WO2010078679A1 - Upgrading method, downloading tool and terminal - Google Patents

Upgrading method, downloading tool and terminal Download PDF

Info

Publication number
WO2010078679A1
WO2010078679A1 PCT/CN2008/073835 CN2008073835W WO2010078679A1 WO 2010078679 A1 WO2010078679 A1 WO 2010078679A1 CN 2008073835 W CN2008073835 W CN 2008073835W WO 2010078679 A1 WO2010078679 A1 WO 2010078679A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
version identifier
lock
downloading
tool
Prior art date
Application number
PCT/CN2008/073835
Other languages
French (fr)
Chinese (zh)
Inventor
李夏忠
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to PCT/CN2008/073835 priority Critical patent/WO2010078679A1/en
Publication of WO2010078679A1 publication Critical patent/WO2010078679A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Definitions

  • the present invention relates to the field of communications, and in particular, to an upgrade method, a download tool, and a terminal.
  • WiMAX Worldwide Interoperability for Microwave Access
  • IEEE Institute for Electrical and Electronic Engineers
  • BWA Broadband Wireless Access
  • WiMAX is a wireless metropolitan area network (WMAN) technology, a new air interface standard proposed for the 4 start and millimeter wave bands. WiMAX can be used to connect 802.11a wireless access hotspots to the Internet and connect environments such as corporate and home to wired backbones. In addition, WiMAX can also be used as a wireless extension technology for cable and Digital Subscriber Line (DSL) to achieve wireless broadband access.
  • DSL Digital Subscriber Line
  • the WiMAX terminal is generally customized and sent to the user by the operator. Therefore, the operator has a lock network requirement for the terminal product, that is, the network parameter of the terminal can only be the parameter provided by the operator, and the operator also hopes The mobile terminal can perform parameter judgment on the above requirements to ensure the interests of the operator.
  • the present invention has been made in view of the problem of low security of a software version in a software downloading process in the related art. Therefore, the main object of the present invention is to provide an improved security upgrade scheme for a terminal to solve the related art. The above problem.
  • an upgrade method for implementing software upgrade of a terminal.
  • the upgrade method according to the present invention includes: the downloading tool of the PC side downloads the legality of the downloading tool through the terminal before the sending of the upgrade instruction to the terminal; if the downloading tool is legal, and the downloading tool determines the first lock network pre-saved in the terminal.
  • the version identifier is the same as the second lock network version identifier of the software to be downloaded on the PC side, and the download tool downloads the software to be downloaded to the terminal.
  • the processing of the downloading tool confirming the legality of the downloading tool by the terminal includes: the downloading tool sends a specific legal command negotiated with the terminal to the terminal; and the terminal receives the specific legal command, and confirms that the downloading tool is legal.
  • the method further includes: the terminal dividing the memory into the first area and the second area, where the second area is used to store the first lock network version identifier .
  • the method further includes: downloading the tool to acquire the first lock net version identifier stored by the terminal in the second area, and acquiring the locally saved second Lock network version identifier.
  • a downloading tool is provided.
  • the downloading tool includes: a sending module, configured to send a specific legal command negotiated with the terminal to the terminal before sending the upgrade command to the terminal, so as to enable the terminal to verify the legality of the downloading tool; Whether the first lock net version identifier pre-stored in the detecting terminal is the same as the second lock net version identifier of the software to be downloaded on the PC side; and the downloading module is configured to determine the first lock net version identifier and the second lock net version in the detecting module When the logo is the same, download the software to be downloaded to the terminal.
  • the foregoing detection module further includes: an obtaining module, configured to acquire a first lock network version identifier of the terminal, and obtain a locally saved second lock network version identifier.
  • the downloading tool may further include: a control module, configured to: when the detecting module determines that the first lock net version identifier and the second lock net version identifier are the same, enable the download module, and determine, by the detecting module, the first lock network In case the version identifier and the second lock network version identifier are different, the module can be downloaded.
  • a control module configured to: when the detecting module determines that the first lock net version identifier and the second lock net version identifier are the same, enable the download module, and determine, by the detecting module, the first lock network In case the version identifier and the second lock network version identifier are different, the module can be downloaded.
  • the terminal includes: a verification module, configured to verify the validity of the downloading tool on the PC side; and a memory, configured to store the first lock network version identifier of the terminal, so that the downloading tool determines the first lock network version identifier and Whether the second lock network version identifier of the software to be downloaded on the PC side is the same.
  • the foregoing memory further includes: a dividing module, configured to divide the memory into the first area and the second area, where the second area is used to store the first lock net version identifier.
  • FIG. 1 is a flowchart of a security upgrade method according to an embodiment of the present invention
  • FIG. 2 is a detailed process flowchart of a security upgrade method according to an embodiment of the present invention
  • FIG. 3 is a flowchart according to an embodiment of the present invention.
  • FIG. 4 is a block diagram of a downloading tool according to an embodiment of the present invention.
  • FIG. 5 is a block diagram of a terminal according to an embodiment of the present invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • the present invention provides a mobile terminal software security upgrade based on Flash partitioning.
  • the terminal software before receiving the download instruction sent by the PC side downloading software, the terminal software must verify the legality of the downloading tool, and in the case that the downloading tool is legal, through the downloading tool
  • the detection module checks whether the lock network version identifier in the mobile terminal is consistent with the lock network version identifier in the version to be downloaded, and upgrades the software of the terminal if the two lock network version identifiers are consistent.
  • FIG. 1 is a flowchart of a security upgrade method according to an embodiment of the present invention.
  • the terminal Before performing the processing shown in FIG. 1, the terminal first needs to The memory is divided into two areas: a first area and a second area, and uses the lock network version identifier of the second area storage terminal (ie, the first lock network version identifier). After the terminal performs the foregoing processing, the memory may be executed as shown in the figure. The processing shown in FIG.
  • Step S102 Before the PC side downloading tool sends the upgrade command to the terminal, the legality of the downloading tool is verified by the terminal-supplied certificate; when the terminal performs the legality check of the downloading tool, If the terminal is able to receive the specific legal command that is sent by the downloading tool and negotiates with the terminal, the terminal confirms that the downloading tool is legal.
  • Step S104 If the terminal determines that the downloading tool is legal, the downloading tool acquires the first pre-saved in the terminal.
  • the lock network version identifier and the second lock network version identifier of the software to be downloaded on the PC side after the acquisition, the download tool can Determining whether the acquired first lock network version identifier is the same as the second lock network version identifier; Step S106: If the download tool is legal, and the download tool determines that the first lock network version identifier is the same as the second lock network version identifier, The downloading software is downloaded to the terminal; if the downloading tool determines that the first lock network version identifier is different from the second lock network version identifier, downloading the software to be downloaded to the terminal is prohibited.
  • Step S202 the WiMAX terminal software can use the Flash driver 4 to execute the entire Flash. Zone or divide into two zones or.
  • the Flash driver divides the Flash area into a first part (the first area) and a second part (the second area), wherein the second part is used to retain the first lock version identifier.
  • the first part is much larger than the second part, for example, a 4M Flash area or a second part only accounts for the last 8K.
  • Step S204 Before receiving the upgrade command (download), the WiMAX terminal software must first verify the legality of the downloading tool. Only after determining that the downloading tool is legal, the processing of step S206 can be performed, wherein determining the legality of the downloading tool needs to pass The downloading tool actively sends a pre-negotiated specific command (ie, the above-mentioned specific legal command negotiated with the terminal) to the terminal before executing the download command, for example, an Unlock command, a WiMAX Unlock command, and the like.
  • a pre-negotiated specific command ie, the above-mentioned specific legal command negotiated with the terminal
  • Step S206 if the terminal determines that the downloading tool is legal (that is, receives a legal verification instruction of the downloading tool), the downloading tool may use the detecting module to identify the lock network version in the terminal (the first lock network version identifier).
  • the detection module in the download tool compares the two values (the first lock net version identifier and the second lock net version identifier), and if the first lock net version identifier and the second lock net version identifier are the same, the second re-calibration If the first lock net version identifier and the second lock net version identifier are different, the school-failure fails, and the download tool does not perform the download upgrade (corresponding to step S104 in FIG. 1).
  • Step S208 in a case where both the first re-check and the second re-check performed in step S204 and step S206 are passed, the downloading tool upgrades the software of the terminal (corresponding to step S106 in FIG. 1).
  • WiMAX Code Division Multiple Access
  • CDMA Code Division Multiple Access
  • GSM Global System for Mobile Communication
  • PHS Packet Handling Switching
  • WCDMA Wideband Code Division Multiple Access
  • the software of the lock network version can be upgraded according to the above technical solution according to the embodiment of the present invention, and the single-mode/multi-mode wireless access terminal product can be upgraded.
  • the security of the downloading software is ensured by the double check of the downloading tool and the software to be upgraded.
  • the technical solution according to the embodiment of the present invention has the advantages of convenient use, wide application range and simpleness. The advantages of easy.
  • Embodiment 1 of the present invention provides a downloading tool for implementing a method for upgrading a terminal software according to an embodiment of the present invention.
  • FIG. 4 is a block diagram of a downloading tool according to an embodiment of the present invention. 4, comprising
  • the sending module 40 is configured to send a specific legal command negotiated with the terminal, such as an Unlock command, a WiMAX Unlock command, etc., to enable the terminal to confirm the legality of the downloading tool before sending the download command to the terminal. If the terminal receives a specific legal command, it can confirm that the downloading tool is legal (ie, perform the first re-calibration- ⁇ ); after the terminal confirms that the downloading tool is legal, the downloading tool legal verification instruction is sent to the receiving module 48.
  • a specific legal command negotiated with the terminal, such as an Unlock command, a WiMAX Unlock command, etc.
  • the detecting module 42 is connected to the receiving module 48, and configured to detect whether the first lock net version identifier pre-stored in the terminal is the same as the second lock net version identifier of the PC side to be downloaded software when the terminal determines that the download tool is legal ( That is, before the detection module 42 performs the detection, the acquisition module in the detection module 42 needs to acquire the first lock network version identifier stored by the terminal, and obtain the locally saved second lock network version identifier, The detection module 42 performs detection.
  • the first lock net version identifier is retained in a fixed position of the last 8K of the FLASH, and the value of the mobile terminal and the to-be-downloaded version in the same position can be directly read by the obtaining module (the first lock net version identifier and the second lock) Web version identifier).
  • the downloading module 44 is connected to the control module 46 for receiving the control of the control module 46 (ie, the detecting module determines that the pre-saved first lock net version identifier is the same as the second lock net version identifier of the PC side to be downloaded software). B), download the software to be downloaded to the terminal.
  • the control module 46 is connected to the detecting module 42 and the downloading module 44, for enabling the downloading module 44 when the detecting module 42 determines that the first lock net version identifier is the same as the second lock net version identifier, and the detecting module 42 determines In the case where a lock network version identifier is different from the second lock network version identifier, the module 44 can be downloaded.
  • the qualified downloading tool performs the second re-verification of the software to be downloaded, thereby ensuring the security of the software downloading.
  • Apparatus Embodiment 2 According to an embodiment of the present invention, a terminal is provided. FIG.
  • a terminal according to an embodiment of the present invention includes a verification module 50 and a memory. 52, and a partitioning module in the memory 52 (not shown in the figure). In the following, each module in the terminal will be described in detail.
  • the verification module 50 in the terminal is configured to verify the validity of the download tool on the PC side (ie, perform the first re-check); preferably, when the verification module 50 performs the first re-check, download The tool will actively send a pre-negotiated specific command (ie, a specific legal command negotiated with the terminal) to the terminal before executing the download command, for example, an Unlock command, a WiMAX Unlock command, and the like.
  • a pre-negotiated specific command ie, a specific legal command negotiated with the terminal
  • the verification module 50 receives a legal instruction such as this, the verification module 50 can confirm the legitimacy of the download tool.
  • the terminal further includes a memory 52 (in this example, the memory 52 is preferably a flash memory) and a partitioning module in the memory 52.
  • the partitioning module first needs to divide the entire memory 52 area into two by the driver. As shown in FIG. 3, the partitioning module divides the memory 52 into a first part (a first area) and a second part (a second area), wherein the second part is used to retain the first lock network version identifier, Moreover, in the actual division process, the first part is much larger than the second part, for example, a 4M Flash, and the second part only accounts for the last 8K.
  • the software is running normally, the reading and writing of the parameters are performed in the first part; and the second part is only used as a backup area of the first lock network version identification when the software is upgraded.
  • the memory 52 can be made to have a dedicated location for storing the first lock version identifier, so that the download tool can directly read the first lock stored in the second portion of the mobile terminal memory 52.
  • the network version identifier is compared with the second lock network version identifier in the same position in the to-be-downloaded version, so that the download tool can perform the second verification, that is, the first lock network version identifier and the PC are determined. Whether the second lock version identifier of the side to be downloaded software is the same.
  • the terminal according to the embodiment of the present invention may be WiMAX, CDMA, GSM, PHS, WCDMA, TD-SCDMA, and single mode/multimode wireless access with wireless access functions. terminal.
  • the term "memory” may refer to one or more devices for storing data, including read only memory (ROM), random access memory (RAM), magnetic RAM, magnetic core memory, disk storage. Media, optical storage media, flash memory devices, and/or other machine readable media for storing information.
  • embodiments may be implemented in hardware, software, firmware, middleware, microcode, hardware description languages, or a combination thereof.
  • a code segment can represent any combination of processes, functions, subroutines, programs, routines, subroutines, modules, objects, packages, classes, or instructions, data structures, or programming languages.
  • a code segment is coupled to another code segment or hardware circuit by transmitting and/or receiving information, data, arguments, or stored content. Information, arguments, parameters, data, etc. may be communicated, transmitted, or transmitted via any suitable means including memory sharing, messaging, token passing, network transmission, and the like.
  • the technical solution of the present invention by performing double verification on the downloading tool and the new version of the software, the problem of low security of the software version in the software downloading process of the related technology can be solved, and the software upgrade can be ensured.
  • the technical solution of the present invention also has the advantages of convenient use, wide application range, simple and easy operation, and provides a flexible software upgrade solution for the operator or the user, and since all the verifications are automatically performed It brings greater convenience to end users accessing WiMAX networks.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

An upgrading method, a downloading tool and a terminal are provided, which are used for upgrading the software of the terminal, wherein, the method includes that the downloading tool in PC side authenticates the validity of the downloading tool by the terminal before sending upgrading instructions to the terminal; if the downloading tool is valid, and the downloading tool also confirms that the first network locking version identification prestored in the terminal is identical to the second network locking version identification of the software to be downloaded in the PC side, then the downloading tool downloads the software to be downloaded to the terminal. With the mentioned technical solution of the present invention, it can ensure the security of the terminal software upgrading.

Description

升级方法、 下载工具以及终端  Upgrade method, download tool, and terminal
技术领域 本发明涉及通信领域, 并且特别地, 涉及一种升级方法、 下载工具以及 终端。 背景技术 在相关技术中, 波存取全球互通 ( Worldwide Interoperability for Microwave Access , 简称为 WiMAX ) 技术执行电气和电子工程师学会 ( Institute for Electrical and Electronic Engineers, 简称为 IEEE ) 802.16标准, 此夕卜, WiMAX还可以执行宽带无线接入 ( Broadband Wireless Access , 简称 为 BWA ) 标准。 TECHNICAL FIELD The present invention relates to the field of communications, and in particular, to an upgrade method, a download tool, and a terminal. BACKGROUND OF THE INVENTION In the related art, Worldwide Interoperability for Microwave Access (WiMAX) technology implements the Institute for Electrical and Electronic Engineers (IEEE) 802.16 standard, WiMAX It is also possible to implement the Broadband Wireless Access (BWA) standard.
WiMAX是一项无线城 is戈网 ( Wireless Metropolitan Area Network , 简称 为 WMAN )技术, 是针对 4啟波和毫米波频段提出的一种新的空中接口标准。 WiMAX可以用于将 802.11a无线接入热点连接到互联网,并可以连结公司与 家庭等环境至有线骨干线路。 此外, WiMAX还可以作为线缆和数字用户线 ( Digital Subscriber Line, 简称为 DSL ) 的无线扩展技术, 从而实现无线宽 带接入。 目前, WiMAX终端一般由运营商定制并发给用户的, 因此, 运营商对 终端产品具有锁网要求, 即, 使该终端的网络参数只能是 ^营商提供的参 数, 并且, 运营商还希望在移动终端能够针对上述要求进行参数判断, 保证 运营商的利益。 但是, 在软件下载过程中, 软件版本非常容易被攻击者替换, 这会导致新下载的软件对网络参数不进行判断(即, 下载了非锁网版本), 从 而使该终端可以使用其它运营商的网络参数, 给运营商带来了巨大的经济损 失。 因此必须解决软件下载过程中软件版本安全性的问题, 以避免因软件不 能够安全升级给运营商带来巨大的经济损失。 发明内容 考虑到相关技术中软件下载过程中软件版本安全性低的问题而提出本 发明, 为此, 本发明的主要目的在于提供一种改进的对终端进行安全升级方 案, 以解决相关技术中存在的上述问题。 为了实现上述目的, 根据本发明的一个方面, 提供了一种升级方法, 用 于实现对终端的软件进行升级。 根据本发明的升级方法包括: PC侧的下载工具在向终端发送升级指令 前, 通过终端 -睑证下载工具的合法性; 如果下载工具合法, 且下载工具确定 终端中预先保存的第一锁网版本标识与 PC侧待下载软件的第二锁网版本标 识相同, 则下载工具将待下载软件下载到终端。 其中, 下载工具通过终端确认下载工具的合法性的处理包括: 下载工具 向终端发送与终端协商的特定合法命令; 终端接收到特定合法命令, 则确认 下载工具合法。 此外, 在下载工具通过终端校-睑下载工具的合法性之前, 上述方法进一 步包括: 终端将其存储器划分为第一区域和第二区域, 其中, 第二区域用于 存储第一锁网版本标识。 此外 , 在确定第一锁网版本标识和第二锁网版本标识是否相同之前 , 上 述方法还包括: 下载工具获取终端在第二区域存储的第一锁网版本标识, 并 获取本地保存的第二锁网版本标识。 此外, 如果下载工具合法, 但下载工具确定第一锁网版本标识与第二锁 网版本标识不相同, 则禁止将待下载软件下载到终端。 为了实现上述目的, 根据本发明的另一方面, 提供了一种下载工具。 才艮据本发明的下载工具包括:发送模块,用于在向终端发送升级指令前, 向终端发送与终端协商的特定合法命令, 以使终端 -睑证下载工具的合法性; 检测模块, 用于检测终端中预先保存的第一锁网版本标识与 PC侧待下载软 件的第二锁网版本标识是否相同; 下载模块, 用于在检测模块确定第一锁网 版本标识和第二锁网版本标识相同的情况下, 将待下载软件下载到终端。 此外, 上述检测模块进一步包括: 获取模块, 用于获取终端的第一锁网 版本标识, 并获取本地保存的第二锁网版本标识。 此外, 上述下载工具还可以进一步包括: 控制模块, 用于在检测模块确 定第一锁网版本标识和第二锁网版本标识相同的情况下, 使能下载模块, 在 检测模块确定第一锁网版本标识和第二锁网版本标识不相同的情况下, 除能 下载模块。 为了实现上述目的, 才艮据本发明的另一方面, 提供了一种终端。 根据本发明的终端包括: 校验模块, 用于校验 PC侧的下载工具的合法 性; 存储器, 用于存储终端的第一锁网版本标识, 以使下载工具确定第一锁 网版本标识与 PC侧待下载软件的第二锁网版本标识是否相同。 此外, 上述存储器进一步包括: 划分模块, 用于将存储器划分为第一区 域和第二区域, 其中, 第二区域用于存储第一锁网版本标识。 借助于本发明的技术方案,通过对下载工具以及软件新版本进行二重校 验, 能够解决相关技术的软件下载过程中软件版本安全性低的问题, 可以保 证终端软件升级的安全性。 本发明的其它特征和优点将在随后的说明书中阐述, 并且, 部分地从说 明书中变得显而易见, 或者通过实施本发明而了解。 本发明的目的和其他优 点可通过在所写的说明书、 权利要求书、 以及附图中所特别指出的结构来实 现和获得。 附图说明 附图用来提供对本发明的进一步理解, 并且构成说明书的一部分, 与本 发明的实施例一起用于解释本发明, 并不构成对本发明的限制。 在附图中: 图 1是才艮据本发明实施例的安全升级方法的流程图; 图 2是根据本发明实施例的安全升级方法的详细处理流程图; 图 3是根据本发明实施例的存储器划分示意图; 图 4是才艮据本发明实施例的下载工具的框图; 图 5是根据本发明实施例的终端的框图。 具体实施方式 功能相克述 在相关技术中, 存在软件下载过程中软件版本安全性低的问题, 因此, 针对上述问题, 本发明提供了一种基于 Flash分块实现移动终端软件安全升 级的方法, 在本发明的技术方案中, 终端软件收到 PC侧下载软件发来的下 载指令前, 必须校验下载工具的合法性, 并在下载工具合法的情况下, 通过 下载工具中的检测模块, 检查移动终端中的锁网版本标识是否与待下载版本 中的锁网版本标识一致, 并在两个锁网版本标识一致的情况下, 对终端的软 件进行升级。 以下结合附图对本发明的优选实施例进行说明, 应当理解, 此处所描述 的优选实施例仅用于说明和解释本发明, 并不用于限定本发明。 在以下的描述中, 为了解释的目的, 描述了多个特定的细节, 以提供对 本发明的透彻理解。 然而, 艮显然, 在没有这些特定细节的情况下, 也可以 实现本发明, 此外, 在不背离所附权利要求阐明的精神和范围的情况下, 下 述实施例以及实施例中得各个细节可以进行各种组合。 方法实施例 根据本发明的实施例, 提供了一种安全升级方法, 图 1是根据本发明实 施例的安全升级方法的流程图, 在进行如图 1所示的处理之前, 终端首先需 要将其存储器划分为两个区域: 第一区域和第二区域, 并使用第二区域存储 终端的锁网版本标识(即, 第一锁网版本标识), 在终端进行上述处理后, 就 可以进行如图 1所示的处理, 包括步骤 S102 -步骤 S106: 步骤 S102, PC侧下载工具在向终端发送升级指令前, 通过终端-睑证下 载工具的合法性; 在终端进行下载工具的合法性检查时, 如果终端能够接收 到由下载工具发送的与终端协商的特定合法命令, 则终端确认下载工具为合 法的; 步骤 S104, 在终端确定下载工具合法的情况下, 下载工具获取终端中 预先保存的第一锁网版本标识与 PC侧待下载软件的第二锁网版本标识, 在 获取之后, 下载工具就可以确定获取的第一锁网版本标识与第二锁网版本标 识是否相同; 步骤 S106, 如果下载工具合法, 且下载工具在确定第一锁网版本标识 与第二锁网版本标识相同, 则将待下载软件下载到终端; 如果下载工具确定 第一锁网版本标识与第二锁网版本标识不相同, 则禁止将待下载软件下载到 终端。 下面, 结合附图, 以 WiMAX终端为例, 对本发明的上述技术方案进行 说明。 图 2是根据本发明实施例的安全升级方法的详细处理流程图, 如图 2 所示, 包括以下处理 (步骤 S202 -步骤 S208 ): 步骤 S202, WiMAX终端软件可以通过 Flash驱动程序 4巴整个 Flash区 或分成两个区或。 如图 3所示, Flash驱动程序将 Flash区或划分为第一部分 (上述第一区域)和第二部分(上述第二区域), 其中, 第二部分是用来保留 第一锁网版本标识的, 并且, 在实际的划分过程中, 第一部分比第二部分大 艮多, 例如, 一个 4M的 Flash区或, 第二部分只占最后 8K。 在软件正常运 行时, 对参数的读写均在第一部分中进行; 而第二部分只作为软件升级时第 一锁网版本标识的一个备份区域(图 2中未示出此步骤)。 步骤 S204, WiMAX终端软件收到升级指令 ( download )前, 必须首先 校验下载工具的合法性, 只有确定下载工具是合法的, 才能执行步骤 S206 的处理, 其中, 确定下载工具的合法性需要通过下载工具在执行下载指令前 主动向终端发送预先协商好的特定命令(即, 上述与终端协商的特定合法命 令), 例如, Unlock命令、 WiMAX Unlock命令等。 当终端收到诸如此类的 合法指令后, 就可以确认下载工具的合法性, 并向下载工具发送合法校 -睑指 令; 如果移动终端没有收到合法指令, 即使收到下载工具发送的 download 指令, 也不执行下载升级; 通过上述处理, 在终端侧完成了第一重校验(对 应于图 1中的步骤 S102 )。 步骤 S206, 如果终端确定下载工具合法 (即, 接收到下载工具的合法 校验指令), 那么下载工具就可以通过其中的检测模块,对终端中的锁网版本 标识 (第一锁网版本标识) 和待下载版本中的锁网版本的标识 (第二锁网版 本标识)的一致性进行检测(进行第二重校验), 其中, 锁网版本标识被保留 在 FLASH的后 8K的固定位置,通过下载工具直接可以读得移动终端和待下 载版本中处于该相同位置的数值 (第一锁网版本标识和第二锁网版本标识)。 随后, 下载工具中的检测模块将两数值 (第一锁网版本标识和第二锁网版本 标识) 进行比较, 如果第一锁网版本标识和第二锁网版本标识相同, 则第二 重校 -睑通过; 如果第一锁网版本标识和第二锁网版本标识不同, 则校-睑失败, 下载工具不进行下载升级(对应于图 1中的步骤 S104 )。 步骤 S208 , 在步骤 S204和步骤 S206执行的第一重校验和第二重校验 均通过的情况下, 下载工具对终端的软件进行升级(对应于图 1 中的步骤 S106 )。 需要说明的是,在实际的应用中,由于上述技术方案具有较大的通用性, 因此, 对于提供无线接入功能的 WiMAX、 码分多址( Code Division Multiple Access , 简称为 CDMA ) , 全球移动通信 ( Global system for Mobile Communication, 简称为 GSM )、 分组处理交换( Packet Handling Switching, 简称为 PHS )、 宽带码分多址接入 ( Wideband Code Division Multiple Access , 简称为 WCDMA )、 时分同步码分多址接入 ( Time Division-Synchronous Code Division Multiple Access, 简称为 TD-SCDMA )、 单模 /多模无线接入终端产 品均可以通过才艮据本发明实施例的上述技术方案进行锁网版本软件升级。 在上述处理过程中, 通过对下载工具和待升级的软件进行二重检验, 保 证了终端下载软件的安全性, 此外, 根据本发明实施例的技术方案还具有用 户使用方便、 适用范围广、 简单易行的优点。 给运营商或用户提供了一种灵 活的软件升级解决方案, 并且, 由于所有校验都是自动进行的, 为终端用户 接入 WiMAX网络带来更大的方便。 装置实施例一 根据本发明的实施例, 提供了一种下载工具, 用于实现上述方法实施例 的终端软件的升级方法, 图 4是才艮据本发明实施例的下载工具的框图, 如图 4所示, 包括发送模块 40、 检测模块 42、 下载模块 44、 控制模块 46、 接收 模块 48。 下面, 对根据本发明实施例的下载工具中的各个模块进行详细的说 明。 具体地, 发送模块 40用于在向终端发送升级(download ) 指令前, 向 终端发送与终端协商的特定合法命令, 例如, Unlock命令、 WiMAX Unlock 命令等, 以使终端能够确认下载工具的合法性, 如果终端接收到特定合法命 令, 就可以确认下载工具是合法的(即, 进行第一重校-睑); 在终端确认下载 工具为合法后, 会发送下载工具合法校验指令到接收模块 48, 检测模块 42 连接至接收模块 48, 用于在终端确定下载工具合法的情况下, 检测终端中预 先保存的第一锁网版本标识与 PC侧待下载软件的第二锁网版本标识是否相 同 (即, 进行第二重校验), 在检测模块 42进行检测前, 检测模块 42 中的 获取模块需要获取终端存储的第一锁网版本标识, 并获取本地保存的第二锁 网版本标识, 以供检测模块 42 进行检测。 其中, 第一锁网版本标识被保留 在 FLASH的后 8K的固定位置,通过获取模块直接可以读得移动终端和待下 载版本中处于该相同位置的数值 (第一锁网版本标识和第二锁网版本标识)。 下载模块 44连接至控制模块 46, 用于接收控制模块 46的控制, (即, 在检测模块确定预先保存的第一锁网版本标识与 PC侧待下载软件的第二锁 网版本标识相同的情况下), 将待下载软件下载到终端。 控制模块 46连接至 检测模块 42和下载模块 44,用于在检测模块 42确定第一锁网版本标识与第 二锁网版本标识相同的情况下, 使能下载模块 44 , 在检测模块 42确定第一 锁网版本标识与第二锁网版本标识不相同的情况下, 除能下载模块 44。 通过上述的处理, 在下载工具通过终端第一重校-睑的情况下, 合格的下 载工具再进行对待下载软件的第二重校验, 从而保证了软件下载的安全性。 装置实施例二 根据本发明的实施例, 提供了一种终端, 图 5是根据本发明实施例的终 端的框图, 如图 5所示, 根据本发明实施例的终端包括校验模块 50、 存储器 52、 以及存储器 52中的划分模块 (在图中未示出)。 下面, 对终端中的各个 模块进行详细的说明。 具体地,终端中的校验模块 50用于校验 PC侧的下载工具的合法性(即, 进行第一重校验); 优选地, 在校验模块 50进行第一重校验时, 下载工具在 执行下载指令前会主动向终端发送预先协商好的特定命令(即, 与终端协商 的特定合法命令), 例如, Unlock命令、 WiMAX Unlock命令等。 当校验模 块 50收到诸如此类的合法指令后, 校验模块 50就可以确认下载工具的合法 性。 此外, 终端中还包括存储器 52 (在本实例中, 该存储器 52优选为 Flash 存储器) 以及存储器 52 中的划分模块, 在实际的应用中, 划分模块首先需 要通过驱动程序把整个存储器 52 区域分成两个区域, 如图 3所示, 划分模 块将存储器 52划分为第一部分(第一区域)和第二部分(第二区域), 其中, 第二部分是用来保留第一锁网版本标识的, 并且, 在实际的划分过程中, 第 一部分比第二部分大 4艮多, 例如, 一个 4M的 Flash, 第二部分只占最后 8K。 在软件正常运行时, 对参数的读写均在第一部分中进行; 而第二部分只作为 软件升级时第一锁网版本标识的一个备份区域。 通过划分模块对存储器 52 的划分, 就可以使存储器 52有专门的位置来存储第一锁网版本标识, 这样, 下载工具就可以直接读取移动终端存储器 52 的第二部分中存储的第一锁网 版本标识,并与待下载版本中处于该相同位置的第二锁网版本标识进行比较, 从而使得下载工具能够进行第二重的校验, 即,确定第一锁网版本标识与 PC 侧待下载软件的第二锁网版本标识是否相同。 需要说明的是, 在实际的应用中, 才艮据本发明实施例的终端可以是具有 无线接入功能的 WiMAX、 CDMA, GSM, PHS、 WCDMA、 TD-SCDMA, 单模 /多模无线接入终端。 此外, 如这里所描述的, 术语 "存储器" 可以表示用于存储数据的一种 或多种装置, 包括只读存储器 (R0M )、 随机存取存储器 (RAM )、 磁 RAM、 磁 心存储器、 磁盘存储介质、 光存储介质、 闪存装置和 /或用于存储信息的其他 机器可读介质。 另外, 可以通过硬件、 软件、 固件、 中间件、 微码、 硬件描述语言或其 组合来实现实施例。 当用软件、 固件、 中间件或啟码来实现时, 可以在诸如 存储介质的机器可读介质中存储用于执行必要任务的程序代码或码段。 (多 个) 处理器可以执行必要任务。 码段可以表示进程、 函数、 子程序、 程序、 例行程序、 子例行程序、 模块、 对象、 软件包、 类、 或指令、 数据结构、 或 程序语言的任意组合。 通过传输和 /或接收信息、 数据、 自变量、 或存储内容 来将码段耦合到另一码段或硬件电路。 信息、 自变量、 参数、 数据等可以经 由包括存储器共享、 消息传递、 令牌传递、 网络传输等的任意合适方式来传 递、 传输、 或传送。 综上所述, 借助于本发明的技术方案, 通过对下载工具以及软件新版本 进行二重校验, 能够解决相关技术的软件下载过程中软件版本安全性低的问 题, 可以保证软件升级的安全性, 并且本发明的技术方案还具有用户使用方 便、 适用范围广、 简单易行的优点, 给运营商或用户提供了一种灵活的软件 升级解决方案, 并且, 由于所有校验都是自动进行的, 为终端用户接入 WiMAX网络带来更大的方便。 以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本 领域的技术人员来说, 本发明可以有各种更改和变化。 凡在本发明的精神和 原则之内, 所作的任何修改、 等同替换、 改进等, 均应包含在本发明的保护 范围之内。 WiMAX is a wireless metropolitan area network (WMAN) technology, a new air interface standard proposed for the 4 start and millimeter wave bands. WiMAX can be used to connect 802.11a wireless access hotspots to the Internet and connect environments such as corporate and home to wired backbones. In addition, WiMAX can also be used as a wireless extension technology for cable and Digital Subscriber Line (DSL) to achieve wireless broadband access. At present, the WiMAX terminal is generally customized and sent to the user by the operator. Therefore, the operator has a lock network requirement for the terminal product, that is, the network parameter of the terminal can only be the parameter provided by the operator, and the operator also hopes The mobile terminal can perform parameter judgment on the above requirements to ensure the interests of the operator. However, during the software download process, the software version is very easy to be replaced by the attacker, which will cause the newly downloaded software to not judge the network parameters (ie, download the non-locked network version), so that the terminal can use other operators. The network parameters have brought huge economic losses to operators. Therefore, it is necessary to solve the problem of software version security during the software downloading process, so as to avoid huge economic loss caused by the software being unable to be safely upgraded. SUMMARY OF THE INVENTION The present invention has been made in view of the problem of low security of a software version in a software downloading process in the related art. Therefore, the main object of the present invention is to provide an improved security upgrade scheme for a terminal to solve the related art. The above problem. In order to achieve the above object, according to an aspect of the present invention, an upgrade method is provided for implementing software upgrade of a terminal. The upgrade method according to the present invention includes: the downloading tool of the PC side downloads the legality of the downloading tool through the terminal before the sending of the upgrade instruction to the terminal; if the downloading tool is legal, and the downloading tool determines the first lock network pre-saved in the terminal The version identifier is the same as the second lock network version identifier of the software to be downloaded on the PC side, and the download tool downloads the software to be downloaded to the terminal. The processing of the downloading tool confirming the legality of the downloading tool by the terminal includes: the downloading tool sends a specific legal command negotiated with the terminal to the terminal; and the terminal receives the specific legal command, and confirms that the downloading tool is legal. In addition, before the downloading tool passes the validity of the terminal to download the tool, the method further includes: the terminal dividing the memory into the first area and the second area, where the second area is used to store the first lock network version identifier . In addition, before determining whether the first lock net version identifier and the second lock net version identifier are the same, the method further includes: downloading the tool to acquire the first lock net version identifier stored by the terminal in the second area, and acquiring the locally saved second Lock network version identifier. In addition, if the download tool is legal, but the download tool determines that the first lock network version identifier is different from the second lock network version identifier, downloading the software to be downloaded to the terminal is prohibited. In order to achieve the above object, according to another aspect of the present invention, a downloading tool is provided. The downloading tool according to the present invention includes: a sending module, configured to send a specific legal command negotiated with the terminal to the terminal before sending the upgrade command to the terminal, so as to enable the terminal to verify the legality of the downloading tool; Whether the first lock net version identifier pre-stored in the detecting terminal is the same as the second lock net version identifier of the software to be downloaded on the PC side; and the downloading module is configured to determine the first lock net version identifier and the second lock net version in the detecting module When the logo is the same, download the software to be downloaded to the terminal. In addition, the foregoing detection module further includes: an obtaining module, configured to acquire a first lock network version identifier of the terminal, and obtain a locally saved second lock network version identifier. In addition, the downloading tool may further include: a control module, configured to: when the detecting module determines that the first lock net version identifier and the second lock net version identifier are the same, enable the download module, and determine, by the detecting module, the first lock network In case the version identifier and the second lock network version identifier are different, the module can be downloaded. In order to achieve the above object, according to another aspect of the present invention, a terminal is provided. The terminal according to the present invention includes: a verification module, configured to verify the validity of the downloading tool on the PC side; and a memory, configured to store the first lock network version identifier of the terminal, so that the downloading tool determines the first lock network version identifier and Whether the second lock network version identifier of the software to be downloaded on the PC side is the same. In addition, the foregoing memory further includes: a dividing module, configured to divide the memory into the first area and the second area, where the second area is used to store the first lock net version identifier. By means of the technical solution of the present invention, by performing double verification on the downloading tool and the new version of the software, the problem of low security of the software version in the software downloading process of the related technology can be solved, and the security of the terminal software upgrade can be ensured. Other features and advantages of the invention will be set forth in the description which follows, and The objectives and other advantages of the invention will be realized and attained by the <RTI The drawings are intended to provide a further understanding of the invention, and are intended to be a part of the description of the invention. In the drawings: FIG. 1 is a flowchart of a security upgrade method according to an embodiment of the present invention; FIG. 2 is a detailed process flowchart of a security upgrade method according to an embodiment of the present invention; FIG. 3 is a flowchart according to an embodiment of the present invention. FIG. 4 is a block diagram of a downloading tool according to an embodiment of the present invention; and FIG. 5 is a block diagram of a terminal according to an embodiment of the present invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS In the related art, there is a problem that the software version is low in security during the software downloading process. Therefore, in view of the above problems, the present invention provides a mobile terminal software security upgrade based on Flash partitioning. The method of the present invention, in the technical solution of the present invention, before receiving the download instruction sent by the PC side downloading software, the terminal software must verify the legality of the downloading tool, and in the case that the downloading tool is legal, through the downloading tool The detection module checks whether the lock network version identifier in the mobile terminal is consistent with the lock network version identifier in the version to be downloaded, and upgrades the software of the terminal if the two lock network version identifiers are consistent. The preferred embodiments of the present invention are described in the following with reference to the accompanying drawings, which are intended to illustrate and illustrate the invention. In the following description, numerous specific details are set forth However, it is apparent that the present invention may be practiced without these specific details. Further, various details may be obtained in the following embodiments and examples without departing from the spirit and scope of the appended claims. Make various combinations. Method Embodiments According to an embodiment of the present invention, a security upgrade method is provided. FIG. 1 is a flowchart of a security upgrade method according to an embodiment of the present invention. Before performing the processing shown in FIG. 1, the terminal first needs to The memory is divided into two areas: a first area and a second area, and uses the lock network version identifier of the second area storage terminal (ie, the first lock network version identifier). After the terminal performs the foregoing processing, the memory may be executed as shown in the figure. The processing shown in FIG. 1 includes steps S102 to S106: Step S102: Before the PC side downloading tool sends the upgrade command to the terminal, the legality of the downloading tool is verified by the terminal-supplied certificate; when the terminal performs the legality check of the downloading tool, If the terminal is able to receive the specific legal command that is sent by the downloading tool and negotiates with the terminal, the terminal confirms that the downloading tool is legal. Step S104: If the terminal determines that the downloading tool is legal, the downloading tool acquires the first pre-saved in the terminal. The lock network version identifier and the second lock network version identifier of the software to be downloaded on the PC side, after the acquisition, the download tool can Determining whether the acquired first lock network version identifier is the same as the second lock network version identifier; Step S106: If the download tool is legal, and the download tool determines that the first lock network version identifier is the same as the second lock network version identifier, The downloading software is downloaded to the terminal; if the downloading tool determines that the first lock network version identifier is different from the second lock network version identifier, downloading the software to be downloaded to the terminal is prohibited. Hereinafter, the above technical solution of the present invention will be described by taking a WiMAX terminal as an example with reference to the accompanying drawings. 2 is a detailed processing flowchart of a security upgrade method according to an embodiment of the present invention. As shown in FIG. 2, the following processing is included (step S202 - step S208): Step S202, the WiMAX terminal software can use the Flash driver 4 to execute the entire Flash. Zone or divide into two zones or. As shown in FIG. 3, the Flash driver divides the Flash area into a first part (the first area) and a second part (the second area), wherein the second part is used to retain the first lock version identifier. And, in the actual division process, the first part is much larger than the second part, for example, a 4M Flash area or a second part only accounts for the last 8K. When the software is running normally, the reading and writing of the parameters are performed in the first part; and the second part is only used as a backup area of the first lock network version identification when the software is upgraded (this step is not shown in Figure 2). Step S204: Before receiving the upgrade command (download), the WiMAX terminal software must first verify the legality of the downloading tool. Only after determining that the downloading tool is legal, the processing of step S206 can be performed, wherein determining the legality of the downloading tool needs to pass The downloading tool actively sends a pre-negotiated specific command (ie, the above-mentioned specific legal command negotiated with the terminal) to the terminal before executing the download command, for example, an Unlock command, a WiMAX Unlock command, and the like. When the terminal receives such a legal instruction, it can confirm the legality of the downloading tool and send a legal school-睑 command to the downloading tool; if the mobile terminal does not receive the legal command, even if it receives the download command sent by the downloading tool, The download upgrade is not performed; by the above processing, the first re-check is completed on the terminal side (corresponding to step S102 in Fig. 1). Step S206, if the terminal determines that the downloading tool is legal (that is, receives a legal verification instruction of the downloading tool), the downloading tool may use the detecting module to identify the lock network version in the terminal (the first lock network version identifier). Checking the consistency of the identifier of the lock network version (the second lock network version identifier) in the version to be downloaded (for the second re-check), wherein the lock network version identifier is retained in the fixed position of the last 8K of the FLASH. The value of the same position in the mobile terminal and the version to be downloaded (the first lock network version identifier and the second lock network version identifier) can be directly read by the download tool. Then, the detection module in the download tool compares the two values (the first lock net version identifier and the second lock net version identifier), and if the first lock net version identifier and the second lock net version identifier are the same, the second re-calibration If the first lock net version identifier and the second lock net version identifier are different, the school-failure fails, and the download tool does not perform the download upgrade (corresponding to step S104 in FIG. 1). Step S208, in a case where both the first re-check and the second re-check performed in step S204 and step S206 are passed, the downloading tool upgrades the software of the terminal (corresponding to step S106 in FIG. 1). It should be noted that, in practical applications, since the above technical solutions have greater versatility, WiMAX, Code Division Multiple Access (CDMA), and global mobile providing wireless access functions are provided. Communication (Global System for Mobile Communication, GSM for short), Packet Handling Switching (PHS), Wideband Code Division Multiple Access (WCDMA), Time Division Synchronization Codes The software of the lock network version can be upgraded according to the above technical solution according to the embodiment of the present invention, and the single-mode/multi-mode wireless access terminal product can be upgraded. . In the above process, the security of the downloading software is ensured by the double check of the downloading tool and the software to be upgraded. In addition, the technical solution according to the embodiment of the present invention has the advantages of convenient use, wide application range and simpleness. The advantages of easy. Provides a flexible software upgrade solution for operators or users, and since all verifications are performed automatically, it brings greater convenience to end users accessing WiMAX networks. Embodiment 1 of the present invention provides a downloading tool for implementing a method for upgrading a terminal software according to an embodiment of the present invention. FIG. 4 is a block diagram of a downloading tool according to an embodiment of the present invention. 4, comprising a transmitting module 40, a detecting module 42, a downloading module 44, a control module 46, and a receiving module 48. Hereinafter, each module in the downloading tool according to an embodiment of the present invention will be described in detail. Specifically, the sending module 40 is configured to send a specific legal command negotiated with the terminal, such as an Unlock command, a WiMAX Unlock command, etc., to enable the terminal to confirm the legality of the downloading tool before sending the download command to the terminal. If the terminal receives a specific legal command, it can confirm that the downloading tool is legal (ie, perform the first re-calibration-睑); after the terminal confirms that the downloading tool is legal, the downloading tool legal verification instruction is sent to the receiving module 48. The detecting module 42 is connected to the receiving module 48, and configured to detect whether the first lock net version identifier pre-stored in the terminal is the same as the second lock net version identifier of the PC side to be downloaded software when the terminal determines that the download tool is legal ( That is, before the detection module 42 performs the detection, the acquisition module in the detection module 42 needs to acquire the first lock network version identifier stored by the terminal, and obtain the locally saved second lock network version identifier, The detection module 42 performs detection. The first lock net version identifier is retained in a fixed position of the last 8K of the FLASH, and the value of the mobile terminal and the to-be-downloaded version in the same position can be directly read by the obtaining module (the first lock net version identifier and the second lock) Web version identifier). The downloading module 44 is connected to the control module 46 for receiving the control of the control module 46 (ie, the detecting module determines that the pre-saved first lock net version identifier is the same as the second lock net version identifier of the PC side to be downloaded software). B), download the software to be downloaded to the terminal. The control module 46 is connected to the detecting module 42 and the downloading module 44, for enabling the downloading module 44 when the detecting module 42 determines that the first lock net version identifier is the same as the second lock net version identifier, and the detecting module 42 determines In the case where a lock network version identifier is different from the second lock network version identifier, the module 44 can be downloaded. Through the above processing, in the case that the downloading tool passes the first re-calibration of the terminal, the qualified downloading tool performs the second re-verification of the software to be downloaded, thereby ensuring the security of the software downloading. Apparatus Embodiment 2 According to an embodiment of the present invention, a terminal is provided. FIG. 5 is a block diagram of a terminal according to an embodiment of the present invention. As shown in FIG. 5, a terminal according to an embodiment of the present invention includes a verification module 50 and a memory. 52, and a partitioning module in the memory 52 (not shown in the figure). In the following, each module in the terminal will be described in detail. Specifically, the verification module 50 in the terminal is configured to verify the validity of the download tool on the PC side (ie, perform the first re-check); preferably, when the verification module 50 performs the first re-check, download The tool will actively send a pre-negotiated specific command (ie, a specific legal command negotiated with the terminal) to the terminal before executing the download command, for example, an Unlock command, a WiMAX Unlock command, and the like. When the verification module 50 receives a legal instruction such as this, the verification module 50 can confirm the legitimacy of the download tool. In addition, the terminal further includes a memory 52 (in this example, the memory 52 is preferably a flash memory) and a partitioning module in the memory 52. In practical applications, the partitioning module first needs to divide the entire memory 52 area into two by the driver. As shown in FIG. 3, the partitioning module divides the memory 52 into a first part (a first area) and a second part (a second area), wherein the second part is used to retain the first lock network version identifier, Moreover, in the actual division process, the first part is much larger than the second part, for example, a 4M Flash, and the second part only accounts for the last 8K. When the software is running normally, the reading and writing of the parameters are performed in the first part; and the second part is only used as a backup area of the first lock network version identification when the software is upgraded. By dividing the partitioning of the memory 52, the memory 52 can be made to have a dedicated location for storing the first lock version identifier, so that the download tool can directly read the first lock stored in the second portion of the mobile terminal memory 52. The network version identifier is compared with the second lock network version identifier in the same position in the to-be-downloaded version, so that the download tool can perform the second verification, that is, the first lock network version identifier and the PC are determined. Whether the second lock version identifier of the side to be downloaded software is the same. It should be noted that, in practical applications, the terminal according to the embodiment of the present invention may be WiMAX, CDMA, GSM, PHS, WCDMA, TD-SCDMA, and single mode/multimode wireless access with wireless access functions. terminal. Moreover, as described herein, the term "memory" may refer to one or more devices for storing data, including read only memory (ROM), random access memory (RAM), magnetic RAM, magnetic core memory, disk storage. Media, optical storage media, flash memory devices, and/or other machine readable media for storing information. In addition, embodiments may be implemented in hardware, software, firmware, middleware, microcode, hardware description languages, or a combination thereof. When implemented in software, firmware, middleware or code, program code or code segments for performing the necessary tasks may be stored in a machine readable medium, such as a storage medium. The (multiple) processor can perform the necessary tasks. A code segment can represent any combination of processes, functions, subroutines, programs, routines, subroutines, modules, objects, packages, classes, or instructions, data structures, or programming languages. A code segment is coupled to another code segment or hardware circuit by transmitting and/or receiving information, data, arguments, or stored content. Information, arguments, parameters, data, etc. may be communicated, transmitted, or transmitted via any suitable means including memory sharing, messaging, token passing, network transmission, and the like. In summary, by means of the technical solution of the present invention, by performing double verification on the downloading tool and the new version of the software, the problem of low security of the software version in the software downloading process of the related technology can be solved, and the software upgrade can be ensured. The technical solution of the present invention also has the advantages of convenient use, wide application range, simple and easy operation, and provides a flexible software upgrade solution for the operator or the user, and since all the verifications are automatically performed It brings greater convenience to end users accessing WiMAX networks. The above is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.

Claims

权 利 要 求 书 Claim
1. 一种升级方法, 用于实现对终端的软件进行升级, 其特征在于, 所述方 法包括: An upgrade method for implementing software upgrade of a terminal, wherein the method includes:
PC 侧的下载工具在向所述终端发送升级指令前, 通过所述终端-睑 证所述下载工具的合法性;  The downloading tool of the PC side passes the terminal to verify the legality of the downloading tool before sending the upgrade command to the terminal;
如果所述下载工具合法,且所述下载工具确定所述终端中预先保存 的第一锁网版本标识与 PC侧待下载软件的第二锁网版本标识相同, 则 所述下载工具将所述待下载软件下载到所述终端。  If the downloading tool is legal, and the downloading tool determines that the first lock net version identifier pre-stored in the terminal is the same as the second lock net version identifier of the PC side to be downloaded software, the download tool will treat the The download software is downloaded to the terminal.
2. 4艮据权利要求 1所述的方法, 其特征在于, 所述下载工具通过所述终端 确认所述下载工具的合法性的处理包括: 2. The method according to claim 1, wherein the processing of the downloading tool confirming the legality of the downloading tool by the terminal comprises:
所述下载工具向所述终端发送与所述终端协商的特定合法命令; 所述终端接收到所述特定合法命令, 则确认所述下载工具合法。  The downloading tool sends a specific legal command negotiated with the terminal to the terminal; if the terminal receives the specific legal command, it confirms that the downloading tool is legal.
3. 根据权利要求 1所述的方法, 其特征在于, 在所述下载工具通过所述终 端校-睑所述下载工具的合法性之前, 所述方法还包括: The method according to claim 1, wherein before the downloading tool passes the terminal to verify the legitimacy of the downloading tool, the method further includes:
所述终端将其存储器划分为第一区域和第二区域, 其中, 所述第二 区域用于存储所述第一锁网版本标识。  The terminal divides its memory into a first area and a second area, where the second area is used to store the first lock network version identifier.
4. 根据权利要求 3所述的方法, 其特征在于, 在确定所述第一锁网版本标 识和所述第二锁网版本标识相同之前, 所述方法还包括: The method according to claim 3, wherein before the determining that the first lock net version identifier and the second lock net version identifier are the same, the method further includes:
所述下载工具获取所述终端在所述第二区域存储的所述第一锁网 版本标识, 并获取本地保存的所述第二锁网版本标识。  The downloading tool obtains the first lock net version identifier stored by the terminal in the second area, and obtains the second lock net version identifier saved locally.
5. 根据权利要求 1所述的方法, 其特征在于, 所述方法还包括: The method according to claim 1, wherein the method further comprises:
如果所述下载工具合法,但所述下载工具确定所述第一锁网版本标 识与所述第二锁网版本标识不相同, 则禁止将所述待下载软件下载到所 述终端。  If the downloading tool is legal, but the downloading tool determines that the first lock net version identifier is different from the second lock net version identifier, the downloading the software to be downloaded is prohibited from being downloaded to the terminal.
6. —种下载工具, 其特征在于, 包括: 6. A downloading tool, characterized in that it comprises:
发送模块, 用于在向终端发送升级指令前, 向所述终端发送与所述 终端协商的特定合法命令, 以使所述终端验证所述下载工具的合法性; 检测模块, 用于检测所述终端中预先保存的第一锁网版本标识与a sending module, configured to send, by the terminal, a specific legal command negotiated with the terminal, before the sending the upgrade command to the terminal, to enable the terminal to verify the legality of the downloading tool; a detecting module, configured to detect a first lock network version identifier pre-saved in the terminal
PC侧待下载软件的第二锁网版本标识是否相同; Whether the second lock network version identifier of the software to be downloaded on the PC side is the same;
下载模块,用于在所述检测模块确定所述第一锁网版本标识和所述 第二锁网版本标识相同的情况下, 将所述待下载软件下载到所述终端。  And a downloading module, configured to download the software to be downloaded to the terminal if the detecting module determines that the first lock net version identifier and the second lock net version identifier are the same.
7. 根据权利要求 6所述的下载工具, 其特征在于, 所述检测模块进一步包 括: The downloading tool according to claim 6, wherein the detecting module further comprises:
获取模块, 用于获取所述终端的所述第一锁网版本标识, 并获取本 地保存的所述第二锁网版本标识。  And an obtaining module, configured to obtain the first lock network version identifier of the terminal, and obtain the second lock network version identifier saved locally.
8. 根据权利要求 6所述的下载工具, 其特征在于, 所述下载工具进一步包 括: 8. The downloading tool according to claim 6, wherein the downloading tool further comprises:
控制模块,用于在所述检测模块确定所述第一锁网版本标识和所述 第二锁网版本标识相同的情况下, 使能所述下载模块, 在所述检测模块 确定所述第一锁网版本标识和所述第二锁网版本标识不相同的情况下, 除能所述下载模块。  a control module, configured to: when the detecting module determines that the first lock net version identifier and the second lock net version identifier are the same, enable the download module, and determine, by the detecting module, the first In the case that the lock network version identifier and the second lock network version identifier are different, the download module is disabled.
9. 一种终端, 其特征在于, 包括: 9. A terminal, comprising:
校验模块, 用于校验 PC侧的下载工具的合法性;  a verification module, configured to verify the legality of the downloading tool on the PC side;
存储器, 用于存储所述终端的第一锁网版本标识, 以使所述下载工 具确定所述第一锁网版本标识与 PC侧待下载软件的第二锁网版本标识 是否相同。  And a storage device, configured to store the first lock net version identifier of the terminal, so that the download tool determines whether the first lock net version identifier is the same as the second lock net version identifier of the PC side to be downloaded software.
10. 根据权利要求 9所述的终端, 其特征在于, 所述存储器进一步包括: 划分模块, 用于将所述存储器划分为第一区域和第二区域, 其中, 所述第二区域用于存储所述第一锁网版本标识。 The terminal according to claim 9, wherein the memory further comprises: a dividing module, configured to divide the memory into a first area and a second area, wherein the second area is used for storing The first lock net version identifier.
PCT/CN2008/073835 2008-12-29 2008-12-29 Upgrading method, downloading tool and terminal WO2010078679A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2008/073835 WO2010078679A1 (en) 2008-12-29 2008-12-29 Upgrading method, downloading tool and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2008/073835 WO2010078679A1 (en) 2008-12-29 2008-12-29 Upgrading method, downloading tool and terminal

Publications (1)

Publication Number Publication Date
WO2010078679A1 true WO2010078679A1 (en) 2010-07-15

Family

ID=42316179

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2008/073835 WO2010078679A1 (en) 2008-12-29 2008-12-29 Upgrading method, downloading tool and terminal

Country Status (1)

Country Link
WO (1) WO2010078679A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107147643A (en) * 2017-05-10 2017-09-08 武汉票据交易中心有限公司 A kind of client login method
CN108897709A (en) * 2018-05-25 2018-11-27 上海乘讯信息科技有限公司 A kind of routine interface download system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002227477A (en) * 2001-01-30 2002-08-14 Mitsubishi Electric Corp Device for controlling passage in building
US20040039919A1 (en) * 2002-08-26 2004-02-26 Hisashi Takayama Authentication method, system and apparatus of an electronic value
CN101193368A (en) * 2006-11-22 2008-06-04 中兴通讯股份有限公司 Method for wireless access fixing station software to validate identifier setup
CN101193364A (en) * 2006-11-21 2008-06-04 中兴通讯股份有限公司 A software download method for wireless access fixing station

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002227477A (en) * 2001-01-30 2002-08-14 Mitsubishi Electric Corp Device for controlling passage in building
US20040039919A1 (en) * 2002-08-26 2004-02-26 Hisashi Takayama Authentication method, system and apparatus of an electronic value
CN101193364A (en) * 2006-11-21 2008-06-04 中兴通讯股份有限公司 A software download method for wireless access fixing station
CN101193368A (en) * 2006-11-22 2008-06-04 中兴通讯股份有限公司 Method for wireless access fixing station software to validate identifier setup

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107147643A (en) * 2017-05-10 2017-09-08 武汉票据交易中心有限公司 A kind of client login method
CN108897709A (en) * 2018-05-25 2018-11-27 上海乘讯信息科技有限公司 A kind of routine interface download system

Similar Documents

Publication Publication Date Title
CN111465011B (en) Cross-network access method, device, storage medium and communication system
CN107534856B (en) Method and apparatus for managing profile of terminal in wireless communication system
EP3905741B1 (en) Method and device for downloading profile of operator
CN108141454B (en) Automatic grouping, authentication and provisioning access points using cloud-based WLAN infrastructure management
JP2009530887A (en) Method, apparatus, software for authentication of a device temporarily provided with a SIM to store a challenge response
KR102114432B1 (en) Integrated subscriber identification module with core OS and application OS
US10893406B2 (en) Method and apparatus for handling remote profile management exception
US11832348B2 (en) Data downloading method, data management method, and terminal
US9319882B2 (en) Method for mutual authentication between a terminal and a remote server by means of a third-party portal
JP5805874B2 (en) Apparatus and method for connecting a removable module to an access terminal
EP4057658A1 (en) Machine-card verification method applied to minimalist network, and related device
EP3114806B1 (en) Network node, device and methods for providing an authentication module
US11523332B2 (en) Cellular network onboarding through wireless local area network
EP3854115B1 (en) Method and apparatus for handling remote profile management exception
WO2018090831A1 (en) Method and apparatus allowing smart terminal device to access internet
CN112351471A (en) Method for accessing device to gateway, gateway device and computer readable storage medium
EP2866404B1 (en) Mobile terminal with built-in pppoe dialing function and dialing method thereof
US20240214817A1 (en) Method for remote provisioning of software modules in integrated circuit cards, corresponding apparatus and computer program product
KR20120045859A (en) System and method for producing sequrity service by means of application, and apparatus applied to the same
WO2010078679A1 (en) Upgrading method, downloading tool and terminal
EP2633461B1 (en) A method for accessing an application and a corresponding device
US11678158B2 (en) Privacy-enhanced method for linking an eSIM profile
WO2011022979A1 (en) Mobile terminal software upgrade method, system, mobile terminal and server thereof
CN113098869B (en) Production test method, wireless intelligent device, upper computer, electronic device and medium
CN104378333B (en) Modem dialup method and broadband device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08879332

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08879332

Country of ref document: EP

Kind code of ref document: A1