CN110780900A - Electric power acquisition terminal upgrading method and system and electric power acquisition terminal - Google Patents

Electric power acquisition terminal upgrading method and system and electric power acquisition terminal Download PDF

Info

Publication number
CN110780900A
CN110780900A CN201911024097.9A CN201911024097A CN110780900A CN 110780900 A CN110780900 A CN 110780900A CN 201911024097 A CN201911024097 A CN 201911024097A CN 110780900 A CN110780900 A CN 110780900A
Authority
CN
China
Prior art keywords
power acquisition
acquisition terminal
abstract
terminal
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911024097.9A
Other languages
Chinese (zh)
Inventor
赵雨婷
刘宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningbo Sanxing Electric Co Ltd
Ningbo Sanxing Medical and Electric Co Ltd
Original Assignee
Ningbo Sanxing Medical and Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ningbo Sanxing Medical and Electric Co Ltd filed Critical Ningbo Sanxing Medical and Electric Co Ltd
Priority to CN201911024097.9A priority Critical patent/CN110780900A/en
Publication of CN110780900A publication Critical patent/CN110780900A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides an electric power acquisition terminal upgrading method, an electric power acquisition terminal upgrading system and an electric power acquisition terminal, and relates to the field of electric power acquisition terminal upgrading; the encryption terminal generates a first abstract by adopting a corresponding algorithm for the equipment information and the upgrade file, and encrypts the first abstract by a private key to generate a signature file; and after the power acquisition terminal acquires the upgrade file, the signature file and the equipment information of the storage equipment from the storage equipment, checking the signature of the signature file, and upgrading the power acquisition terminal to be upgraded according to the upgrade file after the signature passes the checking. The public key and the private key of each type of power acquisition terminal have uniqueness, so that the correctness of the upgrade file of the power acquisition terminal to be upgraded is ensured; meanwhile, the information of the storage device is added in the encryption and decryption processes, and the safety of the storage device is also ensured.

Description

Electric power acquisition terminal upgrading method and system and electric power acquisition terminal
Technical Field
The invention relates to the field of upgrading of power acquisition terminals, in particular to a method and a system for upgrading a power acquisition terminal and the power acquisition terminal.
Background
At present, the most common mode for local upgrade of the power acquisition terminal is USB port upgrade, and the specific operation method is to copy an upgrade file into a USB flash disk and insert the upgrade file into a terminal USB interface for upgrade operation. The local upgrade files of all the existing power acquisition terminals are in the same format, the prior art only verifies whether the upgrade files can be used normally, cannot detect whether the upgrade files correspond to correct products, does not have any safety certification for the upgrade USB flash disk, and can carry out upgrade operation on the terminals as long as any normally usable USB flash disk contains the normal upgrade files.
The upgrading mode has a plurality of defects, and is easy to be upgraded mistakenly, for example, the upgrading file of the concentrator can also be upgraded to a special transformer terminal; anyone can use arbitrary USB flash disk and can upgrade, and the security of terminal does not guarantee.
Based on the above problems, there is a need for an upgrade method for a power acquisition terminal with security assurance.
Disclosure of Invention
In view of this, the present invention provides a method, a system and a power collection terminal for upgrading a power collection terminal.
In order to achieve the above purpose, the embodiment of the present invention adopts the following technical solutions:
in a first aspect, an embodiment of the present invention provides an upgrade method for an electric power collection terminal, which is applied to an upgrade system for an electric power collection terminal, where the upgrade system for an electric power collection terminal includes an electric power collection terminal and an encryption terminal, the electric power collection terminal is matched with a unique pair of a public key and a private key, the public key is stored in a file system of the electric power collection terminal, and the private key is stored in the encryption terminal, and the upgrade method includes:
the power acquisition terminal acquires an upgrade file, a signature file and equipment information of the storage equipment from the storage equipment; the signature file is obtained by the encryption terminal through private key encryption according to the upgrade file and the equipment information;
the power acquisition terminal decrypts the signature file through the public key to obtain a first abstract; the first abstract is an abstract value obtained by the power acquisition terminal decrypting the signature file through the public key;
the power acquisition terminal generates a second abstract by adopting a first algorithm on the upgrade file and the equipment information; the second abstract is an abstract value obtained by encrypting the upgrade file and the equipment information by the power acquisition terminal;
and when the first abstract is the same as the second abstract, the electric power acquisition terminal upgrades the electric power acquisition terminal to be upgraded according to the upgrade file.
In an optional implementation manner, the upgrade file includes an effective region range and an effective upgrade time range of the power acquisition terminal to be upgraded, and before the step of upgrading the power acquisition terminal to be upgraded according to the upgrade file, the method further includes:
the electric power acquisition terminal judges whether the region information of the electric power acquisition terminal to be upgraded conforms to the effective region range or not and whether the current upgrading time conforms to the effective upgrading time range or not;
if so, the power acquisition terminal executes the step of upgrading the power acquisition terminal to be upgraded according to the upgrade file;
if the region information of the electric power acquisition terminal to be upgraded does not conform to the effective region range, outputting the information that the upgrading range does not conform to;
and if the current upgrading time does not accord with the effective upgrading time range, outputting upgrading file failure information.
In an optional embodiment, the step before obtaining the upgrade file, the signature file, and the device information of the storage device from the storage device includes:
the encrypted terminal generates a third abstract by adopting the first algorithm on the equipment information and the upgrade file;
the encryption terminal maps the third abstract into the first abstract according to a mapping rule;
and the encryption terminal encrypts the first abstract by the private key to generate the signature file.
In an optional implementation manner, the step of generating, by the encrypted terminal, a third digest by using the first algorithm on the device information and the upgrade file includes:
the encryption terminal generates a fourth abstract by adopting a second algorithm on the equipment information;
and the encryption terminal generates a third abstract by adopting the first algorithm on the fourth abstract and the upgrade file.
In a second aspect, an embodiment of the present invention provides an upgrading method for an electric power collection terminal, which is applied to an electric power collection terminal, where the electric power collection terminal is matched with a unique pair of a public key and a private key, the public key is stored in a file system of the electric power collection terminal, and the private key is stored in an encryption terminal, and the upgrading method includes:
the power acquisition terminal acquires an upgrade file, a signature file and equipment information of the storage equipment from the storage equipment; the signature file is obtained by the encryption terminal through private key encryption according to the upgrade file and the equipment information;
the power acquisition terminal decrypts the signature file through the public key to obtain a first abstract; the first abstract is an abstract value obtained by the power acquisition terminal decrypting the signature file through the public key;
the power acquisition terminal generates a second abstract by adopting a first algorithm on the upgrade file and the equipment information; the second abstract is an abstract value obtained by encrypting the upgrade file and the equipment information by the power acquisition terminal;
and when the first abstract is the same as the second abstract, the electric power acquisition terminal upgrades the electric power acquisition terminal to be upgraded according to the upgrade file.
In an optional implementation manner, the upgrade file includes an effective region range and an effective upgrade time range of the power acquisition terminal to be upgraded, and before the step of upgrading the power acquisition terminal to be upgraded according to the upgrade file, the method further includes:
the electric power acquisition terminal judges whether the region information of the electric power acquisition terminal to be upgraded conforms to the effective region range or not and whether the current upgrading time conforms to the effective upgrading time range or not;
if so, the power acquisition terminal executes the step of upgrading the power acquisition terminal to be upgraded according to the upgrade file;
if the region information of the electric power acquisition terminal to be upgraded does not conform to the effective region range, outputting the information that the upgrading range does not conform to;
and if the current upgrading time does not accord with the effective upgrading time range, outputting upgrading file failure information.
In a third aspect, an embodiment of the present invention provides an electric power acquisition terminal upgrade system, including: the system comprises a power acquisition terminal, an encryption terminal and a storage device; the electric power acquisition terminal is matched with a unique pair of public key and private key, the public key is stored in a file system of the electric power acquisition terminal, and the private key is stored in the encryption terminal;
the power acquisition terminal is used for acquiring an upgrade file, a signature file and equipment information of the storage equipment from the storage equipment; the signature file is obtained by the encryption terminal through private key encryption according to the upgrade file and the equipment information;
the electric power acquisition terminal is also used for decrypting the signature file through the public key to obtain a first abstract; the first abstract is an abstract value obtained by the power acquisition terminal decrypting the signature file through the public key;
the power acquisition terminal is further used for generating a second abstract for the upgrade file and the equipment information by adopting a first algorithm; the second abstract is an abstract value obtained by encrypting the upgrade file and the equipment information by the power acquisition terminal;
and when the first abstract is the same as the second abstract, the electric power acquisition terminal is also used for upgrading the electric power acquisition terminal to be upgraded according to the upgrade file.
In an optional implementation manner, the upgrade file includes an effective region range and an effective upgrade time range of the power acquisition terminal to be upgraded;
the electric power acquisition terminal is also used for judging whether the region information of the electric power acquisition terminal to be upgraded conforms to the effective region range or not and whether the current upgrading time conforms to the effective upgrading time range or not;
if yes, the power acquisition terminal is used for upgrading the power acquisition terminal to be upgraded according to the upgrade file;
if the region information of the electric power acquisition terminal to be upgraded does not conform to the effective region range, outputting the information that the upgrading range does not conform to;
and if the current upgrading time does not accord with the effective upgrading time range, outputting upgrading file failure information.
In an optional implementation manner, the encryption terminal is configured to generate a fourth digest by using a second algorithm on the device information;
the encryption terminal is further used for generating a third abstract by adopting the first algorithm for the fourth abstract and the upgrade file;
the encryption terminal is further used for mapping the third abstract into the first abstract according to a mapping rule;
the encryption terminal is further used for encrypting the first abstract by the private key to generate the signature file;
the storage device is used for storing the upgrade file, the signature file and the device information of the storage device.
In a fourth aspect, an embodiment of the present invention provides an electric power collecting terminal, including a processor and a memory, where the memory stores machine executable instructions capable of being executed by the processor, and the processor can execute the machine executable instructions to implement the method described in any one of the foregoing embodiments.
The method for upgrading the power acquisition terminal is applied to an upgrading system of the power acquisition terminal, the upgrading system of the power acquisition terminal comprises the power acquisition terminal and an encryption terminal, the power acquisition terminal is matched with a unique pair of public key and private key, the public key is stored in a file system of the power acquisition terminal, and the private key is stored in the encryption terminal; the encryption terminal generates a first abstract by adopting a corresponding algorithm for the equipment information and the upgrade file, and encrypts the first abstract by a private key to generate a signature file; storing the upgrade file and the signature file of the upgrade file to a storage device; and after the power acquisition terminal acquires the upgrade file, the signature file and the equipment information of the storage equipment from the storage equipment, checking the signature of the signature file, and upgrading the power acquisition terminal to be upgraded according to the upgrade file after the signature passes the checking. The public key and the private key of each type of power acquisition terminal have uniqueness, so that the correctness of the upgrade file of the power acquisition terminal to be upgraded is ensured; meanwhile, the information of the storage device is added in the encryption and decryption processes, and the safety of the storage device is also ensured.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 shows a schematic structural diagram of an upgrade system of a power acquisition terminal according to an embodiment of the present invention.
Fig. 2 is a schematic flow chart illustrating an upgrading method for a power acquisition terminal according to an embodiment of the present invention.
Fig. 3 is a schematic flow chart illustrating another method for upgrading a power acquisition terminal according to an embodiment of the present invention.
Fig. 4 is a schematic block diagram illustrating a power collection terminal according to an embodiment of the present invention.
Icon: 100-upgrading a system of the power acquisition terminal; 10-a power acquisition terminal; 20-an encryption terminal; 30-a storage device; 110-a memory; 120-a processor; 130-a communication module.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
It is noted that relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
Fig. 1 is a schematic structural diagram of an upgrade system of a power acquisition terminal according to an embodiment of the present invention.
The power collecting terminal upgrading system 100 includes a power collecting terminal 10, an encryption terminal 20, and a storage device 30.
The power collecting terminal 10 is a terminal device, such as a concentrator and a special transformer, for collecting or organizing power data in a power grid system.
The encryption terminal 20 is configured to issue an upgrade file of the power collection terminal 10, perform operations such as encryption and signature on the upgrade file according to a specific algorithm, such as a hash algorithm, and copy the signature file and the upgrade file to the storage device 30. It should be noted that the encryption terminal 20 may be, but is not limited to: various terminal devices such as computers and servers can encrypt files.
The storage device 30 is used to store signature files and upgrade files. It should be noted that the storage device 30 may be, but is not limited to: various media capable of storing program files, such as a U disk, a removable hard disk, a magnetic disk or an optical disk.
Fig. 2 is a schematic flow chart of an upgrading method for a power acquisition terminal according to an embodiment of the present invention.
Step 101, the power acquisition terminal acquires an upgrade file, a signature file and device information of the storage device from the storage device.
And 102, the power acquisition terminal decrypts the signature file through a public key to obtain a first abstract.
And 103, the power acquisition terminal generates a second abstract by the upgrade file and the equipment information by adopting a first algorithm.
And 104, when the first abstract is the same as the second abstract, the power acquisition terminal upgrades the power acquisition terminal to be upgraded according to the upgrade file.
In this embodiment, the power acquisition terminal acquires the upgrade file, the signature file and the device information of the storage device from the storage device, decrypts the signature file through a public key to obtain a first abstract, generates a second abstract by adopting a first algorithm for the upgrade file and the device information, compares the first abstract with the second abstract, and upgrades the power acquisition terminal to be upgraded according to the upgrade file when the first abstract is the same as the second abstract. Because the public key and the private key of each type of the electric power acquisition terminal have uniqueness, the correctness of the upgrade file of the electric power acquisition terminal to be upgraded is ensured, and the condition that the electric power acquisition terminal to be upgraded does not correspond to the upgrade file is avoided.
On the basis of fig. 2, a possible implementation manner of the complete scheme is given below, and specifically, please refer to fig. 3, which is a schematic flow diagram of another method for upgrading the power acquisition terminal provided in this embodiment.
Step 201, the encryption terminal generates a third summary by using the first algorithm on the device information and the upgrade file.
The device information is device information of the storage device, and for brief description, the storage device in the following of the present invention is described by taking a usb disk as an example.
When the encryption terminal issues the upgrade file, the device information of the USB flash disk, such as information of supplier ID, product identification code, capacity utilization rate and the like, is acquired.
It should be noted that step 201 includes two substeps, which are not mentioned and will be described in detail herein.
In sub-step 201-1, the encrypted terminal generates a fourth digest by using a second algorithm on the device information.
The second algorithm is one of hash algorithms, which is not limited herein.
In a preferred embodiment, the fourth digest is 16 bytes of MD5 code.
In substep 201-2, the encryption terminal generates a third digest by using a first algorithm on the fourth digest and the upgrade file.
The first algorithm is one of the hash algorithms, and in a preferred embodiment the first algorithm is the SHA256 algorithm.
The encryption terminal generates a 32-byte token1 code by using the 16-byte MD5 code and the upgrade file through the SHA256 algorithm, and the 32-byte token1 code is the third digest.
And step 202, the encryption terminal maps the third abstract into the first abstract according to the mapping rule.
And automatically generating a token2 code after the token1 code is filled into the web server form, wherein the token2 code is the first abstract.
The web server form is a web page with specific mapping rules, and a user account and a corresponding password are required for logging in the web page, and the specific steps are as follows: after logging in, a token1 code is input, and a token2 is automatically generated according to the mapping rule.
The purpose of this step is to: the information leakage is avoided, a user without encryption authority is prevented from obtaining the token1 code, a signature file is generated by the token1 code, and then the power acquisition terminal to be upgraded is upgraded by the signature file.
In step 203, the encryption terminal encrypts the first digest by using a private key to generate a signature file.
The encryption terminal encrypts the first abstract by a private key to generate a signature file, wherein the signature file comprises an effective region range and an effective upgrading time range of the power acquisition terminal to be upgraded.
Wherein, the effective region range is a longitude and latitude range, namely a region range capable of being upgraded; the effective upgrading time range is a time range in which the power acquisition terminal to be upgraded can be upgraded, and the upgrading file is effective within 10 days, for example.
And the encryption terminal copies the signature file and the upgrade file to the USB flash disk.
It should be noted that the public key and the private key of each type of power acquisition terminal have uniqueness, the public key is stored in the file system of the power acquisition terminal, and the private key is stored in the encryption terminal.
And step 204, the power acquisition terminal acquires the upgrade file, the signature file and the equipment information of the storage equipment from the storage equipment.
Before the USB flash disk is inserted and detected, firstly, key sequence detection is carried out, specifically: a user inputs a key sequence, the power acquisition terminal judges whether the key sequence is the same as a key sequence prestored by the power acquisition terminal, and if so, the key sequence is a legal sequence; if not, the key sequence is an illegal sequence, and the USB flash disk insertion detection is not carried out.
And when the power acquisition terminal identifies a legal sequence, the USB flash disk is inserted and detected, and the upgrade file, the signature file and the equipment information of the USB flash disk are obtained from the USB flash disk.
In step 205, the power acquisition terminal decrypts the signature file by the public key to obtain a first digest.
The first abstract is an abstract value obtained by the power acquisition terminal decrypting the signature file through a public key.
And step 206, the power acquisition terminal generates a second abstract by the upgrade file and the equipment information by adopting a first algorithm.
The second abstract is an abstract value obtained by encrypting the upgrade file and the equipment information by the power acquisition terminal.
Step 207, when the first abstract is the same as the second abstract, the power acquisition terminal judges whether the region information of the power acquisition terminal to be upgraded conforms to the effective region range and whether the current upgrade time conforms to the effective upgrade time range.
If the first abstract is different from the second abstract, the upgrading file in the USB flash disk is not the upgrading file corresponding to the power acquisition terminal, or the upgrading file is damaged or tampered;
when the first abstract is the same as the second abstract, the upgrade file in the USB flash disk is the upgrade file corresponding to the power acquisition terminal and is not damaged or tampered.
And when the first abstract and the second abstract are the same, acquiring the region information and the current upgrading time information of the power acquisition terminal, and further judging whether the region information of the power acquisition terminal to be upgraded conforms to the effective region range and whether the current upgrading time conforms to the effective upgrading time range.
If the region information of the power acquisition terminal to be upgraded conforms to the effective region range and the current upgrade time conforms to the effective upgrade time range, executing step 208;
if the region information of the power acquisition terminal to be upgraded does not conform to the effective region range and the current upgrade time conforms to the effective upgrade time range, executing step 209;
if the region information of the power acquisition terminal to be upgraded conforms to the effective region range and the current upgrade time does not conform to the effective upgrade time range, executing step 210;
if the region information of the power acquisition terminal to be upgraded does not conform to the effective region range and the current upgrade time does not conform to the effective upgrade time range, step 209 and step 210 are executed simultaneously.
And step 208, the power acquisition terminal upgrades the power acquisition terminal to be upgraded according to the upgrade file.
Upgrading the system of the power acquisition terminal to be upgraded according to the upgrade file
And step 209, if the region information of the power acquisition terminal to be upgraded does not conform to the effective region range, outputting the information that the upgrade range does not conform to.
Namely, the region information of the electric power acquisition terminal to be upgraded does not meet the effective region range in the signature file, and only the electric power acquisition terminal in the effective region range can be upgraded.
And step 210, if the current upgrading time does not accord with the effective upgrading time range, outputting upgrading file failure information.
In summary, the method for upgrading the power acquisition terminal according to the embodiment of the present invention is applied to an upgrading system of the power acquisition terminal, where the upgrading system of the power acquisition terminal includes a power acquisition terminal and an encryption terminal, the power acquisition terminal is matched with a unique pair of a public key and a private key, the public key is stored in a file system of the power acquisition terminal, and the private key is stored in the encryption terminal; the encryption terminal generates a first abstract by adopting a corresponding algorithm for the equipment information and the upgrade file, and encrypts the first abstract by a private key to generate a signature file; storing the upgrade file and the signature file of the upgrade file to a storage device; and after the power acquisition terminal acquires the upgrade file, the signature file and the equipment information of the storage equipment from the storage equipment, checking the signature of the signature file, and upgrading the power acquisition terminal to be upgraded according to the upgrade file after the signature passes the checking. The public key and the private key of each type of power acquisition terminal have uniqueness, so that the correctness of the upgrade file of the power acquisition terminal to be upgraded is ensured; meanwhile, the information of the storage device is added in the encryption and decryption processes, and the safety of the storage device is also ensured.
Fig. 4 is a block diagram of a power acquisition terminal according to an embodiment of the present invention. The power harvesting terminal 10 includes a memory 110, a processor 120, and a communication module 130. The memory 110, the processor 120 and the communication module 130 are electrically connected to each other directly or indirectly to realize data transmission or interaction. For example, the components may be electrically connected to each other via one or more communication buses or signal lines.
Wherein the memory is used for storing programs or data. The Memory may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an erasable Read-Only Memory (EPROM), an electrically erasable Read-Only Memory (EEPROM), and the like.
The processor is used to read/write data or programs stored in the memory and perform corresponding functions.
The communication module is used for establishing communication connection between the server and other communication terminals through the network and is used for receiving and transmitting data through the network.
It should be understood that the configuration shown in fig. 4 is merely a schematic configuration of a power harvesting terminal, which may also include more or fewer components than shown in fig. 4, or have a different configuration than shown in fig. 4. The components shown in fig. 4 may be implemented in hardware, software, or a combination thereof.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. The utility model provides an electric power acquisition terminal upgrading method, is applied to an electric power acquisition terminal upgrading system, electric power acquisition terminal upgrading system includes electric power acquisition terminal and encryption terminal, electric power acquisition terminal matches has only a pair of public key and private key, the public key is preserved in electric power acquisition terminal's file system, the private key is preserved encryption terminal, its characterized in that includes:
the power acquisition terminal acquires an upgrade file, a signature file and equipment information of the storage equipment from the storage equipment; the signature file is obtained by the encryption terminal through private key encryption according to the upgrade file and the equipment information;
the power acquisition terminal decrypts the signature file through the public key to obtain a first abstract; the first abstract is an abstract value obtained by the power acquisition terminal decrypting the signature file through the public key;
the power acquisition terminal generates a second abstract by adopting a first algorithm on the upgrade file and the equipment information; the second abstract is an abstract value obtained by encrypting the upgrade file and the equipment information by the power acquisition terminal;
and when the first abstract is the same as the second abstract, the electric power acquisition terminal upgrades the electric power acquisition terminal to be upgraded according to the upgrade file.
2. The method according to claim 1, wherein the upgrade file includes an effective region range and an effective upgrade time range of the power acquisition terminal to be upgraded, and before the step of upgrading the power acquisition terminal to be upgraded according to the upgrade file, the method further includes:
the electric power acquisition terminal judges whether the region information of the electric power acquisition terminal to be upgraded conforms to the effective region range or not and whether the current upgrading time conforms to the effective upgrading time range or not;
if so, the power acquisition terminal executes the step of upgrading the power acquisition terminal to be upgraded according to the upgrade file;
if the region information of the electric power acquisition terminal to be upgraded does not conform to the effective region range, outputting the information that the upgrading range does not conform to;
and if the current upgrading time does not accord with the effective upgrading time range, outputting upgrading file failure information.
3. The method of claim 1, wherein the step of obtaining the upgrade file, the signature file, and the device information of the storage device from the storage device comprises:
the encrypted terminal generates a third abstract by adopting the first algorithm on the equipment information and the upgrade file;
the encryption terminal maps the third abstract into the first abstract according to a mapping rule;
and the encryption terminal encrypts the first abstract by the private key to generate the signature file.
4. The method according to claim 3, wherein the step of the encrypted terminal generating a third digest by using the first algorithm on the device information and the upgrade file comprises:
the encryption terminal generates a fourth abstract by adopting a second algorithm on the equipment information;
and the encryption terminal generates a third abstract by adopting the first algorithm on the fourth abstract and the upgrade file.
5. An electric power acquisition terminal upgrading method is applied to an electric power acquisition terminal, the electric power acquisition terminal is matched with a unique pair of public key and private key, the public key is stored in a file system of the electric power acquisition terminal, and the private key is stored in an encryption terminal, and the method is characterized by comprising the following steps:
the power acquisition terminal acquires an upgrade file, a signature file and equipment information of the storage equipment from the storage equipment; the signature file is obtained by the encryption terminal through private key encryption according to the upgrade file and the equipment information;
the power acquisition terminal decrypts the signature file through the public key to obtain a first abstract; the first abstract is an abstract value obtained by the power acquisition terminal decrypting the signature file through the public key;
the power acquisition terminal generates a second abstract by adopting a first algorithm on the upgrade file and the equipment information; the second abstract is an abstract value obtained by encrypting the upgrade file and the equipment information by the power acquisition terminal;
and when the first abstract is the same as the second abstract, the electric power acquisition terminal upgrades the electric power acquisition terminal to be upgraded according to the upgrade file.
6. The method according to claim 5, wherein the upgrade file includes an effective region range and an effective upgrade time range of the power acquisition terminal to be upgraded, and before the step of upgrading the power acquisition terminal to be upgraded according to the upgrade file, the method further includes:
the electric power acquisition terminal judges whether the region information of the electric power acquisition terminal to be upgraded conforms to the effective region range or not and whether the current upgrading time conforms to the effective upgrading time range or not;
if so, the power acquisition terminal executes the step of upgrading the power acquisition terminal to be upgraded according to the upgrade file;
if the region information of the electric power acquisition terminal to be upgraded does not conform to the effective region range, outputting the information that the upgrading range does not conform to;
and if the current upgrading time does not accord with the effective upgrading time range, outputting upgrading file failure information.
7. The utility model provides a power acquisition terminal upgrading system which characterized in that includes: the system comprises a power acquisition terminal, an encryption terminal and a storage device; the electric power acquisition terminal is matched with a unique pair of public key and private key, the public key is stored in a file system of the electric power acquisition terminal, and the private key is stored in the encryption terminal;
the power acquisition terminal is used for acquiring an upgrade file, a signature file and equipment information of the storage equipment from the storage equipment; the signature file is obtained by the encryption terminal through private key encryption according to the upgrade file and the equipment information;
the electric power acquisition terminal is also used for decrypting the signature file through the public key to obtain a first abstract; the first abstract is an abstract value obtained by the power acquisition terminal decrypting the signature file through the public key;
the power acquisition terminal is further used for generating a second abstract for the upgrade file and the equipment information by adopting a first algorithm; the second abstract is an abstract value obtained by encrypting the upgrade file and the equipment information by the power acquisition terminal;
and when the first abstract is the same as the second abstract, the electric power acquisition terminal is also used for upgrading the electric power acquisition terminal to be upgraded according to the upgrade file.
8. The system of claim 7, wherein the upgrade file includes an effective region range and an effective upgrade time range of the power acquisition terminal to be upgraded;
the electric power acquisition terminal is also used for judging whether the region information of the electric power acquisition terminal to be upgraded conforms to the effective region range or not and whether the current upgrading time conforms to the effective upgrading time range or not;
if yes, the power acquisition terminal is used for upgrading the power acquisition terminal to be upgraded according to the upgrade file;
if the region information of the electric power acquisition terminal to be upgraded does not conform to the effective region range, outputting the information that the upgrading range does not conform to;
and if the current upgrading time does not accord with the effective upgrading time range, outputting upgrading file failure information.
9. The system of claim 8,
the encryption terminal is used for generating a fourth abstract for the equipment information by adopting a second algorithm;
the encryption terminal is further used for generating a third abstract by adopting the first algorithm for the fourth abstract and the upgrade file;
the encryption terminal is further used for mapping the third abstract into the first abstract according to a mapping rule;
the encryption terminal is further used for encrypting the first abstract by the private key to generate the signature file;
the storage device is used for storing the upgrade file, the signature file and the device information of the storage device.
10. A power harvesting terminal comprising a processor and a memory, the memory storing machine executable instructions executable by the processor to perform the method of any one of claims 5 to 6.
CN201911024097.9A 2019-10-25 2019-10-25 Electric power acquisition terminal upgrading method and system and electric power acquisition terminal Pending CN110780900A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911024097.9A CN110780900A (en) 2019-10-25 2019-10-25 Electric power acquisition terminal upgrading method and system and electric power acquisition terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911024097.9A CN110780900A (en) 2019-10-25 2019-10-25 Electric power acquisition terminal upgrading method and system and electric power acquisition terminal

Publications (1)

Publication Number Publication Date
CN110780900A true CN110780900A (en) 2020-02-11

Family

ID=69386753

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911024097.9A Pending CN110780900A (en) 2019-10-25 2019-10-25 Electric power acquisition terminal upgrading method and system and electric power acquisition terminal

Country Status (1)

Country Link
CN (1) CN110780900A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111510445A (en) * 2020-04-09 2020-08-07 杭州涂鸦信息技术有限公司 Method, device, equipment and medium for preventing network camera from being stolen
CN113949532A (en) * 2021-09-18 2022-01-18 武汉正维电子技术有限公司 Remote encryption upgrading method and system for Internet of things equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101436141A (en) * 2008-11-21 2009-05-20 深圳创维数字技术股份有限公司 Firmware upgrading and encapsulating method and device based on digital signing
CN103873440A (en) * 2012-12-11 2014-06-18 北京旋极信息技术股份有限公司 Application program upgrading method and system
CN105303081A (en) * 2015-05-07 2016-02-03 同方计算机有限公司 Method and system of host for identifying ID of USB (Universal Serial Bus) main control chip reliably
CN107678763A (en) * 2017-09-28 2018-02-09 杭州海兴电力科技股份有限公司 Electric energy meter upgrade method and system based on digital signature technology
CN109271189A (en) * 2018-09-26 2019-01-25 郑州云海信息技术有限公司 A kind of processing method and relevant apparatus of embedded system firmware
CN110225063A (en) * 2019-07-02 2019-09-10 广州小鹏汽车科技有限公司 Upgrade method, upgrade-system, server and the car-mounted terminal of automobile mounted system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101436141A (en) * 2008-11-21 2009-05-20 深圳创维数字技术股份有限公司 Firmware upgrading and encapsulating method and device based on digital signing
CN103873440A (en) * 2012-12-11 2014-06-18 北京旋极信息技术股份有限公司 Application program upgrading method and system
CN105303081A (en) * 2015-05-07 2016-02-03 同方计算机有限公司 Method and system of host for identifying ID of USB (Universal Serial Bus) main control chip reliably
CN107678763A (en) * 2017-09-28 2018-02-09 杭州海兴电力科技股份有限公司 Electric energy meter upgrade method and system based on digital signature technology
CN109271189A (en) * 2018-09-26 2019-01-25 郑州云海信息技术有限公司 A kind of processing method and relevant apparatus of embedded system firmware
CN110225063A (en) * 2019-07-02 2019-09-10 广州小鹏汽车科技有限公司 Upgrade method, upgrade-system, server and the car-mounted terminal of automobile mounted system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111510445A (en) * 2020-04-09 2020-08-07 杭州涂鸦信息技术有限公司 Method, device, equipment and medium for preventing network camera from being stolen
CN113949532A (en) * 2021-09-18 2022-01-18 武汉正维电子技术有限公司 Remote encryption upgrading method and system for Internet of things equipment

Similar Documents

Publication Publication Date Title
EP3479282B1 (en) Targeted secure software deployment
CN103460195B (en) For the system and method for security software update
US8874922B2 (en) Systems and methods for multi-layered authentication/verification of trusted platform updates
US11368299B2 (en) Self-encryption drive (SED)
CN108171088B (en) Server hardware credibility protection method and device based on BMC
CN105391717A (en) APK signature authentication method and APK signature authentication system
CN109657492B (en) Database management method, medium, and electronic device
CN109862099B (en) Upgrade checking method, device, terminal and system
CN104462965A (en) Method for verifying integrity of application program and network device
US8615798B2 (en) Optimizing a data deduplication system using client authentication information
CN104573527A (en) UEFI system updating method based on updating security mechanism
CN110780900A (en) Electric power acquisition terminal upgrading method and system and electric power acquisition terminal
KR20170089352A (en) Firmware integrity verification for performing the virtualization system
CN107315945B (en) The disk decryption method and device of a kind of electronic equipment
CN110889131A (en) File sharing system
CN106709281B (en) Patch granting and acquisition methods, device
US9965625B2 (en) Control system and authentication device
CN111045856A (en) Method, apparatus and computer program product for managing application systems
CN111400771A (en) Target partition checking method and device, storage medium and computer equipment
CN115589316A (en) Data encryption transmission method and device, electronic equipment and storage medium
CN112866195B (en) Agile data transmission method and device, computer equipment and storage medium
CN109768853A (en) A kind of key component verification method, device and terminal device
CN112825093B (en) Security baseline checking method, host, server, electronic device and storage medium
CN115242413A (en) Internet of things equipment firmware safety upgrading method and device, electronic equipment and medium
EP3575953B1 (en) A blockchain network agent for verifying and accepting patch requests from a patch initiator and method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination