CN110175040B - Data processing method, OTA client, electronic device and storage medium - Google Patents

Data processing method, OTA client, electronic device and storage medium Download PDF

Info

Publication number
CN110175040B
CN110175040B CN201910392785.4A CN201910392785A CN110175040B CN 110175040 B CN110175040 B CN 110175040B CN 201910392785 A CN201910392785 A CN 201910392785A CN 110175040 B CN110175040 B CN 110175040B
Authority
CN
China
Prior art keywords
fingerprint
algorithm
storage space
space
trusted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910392785.4A
Other languages
Chinese (zh)
Other versions
CN110175040A (en
Inventor
鲍成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Silead Inc
Original Assignee
Silead Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Silead Inc filed Critical Silead Inc
Priority to CN201910392785.4A priority Critical patent/CN110175040B/en
Publication of CN110175040A publication Critical patent/CN110175040A/en
Application granted granted Critical
Publication of CN110175040B publication Critical patent/CN110175040B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The embodiment of the specification provides a data processing method, an OTA client, electronic equipment and a storage medium. The data processing method comprises the following steps: the OTA client receives an algorithm upgrading request initiated by an OTA server; the algorithm upgrading request carries a first fingerprint algorithm; the OTA client confirms whether the first fingerprint algorithm is compatible with one or more existing second fingerprint algorithms; when the first fingerprint algorithm is not compatible with the second fingerprint algorithm, the OTA client determines an empty trusted storage space from the designated trusted storage space set according to the space policy table; the space policy table comprises a one-to-one correspondence between a fingerprint algorithm and a trusted storage space; the OTA client stores the first fingerprint algorithm into an empty trusted storage space; and the OTA client returns an upgrading result to the OTA server. The embodiment of the specification can remove the limitation of the compatibility of the new version and the old version of the fingerprint algorithm caused by the OTA upgrading of the fingerprint algorithm.

Description

Data processing method, OTA client, electronic device and storage medium
Technical Field
The present disclosure relates to the field of fingerprint identification technologies, and in particular, to a data processing method, an OTA client, an electronic device, and a storage medium.
Background
An Over-the-Air (OTA) technology refers to a technology for downloading an upgrade package on a remote server by an electronic device (such as a mobile terminal) through a wireless network, and upgrading a system or an application, so as to improve a working program or source code in hardware, and improve compatibility, performance or function.
For the fingerprint identification system of the electronic equipment, after the OTA is upgraded, the upgraded version is ensured to be compatible with the old version, and the existing fingerprint data is still normal (for example, the recorded fingerprint still exists and can be unlocked normally).
In carrying out the present application, the inventors of the present application found that: when the OTA upgrades the fingerprint algorithm each time, the OTA needs to be compatible with the previous version, for example, when the fingerprint algorithm is upgraded from algorithm a to algorithm B, B must be kept compatible with a, that is, a is a subset of B, so that the fingerprint after the OTA upgrade can be kept normal, which brings limitation to the fingerprint algorithm and limits the efficiency of the fingerprint algorithm. Moreover, if algorithm a is not a subset of algorithm B, then after OTA upgrade, the old fingerprint template data will not be available (i.e., the fingerprint entered by the user before upgrade, the unlock result after upgrade is unknown). Once this occurs, the old fingerprint template data can generally only be forcefully deleted in the OTA upgrade, which destroys the user's data and can cause trouble to the user.
Disclosure of Invention
An objective of the embodiments of the present disclosure is to provide a data processing method, an OTA client, an electronic device, and a storage medium, so as to remove limitation of compatibility between new and old versions of a fingerprint algorithm caused by OTA upgrade of the fingerprint algorithm.
To achieve the above object, in one aspect, an embodiment of the present disclosure provides a data processing method, including:
the OTA client receives an algorithm upgrading request initiated by an OTA server; the algorithm upgrading request carries a first fingerprint algorithm;
the OTA client confirms whether the first fingerprint algorithm is compatible with one or more existing second fingerprint algorithms;
when the first fingerprint algorithm is not compatible with the second fingerprint algorithm, the OTA client determines an empty trusted storage space from a designated trusted storage space set according to a space policy table; the space policy table comprises a one-to-one correspondence between a fingerprint algorithm and a trusted storage space;
the OTA client stores the first fingerprint algorithm into the empty trusted storage space;
and the OTA client returns an upgrading result to the OTA server.
On the other hand, the embodiment of the present specification further provides an OTA client, where the OTA client includes a client application and a trusted application, and the trusted application includes:
The upgrade request receiving module is used for receiving an algorithm upgrade request initiated by the OTA server; the algorithm upgrading request carries a first fingerprint algorithm;
the algorithm compatibility judging module is used for confirming whether the first fingerprint algorithm is compatible with one or more existing second fingerprint algorithms;
the storage space determining module is used for determining an empty trusted storage space from a specified trusted storage space set according to a space policy table when the first fingerprint algorithm is not compatible with the second fingerprint algorithm; the space policy table comprises a one-to-one correspondence between a fingerprint algorithm and a trusted storage space;
the fingerprint algorithm storage module is used for storing the first fingerprint algorithm into the empty trusted storage space;
and the upgrade result return module is used for returning an upgrade result to the OTA server.
On the other hand, the embodiment of the specification also provides an electronic device, which is configured with an OTA client, wherein the OTA client comprises a client application and a trusted application, and the trusted application comprises:
the upgrade request receiving module is used for receiving an algorithm upgrade request initiated by the OTA server; the algorithm upgrading request carries a first fingerprint algorithm;
The algorithm compatibility judging module is used for confirming whether the first fingerprint algorithm is compatible with one or more existing second fingerprint algorithms;
the storage space determining module is used for determining an empty trusted storage space from a specified trusted storage space set according to a space policy table when the first fingerprint algorithm is not compatible with the second fingerprint algorithm; the space policy table comprises a one-to-one correspondence between a fingerprint algorithm and a trusted storage space;
the fingerprint algorithm storage module is used for storing the first fingerprint algorithm into the empty trusted storage space;
and the upgrade result return module is used for returning an upgrade result to the OTA server.
In another aspect, the present description also provides a computer storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of:
receiving an algorithm upgrading request initiated by an OTA server; the algorithm upgrading request carries a first fingerprint algorithm;
confirming whether the first fingerprint algorithm is compatible with one or more existing second fingerprint algorithms;
when the first fingerprint algorithm is not compatible with the second fingerprint algorithm, determining an empty trusted storage space from a specified trusted storage space set according to a space policy table; the space policy table comprises a one-to-one correspondence between a fingerprint algorithm and a trusted storage space;
Storing the first fingerprint algorithm into the empty trusted memory space;
and returning an upgrading result to the OTA server.
In another aspect, an embodiment of the present disclosure further provides another data processing method, including:
the OTA client receives a fingerprint input request initiated by a user; the fingerprint input request carries fingerprint data;
the OTA client determines an empty trusted storage space from the designated trusted storage space set according to a space policy table; the space policy table comprises a one-to-one correspondence between a fingerprint algorithm and a trusted storage space;
the OTA client stores the fingerprint data as a fingerprint template into the empty trusted storage space and distributes a fingerprint algorithm for the fingerprint template;
and the OTA client returns a fingerprint input result to the user.
On the other hand, the embodiment of the present specification further provides another OTA client, where the OTA client includes a client application and a trusted application, and the trusted application includes:
the input request receiving module is used for receiving a fingerprint input request initiated by a user; the fingerprint input request carries fingerprint data;
the storage space determining module is used for determining an empty trusted storage space from the designated trusted storage space set according to the space policy table; the space policy table comprises a one-to-one correspondence between a fingerprint algorithm and a trusted storage space;
The fingerprint template input module is used for storing the fingerprint data as a fingerprint template into the empty trusted storage space and distributing a fingerprint algorithm for the fingerprint template;
and the input result returning module is used for returning the fingerprint input result to the user.
On the other hand, the embodiment of the present specification further provides another electronic device, where the electronic device is configured with an OTA client, and the OTA client includes a client application and a trusted application, and the trusted application includes:
the input request receiving module is used for receiving a fingerprint input request initiated by a user; the fingerprint input request carries fingerprint data;
the storage space determining module is used for determining an empty trusted storage space from the designated trusted storage space set according to the space policy table; the space policy table comprises a one-to-one correspondence between a fingerprint algorithm and a trusted storage space;
the fingerprint template input module is used for storing the fingerprint data as a fingerprint template into the empty trusted storage space and distributing a fingerprint algorithm for the fingerprint template;
and the input result returning module is used for returning the fingerprint input result to the user.
In another aspect, the present description provides another computer storage medium, on which a computer program is stored, which when executed by a processor, performs the steps of:
Receiving a fingerprint input request initiated by a user; the fingerprint input request carries fingerprint data;
determining an empty trusted memory space from the specified set of trusted memory spaces according to the space policy table; the space policy table comprises a one-to-one correspondence between a fingerprint algorithm and a trusted storage space;
storing the fingerprint data as a fingerprint template into the empty trusted storage space, and distributing a fingerprint algorithm for the fingerprint template;
and returning a fingerprint input result to the user.
In another aspect, an embodiment of the present disclosure further provides another data processing method, including:
the OTA client receives a fingerprint identification request initiated by a user; the fingerprint identification request carries fingerprint data;
the OTA client determines non-empty trusted storage space in the trusted storage space set according to a space policy table; the space policy table comprises a one-to-one correspondence between a fingerprint algorithm and a trusted storage space;
the OTA client performs fingerprint identification on the fingerprint data according to a fingerprint algorithm and a fingerprint template in the non-empty trusted storage space;
and the OTA client returns a fingerprint identification result to the user.
On the other hand, the embodiment of the present specification further provides another OTA client, where the OTA client includes a client application and a trusted application, and the trusted application includes:
the identification request receiving module is used for receiving a fingerprint identification request initiated by a user; the fingerprint identification request carries fingerprint data;
the storage space determining module is used for determining non-empty trusted storage spaces in the trusted storage space set according to the space policy table; the space policy table comprises a one-to-one correspondence between a fingerprint algorithm and a trusted storage space;
the fingerprint data identification module is used for carrying out fingerprint identification on the fingerprint data according to a fingerprint algorithm and a fingerprint template in the non-empty trusted storage space;
and the identification result returning module is used for returning the fingerprint identification result to the user.
On the other hand, the embodiment of the present specification further provides another electronic device, where the electronic device is configured with an OTA client, and the OTA client includes a client application and a trusted application, and the trusted application includes:
the identification request receiving module is used for receiving a fingerprint identification request initiated by a user; the fingerprint identification request carries fingerprint data;
The storage space determining module is used for determining non-empty trusted storage spaces in the trusted storage space set according to the space policy table; the space policy table comprises a one-to-one correspondence between a fingerprint algorithm and a trusted storage space;
the fingerprint data identification module is used for carrying out fingerprint identification on the fingerprint data according to a fingerprint algorithm and a fingerprint template in the non-empty trusted storage space;
and the identification result returning module is used for returning the fingerprint identification result to the user.
In another aspect, the present description provides another computer storage medium, on which a computer program is stored, which when executed by a processor, performs the steps of:
receiving a fingerprint identification request initiated by a user; the fingerprint identification request carries fingerprint data;
determining non-empty trusted storage space in the trusted storage space set according to the space policy table; the space policy table comprises a one-to-one correspondence between a fingerprint algorithm and a trusted storage space;
fingerprint identification is carried out on the fingerprint data according to a fingerprint algorithm and a fingerprint template in the non-empty trusted storage space;
and returning a fingerprint identification result to the user.
As can be seen from the technical solutions provided in the embodiments of the present disclosure, based on the embodiments of the present disclosure, when an OTA client discovers that a new version of fingerprint algorithm is not compatible with an old version of fingerprint algorithm during each OTA upgrade, an empty trusted storage space can be selected for the new version of fingerprint algorithm according to the space policy table, so that the incompatible fingerprint algorithm can be distributed in different trusted storage spaces, and fingerprint identification can be performed subsequently according to the fingerprint algorithms and fingerprint templates stored in the trusted storage spaces. Therefore, the limitation of the OTA upgrading of the fingerprint algorithm on the compatibility of new and old versions of the fingerprint algorithm is relieved, and the normal OTA upgrading can be realized no matter whether the new and old versions of the fingerprint algorithm are compatible or not. Therefore, the problems that in the prior art, the fingerprint identification result is unknown or fingerprint template data of a user is damaged due to incompatibility of new and old versions are avoided.
Drawings
In order to more clearly illustrate the embodiments of the present description or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some of the embodiments described in the present description, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art. In the drawings:
FIG. 1 is a block diagram of an electronic device in some embodiments of the present description;
FIG. 2 is a schematic diagram of dividing a trusted memory space corresponding to a trusted application into multiple independent portions according to some embodiments of the present disclosure;
FIG. 3 is a schematic diagram of a space policy table located in a client application in some embodiments of the present description;
FIG. 4 is a schematic diagram of a space policy table in a trusted application in some embodiments of the present description;
FIG. 5 is a schematic diagram of a space policy table in some embodiments of the present description;
FIG. 6 is a schematic diagram of a space strategy table according to other embodiments of the present disclosure;
FIG. 7 is a schematic diagram of a space strategy table according to other embodiments of the present disclosure;
FIG. 8 is a flow chart of a method of data processing (in a fingerprint algorithm upgrade scenario) in some embodiments of the present description;
FIG. 9 is a method flow diagram of a data processing method (in a fingerprint entry scenario) in some embodiments of the present description;
FIG. 10 is a flow chart of a method of data processing (in a fingerprint recognition scenario) in some embodiments of the present description;
FIG. 11 is a block diagram of the structure of a trusted application in some embodiments of the present description;
FIG. 12 is a block diagram of a trusted application in further embodiments of the present description;
Fig. 13 is a block diagram of a trusted application in other embodiments of the present description.
Detailed Description
In order to make the technical solutions in the present specification better understood by those skilled in the art, the technical solutions in the embodiments of the present specification will be clearly and completely described below with reference to the drawings in the embodiments of the present specification, and it is obvious that the described embodiments are only some embodiments of the present specification, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are intended to be within the scope of the present disclosure.
The electronic device in the embodiment of the present specification is a terminal device based on ARM trust zone technology. Thus, in the electronic device of the embodiment of the present specification, there are two independent execution environments, i.e., a ready execution environment (Trust Execution Environment, TEE for short) and a general execution environment (Rich Execution Environment, re for short). Both the TEE and the REE have their own Operating System (OS) and user applications, and communication between the TEE and the REE can be through a secure Monitor. In general, an application running in a TEE environment is referred to as a trusted application (Trust Application, TA for short), and an application running in a re environment is referred to as a client application (Client Application, CA for short). The CA can call the TA, the TA can acquire the request and the request parameter of the CA from the shared memory, the TA executes the processing under the TEE environment, the obtained processing result can also be written into the shared memory, and the CA can acquire the processing result through the shared memory. The CA and TA may form an OTA client configured in an electronic device of embodiments of the present description, such as shown in fig. 1.
In some embodiments of the present description, the electronic device may be a desktop computer, a tablet computer, a notebook computer, a smart phone, a digital assistant, a smart wearable device, or the like. Wherein, intelligent wearable equipment can include intelligent bracelet, intelligent wrist-watch, intelligent glasses, intelligent helmet etc..
In order to remove the limitation of the compatibility of new and old versions of the fingerprint algorithm by OTA upgrading of the fingerprint algorithm. The inventors of the present application have discovered that TA-specific secure storage may be divided into multiple trusted storage (or multiple trusted storage may be created within TA-specific secure storage, such as shown in fig. 2).
Meanwhile, the OTA client may also define and maintain a space policy table, where the space policy table may include a one-to-one correspondence between a fingerprint algorithm and a trusted storage space, for example, as shown in fig. 5.
Thus, when the new version of the fingerprint algorithm is found to be incompatible with the old version of the fingerprint algorithm during each OTA upgrade, an empty trusted memory space (here, the "empty trusted memory space" refers to the current state of the trusted memory space is empty, i.e. the trusted memory space in which any fingerprint algorithm and fingerprint template are not currently stored) can be selected for the new version of the fingerprint algorithm according to the space policy table, so that the incompatible fingerprint algorithm can be distributed in different trusted memory spaces, and fingerprint identification can be performed according to the fingerprint algorithm and the fingerprint template stored in the trusted memory spaces. Therefore, the limitation of the OTA upgrading of the fingerprint algorithm on the compatibility of new and old versions of the fingerprint algorithm is relieved, and the normal OTA upgrading can be realized no matter whether the new and old versions of the fingerprint algorithm are compatible or not. Therefore, the problems that in the prior art, the fingerprint identification result is unknown or fingerprint template data of a user is damaged due to incompatibility of new and old versions are avoided.
The spatial policy table in the embodiments of the present specification may be placed in any suitable location, and this specification is not limiting. For example, in some embodiments of the present description, as shown in fig. 3, the space policy table may be located at the CA side and be serviced by the CA (how the maintenance is specifically described below). In other embodiments of the present disclosure, as shown in fig. 4, the space policy table may also be located on the TA side and be maintained by the TA (how the maintenance is described later).
In some embodiments of the present disclosure, for facilitating the upgrade of the fingerprint algorithm, the TA of the OTA server may include an upgrade request receiving module 111, an algorithm compatibility determining module 112, a storage space determining module 113, a fingerprint algorithm saving module 114, and an upgrade result returning module 115, as shown in fig. 11. Wherein:
the upgrade request receiving module 111 may be configured to receive an algorithm upgrade request initiated by an OTA server; the algorithm upgrade request may carry a first fingerprint algorithm. The upgrade request receiving module 111 may receive, through the CA, an algorithm upgrade request initiated by the OTA server. The CA can receive the algorithm upgrading request initiated by the OTA server and write the algorithm upgrading request into the shared memory; accordingly, the upgrade request receiving module 111 may read the algorithm upgrade request from the shared memory.
The algorithm compatibility determination module 112 may be configured to determine whether the first fingerprint algorithm is compatible with one or more existing second fingerprint algorithms.
A storage space determining module 113, configured to determine, when the first fingerprint algorithm is not compatible with the second fingerprint algorithm, an empty trusted storage space from a specified set of trusted storage spaces according to a space policy table; the space policy table comprises a one-to-one correspondence between a fingerprint algorithm and a trusted storage space.
The fingerprint algorithm storage module 114 may be configured to store the first fingerprint algorithm in the empty trusted memory space.
The upgrade result returning module 115 may be configured to return an upgrade result to the OTA server. The upgrade result returning module 115 may return the upgrade result to the OTA server through CA. Since the upgrade result return module 115 may write the upgrade result into the shared memory; correspondingly, the CA can read the upgrading result from the shared memory and return the upgrading result to the OTA server.
As shown in connection with fig. 12, in some embodiments of the present description, to facilitate fingerprint data entry, the TA may include an entry request receiving module 121, a storage space determining module 122, a fingerprint template entry module 123, and an entry result returning module 124. Wherein:
The input request receiving module 121 may be configured to receive a fingerprint input request initiated by a user; the fingerprint input request carries fingerprint data. Wherein the entry request receiving module 121 may receive a user initiated fingerprint entry request through the CA. The CA can receive a fingerprint input request initiated by a user and write the fingerprint input request into the shared memory; accordingly, the entry request receiving module 121 may read the fingerprint entry request from the shared memory.
A storage space determination module 122, configured to determine an empty trusted storage space from the specified set of trusted storage spaces according to the space policy table; the space policy table comprises a one-to-one correspondence between a fingerprint algorithm and a trusted storage space.
The fingerprint template entry module 123 may be configured to store the fingerprint data as a fingerprint template in the empty trusted storage space, and assign a fingerprint algorithm to the fingerprint template.
An entry result return module 124 may be used to return fingerprint entry results to the user. Wherein the logging result return module 124 may return the upgrade result to the user through CA. The fingerprint input result can be written into the shared memory by the input result returning module 124; correspondingly, the CA can read the fingerprint input result from the shared memory and return the fingerprint input result to the user.
In some embodiments of the present disclosure, for convenience of fingerprint recognition, the TA may include a recognition request receiving module 131, a storage space determining module 132, a fingerprint data recognizing module 133, and a log recognition result returning module 134, as shown in fig. 13. Wherein:
the recognition request receiving module 131 may be configured to receive a fingerprint recognition request initiated by a user; the fingerprint identification request carries fingerprint data. The recognition request receiving module 131 may receive a fingerprint recognition request initiated by a user through the CA, that is, the CA may receive the fingerprint recognition request initiated by the user and write the fingerprint recognition request into the shared memory; accordingly, the identification request receiving module 131 may read the fingerprint identification request from the shared memory.
A storage space determination module 132, configured to determine, according to a space policy table, a non-empty trusted storage space in the set of trusted storage spaces; the space policy table comprises a one-to-one correspondence between a fingerprint algorithm and a trusted storage space.
The fingerprint data identification module 133 may be configured to perform fingerprint identification on the fingerprint data according to a fingerprint algorithm and a fingerprint template in the non-empty trusted storage space.
The recognition result returning module 134 may be configured to return the fingerprint recognition result to the CA. Wherein the recognition result returning module 134 may return the fingerprint recognition result to the user through CA. Since the recognition result returning module 134 can write the fingerprint recognition result into the shared memory; correspondingly, the CA can read the fingerprint identification result from the shared memory and return the fingerprint identification result to the user.
For convenience of description, the above devices are described as being functionally divided into various units, respectively. Of course, the functions of each element may be implemented in one or more software and/or hardware elements when implemented in the present specification.
In conjunction with fig. 8, in a scenario of upgrading a fingerprint algorithm, the data processing method in some embodiments of the present disclosure may include the following steps:
s81, receiving an algorithm upgrading request initiated by an OTA server; the algorithm upgrade request carries a first fingerprint algorithm.
In this embodiment of the present disclosure, when a CA of an OTA client receives an algorithm upgrade request initiated by an OTA server, an upgrade package may be first downloaded from the server based on an OTA technology, and after the algorithm upgrade request is formed based on the upgrade package, the upgrade package may be written into a shared memory for use by the TA. The upgrade package refers to a new version of fingerprint algorithm, namely, refers to a first fingerprint algorithm in the embodiment of the present specification.
S82, confirming whether the first fingerprint algorithm is compatible with one or more existing second fingerprint algorithms. If the first fingerprint algorithm is not compatible with the second fingerprint algorithm, executing step S83 and subsequent steps; otherwise, step S83b and subsequent steps are performed.
In some embodiments of the present disclosure, whether the first fingerprint algorithm and the second fingerprint algorithm are compatible may be determined based on any suitable existing version compatibility identification method, which is not limited in this disclosure.
S83a, when the first fingerprint algorithm is not compatible with the second fingerprint algorithm, determining an empty trusted storage space from a designated trusted storage space set according to a space policy table.
In the present specification, the designated trusted storage space set is a trusted storage space set formed by a plurality of trusted storage spaces corresponding to the TA.
In some embodiments of the present disclosure, if the space policy table is located at the CA side and is responsible for maintenance by the CA, the algorithm upgrade request may carry a space identifier; the space identifier is a space identifier of a trusted memory space selected by the CA from the space policy table to be empty. For example, by traversing the space policy table, the CA may learn the storage states of each trusted storage space in the set of trusted storage spaces, so that it may determine which trusted storage spaces currently have empty storage states, and may select one trusted storage space from the trusted storage spaces with empty storage states for storing a first fingerprint algorithm that is incompatible with a second fingerprint algorithm. Correspondingly, the TA may determine, according to the space identifier carried in the algorithm upgrade request, a corresponding trusted storage space from the trusted storage space set.
In some embodiments of the present disclosure, if the space policy table is located on the TA side and is in charge of maintenance by the TA, the TA may select a space identifier corresponding to an empty trusted storage space from the space policy table, and determine a corresponding trusted storage space from the set of trusted storage spaces according to the space identifier.
And S83b, when the first fingerprint algorithm is compatible with the second fingerprint algorithm, replacing the compatible second fingerprint algorithm with the first fingerprint algorithm in a trusted storage space corresponding to the compatible second fingerprint algorithm, and executing step S85 in a jumping manner.
S84, storing the first fingerprint algorithm into the empty trusted storage space.
In some embodiments of the present disclosure, if the space policy table is located at the TA side and is in charge of maintenance by the TA, after storing the first fingerprint algorithm in the empty trusted storage space, the TA may further update the fingerprint algorithm identifier corresponding to the first fingerprint algorithm into the space policy table. That is, in the space policy table, the fingerprint algorithm identifier corresponding to the first fingerprint algorithm is written into the fingerprint algorithm identifier field corresponding to the empty trusted memory space, for example, in fig. 5, the fingerprint algorithm identifier a is written into the fingerprint algorithm identifier field corresponding to the space a.
S85, returning an upgrading result to the OTA server.
In step S81, the TA performs processing in the TEE environment, and the obtained processing result may be filled into the shared memory, so that the CA may obtain the processing result by reading the shared memory, and may return the upgrade result to the OTA server.
In some embodiments of the present disclosure, if the space policy table is located at the CA side and is responsible for maintenance by the CA, and algorithm identifiers of the fingerprint algorithms are uniformly distributed by the CA, when the upgrade result is that the upgrade is successful, the CA of the upgraded OTA client may carry the fingerprint algorithm identifier corresponding to the first fingerprint algorithm. Therefore, the CA can write the fingerprint algorithm identification corresponding to the first fingerprint algorithm into the fingerprint algorithm identification field corresponding to the empty trusted memory space in the space policy table.
In some embodiments of the present disclosure, if the space policy table is located at the TA side and is responsible for maintenance by the TA, and algorithm identifiers of the fingerprint algorithms are uniformly distributed by the TA, when the upgrade result is that the upgrade is successful, the TA of the upgraded OTA client may carry the fingerprint algorithm identifier corresponding to the first fingerprint algorithm. Therefore, the TA can write the fingerprint algorithm identification corresponding to the first fingerprint algorithm into the fingerprint algorithm identification field corresponding to the empty trusted memory space in the space policy table.
Therefore, in the embodiment of the specification, the limitation of the compatibility of the new version and the old version of the fingerprint algorithm by the OTA upgrading of the fingerprint algorithm is relieved, so that the incompatible fingerprint algorithm can be subjected to normal OTA upgrading, thereby avoiding destroying the existing fingerprint data of a user, avoiding the risk of unknown fingerprint identification result, avoiding the return to factories or the return to sale after-sales of the machine, and saving the cost. In addition, the limitation of OTA upgrading of the fingerprint algorithm on compatibility of new and old versions of the fingerprint algorithm is eliminated, and the problem of version compatibility is not required to be considered when the fingerprint algorithm of a new version is researched, so that the development difficulty is reduced, and the benefit of researching and developing the fingerprint algorithm is improved.
As shown in connection with fig. 9, in a fingerprint-entry scenario, the data processing method in some embodiments of the present description may include the following steps:
s91, receiving a fingerprint input request initiated by a user; the fingerprint input request carries fingerprint data.
In some embodiments of the present description, the CA may receive a user initiated fingerprint-entry request and write the fingerprint-entry request carrying fingerprint data into the shared memory. Correspondingly, the TA can obtain a fingerprint input request initiated by the user by reading the shared memory.
S92, determining an empty trusted storage space from the designated trusted storage space set according to the space policy table; the space policy table comprises a one-to-one correspondence between a fingerprint algorithm and a trusted storage space.
In some embodiments of the present disclosure, if the space policy table is located at the CA side and is responsible for maintenance by the CA, the fingerprint input request may further carry a space identifier; the space identifier is a space identifier of a trusted memory space which is empty and is selected by the CA from a specified trusted memory space set according to the space policy table. Correspondingly, the TA may determine, according to the space identifier carried in the fingerprint input request, a corresponding trusted storage space from the trusted storage space set.
In some embodiments of the present disclosure, if the space policy table is located on the TA side and is in charge of maintenance by the TA, the TA may select a space identifier corresponding to an empty trusted storage space from the space policy table, and determine a corresponding trusted storage space from the set of trusted storage spaces according to the space identifier.
And S93, storing the fingerprint data as a fingerprint template into the empty trusted storage space, and distributing a fingerprint algorithm for the fingerprint template.
In some embodiments of the present description, the spatial policy table may also include an access timestamp of the fingerprinting algorithm, such as that shown in fig. 6. Thus, when the fingerprint algorithm is allocated to the fingerprint template, the latest stored fingerprint algorithm can be preferentially selected according to the stored time stamp and allocated to the fingerprint template. As technology is continuously advancing, the newer fingerprint algorithm generally has better performance, and therefore, the fingerprint algorithm with the latest storage time is preferentially selected and allocated to the fingerprint template, which is beneficial to improving the accuracy and the safety of fingerprint identification.
In other embodiments of the present disclosure, the space policy table may further include custom fields, such as those shown in fig. 7. The user-defined field can facilitate subsequent expansion.
In some embodiments of the present disclosure, if the space policy table is located at the TA side and is in charge of maintenance by the TA, after storing the fingerprint data as a fingerprint template in the empty trusted storage space and allocating a fingerprint algorithm to the fingerprint template, the TA may write a fingerprint algorithm identifier of the fingerprint algorithm into the space policy table.
S94, returning a fingerprint input result to the CA.
In some embodiments of the present description, the TA may write the fingerprint-entry result to the shared memory. Correspondingly, the CA can read the fingerprint input result from the shared memory and return the fingerprint input result to the user, so that the user can know whether the fingerprint input is successful or not according to the fingerprint input result.
In some embodiments of the present disclosure, if the space policy table is located at the CA side and is in charge of maintenance by the CA, when the fingerprint input result is input success, the input result may carry an identifier of a fingerprint algorithm allocated to the fingerprint template, so that the CA writes the identifier of the fingerprint algorithm into the space policy table.
In conjunction with fig. 10, in a fingerprint recognition scenario, the data processing method in some embodiments of the present disclosure may include the following steps:
s101, receiving a fingerprint identification request initiated by a user; the fingerprint identification request carries fingerprint data.
In some embodiments of the present description, the CA may receive a fingerprint identification request initiated by a user and write the fingerprint identification request carrying fingerprint data into the shared memory. Correspondingly, the TA may obtain the fingerprint identification request initiated by the user by reading the shared memory.
S102, determining non-empty trusted storage space in a trusted storage space set according to a space strategy table; the space policy table comprises a one-to-one correspondence between a fingerprint algorithm and a trusted storage space.
In some embodiments of the present disclosure, by traversing the space policy table, the TA may learn the storage states of each trusted storage space in the trusted storage space set, so as to determine which trusted storage spaces currently have storage states that are non-empty (i.e., the trusted storage spaces store a fingerprint algorithm and a fingerprint template).
S103, fingerprint identification is carried out on the fingerprint data according to a fingerprint algorithm and a fingerprint template in the non-empty trusted storage space.
In some embodiments of the present disclosure, the fingerprint data is identified by using a fingerprint algorithm and a fingerprint template in the non-empty trusted storage space one by one, so as to obtain an identification result of the fingerprint data.
S104, returning a fingerprint identification result to the CA.
In some embodiments of the present disclosure, the TA may write the fingerprint recognition result to the shared memory. Correspondingly, the CA can read the fingerprint identification result from the shared memory and return the fingerprint identification result to the user, so that the user can know whether the fingerprint identification is successful or not according to the fingerprint identification result.
While the process flows described above include a plurality of operations occurring in a particular order, it should be apparent that the processes may include more or fewer operations, which may be performed sequentially or in parallel (e.g., using a parallel processor or a multi-threaded environment).
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method or apparatus comprising such elements.
It will be appreciated by those skilled in the art that embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, the present specification may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present description can take the form of a computer program product on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
The description may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
In this specification, each embodiment is described in a progressive manner, and each embodiment is mainly described by differences from other embodiments, and identical and similar parts between the embodiments are all enough to be referred to each other.
The foregoing is merely exemplary of the present disclosure and is not intended to limit the disclosure. Various modifications and alterations to this specification will become apparent to those skilled in the art. Any modifications, equivalent substitutions, improvements, or the like, which are within the spirit and principles of the present description, are intended to be included within the scope of the claims of the present description.

Claims (10)

1. A method of data processing, comprising:
the OTA client receives an algorithm upgrading request initiated by an OTA server; the algorithm upgrading request carries a first fingerprint algorithm;
the OTA client confirms whether the first fingerprint algorithm is compatible with one or more existing second fingerprint algorithms;
when the first fingerprint algorithm is not compatible with the second fingerprint algorithm, the OTA client determines an empty trusted storage space from a designated trusted storage space set according to a space policy table; the space policy table comprises a one-to-one correspondence between a fingerprint algorithm and a trusted storage space;
The OTA client stores the first fingerprint algorithm into the empty trusted storage space;
the OTA client returns an upgrading result to the OTA server;
when the first fingerprint algorithm is compatible with the second fingerprint algorithm, the OTA client replaces the compatible second fingerprint algorithm with the first fingerprint algorithm in a trusted storage space corresponding to the compatible second fingerprint algorithm,
wherein, the data processing method further comprises:
the OTA client receives a fingerprint input request initiated by a user; the fingerprint input request carries fingerprint data;
the OTA client determines an empty trusted storage space from the designated trusted storage space set according to a space policy table;
the OTA client stores the fingerprint data as a fingerprint template into the empty trusted storage space and distributes a fingerprint algorithm for the fingerprint template;
the OTA client returns a fingerprint entry result to the user,
wherein, the data processing method further comprises:
the OTA client receives a fingerprint identification request initiated by a user; the fingerprint identification request carries fingerprint data;
the OTA client determines non-empty trusted storage space in the trusted storage space set according to a space policy table;
The OTA client performs fingerprint identification on the fingerprint data according to a fingerprint algorithm and a fingerprint template in the non-empty trusted storage space;
and the OTA client returns a fingerprint identification result to the user.
2. The data processing method of claim 1, wherein the algorithm upgrade request carries a spatial identifier; the space identifier is a space identifier of a trusted memory space, which is empty, selected by a client application in the OTA client from the space policy table;
accordingly, the determining an empty trusted memory space from the specified set of trusted memory spaces according to the space policy table includes:
and determining a corresponding trusted storage space from the trusted storage space set according to the space identifier carried in the algorithm upgrading request.
3. The data processing method of claim 1, wherein determining an empty trusted memory space based on the space policy table comprises:
and selecting a space identifier corresponding to the empty trusted storage space from the space policy table, and determining the corresponding trusted storage space from the trusted storage space set according to the space identifier.
4. The data processing method according to claim 1, wherein the fingerprint input request carries a spatial identifier; the space identifier is a space identifier of a trusted storage space, which is selected by a client application of the OTA client from a specified trusted storage space set according to the space policy table, and is empty;
accordingly, the determining an empty trusted memory space from the specified set of trusted memory spaces according to the space policy table includes:
and determining a corresponding trusted storage space from the trusted storage space set according to the space identifier carried in the fingerprint input request.
5. The method of claim 4, wherein the fingerprint entry result carries a fingerprint algorithm identification of a fingerprint algorithm assigned to the fingerprint template, so that the client application upgrades the fingerprint algorithm identification into the space policy table.
6. The data processing method of claim 1, further comprising:
after storing the fingerprint data as a fingerprint template into the empty trusted storage space and distributing a fingerprint algorithm for the fingerprint template, the OTA client upgrades the fingerprint algorithm identification of the fingerprint algorithm into the space policy table.
7. The data processing method of claim 1, wherein the spatial policy table includes a stored time stamp of a fingerprint algorithm; correspondingly, when the fingerprint algorithm is allocated to the fingerprint template, the OTA client allocates the latest stored fingerprint algorithm to the fingerprint template according to the stored time stamp.
8. An OTA client comprising a client application and a trusted application, the trusted application comprising:
the upgrade request receiving module is used for receiving an algorithm upgrade request initiated by the OTA server; the algorithm upgrading request carries a first fingerprint algorithm;
the algorithm compatibility judging module is used for confirming whether the first fingerprint algorithm is compatible with one or more existing second fingerprint algorithms;
the storage space determining module is used for determining an empty trusted storage space from a specified trusted storage space set according to a space policy table when the first fingerprint algorithm is not compatible with the second fingerprint algorithm; the space policy table comprises a one-to-one correspondence between fingerprint algorithms and trusted storage spaces, and when the first fingerprint algorithm is compatible with the second fingerprint algorithm, the OTA client replaces the compatible second fingerprint algorithm with the first fingerprint algorithm in the trusted storage space corresponding to the compatible second fingerprint algorithm;
The fingerprint algorithm storage module is used for storing the first fingerprint algorithm into the empty trusted storage space;
an upgrade result returning module for returning upgrade result to the OTA server,
wherein the trusted application further comprises:
the input request receiving module is used for receiving a fingerprint input request initiated by a user; the fingerprint input request carries fingerprint data;
the storage space determining module is used for determining an empty trusted storage space from the designated trusted storage space set according to the space policy table;
the fingerprint template input module is used for storing the fingerprint data as a fingerprint template into the empty trusted storage space and distributing a fingerprint algorithm for the fingerprint template;
an input result returning module for returning the fingerprint input result to the user,
wherein the trusted application further comprises:
the identification request receiving module is used for receiving a fingerprint identification request initiated by a user; the fingerprint identification request carries fingerprint data;
the storage space determining module is used for determining non-empty trusted storage spaces in the trusted storage space set according to the space policy table;
the fingerprint data identification module is used for carrying out fingerprint identification on the fingerprint data according to a fingerprint algorithm and a fingerprint template in the non-empty trusted storage space;
And the identification result returning module is used for returning the fingerprint identification result to the user.
9. An electronic device configured with an OTA client comprising a client application and a trusted application, the trusted application comprising:
the upgrade request receiving module is used for receiving an algorithm upgrade request initiated by the OTA server; the algorithm upgrading request carries a first fingerprint algorithm;
the algorithm compatibility judging module is used for confirming whether the first fingerprint algorithm is compatible with one or more existing second fingerprint algorithms;
the storage space determining module is used for determining an empty trusted storage space from a specified trusted storage space set according to a space policy table when the first fingerprint algorithm is not compatible with the second fingerprint algorithm; the space policy table comprises a one-to-one correspondence between fingerprint algorithms and trusted storage spaces, and when the first fingerprint algorithm is compatible with the second fingerprint algorithm, the OTA client replaces the compatible second fingerprint algorithm with the first fingerprint algorithm in the trusted storage space corresponding to the compatible second fingerprint algorithm;
the fingerprint algorithm storage module is used for storing the first fingerprint algorithm into the empty trusted storage space;
An upgrade result returning module for returning upgrade result to the OTA server,
wherein the trusted application further comprises:
the input request receiving module is used for receiving a fingerprint input request initiated by a user; the fingerprint input request carries fingerprint data;
the storage space determining module is used for determining an empty trusted storage space from the designated trusted storage space set according to the space policy table;
the fingerprint template input module is used for storing the fingerprint data as a fingerprint template into the empty trusted storage space and distributing a fingerprint algorithm for the fingerprint template;
an input result returning module for returning the fingerprint input result to the user,
wherein the trusted application further comprises:
the identification request receiving module is used for receiving a fingerprint identification request initiated by a user; the fingerprint identification request carries fingerprint data;
the storage space determining module is used for determining non-empty trusted storage spaces in the trusted storage space set according to the space policy table; the fingerprint data identification module is used for carrying out fingerprint identification on the fingerprint data according to a fingerprint algorithm and a fingerprint template in the non-empty trusted storage space;
And the identification result returning module is used for returning the fingerprint identification result to the user.
10. A computer storage medium having a computer program stored thereon, the computer program, when executed by a processor, performing the steps of:
receiving an algorithm upgrading request initiated by an OTA server; the algorithm upgrading request carries a first fingerprint algorithm;
confirming whether the first fingerprint algorithm is compatible with one or more existing second fingerprint algorithms;
when the first fingerprint algorithm is not compatible with the second fingerprint algorithm, determining an empty trusted storage space from a specified trusted storage space set according to a space policy table; the space policy table comprises a one-to-one correspondence between fingerprint algorithms and trusted storage spaces, and when the first fingerprint algorithm is compatible with the second fingerprint algorithm, the OTA client replaces the compatible second fingerprint algorithm with the first fingerprint algorithm in the trusted storage space corresponding to the compatible second fingerprint algorithm;
storing the first fingerprint algorithm into the empty trusted memory space;
and returning an upgrading result to the OTA server,
wherein the computer program when executed by the processor further performs the steps of:
Receiving a fingerprint input request initiated by a user; the fingerprint input request carries fingerprint data;
determining an empty trusted memory space from the specified set of trusted memory spaces according to the space policy table;
storing the fingerprint data as a fingerprint template into the empty trusted storage space, and distributing a fingerprint algorithm for the fingerprint template;
a fingerprint entry result is returned to the user,
wherein the computer program when executed by the processor further performs the steps of:
receiving a fingerprint identification request initiated by a user; the fingerprint identification request carries fingerprint data;
determining non-empty trusted storage space in the trusted storage space set according to the space policy table;
fingerprint identification is carried out on the fingerprint data according to a fingerprint algorithm and a fingerprint template in the non-empty trusted storage space;
and returning a fingerprint identification result to the user.
CN201910392785.4A 2019-05-13 2019-05-13 Data processing method, OTA client, electronic device and storage medium Active CN110175040B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910392785.4A CN110175040B (en) 2019-05-13 2019-05-13 Data processing method, OTA client, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910392785.4A CN110175040B (en) 2019-05-13 2019-05-13 Data processing method, OTA client, electronic device and storage medium

Publications (2)

Publication Number Publication Date
CN110175040A CN110175040A (en) 2019-08-27
CN110175040B true CN110175040B (en) 2023-07-18

Family

ID=67690793

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910392785.4A Active CN110175040B (en) 2019-05-13 2019-05-13 Data processing method, OTA client, electronic device and storage medium

Country Status (1)

Country Link
CN (1) CN110175040B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113329107B (en) * 2021-08-03 2021-11-09 北京顶象技术有限公司 Method and device for coping with influence of operating system change on equipment fingerprint calculation

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105589064A (en) * 2016-01-08 2016-05-18 重庆邮电大学 Rapid establishing and dynamic updating system and method for WLAN position fingerprint database
CN109189450A (en) * 2018-10-24 2019-01-11 郑州云海信息技术有限公司 A kind of method and device of server firmware upgrading

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202362788U (en) * 2011-11-21 2012-08-01 国民技术股份有限公司 Dependable computing device with USB (Universal Serial Bus) interfaces
CN107589952A (en) * 2016-07-06 2018-01-16 中兴通讯股份有限公司 Intelligent upgrade method, device and system
CN108153546A (en) * 2017-12-25 2018-06-12 山大地纬软件股份有限公司 Flow definition compatibility determination method and decision-making system
CN108008969B (en) * 2017-12-28 2020-12-29 新华三技术有限公司 Software version upgrading method and device and network equipment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105589064A (en) * 2016-01-08 2016-05-18 重庆邮电大学 Rapid establishing and dynamic updating system and method for WLAN position fingerprint database
CN109189450A (en) * 2018-10-24 2019-01-11 郑州云海信息技术有限公司 A kind of method and device of server firmware upgrading

Also Published As

Publication number Publication date
CN110175040A (en) 2019-08-27

Similar Documents

Publication Publication Date Title
CN108958796B (en) Service request processing method and device and service request processing system
CN107506221B (en) Application program upgrading method, device and equipment
CN109062790B (en) Upgrading test method for Bluetooth firmware of vehicle-mounted terminal
KR20180077265A (en) Plug-in packaging method, apparatus, terminal and storage medium
CN108959341B (en) Data synchronization method, device and equipment
CN110177079B (en) Calling system and calling method of intelligent contract
CN109710286B (en) System upgrading method, device, equipment and storage medium
CN108345462B (en) Method and device for upgrading components
CN113220669B (en) Service data processing method and device and electronic equipment
CN114357498A (en) Data desensitization method and device
CN113110853A (en) Configuration data online downloading method and device and electronic equipment
CN110837391B (en) Application program hot updating method and device, storage medium and electronic equipment
CN110175040B (en) Data processing method, OTA client, electronic device and storage medium
CN112738181B (en) Method, device and server for cluster external IP access
CN109582384A (en) The update method and device of configuration information
CN110968333A (en) Configuration information replacement method and device, machine-readable storage medium and processor
CN111736895A (en) Method, equipment and storage medium for merging and upgrading version numbers of software products
CN115480897A (en) Task processing method, device, equipment, storage medium and program product
CN110175036B (en) Upgrading method and device for soft lock permission
CN113986239A (en) Distributed compiling method, device, equipment and readable storage medium
CN113867776A (en) Method and device for publishing middle station application, electronic equipment and storage medium
CN110633181B (en) Visual display method and device
CN113347620B (en) Method, device, equipment and storage medium for compatibility of multi-version application air card issuing
CN109241066B (en) Request processing method and device
CN118672616A (en) Model processing method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant