CN110502914A - A kind of remote encryption upgrade method based on public security intelligent terminal control module - Google Patents
A kind of remote encryption upgrade method based on public security intelligent terminal control module Download PDFInfo
- Publication number
- CN110502914A CN110502914A CN201910790817.6A CN201910790817A CN110502914A CN 110502914 A CN110502914 A CN 110502914A CN 201910790817 A CN201910790817 A CN 201910790817A CN 110502914 A CN110502914 A CN 110502914A
- Authority
- CN
- China
- Prior art keywords
- mcu
- encryption
- data
- host computer
- control module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 57
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 22
- 238000004891 communication Methods 0.000 claims abstract description 13
- 230000006837 decompression Effects 0.000 claims abstract description 3
- 230000008569 process Effects 0.000 claims description 14
- 238000006073 displacement reaction Methods 0.000 claims description 9
- 230000005540 biological transmission Effects 0.000 claims description 7
- 238000004590 computer program Methods 0.000 claims description 6
- 230000006870 function Effects 0.000 claims description 6
- 230000010354 integration Effects 0.000 claims description 6
- 238000013524 data verification Methods 0.000 claims description 5
- 230000006835 compression Effects 0.000 claims description 3
- 238000007906 compression Methods 0.000 claims description 3
- 238000007689 inspection Methods 0.000 claims description 3
- 230000011218 segmentation Effects 0.000 claims description 3
- 238000013519 translation Methods 0.000 claims description 3
- 238000012795 verification Methods 0.000 claims description 2
- 230000008859 change Effects 0.000 description 10
- 238000013461 design Methods 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 239000007795 chemical reaction product Substances 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000015556 catabolic process Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000001186 cumulative effect Effects 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 239000000047 product Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F13/00—Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
- G06F13/38—Information transfer, e.g. on bus
- G06F13/42—Bus transfer protocol, e.g. handshake; Synchronisation
- G06F13/4282—Bus transfer protocol, e.g. handshake; Synchronisation on a serial bus, e.g. I2C bus, SPI bus
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2213/00—Indexing scheme relating to interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
- G06F2213/0002—Serial port, e.g. RS232C
Abstract
The present invention discloses a kind of remote encryption upgrade method based on public security intelligent terminal control module, and the control module uses the system structure of two-stage system MCU, including first order MCU A and second level MCU B;Encrypting upgrade method includes: that host computer is communicated by network and server, and whether have new hardware program version, if any the ciphered compressed packet for then downloading the version program if obtaining;Host computer uses the ciphered compressed packet of Encryption Algorithm and key pair downloading by arranging in advance that decompression is decrypted, hex/bin file needed for obtaining hardware program upgrading;Host computer and MCU carry out encryption communication, and upgrade procedure hex/bin file is transferred to MCU, are written to the flash of specified address, complete upgrade function.The present invention controls program upgrading by remote server, by the hardware module that Web vector graphic host computer PC carries out safe and convenient, can save a large amount of labour cost.
Description
Technical field
The invention belongs to control systems to upgrade field, and in particular to a kind of based on the long-range of public security intelligent terminal control module
Encrypt upgrade method.
Background technique
In public security intelligent terminal, it is often necessary to use various hardware modules and carry out motor action control, sensor
Information reading, module power switch etc. need to be related to the reading of IO level and the operation of control aspect.Due to hardware cost
Limitation mostly uses MCU as hardware module master control, and the communication modes such as UART, SPI, modification plug-in is only supported to generally require
It is operated by cd-rom recorder.In end product design before, the design of hardware module is to be formed (after dispatching from the factory no longer
It is modified), it modifies or upgrades if you need to the function to hardware module, generally require engineer after sale and scene is gone to pass through burning
The mode of record modifies to MCU plug-in, or the hardware module after directly replacing and upgrading.
Live burning is either gone to, or directly replaces module, process is all very cumbersome time-consuming.Even if hardware controls mould
Block is needed using having the MCU of IAP function, but because usually requiring to carry out MCU individually control during IAP the operation such as restarts
Device housings are opened, the key on circuit board is operated manually, process is still complicated and (quiet with certain risk
Electrical breakdown, maloperation lead to the risks such as short circuit).
And upgrade file is generally hex or bin file, for the online upgrading standard file of MCU, this class file because
It very can inversely be cracked easily if obtained by other people to obtain business secret for call format.
Summary of the invention
To solve the above problems, providing a kind of remote encryption upgrade method based on public security intelligent terminal control module.
The object of the present invention is achieved in the following manner:
A kind of remote encryption upgrade method based on public security intelligent terminal control module, the control module use two-stage system MCU
System structure, including first order MCU A and second level MCU B, MCU A connect by RS232 with host computer, MCU A and MCU
It is communicated between B by UART, IO control and IO monitor, host computer is connect with server-side network;Encrypt upgrading side
Method includes:
Step 1: host computer is communicated by network and server, and whether have new hardware program version, under then if obtaining
Carry the ciphered compressed packet of the version program;
Step 2: host computer uses the ciphered compressed packet of Encryption Algorithm and key pair downloading by arranging in advance that solution is decrypted
Compression, hex/bin file needed for obtaining hardware program upgrading;
Step 3: host computer and MCU carry out encryption communication, and upgrade procedure hex/bin file is transferred to MCU, is written to specified
The flash of address completes upgrade function.
The step three specifically includes:
A) host computer is according to the communication and storage capacity of MCU, by hex file division at several pieces data slot;
B) host computer encrypts a data slot that segmentation obtains, and is converted to encryption data segment;
C) this encryption data segment is transferred to MCU A by RS232 by host computer;
D) MCU A receives encryption data segment, is transmitted to MCU B by uart;
E) MCU B passes through the Encryption Algorithm arranged in advance and key is decrypted and obtains initial data segment, and then overriding extremely refers to
Determine the flash of address;
F) above-mentioned b-e step cycle carries out, until all data slots that a stage is divided all are transmitted;
G) host computer requires MCU A to carry out the verification of data integration to the designated position flash of MCU B by RS232, prevents from passing
Loss of data causes mistake during defeated;
H) after the completion of data check, MCU A controls MCU B by IO level and restarts, and completes upgrading process;
I) if data check failure, MCU A notifies host computer to carry out targetedly data inspection and again upgrading overriding stream
Journey, to guarantee hardware security.
When hardware module works normally, MCU A works in transparent transmission mode, by the Content of communciation between host computer and MCU B
It is intact to be received and transmitted;When hardware module carries out IAP upgrading, the instructions that MCU A transmits host computer turn
Data or movement are turned to, transmit data to MCU B or is operated.
The ciphered compressed packet is encrypted using aes algorithm, and decryption is by carrying out compressed package solution by aes algorithm and key
Pressure decryption.
The encryption data segment is using displacement replacement Encryption Algorithm;Decryption is to pass through displacement replacement encryption by MCU A
Translation is decrypted in algorithm and each frame transferring content of key pair.
The displacement replacement Encryption Algorithm includes 7 kinds of different encryption alternatives, by the 3 high of encryption type character
Digital combination table shows encryption method, and low 5 bit digital combination indicates encryption parameter, and encryption method is as follows:
000: add parameter to replace, i.e., the data in encryption parameter is all added to all data in the ciphertext to be encrypted, if
Occur the case where data spilling in ciphering process, then needs to eliminate the part for exceeding 0xFF;
001: subtracting parameter replacement, i.e., all data in ciphertext are all subtracted with the data in encryption parameter;
010: high 4 exchanges with low 4
011: adding parameter to replace, then high 4 are exchanged with low 4
100: subtracting parameter replacement, then high 4 are exchanged with low 4
101: retaining
110: high 4 exchange with low 4, and then plus parameter is replaced
111: high 4 exchange with low 4, then subtract parameter replacement.
The verification of data integration uses CRC check.
A kind of readable storage medium storing program for executing is stored with computer program, the computer program quilt on the readable storage medium storing program for executing
Long-range secret upgrade method is realized when processor executes.
A kind of public security intelligent terminal, including memory, for storing computer program;Processor, by execute it is described based on
The step of long-range secret upgrade method is realized when calculation machine program.
Beneficial effects of the present invention: the present invention carries out safety just by remote server, by Web vector graphic host computer PC
Prompt hardware module control program upgrading, can save a large amount of labour cost.When hardware module needs to carry out IAP upgrading,
The instructions that MCU A is transmitted by host computer are converted into data or movement, transmit data to MCU B or are operated (control
IO level analog key, operation chip are restarted), to realize the IAP escalation process of MCU B.
Remote machine encryption upgrading of the invention is divided into two stages: a stage is the ciphered compressed to upgrade file, then
Ciphered compressed packet is used for the transmission between server end and host computer, the encryption in this stage is primarily to prevent unknown third
Side, which illegally obtains upgrade file from server end and inversely cracks, steals business secret, and the two-stage is between host computer and MCU
Communication encryption, between host computer and MCU using serial ports RS232 communicate, if using hardware intrusion (such as on connection
Directly carry out level monitoring) mode monitor, so that it may by the Content of communciation group listened to merge decode obtain upgrade file, from
And business secret is stolen, the encryption of two-stage is then to realize communication encryption by the conversion ciphertext to Content of communciation, is prevented unknown
Third party steals business secret in such a way that hardware invades.
Detailed description of the invention
Fig. 1 is the functional block diagram of control module of the present invention.
Fig. 2 is the functional block diagram of the embodiment of the present invention.
Specific embodiment
The present invention will be further described in detail below with reference to the accompanying drawings and specific embodiments.
A kind of remote encryption upgrade method based on public security intelligent terminal control module, the control module use two-stage system
The system structure of MCU, including first order MCU A and second level MCU B, MCU A are connect by RS232 with host computer, MCU A with
It is communicated between MCU B by UART, IO control and IO monitor, host computer is connect with server-side network;Encryption rises
Grade method include:
Step 1: host computer is communicated by network and server, and whether have new hardware program version, under then if obtaining
Carry the ciphered compressed packet of the version program;
Step 2: host computer uses the ciphered compressed packet of Encryption Algorithm and key pair downloading by arranging in advance that solution is decrypted
Compression, hex/bin file needed for obtaining hardware program upgrading;
Step 3: host computer and MCU carry out encryption communication, and upgrade procedure hex/bin file is transferred to MCU, is written to specified
The flash of address completes upgrade function.
Step 3 specifically includes:
A) host computer is according to the communication and storage capacity of MCU, by hex file division at several pieces data slot;
B) host computer encrypts a data slot that segmentation obtains, and is converted to encryption data segment;
C) this encryption data segment is transferred to MCU A by RS232 by host computer;
D) MCU A receives encryption data segment, is transmitted to MCU B by uart;
E) MCU B passes through the Encryption Algorithm arranged in advance and key is decrypted and obtains initial data segment, and then overriding extremely refers to
Determine the flash of address;
F) above-mentioned b-e step cycle carries out, until all data slots that a stage is divided all are transmitted;
G) host computer requires MCU A to carry out the verification of data integration to the designated position flash of MCU B by RS232, prevents from passing
Loss of data causes mistake during defeated;
H) after the completion of data check, MCU A controls MCU B by IO level and restarts, and completes upgrading process.
I) if data check failure, MCU A notifies host computer to carry out targetedly data inspection and again upgrading overriding
Process, to guarantee hardware security.
When hardware module works normally, MCU A works in transparent transmission mode, by the Content of communciation between host computer and MCU B
It is intact to be received and transmitted;When hardware module carries out IAP upgrading, the instructions that MCU A transmits host computer turn
Data or movement are turned to, transmit data to MCU B or is operated.
Ciphered compressed packet is encrypted using aes algorithm, and decryption is by carrying out compressed package decompression solution by aes algorithm and key
It is close.
Encryption data segment encrypts ciphertext using displacement replacement Encryption Algorithm;Decryption side rule is encryption method
Reversed operation is decrypted by MCU A by the reversed operation and each frame transferring content of key pair of displacement replacement Encryption Algorithm
Translation.
The verification of data integration uses CRC check, and received data are calculated by cumulative or exclusive or, obtain verification knot
Then fruit is compared with the check value in data frame, to judge received data with the presence or absence of mistake.
Displacement replacement Encryption Algorithm includes 7 kinds of different encryption alternatives, by the high 3 bit digital group of encryption type character
Closing indicates encryption method, and low 5 bit digital combination indicates encryption parameter, encryption method:
000: add parameter to replace, i.e., the data in encryption parameter is all added to all data in the ciphertext to be encrypted, if
Occur the case where data spilling in ciphering process, then needs to eliminate the part for exceeding 0xFF.
001: subtracting parameter replacement, i.e., all data in ciphertext are all subtracted with the data in encryption parameter.
010: high 4 exchanges with low 4.
011: adding parameter to replace, then high 4 are exchanged with low 4.
100: subtracting parameter replacement, then high 4 are exchanged with low 4.
101: retaining.
110: high 4 exchange with low 4, and then plus parameter is replaced.
111: high 4 exchange with low 4, then subtract parameter replacement.
Encrypt example:
Encryption type character is 0x1F (00011111B), and encryption method is 000 (parameter is added to replace), encryption parameter 11111
(0x1F).Ciphertext is 0xAC 0x04, then result is that (0x04+0x100-0x1F's 0x8D (0xAC-0x1F) 0xE5 (overflows after decrypting
Handle out));
Encryption type character is 0x2F (00101111B), and encryption method is 001 (subtracting parameter replacement), encryption parameter 01111
(0x0F).Ciphertext is 0x53 0xF6, then result is that (0xF6+0x0F-0x100's 0x62 (0x53+0x0F) 0x05 (overflows after decrypting
Handle out));
Encryption type character is 0x40 (01000000B), and encryption method is 010 (high 4 are exchanged with low 4), and encryption parameter is
Not 00000 (under 010 cipher mode, not using encryption parameter).Ciphertext is 0xF3 0x46, then result is that (0xF3 is mutual by 0x3F after decrypting
Change) 0x64 (0x46 exchange);
Encryption type character be 0x6E (01101110B), encryption method be 011 (add parameter to replace, then high 4 with low 4 mutually
Change), encryption parameter is 01110 (0x0E).Ciphertext is 0xF3 0x50, then result is that (0xF3 exchanges 0x3F- to 0x31 after decrypting
0x0E) 0xF7 (0x50 exchanges 0x05+0x100-0x0E (Overflow handling));
Encryption type character be 0x9C (10011100B), encryption method be 100 (subtract parameter replacement, then high 4 with low 4 mutually
Change), encryption parameter is 11100 (0x1C).Ciphertext is 0x41 0x6F, then result is that (0x41 exchanges 0x14+ to 0x30 after decrypting
0x1C) 0x12 (0x6F exchanges 0xF6+0x1C-0x100 (Overflow handling));
Encryption type character be 0xCE (11001110B), encryption method be 110 (high 4 with low 4 exchange, then plus parameter is replaced
Change), encryption parameter is 01110 (0x0E).Ciphertext is 0xF3 0x08, then result is that (0xF3-0x0E=0xE5 is mutual by 0x5E after decrypting
Change) 0xAF (0x08+0x100-0x0E (Overflow handling)=0xFA is exchanged);
Encryption type character be 0xFC (11111100B), encryption method be 111 (high 4 with low 4 exchange, then subtract parameter and replace
Change), encryption parameter is 11100 (0x1C).Ciphertext is 0x41 0xE9, then result is that (0x41+0x1C=0x5D is mutual by 0xD5 after decrypting
Change) 0x50 (0xE9+0x1C-0x100 (Overflow handling)=0x05 is exchanged);
The present invention uses the module design of dual unit, uses the resources such as dominant frequency, ROM, peripheral functionality lower (cost is also lower)
MCU A with RS232 ability to communicate is communicated as the first order with host computer;It can using dominant frequency, ROM, peripheral functionality
It loads smart terminal product hardware module to require and have the MCU B of IAP function as the second level, realizes terminal hardware module
Various special functional demands (motor action control, sensor information reading, module power switch etc.).In the normal work of hardware module
When making, MCU A work is received and is sent out in transparent transmission mode, by the Content of communciation between host computer and MCU B is intact
It send;
When hardware module needs to carry out IAP upgrading, because the operation of MCU and storage capacity are extremely limited, single transmission only has
Several hundred byte, and the data content of primary complete MCU program upgrading transmission is typically up to several hundred kb, so needing that journey will be upgraded
Sequence packet is divided into thousands of parts, is then successively transmitted.The instructions that MCU A is transmitted by host computer, be converted into data or
Movement transmits data to MCU B or is operated (control IO level analog key, operation chip are restarted), to realize MCU
The IAP escalation process of B.
MCU B may be connected from different hardware modules by various ways, such as motor drive module, Ke Nengtong
The mode for crossing 3.3V/5V electric wire connects, and is driven using the method for IO level change;Such as temperature and humidity sensing module, pass through
The mode of RS485 data line connects, and is driven using the mode of RS485 data communication;If single color LCD shows the small screen, pass through
The mode of SPI data line or 3.3V/5V electric wire connects, and using SPI communication format or parallel port communication, (in fact and IO level becomes
Change) mode drive;It such as relay module, is connected by way of 3.3V/5V electric wire, is carried out using the method for IO level change
Driving.
As shown in Fig. 2, general intelligence end product all can built-in industrial personal computer module, for touch screen display interaction and
The service data interaction of server end, upgrade file ciphered compressed packet is the specific bit that server is uploaded to by equipment provider
It sets, and hardware program edition upgrading information is known by service data interaction by industrial personal computer (i.e. host computer), it then will be corresponding
Upgrade file ciphered compressed packet is downloaded to industrial personal computer hard disk.Then start subsequent hardware program upgrading process.
What has been described above is only a preferred embodiment of the present invention, it is noted that for those skilled in the art,
Without depart from that overall concept of the invention, several changes and improvements can also be made, these also should be considered as of the invention
Protection scope.
Claims (9)
1. a kind of remote encryption upgrade method based on public security intelligent terminal control module, it is characterised in that: the control module
Connected using the system structure of two-stage system MCU, including first order MCU A and second level MCU B, MCU A by RS232 and host computer
It connects, is communicated between MCU A and MCU B by UART, IO control and IO monitor, host computer and server-side network connect
It connects;Encrypting upgrade method includes:
Step 1: host computer is communicated by network and server, and whether have new hardware program version, under then if obtaining
Carry the ciphered compressed packet of the version program;
Step 2: host computer uses the ciphered compressed packet of Encryption Algorithm and key pair downloading by arranging in advance that solution is decrypted
Compression, hex/bin file needed for obtaining hardware program upgrading;
Step 3: host computer and MCU carry out encryption communication, and upgrade procedure hex/bin file is transferred to MCU, is written to specified
The flash of address completes upgrade function.
2. the remote encryption upgrade method as described in claim 1 based on public security intelligent terminal control module, it is characterised in that:
The step three specifically includes:
A) host computer is according to the communication and storage capacity of MCU, by hex file division at several pieces data slot;
B) host computer encrypts a data slot that segmentation obtains, and is converted to encryption data segment;
C) this encryption data segment is transferred to MCU A by RS232 by host computer;
D) MCU A receives encryption data segment, is transmitted to MCU B by uart;
E) MCU B passes through the Encryption Algorithm arranged in advance and key is decrypted and obtains initial data segment, and then overriding extremely refers to
Determine the flash of address;
F) above-mentioned b-e step cycle carries out, until all data slots that a stage is divided all are transmitted;
G) host computer requires MCU A to carry out the verification of data integration to the designated position flash of MCU B by RS232, prevents from transmitting
Loss of data causes mistake in the process;
H) after the completion of data check, MCU A controls MCU B by IO level and restarts, and completes upgrading process;
I) if data check failure, MCU A notifies host computer to carry out targetedly data inspection and again upgrading overriding process,
To guarantee hardware security.
3. the remote encryption upgrade method as described in claim 1 based on public security intelligent terminal control module, it is characterised in that:
When hardware module works normally, MCU A works in transparent transmission mode, and the Content of communciation between host computer and MCU B is remained untouched
Be received and transmitted;When hardware module carries out IAP upgrading, the instructions that MCU A transmits host computer are converted into data
Or movement, data are transmitted to MCU B or are operated.
4. the remote encryption upgrade method as described in claim 1 based on public security intelligent terminal control module, it is characterised in that:
The ciphered compressed packet is encrypted using aes algorithm, and decryption is by carrying out compressed package decompression decryption by aes algorithm and key.
5. the remote encryption upgrade method as claimed in claim 2 based on public security intelligent terminal control module, it is characterised in that:
The encryption data segment is using displacement replacement Encryption Algorithm;Decryption is to pass through displacement replacement Encryption Algorithm and close by MCU A
Translation is decrypted to each frame transferring content in key.
6. the remote encryption upgrade method as described in claim 1 based on public security intelligent terminal control module, it is characterised in that:
The displacement replacement Encryption Algorithm includes 7 kinds of different encryption alternatives, is combined by high 3 bit digital of encryption type character
Indicate encryption method, low 5 bit digital combination indicates encryption parameter, and encryption method is as follows:
000: add parameter to replace, i.e., the data in encryption parameter is all added to all data in the ciphertext to be encrypted, if
Occur the case where data spilling in ciphering process, then needs to eliminate the part for exceeding 0xFF;
001: subtracting parameter replacement, i.e., all data in ciphertext are all subtracted with the data in encryption parameter;
010: high 4 exchanges with low 4
011: adding parameter to replace, then high 4 are exchanged with low 4
100: subtracting parameter replacement, then high 4 are exchanged with low 4
101: retaining
110: high 4 exchange with low 4, and then plus parameter is replaced
111: high 4 exchange with low 4, then subtract parameter replacement.
7. the remote encryption upgrade method as described in claim 1 based on public security intelligent terminal control module, it is characterised in that:
The data integration verification uses CRC check.
8. a kind of readable storage medium storing program for executing, it is characterised in that: be stored with computer program, the calculating on the readable storage medium storing program for executing
Remote encryption upgrade method is realized when machine program is executed by processor.
9. a kind of public security intelligent terminal, it is characterised in that: including memory, for storing computer program;Processor, for holding
The step of realizing remote encryption upgrade method when the row computer program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910790817.6A CN110502914A (en) | 2019-08-26 | 2019-08-26 | A kind of remote encryption upgrade method based on public security intelligent terminal control module |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910790817.6A CN110502914A (en) | 2019-08-26 | 2019-08-26 | A kind of remote encryption upgrade method based on public security intelligent terminal control module |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110502914A true CN110502914A (en) | 2019-11-26 |
Family
ID=68589534
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910790817.6A Pending CN110502914A (en) | 2019-08-26 | 2019-08-26 | A kind of remote encryption upgrade method based on public security intelligent terminal control module |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110502914A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112882975A (en) * | 2021-03-09 | 2021-06-01 | 苏州海光芯创光电科技股份有限公司 | MCU peripheral access system and access method |
CN113542284A (en) * | 2021-07-19 | 2021-10-22 | 恩亿科(北京)数据科技有限公司 | ID package translation application method, system, storage medium and electronic equipment |
CN116226889A (en) * | 2023-04-28 | 2023-06-06 | 北京集度科技有限公司 | Method and device for writing security information |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104166810A (en) * | 2014-07-29 | 2014-11-26 | 苏州乐米信息科技有限公司 | Encryption method for mobile phone game software |
CN105426198A (en) * | 2014-09-09 | 2016-03-23 | 联创汽车电子有限公司 | Vehicle onboard double-control-chip system and auxiliary control chip program update method therefor |
CN108829428A (en) * | 2018-07-25 | 2018-11-16 | 常州星宇车灯股份有限公司 | Car lamp software concentrating type upgrading control system and the vehicle with the system |
CN110007941A (en) * | 2019-03-05 | 2019-07-12 | 小黄狗环保科技有限公司 | A kind of the MCU firmware and upgrade method of Intelligent refuse classification recovery system |
-
2019
- 2019-08-26 CN CN201910790817.6A patent/CN110502914A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104166810A (en) * | 2014-07-29 | 2014-11-26 | 苏州乐米信息科技有限公司 | Encryption method for mobile phone game software |
CN105426198A (en) * | 2014-09-09 | 2016-03-23 | 联创汽车电子有限公司 | Vehicle onboard double-control-chip system and auxiliary control chip program update method therefor |
CN108829428A (en) * | 2018-07-25 | 2018-11-16 | 常州星宇车灯股份有限公司 | Car lamp software concentrating type upgrading control system and the vehicle with the system |
CN110007941A (en) * | 2019-03-05 | 2019-07-12 | 小黄狗环保科技有限公司 | A kind of the MCU firmware and upgrade method of Intelligent refuse classification recovery system |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112882975A (en) * | 2021-03-09 | 2021-06-01 | 苏州海光芯创光电科技股份有限公司 | MCU peripheral access system and access method |
CN113542284A (en) * | 2021-07-19 | 2021-10-22 | 恩亿科(北京)数据科技有限公司 | ID package translation application method, system, storage medium and electronic equipment |
CN113542284B (en) * | 2021-07-19 | 2023-06-30 | 恩亿科(北京)数据科技有限公司 | id packet translation application method, system, storage medium and electronic device |
CN116226889A (en) * | 2023-04-28 | 2023-06-06 | 北京集度科技有限公司 | Method and device for writing security information |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110502914A (en) | A kind of remote encryption upgrade method based on public security intelligent terminal control module | |
CN105391840B (en) | Automatically create destination application | |
CN101901318B (en) | Trusted hardware equipment and using method thereof | |
US20050240712A1 (en) | Remote USB security system and method | |
CN104219234B (en) | A kind of method of cloud storage personal data safety | |
CN101599836B (en) | Signature method, signature equipment and system | |
JP2012513644A (en) | Digital video guard | |
US10389685B2 (en) | Systems and methods for securely transferring selective datasets between terminals | |
CN102523095A (en) | User digital certificate remote update method with intelligent card protection function | |
CN103401771A (en) | Network isolation method and network isolation system | |
CN110519203A (en) | A kind of data encryption and transmission method and device | |
CN100547963C (en) | Utilize the method and the device of USB secret key inputting/displaying/transmitting user information | |
MX2008010705A (en) | Secure electronic transaction system. | |
CN101594354B (en) | Method and system for improving account transfer safety | |
CN103824014A (en) | Isolation certificating and monitoring method of USB (universal serial bus) port within local area network | |
CN111404706A (en) | Application downloading method, secure element, client device and service management device | |
CN108306970A (en) | A kind of download of firmware safety and calibration equipment and method based on safety chip | |
CA2989009C (en) | Peripheral bus security interface and method | |
US20140075507A1 (en) | Method and device for connecting to a high security network | |
CN203689622U (en) | ATM and password keyboard supporting remote firmware upgrading | |
TWI615783B (en) | Point-of-sale terminal mode switching method and device | |
CN105488924A (en) | POS high-end application system and solving method | |
CN113741949B (en) | Method, device, equipment and storage medium for generating application program installation package | |
CN103942485A (en) | Encryptor of mobile intelligent terminal and encryption method thereof | |
CN104486323A (en) | POS (Point of Sale) terminal safety controlled networking activation method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191126 |