CN112395596B - Android system-based anti-cutting machine application installation method and device - Google Patents
Android system-based anti-cutting machine application installation method and device Download PDFInfo
- Publication number
- CN112395596B CN112395596B CN202011230391.8A CN202011230391A CN112395596B CN 112395596 B CN112395596 B CN 112395596B CN 202011230391 A CN202011230391 A CN 202011230391A CN 112395596 B CN112395596 B CN 112395596B
- Authority
- CN
- China
- Prior art keywords
- public key
- installation package
- appointed
- module
- application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000009434 installation Methods 0.000 title claims abstract description 101
- 238000000034 method Methods 0.000 title claims abstract description 32
- 238000005520 cutting process Methods 0.000 title claims abstract description 23
- 238000005192 partition Methods 0.000 claims abstract description 47
- 238000003860 storage Methods 0.000 claims abstract description 30
- 238000004364 calculation method Methods 0.000 claims description 35
- 238000013524 data verification Methods 0.000 claims description 19
- 238000012795 verification Methods 0.000 claims description 11
- 230000004048 modification Effects 0.000 claims description 5
- 238000012986 modification Methods 0.000 claims description 5
- 238000007726 management method Methods 0.000 description 4
- 238000012423 maintenance Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000002265 prevention Effects 0.000 description 2
- 239000000243 solution Substances 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 230000002457 bidirectional effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 238000002347 injection Methods 0.000 description 1
- 239000007924 injection Substances 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
- Stored Programmes (AREA)
Abstract
The embodiment of the application relates to an android system-based anti-cutting machine application installation method and device. The method of the embodiment of the application comprises the following steps: acquiring an installation package, wherein the installation package is internally provided with first encrypted data, and the first encrypted data is obtained by encrypting a designated data segment of the installation package through a private key; obtaining a public key corresponding to the private key from a storage partition appointed by the android device, and decrypting the encrypted public key; decrypting the first encrypted data by the decrypted public key; acquiring the appointed data segment of the installation package, and comparing whether the appointed data segment is consistent with the decrypted first encrypted data or not; if not, refusing to install the installation package. The method of the embodiment of the application encrypts the appointed data segment in the installation package through the private key, decrypts the appointed data segment through the public key, compares the decrypted appointed data segment, ensures the consistency of the application, and effectively prevents the application from being tampered maliciously.
Description
Technical Field
The embodiment of the application relates to the technical field of android systems, in particular to an anti-cutting machine application installation method and device based on an android system.
Background
With the increasing popularization and use of android devices, more and more safety in use and device management problems are concerned. The anti-cutting machine is one of the problems, because the Zhuozi source is relatively open, the original android does not strictly manage and control the burning of the system firmware and the installation of the application, the phenomenon that the equipment is replaced by the tampered system firmware, the terminal is installed and used by the user by himself or herself, and the benefits of equipment manufacturers and the equipment safety of terminal clients are seriously damaged. Currently, a firmware signature fuse mechanism is attached to a firmware security part chip platform. The mechanism encrypts data for the firmware file, and the file encryption is encrypted through a key algorithm. Each terminal customer enjoys a unique key for encrypting the firmware and is uniformly managed by a manufacturer, when the equipment leaves a factory, the equipment manufacturer encrypts and writes the firmware into the equipment and stores the firmware into a key pair for decrypting data, and the updated firmware of the equipment can only update the firmware with the corresponding key encryption. This approach suffers from the following problems:
1. The difficulty of factory maintenance is big, and every terminal customer all needs to do the firmware maintenance, and the certificate is maintained, causes the production maintenance cost to increase.
2. Part of the platform is native without fuse signature mechanism, needs to be redeveloped and realized, has relatively high realization difficulty and has vulnerability risk.
3. The single firmware is encrypted, only the system layer firmware is protected, but the terminal application installation cannot be controlled, and the phenomenon of being cut off still exists.
Disclosure of Invention
The embodiment of the application provides a method and a device for installing an anti-cutting machine application based on an android system, which can encrypt a designated data segment in an installation package through a private key, decrypt the designated data segment through a public key, and compare the decrypted designated data segment, so that the consistency of the application is ensured, and the application is effectively prevented from being tampered maliciously.
In a first aspect, an embodiment of the present application provides an android system-based method for installing a cutting prevention application, including the following steps:
acquiring an installation package, wherein the installation package is internally provided with first encrypted data, and the first encrypted data is obtained by encrypting a designated data segment of the installation package through a private key;
obtaining a public key corresponding to the private key from a storage partition appointed by the android device, and decrypting the encrypted public key;
Decrypting the first encrypted data by the decrypted public key;
acquiring the appointed data segment of the installation package, and comparing whether the appointed data segment is consistent with the decrypted first encrypted data or not;
if not, refusing to install the installation package.
Optionally, before the obtaining the installation package, the method further includes the following steps:
acquiring client information and key module information;
generating a public key and a corresponding private key according to the client information and the secret key module information;
and carrying out encryption calculation on the public key, and storing the public key into a storage partition appointed by the android device.
Optionally, after performing encryption calculation on the public key and storing the public key in the storage partition specified by the android device, the method further includes:
and modifying the burning partition control of the android device so that the designated storage partition cannot be upgraded and burned and brushed.
Optionally, after modifying the burning partition control of the android device, the method further includes:
And starting a verification mode of the burning partition of the android device.
Optionally, the acquiring the specified data segment of the installation package includes:
and carrying out data verification calculation on the installation package to obtain a calculation result.
In a second aspect, an embodiment of the present application provides an android system-based anti-cutting machine application installation apparatus, including:
The first acquisition module is used for acquiring an installation package, wherein the installation package is internally provided with first encrypted data, and the first encrypted data is obtained by encrypting a designated data segment of the installation package through a private key;
The first decryption module is used for acquiring a public key corresponding to the private key from a storage partition appointed by the android device and decrypting the encrypted public key;
The second decryption module is used for decrypting the first encrypted data through the decrypted public key;
the second acquisition module is used for acquiring the appointed data segment of the installation package and comparing whether the appointed data segment is consistent with the decrypted first encrypted data or not;
and the installation module is used for refusing to install the installation package if not.
Optionally, the method further comprises:
The third acquisition module is used for acquiring the client information and the key module information;
The certificate generation module is used for generating a public key and a corresponding private key according to the client information and the secret key module information;
and the encryption storage module is used for carrying out encryption calculation on the public key and storing the public key into a storage partition appointed by the android device.
Optionally, the method further comprises:
And the partition modification module is used for carrying out encryption calculation on the public key, storing the public key into a storage partition appointed by the android device, and modifying the burning partition control of the android device so that the appointed storage partition cannot be updated and burned and brushed.
Optionally, the method further comprises:
and the starting module is used for starting the verification mode of the burning partition of the android device.
Optionally, the specified data segment is a data verification calculation result of the installation package, and the second obtaining module includes:
And the data verification and calculation unit is used for carrying out data verification and calculation on the installation package to obtain a calculation result.
In the embodiment of the application, the appointed data segment in the installation package is encrypted through the private key, the appointed data segment is decrypted through the public key, and the decrypted appointed data segment is compared, so that the consistency of the application is ensured, and the application is effectively prevented from being tampered maliciously; further, the public key is encrypted, so that protection of a public key certificate is realized, unreadability of the android device certificate is guaranteed, safety and concealment of the secret key are effectively improved, encryption information is added to the application on the premise that the application is not changed, and whether the application is signed is effectively distinguished; and further, by realizing encryption and decryption of the application packet data verification, only the verification information is encrypted and decrypted, and the encryption and decryption efficiency is effectively improved.
In order to more clearly illustrate the embodiments of the application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Drawings
FIG. 1 is a flow chart of an anti-cut machine application installation method based on the android system provided in one exemplary embodiment;
FIG. 2 is a flow chart of an anti-cut machine application installation method based on the android system provided in one exemplary embodiment;
fig. 3 is a schematic structural view of an android-based anti-cutting machine application installation apparatus provided in an exemplary embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the following detailed description of the embodiments of the present application will be given with reference to the accompanying drawings.
It should be understood that the described embodiments are merely some, but not all embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the application, are intended to be within the scope of the embodiments of the present application.
The terminology used in the embodiments of the application is for the purpose of describing particular embodiments only and is not intended to be limiting of embodiments of the application. As used in this application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any or all possible combinations of one or more of the associated listed items.
When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the application as detailed in the accompanying claims. In the description of the present application, it should be understood that the terms "first," "second," "third," and the like are used merely to distinguish between similar objects and are not necessarily used to describe a particular order or sequence, nor should they be construed to indicate or imply relative importance. The specific meaning of the above terms in the present application can be understood by those of ordinary skill in the art according to the specific circumstances.
Furthermore, in the description of the present application, unless otherwise indicated, "a plurality" means two or more. "and/or", describes an association relationship of an association object, and indicates that there may be three relationships, for example, a and/or B, and may indicate: a exists alone, A and B exist together, and B exists alone. The character "/" generally indicates that the context-dependent object is an "or" relationship.
Aiming at the technical problems mentioned in the background art, the embodiment of the application provides an android system-based anti-cutting application installation method, which can protect android equipment from being cut when the android system is used, effectively control a terminal, and realize that the android equipment can only install an application signed by a client certificate so as to control the occurrence of the phenomenon of cutting by using the application as an access point.
As shown in fig. 1, in an exemplary embodiment, the android system-based anti-cutting application installation method of the present application includes the following steps:
S101: the method comprises the steps of obtaining an installation package, wherein first encrypted data are arranged in the installation package, and the first encrypted data are obtained by encrypting specified data segments of the installation package through a private key.
In the embodiment of the application, the steps of the anti-cutting machine application installation method for the android system are mainly executed by the android device. The Android device is an intelligent device provided with an Android (Android) operating system, and can be specifically an intelligent device such as a computer, a tablet computer, a mobile phone and the like.
An installation package (INSTALL PACK), a software installation package, is a collection of self-decompressing files, including all files of the software installation. The installation package (executable file) is operated, and all files of the software can be released to a hard disk to finish the work of modifying a registry, modifying system settings, creating a shortcut and the like. The installation package files are in exe format.
In one embodiment, the specified data segment of the installation package is encrypted with a private key prior to obtaining the installation package. The specified data segment may be any data segment of the installation package that is specified in advance by a preset rule, for example, the specified data segment may be confidential part data of the installation package.
In a preferred example, the specified data segment is a data check calculation of the installation package. Data verification is a verification operation performed to ensure the integrity of data. The method comprises the steps that a specified algorithm is used for calculating a check value of original data, a receiver calculates the check value once by using the same algorithm, and if the check values obtained by the two calculation are the same, the data is complete. That is, the preferred embodiment of the present application also performs data verification calculation on the installation package, and encrypts the data verification calculation result by the private key.
S102: and obtaining a public key corresponding to the private key from a storage partition appointed by the android device, and decrypting the encrypted public key.
In the embodiment of the application, the public key can be encrypted and decrypted by a common encryption mode.
In some examples, the method of the present application further comprises the step of generating the private key and the public key. Before the android device leaves the factory, the android device manufacturer utilizes a certificate generation module and a certificate injection module to generate the private key and the public key, and injects the public key allocated to the client into the android device.
Specifically, as shown in fig. 2, before obtaining the installation package, the method further includes the following steps:
S201: acquiring client information and key module information;
s202: generating a public key and a corresponding private key according to the client information and the secret key module information;
S203: and carrying out encryption calculation on the public key, and storing the public key into a storage partition appointed by the android device.
In one embodiment, the steps are performed by a certificate generation module, which is mainly used for establishing public and private key pairs for application signing and signature verification, and the module imports client information and a certificate password into certificate generation. The android device manufacturer records a client public key, and the private key is distributed to an application terminal client for application signature when the public key is to be injected.
In an embodiment, after performing encryption calculation on the public key and storing the public key in the storage partition specified by the android device, the method further includes:
and modifying the burning partition control of the android device so that the designated storage partition cannot be upgraded and burned and brushed.
The step of burning the certificate is completed before the android device leaves the factory, and the certificate is burnt to a key storage partition appointed by the android device, namely the appointed storage partition. And modifying the equipment burning partition control so that the key partition cannot be brushed off by upgrading and burning. Meanwhile, in some embodiments, a verification mode of the burning partition of the android device is also started, so that the integrity of the partition is ensured.
S103: and decrypting the first encrypted data through the decrypted public key.
S104: and acquiring the designated data segment of the installation package, and comparing whether the designated data segment is consistent with the decrypted first encrypted data or not.
S105: if not, refusing to install the installation package.
When the designated data segment is the data verification calculation result of the installation package, the application further comprises the steps of carrying out data verification calculation on the installation package after the installation package is obtained and obtaining the calculation result.
When the installation package is subjected to any change, the data verification result is different from the decryption result of the first encrypted data, and therefore, when the comparison result is inconsistent, the installation package is refused to be installed. And when the comparison results are consistent, the installation package is not modified, and the installation package can be installed.
In the embodiment of the application, the appointed data segment in the installation package is encrypted through the private key, the appointed data segment is decrypted through the public key, and the decrypted appointed data segment is compared, so that the consistency of the application is ensured, and the application is effectively prevented from being tampered maliciously; further, the public key is encrypted, so that protection of a public key certificate is realized, unreadability of the android device certificate is guaranteed, safety and concealment of the secret key are effectively improved, encryption information is added to the application on the premise that the application is not changed, and whether the application is signed is effectively distinguished; and further, by realizing encryption and decryption of the application packet data verification, only the verification information is encrypted and decrypted, and the encryption and decryption efficiency is effectively improved.
The android system-based anti-cutting machine application installation method provided by the embodiment of the application has the following technical effects:
1. The application installation is effectively controlled, the application can be installed only after being signed by a terminal client, and the safety of the application installation is improved.
2. The firmware management and control brought by android equipment manufacturers to firmware fuses is reduced, and the development and operation cost is reduced.
3. And through the installation of the bidirectional certificate management and control application, the management and control of android equipment manufacturers and terminals on products is improved.
4. The anti-cutting machine is realized aiming at application installation, the system safety is improved, and meanwhile, the anti-cutting cost between different hardware platforms is reduced.
Corresponding to the android system-based anti-cutting application installation method, the embodiment of the application also provides an android system-based anti-cutting application installation device, which can be an intelligent device installed on any operating android system, and can be specifically a computer, a tablet computer, a mobile phone and the like. According to the android system-based cut-off prevention application installation device, the appointed data segment in the installation package is encrypted through the private key, the appointed data segment is decrypted through the public key, and the decrypted appointed data segment is compared, so that consistency of the application is guaranteed, and the application is effectively prevented from being tampered maliciously; further, the public key is encrypted, so that protection of a public key certificate is realized, unreadability of the android device certificate is guaranteed, safety and concealment of the secret key are effectively improved, encryption information is added to the application on the premise that the application is not changed, and whether the application is signed is effectively distinguished; and further, by realizing encryption and decryption of the application packet data verification, only the verification information is encrypted and decrypted, and the encryption and decryption efficiency is effectively improved.
In an exemplary embodiment, as shown in fig. 3, the android-based cut-prevention application installation apparatus 400 includes:
A first obtaining module 301, configured to obtain an installation package, where the installation package has first encrypted data therein, where the first encrypted data is obtained by encrypting a specified data segment of the installation package by using a private key;
A first decryption module 302, configured to obtain a public key corresponding to the private key from a storage partition specified by the android device, and decrypt the encrypted public key;
a second decryption module 303, configured to decrypt the first encrypted data through the decrypted public key;
A second obtaining module 304, configured to obtain the specified data segment of the installation package, and compare whether the specified data segment is consistent with the decrypted first encrypted data;
and an installation module 305 for refusing to install the installation package if not.
In an exemplary embodiment, the android-based anti-cutting application installation apparatus 300 further includes:
The third acquisition module is used for acquiring the client information and the key module information;
The certificate generation module is used for generating a public key and a corresponding private key according to the client information and the secret key module information;
and the encryption storage module is used for carrying out encryption calculation on the public key and storing the public key into a storage partition appointed by the android device.
In an exemplary embodiment, the android-based anti-cutting application installation apparatus 300 further includes:
And the partition modification module is used for carrying out encryption calculation on the public key, storing the public key into a storage partition appointed by the android device, and modifying the burning partition control of the android device so that the appointed storage partition cannot be updated and burned and brushed.
In an exemplary embodiment, the android-based anti-cutting application installation apparatus 300 further includes:
and the starting module is used for starting the verification mode of the burning partition of the android device.
In an exemplary embodiment, the specified data segment is a data check calculation result of the installation package, and the second obtaining module 304 includes:
And the data verification and calculation unit is used for carrying out data verification and calculation on the installation package to obtain a calculation result.
It is to be understood that the embodiments of the application are not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be made without departing from the scope thereof. The scope of embodiments of the application is limited only by the appended claims.
The above examples merely represent a few implementations of the present examples, which are described in more detail and are not to be construed as limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that various modifications and improvements can be made to the present application without departing from the spirit of the embodiments of the application.
Claims (4)
1. The android system-based anti-cutting machine application installation method is characterized by comprising the following steps of:
acquiring an installation package, wherein the installation package is internally provided with first encrypted data, and the first encrypted data is obtained by encrypting a designated data segment of the installation package through a private key;
obtaining a public key corresponding to the private key from a storage partition appointed by the android device, and decrypting the encrypted public key;
Decrypting the first encrypted data by the decrypted public key;
acquiring the appointed data segment of the installation package, and comparing whether the appointed data segment is consistent with the decrypted first encrypted data or not;
if not, refusing to install the installation package;
Before the installation package is obtained, the method further comprises the following steps:
acquiring client information and key module information;
generating a public key and a corresponding private key according to the client information and the secret key module information;
performing encryption calculation on the public key, and storing the public key to a storage partition appointed by the android device;
After the encryption calculation is performed on the public key and the public key is stored in the storage partition appointed by the android device, the method further comprises the following steps:
Modifying the burning partition control of the android device so that the designated storage partition cannot be updated and burned and brushed;
After the burning partition control of the android device is modified, the method further comprises the following steps:
And starting a verification mode of the burning partition of the android device.
2. The android system-based cut-prevention application installation method as claimed in claim 1, wherein:
the obtaining the specified data segment of the installation package includes:
and carrying out data verification calculation on the installation package to obtain a calculation result.
3. Anti-cutting machine application installation device based on android system, characterized in that includes:
The first acquisition module is used for acquiring an installation package, wherein the installation package is internally provided with first encrypted data, and the first encrypted data is obtained by encrypting a designated data segment of the installation package through a private key;
The first decryption module is used for acquiring a public key corresponding to the private key from a storage partition appointed by the android device and decrypting the encrypted public key;
The second decryption module is used for decrypting the first encrypted data through the decrypted public key;
the second acquisition module is used for acquiring the appointed data segment of the installation package and comparing whether the appointed data segment is consistent with the decrypted first encrypted data or not;
the installation module is used for refusing to install the installation package if not;
The third acquisition module is used for acquiring the client information and the key module information;
The certificate generation module is used for generating a public key and a corresponding private key according to the client information and the secret key module information;
the encryption storage module is used for carrying out encryption calculation on the public key and storing the public key to a storage partition appointed by the android device;
Further comprises:
The partition modification module is used for carrying out encryption calculation on the public key, storing the public key into a storage partition appointed by the android device, and modifying the burning partition control of the android device so that the appointed storage partition cannot be updated and burned and brushed;
and the starting module is used for starting the verification mode of the burning partition of the android device.
4. The android system-based cut-prevention application installation apparatus of claim 3, wherein the specified data segment is a data verification calculation result of the installation package, and the second acquisition module comprises:
And the data verification and calculation unit is used for carrying out data verification and calculation on the installation package to obtain a calculation result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011230391.8A CN112395596B (en) | 2020-11-06 | 2020-11-06 | Android system-based anti-cutting machine application installation method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011230391.8A CN112395596B (en) | 2020-11-06 | 2020-11-06 | Android system-based anti-cutting machine application installation method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112395596A CN112395596A (en) | 2021-02-23 |
CN112395596B true CN112395596B (en) | 2024-07-26 |
Family
ID=74597492
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011230391.8A Active CN112395596B (en) | 2020-11-06 | 2020-11-06 | Android system-based anti-cutting machine application installation method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112395596B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101924607A (en) * | 2010-08-27 | 2010-12-22 | 华为终端有限公司 | Firmware processing method based on firmware air transmission technology, device and system thereof |
CN109144552A (en) * | 2018-09-10 | 2019-01-04 | 郑州云海信息技术有限公司 | A kind of boot firmware method for refreshing and device |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020157010A1 (en) * | 2001-04-24 | 2002-10-24 | International Business Machines Corporation | Secure system and method for updating a protected partition of a hard drive |
US20070288526A1 (en) * | 2006-06-08 | 2007-12-13 | Emc Corporation | Method and apparatus for processing a database replica |
CN101490688A (en) * | 2006-07-07 | 2009-07-22 | 桑迪士克股份有限公司 | Content control system and method using certificate revocation lists |
CN102033764B (en) * | 2010-11-30 | 2014-08-20 | 公安部第三研究所 | COS (Class of Service) firmware upgrading method of TF (T-Flash) card |
CN105787357B (en) * | 2016-03-28 | 2019-01-04 | 福建联迪商用设备有限公司 | One kind being based on Android system APK method for down loading and its system |
US10498712B2 (en) * | 2016-11-10 | 2019-12-03 | Ernest Brickell | Balancing public and personal security needs |
CN106412121A (en) * | 2016-11-21 | 2017-02-15 | 四川长虹电器股份有限公司 | System security upgrade method applied to intelligent refrigerators |
-
2020
- 2020-11-06 CN CN202011230391.8A patent/CN112395596B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101924607A (en) * | 2010-08-27 | 2010-12-22 | 华为终端有限公司 | Firmware processing method based on firmware air transmission technology, device and system thereof |
CN109144552A (en) * | 2018-09-10 | 2019-01-04 | 郑州云海信息技术有限公司 | A kind of boot firmware method for refreshing and device |
Also Published As
Publication number | Publication date |
---|---|
CN112395596A (en) | 2021-02-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110378139B (en) | Data key protection method, system, electronic equipment and storage medium | |
CN110597538B (en) | Software upgrading method and OTA upgrading system based on OTA upgrading system | |
US9281949B2 (en) | Device using secure processing zone to establish trust for digital rights management | |
KR101063076B1 (en) | Software update security methods | |
US8209540B2 (en) | Incremental secure backup and restore of user settings and data | |
EP2887576B1 (en) | Software key updating method and device | |
US8683214B2 (en) | Method and device that verifies application program modules | |
CN103229451A (en) | Method and apparatus for key provisioning of hardware devices | |
WO2015042981A1 (en) | Encryption and decryption processing method, apparatus and device | |
US8707430B2 (en) | Tampering monitoring system, management apparatus, and management method | |
CN106027503A (en) | Cloud storage data encryption method based on TPM | |
CN108595198B (en) | Safe firmware updating method | |
KR20110093468A (en) | User terminal device, server and control method thereof | |
CN111815812B (en) | Third-party unlocking control method and system for electronic lock | |
CN102594568A (en) | Method for ensuring safety of mobile equipment software mirror image based on multilevel digital certificate | |
WO2013185724A2 (en) | Mobile terminal and software upgrade method thereof | |
CN113378119B (en) | Software authorization method, device, equipment and storage medium | |
CN115242397A (en) | OTA upgrade security verification method and readable storage medium for vehicle EUC | |
CN110287725B (en) | Equipment, authority control method thereof and computer readable storage medium | |
CN107995230B (en) | A kind of method for down loading and terminal | |
CN109784072B (en) | Security file management method and system | |
JP2009284231A (en) | Key generating apparatus, key generating method, key generating program, and electronic apparatus | |
CN112395596B (en) | Android system-based anti-cutting machine application installation method and device | |
CN116484379A (en) | System starting method, system comprising trusted computing base software, equipment and medium | |
CN106971105B (en) | IOS-based application program defense method against false face attack |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |