CN113382398B - Server, bluetooth headset terminal and Bluetooth headset firmware updating processing system - Google Patents

Server, bluetooth headset terminal and Bluetooth headset firmware updating processing system Download PDF

Info

Publication number
CN113382398B
CN113382398B CN202110556435.4A CN202110556435A CN113382398B CN 113382398 B CN113382398 B CN 113382398B CN 202110556435 A CN202110556435 A CN 202110556435A CN 113382398 B CN113382398 B CN 113382398B
Authority
CN
China
Prior art keywords
firmware
private key
encrypted
ear terminal
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110556435.4A
Other languages
Chinese (zh)
Other versions
CN113382398A (en
Inventor
王能久
张春光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jingxun Technology Co ltd
Original Assignee
Shenzhen Jingxun Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jingxun Technology Co ltd filed Critical Shenzhen Jingxun Technology Co ltd
Priority to CN202110556435.4A priority Critical patent/CN113382398B/en
Publication of CN113382398A publication Critical patent/CN113382398A/en
Application granted granted Critical
Publication of CN113382398B publication Critical patent/CN113382398B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses a Bluetooth headset firmware updating processing system, which comprises: encrypting the original firmware by using a random key to obtain encrypted firmware; performing asymmetric encryption on the random key by using a preset first public key and a preset second public key respectively to obtain first encrypted data and second encrypted data; writing the encrypted firmware and the first encrypted data into a first firmware update file, and sending the first firmware update file to a left ear terminal storing a second private key; writing the encrypted firmware and the second encrypted data into a second firmware update file, and sending the second firmware update file to a right ear terminal stored with a first private key; the method comprises the steps that after a left ear terminal requests to a right ear terminal to obtain a first private key, decrypts the first public key to obtain a random key, the first private key is deleted; the right ear terminal requests to the left ear terminal to acquire a second private key, decrypts the second public key to acquire a random key, and deletes the second private key; and the left ear terminal and the right ear terminal respectively adopt the random key to decrypt the encrypted firmware to obtain original firmware. The application can highly ensure the safety of the firmware.

Description

Server, bluetooth headset terminal and Bluetooth headset firmware updating processing system
The application relates to a method for updating and processing Bluetooth headset firmware, which belongs to the divisional application of the patent application, the application date of the original application is 2021-03-12, and the application number is CN202110270095.9.
Technical Field
The present application relates to the field of bluetooth communication technologies, and in particular, to a server, a bluetooth headset terminal, a bluetooth headset firmware update processing system, and related computer readable storage media and computer program products.
Background
Since the release of bluetooth transmission protocol 5.0, the bluetooth headset market has developed in a blowout type. In order to make the user get better experience, the existing middle-high-end Bluetooth headset can support headset firmware update so as to solve the problem encountered in the use process of the user and optimize the user experience. However, most of the existing firmware updating schemes transmit the firmware to the earphone directly through the bluetooth protocol, or only perform simple encryption and decryption processing, so that the firmware is easy to crack, and the use safety of users and the firmware version safety of manufacturers are affected.
In the prior art, the encryption and decryption processing scheme for the firmware update of the Bluetooth headset adopts a fixed key to encrypt the firmware at a server side, and the Bluetooth headset terminal adopts a fixed key to decrypt, so that the security is not high; or a complex secret key management method is needed, so that maintenance of products is not facilitated; and the left ear terminal and the right ear terminal are not distinguished, if one of the left and right terminals of the Bluetooth headset is in a lost state, firmware is still updated, or the lost single-side terminal is obtained by a careful person, the internal data of the terminal is very easy to obtain, and the version safety of the firmware and the use safety of a user are seriously influenced.
Disclosure of Invention
The embodiment of the application provides a Bluetooth headset firmware updating processing method, which can highly ensure the use safety of a user, the firmware version safety and the later maintenance cost of the Bluetooth headset in the firmware updating process and under the condition that a single-side terminal is lost.
In order to solve the above technical problems, an embodiment of the present application provides a method for updating and processing firmware of a bluetooth headset, including:
the server encrypts the original firmware by using the random key to obtain encrypted firmware;
performing asymmetric encryption on the random key by using a preset first public key and a preset second public key respectively to obtain first encrypted data and second encrypted data;
writing the encrypted firmware and the first encrypted data into a first firmware update file, and sending the first firmware update file to a left ear terminal storing a second private key corresponding to the second public key; writing the encrypted firmware and the second encrypted data into a second firmware update file, and sending the second firmware update file to a right ear terminal storing a first private key corresponding to the first public key;
the left ear terminal requests to the right ear terminal to obtain a first private key, and after decrypting the first encrypted data by adopting the first private key to obtain the random key, the first private key is deleted;
the right ear terminal requests to the left ear terminal to obtain a second private key, and after decrypting the second encrypted data by adopting the second private key to obtain the random key, the second private key is deleted;
and the left ear terminal and the right ear terminal respectively adopt the random key to decrypt the encrypted firmware to obtain original firmware.
By adopting the technical scheme, the first private key is written into the right ear terminal in advance, the second private key is written into the left ear terminal in advance, and the required private key is obtained through interaction of the left and right terminals in the firmware updating process, so that firmware updating can be prevented from being carried out in a state that the single-side terminal is lost, the firmware version safety is ensured in the firmware updating process, the fact that after any single-side terminal is lost, even if the single-side terminal is obtained by a person with heart, the private key information of the person cannot be obtained, the internal data of the person cannot be stolen, and the safety and reliability are very high.
The fixed private key is used as verification information of the left and right terminals in the firmware updating process and is used as decryption data of the encrypted file, so that the encryption and decryption processing program is greatly simplified while the high reliability is ensured, the firmware upgrading efficiency is effectively improved, and the product maintenance is facilitated.
In some possible embodiments, the requesting, by the left ear terminal, to the right ear terminal to obtain the first private key specifically includes:
the method comprises the steps that a left ear terminal sends a first private key obtaining request to a right ear terminal, wherein the request comprises all characters for obtaining a first private key or part of characters missing by the left ear terminal;
the right ear terminal sends all characters of the first private key or part of characters missing by the left ear terminal to the left ear terminal;
if the left ear terminal receives the missing part of the character, combining the missing part of the character with the reserved character to form a complete first private key;
the deleting the first private key includes: deleting all or part of characters of the first private key;
the right ear terminal requests to the left ear terminal to obtain the second private key specifically comprises:
the right ear terminal sends a request for obtaining a second private key to the left ear terminal, wherein the request comprises all characters for obtaining the second private key or part of characters missing by the right ear terminal;
the left ear terminal sends all characters of the second private key or part of characters missing by the right ear terminal to the right ear terminal;
if the right ear terminal receives the missing part of the characters, combining the missing part of the characters with the reserved characters to form a complete second private key;
said deleting the second private key comprises: all or part of the characters of the second private key are deleted.
In some possible implementations, in the case of deleting a portion of the characters, the number of characters deleted at a time is not less than two-thirds of the total characters.
In some possible embodiments, in the case of deleting a part of the characters, the number of characters deleted each time and the character position are randomly selected.
In some possible embodiments, the writing the encrypted firmware and the first encrypted data into the first firmware update file specifically includes:
performing digital signature on the first encrypted data to obtain a first encrypted signature certificate, and writing the encrypted firmware and the first encrypted signature certificate into the first firmware update file;
after the left ear terminal receives the first firmware update file, the method further comprises:
verifying the first encryption signature certificate to obtain the first encryption data;
the writing the encrypted firmware and the second encrypted data into the second firmware update file specifically includes:
after the second encrypted data is digitally signed to obtain a second encrypted signature certificate, writing the encrypted firmware and the second encrypted signature certificate into the second firmware update file respectively;
after the right ear terminal receives the second firmware update file, the method further comprises:
and verifying the second signature certificate to obtain the second encrypted data.
In some possible implementations, writing the encrypted firmware and the first encrypted data to the first firmware update file and/or writing the encrypted firmware and the second encrypted data to the second firmware update file further includes:
carrying out digital signature on the original firmware to obtain an original signature certificate, and writing the original signature certificate into the first encrypted data and/or the second encrypted data;
after the left ear terminal receives the first firmware update file and/or the right ear terminal receives the second firmware update file, the method further comprises the following steps:
and verifying the original signature certificate.
In some possible implementations, writing the encrypted firmware and the first encrypted data to the first firmware update file and/or writing the encrypted firmware and the second encrypted data to the second firmware update file further includes:
performing verification calculation on the original firmware to obtain verification data, and writing the verification data into the first encrypted data and/or the second encrypted data;
after the left ear terminal receives the first firmware update file and/or the right ear terminal receives the second firmware update file, the method further comprises the following steps:
and verifying the original firmware by using the verification data.
In some possible embodiments, the first encrypted data and/or the second encrypted data further holds firmware version information.
In some possible embodiments, the check data is a file length.
In some possible embodiments, the first public key and the first private key are a first public key private key pair pre-generated by the server using an RSA algorithm, and the second public key and the second private key are a second public key private key pair pre-generated by the server using the RSA algorithm.
The application has the beneficial effects that:
according to the embodiment of the application, the original firmware file is dynamically and symmetrically encrypted by using the random key, and the left ear terminal and the right ear terminal are respectively subjected to interactive and asymmetric encryption processing by using the asymmetric encryption algorithm, so that the safety of a user and a firmware version in the process of updating the Bluetooth mobile phone firmware is highly ensured, and the later maintenance cost of a product is reduced.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, a brief description will be given below of the drawings required for the embodiments or the prior art descriptions, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of a bluetooth mobile phone firmware update processing method according to an embodiment of the present application.
Fig. 2 is a schematic diagram of a first firmware update file/a second firmware update file structure of a bluetooth mobile phone firmware update processing method according to an embodiment of the present application.
Fig. 3 is a schematic structural diagram of a bluetooth mobile phone firmware update processing system according to an embodiment of the present application.
Fig. 4 is a schematic structural diagram of a server according to an embodiment of the present application.
Fig. 5 is a schematic structural diagram of a left ear terminal/right ear terminal of a bluetooth headset according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail by means of implementation modes with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Fig. 1 is a flow chart of a processing method for updating firmware of a bluetooth headset, which is provided in an embodiment of the present application, and the method can be applied to updating firmware of a left ear terminal and a right ear terminal of the bluetooth headset, respectively, as shown in fig. 1, and the embodiment of the present application mainly includes the following steps:
s101, a server encrypts original firmware by using a random key to obtain encrypted firmware;
s102, asymmetrically encrypting the random key by using a preset first public key and a preset second public key respectively to obtain first encrypted data and second encrypted data;
s103, writing the encrypted firmware and the first encrypted data into a first firmware update file, and sending the first firmware update file to a left ear terminal storing a second private key corresponding to the second public key; writing the encrypted firmware and the second encrypted data into a second firmware update file, and sending the second firmware update file to a right ear terminal storing a first private key corresponding to the first public key;
s104, the left ear terminal requests to the right ear terminal to obtain a first private key, and after the first private key is adopted to decrypt the first encrypted data to obtain the random key, the first private key is deleted;
s105, the right ear terminal requests to the left ear terminal to obtain a second private key, and after the second private key is adopted to decrypt the second encrypted data to obtain the random key, the second private key is deleted;
s106, the left ear terminal and the right ear terminal respectively adopt the random key to decrypt the encrypted firmware to obtain original firmware.
And updating the original firmware file to the Bluetooth headset starting partition to finish firmware updating.
It should be understood that there is no strict execution sequence between the step S104 and the step S105, and no matter whether the step S104 and the step S105 are executed simultaneously, the step S105 is executed prior to the step S104, or the step S105 is executed after the step S104, and the execution sequence of the left ear terminal and the right ear terminal does not affect implementation of the solution of the embodiment of the present application.
In some possible embodiments, the requesting, by the left ear terminal, to the right ear terminal to obtain the first private key specifically includes:
the method comprises the steps that a left ear terminal sends a first private key obtaining request to a right ear terminal, wherein the request comprises all characters for obtaining a first private key or part of characters missing by the left ear terminal;
the right ear terminal sends all characters of the first private key or part of characters missing by the left ear terminal to the left ear terminal;
if the left ear terminal receives the missing part of the character, combining the missing part of the character with the reserved character to form a complete first private key;
the deleting the first private key includes: deleting all or part of characters of the first private key;
the right ear terminal requests to the left ear terminal to obtain the second private key specifically comprises:
the right ear terminal sends a request for obtaining a second private key to the left ear terminal, wherein the request comprises all characters for obtaining the second private key or part of characters missing by the right ear terminal;
the left ear terminal sends all characters of the second private key or part of characters missing by the right ear terminal to the right ear terminal;
if the right ear terminal receives the missing part of the characters, combining the missing part of the characters with the reserved characters to form a complete second private key;
said deleting the second private key comprises: all or part of the characters of the second private key are deleted.
In order to prevent the private key information of the terminal from being revealed, the left ear terminal/the right ear terminal deletes the first private key/the second private key after each decryption. In specific implementation, all characters of the first private key/the second private key may be deleted, or only part of characters of the first private key/the second private key may be deleted.
In some possible implementations, in the case of deleting a portion of the characters, the number of characters deleted at a time is not less than two-thirds of the total characters.
In some possible embodiments, in the case of deleting a part of the characters, the number of characters deleted each time and the character position are randomly selected.
In some possible embodiments, the writing the encrypted firmware and the first encrypted data into the first firmware update file specifically includes:
performing digital signature on the first encrypted data to obtain a first encrypted signature certificate, and writing the encrypted firmware and the first encrypted signature certificate into the first firmware update file;
after the left ear terminal receives the first firmware update file, the method further comprises:
verifying the first encryption signature certificate to obtain the first encryption data;
the writing the encrypted firmware and the second encrypted data into the second firmware update file specifically includes:
after the second encrypted data is digitally signed to obtain a second encrypted signature certificate, writing the encrypted firmware and the second encrypted signature certificate into the second firmware update file respectively;
after the right ear terminal receives the second firmware update file, the method further comprises:
and verifying the second signature certificate to obtain the second encrypted data.
In some possible implementations, writing the encrypted firmware and the first encrypted data to the first firmware update file and/or writing the encrypted firmware and the second encrypted data to the second firmware update file further includes:
carrying out digital signature on the original firmware to obtain an original signature certificate, and writing the original signature certificate into the first encrypted data and/or the second encrypted data;
after the left ear terminal receives the first firmware update file and/or the right ear terminal receives the second firmware update file, the method further comprises the following steps:
and verifying the original signature certificate.
In some possible implementations, writing the encrypted firmware and the first encrypted data to the first firmware update file and/or writing the encrypted firmware and the second encrypted data to the second firmware update file further includes:
performing verification calculation on the original firmware to obtain verification data, and writing the verification data into the first encrypted data and/or the second encrypted data;
after the left ear terminal receives the first firmware update file and/or the right ear terminal receives the second firmware update file, the method further comprises the following steps:
and verifying the original firmware by using the verification data.
In some possible embodiments, the first encrypted data and/or the second encrypted data further holds firmware version information.
In some possible embodiments, the check data is a file length.
In some possible embodiments, the first public key and the first private key are a first public key private key pair pre-generated by the server using an RSA algorithm, and the second public key and the second private key are a second public key private key pair pre-generated by the server using the RSA algorithm.
In some possible implementations, the original firmware file is encrypted using the AES256 GCM encryption algorithm.
In some possible implementations, the digital signature is processed using the RSA PSS algorithm.
In some possible implementations, the verification computation is done using a hash algorithm.
In some possible implementations, the firmware update file is sent and received based on the bluetooth 5.0 communication transport protocol.
According to the embodiment of the application, the first private key is pre-written into the right ear terminal and the second private key is pre-written into the left ear terminal, and the required private key is obtained through interaction between the left and right terminals in the firmware updating process, so that firmware updating can be prevented from being carried out in a state that one-side terminals are lost, the firmware version safety is ensured in the firmware updating process, the private key information of any one-side terminal can not be obtained even if any one-side terminal is lost, the internal data of the terminal can not be stolen, and the safety and reliability are very high.
The fixed private key is used as verification information of the left and right terminals in the firmware updating process and is used as decryption data of the encrypted file, so that the encryption and decryption processing program is greatly simplified while the high reliability is ensured, the firmware upgrading efficiency is effectively improved, and the product maintenance is facilitated.
In a specific implementation process, the scheme related to the embodiment of the application consists of two parts, namely a server encryption scheme and a decryption scheme of a Bluetooth headset terminal (comprising a left ear terminal and a right ear terminal). Before the implementation of the server-side encryption scheme, the following steps are preset:
the server generates two pairs of RSA keys using an RSA algorithm tool: public keys RSA_PubKey1, RSA_PubKey2 and private keys RSA_PriKey1, RSA_PriKey2. RSA_PubKey1 and RSA_PubKey2 are stored in a server side, RSA_Prikey1 is stored in a right ear terminal of the Bluetooth headset, and RSA_Prikey2 is stored in a left ear terminal of the Bluetooth headset.
All the above settings are completed before the Bluetooth headset leaves the factory.
In the firmware updating process, the implementation steps of the server-side encryption scheme are as follows:
generating a key by using a random number generator;
respectively adopting RSA_PubKey1 and RSA_PubKey2 as public keys of an asymmetric encryption RSA encryption algorithm, encrypting the key, and generating encrypted keys sign_ke1 and sign_ke2;
carrying out digital signature on the original firmware image generated by compiling by using an RSA PSS algorithm to generate a signature certificate SignA;
calculating the file Length of the image;
counting the Version of the firmware processed at this time;
integrating and storing sign_ke1 and SignA, length, version in a file header 1; integrating and storing sign_ke2 and SignA, length, version in a file header 2;
the image is encrypted by using an AES256-GCM algorithm and using a key as a key, and encrypted encryption firmware sign_image is generated.
Carrying out digital signature on the file header1 by using an RSA PSS algorithm to generate a signature certificate SignB1; and digitally signing the file header2 by using an RSA PSS algorithm to generate a signature certificate SignB2.
Combining the header1, the SignB1 and the sign_image into a complete first firmware update file, and sending the complete first firmware update file to a Bluetooth headset left ear terminal; and combining the header2, the SignB2 and the sign_image into a complete second firmware update file, and sending the complete second firmware update file to the right-ear terminal of the Bluetooth headset.
Referring to fig. 2, fig. 2 shows a main structure of the first firmware update file/the second firmware update file.
After the left ear terminal and the right ear terminal respectively receive the first firmware updating file and the second firmware updating file, the left ear terminal obtains RSA_Prikey1 from the right ear terminal, the right ear terminal obtains RSA_Prikey2 from the left ear terminal, the corresponding firmware is decrypted through reverse operation, and after verification, the firmware is updated to the earphone starting partition to finish updating.
Based on the above embodiments, please refer to fig. 3, the embodiment of the present application further provides a bluetooth headset firmware update processing system, configured to encrypt a firmware update process of a bluetooth headset to ensure security of the firmware update process and convenience of post maintenance, where the bluetooth headset firmware update processing system 100 includes:
the processing unit 101 is configured to execute the method described in any embodiment of the foregoing bluetooth headset firmware update processing method, which is not described in detail;
the bluetooth communication transmission unit 102 is configured to transmit the first firmware update file/the second firmware update file from the server to the left ear terminal/the right ear terminal of the bluetooth headset based on a bluetooth transmission protocol.
Based on the above embodiments, please refer to fig. 4, the embodiment of the present application further provides a server, where the server 200 includes: a processor 201 and a memory 202.
The memory 202 is for storing a program;
the processor 201 is configured to invoke a program stored in the memory 202, and implement actions performed by any processing unit 201 in fig. 3, so as to implement encryption processing for firmware update of the bluetooth headset. It should be noted that, in practical applications, the server may include one or more processors, and the structure and location of the server 200 are not limited to the embodiments of the present application.
Based on the above embodiments, please refer to fig. 5, the embodiment of the present application further provides a left ear terminal/right ear terminal of a bluetooth headset, where the left ear terminal/right ear terminal 300 of the bluetooth headset includes: a processor 301 and a memory 302.
The memory 302 is used for storing programs;
the processor 301 is configured to invoke a program stored in the memory 302, and implement actions performed by any processing unit 201 in fig. 3, so as to implement decryption and update processing on the bluetooth headset firmware.
Embodiments of the present application also provide a computer readable storage medium storing computer program code which, when run on a computer, causes the computer to perform the method of any one of the possible implementations of the embodiments described above.
Embodiments of the present application also provide a computer program product comprising: computer program code which, when run on a computer, causes the computer to perform a method as any one of the possible implementations of the first or second aspects.
Embodiments of the present application also provide a computer program which, when run on a computer, causes the computer to perform the method of any one of the possible implementations of any one of the previous embodiments.
Those skilled in the art will appreciate that in one or more of the examples described above, the functions described in the embodiments of the present application may be implemented in hardware, software, firmware, or any combination thereof. When implemented in software, these functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
Note that the above is only a preferred embodiment of the present application and the technical principle applied. It will be understood by those skilled in the art that the present application is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the application. Therefore, while the application has been described in connection with the above embodiments, the application is not limited to the embodiments, but may be embodied in many other equivalent forms without departing from the spirit or scope of the application, which is set forth in the following claims.

Claims (9)

1. A server for firmware update processing of a bluetooth headset, the server comprising a memory and a processor, the processor being configured to perform the steps of:
encrypting the original firmware by using a random key to obtain encrypted firmware;
performing asymmetric encryption on the random key by using a preset first public key and a preset second public key respectively to obtain first encrypted data and second encrypted data;
writing the encrypted firmware and the first encrypted data into a first firmware update file, and sending the first firmware update file to a left ear terminal storing a second private key corresponding to the second public key; writing the encrypted firmware and the second encrypted data into a second firmware update file, and sending the second firmware update file to a right ear terminal storing a first private key corresponding to the first public key;
the second private key stored in the left ear terminal is used for decrypting second encrypted data sent to the right ear terminal and encrypted by using a second public key; the first private key stored in the right ear terminal is used for decrypting first encrypted data sent to the left ear terminal and encrypted by using the first public key.
2. The server of claim 1, wherein writing the encrypted firmware and the first encrypted data to the first firmware update file specifically comprises:
performing digital signature on the first encrypted data to obtain a first encrypted signature certificate, and writing the encrypted firmware and the first encrypted signature certificate into the first firmware update file;
the writing the encrypted firmware and the second encrypted data into the second firmware update file specifically includes:
and carrying out digital signature on the second encrypted data to obtain a second encrypted signature certificate, and respectively writing the encrypted firmware and the second encrypted signature certificate into the second firmware update file.
3. The server of claim 2, wherein writing the encrypted firmware and first encrypted data to a first firmware update file and/or writing the encrypted firmware and second encrypted data to a second firmware update file further comprises:
carrying out digital signature on the original firmware to obtain an original signature certificate, and writing the original signature certificate into the first encrypted data and/or the second encrypted data; and/or
Writing the encrypted firmware and the first encrypted data to a first firmware update file and/or writing the encrypted firmware and the second encrypted data to a second firmware update file further comprises:
and performing verification calculation on the original firmware to obtain verification data, and writing the verification data into the first encrypted data and/or the second encrypted data.
4. The Bluetooth headset terminal comprises a left ear terminal and a right ear terminal, and is characterized in that the left ear terminal comprises a memory and a processor, the memory is used for storing a second private key corresponding to a second public key, and the processor is used for executing the following steps:
receiving a first firmware update file sent by the server according to any one of claims 1-3, requesting to obtain a first private key from the right ear terminal, decrypting the first encrypted data by using the first private key to obtain the random key, and deleting the first private key;
the right ear terminal comprises a memory and a processor, wherein the memory is used for storing a first private key corresponding to a first public key, and the processor is used for executing the following steps:
receiving a second firmware update file and a first private key sent by the server according to any one of claims 1-3, requesting to obtain a second private key from the left ear terminal, and deleting the second private key after decrypting the second encrypted data by using the second private key to obtain the random key;
the left ear terminal and the right ear terminal are further configured to perform the steps of: decrypting the encrypted firmware by adopting the random key to obtain original firmware;
the second private key stored in the left ear terminal is used for decrypting second encrypted data sent to the right ear terminal and encrypted by using a second public key; the first private key stored in the right ear terminal is used for decrypting first encrypted data sent to the left ear terminal and encrypted by using the first public key.
5. The bluetooth headset terminal according to claim 4, wherein the requesting of the right ear terminal to obtain the first private key by the left ear terminal specifically comprises:
the left ear terminal sends a first private key obtaining request to the right ear terminal, wherein the first private key obtaining request comprises all characters of the first private key or part of characters missing by the left ear terminal;
the right ear terminal sends all characters of the first private key or part of characters missing by the left ear terminal to the left ear terminal;
if the left ear terminal receives the missing part of the character, combining the missing part of the character with the reserved character to form a complete first private key;
the deleting the first private key includes: deleting all or part of characters of the first private key;
the right ear terminal requests to the left ear terminal to obtain the second private key specifically comprises:
the right ear terminal sends a request for obtaining a second private key to the left ear terminal, wherein the request comprises all characters for obtaining the second private key or part of characters missing by the right ear terminal;
the left ear terminal sends all characters of the second private key or part of characters missing by the right ear terminal to the right ear terminal;
if the right ear terminal receives the missing part of the characters, combining the missing part of the characters with the reserved characters to form a complete second private key;
said deleting the second private key comprises: all or part of the characters of the second private key are deleted.
6. The bluetooth headset terminal according to claim 5, wherein in the case of deleting a part of the characters, the number of characters deleted at a time is not less than two thirds of the total characters.
7. The bluetooth headset terminal as claimed in claim 5, wherein in the case of deleting a part of the character, the number of characters deleted each time and the character position are randomly selected.
8. A bluetooth headset firmware update processing system, characterized by comprising the server of any one of claims 1-3, and the bluetooth headset terminal of any one of claims 4-7.
9. A computer readable storage medium, characterized in that the computer readable storage medium stores computer program code which, when run on a computer, causes the computer to perform the steps in the server of any one of claims 1-3 and the steps in the bluetooth headset terminal of any one of claims 4-7.
CN202110556435.4A 2021-03-12 2021-03-12 Server, bluetooth headset terminal and Bluetooth headset firmware updating processing system Active CN113382398B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110556435.4A CN113382398B (en) 2021-03-12 2021-03-12 Server, bluetooth headset terminal and Bluetooth headset firmware updating processing system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110556435.4A CN113382398B (en) 2021-03-12 2021-03-12 Server, bluetooth headset terminal and Bluetooth headset firmware updating processing system
CN202110270095.9A CN112689276B (en) 2021-03-12 2021-03-12 Bluetooth headset firmware updating processing method

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN202110270095.9A Division CN112689276B (en) 2021-03-12 2021-03-12 Bluetooth headset firmware updating processing method

Publications (2)

Publication Number Publication Date
CN113382398A CN113382398A (en) 2021-09-10
CN113382398B true CN113382398B (en) 2023-09-12

Family

ID=75455537

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202110270095.9A Active CN112689276B (en) 2021-03-12 2021-03-12 Bluetooth headset firmware updating processing method
CN202110556435.4A Active CN113382398B (en) 2021-03-12 2021-03-12 Server, bluetooth headset terminal and Bluetooth headset firmware updating processing system

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202110270095.9A Active CN112689276B (en) 2021-03-12 2021-03-12 Bluetooth headset firmware updating processing method

Country Status (1)

Country Link
CN (2) CN112689276B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1422035A (en) * 2001-11-28 2003-06-04 Yun制造厂株式会社 Cipher key exchange equipment, method, program and recording medium for recording the same program
CN1601431A (en) * 1999-03-03 2005-03-30 索尼公司 Data processing device, data processing method, terminal, transmission method for data processing device
EP2784668A1 (en) * 2013-03-26 2014-10-01 GN Netcom A/S Headset firmware update from headset base unit
CN108874421A (en) * 2018-06-15 2018-11-23 歌尔科技有限公司 A kind of TWS earphone and its upgrade method, device, storage medium
CN112346759A (en) * 2020-10-14 2021-02-09 深圳市共进电子股份有限公司 Firmware upgrading method and device and computer readable storage medium

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7509121B2 (en) * 2005-04-18 2009-03-24 Terax Communication Technologies Inc. Method of updating firmware using object push profile in the bluetooth object exchange protocol
CN102843677A (en) * 2012-08-14 2012-12-26 福建伊时代信息科技股份有限公司 Voice communication method, device and system
CN106227503A (en) * 2016-07-29 2016-12-14 苏州国芯科技有限公司 Safety chip COS firmware update, service end, terminal and system
CN109698745A (en) * 2018-12-25 2019-04-30 歌尔科技有限公司 A kind of key management method, system and earphone and storage medium
CN110659046B (en) * 2019-09-12 2023-09-01 深圳市沃奈斯实业发展有限公司 Firmware upgrading method, terminal, charging box, earphone and storage medium
CN111698794B (en) * 2020-06-24 2021-12-07 杭州国芯科技股份有限公司 Wireless audio sharing method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1601431A (en) * 1999-03-03 2005-03-30 索尼公司 Data processing device, data processing method, terminal, transmission method for data processing device
CN1422035A (en) * 2001-11-28 2003-06-04 Yun制造厂株式会社 Cipher key exchange equipment, method, program and recording medium for recording the same program
EP2784668A1 (en) * 2013-03-26 2014-10-01 GN Netcom A/S Headset firmware update from headset base unit
CN108874421A (en) * 2018-06-15 2018-11-23 歌尔科技有限公司 A kind of TWS earphone and its upgrade method, device, storage medium
CN112346759A (en) * 2020-10-14 2021-02-09 深圳市共进电子股份有限公司 Firmware upgrading method and device and computer readable storage medium

Also Published As

Publication number Publication date
CN112689276B (en) 2021-06-04
CN112689276A (en) 2021-04-20
CN113382398A (en) 2021-09-10

Similar Documents

Publication Publication Date Title
US10785019B2 (en) Data transmission method and apparatus
US10554392B2 (en) Cryptographic key distribution
CN108241517B (en) Software upgrading method, client and electronic equipment
US8806206B2 (en) Cooperation method and system of hardware secure units, and application device
CN108199847B (en) Digital security processing method, computer device, and storage medium
CN110661748B (en) Log encryption method, log decryption method and log encryption device
CN111935712A (en) Data transmission method, system and medium based on NB-IoT communication
CN111294203B (en) Information transmission method
US10630466B1 (en) Apparatus and method for exchanging cryptographic information with reduced overhead and latency
CN114900304B (en) Digital signature method and apparatus, electronic device, and computer-readable storage medium
CN110690969B (en) Method and system for achieving bidirectional SSL/TLS authentication through multiparty cooperation
CN114048438A (en) Equipment authentication method and device, equipment, medium and product thereof
WO2023051337A1 (en) Data processing method and apparatus, and device and storage medium
CN113992702B (en) Ceph distributed file system storage state password reinforcement method and system
CN111241492A (en) Product multi-tenant secure credit granting method, system and electronic equipment
CN114513345A (en) Information transmission system, user device and information security hardware module
CN114037447A (en) Method and device for off-line transaction
CN107276961B (en) Method and device for encrypting and decrypting data based on cryptographic algorithm
CN112187767A (en) Multi-party contract consensus system, method and medium based on block chain
CN117041956A (en) Communication authentication method, device, computer equipment and storage medium
WO2023116266A1 (en) Communication encryption method, system, and device
CN113382398B (en) Server, bluetooth headset terminal and Bluetooth headset firmware updating processing system
CN116455561A (en) Embedded TLS protocol for lightweight devices
KR101256114B1 (en) Message authentication code test method and system of many mac testserver
CN116318654A (en) SM2 algorithm collaborative signature system, method and equipment integrating quantum key distribution

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant