WO2013182155A1 - Procédé et système de mise à niveau de version micrologicielle - Google Patents

Procédé et système de mise à niveau de version micrologicielle Download PDF

Info

Publication number
WO2013182155A1
WO2013182155A1 PCT/CN2013/079784 CN2013079784W WO2013182155A1 WO 2013182155 A1 WO2013182155 A1 WO 2013182155A1 CN 2013079784 W CN2013079784 W CN 2013079784W WO 2013182155 A1 WO2013182155 A1 WO 2013182155A1
Authority
WO
WIPO (PCT)
Prior art keywords
version
firmware version
mobile terminal
handshake
upgraded
Prior art date
Application number
PCT/CN2013/079784
Other languages
English (en)
Chinese (zh)
Inventor
刘明辉
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2013182155A1 publication Critical patent/WO2013182155A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/572Secure firmware programming, e.g. of basic input output system [BIOS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • G06F8/654Updates using techniques specially adapted for alterable solid state memories, e.g. for EEPROM or flash memories

Definitions

  • the present invention relates to the field of mobile terminals, and in particular to firmware upgrade techniques.
  • a mobile terminal also known as a mobile communication terminal, refers to a portable mobile computer device, and in a broad sense, includes a mobile phone, a data card, a tablet computer, and the like.
  • Firmware refers to the software that is the most basic and lowest-level work of a digital product. It is usually stored in the EEPROM or FLASH chip of the device and can be upgraded by the user through a specific firmware upgrade tool.
  • the firmware upgrade tool refers to the auxiliary software used to upgrade the firmware version on the mobile terminal.
  • the firmware version is closely related to the terminal hardware, the firmware of the early mobile terminal is generally only available from the manufacturer. The manufacturer will undergo detailed testing and verification before releasing the firmware version to ensure that the firmware version is well matched with the mobile terminal and its function meets the requirements of users and operators.
  • the firmware version provided by such non-terminal vendors may have the following problems:
  • the firmware version may contain malicious programs such as malicious hidden programs and viruses, and security cannot be guaranteed;
  • custom mobile terminals usually have special requirements for the firmware version, such as: require a built-in specific application, can only access a specific operator's mobile network. In this case, the operator usually does not allow the user to upgrade the terminal firmware at will.
  • the current common firmware upgrade methods are usually: PC side upgrade tool and mobile terminal establish data transmission channel (USB, virtual serial port, network port, etc.); and pre-stored in the PC side storage medium
  • the version file is sequentially transmitted to the data receiving module of the mobile terminal, and the data receiving module transfers the received data to the storage medium of the mobile terminal.
  • the process does not verify the legality of the upgrade tool used, nor does it verify the legality of the firmware version, and there is no firmware legality mechanism on the mobile terminal.
  • the embodiment of the present invention provides a method and a system for upgrading a firmware version, which can overcome the problem that the firmware upgrade technology cannot verify the validity of the firmware version, and thus the problem that the firmware version to be upgraded matches the mobile terminal to be upgraded cannot be guaranteed.
  • a method for upgrading a firmware version including: the upgrade tool performs version validity check processing on the firmware version to be upgraded, and sends the handshake authentication information to the mobile according to the version validity check result.
  • the mobile terminal performs the handshake verification process on the upgrade tool by using the handshake authentication information, and receives the firmware version to be upgraded delivered by the upgrade tool when the handshake verification is successful.
  • the mobile terminal performs version legality verification processing on the received firmware version to be upgraded, when the version validity check result is a legal firmware version.
  • each version file of the firmware version to be upgraded has a digital signature
  • the upgrade tool uses a pre-stored signature key to verify the digital signature of each version file, if each of the firmware versions to be upgraded If the version file is successfully verified, it is determined that the firmware version to be upgraded is a legal firmware version.
  • handshake authentication information including a handshake authentication command and handshake authentication data is generated and sent to the mobile terminal.
  • the mobile terminal decrypts the ciphertext data in the handshake authentication data by using a pre-stored handshake key, and obtains plaintext data and plaintext data in the handshake authentication data. A match is made to determine that the mobile terminal successfully handshaking with the upgrade tool.
  • the method further comprises:
  • the mobile terminal After the mobile terminal determines that it has successfully handshake with the upgrade tool, it switches to the upgrade mode according to the mode switching information from the upgrade tool, so as to receive the firmware version delivered by the upgrade tool.
  • the mobile terminal performs digital signature verification on each version file of the firmware version to be upgraded by using the pre-stored signature key. If each version file is successfully verified, it is determined that the firmware version to be upgraded is Legal firmware version.
  • the method further comprises:
  • the mobile terminal replaces the current firmware version with the firmware version to be upgraded, and performs version legality verification processing on the firmware version to be upgraded during the restart using the firmware version to be upgraded. .
  • an anti-firmware upgrade system including an upgrade tool and a mobile terminal, wherein:
  • the upgrade tool is configured to: perform a version legality verification process on the upgraded firmware version, and send handshake authentication information to the mobile terminal according to the version validity check result;
  • the mobile terminal is configured to perform handshake check processing on the upgrade tool by using the handshake authentication information, and receive the firmware version to be upgraded by the upgrade tool when the handshake verification is successful, and receive the firmware to be upgraded.
  • the version performs the version validity check processing.
  • the version validity check result is the legal firmware version
  • the firmware version is upgraded.
  • the upgrade tool comprises:
  • a signature verification module configured to: perform digital signature verification on each version file of the firmware version to be upgraded by using a pre-stored signature key, and if the verification of each version file is successful, determine the firmware to be upgraded.
  • the version is the legal firmware version
  • the handshake verification module is configured to: when it is determined that the firmware version to be upgraded is a legal firmware version, generate handshake authentication information including a handshake authentication command and handshake authentication data, and send the handshake authentication information to the mobile terminal.
  • the mobile terminal includes:
  • the handshake authentication module is configured to: after receiving the handshake authentication information, decrypt the ciphertext data in the handshake authentication data by using a pre-stored handshake key, and obtain the plaintext data and the handshake authentication data.
  • the plaintext data in the match is matched to determine that the mobile terminal successfully handshaking with the upgrade tool;
  • the signature verification module is configured to: perform digital signature verification on each version file of the firmware version to be upgraded by using the pre-stored signature key, and if each version file is verified successfully,
  • the firmware version to be upgraded is a legal firmware version.
  • the embodiment of the invention further provides a mobile terminal, including:
  • the handshake authentication module is configured to: perform handshake verification processing on the upgrade tool by using the handshake authentication information sent by the upgrade tool, and receive the firmware version to be upgraded delivered by the upgrade tool when the handshake verification is successful, where
  • the handshake authentication information includes a validity check result of the version to be upgraded;
  • the signature verification module is configured to: perform version verification processing on the received firmware version to be upgraded, and perform firmware version upgrade when the version validity check result is a legal firmware version;
  • the handshake authentication module is configured to: after receiving the handshake authentication information, decrypt the ciphertext data in the handshake authentication data by using a pre-stored handshake key, and decrypt the obtained plaintext data. Matching with the plaintext data in the handshake authentication data to determine whether the mobile terminal and the upgrade tool successfully handshake.
  • the signature verification module is configured to: perform digital signature verification on each version file of the received firmware version to be upgraded by using a pre-stored signature key, and if each version file is verified successfully, It is determined that the firmware version to be upgraded is a legal firmware version.
  • the embodiment of the invention can prevent the mobile terminal from being upgraded to the illegal firmware version, improve the security of the mobile terminal upgrade process, and effectively ensure that the interests of the terminal user and the operator are not infringed by the illegal firmware.
  • FIG. 1 is a block diagram of a method for upgrading a firmware version according to an embodiment of the present invention
  • FIG. 3 is a structural diagram of a mobile terminal according to an embodiment of the present invention.
  • FIG. 4 is a structural diagram of an upgrade tool provided by an embodiment of the present invention
  • FIG. 5 is a structural diagram of a digital signature component after a version file according to an embodiment of the present invention.
  • Embodiments of the present invention provide a method and system for preventing a mobile terminal from being upgraded to an illegal firmware version based on encryption technology and digital signature technology.
  • 1 is a block diagram of a method for preventing a mobile terminal from being upgraded to an illegal firmware version according to an embodiment of the present invention. As shown in FIG. 1, the method includes:
  • Step 101 The upgrade tool verifies the legality of the firmware version to be upgraded stored on the master device.
  • the firmware version to be upgraded has multiple version files, each of which has a digital signature, and the upgrade tool verifies the digital signature of each version file by using a pre-stored signature key.
  • the upgrade tool determines that the firmware version to be upgraded is a legal firmware version.
  • Step 102 The upgrade tool and the mobile terminal mutually authenticate by handshake.
  • the handshake authentication information including the handshake authentication command and the handshake authentication data is sent to the mobile terminal.
  • the mobile terminal After receiving the handshake authentication information, the mobile terminal checks the handshake authentication data therein, and feeds back the handshake verification result to the upgrade tool. When the handshake verification is successful, the mobile terminal determines that the upgrade tool is a legal upgrade tool, otherwise the upgrade tool is determined to be an illegal upgrade tool.
  • the upgrade tool receives the handshake authentication result from the mobile terminal, and if successful, sends the mode switch information to the mobile terminal to notify the mobile terminal to switch to the upgrade mode.
  • the mobile terminal checks whether the handshake authentication is successful. If successful, the mobile terminal cuts into the upgrade mode.
  • Step 103 The upgrade tool transmits the firmware version to be upgraded to the mobile terminal.
  • the firmware version to be upgraded has multiple version files, and the upgrade tool delivers the multiple version files to the mobile terminal in turn.
  • Step 104 The mobile terminal sequentially receives the plurality of version files, and performs verification on the received version file.
  • the mobile terminal performs digital signature verification on each version file of the firmware version to be upgraded by using the pre-stored signature key. If each version file is successfully verified, it is determined that the firmware version to be upgraded is a legal firmware version. .
  • Step 105 The mobile terminal replaces the old version with the received firmware version to be upgraded.
  • the upgrade tool notifies the mobile terminal that all version files are delivered, and the mobile terminal is required to replace the old version. At this time, the mobile terminal replaces the current version with the firmware version to be upgraded stored in the spare storage area.
  • Step 106 The mobile terminal restarts to complete the upgrade process.
  • the upgrade tool notifies the mobile terminal to exit the upgrade mode and restart. At this point, the mobile terminal restarts with the new firmware version, and the digital signature verification of each version file of the firmware version is still performed during the startup process, and the upgrade process is completed.
  • steps 101 to 106 it can be seen from steps 101 to 106 that the embodiments of the present invention achieve the goal of preventing illegal firmware upgrade by the following four technical means:
  • the upgrade tool performs signature verification on each version file of the firmware version.
  • the upgrade tool running on the master device will perform signature verification on the version files of the firmware version saved on the master device before performing the upgrade operation. If the signature information does not exist or the signature information fails to be verified, it is not allowed. Mobile terminal upgrade. Therefore, it is possible to effectively prevent illegal firmware version upgrades of unknown source at the level of the upgrade tool.
  • the mobile terminal is in the forbidden upgrade state when the mobile terminal is normally started.
  • the upgrade tool sends the handshake authentication information before the firmware sends the firmware version to the mobile terminal.
  • the mobile terminal checks the handshake authentication information. If the verification fails, the upgrade tool is considered to be an illegal upgrade tool, and the mobile terminal maintains the upgrade prohibition state, and the subsequent upgrade action is not allowed. Therefore, the user can be prevented from using the illegal upgrade tool to bypass the signature verification process for the version file.
  • the mobile terminal checks the version files of the firmware version.
  • each time the mobile terminal receives a version file it will verify the digital signature of the version file. If it fails, the upgrade process will be stopped. Therefore, it can prevent illegal tools from bypassing the mobile terminal.
  • the end authentication mechanism performs a firmware upgrade.
  • the digital signature of the version file is verified during the startup of the mobile terminal. If no digital signature information or digital signature verification fails, the user is prompted and enters the upgrade mode until the upgrade to the legal digital signature version. Therefore, it is possible to prevent the mobile terminal from being upgraded to an illegal firmware version by directly burning the storage medium.
  • FIG. 2 is a flowchart of an implementation of preventing an upgrade of a mobile terminal to an illegal firmware version according to an embodiment of the present invention. As shown in FIG. 2, the method includes:
  • Step 201 The upgrade tool performs validity verification on each version file of the firmware version stored on the master device by using the signature key paired with the key used by the digital signature of the mobile terminal manufacturer and the corresponding digest algorithm.
  • Step 202 If the version files of all the firmware versions are valid, the upgrade tool sends the handshake authentication command and the handshake authentication information of the handshake authentication data to the mobile terminal, where the handshake authentication data includes the plaintext before encryption and the encrypted Cipher text.
  • Step 203 After receiving the handshake authentication command, the mobile terminal decrypts the ciphertext data by using the stored handshake key, and checks whether the decrypted data is consistent with the received plaintext data. If they match, the internal handshake success flag is set to true, and the message of successful handshake is fed back to the upgrade tool.
  • Step 204 After the upgrade tool receives the handshake verification result, it checks whether the handshake is successful. If successful, the mode switching information is sent to the mobile terminal, and the mobile terminal is notified to switch to the upgrade mode.
  • Step 205 After receiving the mode switching information, the mobile terminal checks whether the handshake success flag is true.
  • Step 206 If true, switch to the upgrade mode, and feed back the information about the mode switch success to the upgrade tool.
  • Step 207 The upgrade tool receives and detects feedback information of the mode switching information. If the handover is successful, the first version file of the firmware version is delivered to the mobile terminal.
  • Step 208 The mobile terminal receives the version file, temporarily stores the spare storage area, and verifies the digital signature of the version file. If it is legal, it will send feedback to the upgrade tool that the version file is successfully received. Interest.
  • Step 209 The version files in the firmware version are sent one by one, and after all the delivery is completed, the upgrade tool notifies the mobile terminal that all the version files are delivered, and the mobile terminal is required to replace the old version.
  • Step 210 The mobile terminal replaces the current version with the firmware version stored in the spare storage area, and feeds back the version replacement result to the upgrade tool.
  • Step 211 The upgrade tool checks the version replacement information. If the replacement is successful, the mobile terminal is notified to exit the upgrade mode and restart.
  • Step 212 The mobile terminal restarts with the new firmware version. During the restart process, it is detected whether the digital signature of each version file is legal. If it is legal, it will start normally and the upgrade process is completed.
  • Step 213 If the version file is abnormal during the restart of the mobile terminal, the user is prompted, and the upgrade mode is automatically entered. Until the terminal is upgraded to the legal firmware version.
  • step 201 the upgrade tool verifies the legality of each version file of the firmware version, and if the verification fails, the upgrade process is aborted, thereby preventing unsigned illegal firmware upgrade.
  • the upgrade tool will handshake with the mobile terminal to prevent the unauthenticated illegal upgrade tool from upgrading the mobile terminal.
  • step 208 the mobile terminal checks the validity of the received version file to ensure that the received version file is legal.
  • step 213 when the mobile terminal is restarted for the first time after the upgrade is completed, the signature verification module that is solidified in the ROM of the mobile terminal is used to perform digital signature verification on each version file loaded, and if not successful, the mobile terminal automatically enters. Upgrade mode, waiting for handshake authentication, until upgrading to a legal version.
  • the embodiment of the invention further provides a system for preventing a mobile terminal from upgrading to an illegal firmware version, including a mobile terminal and an upgrade tool running on a master control device (such as a PC), mutual authentication by the mobile terminal and the upgrade tool, and two The verification of each version file of the upgraded firmware version implements the function of preventing the device from being upgraded to an illegal firmware version.
  • a master control device such as a PC
  • FIG. 3 is a structural diagram of a mobile terminal according to an embodiment of the present invention. As shown in FIG. 3, the method includes:
  • the handshake authentication module is configured to decrypt the ciphertext data in the handshake authentication data by using the pre-stored handshake key after receiving the handshake authentication information, and obtain the plaintext data and the handshake authentication data.
  • the plaintext data is matched to determine that the mobile terminal successfully handshaking with the upgrade tool;
  • the signature verification module is configured to perform digital signature verification on each version file of the firmware version to be upgraded by using the pre-stored signature key. If each version file is successfully verified, the firmware to be upgraded is determined.
  • the version is the legal firmware version
  • service function modules are set to implement other service functions such as short message service and call service.
  • the upgrade tool is configured to perform version legality verification processing on the firmware version to be upgraded, and send handshake authentication information to the mobile terminal according to the verification result of the version validity.
  • 4 is a structural diagram of an upgrade tool provided by an embodiment of the present invention. As shown in FIG. 4, the method includes:
  • the signature verification module is configured to perform digital signature verification on each version file of the upgrade firmware version by using the pre-stored signature key. If the verification of each version file is successful, it is determined that the firmware version to be upgraded is Legal firmware version;
  • the handshake verification module is configured to: when determining that the firmware version to be upgraded is a legal firmware version, generate handshake authentication information including a handshake authentication command and handshake authentication data, and send the handshake authentication information to the mobile terminal; and the data transmission module is configured to be to be upgraded firmware The version is sent to the mobile terminal;
  • the command transceiver module is configured to receive an instruction from the mobile terminal or send an instruction to the mobile terminal.
  • the master device is responsible for providing the operating environment of the upgrade tool and providing data channels for data interaction with the mobile terminal.
  • the upgrade tool runs on the master device, and is responsible for verifying the validity of the firmware version file, performing handshake authentication with the terminal, and sending the version file stored on the master device to the mobile terminal.
  • the mobile terminal is responsible for shaking hands with the upgrade tool, receiving the version file delivered by the upgrade tool, verifying the validity of the received version file, and writing the legal version file to the storage medium of the mobile terminal.
  • the firmware version can consist of multiple version files, which are divided into legal and illegal versions.
  • Figure 5 is the invention
  • the digital signature in the version file provided by the embodiment constitutes a structural diagram, and each version file of the legal version includes digital signature information of the terminal manufacturer, and the illegal version does not include. Affecting the illegal firmware version used by the mobile terminal, thereby effectively protecting the normal operation and use of the mobile terminal, and protecting the interests of the user and the operator.
  • the embodiment of the invention can prevent the mobile terminal from being upgraded to the illegal firmware version, improve the security of the mobile terminal upgrade process, and effectively ensure that the interests of the terminal user and the operator are not infringed by the illegal firmware.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Stored Programmes (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé et un système de mise à niveau de version micrologicielle de terminal mobile. Le procédé comprend les étapes suivantes : un outil de mise à niveau met en oeuvre un traitement de vérification de validité de version sur une version micrologicielle devant être mise à niveau, et selon le résultat de vérification de validité de version, envoie des informations d'authentification d'établissement de liaison à un terminal mobile ; le terminal mobile mettant en oeuvre un traitement de vérification d'établissement de liaison sur l'outil de mise à niveau à l'aide des informations d'authentification d'établissement de liaison, et recevant la version micrologicielle devant être mise à niveau envoyée par l'outil de mise à niveau lorsque la vérification d'établissement de liaison réussit ; et le terminal mobile mettant en oeuvre un traitement de vérification de validité de version sur la version micrologicielle devant être mise à niveau, et mettant en oeuvre une mise à niveau de version micrologicielle lorsque le résultat de la vérification de validité de version est que la version est une version micrologicielle valide.
PCT/CN2013/079784 2012-12-10 2013-07-22 Procédé et système de mise à niveau de version micrologicielle WO2013182155A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210527778.9 2012-12-10
CN201210527778.9A CN102981881B (zh) 2012-12-10 2012-12-10 一种防止移动终端升级到非法固件版本的方法及系统

Publications (1)

Publication Number Publication Date
WO2013182155A1 true WO2013182155A1 (fr) 2013-12-12

Family

ID=47855943

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/079784 WO2013182155A1 (fr) 2012-12-10 2013-07-22 Procédé et système de mise à niveau de version micrologicielle

Country Status (2)

Country Link
CN (1) CN102981881B (fr)
WO (1) WO2013182155A1 (fr)

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102981881B (zh) * 2012-12-10 2018-03-27 中兴通讯股份有限公司 一种防止移动终端升级到非法固件版本的方法及系统
CN103677911A (zh) * 2013-12-06 2014-03-26 上海寰创通信科技股份有限公司 一种移动网络设备固件升级系统及升级方法
CN105024843A (zh) * 2014-04-29 2015-11-04 国基电子(上海)有限公司 电缆调制解调器、服务器及升级固件的方法
CN104007995B (zh) * 2014-06-13 2018-02-23 浪潮电子信息产业股份有限公司 一种刷写网络芯片未验证fw的方法
CN104811484B (zh) * 2015-04-09 2019-06-21 努比亚技术有限公司 Fota升级方法和装置
CN105068824B (zh) * 2015-07-16 2018-08-28 福建联迪商用设备有限公司 一种划分终端开发模式和产品模式的方法及系统
CN105354055B (zh) * 2015-10-22 2019-02-26 宁波三星医疗电气股份有限公司 一种用于电力采集终端的升级方法
CN106203071A (zh) * 2016-06-30 2016-12-07 浪潮(北京)电子信息产业有限公司 一种固件升级方法及装置
CN106250726A (zh) * 2016-08-10 2016-12-21 深圳金澜汉源科技有限公司 软件版本状态管控方法
CN106506163B (zh) * 2016-10-21 2019-11-15 北京小米移动软件有限公司 Rom包处理方法及装置
CN106789012B (zh) * 2016-12-21 2020-04-24 珠海市魅族科技有限公司 一种生产线烧录固件的方法及装置
CN106919423B (zh) * 2017-02-22 2021-03-23 新华三技术有限公司 一种固件升级方法及装置
CN107277271A (zh) * 2017-07-20 2017-10-20 青岛海信移动通信技术股份有限公司 移动终端中基于定制软件版本的升级方法及装置
CN107634859B (zh) * 2017-09-30 2021-07-02 飞天诚信科技股份有限公司 一种固件升级方法及装置
CN107729198B (zh) * 2017-10-18 2020-04-21 深圳合纵富科技有限公司 一种Android系统固件校验方法及装置
EP3531322A4 (fr) * 2017-12-28 2020-01-22 Shenzhen Launch Software Co., Ltd. Appareil et procédé de vérification d'une mise à jour d'un connecteur de diagnostic d'un dispositif de diagnostic et connecteur de diagnostic
CN110532735B (zh) * 2018-05-23 2023-04-18 霍尼韦尔环境自控产品(天津)有限公司 固件升级方法
CN110874231A (zh) * 2018-09-04 2020-03-10 中兴通讯股份有限公司 终端版本更新的方法、设备和存储介质
CN111083001B (zh) * 2018-10-18 2021-09-21 杭州海康威视数字技术股份有限公司 一种固件异常检测方法及装置
CN109508535B (zh) * 2018-10-30 2021-07-13 百富计算机技术(深圳)有限公司 固件安全认证方法、装置和支付终端
CN109697081B (zh) * 2018-12-19 2021-04-13 广州小鹏汽车科技有限公司 固件安全升级方法、装置、车载系统和车辆
CN113238790B (zh) * 2021-05-28 2023-08-29 成都新易盛通信技术股份有限公司 基于sd卡和eeprom的固件程序更新方法及系统
CN116541046B (zh) * 2023-07-05 2023-12-12 广州疆海科技有限公司 储能系统升级方法、装置、计算机设备及可读存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043680A (zh) * 2007-03-13 2007-09-26 中兴通讯股份有限公司 防止非法升级移动终端的应用程序的方法
CN101257381A (zh) * 2008-03-25 2008-09-03 中兴通讯股份有限公司 终端设备的软件保护方法及具备软件保护功能的终端设备
CN101436141A (zh) * 2008-11-21 2009-05-20 深圳创维数字技术股份有限公司 基于数字签名的固件升级、固件封装方法与装置
CN102354360A (zh) * 2011-08-18 2012-02-15 中兴通讯股份有限公司 一种防止终端非法升级的设备、终端及方法
CN102981881A (zh) * 2012-12-10 2013-03-20 中兴通讯股份有限公司 一种防止移动终端升级到非法固件版本的方法及系统

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7065560B2 (en) * 2002-03-12 2006-06-20 Hewlett-Packard Development Company, L.P. Verification of computer program versions based on a selected recipe from a recipe table

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043680A (zh) * 2007-03-13 2007-09-26 中兴通讯股份有限公司 防止非法升级移动终端的应用程序的方法
CN101257381A (zh) * 2008-03-25 2008-09-03 中兴通讯股份有限公司 终端设备的软件保护方法及具备软件保护功能的终端设备
CN101436141A (zh) * 2008-11-21 2009-05-20 深圳创维数字技术股份有限公司 基于数字签名的固件升级、固件封装方法与装置
CN102354360A (zh) * 2011-08-18 2012-02-15 中兴通讯股份有限公司 一种防止终端非法升级的设备、终端及方法
CN102981881A (zh) * 2012-12-10 2013-03-20 中兴通讯股份有限公司 一种防止移动终端升级到非法固件版本的方法及系统

Also Published As

Publication number Publication date
CN102981881B (zh) 2018-03-27
CN102981881A (zh) 2013-03-20

Similar Documents

Publication Publication Date Title
WO2013182155A1 (fr) Procédé et système de mise à niveau de version micrologicielle
TWI454935B (zh) 自非本端儲存器安全地啟動及組態一子系統
US9281949B2 (en) Device using secure processing zone to establish trust for digital rights management
CN101984575B (zh) 一种保护移动终端软件的方法和装置
US7596812B2 (en) System and method for protected data transfer
EP1712992A1 (fr) Mise-à-jour d'instructions de données
CN102165457A (zh) 票券授权的安全安装和引导
CN103136463A (zh) 用于电子装置的暂时安全开机流程的系统与方法
WO2008004525A1 (fr) Dispositif de traitement d'informations, dispositif d'enregistrement d'informations, système de traitement d'informations, procédé de mise à jour de programme, programme, et circuit intégré
JP4226556B2 (ja) プログラム実行制御装置、os、クライアント端末、サーバ、プログラム実行制御システム、プログラム実行制御方法、プログラム実行制御プログラム
CN111797038B (zh) 烧录控制方法、系统、装置、设备及计算机可读存储介质
KR101642267B1 (ko) 앱 위변조 방지시스템 및 그 방법
US20110154436A1 (en) Provider Management Methods and Systems for a Portable Device Running Android Platform
JP2005202503A (ja) 車載情報装置、車載機器管理システム、車両の制御機器のプログラムのバージョンアップ情報の配信方法、車両の制御機器のプログラムのバージョンアップ方法及び車両の制御機器のプログラムのバージョンアップシステム
CN108141723B (zh) 管理应用程序的方法
EP3639186B1 (fr) Procede de gestion d'une instance de classe
KR101711024B1 (ko) 부정조작방지 장치 접근 방법 및 그 방법을 채용한 단말 장치
KR101906484B1 (ko) 어플리케이션 보안 방법 및 이를 수행하기 위한 시스템
CN107862209B (zh) 一种文件加解密方法、移动终端和具有存储功能的装置
CN114391134A (zh) 刷机处理方法及相关装置
CN101782950B (zh) 主板与板载设备之间的通信控制系统和方法
CN115587342A (zh) 一种软件产品授权许可保护系统及方法
CN115361140A (zh) 安全芯片密钥验证方法及装置
CN112685057A (zh) 根文件系统的升级方法、电子设备及计算机可读存储介质
CN112105012A (zh) 指纹信息处理方法、sim卡、终端、指纹芯片及通信系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13800329

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13800329

Country of ref document: EP

Kind code of ref document: A1