CN115495716B - Local authentication method and electronic equipment - Google Patents

Local authentication method and electronic equipment Download PDF

Info

Publication number
CN115495716B
CN115495716B CN202210976626.0A CN202210976626A CN115495716B CN 115495716 B CN115495716 B CN 115495716B CN 202210976626 A CN202210976626 A CN 202210976626A CN 115495716 B CN115495716 B CN 115495716B
Authority
CN
China
Prior art keywords
installation package
authentication
electronic device
local authentication
installation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210976626.0A
Other languages
Chinese (zh)
Other versions
CN115495716A (en
Inventor
王�锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Honor Device Co Ltd
Original Assignee
Honor Device Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Honor Device Co Ltd filed Critical Honor Device Co Ltd
Priority to CN202311251077.1A priority Critical patent/CN117390604A/en
Priority to CN202210976626.0A priority patent/CN115495716B/en
Publication of CN115495716A publication Critical patent/CN115495716A/en
Application granted granted Critical
Publication of CN115495716B publication Critical patent/CN115495716B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/305Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention provides a local authentication method and electronic equipment. In the technical scheme provided by the embodiment of the invention, the method comprises the following steps: when the electronic equipment is in a first state, pre-authentication data of the downloaded installation package is obtained; obtaining a local authentication result according to the pre-authentication data; when the local authentication result includes invalidity, a server is connected to perform a pre-authentication operation when a network connection is available. The embodiment of the invention does not delete the installation package when the local authentication is invalid, saves the re-downloading expenditure and enhances the user experience.

Description

Local authentication method and electronic equipment
[ field of technology ]
The present invention relates to the field of computer technologies, and in particular, to a local authentication method and an electronic device.
[ background Art ]
The electronic device is stable in network within a period of time after the downloading of the installation package (such as an OTA package) is finished, in order to solve the problem that no network exists during the timing installation at night, the electronic device firstly inquires from a server whether the installation package which is downloaded at present can be used for installation or not after the downloading of the installation package is finished, and if the installation package can be used for installation, pre-authentication data are written in a cache file, and the process is called pre-authentication. When the night time installation is triggered, if the network is available, the electronic equipment initiates installation authentication to the server; if the network is not available, the electronic device performs installation authentication according to the pre-authentication data, and the process is called local authentication.
At present, when the electronic equipment performs local authentication on the installation package, the installation package is deleted as long as the authentication is unsuccessful, the re-downloading expense is increased, and the user experience is not high.
[ invention ]
In view of this, the embodiment of the invention provides a local authentication method and electronic equipment, which can not delete the installation package when the local authentication is invalid, save the re-downloading expenditure and enhance the user experience.
In a first aspect, an embodiment of the present invention provides a local authentication method, where the method includes:
when the electronic equipment is in a first state, pre-authentication data of the downloaded installation package is obtained;
obtaining a local authentication result according to the pre-authentication data;
when the local authentication result includes invalidity, a server is connected to perform a pre-authentication operation when a network connection is available.
With reference to the first aspect, in certain implementation manners of the first aspect, when the local authentication result includes invalidity, the method further includes:
setting a next night installation timer of the installation package.
With reference to the first aspect, in certain implementation manners of the first aspect, when the local authentication result includes success, the method further includes:
and executing the installation operation of the installation package.
With reference to the first aspect, in certain implementation manners of the first aspect, when the local authentication result includes a failure, the method further includes:
and deleting the installation package and version information thereof.
With reference to the first aspect, in certain implementation manners of the first aspect, the method further includes:
and generating a prompt message, wherein the prompt message is used for reminding a user that the installation package is to be deleted and reminding the user to download the latest installation package again.
With reference to the first aspect, in certain implementations of the first aspect, the first state includes a night installation timer trigger of the installation package, an installation condition of the installation package is satisfied and a network connection of the electronic device is unavailable.
With reference to the first aspect, in certain implementations of the first aspect, the pre-authentication data includes an authentication Token, a successfully authenticated version code list, and an authentication result returned by the server.
With reference to the first aspect, in certain implementation manners of the first aspect, when the pre-authentication data is not acquired, or the authentication Token and the local authentication Token are not equal, or a version code list in the installation package and the version code list that is successfully authenticated are not equal, the local authentication result includes invalidation.
With reference to the first aspect, in certain implementation manners of the first aspect, when the pre-authentication data is acquired, the authentication Token and the local authentication Token are equal, the version code list in the installation package is equal to the version code list with successful authentication, and the authentication result returned by the server is successfully stored in a designated file, the local authentication result includes success.
With reference to the first aspect, in some implementations of the first aspect, when the pre-authentication data is acquired, the authentication Token and the local authentication Token are equal, the version code list in the installation package is equal to the version code list with successful authentication, and the authentication result returned by the server is not successfully saved in the designated file, the local authentication result includes failure.
With reference to the first aspect, in certain implementation manners of the first aspect, the specified file includes an update_auth_sa file.
With reference to the first aspect, in certain implementations of the first aspect, the installation package includes an OTA package.
In a second aspect, an embodiment of the present invention provides an electronic device, including a processor and a memory, where the memory is configured to store a computer program, the computer program including program instructions that, when executed by the processor, cause the electronic device to perform a method as described above.
In a third aspect, embodiments of the present invention provide a computer readable storage medium storing a computer program comprising program instructions which, when executed by a computer, cause the computer to perform a method as described above.
In the local authentication method and the technical scheme of the electronic equipment provided by the embodiment of the invention, the method comprises the following steps: when the electronic equipment is in a first state, pre-authentication data of the downloaded installation package is obtained; obtaining a local authentication result according to the pre-authentication data; when the local authentication result includes invalidity, a server is connected to perform a pre-authentication operation when a network connection is available. The embodiment of the invention does not delete the installation package when the local authentication is invalid, saves the re-downloading expenditure and enhances the user experience.
[ description of the drawings ]
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the embodiments will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic structural diagram of an electronic device according to an embodiment of the present invention;
FIG. 2 is a block diagram of the software architecture of an electronic device 100 according to an embodiment of the present invention;
fig. 3 is a schematic diagram of a local authentication result according to an embodiment of the present invention;
fig. 4 is a flowchart of a local authentication method according to an embodiment of the present invention;
FIG. 5 is a flowchart of another local authentication method according to an embodiment of the present invention;
FIG. 6 is a flowchart showing the local authentication result obtained according to the pre-authentication data in FIG. 5;
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
[ detailed description ] of the invention
For a better understanding of the technical solution of the present invention, the following detailed description of the embodiments of the present invention refers to the accompanying drawings.
It should be understood that the described embodiments are merely some, but not all, embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The terminology used in the embodiments of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be understood that the term "and/or" as used herein is merely one way of describing an association of associated objects, meaning that there may be three relationships, e.g., a and/or b, which may represent: the first and second cases exist separately, and the first and second cases exist separately. In addition, the character "/" herein generally indicates that the front and rear associated objects are an "or" relationship.
Fig. 1 shows a schematic configuration of an electronic device 100.
The electronic device 100 may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (universal serial bus, USB) interface 130, a charge management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, a mobile communication module 150, a wireless communication module 160, an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, a sensor module 180, keys 190, a motor 191, an indicator 192, a camera 193, a display 194, and a subscriber identity module (subscriber identification module, SIM) card interface 195, etc. The sensor module 180 may include a pressure sensor 180A, a gyro sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, an ambient light sensor 180L, a bone conduction sensor 180M, and the like.
It should be understood that the illustrated structure of the embodiment of the present application does not constitute a specific limitation on the electronic device 100. In other embodiments of the application, electronic device 100 may include more or fewer components than shown, or certain components may be combined, or certain components may be split, or different arrangements of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
The processor 110 may include one or more processing units, such as: the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processor (graphics processing unit, GPU), an image signal processor (image signal processor, ISP), a controller, a video codec, a digital signal processor (digital signal processor, DSP), a baseband processor, and/or a neural network processor (neural-network processing unit, NPU), etc. Wherein the different processing units may be separate devices or may be integrated in one or more processors.
The controller can generate operation control signals according to the instruction operation codes and the time sequence signals to finish the control of instruction fetching and instruction execution.
A memory may also be provided in the processor 110 for storing instructions and data. In some embodiments, the memory in the processor 110 is a cache memory. The memory may hold instructions or data that the processor 110 has just used or recycled. If the processor 110 needs to reuse the instruction or data, it can be called directly from the memory. Repeated accesses are avoided and the latency of the processor 110 is reduced, thereby improving the efficiency of the system.
In some embodiments, the processor 110 may include one or more interfaces. The interfaces may include an integrated circuit (inter-integrated circuit, I2C) interface, an integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, a pulse code modulation (pulse code modulation, PCM) interface, a universal asynchronous receiver transmitter (universal asynchronous receiver/transmitter, UART) interface, a mobile industry processor interface (mobile industry processor interface, MIPI), a general-purpose input/output (GPIO) interface, a subscriber identity module (subscriber identity module, SIM) interface, and/or a universal serial bus (universal serial bus, USB) interface, among others.
The I2C interface is a bi-directional synchronous serial bus comprising a serial data line (SDA) and a serial clock line (derail clock line, SCL). In some embodiments, the processor 110 may contain multiple sets of I2C buses. The processor 110 may be coupled to the touch sensor 180K, charger, flash, camera 193, etc., respectively, through different I2C bus interfaces. For example: the processor 110 may be coupled to the touch sensor 180K through an I2C interface, such that the processor 110 communicates with the touch sensor 180K through an I2C bus interface to implement a touch function of the electronic device 100.
The I2S interface may be used for audio communication. In some embodiments, the processor 110 may contain multiple sets of I2S buses. The processor 110 may be coupled to the audio module 170 via an I2S bus to enable communication between the processor 110 and the audio module 170. In some embodiments, the audio module 170 may transmit an audio signal to the wireless communication module 160 through the I2S interface, to implement a function of answering a call through the bluetooth headset.
PCM interfaces may also be used for audio communication to sample, quantize and encode analog signals. In some embodiments, the audio module 170 and the wireless communication module 160 may be coupled through a PCM bus interface. In some embodiments, the audio module 170 may also transmit audio signals to the wireless communication module 160 through the PCM interface to implement a function of answering a call through the bluetooth headset. Both the I2S interface and the PCM interface may be used for audio communication.
The UART interface is a universal serial data bus for asynchronous communications. The bus may be a bi-directional communication bus. It converts the data to be transmitted between serial communication and parallel communication. In some embodiments, a UART interface is typically used to connect the processor 110 with the wireless communication module 160. For example: the processor 110 communicates with a bluetooth module in the wireless communication module 160 through a UART interface to implement a bluetooth function. In some embodiments, the audio module 170 may transmit an audio signal to the wireless communication module 160 through a UART interface, to implement a function of playing music through a bluetooth headset.
The MIPI interface may be used to connect the processor 110 to peripheral devices such as a display 194, a camera 193, and the like. The MIPI interfaces include camera serial interfaces (camera serial interface, CSI), display serial interfaces (display serial interface, DSI), and the like. In some embodiments, processor 110 and camera 193 communicate through a CSI interface to implement the photographing functions of electronic device 100. The processor 110 and the display 194 communicate via a DSI interface to implement the display functionality of the electronic device 100.
The GPIO interface may be configured by software. The GPIO interface may be configured as a control signal or as a data signal. In some embodiments, a GPIO interface may be used to connect the processor 110 with the camera 193, the display 194, the wireless communication module 160, the audio module 170, the sensor module 180, and the like. The GPIO interface may also be configured as an I2C interface, an I2S interface, a UART interface, an MIPI interface, etc.
The USB interface 130 is an interface conforming to the USB standard specification, and may specifically be a Mini USB interface, a Micro USB interface, a USB Type C interface, or the like. The USB interface 130 may be used to connect a charger to charge the electronic device 100, and may also be used to transfer data between the electronic device 100 and a peripheral device. And can also be used for connecting with a headset, and playing audio through the headset. The interface may also be used to connect other electronic devices, such as AR devices, etc.
It should be understood that the interfacing relationship between the modules illustrated in the embodiments of the present application is only illustrative, and is not meant to limit the structure of the electronic device 100. In other embodiments of the present application, the electronic device 100 may also employ different interfacing manners in the above embodiments, or a combination of multiple interfacing manners.
The charge management module 140 is configured to receive a charge input from a charger. The charger can be a wireless charger or a wired charger. In some wired charging embodiments, the charge management module 140 may receive a charging input of a wired charger through the USB interface 130. In some wireless charging embodiments, the charge management module 140 may receive wireless charging input through a wireless charging coil of the electronic device 100. The charging management module 140 may also supply power to the electronic device through the power management module 141 while charging the battery 142.
The power management module 141 is used for connecting the battery 142, and the charge management module 140 and the processor 110. The power management module 141 receives input from the battery 142 and/or the charge management module 140 to power the processor 110, the internal memory 121, the display 194, the camera 193, the wireless communication module 160, and the like. The power management module 141 may also be configured to monitor battery capacity, battery cycle number, battery health (leakage, impedance) and other parameters. In other embodiments, the power management module 141 may also be provided in the processor 110. In other embodiments, the power management module 141 and the charge management module 140 may be disposed in the same device.
The wireless communication function of the electronic device 100 may be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, a modem processor, a baseband processor, and the like.
The antennas 1 and 2 are used for transmitting and receiving electromagnetic wave signals. Each antenna in the electronic device 100 may be used to cover a single or multiple communication bands. Different antennas may also be multiplexed to improve the utilization of the antennas. For example: the antenna 1 may be multiplexed into a diversity antenna of a wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
The mobile communication module 150 may provide a solution for wireless communication including 2G/3G/4G/5G, etc., applied to the electronic device 100. The mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (low noise amplifier, LNA), etc. The mobile communication module 150 may receive electromagnetic waves from the antenna 1, perform processes such as filtering, amplifying, and the like on the received electromagnetic waves, and transmit the processed electromagnetic waves to the modem processor for demodulation. The mobile communication module 150 can amplify the signal modulated by the modem processor, and convert the signal into electromagnetic waves through the antenna 1 to radiate. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be disposed in the processor 110. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be provided in the same device as at least some of the modules of the processor 110.
The modem processor may include a modulator and a demodulator. The modulator is used for modulating the low-frequency baseband signal to be transmitted into a medium-high frequency signal. The demodulator is used for demodulating the received electromagnetic wave signal into a low-frequency baseband signal. The demodulator then transmits the demodulated low frequency baseband signal to the baseband processor for processing. The low frequency baseband signal is processed by the baseband processor and then transferred to the application processor. The application processor outputs sound signals through an audio device (not limited to the speaker 170A, the receiver 170B, etc.), or displays images or video through the display screen 194. In some embodiments, the modem processor may be a stand-alone device. In other embodiments, the modem processor may be provided in the same device as the mobile communication module 150 or other functional module, independent of the processor 110.
The wireless communication module 160 may provide solutions for wireless communication including wireless local area network (wireless local area networks, WLAN) (e.g., wireless fidelity (wireless fidelity, wi-Fi) network), bluetooth (BT), global navigation satellite system (global navigation satellite system, GNSS), frequency modulation (frequency modulation, FM), near field wireless communication technology (near field communication, NFC), infrared technology (IR), etc., as applied to the electronic device 100. The wireless communication module 160 may be one or more devices that integrate at least one communication processing module. The wireless communication module 160 receives electromagnetic waves via the antenna 2, modulates the electromagnetic wave signals, filters the electromagnetic wave signals, and transmits the processed signals to the processor 110. The wireless communication module 160 may also receive a signal to be transmitted from the processor 110, frequency modulate it, amplify it, and convert it to electromagnetic waves for radiation via the antenna 2.
In some embodiments, antenna 1 and mobile communication module 150 of electronic device 100 are coupled, and antenna 2 and wireless communication module 160 are coupled, such that electronic device 100 may communicate with a network and other devices through wireless communication techniques. The wireless communication techniques may include the Global System for Mobile communications (global system for mobile communications, GSM), general packet radio service (general packet radio service, GPRS), code division multiple access (code division multiple access, CDMA), wideband code division multiple access (wideband code division multiple access, WCDMA), time division code division multiple access (time-division code division multiple access, TD-SCDMA), long term evolution (long term evolution, LTE), BT, GNSS, WLAN, NFC, FM, and/or IR techniques, among others. The GNSS may include a global satellite positioning system (global positioning system, GPS), a global navigation satellite system (global navigation satellite system, GLONASS), a beidou satellite navigation system (beidou navigation satellite system, BDS), a quasi zenith satellite system (quasi-zenith satellite system, QZSS) and/or a satellite based augmentation system (satellite based augmentation systems, SBAS).
The electronic device 100 implements display functions through a GPU, a display screen 194, an application processor, and the like. The GPU is a microprocessor for image processing, and is connected to the display 194 and the application processor. The GPU is used to perform mathematical and geometric calculations for graphics rendering. Processor 110 may include one or more GPUs that execute program instructions to generate or change display information.
The display screen 194 is used to display images, videos, and the like. The display 194 includes a display panel. The display panel may employ a liquid crystal display (liquid crystal display, LCD), an organic light-emitting diode (OLED), an active-matrix organic light-emitting diode (AMOLED) or an active-matrix organic light-emitting diode (matrix organic light emitting diode), a flexible light-emitting diode (flex), a mini, a Micro led, a Micro-OLED, a quantum dot light-emitting diode (quantum dot light emitting diodes, QLED), or the like. In some embodiments, the electronic device 100 may include 1 or N display screens 194, N being a positive integer greater than 1.
The electronic device 100 may implement photographing functions through an ISP, a camera 193, a video codec, a GPU, a display screen 194, an application processor, and the like.
The ISP is used to process data fed back by the camera 193. For example, when photographing, the shutter is opened, light is transmitted to the camera photosensitive element through the lens, the optical signal is converted into an electric signal, and the camera photosensitive element transmits the electric signal to the ISP for processing and is converted into an image visible to naked eyes. ISP can also optimize the noise, brightness and skin color of the image. The ISP can also optimize parameters such as exposure, color temperature and the like of a shooting scene. In some embodiments, the ISP may be provided in the camera 193.
The camera 193 is used to capture still images or video. The object generates an optical image through the lens and projects the optical image onto the photosensitive element. The photosensitive element may be a charge coupled device (charge coupled device, CCD) or a Complementary Metal Oxide Semiconductor (CMOS) phototransistor. The photosensitive element converts the optical signal into an electrical signal, which is then transferred to the ISP to be converted into a digital image signal. The ISP outputs the digital image signal to the DSP for processing. The DSP converts the digital image signal into an image signal in a standard RGB, YUV, or the like format. In some embodiments, electronic device 100 may include 1 or N cameras 193, N being a positive integer greater than 1.
The digital signal processor is used for processing digital signals, and can process other digital signals besides digital image signals. For example, when the electronic device 100 selects a frequency bin, the digital signal processor is used to fourier transform the frequency bin energy, or the like.
Video codecs are used to compress or decompress digital video. The electronic device 100 may support one or more video codecs. In this way, the electronic device 100 may play or record video in a variety of encoding formats, such as: dynamic picture experts group (moving picture experts group, MPEG) 1, MPEG2, MPEG3, MPEG4, etc.
The NPU is a neural-network (NN) computing processor, and can rapidly process input information by referencing a biological neural network structure, for example, referencing a transmission mode between human brain neurons, and can also continuously perform self-learning. Applications such as intelligent awareness of the electronic device 100 may be implemented through the NPU, for example: image recognition, face recognition, speech recognition, text understanding, etc.
The external memory interface 120 may be used to connect an external memory card, such as a Micro SD card, to enable expansion of the memory capabilities of the electronic device 100. The external memory card communicates with the processor 110 through an external memory interface 120 to implement data storage functions. For example, files such as music, video, etc. are stored in an external memory card.
The internal memory 121 may be used to store computer executable program code including instructions. The internal memory 121 may include a storage program area and a storage data area. The storage program area may store an application program (such as a sound playing function, an image playing function, etc.) required for at least one function of the operating system, etc. The storage data area may store data created during use of the electronic device 100 (e.g., audio data, phonebook, etc.), and so on. In addition, the internal memory 121 may include a high-speed random access memory, and may further include a nonvolatile memory such as at least one magnetic disk storage device, a flash memory device, a universal flash memory (universal flash storage, UFS), and the like. The processor 110 performs various functional applications of the electronic device 100 and data processing by executing instructions stored in the internal memory 121 and/or instructions stored in a memory provided in the processor.
The electronic device 100 may implement audio functions through an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, an application processor, and the like. Such as music playing, recording, etc.
The audio module 170 is used to convert digital audio information into an analog audio signal output and also to convert an analog audio input into a digital audio signal. The audio module 170 may also be used to encode and decode audio signals. In some embodiments, the audio module 170 may be disposed in the processor 110, or a portion of the functional modules of the audio module 170 may be disposed in the processor 110.
The speaker 170A, also referred to as a "horn," is used to convert audio electrical signals into sound signals. The electronic device 100 may listen to music, or to hands-free conversations, through the speaker 170A.
A receiver 170B, also referred to as a "earpiece", is used to convert the audio electrical signal into a sound signal. When electronic device 100 is answering a telephone call or voice message, voice may be received by placing receiver 170B in close proximity to the human ear.
Microphone 170C, also referred to as a "microphone" or "microphone", is used to convert sound signals into electrical signals. When making a call or transmitting voice information, the user can sound near the microphone 170C through the mouth, inputting a sound signal to the microphone 170C. The electronic device 100 may be provided with at least one microphone 170C. In other embodiments, the electronic device 100 may be provided with two microphones 170C, and may implement a noise reduction function in addition to collecting sound signals. In other embodiments, the electronic device 100 may also be provided with three, four, or more microphones 170C to enable collection of sound signals, noise reduction, identification of sound sources, directional recording functions, etc.
The earphone interface 170D is used to connect a wired earphone. The headset interface 170D may be a USB interface 130 or a 3.5mm open mobile electronic device platform (open mobile terminal platform, OMTP) standard interface, a american cellular telecommunications industry association (cellular telecommunications industry association of the USA, CTIA) standard interface.
The pressure sensor 180A is used to sense a pressure signal, and may convert the pressure signal into an electrical signal. In some embodiments, the pressure sensor 180A may be disposed on the display screen 194. The pressure sensor 180A is of various types, such as a resistive pressure sensor, an inductive pressure sensor, a capacitive pressure sensor, and the like. The capacitive pressure sensor may be a capacitive pressure sensor comprising at least two parallel plates with conductive material. The capacitance between the electrodes changes when a force is applied to the pressure sensor 180A. The electronic device 100 determines the strength of the pressure from the change in capacitance. When a touch operation is applied to the display screen 194, the electronic apparatus 100 detects the touch operation intensity according to the pressure sensor 180A. The electronic device 100 may also calculate the location of the touch based on the detection signal of the pressure sensor 180A. In some embodiments, touch operations that act on the same touch location, but at different touch operation strengths, may correspond to different operation instructions. For example: and executing an instruction for checking the short message when the touch operation with the touch operation intensity smaller than the first pressure threshold acts on the short message application icon. And executing an instruction for newly creating the short message when the touch operation with the touch operation intensity being greater than or equal to the first pressure threshold acts on the short message application icon.
The gyro sensor 180B may be used to determine a motion gesture of the electronic device 100. In some embodiments, the angular velocity of electronic device 100 about three axes (i.e., x, y, and z axes) may be determined by gyro sensor 180B. The gyro sensor 180B may be used for photographing anti-shake. For example, when the shutter is pressed, the gyro sensor 180B detects the shake angle of the electronic device 100, calculates the distance to be compensated by the lens module according to the angle, and makes the lens counteract the shake of the electronic device 100 through the reverse motion, so as to realize anti-shake. The gyro sensor 180B may also be used for navigating, somatosensory game scenes.
The air pressure sensor 180C is used to measure air pressure. In some embodiments, electronic device 100 calculates altitude from barometric pressure values measured by barometric pressure sensor 180C, aiding in positioning and navigation.
The magnetic sensor 180D includes a hall sensor. The electronic device 100 may detect the opening and closing of the flip cover using the magnetic sensor 180D. In some embodiments, when the electronic device 100 is a flip machine, the electronic device 100 may detect the opening and closing of the flip according to the magnetic sensor 180D. And then according to the detected opening and closing state of the leather sheath or the opening and closing state of the flip, the characteristics of automatic unlocking of the flip and the like are set.
The acceleration sensor 180E may detect the magnitude of acceleration of the electronic device 100 in various directions (typically three axes). The magnitude and direction of gravity may be detected when the electronic device 100 is stationary. The electronic equipment gesture recognition method can also be used for recognizing the gesture of the electronic equipment, and is applied to horizontal and vertical screen switching, pedometers and other applications.
A distance sensor 180F for measuring a distance. The electronic device 100 may measure the distance by infrared or laser. In some embodiments, the electronic device 100 may range using the distance sensor 180F to achieve quick focus.
The proximity light sensor 180G may include, for example, a Light Emitting Diode (LED) and a light detector, such as a photodiode. The light emitting diode may be an infrared light emitting diode. The electronic device 100 emits infrared light outward through the light emitting diode. The electronic device 100 detects infrared reflected light from nearby objects using a photodiode. When sufficient reflected light is detected, it may be determined that there is an object in the vicinity of the electronic device 100. When insufficient reflected light is detected, the electronic device 100 may determine that there is no object in the vicinity of the electronic device 100. The electronic device 100 can detect that the user holds the electronic device 100 close to the ear by using the proximity light sensor 180G, so as to automatically extinguish the screen for the purpose of saving power. The proximity light sensor 180G may also be used in holster mode, pocket mode to automatically unlock and lock the screen.
The ambient light sensor 180L is used to sense ambient light level. The electronic device 100 may adaptively adjust the brightness of the display 194 based on the perceived ambient light level. The ambient light sensor 180L may also be used to automatically adjust white balance when taking a photograph. Ambient light sensor 180L may also cooperate with proximity light sensor 180G to detect whether electronic device 100 is in a pocket to prevent false touches.
The fingerprint sensor 180H is used to collect a fingerprint. The electronic device 100 may utilize the collected fingerprint feature to unlock the fingerprint, access the application lock, photograph the fingerprint, answer the incoming call, etc.
The temperature sensor 180J is for detecting temperature. In some embodiments, the electronic device 100 performs a temperature processing strategy using the temperature detected by the temperature sensor 180J. For example, when the temperature reported by temperature sensor 180J exceeds a threshold, electronic device 100 performs a reduction in the performance of a processor located in the vicinity of temperature sensor 180J in order to reduce power consumption to implement thermal protection. In other embodiments, when the temperature is below another threshold, the electronic device 100 heats the battery 142 to avoid the low temperature causing the electronic device 100 to be abnormally shut down. In other embodiments, when the temperature is below a further threshold, the electronic device 100 performs boosting of the output voltage of the battery 142 to avoid abnormal shutdown caused by low temperatures.
The touch sensor 180K, also referred to as a "touch device". The touch sensor 180K may be disposed on the display screen 194, and the touch sensor 180K and the display screen 194 form a touch screen, which is also called a "touch screen". The touch sensor 180K is for detecting a touch operation acting thereon or thereabout. The touch sensor may communicate the detected touch operation to the application processor to determine the touch event type. Visual output related to touch operations may be provided through the display 194. In other embodiments, the touch sensor 180K may also be disposed on the surface of the electronic device 100 at a different location than the display 194.
The bone conduction sensor 180M may acquire a vibration signal. In some embodiments, bone conduction sensor 180M may acquire a vibration signal of a human vocal tract vibrating bone pieces. The bone conduction sensor 180M may also contact the pulse of the human body to receive the blood pressure pulsation signal. In some embodiments, bone conduction sensor 180M may also be provided in a headset, in combination with an osteoinductive headset. The audio module 170 may analyze the voice signal based on the vibration signal of the sound portion vibration bone block obtained by the bone conduction sensor 180M, so as to implement a voice function. The application processor may analyze the heart rate information based on the blood pressure beat signal acquired by the bone conduction sensor 180M, so as to implement a heart rate detection function.
The keys 190 include a power-on key, a volume key, etc. The keys 190 may be mechanical keys. Or may be a touch key. The electronic device 100 may receive key inputs, generating key signal inputs related to user settings and function controls of the electronic device 100.
The motor 191 may generate a vibration cue. The motor 191 may be used for incoming call vibration alerting as well as for touch vibration feedback. For example, touch operations acting on different applications (e.g., photographing, audio playing, etc.) may correspond to different vibration feedback effects. The motor 191 may also correspond to different vibration feedback effects by touching different areas of the display screen 194. Different application scenarios (such as time reminding, receiving information, alarm clock, game, etc.) can also correspond to different vibration feedback effects. The touch vibration feedback effect may also support customization.
The indicator 192 may be an indicator light, may be used to indicate a state of charge, a change in charge, a message indicating a missed call, a notification, etc.
The SIM card interface 195 is used to connect a SIM card. The SIM card may be inserted into the SIM card interface 195, or removed from the SIM card interface 195 to enable contact and separation with the electronic device 100. The electronic device 100 may support 1 or N SIM card interfaces, N being a positive integer greater than 1. The SIM card interface 195 may support Nano SIM cards, micro SIM cards, and the like. The same SIM card interface 195 may be used to insert multiple cards simultaneously. The types of the plurality of cards may be the same or different. The SIM card interface 195 may also be compatible with different types of SIM cards. The SIM card interface 195 may also be compatible with external memory cards. The electronic device 100 interacts with the network through the SIM card to realize functions such as communication and data communication. In some embodiments, the electronic device 100 employs esims, i.e.: an embedded SIM card. The eSIM card can be embedded in the electronic device 100 and cannot be separated from the electronic device 100.
The software system of the electronic device 100 may employ a layered architecture, an event driven architecture, a microkernel architecture, a microservice architecture, or a cloud architecture. In the embodiment of the invention, taking an Android system with a layered architecture as an example, a software structure of the electronic device 100 is illustrated.
Fig. 2 is a software configuration block diagram of the electronic device 100 according to the embodiment of the present invention.
The layered architecture divides the software into several layers, each with distinct roles and branches. The layers communicate with each other through a software interface. In some embodiments, the Android system is divided into four layers, from top to bottom, an application layer, an application framework layer, an Zhuoyun row (Android run) and system libraries, and a kernel layer, respectively.
The application layer may include a series of application packages.
As shown in fig. 2, the application package may include applications for cameras, gallery, calendar, phone calls, maps, navigation, WLAN, bluetooth, music, video, short messages, etc.
The application framework layer provides an application programming interface (application programming interface, API) and programming framework for application programs of the application layer. The application framework layer includes a number of predefined functions.
As shown in FIG. 2, the application framework layer may include a window manager, a content provider, a view system, a telephony manager, a resource manager, a notification manager, and the like.
The window manager is used for managing window programs. The window manager can acquire the size of the display screen, judge whether a status bar exists, lock the screen, intercept the screen and the like.
The content provider is used to store and retrieve data and make such data accessible to applications. The data may include video, images, audio, calls made and received, browsing history and bookmarks, phonebooks, etc.
The view system includes visual controls, such as controls to display text, controls to display pictures, and the like. The view system may be used to build applications. The display interface may be composed of one or more views. For example, a display interface including a text message notification icon may include a view displaying text and a view displaying a picture.
The telephony manager is used to provide the communication functions of the electronic device 100. Such as the management of call status (including on, hung-up, etc.).
The resource manager provides various resources for the application program, such as localization strings, icons, pictures, layout files, video files, and the like.
The notification manager allows the application to display notification information in a status bar, can be used to communicate notification type messages, can automatically disappear after a short dwell, and does not require user interaction. Such as notification manager is used to inform that the download is complete, message alerts, etc. The notification manager may also be a notification in the form of a chart or scroll bar text that appears on the system top status bar, such as a notification of a background running application, or a notification that appears on the screen in the form of a dialog window. For example, a text message is prompted in a status bar, a prompt tone is emitted, the electronic device vibrates, and an indicator light blinks, etc.
Android run time includes a core library and virtual machines. Android run time is responsible for scheduling and management of the Android system.
The core library consists of two parts: one part is a function which needs to be called by java language, and the other part is a core library of android.
The application layer and the application framework layer run in a virtual machine. The virtual machine executes java files of the application program layer and the application program framework layer as binary files. The virtual machine is used for executing the functions of object life cycle management, stack management, thread management, security and exception management, garbage collection and the like.
The system library may include a plurality of functional modules. For example: surface manager (surface manager), media Libraries (Media Libraries), three-dimensional graphics processing Libraries (e.g., openGL ES), 2D graphics engines (e.g., SGL), etc.
The surface manager is used to manage the display subsystem and provides a fusion of 2D and 3D layers for multiple applications.
Media libraries support a variety of commonly used audio, video format playback and recording, still image files, and the like. The media library may support a variety of audio and video encoding formats, such as MPEG4, h.264, MP3, AAC, AMR, JPG, PNG, etc.
The three-dimensional graphic processing library is used for realizing three-dimensional graphic drawing, image rendering, synthesis, layer processing and the like.
The 2D graphics engine is a drawing engine for 2D drawing.
The kernel layer is a layer between hardware and software. The inner core layer at least comprises a display driver, a camera driver, an audio driver and a sensor driver.
The workflow of the electronic device 100 software and hardware is illustrated below in connection with capturing a photo scene.
When touch sensor 180K receives a touch operation, a corresponding hardware interrupt is issued to the kernel layer. The kernel layer processes the touch operation into the original input event (including information such as touch coordinates, time stamp of touch operation, etc.). The original input event is stored at the kernel layer. The application framework layer acquires an original input event from the kernel layer, and identifies a control corresponding to the input event. Taking the touch operation as a touch click operation, taking a control corresponding to the click operation as an example of a control of a camera application icon, the camera application calls an interface of an application framework layer, starts the camera application, further starts a camera driver by calling a kernel layer, and captures a still image or video by the camera 193.
Currently, after the installation package is released to the server, the release may be disabled due to the existence of the vulnerability. When the installation package is deactivated, the electronic device that has downloaded this version of the installation package will not be able to install the installation package.
Before the electronic equipment installs the installation package, installation authentication is needed, namely the electronic equipment inquires whether the current downloaded installation package can be used for installation from a server; when the server returns to be installable, the electronic equipment performs subsequent installation logic; when the server returns that the installation is impossible, the electronic device reminds the user that the installation package is not valid, and deletes the installation package downloaded locally.
The installation authentication requires that the electronic device meet installation conditions (such as no call, screen locking, sufficient power, sufficient storage space, no protocol permission, etc.), that the network is available and that the server can successfully obtain results of whether the electronic device is available for installation; otherwise, the installation authentication and the installation cannot be completed, the electronic equipment needs to try again when the electronic equipment is idle at night, if the condition that the network is unavailable still exists during the installation at night, the user needs to be reminded of networking to carry out the installation authentication and the installation when the next night time installation is triggered, and the user cannot experience new versions in time.
The electronic device is stable in network within a period of time after the downloading of the installation package (such as an OTA package) is finished, in order to solve the problem that no network exists during the timing installation at night, the electronic device firstly inquires from a server whether the installation package which is downloaded at present can be used for installation or not after the downloading of the installation package is finished, and if the installation package can be used for installation, pre-authentication data are written in a cache file, and the process is called pre-authentication. When the night time installation is triggered, if the network is available, the electronic equipment initiates installation authentication to the server; if the network is not available, the electronic device performs installation authentication according to the pre-authentication data, and the process is called local authentication.
At present, when the electronic equipment performs local authentication on the installation package, the installation package is deleted as long as the authentication is unsuccessful, the re-downloading expense is increased, and the user experience is not high.
Based on the technical problems, the embodiment of the invention provides a local authentication method and electronic equipment, wherein an installation package is not deleted when the local authentication is invalid, so that the cost of re-downloading is saved, the user experience is enhanced, and the reliability of an electronic equipment system is low.
Fig. 3 is a schematic diagram of a local authentication result according to an embodiment of the present invention. As shown in fig. 3, the local authentication result includes success, failure, or invalidation.
And when the local authentication result comprises success, the electronic equipment executes the installation operation of the installation package. The installation package includes an OTA package.
When the local authentication result comprises failure, the electronic equipment generates a prompt message, wherein the prompt message is used for reminding a user that the installation package is to be deleted and reminding the user to download the latest installation package again, and the installation package and version information thereof are deleted.
When the local authentication result includes invalidity, the electronic device listens to the network, connects to the server to perform the pre-authentication operation when the network connection is available, and simultaneously sets a next night installation timer of the installation package. And registering system network change broadcasting, when the electronic equipment receives the network change broadcasting and judges that network connection is available, the connection server performs pre-authentication, pre-authentication data are stored locally after the pre-authentication is successful, and the network connection server is used under the condition that no network exists when a timer is installed at night for triggering next time.
For example, a next night time installation timer is set, and night time installation is performed 2 times between 2 a.m. and 4 a.m. with 1 hour intervals. If the current night installation trigger is between 2 am and 3 am, the next night installation timer is set after 1 hour, otherwise, the current night installation trigger is set between 2 am and 3 am.
In the embodiment of the invention, when the electronic equipment is in the first state, pre-authentication data of the downloaded installation package is obtained, and a local authentication result is obtained according to the pre-authentication data. The first state comprises night installation timer triggering of the installation package, the installation condition of the installation package is met, and network connection of the electronic equipment is unavailable. The pre-authentication data comprises an authentication Token, a version code list with successful authentication and an authentication result returned by the server.
Exemplary installation conditions for the installation package include sufficient power, sufficient storage space, etc. for the electronic device.
In the embodiment of the invention, when the pre-authentication data is not acquired, or the authentication Token and the local authentication Token are not equal, or the version code list in the installation package and the version code list with successful authentication are not equal, the local authentication result comprises invalidation.
Wherein the pre-authentication data is not acquired, i.e. the pre-authentication data is null. In this case there are two possibilities, one of which is that the electronic device does not perform the pre-authentication operation; another possibility is that the connection server authentication has no result when the electronic device is pre-authenticated.
Wherein, when the authentication Token and the local authentication Token are not equal, the data may be tampered, or the local data is the authentication data of the last authentication.
When the version code list in the installation package is not equal to the version code list successfully authenticated, the data may be tampered, or the local data is the authentication data of the last authentication.
In the embodiment of the invention, the pre-authentication data is acquired, the authentication Token is equal to the local authentication Token, the version code list in the installation package is equal to the version code list with successful authentication, and the local authentication result comprises success when the authentication result returned by the server is successfully stored in the appointed file. The specified file includes an update_auth_sa file.
In the embodiment of the invention, the pre-authentication data is acquired, the authentication Token is equal to the local authentication Token, the version code list in the installation package is equal to the version code list with successful authentication, and the local authentication result comprises failure when the authentication result returned by the server is not successfully stored in the designated file.
According to the embodiment of the invention, the local authentication result is divided into failure and invalid, when the local authentication result is invalid, the installation package is not deleted, the network change is monitored and the next night installation timer is set, and when the network connection is available, the server is connected to execute the pre-authentication operation again, so that the re-downloading expenditure is saved, the user experience is enhanced, and the system reliability of the electronic equipment is improved.
Fig. 4 is a flowchart of a local authentication method according to an embodiment of the present invention. As shown in fig. 4, the method includes:
step 202, when the electronic equipment is in a first state, pre-authentication data of the downloaded installation package is obtained.
Step 204, obtaining the local authentication result according to the pre-authentication data.
Step 206, when the local authentication result includes invalidity, connecting the server to perform the pre-authentication operation when the network connection is available.
In the technical scheme of the local authentication method provided by the embodiment of the invention, the method comprises the following steps: when the electronic equipment is in a first state, pre-authentication data of the downloaded installation package is obtained; obtaining a local authentication result according to the pre-authentication data; when the local authentication result includes invalidity, the server is connected to perform a pre-authentication operation when the network connection is available. The embodiment of the invention does not delete the installation package when the local authentication is invalid, saves the re-downloading expenditure and enhances the user experience.
Fig. 5 is a flowchart of yet another local authentication method according to an embodiment of the present invention. As shown in fig. 5, the method includes:
step 302, when the electronic device is in a first state, pre-authentication data of the downloaded installation package is obtained.
The hardware structure and the software structure of the electronic device provided by the embodiment of the present invention may be referred to in fig. 1 and fig. 2 for a related description of the electronic device 100.
The pre-authentication data comprises an authentication Token, a version code list with successful authentication and an authentication result returned by the server.
Step 304, obtaining a local authentication result according to the pre-authentication data, and executing step 306 when the local authentication result is invalid; executing step 312 when the local authentication result includes success; when the local authentication result includes failure, step 316 and steps 318 and 320 are performed.
In the embodiment of the present invention, as shown in fig. 6, step 304 specifically includes:
step 304a, judging whether pre-authentication data is acquired; if yes, go to step 304b; if not, go to step 306.
Step 304b, judging whether the authentication Token in the pre-authentication data is equal to the local authentication Token, if so, executing step 304c; if not, go to step 306.
Step 304c, judging whether the version code list in the installation package is equal to the version code list successfully authenticated in the pre-authentication data, if so, executing step 304d; if not, go to step 306.
And 304d, saving the authentication result returned by the server in the pre-authentication data to the designated file.
The specified file includes an update_auth_sa file.
Step 304e, judging whether the authentication result returned by the server is successfully saved to the designated file, if yes, executing step 312; if not, go to step 316.
Step 306, returning that the local authentication result is invalid, and continuing to execute step 308 and step 310.
Step 308, connecting the server to execute the pre-authentication operation when the network connection is available, and ending the flow.
Step 310, setting a next night installation timer of the installation package, and ending the flow.
Step 312, returning the local authentication result to be successful.
And step 314, executing the installation operation of the installation package, and ending the flow.
Step 316, returning the local authentication result fails, and continuing to execute step 318 and step 320.
Step 318, generating a prompt message, where the prompt message is used to remind the user that the installation package is to be deleted and remind the user to download the latest installation package again, and ending the flow.
Step 320, deleting the installation package and its version information.
In the technical scheme of the local authentication method provided by the embodiment of the invention, the method comprises the following steps: when the electronic equipment is in a first state, pre-authentication data of the downloaded installation package is obtained; obtaining a local authentication result according to the pre-authentication data; when the local authentication result includes invalidity, a server is connected to perform a pre-authentication operation when a network connection is available. The embodiment of the invention does not delete the installation package when the local authentication is invalid, saves the re-downloading expenditure and enhances the user experience.
Fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present invention, and it should be understood that the electronic device 400 is capable of executing each step in the above-mentioned local authentication method, and will not be described in detail herein to avoid repetition. The electronic device 400 includes: a processing unit 401.
The processing unit 401 is configured to obtain pre-authentication data of the downloaded installation package when the electronic device is in the first state; obtaining a local authentication result according to the pre-authentication data; when the local authentication result includes invalidity, a server is connected to perform a pre-authentication operation when a network connection is available.
Optionally, when the local authentication result includes invalidation, the processing unit 401 is further configured to set a next night installation timer of the installation package.
Optionally, when the local authentication result includes success, the processing unit 401 is further configured to perform an installation operation of the installation package.
Optionally, when the local authentication result includes failure, the processing unit 401 is further configured to delete the installation package and version information thereof.
Optionally, the processing unit 401 is further configured to generate a prompt message, where the prompt message is used to remind the user that the installation package is to be deleted and remind the user to re-download the latest installation package.
Optionally, the first state includes a night installation timer trigger of the installation package, an installation condition of the installation package is satisfied and a network connection of the electronic device is unavailable.
Optionally, the pre-authentication data includes an authentication Token, a version code list of successful authentication and an authentication result returned by the server.
Optionally, when the pre-authentication data is not acquired, or the authentication Token and the local authentication Token are not equal, or the version code list in the installation package and the version code list with successful authentication are not equal, the local authentication result includes invalidation.
Optionally, the pre-authentication data is acquired, the authentication Token is equal to the local authentication Token, the version code list in the installation package is equal to the version code list with successful authentication, and the local authentication result includes success when the authentication result returned by the server is successfully stored in the designated file.
Optionally, when the pre-authentication data is acquired, the authentication Token and the local authentication Token are equal, the version code list in the installation package is equal to the version code list with successful authentication, and the authentication result returned by the server is not successfully saved in the designated file, the local authentication result includes failure.
Optionally, the specified file includes an update_auth_sa file.
Optionally, the installation package comprises an OTA package.
It should be understood that the electronic device 400 herein is embodied in the form of functional units. The term "unit" herein may be implemented in software and/or hardware, without specific limitation. For example, a "unit" may be a software program, a hardware circuit or a combination of both that implements the functions described above. The hardware circuitry may include application specific integrated circuits (application specific integrated circuit, ASICs), electronic circuits, processors (e.g., shared, proprietary, or group processors, etc.) and memory for executing one or more software or firmware programs, merged logic circuits, and/or other suitable components that support the described functions.
Thus, the elements of the examples described in the embodiments of the present invention can be implemented in electronic hardware, or in a combination of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The embodiment of the application provides electronic equipment which can be terminal equipment or circuit equipment built in the terminal equipment. The electronic device may be adapted to perform the functions/steps of the method embodiments described above.
Embodiments of the present application provide a computer readable storage medium having instructions stored therein which, when executed on a terminal device, cause the terminal device to perform the functions/steps as in the method embodiments described above.
Embodiments of the present application also provide a computer program product comprising instructions which, when run on a computer or any of the at least one processor, cause the computer to perform the functions/steps as in the method embodiments described above.
In the embodiments of the present application, "at least one" means one or more, and "a plurality" means two or more. "and/or", describes an association relation of association objects, and indicates that there may be three kinds of relations, for example, a and/or B, and may indicate that a alone exists, a and B together, and B alone exists. Wherein A, B may be singular or plural. The character "/" generally indicates that the context-dependent object is an "or" relationship. "at least one of the following" and the like means any combination of these items, including any combination of single or plural items. For example, at least one of a, b and c may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or plural.
Those of ordinary skill in the art will appreciate that the various elements and algorithm steps described in the embodiments disclosed herein can be implemented as a combination of electronic hardware, computer software, and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In several embodiments provided by the present application, any of the functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution in the form of a software product stored in a storage medium, comprising several instructions for causing an electronic device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a read-only memory (ROM), a random access memory (random access memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely exemplary embodiments of the present application, and any person skilled in the art may easily conceive of changes or substitutions within the technical scope of the present application, which should be covered by the present application. The protection scope of the present application shall be subject to the protection scope of the claims.

Claims (14)

1. A local authentication method, the method comprising:
when the electronic equipment is in a first state, pre-authentication data of the downloaded installation package is obtained;
obtaining a local authentication result according to pre-authentication data, wherein the local authentication result is invalid when the pre-authentication data is not obtained;
when the local authentication result is invalid, the installation package is not deleted, and the server is connected to perform the pre-authentication operation when the network connection is available.
2. The method of claim 1, wherein when the local authentication result includes invalid, the method further comprises:
setting a next night installation timer of the installation package.
3. The method of claim 1, wherein when the local authentication result comprises success, the method further comprises:
and executing the installation operation of the installation package.
4. The method of claim 1, wherein when the local authentication result comprises a failure, the method further comprises:
and deleting the installation package and version information thereof.
5. The method according to claim 4, wherein the method further comprises:
and generating a prompt message, wherein the prompt message is used for reminding a user that the installation package is to be deleted and reminding the user to download the latest installation package again.
6. The method of claim 1, wherein the first state comprises a night time installation timer trigger of the installation package, an installation condition of the installation package is satisfied and a network connection of the electronic device is unavailable.
7. The method of claim 1, wherein the pre-authentication data comprises an authentication Token, a successfully authenticated version code list, and an authentication result returned by the server.
8. The method of claim 7, wherein the local authentication result includes invalidation when the authentication Token and the local authentication Token are not equal or the version code list in the installation package and the successfully authenticated version code list are not equal.
9. The method of claim 7, wherein the local authentication result includes success when the pre-authentication data has been obtained, the authentication Token and the local authentication Token are equal, the version code list in the installation package is equal to the successfully authenticated version code list, and the authentication result returned by the server is successfully saved in a designated file.
10. The method of claim 7, wherein the local authentication result includes a failure when the pre-authentication data has been obtained, the authentication Token and the local authentication Token are equal, the version code list in the installation package is equal to the successfully authenticated version code list, and the authentication result returned by the server is not successfully saved in a designated file.
11. The method of claim 10, wherein the specified file comprises an update_auth_sa file.
12. The method of any of claims 1-11, wherein the installation package comprises an OTA package.
13. An electronic device comprising a processor and a memory, wherein the memory is for storing a computer program comprising program instructions that, when executed by the processor, cause the electronic device to perform the steps of the method of any of claims 1-12.
14. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program comprising program instructions which, when executed by a computer, cause the computer to perform the method of any of claims 1-12.
CN202210976626.0A 2022-08-15 2022-08-15 Local authentication method and electronic equipment Active CN115495716B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202311251077.1A CN117390604A (en) 2022-08-15 2022-08-15 Local authentication method and electronic equipment
CN202210976626.0A CN115495716B (en) 2022-08-15 2022-08-15 Local authentication method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210976626.0A CN115495716B (en) 2022-08-15 2022-08-15 Local authentication method and electronic equipment

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202311251077.1A Division CN117390604A (en) 2022-08-15 2022-08-15 Local authentication method and electronic equipment

Publications (2)

Publication Number Publication Date
CN115495716A CN115495716A (en) 2022-12-20
CN115495716B true CN115495716B (en) 2023-10-10

Family

ID=84467208

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202210976626.0A Active CN115495716B (en) 2022-08-15 2022-08-15 Local authentication method and electronic equipment
CN202311251077.1A Pending CN117390604A (en) 2022-08-15 2022-08-15 Local authentication method and electronic equipment

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202311251077.1A Pending CN117390604A (en) 2022-08-15 2022-08-15 Local authentication method and electronic equipment

Country Status (1)

Country Link
CN (2) CN115495716B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016019790A1 (en) * 2014-08-04 2016-02-11 优视科技有限公司 Verification method, client, server and system for installation package
WO2016101649A1 (en) * 2014-12-22 2016-06-30 中兴通讯股份有限公司 License pre-authentication method, device and system
CN107506221A (en) * 2017-09-28 2017-12-22 阿里巴巴集团控股有限公司 Application program updating method, apparatus and equipment
CN107743115A (en) * 2016-12-22 2018-02-27 腾讯科技(深圳)有限公司 A kind of identity identifying method of terminal applies, device and system
CN107786937A (en) * 2016-08-26 2018-03-09 展讯通信(上海)有限公司 Implementation method, mobile terminal and the roam server of mobile terminal localized roaming
CN108337677A (en) * 2017-01-19 2018-07-27 阿里巴巴集团控股有限公司 Network authentication method and device
CN112187709A (en) * 2019-07-05 2021-01-05 华为技术有限公司 Authentication method, device and server
CN112925535A (en) * 2021-02-25 2021-06-08 广东电网有限责任公司电力调度控制中心 Method and device for installing embedded application of password chip

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7546595B1 (en) * 2004-10-14 2009-06-09 Microsoft Corporation System and method of installing software updates in a computer networking environment
CN101159896B (en) * 2007-09-19 2011-04-13 Ut斯达康通讯有限公司 Individual mobile terminal data packet downloading method
CN105979313A (en) * 2015-09-16 2016-09-28 乐视致新电子科技(天津)有限公司 Remote control upgrading method and device
CN108460273B (en) * 2017-12-27 2022-10-14 中国银联股份有限公司 Application management method of terminal, application server and terminal
CN111159657A (en) * 2019-11-22 2020-05-15 深圳智链物联科技有限公司 Application program authentication method and system
CN113885914A (en) * 2021-09-30 2022-01-04 北京达佳互联信息技术有限公司 Application program processing method and device, electronic equipment and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016019790A1 (en) * 2014-08-04 2016-02-11 优视科技有限公司 Verification method, client, server and system for installation package
WO2016101649A1 (en) * 2014-12-22 2016-06-30 中兴通讯股份有限公司 License pre-authentication method, device and system
CN107786937A (en) * 2016-08-26 2018-03-09 展讯通信(上海)有限公司 Implementation method, mobile terminal and the roam server of mobile terminal localized roaming
CN107743115A (en) * 2016-12-22 2018-02-27 腾讯科技(深圳)有限公司 A kind of identity identifying method of terminal applies, device and system
CN108337677A (en) * 2017-01-19 2018-07-27 阿里巴巴集团控股有限公司 Network authentication method and device
CN107506221A (en) * 2017-09-28 2017-12-22 阿里巴巴集团控股有限公司 Application program updating method, apparatus and equipment
CN112187709A (en) * 2019-07-05 2021-01-05 华为技术有限公司 Authentication method, device and server
WO2021004392A1 (en) * 2019-07-05 2021-01-14 华为技术有限公司 Authentication method, device, and server
CN112925535A (en) * 2021-02-25 2021-06-08 广东电网有限责任公司电力调度控制中心 Method and device for installing embedded application of password chip

Also Published As

Publication number Publication date
CN115495716A (en) 2022-12-20
CN117390604A (en) 2024-01-12

Similar Documents

Publication Publication Date Title
CN114467297B (en) Video call display method and related device applied to electronic equipment
CN110058777B (en) Method for starting shortcut function and electronic equipment
CN113885759B (en) Notification message processing method, device, system and computer readable storage medium
CN113254409B (en) File sharing method, system and related equipment
CN113641271B (en) Application window management method, terminal device and computer readable storage medium
CN114089932B (en) Multi-screen display method, device, terminal equipment and storage medium
CN114095599B (en) Message display method and electronic equipment
CN114579389A (en) Application management method, device, equipment and storage medium
CN115914461B (en) Position relation identification method and electronic equipment
CN116389884B (en) Thumbnail display method and terminal equipment
CN116048831B (en) Target signal processing method and electronic equipment
CN110286975B (en) Display method of foreground elements and electronic equipment
CN116051351B (en) Special effect processing method and electronic equipment
CN113438366A (en) Information notification interaction method, electronic device and storage medium
CN114691248B (en) Method, device, equipment and readable storage medium for displaying virtual reality interface
CN114828098B (en) Data transmission method and electronic equipment
CN117009005A (en) Display method, automobile and electronic equipment
CN117348894A (en) Software upgrading method, terminal equipment and system
CN115495716B (en) Local authentication method and electronic equipment
CN114254334A (en) Data processing method, device, equipment and storage medium
CN110737916A (en) Communication terminal and processing method
CN116233599B (en) Video mode recommendation method and electronic equipment
CN114077323B (en) Touch screen false touch prevention method of electronic equipment, electronic equipment and chip system
CN115792431B (en) Abnormal position detection method and electronic equipment
CN116709220B (en) Network connection method, network connection device, electronic equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant