WO2013185724A2 - 移动终端及其软件升级的方法 - Google Patents
移动终端及其软件升级的方法 Download PDFInfo
- Publication number
- WO2013185724A2 WO2013185724A2 PCT/CN2013/080907 CN2013080907W WO2013185724A2 WO 2013185724 A2 WO2013185724 A2 WO 2013185724A2 CN 2013080907 W CN2013080907 W CN 2013080907W WO 2013185724 A2 WO2013185724 A2 WO 2013185724A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- software
- upgrade
- mobile terminal
- digest value
- plug
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
- G06F8/654—Updates using techniques specially adapted for alterable solid state memories, e.g. for EEPROM or flash memories
Definitions
- the present invention relates to the field of mobile communication technologies, and in particular, to a mobile terminal and a method for upgrading the same.
- the upgrade function of the mobile terminal software facilitates the after-sales maintenance of the terminal manufacturer, but there are security risks in the way of upgrading the existing mobile terminal software; some illegal personnel or organizations are driven by the interests, and the upgrade function of the mobile terminal is used to unlock the software version of the non-locking network or The version of the cracked software generated by the decompilation is downloaded to the mobile terminal, thereby breaking the lock function of the mobile terminal.
- This illegal brushing behavior may cause the mobile terminal to be inoperable, causing the mobile terminal to crash, resulting in a large number of mobile terminals returning to the factory as a faulty machine, which ultimately causes huge losses to operators and mobile terminal manufacturers.
- the embodiment of the invention provides a mobile terminal and a software upgrade method thereof, which improves the security of the software upgrade of the mobile terminal, and prevents the occurrence of the illegal crash of the mobile terminal.
- the mobile terminal establishes a communication connection with the computer, and downloads the flash programming plug-in in the upgrade software from the computer to the random access memory (RAM) of the mobile terminal, and scans the flash memory plug-in in the RAM. Conduct legality certification;
- the upgrade file in the RAM memory is written into the flash memory of the mobile terminal to implement a software security upgrade.
- the upgrade software carries software version feature information
- the software version feature information is a ciphertext obtained by serially encrypting a digest value of a flash programming plug-in in the upgrade software, a digest value of the software file, and a version number of the upgrade software;
- the digest value of the flash programming plug-in and the digest value of the software file are respectively calculated by using the first algorithm.
- the mobile terminal performs legality authentication on the flash programming plug-in, including:
- the mobile terminal uses the first algorithm to calculate a digest value of the downloaded flash programming plug-in, and determines whether the digest value of the downloaded flash programming plug-in is consistent with the digested flash burning plug-in digest value. And determining whether the version number of the upgraded software obtained by the decryption conforms to its own preset rule;
- the mobile terminal uses the first algorithm to calculate a digest value of the downloaded upgrade file, and determines whether the digest value of the downloaded upgrade file is consistent with the digest value of the decrypted upgrade file. If they are consistent, the upgrade file is legal. Sexual verification passed.
- the first algorithm is an MD5 algorithm or a SHA-1 algorithm.
- the embodiment of the invention further provides a mobile terminal, including:
- a first downloading module configured to: establish a communication connection with the computer, and download the flash programming plug-in in the upgrade software from the computer to the RAM of the mobile terminal;
- An authentication module configured to: perform legality authentication on the flash programming plug-in in the RAM; a second downloading module, configured to: after the authentication is passed, run the flash programming plug-in in the RAM, and download an upgrade file in the upgrade software from the computer to the RAM; a verification module, and a setting thereof For: verifying the legality of the upgrade file in the RAM;
- the write module is set to: after the verification is passed, write the upgrade file in the RAM into its own flash memory to implement software security upgrade.
- the upgrade software carries software version feature information
- the software version feature information is a ciphertext encrypted in tandem by a summary value of a flash burning plug-in in the upgrade software, a digest value of the software file, and a version number of the upgrade software;
- the digest value of the flash programming plug-in and the digest value of the software file are respectively calculated by using the first algorithm.
- the authentication module is configured to: decrypt the software version feature information by using its own public key, obtain a digest value of the flash programming plug-in, a digest value of the software file, and a version number of the upgrade software;
- the first algorithm is used to calculate the digest value of the downloaded flash programming plug-in, and determine whether the digest value of the downloaded flash programming plug-in is consistent with the decrypted flash burning plug-in digest value, and determine the decryption.
- the version number of the obtained upgrade software conforms to its own preset rule; when the summary value of the downloaded flash programming plug-in is consistent with the decrypted flash programming plug-in summary value, and the version number of the upgraded software obtained by the decryption Corresponding to its own preset rules, it indicates that the flash burning plug-in legality certification passed.
- the verification module is configured to: calculate, by using the first algorithm, a digest value of the downloaded upgrade file, and determine whether the digest value of the downloaded upgrade file is consistent with the digest value of the decrypted upgrade file, if consistent, This indicates that the validity of the upgrade file is verified.
- the first algorithm is an MD5 algorithm or a SHA-1 algorithm.
- the mobile terminal and the software upgrade method thereof provided by the embodiments of the present invention can effectively prevent the mobile terminal from downloading the illegal upgrade file, thereby effectively preventing the risk of the mobile terminal illegally brushing the machine and improving the security of the mobile terminal software upgrade.
- FIG. 1 is a flow chart of an embodiment of a method for upgrading a mobile terminal software according to the present invention
- FIG. 2 is another flowchart of an embodiment of a method for upgrading a mobile terminal of the present invention
- FIG. 3 is a schematic structural diagram of an embodiment of a mobile terminal according to the present invention
- an embodiment of a method for upgrading a mobile terminal software includes: Step S101: A mobile terminal establishes a communication connection with a computer, and downloads a flash programming plug-in in the upgrade software from a computer to its own RAM. And performing legality authentication on the flash programming plug-in in the RAM; when the authentication is passed, the process proceeds to step S102; otherwise, the process ends.
- the mobile terminal establishes a communication connection with the computer through a serial port or a Universal Serial Bus (USB) interface.
- USB Universal Serial Bus
- the upgrade software carries software version feature information.
- the software version feature information is a ciphertext obtained by serially encrypting the digest value of the flash programming plug-in in the upgrade software, the digest value of the software file, and the version number of the upgrade software. That is, before the manufacturer releases the upgrade software, the manufacturer inserts the software version feature information into the flash programming plug-in in the upgrade software. Therefore, the released upgrade software carries the software version feature information.
- the software version feature information is that the manufacturer encrypts the digest value of the flash programming plug-in, the digest value of the software file, and the version number of the upgrade software by using a private encryption key saved by the manufacturer. of.
- the digest value of the flash burning plug-in and the digest value of the software file are respectively calculated by using the first algorithm.
- the foregoing first algorithm may be an MD5 algorithm or a SHA-1 algorithm or other algorithms.
- the mobile terminal performs the legality authentication on the flash programming plug-in, and specifically includes the following processing: the mobile terminal decrypts the software version feature information by using its own public key to obtain a digest value of the flash programming plug-in. , the summary value of the software file and the version number of the upgrade software.
- the first algorithm is used to calculate the digest value of the downloaded flash programming plug-in, and determine whether the digest value of the downloaded flash programming plug-in is consistent with the decrypted flash burning plug-in digest value, and determine the decryption.
- the digest value of the downloaded flash programming plug-in is consistent with the digest value of the decrypted flash programming plug-in. If not, the flash programming plug-in legality authentication fails. If the process is consistent, the system continues to determine whether the version number of the upgraded software obtained by the decryption conforms to its own preset rule. If it does not match, it indicates that the firmware registration of the flash programming plugin fails, and the process ends directly; It indicates that the flash burning plug-in legality certification is passed.
- Step S102 running the flash programming plug-in in the RAM, downloading the upgrade file in the upgrade software from the computer to the RAM, and performing legality verification on the upgrade file in the RAM; Then, the process goes to step S103; when the verification fails, the process ends.
- Step S103 Write the upgrade file in the RAM memory into its own flash memory to implement software security upgrade.
- the validity check of the upgrade file by the mobile terminal specifically includes the following processing: the mobile terminal uses the first algorithm to calculate a digest value of the downloaded upgrade file, and determines the Whether the summary value of the downloaded upgrade file is consistent with the summary value of the upgraded file obtained by the decryption. If they are consistent, the validity of the upgrade file is verified. If they are inconsistent, it indicates that the validity of the upgrade file fails to be verified, and the process is directly ended.
- the upgrade file in the upgrade software may be one or two or more.
- the upgrade files are downloaded one by one.
- downloading subsequent upgrade files is stopped. Referring to Figure 2, the specific process is as follows:
- Step S201 running a flash programming plug-in in the RAM, downloading an un-downloaded upgrade file in the upgrade software from the computer to the RAM, and performing legality verification on the upgrade file in the RAM; If the verification passes, the process goes to step S202; when the verification fails, the process ends;
- Step S202 Write the upgrade file in the RAM into its own flash memory; determine whether the upgrade file in the upgrade software is downloaded, and if yes, the upgrade ends; if not, return to step S201.
- the flash burning plug-in of the upgrade software loaded in its own RAM is legalized; after the authentication is passed, the flash burning plug-in is run, the files in the upgrade software are downloaded to the RAM, and the upgrade file is legalized.
- the verification is passed, the upgrade file in the RAM is written into its own flash memory, which can effectively prevent the mobile terminal from downloading the illegal upgrade file, thereby effectively preventing the risk of the mobile terminal illegally brushing the machine and improving the movement. Security of terminal software upgrades.
- the present invention further provides a mobile terminal 100.
- the embodiment includes: a first downloading module 110, an authentication module 120, a second downloading module 130, a verifying module 140, and a writing module 150.
- the first downloading module 110 is configured to: establish a communication connection with the computer, and download the flash programming plug-in in the upgrade software from the computer to the RAM of the mobile terminal itself.
- the authentication module 120 is configured to: perform legality authentication on the flash programming plug-in in the RAM.
- the second downloading module 130 is configured to: after the authentication is passed, run the flash programming plug-in in the RAM, and download the upgrade file in the upgrade software from the computer to the RAM.
- the verification module 140 is configured to: perform validity verification on the upgrade file in the RAM.
- the writing module 150 is configured to: after the verification is passed, write the upgrade file in the RAM into its own flash memory to implement a software security upgrade.
- the second downloading module 130 is further configured to control to stop downloading when the authentication fails.
- the mobile terminal 100 establishes a communication connection with the computer through a serial port or a USB interface.
- the upgrade software carries software version feature information.
- the software version feature information is a ciphertext encrypted in tandem by a summary value of a flash burning plug-in in the upgrade software, a digest value of the software file, and a version number of the upgrade software. That is, before the manufacturer releases the upgrade software, the manufacturer inserts the software version feature information into the flash programming plug-in in the upgrade software. Therefore, the released upgrade software carries the software version feature information.
- the software version feature information is that the manufacturer encrypts the digest value of the flash programming plug-in, the digest value of the software file, and the version number of the upgrade software by using a private encryption key saved by the manufacturer. of.
- the digest value of the flash programming plug-in and the digest value of the software file are respectively calculated by using the first algorithm.
- the first algorithm is an MD5 algorithm or a SHA-1 algorithm or other algorithms.
- the authentication module 120 is configured to decrypt the software version feature information by using the public key of the mobile terminal itself, to obtain the digest value and software of the flash programming plug-in.
- the digest value of the file and the version number of the upgrade software ⁇ calculating the digest value of the downloaded flash programming plug-in by using the first algorithm, and determining the digest value of the downloaded flash programming plug-in and the decrypted flash memory Whether the summary value of the recorded plug-in is consistent, and whether the version number of the upgraded software obtained by the decryption conforms to its own preset rule; when the summary value of the downloaded flash burning plug-in and the decrypted flash burning plug-in summary value Consistently, and the version number of the upgraded software obtained by the decryption conforms to its own preset rule, indicating that the flash burning plug-in legality authentication is passed.
- the authentication module 120 may first determine whether the digest value of the downloaded flash programming plug-in is consistent with the digest value of the decrypted flash programming plug-in. If not, the flash burning plug-in is indicated. If the legality authentication fails, the control directly ends the process; if they are consistent, it continues to determine whether the version number of the upgraded software obtained by the decryption conforms to its own preset rule. If not, it indicates that the validity of the flash burning plug-in authentication fails. Then the control directly ends the process; if it is, it indicates that the flash burning plug-in legality certification is passed.
- the verification module 140 is further configured to calculate a digest value of the downloaded upgrade file by using a first algorithm, and determine a digest value of the downloaded upgrade file and a decrypted Whether the summary values of the upgrade files are consistent. If they are consistent, the validity of the upgrade file is verified.
- the upgrade file in the upgrade software may be one or two or more.
- the upgrade file is downloaded one by one.
- downloading the subsequent upgrade file is stopped. See Figure 4, the specific process is as follows:
- Step S301 the download module 130 runs the flash programming plug-in in the RAM, downloads an undownloaded upgrade file in the upgrade software from the computer to the RAM, and passes the verification module 140 to the upgrade in the RAM.
- the file is checked for legality; when the verification passes, the process goes to step S302; when the verification fails, the process ends.
- Step S302 The write module 150 writes the upgrade file in the RAM into its own flash memory; determines whether the upgrade file in the upgrade software is downloaded, and if yes, ends the process; if not, returns to step S301.
- the mobile terminal 100 provided by the present invention performs legality authentication on the flash burning plug-in of the upgrade software downloaded into its own RAM; after the authentication is passed, the flash burning plug-in is run to download the files in the upgrade software. To the RAM, and verify the legality of the upgrade file; when the verification is passed, the upgrade file in the RAM is written into its own flash memory, which can effectively prevent the mobile terminal from downloading the illegal upgrade file, thereby effectively The risk of illegally flashing the mobile terminal is prevented, and the security of the mobile terminal software upgrade is improved.
- the embodiment of the invention can effectively prevent the mobile terminal from downloading the illegal upgrade file, thereby effectively preventing the risk of the mobile terminal illegally brushing the machine and improving the security of the mobile terminal software upgrade.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
- Stored Programmes (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
BR112015021174A BR112015021174A2 (pt) | 2013-04-02 | 2013-08-06 | método de atualização do software de um terminal móvel, e, terminal móvel |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310113657.4A CN104102499A (zh) | 2013-04-02 | 2013-04-02 | 移动终端及其软件升级的方法 |
CN201310113657.4 | 2013-04-02 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2013185724A2 true WO2013185724A2 (zh) | 2013-12-19 |
WO2013185724A3 WO2013185724A3 (zh) | 2014-02-20 |
Family
ID=49758792
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2013/080907 WO2013185724A2 (zh) | 2013-04-02 | 2013-08-06 | 移动终端及其软件升级的方法 |
Country Status (3)
Country | Link |
---|---|
CN (1) | CN104102499A (zh) |
BR (1) | BR112015021174A2 (zh) |
WO (1) | WO2013185724A2 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170286090A1 (en) * | 2016-03-31 | 2017-10-05 | Microsoft Technology Licensing, Llc | High performance mobile device flashing |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107404391A (zh) * | 2016-05-19 | 2017-11-28 | 中兴通讯股份有限公司 | 版本文件校验方法及装置和加密方法及装置 |
CN106055341A (zh) * | 2016-06-14 | 2016-10-26 | 北京奇虎科技有限公司 | 应用程序安装包的校验方法及装置 |
CN105975850B (zh) | 2016-07-01 | 2020-01-14 | 惠州Tcl移动通信有限公司 | 一种基于移动终端的软件下载方法及系统 |
CN106060947B (zh) | 2016-07-12 | 2019-09-24 | 惠州Tcl移动通信有限公司 | 一种无线移动通信中的资源分配方法及系统 |
CN106210334B (zh) | 2016-07-22 | 2020-05-08 | 惠州Tcl移动通信有限公司 | 一种智能闪光灯控制方法、系统及移动终端 |
CN106899437B (zh) * | 2017-02-23 | 2020-05-01 | 百富计算机技术(深圳)有限公司 | 一种升级pos机模块固件的方法和装置 |
CN107704756B (zh) * | 2017-09-26 | 2021-10-19 | 晶晨半导体(上海)股份有限公司 | 一种系统升级前的安全校验方法及系统 |
CN108459879B (zh) * | 2018-01-17 | 2021-08-17 | 宇龙计算机通信科技(深圳)有限公司 | 一种防止终端死机的方法、终端 |
CN112667264A (zh) * | 2021-01-15 | 2021-04-16 | 广州路派电子科技有限公司 | 一种脱机下载软件升级的方法及系统 |
CN113779636A (zh) * | 2021-09-23 | 2021-12-10 | 成都卫士通信息产业股份有限公司 | 一种文件刻录管控方法、装置、电子设备及存储介质 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101008898A (zh) * | 2007-02-01 | 2007-08-01 | 中兴通讯股份有限公司 | 一种智能化设备软件升级与修复的方法和系统 |
CN101026850A (zh) * | 2007-03-09 | 2007-08-29 | 华为技术有限公司 | 移动终端软件自动升级的方法及系统、移动终端和软件管理服务器 |
CN101593123A (zh) * | 2009-06-30 | 2009-12-02 | 中兴通讯股份有限公司 | 闪存烧录插件的固化方法以及终端设备 |
CN101694621A (zh) * | 2009-10-22 | 2010-04-14 | 中兴通讯股份有限公司 | 一种升级移动终端软件的方法和移动终端 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW200525360A (en) * | 2004-01-19 | 2005-08-01 | Comax Semiconductor Inc | Mobile communication device and memory device and accessing process thereof |
CN101094341A (zh) * | 2006-04-21 | 2007-12-26 | 深圳市朗科科技有限公司 | 基于数字电视数据广播升级终端设备软件或内容的方法 |
CN101247416A (zh) * | 2008-03-25 | 2008-08-20 | 中兴通讯股份有限公司 | 基于ota的固件下载方法、预处理方法、完整性验证方法 |
-
2013
- 2013-04-02 CN CN201310113657.4A patent/CN104102499A/zh active Pending
- 2013-08-06 BR BR112015021174A patent/BR112015021174A2/pt not_active Application Discontinuation
- 2013-08-06 WO PCT/CN2013/080907 patent/WO2013185724A2/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101008898A (zh) * | 2007-02-01 | 2007-08-01 | 中兴通讯股份有限公司 | 一种智能化设备软件升级与修复的方法和系统 |
CN101026850A (zh) * | 2007-03-09 | 2007-08-29 | 华为技术有限公司 | 移动终端软件自动升级的方法及系统、移动终端和软件管理服务器 |
CN101593123A (zh) * | 2009-06-30 | 2009-12-02 | 中兴通讯股份有限公司 | 闪存烧录插件的固化方法以及终端设备 |
CN101694621A (zh) * | 2009-10-22 | 2010-04-14 | 中兴通讯股份有限公司 | 一种升级移动终端软件的方法和移动终端 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170286090A1 (en) * | 2016-03-31 | 2017-10-05 | Microsoft Technology Licensing, Llc | High performance mobile device flashing |
Also Published As
Publication number | Publication date |
---|---|
BR112015021174A2 (pt) | 2017-07-18 |
WO2013185724A3 (zh) | 2014-02-20 |
CN104102499A (zh) | 2014-10-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2013185724A2 (zh) | 移动终端及其软件升级的方法 | |
CN110597538B (zh) | 一种基于ota升级系统的软件升级方法和ota升级系统 | |
US10547604B2 (en) | Information recording apparatus with shadow boot program for authentication with a server | |
CN106168899B (zh) | 用于更新嵌入式控制设备的方法和更新网关 | |
TWI436236B (zh) | 安全更新現場可升級單元之方法與系統 | |
JP5703391B2 (ja) | 耐タンパー性ブート処理のためのシステム及び方法 | |
CN104506515A (zh) | 一种固件的保护方法和保护装置 | |
US20080189695A1 (en) | Updating of Data Instructions | |
WO2021159530A1 (zh) | 一种车载设备升级方法及相关装置 | |
US20130152180A1 (en) | Device using secure processing zone to establish trust for digital rights management | |
JP2007293873A (ja) | 電子装置の安全性を保証する方法、セキュリティシステム及び電子装置 | |
CN109388961B (zh) | 存储设备的安全控制方法及存储设备 | |
WO2015042981A1 (zh) | 加解密处理方法、装置和设备 | |
CN103166759A (zh) | 使用诊断链路连接器(dlc)和onstar系统的用于安全固件下载的方法和装置 | |
TW201735578A (zh) | 受控的安全碼認證 | |
WO2012083823A1 (zh) | 对终端进行锁网的方法和装置 | |
CN111526159A (zh) | 建立数据连接的方法、装置、终端设备及存储介质 | |
JP6387908B2 (ja) | 認証システム | |
CN113239363A (zh) | 固件更新方法、装置、设备、可读存储介质及存储器系统 | |
US11838282B2 (en) | Information recording apparatus with server-based user authentication for accessing a locked operating system storage | |
US20220182248A1 (en) | Secure startup method, controller, and control system | |
CN109508529B (zh) | 一种支付终端安全启动校验的实现方法 | |
CN116561734A (zh) | 一种验证方法、装置、计算机及计算机配置系统 | |
JP7508571B2 (ja) | 車両の安全始動方法、安全始動装置、電子制御ユニット及び記憶媒体 | |
KR101711024B1 (ko) | 부정조작방지 장치 접근 방법 및 그 방법을 채용한 단말 장치 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: IDP00201505357 Country of ref document: ID |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112015021174 Country of ref document: BR |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 13803441 Country of ref document: EP Kind code of ref document: A2 |
|
ENP | Entry into the national phase in: |
Ref document number: 112015021174 Country of ref document: BR Kind code of ref document: A2 Effective date: 20150901 |