CN115577398A - Information processing method and device, terminal and network side equipment - Google Patents

Information processing method and device, terminal and network side equipment Download PDF

Info

Publication number
CN115577398A
CN115577398A CN202110759703.2A CN202110759703A CN115577398A CN 115577398 A CN115577398 A CN 115577398A CN 202110759703 A CN202110759703 A CN 202110759703A CN 115577398 A CN115577398 A CN 115577398A
Authority
CN
China
Prior art keywords
information
application
terminal
sending
network side
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110759703.2A
Other languages
Chinese (zh)
Inventor
韩旭东
习熹
王研博
肖青
柳耀勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile IoT Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile IoT Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile IoT Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN202110759703.2A priority Critical patent/CN115577398A/en
Publication of CN115577398A publication Critical patent/CN115577398A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Abstract

The invention provides an information processing method, an information processing device, a terminal and network side equipment, and relates to a cloud platform information security technology. The method comprises the following steps: sending application requirement information to network side equipment; receiving application information fed back by the network side equipment according to the application demand information, and storing the application information into a volatile memory of the terminal; and under the condition that an execution instruction aiming at the application information sent by the network side equipment is received, running the application corresponding to the application information. The scheme of the invention solves the problem that in the prior art, the application or program is stored in the nonvolatile memory, so that the data has the risk of safety leakage.

Description

Information processing method and device, terminal and network side equipment
Technical Field
The invention relates to a cloud platform information security technology, in particular to an information processing method, an information processing device, a terminal and network side equipment.
Background
The embedded system is a special computer system which takes application as a center, takes the modern computer technology as a basis and can flexibly cut software and hardware modules according to the requirements of users (such as function, reliability, cost, volume, power consumption, environment and the like).
Embedded systems generally have the following characteristics: application centric, application specific, core in modern computer technology, and tailorable software and hardware.
In the prior art, applications are generally stored in a terminal, so that the applications can be read and analyzed, and the secrecy of data, the integrity of the data and the availability of the data in data security are difficult to guarantee. An attacker can search for the application vulnerability by analyzing the stored application, or initiate corresponding attacks on the platform according to the key data in the application. An attacker can forge and tamper the obtained application by using the obtained application, and the tampered application is put on a terminal which does not realize the technical scheme to operate, so that the platform is attacked, or more data information is obtained so as to carry out the next attack.
In the prior art, a part of schemes store and execute downloaded third-party extension programs by allocating data storage areas in nonvolatile memories such as a flash memory. However, this creates a hidden danger for data security, and an attacker can easily read a third-party extension program in a memory such as a flash memory, and analyze a bug in the program or cause leakage of key data in the program. And the flash memories and other memories can be easily replaced by different chips of the same type, or data is directly tampered maliciously in a flash memory writing mode. Therefore, the script program judging module can be easily cheated, and the counterfeit program downloaded in a non-cloud terminal is operated, so that attacks in the modes of cheating user data and the like can be carried out.
In addition to the security problem, the scheme in the prior art does not have the application management capability, and since the name of the third-party extension program is stored in the device in the development stage, the name of the third-party extension program needs to be kept consistent with the name, which increases the corresponding difficulty for the platform to manage the application. And only the extension program storing the program name in the development stage can be downloaded and run, and the flexibility of the late extension is poor, which means that the extension program which is added more needs to return to the development stage for adding the corresponding name.
In summary, it is a default practice for the embedded terminal to solidify the application on the non-volatile memory, and the reason for doing so is to consider the starting speed and stability of the application. However, for an embedded terminal, the application bears almost all sensitive data and sensitive information, and the application is placed on a nonvolatile memory, which increases the risk of data security leakage, and for the terminal, the security of the behavior of the terminal cannot be guaranteed, so that there is a high risk of information leakage, and a certain potential safety hazard is caused to the user.
Disclosure of Invention
The invention aims to provide an information processing method, an information processing device, a terminal and network side equipment, and solves the problem that in the prior art, data is at risk of security leakage due to the fact that an application or a program is stored in a nonvolatile memory.
In order to achieve the above object, an embodiment of the present invention provides an information processing method applied to a terminal, including:
sending application requirement information to network side equipment;
receiving application information fed back by the network side equipment according to the application demand information, and storing the application information into a volatile memory of the terminal;
and under the condition that an execution instruction aiming at the application information sent by the network side equipment is received, running the application corresponding to the application information.
Optionally, the application requirement information includes authentication information and terminal identification information.
Optionally, before sending the application requirement information to the network side device, the information processing method further includes:
carrying out system initialization operation;
wherein the system initialization operation comprises any one of:
loading starting information;
loading starting information and a virtual machine;
the startup information and interpreter are loaded.
Optionally, before running the application corresponding to the application information, the information processing method further includes:
sending first verification information corresponding to the application information to the network side equipment; the first verification information is used for verifying the integrity of the application information by the network side equipment;
and receiving the execution instruction sent by the network side equipment according to the first verification information.
Optionally, after receiving the execution instruction sent by the network device according to the first verification information, the information processing method further includes:
and sending acknowledgement character (ack) information to the network side equipment.
Optionally, the information processing method further includes:
deleting the application information stored in the volatile memory under the condition that a preset condition is met;
wherein the preset condition comprises at least one of the following:
the terminal is powered off;
under the condition that the programming language corresponding to the application is a compiled language, the application operation is finished;
and under the condition that the programming language corresponding to the application is an interpreted language or a script language, the application loading is finished.
In order to achieve the above object, an embodiment of the present invention provides an information processing method, applied to a network device, including:
receiving application demand information sent by a terminal;
sending application information to the terminal according to the application demand information;
sending an execution instruction aiming at the application information to the terminal under the condition that the integrity verification of the application information passes;
and the execution instruction is used for instructing the terminal to execute the application corresponding to the application information.
Optionally, the application requirement information includes authentication information;
wherein, the sending the application information to the terminal according to the application demand information includes:
verifying the terminal according to the authentication information to obtain a first verification result;
and sending application information to the terminal under the condition that the first verification result indicates that the verification is passed.
Optionally, the application requirement information further includes terminal identification information;
wherein the sending application information to the terminal includes:
and sending application information corresponding to the terminal identification information to the terminal according to the terminal identification information.
Optionally, before sending the application information to the terminal, the information processing method further includes:
receiving first verification information corresponding to the application information sent by the terminal;
verifying the integrity of the application information according to the first verification information to obtain a second verification result;
wherein, the sending, to the terminal, an execution instruction for the application information if the integrity verification of the application information passes includes:
and sending an execution instruction to the terminal under the condition that the second verification result indicates that the integrity of the application information is verified to pass.
Optionally, after sending an execution instruction for the application information to the terminal, the information processing method further includes:
and receiving ack information sent by the terminal.
In order to achieve the above object, an embodiment of the present invention provides a terminal, including a processor and a transceiver, where the transceiver is configured to send application requirement information to a network side device;
the processor is used for receiving application information fed back by the network side equipment according to the application demand information and storing the application information into a volatile memory of the terminal;
the processor is further configured to run an application corresponding to the application information on the condition that an execution instruction for the application information sent by the network-side device is received.
Optionally, the application requirement information includes authentication information and terminal identification information.
Optionally, before the processor is configured to send the application requirement information to the network-side device, the processor is further specifically configured to:
carrying out system initialization operation;
wherein the system initialization operation comprises any one of:
loading starting information;
loading starting information and a virtual machine;
the startup information and interpreter are loaded.
Optionally, before the processor is configured to run the application corresponding to the application information, the processor is further specifically configured to:
sending first verification information corresponding to the application information to the network side equipment; the first verification information is used for verifying the integrity of the application information by the network side equipment;
and receiving the execution instruction sent by the network side equipment according to the first verification information.
Optionally, after the processor is configured to receive the execution instruction sent by the network side device according to the first verification information, the processor is further specifically configured to:
and sending acknowledgement character ack information to the network side equipment.
Optionally, the processor is further configured to:
deleting the application information stored in the volatile memory under the condition that a preset condition is met;
wherein the preset condition comprises at least one of the following:
the terminal is powered off;
under the condition that the programming language corresponding to the application is a compiled language, the application operation is finished;
and under the condition that the programming language corresponding to the application is an interpreted language or a script language, the application loading is finished.
In order to achieve the above object, an embodiment of the present invention provides a network side device, including a processor and a transceiver, where the transceiver is configured to receive application requirement information sent by a terminal;
the processor is used for sending application information to the terminal according to the application demand information;
the transceiver is further used for sending an execution instruction for the application information to the terminal if the integrity verification of the application information passes;
and the execution instruction is used for instructing the terminal to execute the application corresponding to the application information.
Optionally, the application requirement information includes authentication information;
when the processor is configured to send the application information to the terminal according to the application requirement information, the processor is further specifically configured to:
verifying the terminal according to the authentication information to obtain a first verification result;
and sending application information to the terminal under the condition that the first verification result indicates that the verification is passed.
Optionally, the application requirement information further includes terminal identification information;
wherein, when the processor is configured to send the application information to the terminal, the processor is further specifically configured to:
and sending application information corresponding to the terminal identification information to the terminal according to the terminal identification information.
Optionally, before the processor is configured to send the application information to the terminal, the processor is further specifically configured to:
receiving first verification information corresponding to the application information sent by the terminal;
verifying the integrity of the application information according to the first verification information to obtain a second verification result;
wherein, when the processor is configured to send an execution instruction for the application information to the terminal under the condition that the integrity verification of the application information passes, the processor is further specifically configured to:
and sending an execution instruction to the terminal under the condition that the second verification result indicates that the integrity of the application information is verified.
Optionally, the processor, when configured to send, to the terminal, an execution instruction for the application information, is further specifically configured to:
and receiving ack information sent by the terminal.
In order to achieve the above object, an embodiment of the present invention provides an information processing apparatus, applied to a terminal, including:
the demand sending module is used for sending application demand information to the network side equipment;
the first processing module is used for receiving application information fed back by the network side equipment according to the application demand information and storing the application information into a volatile memory of the terminal;
and the application running module is used for running the application corresponding to the application information under the condition of receiving the execution instruction aiming at the application information sent by the network side equipment.
Optionally, the application requirement information includes authentication information and terminal identification information.
Optionally, the information processing apparatus further includes:
the initialization module is used for carrying out system initialization operation;
wherein the system initialization operation comprises any one of:
loading starting information;
loading starting information and a virtual machine;
the startup information and interpreter are loaded.
Optionally, the information processing apparatus further includes:
a first sending module, configured to send first verification information corresponding to the application information to the network side device; the first verification information is used for verifying the integrity of the application information by the network side equipment;
and the instruction receiving module is used for receiving the execution instruction sent by the network side equipment according to the first verification information.
Optionally, the information processing apparatus further includes:
and the second sending module is used for sending the acknowledgement character ack information to the network side equipment.
Optionally, the information processing apparatus further includes:
the deleting module is used for deleting the application information stored in the volatile memory under the condition that a preset condition is met;
wherein the preset condition comprises at least one of the following:
the terminal is powered off;
under the condition that the programming language corresponding to the application is a compiled language, the application operation is finished;
and under the condition that the programming language corresponding to the application is an interpreted language or a script language, the application loading is finished.
In order to achieve the above object, an embodiment of the present invention provides an information processing apparatus, applied to a network side device, including
The request receiving module is used for receiving application request information sent by the terminal;
the application sending module is used for sending application information to the terminal according to the application demand information;
the instruction sending module is used for sending an execution instruction aiming at the application information to the terminal under the condition that the integrity verification of the application information passes;
and the execution instruction is used for indicating the terminal to execute the application corresponding to the application information.
Optionally, the application requirement information includes authentication information;
wherein, the application sending module comprises:
the verification unit is used for verifying the terminal according to the authentication information to obtain a first verification result;
and the sending unit is used for sending the application information to the terminal under the condition that the first verification result indicates that the verification is passed.
Optionally, the application requirement information further includes terminal identification information;
wherein the transmitting unit includes:
and the sending subunit is configured to send, to the terminal, application information corresponding to the terminal identification information according to the terminal identification information.
Optionally, the information processing apparatus further includes:
the verification receiving module is used for receiving first verification information corresponding to the application information sent by the terminal;
the verification processing module is used for verifying the integrity of the application information according to the first verification information to obtain a second verification result;
wherein, the instruction sending module comprises:
and the instruction sending unit is used for sending an execution instruction to the terminal under the condition that the second verification result indicates that the integrity verification of the application information passes.
Optionally, the information processing apparatus further includes:
and the information receiving module is used for receiving the ack information sent by the terminal.
To achieve the above object, an embodiment of the present invention provides a terminal, including a transceiver, a processor, a memory, and a program or instructions stored in the memory and executable on the processor; the processor, when executing the program or instructions, implements the information processing method as described above.
To achieve the above object, an embodiment of the present invention provides a network side device, which includes a transceiver, a processor, a memory, and a program or an instruction stored in the memory and executable on the processor; the processor, when executing the program or instructions, implements the information processing method as described above.
To achieve the above object, an embodiment of the present invention provides a readable storage medium on which a program or instructions are stored, which when executed by a processor implement the steps in the information processing method as described above.
The technical scheme of the invention has the following beneficial effects:
according to the method provided by the embodiment of the invention, the application information can be stored in the volatile memory of the terminal by receiving the application information sent by the network side equipment, so that the terminal is only used as an application executor of the network side equipment, the network side equipment can effectively control the application or program on the terminal, the control capability of the network side equipment on the terminal is enhanced, and the application or program stored in the volatile memory can be automatically cleared when the terminal is powered off, so that the safety is higher.
Drawings
FIG. 1 is a flow chart of an information processing method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a relationship between a network side device and a terminal according to an embodiment of the present invention;
fig. 3 is an operation flow of a terminal in the information processing method according to the embodiment of the present invention;
FIG. 4 is a flow chart of an information processing method according to another embodiment of the invention;
fig. 5 is an operation flow of a network side device in an information processing method according to an embodiment of the present invention;
fig. 6 is a structural diagram of a terminal of an embodiment of the present invention;
fig. 7 is a structural diagram of a network-side device according to an embodiment of the present invention;
FIG. 8 is a block diagram of an information processing apparatus according to an embodiment of the present invention;
FIG. 9 is a block diagram of an information processing apparatus according to another embodiment of the present invention;
fig. 10 is a block diagram of a terminal according to another embodiment of the present invention;
fig. 11 is a structural diagram of a network device according to another embodiment of the present invention.
Detailed Description
To make the technical problems, technical solutions and advantages of the present invention more apparent, the following detailed description is given with reference to the accompanying drawings and specific embodiments.
It should be appreciated that reference throughout this specification to "one embodiment" or "an embodiment" means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, the appearances of the phrases "in one embodiment" or "in an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
In various embodiments of the present invention, it should be understood that the sequence numbers of the following processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
In addition, the terms "system" and "network" are often used interchangeably herein.
In the embodiments provided herein, it should be understood that "B corresponding to a" means that B is associated with a from which B can be determined. It should also be understood that determining B from a does not mean determining B from a alone, but may also be determined from a and/or other information.
Description of cloud platform:
the cloud platform refers to services based on hardware resources and software resources, and can provide computing, networking and storage capabilities.
Cloud platforms can be divided into 3 types: the cloud computing platform comprises a storage type cloud platform taking data storage as a main part, a computing type cloud platform taking data processing as a main part, and a comprehensive cloud computing platform taking computing and data storage processing into consideration.
Description of information security system:
the information security system can be divided into the following four layers: device security, data security, content security, and behavior security. Wherein, the safety of equipment is the first problem of information system safety, mainly includes three side: stability of the device, reliability of the device, and availability of the device; data security requires measures to be taken to ensure that data is protected from unauthorized leakage, tampering and corruption, including: secrecy of data, integrity of data, and availability of data; content security is a requirement of information security at the political, legal, and ethical levels, including: the information content is politically healthy, conforms to national laws and regulations, and conforms to excellent moral specifications of Chinese nationality; behavioral security is a dynamic security (in contrast to data security, which is a static security in nature), and the execution of a program and the corresponding hardware actions form the behavior of the system, and the behavioral security includes the secrecy of the behavior, the integrity of the behavior, and the controllability of the behavior.
As shown in fig. 1, an information processing method according to an embodiment of the present invention is applied to a terminal, and includes:
step 101, sending application requirement information to network side equipment.
It should be noted that the application requirement information may include authentication information, and may also include terminal identification information, where the terminal identification information may include identity information, grouping information, and the like of a terminal.
And 102, receiving application information fed back by the network side equipment according to the application demand information, and storing the application information into a volatile memory of the terminal.
In this step, the application information does not need to be stored locally in the terminal (for example, in a nonvolatile storage area of the terminal), but can be stored in the cloud platform (i.e., network side device), and the network side device issues the application information to the terminal, so that a security leakage risk caused by the fact that the application information is stored in a nonvolatile memory of the terminal is avoided, control of the network side device to issue the application can be ensured, the behavior security of the terminal is improved, the data security is ensured to a great extent, and higher security is achieved.
It should be noted that, because the application information is stored in the volatile memory of the terminal, when the terminal is powered off, the application or program stored in the volatile memory can be automatically cleared, and the security is higher.
Step 103, running the application corresponding to the application information when receiving the execution instruction for the application information sent by the network side device.
In this embodiment, the terminal is equivalent to an actuator for executing the application, and the application information and the execution instruction that need to be executed are issued by the network side device, that is, the terminal executes the application and needs to be controlled by the network side device, and because the terminal does not have a local storage application, there is no possibility that the terminal executes the application before being connected to the network side device, the terminal is controllable for the network side device, and the network side device has a control force on the terminal, so that the control of the network side device on the application can be ensured, and the behavior safety of the terminal is improved.
Optionally, the application requirement information includes authentication information and terminal identification information.
Note that the terminal identification information may include identity information, grouping information, and the like of the terminal.
Optionally, before sending the application requirement information to the network side device, the information processing method further includes:
carrying out system initialization operation;
wherein the system initialization operation comprises any one of:
loading starting information;
loading starting information and a virtual machine;
the startup information and interpreter are loaded.
In this embodiment, the start information refers to information related to the start of the terminal system in the terminal.
It should be noted that the terminal in this embodiment can be classified into a terminal in a compiled language, a terminal in an interpreted language, and a terminal in a script language according to different application execution modes. Under the condition that the terminal application is a compiled language, the system initialization operation comprises loading starting information; under the condition that the terminal application is an interpreted language, the system initialization operation comprises loading starting information and an interpreter; in the case of a terminal application in a scripting language, the system initialization operation includes loading startup information and a virtual machine.
Optionally, before running the application corresponding to the application information, the information processing method further includes:
sending first verification information corresponding to the application information to the network side equipment; the first verification information is used for verifying the integrity of the application information by the network side equipment;
and receiving the execution instruction sent by the network side equipment according to the first verification information.
Optionally, after receiving the execution instruction sent by the network-side device according to the first verification information, the information processing method further includes:
and sending acknowledgement character ack information to the network side equipment.
In this embodiment, after receiving the execution instruction sent by the network side device, the terminal replies an ack message to the network side device, where the ack message indicates that the execution instruction has been received.
Optionally, the information processing method further includes:
deleting the application information stored in the volatile memory under the condition that a preset condition is met;
wherein the preset condition comprises at least one of the following:
the terminal is powered off;
under the condition that the programming language corresponding to the application is a compiled language, the application operation is finished;
and under the condition that the programming language corresponding to the application is an interpreted language or a script language, the application loading is finished.
In the embodiment, the characteristics of the volatile memory can be utilized to completely delete the application after the execution (or loading) of the application is finished, so that compared with a common method for encrypting the stored data, the method for deleting the sensitive data is a more thorough protection means, the behavior safety of the terminal can be improved, and the data safety is also ensured to a great extent.
The following specifically exemplifies the scheme provided in the embodiment of the present invention according to different application operation mechanisms.
As an optional embodiment of the present invention, in a case that the programming language corresponding to the application is a compiled language, the application running process of the terminal (i.e. the process of the information processing method of the present invention) is:
s301: a terminal system is powered on, equipment (namely a terminal) is initialized, and a starting module (namely starting information) is loaded;
s302: a terminal connects to a network (for example, the terminal connects to a network side device through a communication module on the terminal);
s303: uploading application requirement information to network side equipment, wherein the application requirement information comprises authentication information;
s304: receiving an application file (namely application information) issued by a cloud platform (namely network side equipment);
s305: storing the application information in a power-down volatile Memory of the terminal, for example, the application information may be stored in a Random Access Memory (RAM);
s306: uploading integrity information (namely first verification information corresponding to the application information, such as hash and the like) of the application file to a cloud platform, and waiting for verification of the cloud platform;
s307: and after receiving the starting information (namely the execution instruction) sent after the cloud platform passes the verification, replying the ack message, and then running the corresponding application.
It should be noted that, in this step, loading of an application is specific to linux, and a jump from a boot area to an app (application, mobile phone software) area is specific to a terminal composed of a Micro Controller Unit (MCU);
s308: it should be noted that, since the terminal may have a power failure condition during the application running process, in the case of power failure, S309 is performed; if no power-off condition occurs, executing S310;
s309: since the application information is stored in the volatile memory, the application or program stored in the volatile memory can be automatically cleared when the terminal is powered off;
s310: and deleting the application information in the volatile memory when the application operation is finished.
As another alternative embodiment of the present invention, in the case that the application corresponding programming language is an interpreted language or a script language, the application running process of the terminal (i.e. the process of the information processing method of the present invention) can refer to fig. 3, and the differences between the two are mainly described below:
s301: the terminal system is powered on, the device (i.e. the terminal) is initialized, and the start module (i.e. the start information) is loaded, wherein in this step, different from the case of the above-mentioned "compiled language", in the case of the "interpreted language", the interpreter is also required to be loaded, and in the case of the "scripting language", the virtual machine is also required to be loaded.
S307: and after receiving the starting information (namely the execution instruction) sent after the cloud platform passes the verification, replying the ack message, and then running the corresponding application.
Note that, unlike the case of the "compiled language" described above, the step requires loading and executing an application program or a script;
s310: in this step, unlike the case of the "compiled language", the application information in the volatile memory is deleted when the application loading is completed.
It should be noted that, the remaining steps except S301, S307, and S310 can refer to fig. 3, and for avoiding redundancy, the description is not repeated.
As shown in fig. 2, reference may be made to fig. 2 for a relationship between a terminal and a network-side device (i.e., a cloud platform) that execute the information processing method according to the embodiment of the present invention, where the cloud platform may store and control terminal applications (i.e., application information), issue the terminal applications to the terminal, store the terminal applications issued by the cloud platform in a volatile memory, and execute the applications according to an execution instruction issued by the cloud platform.
The terminal in the embodiment of the invention can be divided into a terminal of a compiling type language, a terminal of an explaining type language and a terminal of a script language according to different application execution modes. The terminal can include the following key modules:
an initialization module: for initializing the device;
wherein, in the case that the terminal application is a compiled language, the initialization module can be specifically used for loading and starting the application management module (i.e. loading and starting information);
the initialization module can be specifically used for loading and starting the application management module and the interpreter under the condition that the terminal application is the interpreted language;
and under the condition that the terminal application is a script language, the initialization module can be specifically used for loading and starting the application management module and the virtual machine module.
(II) an application management module: starting the platform communication module, uploading terminal authentication information by using the platform communication module, waiting for the issuing of the platform application, and starting the application after the integrity and the validity of the application are verified
Wherein, in case that the terminal application is a compiled language, the application management module is specifically configured to: aiming at the loading of the application of systems such as linux, the module is bootloader module for the terminal formed by mcu, and the starting is the jump from the bootloader area to the application area;
in the case that the terminal application is an interpreted language or a script language, the application management module is specifically configured to execute a corresponding program or script.
(III) platform communication module: the system is used for establishing connection and communication with the platform and downloading the application.
(IV) an application loading module:
under the condition that the terminal application is a compiling language, the application loading module is used for storing the application file issued from the platform to a volatile storage area (such as a RAM), and emptying the volatile storage area in time after the application execution is finished;
under the condition that the terminal application is an interpreted language and a scripting language, the application loading module is used for storing the application program or the script issued from the platform into a volatile storage area (such as a RAM), and deleting the application program or the script in time after the application loading is finished.
It should be noted that, in the case that the terminal application is an interpreted language, the terminal may further include an interpreter configured to execute a corresponding application program;
under the condition that the terminal application is a script language, the terminal can further comprise a virtual machine module for executing a corresponding script.
According to the information processing method, the application is not stored in the nonvolatile storage area of the terminal any more, but is issued to the terminal through the cloud platform after the equipment (namely the terminal) is powered on, and is loaded and executed in the volatile storage area of the terminal, so that the corresponding application program automatically disappears after the equipment is powered off, and the safety capability is improved; the terminal is no longer used as an independent application carrier but is an application executor of the cloud platform, the cloud platform has a control right for the terminal to run the application, and the terminal can not be separated from the management of the cloud platform to execute the third-party application, so that the safety is improved.
As shown in fig. 4, an information processing method according to an embodiment of the present invention is applied to a network device, and includes:
step 401, receiving application requirement information sent by a terminal.
It should be noted that the application requirement information may include authentication information, and may also include terminal identification information, where the terminal identification information may include identity information and grouping information of a terminal, and the like.
Step 402, sending application information to the terminal according to the application requirement information.
In this step, the cloud platform (i.e., the network side device) may be used to issue (i.e., transmit) the application (i.e., the application information corresponding to the application) to the terminal (e.g., the embedded terminal), so that the terminal has higher security, and the control capability of the network side device on the terminal is also enhanced.
For example, in an optional embodiment of the present invention, for a part of systems that have strong requirements for network functions and do not need high start speed, technologies such as 5G, WIFI6, and the like that have characteristics of low latency and high speed, and the like, may be used to ensure that an application can be quickly downloaded from a cloud platform to an embedded terminal.
Step 403, in case that the integrity verification of the application information passes, sending an execution instruction for the application information to the terminal;
and the execution instruction is used for indicating the terminal to execute the application corresponding to the application information.
In this embodiment, the application information is stored in the cloud platform (i.e., the network-side device) instead of being stored locally in the terminal, and the cloud platform can issue the application information to the terminal and control the terminal to execute the application corresponding to the application information, so that the control issued by the cloud platform on the application can be ensured, the behavior safety of the terminal is improved, and the data safety is ensured to a great extent.
Optionally, the application requirement information includes authentication information;
wherein, the sending the application information to the terminal according to the application demand information includes:
verifying the terminal according to the authentication information to obtain a first verification result;
and sending application information to the terminal under the condition that the first verification result indicates that the verification is passed.
In this embodiment, after the network side device is connected to the terminal, the application requirement information sent by the terminal may be received, where the application requirement information includes authentication information, and the terminal may be verified according to the authentication information, that is, the credibility of the terminal is verified.
Optionally, the application requirement information further includes terminal identification information;
wherein the sending of the application information to the terminal includes:
and sending application information corresponding to the terminal identification information to the terminal according to the terminal identification information.
In this embodiment, the network side device may store the binding relationship between the terminal and the application information, and further, the network side device may retrieve the application file (i.e., the application information) corresponding to the terminal according to the terminal identification information (i.e., the identity information and the grouping information of the terminal, etc.).
Note that the binding relationship between the terminal and the application information may be set on the network-side device by an administrator.
Optionally, before sending the application information to the terminal, the information processing method further includes:
receiving first verification information corresponding to the application information sent by the terminal;
verifying the integrity of the application information according to the first verification information to obtain a second verification result;
wherein, the sending, to the terminal, an execution instruction for the application information if the integrity verification of the application information passes includes:
and sending an execution instruction to the terminal under the condition that the second verification result indicates that the integrity of the application information is verified.
In this embodiment, after receiving application integrity verification information (i.e., first verification information) sent by the terminal, the network side device may verify the integrity of the application information, and issue an application execution instruction to the terminal after the verification is passed.
Optionally, after sending an execution instruction for the application information to the terminal, the information processing method further includes:
and receiving ack information sent by the terminal.
In this embodiment, after receiving the execution instruction sent by the network side device, the terminal replies an ack message to the network side device, where the ack message indicates that the execution instruction has been received.
As shown in fig. 5, the scheme provided in the embodiments of the present application is specifically illustrated below.
S501: waiting for the terminal to connect;
s502: receiving application requirement information of the terminal after connection, wherein the application requirement information comprises authentication information, and verifying the credibility of the terminal according to the authentication information;
s503: judging whether the authentication is successful (namely whether the verification is passed); if yes, executing S505; if not, executing S504;
s504: disconnecting from the terminal;
s505: acquiring identity information, grouping information and the like of a terminal;
it should be noted that the application requirement information further includes terminal identification information, and the terminal identification information may include identity information, grouping information, and the like of the terminal.
S506: according to the binding relationship between the terminal and the application information, the application file (namely the application information) corresponding to the terminal can be retrieved according to the identity information and the grouping information;
it should be noted that the binding relationship between the terminal and the application information may be set on the network side device by an administrator.
S507: the application file is sent to a terminal to wait for the transmission to be completed; if the application is issued by a plurality of applications, a sequential issuing mode can be adopted;
s508: acquiring application integrity verification information (namely first verification information) sent after the transmission of the terminal is finished, and verifying the integrity of the application information;
s509: judging whether the integrity verification passes; if yes, go to S510; otherwise, executing S507;
s510: and issuing an application execution instruction to the terminal after the verification is passed, and waiting for ack information replied by the terminal.
As an optional embodiment of the present invention, the cloud platform (i.e., the network side device) in the information processing method may include the following modules: the terminal communication module is used for connecting with a terminal and sending and receiving data; the authentication module is used for verifying the authentication information sent by the terminal and also acquiring the terminal identification information (such as identity information, grouping information and the like) of the terminal so as to perform corresponding identity identification; an application storage module, configured to store a terminal application package (i.e., application information) uploaded by a user (e.g., an administrator); and the application management module is used for binding and setting the terminals with different terminal identification information and different terminal application software (namely application information) and providing the capability that a user (such as an administrator) with modification authority can modify (such as modifying the binding setting).
In the information processing method of the embodiment, the network side device can send the application information and the execution instruction for executing the application to the terminal, so that the terminal does not need to store the application information locally at the terminal, and receives the application information from the network side device if necessary, so that the terminal is only used as an application executor of the network side device, the network side device can realize effective control over the application or program on the terminal, the control capability of the network side device on the terminal is enhanced, and when the terminal is powered off, the application or program stored in the volatile memory can be automatically cleared, and the security is higher.
As shown in fig. 6, a terminal 600 according to an embodiment of the present invention includes a processor 610 and a transceiver 620, wherein,
the transceiver 620 is configured to send application requirement information to a network side device;
the processor 610 is configured to receive application information fed back by the network side device according to the application requirement information, and store the application information in a volatile memory of the terminal;
the processor 610 is further configured to run an application corresponding to the application information when receiving an execution instruction for the application information sent by the network-side device.
Optionally, the application requirement information includes authentication information and terminal identification information.
Optionally, before the processor 610 is configured to send the application requirement information to the network side device, it is further specifically configured to:
carrying out system initialization operation;
wherein the system initialization operation comprises any one of:
loading starting information;
loading starting information and a virtual machine;
the startup information and interpreter are loaded.
Optionally, before the processor 610 is configured to run the application corresponding to the application information, it is further specifically configured to:
sending first verification information corresponding to the application information to the network side equipment; the first verification information is used for verifying the integrity of the application information by the network side equipment;
and receiving the execution instruction sent by the network side equipment according to the first verification information.
Optionally, after the processor 610 is configured to receive the execution instruction sent by the network side device according to the first verification information, the processor is further specifically configured to:
and sending acknowledgement character ack information to the network side equipment.
Optionally, the processor 610 is further configured to:
deleting the application information stored in the volatile memory under the condition that a preset condition is met;
wherein the preset condition comprises at least one of the following:
the terminal is powered off;
under the condition that the programming language corresponding to the application is a compiled language, the application operation is finished;
and under the condition that the programming language corresponding to the application is an interpreted language or a script language, the application loading is finished.
According to the terminal of the embodiment, the application is not stored in the nonvolatile storage area of the terminal any more, but is issued to the terminal through the cloud platform after the device (namely the terminal) is powered on, and is loaded and executed in the volatile storage area of the terminal, so that the corresponding application program automatically disappears after the device is powered off, and the safety capability is improved; the terminal is no longer used as an independent application carrier but is an application executor of the cloud platform, the cloud platform has a control right on the operation of the terminal, and the terminal can not be separated from the management of the cloud platform to execute third-party application, so that the safety is improved.
As shown in fig. 7, a network side device 700 according to an embodiment of the present invention includes a processor 710 and a transceiver 720, wherein,
the transceiver 720 is configured to receive application requirement information sent by a terminal;
the processor 710 is configured to send application information to the terminal according to the application requirement information;
the transceiver 720 is further configured to send an execution instruction for the application information to the terminal if the integrity verification of the application information passes;
and the execution instruction is used for instructing the terminal to execute the application corresponding to the application information.
Optionally, the application requirement information includes authentication information;
when the processor 710 is configured to send the application information to the terminal according to the application requirement information, the processor is further specifically configured to:
verifying the terminal according to the authentication information to obtain a first verification result;
and sending application information to the terminal under the condition that the first verification result indicates that the verification is passed.
Optionally, the application requirement information further includes terminal identification information;
when the processor 710 is configured to send the application information to the terminal, the processor is further specifically configured to:
and sending application information corresponding to the terminal identification information to the terminal according to the terminal identification information.
Optionally, before the processor 710 is configured to send the application information to the terminal, the processor is further specifically configured to:
receiving first verification information corresponding to the application information sent by the terminal;
verifying the integrity of the application information according to the first verification information to obtain a second verification result;
wherein, when the processor 710 is configured to send an execution instruction for the application information to the terminal under the condition that the integrity verification of the application information passes, the processor is further specifically configured to:
and sending an execution instruction to the terminal under the condition that the second verification result indicates that the integrity of the application information is verified to pass.
Optionally, the processor 710 is further specifically configured to, after sending the execution instruction for the application information to the terminal:
and receiving ack information sent by the terminal.
In the network side device of the embodiment, the network side device can send the application information and the execution instruction for executing the application to the terminal, so that the terminal does not need to store the application information locally at the terminal, and receives the application information from the network side device if necessary, and thus, the terminal is only used as an application executor of the network side device, the network side device can realize effective control of the application or program on the terminal, the control capability of the network side device on the terminal is enhanced, and when the terminal is powered off, the application or program stored in the volatile memory can be automatically cleared, and the security is higher.
As shown in fig. 8, an information processing apparatus according to an embodiment of the present invention is applied to a terminal, and includes:
a requirement sending module 810, configured to send application requirement information to a network side device;
a first processing module 820, configured to receive application information fed back by the network side device according to the application requirement information, and store the application information in a volatile memory of the terminal;
an application running module 830, configured to run an application corresponding to the application information when receiving an execution instruction for the application information sent by the network-side device.
Optionally, the application requirement information includes authentication information and terminal identification information.
Optionally, the information processing apparatus further includes:
the initialization module is used for carrying out system initialization operation;
wherein the system initialization operation comprises any one of:
loading starting information;
loading starting information and a virtual machine;
the startup information and interpreter are loaded.
Optionally, the information processing apparatus further includes:
a first sending module, configured to send first verification information corresponding to the application information to the network side device; the first verification information is used for verifying the integrity of the application information by the network side equipment;
and the instruction receiving module is used for receiving the execution instruction sent by the network side equipment according to the first verification information.
Optionally, the information processing apparatus further includes:
and the second sending module is used for sending the acknowledgement character ack information to the network side equipment.
Optionally, the information processing apparatus further includes:
the deleting module is used for deleting the application information stored in the volatile memory under the condition that a preset condition is met;
wherein the preset condition comprises at least one of the following:
the terminal is powered off;
under the condition that the programming language corresponding to the application is a compiled language, the application operation is finished;
and under the condition that the programming language corresponding to the application is an interpreted language or a script language, the application loading is finished.
In the information processing apparatus of this embodiment, the application is no longer stored in the nonvolatile storage area of the terminal, but is issued to the terminal through the cloud platform after the device (i.e., the terminal) is powered on, and is loaded and executed in the volatile storage area of the terminal, so that the corresponding application program automatically disappears after the device is powered off, and the security capability is improved; the terminal is no longer used as an independent application carrier but is an application executor of the cloud platform, the cloud platform has a control right for the terminal to run the application, and the terminal can not be separated from the management of the cloud platform to execute the third-party application, so that the safety is improved.
As shown in fig. 9, an information processing apparatus according to an embodiment of the present invention, applied to a network device, includes
A requirement receiving module 910, configured to receive application requirement information sent by a terminal;
an application sending module 920, configured to send application information to the terminal according to the application requirement information;
an instruction sending module 930, configured to send, to the terminal, an execution instruction for the application information if the integrity verification of the application information passes;
and the execution instruction is used for instructing the terminal to execute the application corresponding to the application information.
Optionally, the application requirement information includes authentication information;
wherein, the application sending module 920 includes:
the verification unit is used for verifying the terminal according to the authentication information to obtain a first verification result;
and the sending unit is used for sending the application information to the terminal under the condition that the first verification result indicates that the verification is passed.
Optionally, the application requirement information further includes terminal identification information;
wherein the transmitting unit includes:
and the sending subunit is configured to send, to the terminal, application information corresponding to the terminal identification information according to the terminal identification information.
Optionally, the information processing apparatus further includes:
the verification receiving module is used for receiving first verification information corresponding to the application information sent by the terminal;
the verification processing module is used for verifying the integrity of the application information according to the first verification information to obtain a second verification result;
the instruction sending module 930 includes:
and the instruction sending unit is used for sending an execution instruction to the terminal under the condition that the second verification result indicates that the integrity verification of the application information passes.
Optionally, the information processing apparatus further includes:
and the information receiving module is used for receiving the ack information sent by the terminal.
In the information processing apparatus of this embodiment, the network-side device can send the application information and the execution instruction for executing the application to the terminal, so that the terminal does not need to store the application information locally at the terminal, and receives the application information from the network-side device if necessary.
A terminal according to another embodiment of the present invention, as shown in fig. 10, includes a transceiver 1010, a processor 1000, a memory 1020, and a program or instructions stored in the memory 1020 and executable on the processor 1000; the processor 1000 implements the above-described method applied to information processing when executing the program or the instructions.
The transceiver 1010 is used for receiving and transmitting data under the control of the processor 1000.
Where in fig. 10, the bus architecture may include any number of interconnected buses and bridges, with various circuits being linked together, particularly one or more processors represented by processor 1000 and memory represented by memory 1020. The bus architecture may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. The bus interface provides an interface. The transceiver 1010 may be a number of elements including a transmitter and a receiver that provide a means for communicating with various other apparatus over a transmission medium. The user interface 1030 may also be an interface capable of interfacing with a desired device for different user devices, including but not limited to a keypad, display, speaker, microphone, joystick, etc.
The processor 1000 is responsible for managing the bus architecture and general processing, and the memory 1020 may store data used by the processor 1000 in performing operations.
A network-side device according to another embodiment of the present invention, as shown in fig. 11, includes a transceiver 1110, a processor 1100, a memory 1120, and a program or instructions stored in the memory 1120 and executable on the processor 1100; the processor 1100 implements the above-described method applied to information processing when executing the program or instructions.
The transceiver 1110 is used for receiving and transmitting data under the control of the processor 1100.
Where in fig. 11, the bus architecture may include any number of interconnected buses and bridges, with one or more processors, represented by processor 1100, and various circuits, represented by memory 1120, being linked together. The bus architecture may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. The bus interface provides an interface. The transceiver 1110 may be a number of elements including a transmitter and a receiver that provide a means for communicating with various other apparatus over a transmission medium. The processor 1100 is responsible for managing the bus architecture and general processing, and the memory 1120 may store data used by the processor 1100 in performing operations.
The readable storage medium of the embodiment of the present invention stores a program or an instruction thereon, and the program or the instruction, when executed by the processor, implements the steps in the information processing method described above, and can achieve the same technical effects, and the details are not repeated here to avoid repetition. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It is further noted that the terminals described in this specification include, but are not limited to, smart phones, tablets, etc., and that many of the functional components described are referred to as modules in order to more particularly emphasize their implementation independence.
In embodiments of the present invention, modules may be implemented in software for execution by various types of processors. An identified module of executable code may, for instance, comprise one or more physical or logical blocks of computer instructions which may, for instance, be constructed as an object, procedure, or function. Nevertheless, the executables of an identified module need not be physically located together, but may comprise disparate instructions stored in different bits which, when joined logically together, comprise the module and achieve the stated purpose for the module.
Indeed, a module of executable code may be a single instruction, or many instructions, and may even be distributed over several different code segments, among different programs, and across several memory devices. Similarly, operational data may be identified within modules, and may be embodied in any suitable form and organized within any suitable type of data structure. The operational data may be collected as a single data set, or may be distributed over different locations including over different storage devices, and may exist, at least partially, merely as electronic signals on a system or network.
When a module can be implemented by software, considering the level of hardware technology, a module implemented in software may build a corresponding hardware circuit to implement corresponding functions, without considering the cost, and the hardware circuit may include a conventional Very Large Scale Integration (VLSI) circuit or a gate array and an existing semiconductor such as a logic chip, a transistor, or other discrete components. A module may also be implemented in programmable hardware devices such as field programmable gate arrays, programmable array logic, programmable logic devices or the like.
The exemplary embodiments described above are described with reference to the drawings, and many different forms and embodiments of the invention may be made without departing from the spirit and teachings of the invention, and therefore, the invention should not be construed as limited to the exemplary embodiments set forth herein. Rather, these exemplary embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. In the drawings, the size and relative sizes of elements may be exaggerated for clarity. The terminology used herein is for the purpose of describing particular example embodiments only and is not intended to be limiting. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. Unless otherwise indicated, a range of values, when stated, includes the upper and lower limits of the range and any subranges therebetween.
While the foregoing is directed to the preferred embodiment of the present invention, it will be understood by those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (18)

1. An information processing method applied to a terminal is characterized by comprising the following steps:
sending application requirement information to network side equipment;
receiving application information fed back by the network side equipment according to the application demand information, and storing the application information into a volatile memory of the terminal;
and under the condition of receiving an execution instruction aiming at the application information, which is sent by the network side equipment, running the application corresponding to the application information.
2. The information processing method according to claim 1, wherein the application requirement information includes authentication information and terminal identification information.
3. The information processing method according to claim 1, wherein before sending the application requirement information to the network-side device, the information processing method further comprises:
carrying out system initialization operation;
wherein the system initialization operation comprises any one of:
loading starting information;
loading starting information and a virtual machine;
the startup information and interpreter are loaded.
4. The information processing method according to claim 1, wherein before the application corresponding to the application information is executed, the information processing method further comprises:
sending first verification information corresponding to the application information to the network side equipment; the first verification information is used for verifying the integrity of the application information by the network side equipment;
and receiving the execution instruction sent by the network side equipment according to the first verification information.
5. The information processing method according to claim 4, wherein after receiving the execution instruction transmitted by the network-side device according to the first authentication information, the information processing method further comprises:
and sending acknowledgement character ack information to the network side equipment.
6. The information processing method according to claim 1, further comprising:
deleting the application information stored in the volatile memory under the condition that a preset condition is met;
wherein the preset condition comprises at least one of the following:
the terminal is powered off;
under the condition that the programming language corresponding to the application is a compiled language, the application operation is finished;
and under the condition that the programming language corresponding to the application is an interpreted language or a script language, the application loading is finished.
7. An information processing method is applied to network side equipment, and is characterized by comprising the following steps:
receiving application demand information sent by a terminal;
sending application information to the terminal according to the application demand information;
sending an execution instruction aiming at the application information to the terminal under the condition that the integrity verification of the application information passes;
and the execution instruction is used for indicating the terminal to execute the application corresponding to the application information.
8. The information processing method of claim 7, wherein the application requirement information includes authentication information;
wherein, the sending the application information to the terminal according to the application demand information includes:
verifying the terminal according to the authentication information to obtain a first verification result;
and sending application information to the terminal under the condition that the first verification result indicates that the verification is passed.
9. The information processing method according to claim 8, wherein the application requirement information further includes terminal identification information;
wherein the sending of the application information to the terminal includes:
and sending application information corresponding to the terminal identification information to the terminal according to the terminal identification information.
10. The information processing method according to claim 7, wherein before transmitting application information to the terminal, the information processing method further comprises:
receiving first verification information corresponding to the application information sent by the terminal;
verifying the integrity of the application information according to the first verification information to obtain a second verification result;
wherein, the sending, to the terminal, an execution instruction for the application information if the integrity verification of the application information passes includes:
and sending an execution instruction to the terminal under the condition that the second verification result indicates that the integrity of the application information is verified to pass.
11. The information processing method according to claim 7, wherein after transmitting an execution instruction for the application information to the terminal, the information processing method further comprises:
and receiving ack information sent by the terminal.
12. An information processing apparatus applied to a terminal, comprising:
the demand sending module is used for sending application demand information to the network side equipment;
the first processing module is used for receiving application information fed back by the network side equipment according to the application demand information and storing the application information into a volatile memory of the terminal;
and the application running module is used for running the application corresponding to the application information under the condition of receiving the execution instruction aiming at the application information sent by the network side equipment.
13. An information processing apparatus applied to a network side device, comprising
The demand receiving module is used for receiving application demand information sent by the terminal;
the application sending module is used for sending application information to the terminal according to the application demand information;
the instruction sending module is used for sending an execution instruction aiming at the application information to the terminal under the condition that the integrity verification of the application information passes;
and the execution instruction is used for instructing the terminal to execute the application corresponding to the application information.
14. A terminal, comprising: a transceiver and a processor;
the transceiver is used for sending application requirement information to network side equipment;
the processor is used for receiving application information fed back by the network side equipment according to the application demand information and storing the application information into a volatile memory of the terminal;
the processor is further configured to run an application corresponding to the application information when receiving an execution instruction for the application information sent by the network side device.
15. A network-side device, comprising: a transceiver and a processor;
the transceiver is used for receiving application requirement information sent by a terminal;
the processor is used for sending application information to the terminal according to the application demand information;
the transceiver is further used for sending an execution instruction for the application information to the terminal if the integrity verification of the application information passes;
and the execution instruction is used for indicating the terminal to execute the application corresponding to the application information.
16. A terminal, comprising: a transceiver, a processor, a memory, and a program or instructions stored on the memory and executable on the processor; characterized in that the processor implements the information processing method according to any one of claims 1 to 6 when executing the program or instructions.
17. A network-side device, comprising: a transceiver, a processor, a memory, and a program or instructions stored on the memory and executable on the processor; characterized in that the processor implements the information processing method according to any one of claims 7 to 11 when executing the program or instructions.
18. A readable storage medium on which a program or instructions are stored, characterized in that the program or instructions, when executed by a processor, implement the steps in the information processing method of any one of claims 1 to 6, or implement the steps in the information processing method of any one of claims 7 to 11.
CN202110759703.2A 2021-07-06 2021-07-06 Information processing method and device, terminal and network side equipment Pending CN115577398A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110759703.2A CN115577398A (en) 2021-07-06 2021-07-06 Information processing method and device, terminal and network side equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110759703.2A CN115577398A (en) 2021-07-06 2021-07-06 Information processing method and device, terminal and network side equipment

Publications (1)

Publication Number Publication Date
CN115577398A true CN115577398A (en) 2023-01-06

Family

ID=84579734

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110759703.2A Pending CN115577398A (en) 2021-07-06 2021-07-06 Information processing method and device, terminal and network side equipment

Country Status (1)

Country Link
CN (1) CN115577398A (en)

Similar Documents

Publication Publication Date Title
CN109542518B (en) Chip and method for starting chip
US11221838B2 (en) Hot update method, operating system, terminal device, system, and computer-readable storage medium for a system process
RU2542930C2 (en) Booting and configuring subsystem securely from non-local storage
CN109815683B (en) Authority verification method and related device
US10657260B2 (en) Electronic devices and methods supporting unsecured system-on-chip secure boot functionalities
CN102063591B (en) Methods for updating PCR (Platform Configuration Register) reference values based on trusted platform
US20140041036A1 (en) Assessing the resistance of a security module against attacks by communication pipe diversion
CN112714158B (en) Transaction processing method, relay network, cross-link gateway, system, medium and equipment
US20160004648A1 (en) Data erasing apparatus, data erasing method, and computer-readable storage medium
CN104199654A (en) Open platform calling method and device
CN103019837A (en) Resource scheduling method, device and terminal equipment
CN110209416A (en) Application software update method, device, terminal and storage medium
US7437563B2 (en) Software integrity test
CN110390201A (en) The method of computer system and initializing computer system
CN114969713A (en) Equipment verification method, equipment and system
CN112000382A (en) Linux system starting method and device and readable storage medium
CN108920962B (en) Firmware downloading and signing checking method, firmware publishing method, mobile terminal and server
KR101575021B1 (en) Mobile terminal for executing integrity verification and controll method thereof
CN101807237B (en) Signature method and device
CN106293962B (en) Method and device for calling system command
CN104796532A (en) Method and device for destroying mobile terminal
CN112637167A (en) System login method and device, computer equipment and storage medium
US11768943B2 (en) Secure element and method for starting an application by a low-level operating system
CN115577398A (en) Information processing method and device, terminal and network side equipment
CN102831468A (en) Intelligent card chip of mobile terminal as well as initialization and use method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination