (en) Transaction proposal processing method, device, system, storage medium and electronic device
CN105099705B (en) A kind of safety communicating method and its system based on usb protocol
CN109829294A (en) A kind of firmware validation method, system, server and electronic equipment
US20160330030A1 (en) User Terminal For Detecting Forgery Of Application Program Based On Hash Value And Method Of Detecting Forgery Of Application Program Using The Same
CN108171019B (en) Anti-counterfeiting verification method, anti-counterfeiting verification system, anti-counterfeiting verification device and storage medium
US10263980B2 (en) Network node, device and methods for providing an authentication module
CN112527912A (en) Data processing method and device based on block chain network and computer equipment
WO2018086276A1 (en) Method and device used for verifying application security
WO2017066995A1 (en) Method and device for preventing unauthorized access to server
CN109600451A (en) A kind of terminal device firmware upgrade method and system based on Websocket long connection
BR102019005184B1 (en) METHOD AND SYSTEM FOR PROVISIONING A SAFE TERMINAL
CN111367923A (en) Data processing method, data processing device, node equipment and storage medium
CN114338054B (en) Block chain trusted data transmission, verification and acquisition method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant