CN113382398B - Server, bluetooth headset terminal and Bluetooth headset firmware updating processing system - Google Patents
Server, bluetooth headset terminal and Bluetooth headset firmware updating processing system Download PDFInfo
- Publication number
- CN113382398B CN113382398B CN202110556435.4A CN202110556435A CN113382398B CN 113382398 B CN113382398 B CN 113382398B CN 202110556435 A CN202110556435 A CN 202110556435A CN 113382398 B CN113382398 B CN 113382398B
- Authority
- CN
- China
- Prior art keywords
- firmware
- private key
- encrypted
- ear terminal
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The application discloses a Bluetooth headset firmware updating processing system, which comprises: encrypting the original firmware by using a random key to obtain encrypted firmware; performing asymmetric encryption on the random key by using a preset first public key and a preset second public key respectively to obtain first encrypted data and second encrypted data; writing the encrypted firmware and the first encrypted data into a first firmware update file, and sending the first firmware update file to a left ear terminal storing a second private key; writing the encrypted firmware and the second encrypted data into a second firmware update file, and sending the second firmware update file to a right ear terminal stored with a first private key; the method comprises the steps that after a left ear terminal requests to a right ear terminal to obtain a first private key, decrypts the first public key to obtain a random key, the first private key is deleted; the right ear terminal requests to the left ear terminal to acquire a second private key, decrypts the second public key to acquire a random key, and deletes the second private key; and the left ear terminal and the right ear terminal respectively adopt the random key to decrypt the encrypted firmware to obtain original firmware. The application can highly ensure the safety of the firmware.
Description
The application relates to a method for updating and processing Bluetooth headset firmware, which belongs to the divisional application of the patent application, the application date of the original application is 2021-03-12, and the application number is CN202110270095.9.
Technical Field
The present application relates to the field of bluetooth communication technologies, and in particular, to a server, a bluetooth headset terminal, a bluetooth headset firmware update processing system, and related computer readable storage media and computer program products.
Background
Since the release of bluetooth transmission protocol 5.0, the bluetooth headset market has developed in a blowout type. In order to make the user get better experience, the existing middle-high-end Bluetooth headset can support headset firmware update so as to solve the problem encountered in the use process of the user and optimize the user experience. However, most of the existing firmware updating schemes transmit the firmware to the earphone directly through the bluetooth protocol, or only perform simple encryption and decryption processing, so that the firmware is easy to crack, and the use safety of users and the firmware version safety of manufacturers are affected.
In the prior art, the encryption and decryption processing scheme for the firmware update of the Bluetooth headset adopts a fixed key to encrypt the firmware at a server side, and the Bluetooth headset terminal adopts a fixed key to decrypt, so that the security is not high; or a complex secret key management method is needed, so that maintenance of products is not facilitated; and the left ear terminal and the right ear terminal are not distinguished, if one of the left and right terminals of the Bluetooth headset is in a lost state, firmware is still updated, or the lost single-side terminal is obtained by a careful person, the internal data of the terminal is very easy to obtain, and the version safety of the firmware and the use safety of a user are seriously influenced.
Disclosure of Invention
The embodiment of the application provides a Bluetooth headset firmware updating processing method, which can highly ensure the use safety of a user, the firmware version safety and the later maintenance cost of the Bluetooth headset in the firmware updating process and under the condition that a single-side terminal is lost.
In order to solve the above technical problems, an embodiment of the present application provides a method for updating and processing firmware of a bluetooth headset, including:
the server encrypts the original firmware by using the random key to obtain encrypted firmware;
performing asymmetric encryption on the random key by using a preset first public key and a preset second public key respectively to obtain first encrypted data and second encrypted data;
writing the encrypted firmware and the first encrypted data into a first firmware update file, and sending the first firmware update file to a left ear terminal storing a second private key corresponding to the second public key; writing the encrypted firmware and the second encrypted data into a second firmware update file, and sending the second firmware update file to a right ear terminal storing a first private key corresponding to the first public key;
the left ear terminal requests to the right ear terminal to obtain a first private key, and after decrypting the first encrypted data by adopting the first private key to obtain the random key, the first private key is deleted;
the right ear terminal requests to the left ear terminal to obtain a second private key, and after decrypting the second encrypted data by adopting the second private key to obtain the random key, the second private key is deleted;
and the left ear terminal and the right ear terminal respectively adopt the random key to decrypt the encrypted firmware to obtain original firmware.
By adopting the technical scheme, the first private key is written into the right ear terminal in advance, the second private key is written into the left ear terminal in advance, and the required private key is obtained through interaction of the left and right terminals in the firmware updating process, so that firmware updating can be prevented from being carried out in a state that the single-side terminal is lost, the firmware version safety is ensured in the firmware updating process, the fact that after any single-side terminal is lost, even if the single-side terminal is obtained by a person with heart, the private key information of the person cannot be obtained, the internal data of the person cannot be stolen, and the safety and reliability are very high.
The fixed private key is used as verification information of the left and right terminals in the firmware updating process and is used as decryption data of the encrypted file, so that the encryption and decryption processing program is greatly simplified while the high reliability is ensured, the firmware upgrading efficiency is effectively improved, and the product maintenance is facilitated.
In some possible embodiments, the requesting, by the left ear terminal, to the right ear terminal to obtain the first private key specifically includes:
the method comprises the steps that a left ear terminal sends a first private key obtaining request to a right ear terminal, wherein the request comprises all characters for obtaining a first private key or part of characters missing by the left ear terminal;
the right ear terminal sends all characters of the first private key or part of characters missing by the left ear terminal to the left ear terminal;
if the left ear terminal receives the missing part of the character, combining the missing part of the character with the reserved character to form a complete first private key;
the deleting the first private key includes: deleting all or part of characters of the first private key;
the right ear terminal requests to the left ear terminal to obtain the second private key specifically comprises:
the right ear terminal sends a request for obtaining a second private key to the left ear terminal, wherein the request comprises all characters for obtaining the second private key or part of characters missing by the right ear terminal;
the left ear terminal sends all characters of the second private key or part of characters missing by the right ear terminal to the right ear terminal;
if the right ear terminal receives the missing part of the characters, combining the missing part of the characters with the reserved characters to form a complete second private key;
said deleting the second private key comprises: all or part of the characters of the second private key are deleted.
In some possible implementations, in the case of deleting a portion of the characters, the number of characters deleted at a time is not less than two-thirds of the total characters.
In some possible embodiments, in the case of deleting a part of the characters, the number of characters deleted each time and the character position are randomly selected.
In some possible embodiments, the writing the encrypted firmware and the first encrypted data into the first firmware update file specifically includes:
performing digital signature on the first encrypted data to obtain a first encrypted signature certificate, and writing the encrypted firmware and the first encrypted signature certificate into the first firmware update file;
after the left ear terminal receives the first firmware update file, the method further comprises:
verifying the first encryption signature certificate to obtain the first encryption data;
the writing the encrypted firmware and the second encrypted data into the second firmware update file specifically includes:
after the second encrypted data is digitally signed to obtain a second encrypted signature certificate, writing the encrypted firmware and the second encrypted signature certificate into the second firmware update file respectively;
after the right ear terminal receives the second firmware update file, the method further comprises:
and verifying the second signature certificate to obtain the second encrypted data.
In some possible implementations, writing the encrypted firmware and the first encrypted data to the first firmware update file and/or writing the encrypted firmware and the second encrypted data to the second firmware update file further includes:
carrying out digital signature on the original firmware to obtain an original signature certificate, and writing the original signature certificate into the first encrypted data and/or the second encrypted data;
after the left ear terminal receives the first firmware update file and/or the right ear terminal receives the second firmware update file, the method further comprises the following steps:
and verifying the original signature certificate.
In some possible implementations, writing the encrypted firmware and the first encrypted data to the first firmware update file and/or writing the encrypted firmware and the second encrypted data to the second firmware update file further includes:
performing verification calculation on the original firmware to obtain verification data, and writing the verification data into the first encrypted data and/or the second encrypted data;
after the left ear terminal receives the first firmware update file and/or the right ear terminal receives the second firmware update file, the method further comprises the following steps:
and verifying the original firmware by using the verification data.
In some possible embodiments, the first encrypted data and/or the second encrypted data further holds firmware version information.
In some possible embodiments, the check data is a file length.
In some possible embodiments, the first public key and the first private key are a first public key private key pair pre-generated by the server using an RSA algorithm, and the second public key and the second private key are a second public key private key pair pre-generated by the server using the RSA algorithm.
The application has the beneficial effects that:
according to the embodiment of the application, the original firmware file is dynamically and symmetrically encrypted by using the random key, and the left ear terminal and the right ear terminal are respectively subjected to interactive and asymmetric encryption processing by using the asymmetric encryption algorithm, so that the safety of a user and a firmware version in the process of updating the Bluetooth mobile phone firmware is highly ensured, and the later maintenance cost of a product is reduced.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, a brief description will be given below of the drawings required for the embodiments or the prior art descriptions, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of a bluetooth mobile phone firmware update processing method according to an embodiment of the present application.
Fig. 2 is a schematic diagram of a first firmware update file/a second firmware update file structure of a bluetooth mobile phone firmware update processing method according to an embodiment of the present application.
Fig. 3 is a schematic structural diagram of a bluetooth mobile phone firmware update processing system according to an embodiment of the present application.
Fig. 4 is a schematic structural diagram of a server according to an embodiment of the present application.
Fig. 5 is a schematic structural diagram of a left ear terminal/right ear terminal of a bluetooth headset according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail by means of implementation modes with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Fig. 1 is a flow chart of a processing method for updating firmware of a bluetooth headset, which is provided in an embodiment of the present application, and the method can be applied to updating firmware of a left ear terminal and a right ear terminal of the bluetooth headset, respectively, as shown in fig. 1, and the embodiment of the present application mainly includes the following steps:
s101, a server encrypts original firmware by using a random key to obtain encrypted firmware;
s102, asymmetrically encrypting the random key by using a preset first public key and a preset second public key respectively to obtain first encrypted data and second encrypted data;
s103, writing the encrypted firmware and the first encrypted data into a first firmware update file, and sending the first firmware update file to a left ear terminal storing a second private key corresponding to the second public key; writing the encrypted firmware and the second encrypted data into a second firmware update file, and sending the second firmware update file to a right ear terminal storing a first private key corresponding to the first public key;
s104, the left ear terminal requests to the right ear terminal to obtain a first private key, and after the first private key is adopted to decrypt the first encrypted data to obtain the random key, the first private key is deleted;
s105, the right ear terminal requests to the left ear terminal to obtain a second private key, and after the second private key is adopted to decrypt the second encrypted data to obtain the random key, the second private key is deleted;
s106, the left ear terminal and the right ear terminal respectively adopt the random key to decrypt the encrypted firmware to obtain original firmware.
And updating the original firmware file to the Bluetooth headset starting partition to finish firmware updating.
It should be understood that there is no strict execution sequence between the step S104 and the step S105, and no matter whether the step S104 and the step S105 are executed simultaneously, the step S105 is executed prior to the step S104, or the step S105 is executed after the step S104, and the execution sequence of the left ear terminal and the right ear terminal does not affect implementation of the solution of the embodiment of the present application.
In some possible embodiments, the requesting, by the left ear terminal, to the right ear terminal to obtain the first private key specifically includes:
the method comprises the steps that a left ear terminal sends a first private key obtaining request to a right ear terminal, wherein the request comprises all characters for obtaining a first private key or part of characters missing by the left ear terminal;
the right ear terminal sends all characters of the first private key or part of characters missing by the left ear terminal to the left ear terminal;
if the left ear terminal receives the missing part of the character, combining the missing part of the character with the reserved character to form a complete first private key;
the deleting the first private key includes: deleting all or part of characters of the first private key;
the right ear terminal requests to the left ear terminal to obtain the second private key specifically comprises:
the right ear terminal sends a request for obtaining a second private key to the left ear terminal, wherein the request comprises all characters for obtaining the second private key or part of characters missing by the right ear terminal;
the left ear terminal sends all characters of the second private key or part of characters missing by the right ear terminal to the right ear terminal;
if the right ear terminal receives the missing part of the characters, combining the missing part of the characters with the reserved characters to form a complete second private key;
said deleting the second private key comprises: all or part of the characters of the second private key are deleted.
In order to prevent the private key information of the terminal from being revealed, the left ear terminal/the right ear terminal deletes the first private key/the second private key after each decryption. In specific implementation, all characters of the first private key/the second private key may be deleted, or only part of characters of the first private key/the second private key may be deleted.
In some possible implementations, in the case of deleting a portion of the characters, the number of characters deleted at a time is not less than two-thirds of the total characters.
In some possible embodiments, in the case of deleting a part of the characters, the number of characters deleted each time and the character position are randomly selected.
In some possible embodiments, the writing the encrypted firmware and the first encrypted data into the first firmware update file specifically includes:
performing digital signature on the first encrypted data to obtain a first encrypted signature certificate, and writing the encrypted firmware and the first encrypted signature certificate into the first firmware update file;
after the left ear terminal receives the first firmware update file, the method further comprises:
verifying the first encryption signature certificate to obtain the first encryption data;
the writing the encrypted firmware and the second encrypted data into the second firmware update file specifically includes:
after the second encrypted data is digitally signed to obtain a second encrypted signature certificate, writing the encrypted firmware and the second encrypted signature certificate into the second firmware update file respectively;
after the right ear terminal receives the second firmware update file, the method further comprises:
and verifying the second signature certificate to obtain the second encrypted data.
In some possible implementations, writing the encrypted firmware and the first encrypted data to the first firmware update file and/or writing the encrypted firmware and the second encrypted data to the second firmware update file further includes:
carrying out digital signature on the original firmware to obtain an original signature certificate, and writing the original signature certificate into the first encrypted data and/or the second encrypted data;
after the left ear terminal receives the first firmware update file and/or the right ear terminal receives the second firmware update file, the method further comprises the following steps:
and verifying the original signature certificate.
In some possible implementations, writing the encrypted firmware and the first encrypted data to the first firmware update file and/or writing the encrypted firmware and the second encrypted data to the second firmware update file further includes:
performing verification calculation on the original firmware to obtain verification data, and writing the verification data into the first encrypted data and/or the second encrypted data;
after the left ear terminal receives the first firmware update file and/or the right ear terminal receives the second firmware update file, the method further comprises the following steps:
and verifying the original firmware by using the verification data.
In some possible embodiments, the first encrypted data and/or the second encrypted data further holds firmware version information.
In some possible embodiments, the check data is a file length.
In some possible embodiments, the first public key and the first private key are a first public key private key pair pre-generated by the server using an RSA algorithm, and the second public key and the second private key are a second public key private key pair pre-generated by the server using the RSA algorithm.
In some possible implementations, the original firmware file is encrypted using the AES256 GCM encryption algorithm.
In some possible implementations, the digital signature is processed using the RSA PSS algorithm.
In some possible implementations, the verification computation is done using a hash algorithm.
In some possible implementations, the firmware update file is sent and received based on the bluetooth 5.0 communication transport protocol.
According to the embodiment of the application, the first private key is pre-written into the right ear terminal and the second private key is pre-written into the left ear terminal, and the required private key is obtained through interaction between the left and right terminals in the firmware updating process, so that firmware updating can be prevented from being carried out in a state that one-side terminals are lost, the firmware version safety is ensured in the firmware updating process, the private key information of any one-side terminal can not be obtained even if any one-side terminal is lost, the internal data of the terminal can not be stolen, and the safety and reliability are very high.
The fixed private key is used as verification information of the left and right terminals in the firmware updating process and is used as decryption data of the encrypted file, so that the encryption and decryption processing program is greatly simplified while the high reliability is ensured, the firmware upgrading efficiency is effectively improved, and the product maintenance is facilitated.
In a specific implementation process, the scheme related to the embodiment of the application consists of two parts, namely a server encryption scheme and a decryption scheme of a Bluetooth headset terminal (comprising a left ear terminal and a right ear terminal). Before the implementation of the server-side encryption scheme, the following steps are preset:
the server generates two pairs of RSA keys using an RSA algorithm tool: public keys RSA_PubKey1, RSA_PubKey2 and private keys RSA_PriKey1, RSA_PriKey2. RSA_PubKey1 and RSA_PubKey2 are stored in a server side, RSA_Prikey1 is stored in a right ear terminal of the Bluetooth headset, and RSA_Prikey2 is stored in a left ear terminal of the Bluetooth headset.
All the above settings are completed before the Bluetooth headset leaves the factory.
In the firmware updating process, the implementation steps of the server-side encryption scheme are as follows:
generating a key by using a random number generator;
respectively adopting RSA_PubKey1 and RSA_PubKey2 as public keys of an asymmetric encryption RSA encryption algorithm, encrypting the key, and generating encrypted keys sign_ke1 and sign_ke2;
carrying out digital signature on the original firmware image generated by compiling by using an RSA PSS algorithm to generate a signature certificate SignA;
calculating the file Length of the image;
counting the Version of the firmware processed at this time;
integrating and storing sign_ke1 and SignA, length, version in a file header 1; integrating and storing sign_ke2 and SignA, length, version in a file header 2;
the image is encrypted by using an AES256-GCM algorithm and using a key as a key, and encrypted encryption firmware sign_image is generated.
Carrying out digital signature on the file header1 by using an RSA PSS algorithm to generate a signature certificate SignB1; and digitally signing the file header2 by using an RSA PSS algorithm to generate a signature certificate SignB2.
Combining the header1, the SignB1 and the sign_image into a complete first firmware update file, and sending the complete first firmware update file to a Bluetooth headset left ear terminal; and combining the header2, the SignB2 and the sign_image into a complete second firmware update file, and sending the complete second firmware update file to the right-ear terminal of the Bluetooth headset.
Referring to fig. 2, fig. 2 shows a main structure of the first firmware update file/the second firmware update file.
After the left ear terminal and the right ear terminal respectively receive the first firmware updating file and the second firmware updating file, the left ear terminal obtains RSA_Prikey1 from the right ear terminal, the right ear terminal obtains RSA_Prikey2 from the left ear terminal, the corresponding firmware is decrypted through reverse operation, and after verification, the firmware is updated to the earphone starting partition to finish updating.
Based on the above embodiments, please refer to fig. 3, the embodiment of the present application further provides a bluetooth headset firmware update processing system, configured to encrypt a firmware update process of a bluetooth headset to ensure security of the firmware update process and convenience of post maintenance, where the bluetooth headset firmware update processing system 100 includes:
the processing unit 101 is configured to execute the method described in any embodiment of the foregoing bluetooth headset firmware update processing method, which is not described in detail;
the bluetooth communication transmission unit 102 is configured to transmit the first firmware update file/the second firmware update file from the server to the left ear terminal/the right ear terminal of the bluetooth headset based on a bluetooth transmission protocol.
Based on the above embodiments, please refer to fig. 4, the embodiment of the present application further provides a server, where the server 200 includes: a processor 201 and a memory 202.
The memory 202 is for storing a program;
the processor 201 is configured to invoke a program stored in the memory 202, and implement actions performed by any processing unit 201 in fig. 3, so as to implement encryption processing for firmware update of the bluetooth headset. It should be noted that, in practical applications, the server may include one or more processors, and the structure and location of the server 200 are not limited to the embodiments of the present application.
Based on the above embodiments, please refer to fig. 5, the embodiment of the present application further provides a left ear terminal/right ear terminal of a bluetooth headset, where the left ear terminal/right ear terminal 300 of the bluetooth headset includes: a processor 301 and a memory 302.
The memory 302 is used for storing programs;
the processor 301 is configured to invoke a program stored in the memory 302, and implement actions performed by any processing unit 201 in fig. 3, so as to implement decryption and update processing on the bluetooth headset firmware.
Embodiments of the present application also provide a computer readable storage medium storing computer program code which, when run on a computer, causes the computer to perform the method of any one of the possible implementations of the embodiments described above.
Embodiments of the present application also provide a computer program product comprising: computer program code which, when run on a computer, causes the computer to perform a method as any one of the possible implementations of the first or second aspects.
Embodiments of the present application also provide a computer program which, when run on a computer, causes the computer to perform the method of any one of the possible implementations of any one of the previous embodiments.
Those skilled in the art will appreciate that in one or more of the examples described above, the functions described in the embodiments of the present application may be implemented in hardware, software, firmware, or any combination thereof. When implemented in software, these functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
Note that the above is only a preferred embodiment of the present application and the technical principle applied. It will be understood by those skilled in the art that the present application is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the application. Therefore, while the application has been described in connection with the above embodiments, the application is not limited to the embodiments, but may be embodied in many other equivalent forms without departing from the spirit or scope of the application, which is set forth in the following claims.
Claims (9)
1. A server for firmware update processing of a bluetooth headset, the server comprising a memory and a processor, the processor being configured to perform the steps of:
encrypting the original firmware by using a random key to obtain encrypted firmware;
performing asymmetric encryption on the random key by using a preset first public key and a preset second public key respectively to obtain first encrypted data and second encrypted data;
writing the encrypted firmware and the first encrypted data into a first firmware update file, and sending the first firmware update file to a left ear terminal storing a second private key corresponding to the second public key; writing the encrypted firmware and the second encrypted data into a second firmware update file, and sending the second firmware update file to a right ear terminal storing a first private key corresponding to the first public key;
the second private key stored in the left ear terminal is used for decrypting second encrypted data sent to the right ear terminal and encrypted by using a second public key; the first private key stored in the right ear terminal is used for decrypting first encrypted data sent to the left ear terminal and encrypted by using the first public key.
2. The server of claim 1, wherein writing the encrypted firmware and the first encrypted data to the first firmware update file specifically comprises:
performing digital signature on the first encrypted data to obtain a first encrypted signature certificate, and writing the encrypted firmware and the first encrypted signature certificate into the first firmware update file;
the writing the encrypted firmware and the second encrypted data into the second firmware update file specifically includes:
and carrying out digital signature on the second encrypted data to obtain a second encrypted signature certificate, and respectively writing the encrypted firmware and the second encrypted signature certificate into the second firmware update file.
3. The server of claim 2, wherein writing the encrypted firmware and first encrypted data to a first firmware update file and/or writing the encrypted firmware and second encrypted data to a second firmware update file further comprises:
carrying out digital signature on the original firmware to obtain an original signature certificate, and writing the original signature certificate into the first encrypted data and/or the second encrypted data; and/or
Writing the encrypted firmware and the first encrypted data to a first firmware update file and/or writing the encrypted firmware and the second encrypted data to a second firmware update file further comprises:
and performing verification calculation on the original firmware to obtain verification data, and writing the verification data into the first encrypted data and/or the second encrypted data.
4. The Bluetooth headset terminal comprises a left ear terminal and a right ear terminal, and is characterized in that the left ear terminal comprises a memory and a processor, the memory is used for storing a second private key corresponding to a second public key, and the processor is used for executing the following steps:
receiving a first firmware update file sent by the server according to any one of claims 1-3, requesting to obtain a first private key from the right ear terminal, decrypting the first encrypted data by using the first private key to obtain the random key, and deleting the first private key;
the right ear terminal comprises a memory and a processor, wherein the memory is used for storing a first private key corresponding to a first public key, and the processor is used for executing the following steps:
receiving a second firmware update file and a first private key sent by the server according to any one of claims 1-3, requesting to obtain a second private key from the left ear terminal, and deleting the second private key after decrypting the second encrypted data by using the second private key to obtain the random key;
the left ear terminal and the right ear terminal are further configured to perform the steps of: decrypting the encrypted firmware by adopting the random key to obtain original firmware;
the second private key stored in the left ear terminal is used for decrypting second encrypted data sent to the right ear terminal and encrypted by using a second public key; the first private key stored in the right ear terminal is used for decrypting first encrypted data sent to the left ear terminal and encrypted by using the first public key.
5. The bluetooth headset terminal according to claim 4, wherein the requesting of the right ear terminal to obtain the first private key by the left ear terminal specifically comprises:
the left ear terminal sends a first private key obtaining request to the right ear terminal, wherein the first private key obtaining request comprises all characters of the first private key or part of characters missing by the left ear terminal;
the right ear terminal sends all characters of the first private key or part of characters missing by the left ear terminal to the left ear terminal;
if the left ear terminal receives the missing part of the character, combining the missing part of the character with the reserved character to form a complete first private key;
the deleting the first private key includes: deleting all or part of characters of the first private key;
the right ear terminal requests to the left ear terminal to obtain the second private key specifically comprises:
the right ear terminal sends a request for obtaining a second private key to the left ear terminal, wherein the request comprises all characters for obtaining the second private key or part of characters missing by the right ear terminal;
the left ear terminal sends all characters of the second private key or part of characters missing by the right ear terminal to the right ear terminal;
if the right ear terminal receives the missing part of the characters, combining the missing part of the characters with the reserved characters to form a complete second private key;
said deleting the second private key comprises: all or part of the characters of the second private key are deleted.
6. The bluetooth headset terminal according to claim 5, wherein in the case of deleting a part of the characters, the number of characters deleted at a time is not less than two thirds of the total characters.
7. The bluetooth headset terminal as claimed in claim 5, wherein in the case of deleting a part of the character, the number of characters deleted each time and the character position are randomly selected.
8. A bluetooth headset firmware update processing system, characterized by comprising the server of any one of claims 1-3, and the bluetooth headset terminal of any one of claims 4-7.
9. A computer readable storage medium, characterized in that the computer readable storage medium stores computer program code which, when run on a computer, causes the computer to perform the steps in the server of any one of claims 1-3 and the steps in the bluetooth headset terminal of any one of claims 4-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110556435.4A CN113382398B (en) | 2021-03-12 | 2021-03-12 | Server, bluetooth headset terminal and Bluetooth headset firmware updating processing system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110556435.4A CN113382398B (en) | 2021-03-12 | 2021-03-12 | Server, bluetooth headset terminal and Bluetooth headset firmware updating processing system |
CN202110270095.9A CN112689276B (en) | 2021-03-12 | 2021-03-12 | Bluetooth headset firmware updating processing method |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110270095.9A Division CN112689276B (en) | 2021-03-12 | 2021-03-12 | Bluetooth headset firmware updating processing method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113382398A CN113382398A (en) | 2021-09-10 |
CN113382398B true CN113382398B (en) | 2023-09-12 |
Family
ID=75455537
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110270095.9A Active CN112689276B (en) | 2021-03-12 | 2021-03-12 | Bluetooth headset firmware updating processing method |
CN202110556435.4A Active CN113382398B (en) | 2021-03-12 | 2021-03-12 | Server, bluetooth headset terminal and Bluetooth headset firmware updating processing system |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110270095.9A Active CN112689276B (en) | 2021-03-12 | 2021-03-12 | Bluetooth headset firmware updating processing method |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN112689276B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1422035A (en) * | 2001-11-28 | 2003-06-04 | Yun制造厂株式会社 | Cipher key exchange equipment, method, program and recording medium for recording the same program |
CN1601431A (en) * | 1999-03-03 | 2005-03-30 | 索尼公司 | Data processing device, data processing method, terminal, transmission method for data processing device |
EP2784668A1 (en) * | 2013-03-26 | 2014-10-01 | GN Netcom A/S | Headset firmware update from headset base unit |
CN108874421A (en) * | 2018-06-15 | 2018-11-23 | 歌尔科技有限公司 | A kind of TWS earphone and its upgrade method, device, storage medium |
CN112346759A (en) * | 2020-10-14 | 2021-02-09 | 深圳市共进电子股份有限公司 | Firmware upgrading method and device and computer readable storage medium |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7509121B2 (en) * | 2005-04-18 | 2009-03-24 | Terax Communication Technologies Inc. | Method of updating firmware using object push profile in the bluetooth object exchange protocol |
CN102843677A (en) * | 2012-08-14 | 2012-12-26 | 福建伊时代信息科技股份有限公司 | Voice communication method, device and system |
CN106227503A (en) * | 2016-07-29 | 2016-12-14 | 苏州国芯科技有限公司 | Safety chip COS firmware update, service end, terminal and system |
CN109698745A (en) * | 2018-12-25 | 2019-04-30 | 歌尔科技有限公司 | A kind of key management method, system and earphone and storage medium |
CN110659046B (en) * | 2019-09-12 | 2023-09-01 | 深圳市沃奈斯实业发展有限公司 | Firmware upgrading method, terminal, charging box, earphone and storage medium |
CN111698794B (en) * | 2020-06-24 | 2021-12-07 | 杭州国芯科技股份有限公司 | Wireless audio sharing method |
-
2021
- 2021-03-12 CN CN202110270095.9A patent/CN112689276B/en active Active
- 2021-03-12 CN CN202110556435.4A patent/CN113382398B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1601431A (en) * | 1999-03-03 | 2005-03-30 | 索尼公司 | Data processing device, data processing method, terminal, transmission method for data processing device |
CN1422035A (en) * | 2001-11-28 | 2003-06-04 | Yun制造厂株式会社 | Cipher key exchange equipment, method, program and recording medium for recording the same program |
EP2784668A1 (en) * | 2013-03-26 | 2014-10-01 | GN Netcom A/S | Headset firmware update from headset base unit |
CN108874421A (en) * | 2018-06-15 | 2018-11-23 | 歌尔科技有限公司 | A kind of TWS earphone and its upgrade method, device, storage medium |
CN112346759A (en) * | 2020-10-14 | 2021-02-09 | 深圳市共进电子股份有限公司 | Firmware upgrading method and device and computer readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN112689276B (en) | 2021-06-04 |
CN112689276A (en) | 2021-04-20 |
CN113382398A (en) | 2021-09-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10785019B2 (en) | Data transmission method and apparatus | |
US10554392B2 (en) | Cryptographic key distribution | |
CN108241517B (en) | Software upgrading method, client and electronic equipment | |
US8806206B2 (en) | Cooperation method and system of hardware secure units, and application device | |
CN108199847B (en) | Digital security processing method, computer device, and storage medium | |
CN110661748B (en) | Log encryption method, log decryption method and log encryption device | |
CN111935712A (en) | Data transmission method, system and medium based on NB-IoT communication | |
CN111294203B (en) | Information transmission method | |
US10630466B1 (en) | Apparatus and method for exchanging cryptographic information with reduced overhead and latency | |
CN114900304B (en) | Digital signature method and apparatus, electronic device, and computer-readable storage medium | |
CN110690969B (en) | Method and system for achieving bidirectional SSL/TLS authentication through multiparty cooperation | |
CN114048438A (en) | Equipment authentication method and device, equipment, medium and product thereof | |
WO2023051337A1 (en) | Data processing method and apparatus, and device and storage medium | |
CN113992702B (en) | Ceph distributed file system storage state password reinforcement method and system | |
CN111241492A (en) | Product multi-tenant secure credit granting method, system and electronic equipment | |
CN114513345A (en) | Information transmission system, user device and information security hardware module | |
CN114037447A (en) | Method and device for off-line transaction | |
CN107276961B (en) | Method and device for encrypting and decrypting data based on cryptographic algorithm | |
CN112187767A (en) | Multi-party contract consensus system, method and medium based on block chain | |
CN117041956A (en) | Communication authentication method, device, computer equipment and storage medium | |
WO2023116266A1 (en) | Communication encryption method, system, and device | |
CN113382398B (en) | Server, bluetooth headset terminal and Bluetooth headset firmware updating processing system | |
CN116455561A (en) | Embedded TLS protocol for lightweight devices | |
KR101256114B1 (en) | Message authentication code test method and system of many mac testserver | |
CN116318654A (en) | SM2 algorithm collaborative signature system, method and equipment integrating quantum key distribution |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |