WO2013185724A2 - 移动终端及其软件升级的方法 - Google Patents

移动终端及其软件升级的方法 Download PDF

Info

Publication number
WO2013185724A2
WO2013185724A2 PCT/CN2013/080907 CN2013080907W WO2013185724A2 WO 2013185724 A2 WO2013185724 A2 WO 2013185724A2 CN 2013080907 W CN2013080907 W CN 2013080907W WO 2013185724 A2 WO2013185724 A2 WO 2013185724A2
Authority
WO
WIPO (PCT)
Prior art keywords
software
upgrade
mobile terminal
digest value
plug
Prior art date
Application number
PCT/CN2013/080907
Other languages
English (en)
French (fr)
Other versions
WO2013185724A3 (zh
Inventor
温海龙
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to BR112015021174A priority Critical patent/BR112015021174A2/pt
Publication of WO2013185724A2 publication Critical patent/WO2013185724A2/zh
Publication of WO2013185724A3 publication Critical patent/WO2013185724A3/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • G06F8/654Updates using techniques specially adapted for alterable solid state memories, e.g. for EEPROM or flash memories

Definitions

  • the present invention relates to the field of mobile communication technologies, and in particular, to a mobile terminal and a method for upgrading the same.
  • the upgrade function of the mobile terminal software facilitates the after-sales maintenance of the terminal manufacturer, but there are security risks in the way of upgrading the existing mobile terminal software; some illegal personnel or organizations are driven by the interests, and the upgrade function of the mobile terminal is used to unlock the software version of the non-locking network or The version of the cracked software generated by the decompilation is downloaded to the mobile terminal, thereby breaking the lock function of the mobile terminal.
  • This illegal brushing behavior may cause the mobile terminal to be inoperable, causing the mobile terminal to crash, resulting in a large number of mobile terminals returning to the factory as a faulty machine, which ultimately causes huge losses to operators and mobile terminal manufacturers.
  • the embodiment of the invention provides a mobile terminal and a software upgrade method thereof, which improves the security of the software upgrade of the mobile terminal, and prevents the occurrence of the illegal crash of the mobile terminal.
  • the mobile terminal establishes a communication connection with the computer, and downloads the flash programming plug-in in the upgrade software from the computer to the random access memory (RAM) of the mobile terminal, and scans the flash memory plug-in in the RAM. Conduct legality certification;
  • the upgrade file in the RAM memory is written into the flash memory of the mobile terminal to implement a software security upgrade.
  • the upgrade software carries software version feature information
  • the software version feature information is a ciphertext obtained by serially encrypting a digest value of a flash programming plug-in in the upgrade software, a digest value of the software file, and a version number of the upgrade software;
  • the digest value of the flash programming plug-in and the digest value of the software file are respectively calculated by using the first algorithm.
  • the mobile terminal performs legality authentication on the flash programming plug-in, including:
  • the mobile terminal uses the first algorithm to calculate a digest value of the downloaded flash programming plug-in, and determines whether the digest value of the downloaded flash programming plug-in is consistent with the digested flash burning plug-in digest value. And determining whether the version number of the upgraded software obtained by the decryption conforms to its own preset rule;
  • the mobile terminal uses the first algorithm to calculate a digest value of the downloaded upgrade file, and determines whether the digest value of the downloaded upgrade file is consistent with the digest value of the decrypted upgrade file. If they are consistent, the upgrade file is legal. Sexual verification passed.
  • the first algorithm is an MD5 algorithm or a SHA-1 algorithm.
  • the embodiment of the invention further provides a mobile terminal, including:
  • a first downloading module configured to: establish a communication connection with the computer, and download the flash programming plug-in in the upgrade software from the computer to the RAM of the mobile terminal;
  • An authentication module configured to: perform legality authentication on the flash programming plug-in in the RAM; a second downloading module, configured to: after the authentication is passed, run the flash programming plug-in in the RAM, and download an upgrade file in the upgrade software from the computer to the RAM; a verification module, and a setting thereof For: verifying the legality of the upgrade file in the RAM;
  • the write module is set to: after the verification is passed, write the upgrade file in the RAM into its own flash memory to implement software security upgrade.
  • the upgrade software carries software version feature information
  • the software version feature information is a ciphertext encrypted in tandem by a summary value of a flash burning plug-in in the upgrade software, a digest value of the software file, and a version number of the upgrade software;
  • the digest value of the flash programming plug-in and the digest value of the software file are respectively calculated by using the first algorithm.
  • the authentication module is configured to: decrypt the software version feature information by using its own public key, obtain a digest value of the flash programming plug-in, a digest value of the software file, and a version number of the upgrade software;
  • the first algorithm is used to calculate the digest value of the downloaded flash programming plug-in, and determine whether the digest value of the downloaded flash programming plug-in is consistent with the decrypted flash burning plug-in digest value, and determine the decryption.
  • the version number of the obtained upgrade software conforms to its own preset rule; when the summary value of the downloaded flash programming plug-in is consistent with the decrypted flash programming plug-in summary value, and the version number of the upgraded software obtained by the decryption Corresponding to its own preset rules, it indicates that the flash burning plug-in legality certification passed.
  • the verification module is configured to: calculate, by using the first algorithm, a digest value of the downloaded upgrade file, and determine whether the digest value of the downloaded upgrade file is consistent with the digest value of the decrypted upgrade file, if consistent, This indicates that the validity of the upgrade file is verified.
  • the first algorithm is an MD5 algorithm or a SHA-1 algorithm.
  • the mobile terminal and the software upgrade method thereof provided by the embodiments of the present invention can effectively prevent the mobile terminal from downloading the illegal upgrade file, thereby effectively preventing the risk of the mobile terminal illegally brushing the machine and improving the security of the mobile terminal software upgrade.
  • FIG. 1 is a flow chart of an embodiment of a method for upgrading a mobile terminal software according to the present invention
  • FIG. 2 is another flowchart of an embodiment of a method for upgrading a mobile terminal of the present invention
  • FIG. 3 is a schematic structural diagram of an embodiment of a mobile terminal according to the present invention
  • an embodiment of a method for upgrading a mobile terminal software includes: Step S101: A mobile terminal establishes a communication connection with a computer, and downloads a flash programming plug-in in the upgrade software from a computer to its own RAM. And performing legality authentication on the flash programming plug-in in the RAM; when the authentication is passed, the process proceeds to step S102; otherwise, the process ends.
  • the mobile terminal establishes a communication connection with the computer through a serial port or a Universal Serial Bus (USB) interface.
  • USB Universal Serial Bus
  • the upgrade software carries software version feature information.
  • the software version feature information is a ciphertext obtained by serially encrypting the digest value of the flash programming plug-in in the upgrade software, the digest value of the software file, and the version number of the upgrade software. That is, before the manufacturer releases the upgrade software, the manufacturer inserts the software version feature information into the flash programming plug-in in the upgrade software. Therefore, the released upgrade software carries the software version feature information.
  • the software version feature information is that the manufacturer encrypts the digest value of the flash programming plug-in, the digest value of the software file, and the version number of the upgrade software by using a private encryption key saved by the manufacturer. of.
  • the digest value of the flash burning plug-in and the digest value of the software file are respectively calculated by using the first algorithm.
  • the foregoing first algorithm may be an MD5 algorithm or a SHA-1 algorithm or other algorithms.
  • the mobile terminal performs the legality authentication on the flash programming plug-in, and specifically includes the following processing: the mobile terminal decrypts the software version feature information by using its own public key to obtain a digest value of the flash programming plug-in. , the summary value of the software file and the version number of the upgrade software.
  • the first algorithm is used to calculate the digest value of the downloaded flash programming plug-in, and determine whether the digest value of the downloaded flash programming plug-in is consistent with the decrypted flash burning plug-in digest value, and determine the decryption.
  • the digest value of the downloaded flash programming plug-in is consistent with the digest value of the decrypted flash programming plug-in. If not, the flash programming plug-in legality authentication fails. If the process is consistent, the system continues to determine whether the version number of the upgraded software obtained by the decryption conforms to its own preset rule. If it does not match, it indicates that the firmware registration of the flash programming plugin fails, and the process ends directly; It indicates that the flash burning plug-in legality certification is passed.
  • Step S102 running the flash programming plug-in in the RAM, downloading the upgrade file in the upgrade software from the computer to the RAM, and performing legality verification on the upgrade file in the RAM; Then, the process goes to step S103; when the verification fails, the process ends.
  • Step S103 Write the upgrade file in the RAM memory into its own flash memory to implement software security upgrade.
  • the validity check of the upgrade file by the mobile terminal specifically includes the following processing: the mobile terminal uses the first algorithm to calculate a digest value of the downloaded upgrade file, and determines the Whether the summary value of the downloaded upgrade file is consistent with the summary value of the upgraded file obtained by the decryption. If they are consistent, the validity of the upgrade file is verified. If they are inconsistent, it indicates that the validity of the upgrade file fails to be verified, and the process is directly ended.
  • the upgrade file in the upgrade software may be one or two or more.
  • the upgrade files are downloaded one by one.
  • downloading subsequent upgrade files is stopped. Referring to Figure 2, the specific process is as follows:
  • Step S201 running a flash programming plug-in in the RAM, downloading an un-downloaded upgrade file in the upgrade software from the computer to the RAM, and performing legality verification on the upgrade file in the RAM; If the verification passes, the process goes to step S202; when the verification fails, the process ends;
  • Step S202 Write the upgrade file in the RAM into its own flash memory; determine whether the upgrade file in the upgrade software is downloaded, and if yes, the upgrade ends; if not, return to step S201.
  • the flash burning plug-in of the upgrade software loaded in its own RAM is legalized; after the authentication is passed, the flash burning plug-in is run, the files in the upgrade software are downloaded to the RAM, and the upgrade file is legalized.
  • the verification is passed, the upgrade file in the RAM is written into its own flash memory, which can effectively prevent the mobile terminal from downloading the illegal upgrade file, thereby effectively preventing the risk of the mobile terminal illegally brushing the machine and improving the movement. Security of terminal software upgrades.
  • the present invention further provides a mobile terminal 100.
  • the embodiment includes: a first downloading module 110, an authentication module 120, a second downloading module 130, a verifying module 140, and a writing module 150.
  • the first downloading module 110 is configured to: establish a communication connection with the computer, and download the flash programming plug-in in the upgrade software from the computer to the RAM of the mobile terminal itself.
  • the authentication module 120 is configured to: perform legality authentication on the flash programming plug-in in the RAM.
  • the second downloading module 130 is configured to: after the authentication is passed, run the flash programming plug-in in the RAM, and download the upgrade file in the upgrade software from the computer to the RAM.
  • the verification module 140 is configured to: perform validity verification on the upgrade file in the RAM.
  • the writing module 150 is configured to: after the verification is passed, write the upgrade file in the RAM into its own flash memory to implement a software security upgrade.
  • the second downloading module 130 is further configured to control to stop downloading when the authentication fails.
  • the mobile terminal 100 establishes a communication connection with the computer through a serial port or a USB interface.
  • the upgrade software carries software version feature information.
  • the software version feature information is a ciphertext encrypted in tandem by a summary value of a flash burning plug-in in the upgrade software, a digest value of the software file, and a version number of the upgrade software. That is, before the manufacturer releases the upgrade software, the manufacturer inserts the software version feature information into the flash programming plug-in in the upgrade software. Therefore, the released upgrade software carries the software version feature information.
  • the software version feature information is that the manufacturer encrypts the digest value of the flash programming plug-in, the digest value of the software file, and the version number of the upgrade software by using a private encryption key saved by the manufacturer. of.
  • the digest value of the flash programming plug-in and the digest value of the software file are respectively calculated by using the first algorithm.
  • the first algorithm is an MD5 algorithm or a SHA-1 algorithm or other algorithms.
  • the authentication module 120 is configured to decrypt the software version feature information by using the public key of the mobile terminal itself, to obtain the digest value and software of the flash programming plug-in.
  • the digest value of the file and the version number of the upgrade software ⁇ calculating the digest value of the downloaded flash programming plug-in by using the first algorithm, and determining the digest value of the downloaded flash programming plug-in and the decrypted flash memory Whether the summary value of the recorded plug-in is consistent, and whether the version number of the upgraded software obtained by the decryption conforms to its own preset rule; when the summary value of the downloaded flash burning plug-in and the decrypted flash burning plug-in summary value Consistently, and the version number of the upgraded software obtained by the decryption conforms to its own preset rule, indicating that the flash burning plug-in legality authentication is passed.
  • the authentication module 120 may first determine whether the digest value of the downloaded flash programming plug-in is consistent with the digest value of the decrypted flash programming plug-in. If not, the flash burning plug-in is indicated. If the legality authentication fails, the control directly ends the process; if they are consistent, it continues to determine whether the version number of the upgraded software obtained by the decryption conforms to its own preset rule. If not, it indicates that the validity of the flash burning plug-in authentication fails. Then the control directly ends the process; if it is, it indicates that the flash burning plug-in legality certification is passed.
  • the verification module 140 is further configured to calculate a digest value of the downloaded upgrade file by using a first algorithm, and determine a digest value of the downloaded upgrade file and a decrypted Whether the summary values of the upgrade files are consistent. If they are consistent, the validity of the upgrade file is verified.
  • the upgrade file in the upgrade software may be one or two or more.
  • the upgrade file is downloaded one by one.
  • downloading the subsequent upgrade file is stopped. See Figure 4, the specific process is as follows:
  • Step S301 the download module 130 runs the flash programming plug-in in the RAM, downloads an undownloaded upgrade file in the upgrade software from the computer to the RAM, and passes the verification module 140 to the upgrade in the RAM.
  • the file is checked for legality; when the verification passes, the process goes to step S302; when the verification fails, the process ends.
  • Step S302 The write module 150 writes the upgrade file in the RAM into its own flash memory; determines whether the upgrade file in the upgrade software is downloaded, and if yes, ends the process; if not, returns to step S301.
  • the mobile terminal 100 provided by the present invention performs legality authentication on the flash burning plug-in of the upgrade software downloaded into its own RAM; after the authentication is passed, the flash burning plug-in is run to download the files in the upgrade software. To the RAM, and verify the legality of the upgrade file; when the verification is passed, the upgrade file in the RAM is written into its own flash memory, which can effectively prevent the mobile terminal from downloading the illegal upgrade file, thereby effectively The risk of illegally flashing the mobile terminal is prevented, and the security of the mobile terminal software upgrade is improved.
  • the embodiment of the invention can effectively prevent the mobile terminal from downloading the illegal upgrade file, thereby effectively preventing the risk of the mobile terminal illegally brushing the machine and improving the security of the mobile terminal software upgrade.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Stored Programmes (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

一种移动终端及其软件升级的方法,移动终端与计算机建立通讯连接,将升级软件中的闪存烧录插件由计算机中下载到自身的RAM,并对RAM中所述闪存烧录插件进行合法性认证;当认证通过,运行RAM中闪存烧录插件,将升级软件中升级文件由计算机下载至RAM,并对RAM中所述升级文件进行合法性校验;当校验通过,将该RAM中所述升级文件写入自身的闪存,以实现软件安全升级。

Description

移动终端及其软件升级的方法
技术领域
本发明涉及移动通信技术领域, 尤其是涉及一种移动终端及其软件升级 的方法。
背景技术
移动终端软件升级功能为终端厂商的售后维护提供了便利, 但现有移动 终端软件升级的方式存在安全隐患; 一些不法人员或组织受利益驱动, 利用 移动终端的升级功能将非锁网软件版本或反编译生成的破解软件版本下载到 移动终端中, 从而将移动终端的锁网功能破解。
这种非法刷机的行为可能会导致移动终端无法运行,导致移动终端死机, 从而导致大量的移动终端作为故障机返厂维修, 最终给运营商和移动终端厂 商造成巨大损失。
发明内容
本发明实施例提供一种移动终端及其软件升级的方法, 提高移动终端软 件升级的安全性, 防止移动终端非法刷机死机现象的发生。
本发明实施例提出的一种移动终端软件升级的方法, 包括:
移动终端与计算机建立通讯连接, 将升级软件中的闪存烧录插件由计算 机中下载到所述移动终端的随机存储器( Random Access Memory, RAM ) 中, 并对所述 RAM中所述闪存烧录插件进行合法性认证;
当认证通过后, 运行所述 RAM 中的所述闪存烧录插件, 将所述升级软 件中的升级文件由所述计算机中下载至所述 RAM, 并对所述 RAM中的所述 升级文件进行合法性校验;
当校验通过后, 将所述 RAM存储器中的升级文件写入所述移动终端的 闪存(Flash Memory ) 内, 以实现软件安全升级。 优选地, 所述升级软件携带有软件版本特征信息;
所述软件版本特征信息为由升级软件中的闪存烧录插件的摘要值、 软件 文件的摘要值以及升级软件的版本号串联加密而得的密文;
所述闪存烧录插件的摘要值、 软件文件的摘要值分别为釆用第一算法计 算而得。
优选地, 所述移动终端对闪存烧录插件进行合法性认证包括:
密, 得到所述闪存烧录插件的摘要值、 软件文件的摘要值以及升级软件的版 本号;
所述移动终端釆用所述第一算法计算下载后的闪存烧录插件的摘要值, 并判断所述下载后的闪存烧录插件的摘要值与解密得到的闪存烧录插件的摘 要值是否一致, 以及判断解密得到的升级软件的版本号是否符合自身的预设 规则;
当所述下载后的闪存烧录插件的摘要值与解密得到的闪存烧录插件的摘 要值一致, 以及解密得到的升级软件的版本号符合自身的预设规则, 则所述 闪存烧录插件合法性认证通过。
所述移动终端釆用所述第一算法计算下载的升级文件的摘要值, 判断该 下载的升级文件的摘要值与解密得到的升级文件的摘要值是否一致,若一致, 则表明该升级文件合法性校验通过。
优选地, 所述第一算法为 MD5算法或 SHA-1算法。
本发明实施例还提供一种移动终端, 包括:
第一下载模块, 其设置为: 与计算机建立通讯连接, 将升级软件中的闪 存烧录插件由计算机中下载至所述移动终端的 RAM中;
认证模块, 其设置为: 对所述 RAM 中的所述闪存烧录插件进行合法性 认证; 第二下载模块, 其设置为: 当认证通过后, 运行所述 RAM 中的所述闪 存烧录插件, 并将升级软件中的升级文件由计算机中下载至所述 RAM; 校验模块, 其设置为: 对所述 RAM 中所述升级文件进行合法性校验; 以及
写入模块, 其设置为: 当校验通过后, 将所述 RAM 中所述升级文件写 入自身的闪存内, 以实现软件安全升级。
优选地, 所述升级软件携带有软件版本特征信息;
所述软件版本特征信息为由升级软件中的闪存烧录插件的摘要值、 软件 文件的摘要值以及升级软件的版本号串联加密的密文;
所述闪存烧录插件的摘要值、 软件文件的摘要值分别为釆用第一算法计 算而得。
优选地, 所述认证模块是设置为: 釆用自身的公钥对所述软件版本特征 信息进行解密, 得到所述闪存烧录插件的摘要值、 软件文件的摘要值以及升 级软件的版本号; 釆用所述第一算法计算下载后的闪存烧录插件的摘要值 , 并判断所述下载后的闪存烧录插件的摘要值与解密得到的闪存烧录插件的摘 要值是否一致, 以及判断解密得到的升级软件的版本号是否符合自身的预设 规则; 当所述下载后的闪存烧录插件的摘要值与解密得到的闪存烧录插件的 摘要值一致, 以及解密得到的升级软件的版本号符合自身的预设规则, 则表 明所述闪存烧录插件合法性认证通过。
优选地, 所述校验模块是设置为: 釆用第一算法计算下载的升级文件的 摘要值, 判断该下载的升级文件的摘要值与解密得到的升级文件的摘要值是 否一致, 若一致, 则表明该升级文件合法性校验通过。
优选地, 所述第一算法为 MD5算法或 SHA-1算法。
本发明实施例所提供的一种移动终端及其软件升级的方法, 可有效防止 移动终端下载非法升级文件, 从而可有效地防止移动终端非法刷机死机的风 险, 提高了移动终端软件升级的安全性。 附图概述
图 1是本发明的移动终端软件升级的方法一实施例的流程图;
图 2是本发明的移动终端软件升级的方法实施例的另一流程图; 图 3是本发明的移动终端一实施例的结构示意图;
本发明目的的实现、 功能特点及优点将结合实施例, 参照附图做进一步 说明。 本发明的较佳实施方式
下文中将结合附图对本发明的实施例进行详细说明。 需要说明的是, 在 不冲突的情况下, 本申请中的实施例及实施例中的特征可以相互任意组合。
参见图 1 , 提出本发明的一种移动终端软件升级的方法一实施例, 包括: 步骤 S101、 移动终端与计算机建立通讯连接, 将升级软件中的闪存烧录 插件由计算机中下载到自身的 RAM中,并对 RAM中所述闪存烧录插件进行 合法性认证; 当认证通过, 则转入步骤 S102; 否则结束流程。
本步骤中, 所述移动终端与所述计算机通过串口或通用串行总线 ( Universal Serial BUS , USB )接口建立通讯连接。
本步骤中, 所述升级软件携带有软件版本特征信息。 其中, 所述软件版 本特征信息为由升级软件中的闪存烧录插件的摘要值、 软件文件的摘要值以 及升级软件的版本号串联加密而得的密文。 即厂商在发布升级软件之前, 厂 商则将软件版本特征信息插入到升级软件中的闪存烧录插件中。 因此发布的 升级软件即携带有软件版本特征信息。 其中, 所述软件版本特征信息是由于 厂商通过自身保存的私钥釆用非对称加密算法对所述闪存烧录插件的摘要 值、 软件文件的摘要值以及升级软件的版本号进行串联加密而成的。 上述所 述闪存烧录插件的摘要值、软件文件的摘要值分别为釆用第一算法计算而得。 其中, 上述第一算法可以是 MD5算法或 SHA-1算法或其他算法。 本步骤中, 所述移动终端对闪存烧录插件进行合法性认证具体包括如下 处理: 移动终端釆用自身的公钥对所述软件版本特征信息进行解密, 得到所 述闪存烧录插件的摘要值、 软件文件的摘要值以及升级软件的版本号。 釆用 所述第一算法计算下载后的闪存烧录插件的摘要值, 并判断所述下载后的闪 存烧录插件的摘要值与解密得到的闪存烧录插件的摘要值是否一致, 以及判 断解密得到的升级软件的版本号是否符合自身的预设规则。 当所述下载后的 闪存烧录插件的摘要值与解密得到的闪存烧录插件的摘要值一致, 以及解密 得到的升级软件的版本号符合自身的预设规则, 则表明所述闪存烧录插件合 法性认证通过。
本步骤, 中当所述下载后的闪存烧录插件的摘要值与解密得到的闪存烧 录插件的摘要值不一致, 和 /或解密得到的升级软件的版本号不符合自身的预 设规则, 则表明所述闪存烧录插件合法性认证失败。
本步骤中, 也可以先判断所述下载后的闪存烧录插件的摘要值与解密得 到的闪存烧录插件的摘要值是否一致, 若不一致, 则表明所述闪存烧录插件 合法性认证失败, 直接结束流程; 若一致, 则继续判断解密得到的升级软件 的版本号是否符合自身的预设规则, 若不符合, 则表明所述闪存烧录插件合 法性认证失败, 直接结束流程; 若符合, 则表明所述闪存烧录插件合法性认 证通过。
步骤 S102、 运行 RAM中的所述闪存烧录插件, 将升级软件中的升级文 件由计算机中下载至所述 RAM, 并对 RAM中的所述升级文件进行合法性校 验; 当校验通过, 则转入步骤 S103; 当校验不通过, 则结束流程。
步骤 S103、 将该 RAM存储器中的升级文件写入自身的闪存内, 以实现 软件安全升级。
较佳地, 上述移动终端软件升级的方法实施例中, 移动终端对所述升级 文件进行合法性校验具体包括如下处理: 移动终端釆用第一算法计算下载的 升级文件的摘要值, 判断该下载的升级文件的摘要值与解密得到的升级文件 的摘要值是否一致, 若一致, 则表明该升级文件合法性校验通过。 若不一致, 则表明该升级文件合法性校验失败, 则直接结束流程。
另外, 本实施例中, 所述升级软件中的升级文件可能为一个或两个以上, 当所述升级文件为两个以上, 则所述升级文件逐个下载。 在升级文件下载过 程, 当某一升级文件校验失败, 则停止下载后续的升级文件。 参见图 2, 其 具体过程如下:
步骤 S201、 运行所述 RAM中的闪存烧录插件, 将升级软件中的未下载 的一个升级文件由计算机中下载至所述 RAM, 并对 RAM中的所述升级文件 进行合法性校验; 当校验通过, 则转入步骤 S202; 当校验不通过, 则结束流 程;
步骤 S202、 将该 RAM中的升级文件写入自身的闪存内; 判断所述升级 软件中的升级文件是否下载完毕, 若是, 则升级结束; 若否, 则返回执行步 骤 S201。 载到自身的 RAM 中的升级软件的闪存烧录插件进行合法性认证; 当认证通 过后, 运行该闪存烧录插件, 下载升级软件中的文件至所述 RAM, 并对升级 文件进行合法性校验; 当校验通过后, 将该 RAM 中的升级文件写入自身的 闪存内的方式, 可有效防止移动终端下载非法升级文件, 从而可有效地防止 移动终端非法刷机死机的风险, 提高了移动终端软件升级的安全性。
参见图 3 , 本发明另提出一种移动终端 100—实施例, 包括: 第一下载 模块 110, 认证模块 120, 第二下载模块 130, 校验模块 140, 写入模块 150。 其中, 所述第一下载模块 110, 设置为: 与计算机建立通讯连接, 将升级软 件中的闪存烧录插件由计算机中下载至移动终端自身的 RAM 中。 所述认证 模块 120, 设置为: 对 RAM中所述闪存烧录插件进行合法性认证。 所述第二 下载模块 130, 设置为: 当认证通过后, 运行 RAM中所述闪存烧录插件, 并 将升级软件中的升级文件由计算机中下载至所述 RAM。 所述校验模块 140, 设置为: 对 RAM中所述升级文件进行合法性校验。 所述写入模块 150, 设置 为: 当校验通过后, 将 RAM 中所述升级文件写入自身的闪存内, 以实现软 件安全升级。
另外, 所述第二下载模块 130, 还设置为当认证失败, 则控制停止下载。 本实施例中 ,所述移动终端 100与所述计算机通过串口或 USB接口建立 通讯连接。
较佳地, 上述移动终端 100实施例中, 所述升级软件中携带有软件版本 特征信息。所述软件版本特征信息为由升级软件中的闪存烧录插件的摘要值、 软件文件的摘要值以及升级软件的版本号串联加密的密文。 即厂商在发布升 级软件之前, 厂商则将软件版本特征信息插入到升级软件中的闪存烧录插件 中。 因此发布的升级软件即携带有软件版本特征信息。 其中, 所述软件版本 特征信息是由于厂商通过自身保存的私钥釆用非对称加密算法对所述闪存烧 录插件的摘要值、 软件文件的摘要值以及升级软件的版本号进行串联加密而 成的。 上述所述闪存烧录插件的摘要值、 软件文件的摘要值分别为釆用第一 算法计算而得。 其中, 所述第一算法为 MD5算法或 SHA-1算法或其他算法。
较佳地, 上述移动终端 100 实施例, 所述认证模块 120, 是设置为釆用 移动终端自身的公钥对所述软件版本特征信息进行解密, 得到所述闪存烧录 插件的摘要值、 软件文件的摘要值以及升级软件的版本号; 釆用所述第一算 法计算下载后的闪存烧录插件的摘要值, 并判断所述下载后的闪存烧录插件 的摘要值与解密得到的闪存烧录插件的摘要值是否一致, 以及判断解密得到 的升级软件的版本号是否符合自身的预设规则; 当所述下载后的闪存烧录插 件的摘要值与解密得到的闪存烧录插件的摘要值一致, 以及解密得到的升级 软件的版本号符合自身的预设规则, 则表明所述闪存烧录插件合法性认证通 过。
本实施例中, 当所述下载后的闪存烧录插件的摘要值与解密得到的闪存 烧录插件的摘要值不一致, 和 /或解密得到的升级软件的版本号不符合自身的 预设规则, 则表明所述闪存烧录插件合法性认证失败。
本实施例, 所述认证模块 120也可以先判断所述下载后的闪存烧录插件 的摘要值与解密得到的闪存烧录插件的摘要值是否一致, 若不一致, 则表明 所述闪存烧录插件合法性认证失败, 则控制直接结束流程; 若一致, 则继续 判断解密得到的升级软件的版本号是否符合自身的预设规则, 若不符合, 则 表明所述闪存烧录插件合法性认证失败, 则控制直接结束流程; 若符合, 则 表明所述闪存烧录插件合法性认证通过。 较佳地, 上述移动终端 100 实施例中, 所述校验模块 140, 具体还用于 釆用第一算法计算下载的升级文件的摘要值, 判断该下载的升级文件的摘要 值与解密得到的升级文件的摘要值是否一致, 若一致, 则表明该升级文件合 法性校验通过。
本实施例中, 若不一致, 则表明该升级文件合法性校验失败, 则直接结 束流程。
另外, 本实施例中, 所述升级软件中的升级文件可能为一个或两个以上, 当所述升级文件为两个以上, 则所述升级文件逐个下载。 在升级文件下载过 程, 当某一升级文件校验失败, 则停止下载后续的升级文件。 参见图 4, 其 具体过程如下:
步骤 S301、 下载模块 130运行所述 RAM中的闪存烧录插件, 将升级软 件中的未下载的一个升级文件由计算机中下载至所述 RAM,并通过校验模块 140对 RAM 中的所述升级文件进行合法性校验; 当校验通过, 则转入步骤 S302; 当校验不通过, 则结束流程。
步骤 S302、 写入模块 150将该 RAM中的升级文件写入自身的闪存内; 判断所述升级软件中的升级文件是否下载完毕, 若是, 则结束流程; 若否, 则返回执行步骤 S301。
本发明所提供的移动终端 100实施例, 通过对下载到自身的 RAM中的 升级软件的闪存烧录插件进行合法性认证; 当认证通过后, 运行该闪存烧录 插件, 下载升级软件中的文件至所述 RAM, 并对升级文件进行合法性校验; 当校验通过后, 将该 RAM 中的升级文件写入自身的闪存内的方式, 可有效 防止移动终端下载非法升级文件, 从而可有效地防止移动终端非法刷机死机 的风险, 提高了移动终端软件升级的安全性。
本领域普通技术人员可以理解上述方法中的全部或部分步骤可通过程序 来指令相关硬件完成, 所述程序可以存储于计算机可读存储介质中, 如只读 存储器、 磁盘或光盘等。 可选地, 上述实施例的全部或部分步骤也可以使用 一个或多个集成电路来实现。 相应地, 上述实施例中的各模块 /单元可以釆用 硬件的形式实现, 也可以釆用软件功能模块的形式实现。 本发明不限制于任 何特定形式的硬件和软件的结合。 应当理解的是, 以上仅为本发明的优选实施例, 不能因此限制本发明的 专利范围, 凡是利用本发明说明书及附图内容所作的等效结构或等效流程变 换, 或直接或间接运用在其他相关的技术领域, 均同理包括在本发明的专利 保护范围内。
工业实用性
本发明实施例可有效防止移动终端下载非法升级文件, 从而可有效地防 止移动终端非法刷机死机的风险, 提高了移动终端软件升级的安全性。

Claims

权 利 要 求 书
1、 一种移动终端软件升级的方法, 包括:
移动终端与计算机建立通讯连接, 将升级软件中的闪存烧录插件由计算 机中下载到所述移动终端的随机存储器(RAM ) 中, 并对所述 RAM中所述 闪存烧录插件进行合法性认证;
当认证通过后, 运行所述 RAM 中的所述闪存烧录插件, 将所述升级软 件中的升级文件由所述计算机中下载至所述 RAM, 并对所述 RAM中的所述 升级文件进行合法性校验;
当校验通过后, 将所述 RAM存储器中的升级文件写入所述移动终端的 闪存内, 以实现软件安全升级。
2、 根据权利要求 1所述移动终端软件升级的方法, 其中, 所述升级软件 携带有软件版本特征信息; 所述软件版本特征信息为由升级软件中的闪存烧录插件的摘要值、 软件 文件的摘要值以及升级软件的版本号串联加密而得的密文;
所述闪存烧录插件的摘要值、 软件文件的摘要值分别为釆用第一算法计 算而得。
3、 根据权利要求 2所述移动终端软件升级的方法, 其中, 所述移动终端 对闪存烧录插件进行合法性认证包括:
密, 得到所述闪存烧录插件的摘要值、 软件文件的摘要值以及升级软件的版 本号;
所述移动终端釆用所述第一算法计算下载后的闪存烧录插件的摘要值, 并判断所述下载后的闪存烧录插件的摘要值与解密得到的闪存烧录插件的摘 要值是否一致, 以及判断解密得到的升级软件的版本号是否符合自身的预设 规则; 当所述下载后的闪存烧录插件的摘要值与解密得到的闪存烧录插件的摘 要值一致, 以及解密得到的升级软件的版本号符合自身的预设规则, 则所述 闪存烧录插件合法性认证通过。
4、 根据权利要求 2所述移动终端软件升级的方法, 其中, 所述移动终端 对所述升级文件进行合法性校验包括:
所述移动终端釆用所述第一算法计算下载的升级文件的摘要值, 判断该 下载的升级文件的摘要值与解密得到的升级文件的摘要值是否一致,若一致, 则表明该升级文件合法性校验通过。
5、 根据权利要求 1至 4任一项所述的移动终端软件升级的方法, 其中, 所述第一算法为 MD5算法或 SHA-1算法。
6、 一种移动终端, 包括:
第一下载模块, 其设置为: 与计算机建立通讯连接, 将升级软件中的闪 存烧录插件由计算机中下载至所述移动终端的随机存储器(RAM ) 中;
认证模块, 其设置为: 对所述 RAM 中的所述闪存烧录插件进行合法性 认证;
第二下载模块, 其设置为: 当认证通过后, 运行所述 RAM 中的所述闪 存烧录插件, 并将升级软件中的升级文件由计算机中下载至所述 RAM;
校验模块, 其设置为: 对所述 RAM 中所述升级文件进行合法性校验; 以及
写入模块, 其设置为: 当校验通过后, 将所述 RAM 中所述升级文件写 入自身的闪存内, 以实现软件安全升级。
7、 根据权利要求 6所述移动终端, 其中, 所述升级软件携带有软件版本 特征信息; 所述软件版本特征信息为由升级软件中的闪存烧录插件的摘要值、 软件 文件的摘要值以及升级软件的版本号串联加密的密文;
所述闪存烧录插件的摘要值、 软件文件的摘要值分别为釆用第一算法计 算而得。
8、 根据权利要求 7所述移动终端, 其中,
所述认证模块是设置为: 釆用自身的公钥对所述软件版本特征信息进行 解密, 得到所述闪存烧录插件的摘要值、 软件文件的摘要值以及升级软件的 版本号; 釆用所述第一算法计算下载后的闪存烧录插件的摘要值, 并判断所 述下载后的闪存烧录插件的摘要值与解密得到的闪存烧录插件的摘要值是否 一致, 以及判断解密得到的升级软件的版本号是否符合自身的预设规则; 当 所述下载后的闪存烧录插件的摘要值与解密得到的闪存烧录插件的摘要值一 致, 以及解密得到的升级软件的版本号符合自身的预设规则, 则表明所述闪 存烧录插件合法性认证通过。
9、 根据权利要求 7所述移动终端, 其中,
所述校验模块是设置为: 釆用第一算法计算下载的升级文件的摘要值, 判断该下载的升级文件的摘要值与解密得到的升级文件的摘要值是否一致, 若一致, 则表明该升级文件合法性校验通过。
10、 根据权利要求 6至 9任一项所述的移动终端, 其中, 所述第一算法 为 MD5算法或 SHA-1算法。
PCT/CN2013/080907 2013-04-02 2013-08-06 移动终端及其软件升级的方法 WO2013185724A2 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
BR112015021174A BR112015021174A2 (pt) 2013-04-02 2013-08-06 método de atualização do software de um terminal móvel, e, terminal móvel

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310113657.4A CN104102499A (zh) 2013-04-02 2013-04-02 移动终端及其软件升级的方法
CN201310113657.4 2013-04-02

Publications (2)

Publication Number Publication Date
WO2013185724A2 true WO2013185724A2 (zh) 2013-12-19
WO2013185724A3 WO2013185724A3 (zh) 2014-02-20

Family

ID=49758792

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/080907 WO2013185724A2 (zh) 2013-04-02 2013-08-06 移动终端及其软件升级的方法

Country Status (3)

Country Link
CN (1) CN104102499A (zh)
BR (1) BR112015021174A2 (zh)
WO (1) WO2013185724A2 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170286090A1 (en) * 2016-03-31 2017-10-05 Microsoft Technology Licensing, Llc High performance mobile device flashing

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107404391A (zh) * 2016-05-19 2017-11-28 中兴通讯股份有限公司 版本文件校验方法及装置和加密方法及装置
CN106055341A (zh) * 2016-06-14 2016-10-26 北京奇虎科技有限公司 应用程序安装包的校验方法及装置
CN105975850B (zh) 2016-07-01 2020-01-14 惠州Tcl移动通信有限公司 一种基于移动终端的软件下载方法及系统
CN106060947B (zh) 2016-07-12 2019-09-24 惠州Tcl移动通信有限公司 一种无线移动通信中的资源分配方法及系统
CN106210334B (zh) 2016-07-22 2020-05-08 惠州Tcl移动通信有限公司 一种智能闪光灯控制方法、系统及移动终端
CN106899437B (zh) * 2017-02-23 2020-05-01 百富计算机技术(深圳)有限公司 一种升级pos机模块固件的方法和装置
CN107704756B (zh) * 2017-09-26 2021-10-19 晶晨半导体(上海)股份有限公司 一种系统升级前的安全校验方法及系统
CN108459879B (zh) * 2018-01-17 2021-08-17 宇龙计算机通信科技(深圳)有限公司 一种防止终端死机的方法、终端
CN112667264A (zh) * 2021-01-15 2021-04-16 广州路派电子科技有限公司 一种脱机下载软件升级的方法及系统
CN113779636A (zh) * 2021-09-23 2021-12-10 成都卫士通信息产业股份有限公司 一种文件刻录管控方法、装置、电子设备及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101008898A (zh) * 2007-02-01 2007-08-01 中兴通讯股份有限公司 一种智能化设备软件升级与修复的方法和系统
CN101026850A (zh) * 2007-03-09 2007-08-29 华为技术有限公司 移动终端软件自动升级的方法及系统、移动终端和软件管理服务器
CN101593123A (zh) * 2009-06-30 2009-12-02 中兴通讯股份有限公司 闪存烧录插件的固化方法以及终端设备
CN101694621A (zh) * 2009-10-22 2010-04-14 中兴通讯股份有限公司 一种升级移动终端软件的方法和移动终端

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200525360A (en) * 2004-01-19 2005-08-01 Comax Semiconductor Inc Mobile communication device and memory device and accessing process thereof
CN101094341A (zh) * 2006-04-21 2007-12-26 深圳市朗科科技有限公司 基于数字电视数据广播升级终端设备软件或内容的方法
CN101247416A (zh) * 2008-03-25 2008-08-20 中兴通讯股份有限公司 基于ota的固件下载方法、预处理方法、完整性验证方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101008898A (zh) * 2007-02-01 2007-08-01 中兴通讯股份有限公司 一种智能化设备软件升级与修复的方法和系统
CN101026850A (zh) * 2007-03-09 2007-08-29 华为技术有限公司 移动终端软件自动升级的方法及系统、移动终端和软件管理服务器
CN101593123A (zh) * 2009-06-30 2009-12-02 中兴通讯股份有限公司 闪存烧录插件的固化方法以及终端设备
CN101694621A (zh) * 2009-10-22 2010-04-14 中兴通讯股份有限公司 一种升级移动终端软件的方法和移动终端

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170286090A1 (en) * 2016-03-31 2017-10-05 Microsoft Technology Licensing, Llc High performance mobile device flashing

Also Published As

Publication number Publication date
BR112015021174A2 (pt) 2017-07-18
WO2013185724A3 (zh) 2014-02-20
CN104102499A (zh) 2014-10-15

Similar Documents

Publication Publication Date Title
WO2013185724A2 (zh) 移动终端及其软件升级的方法
CN110597538B (zh) 一种基于ota升级系统的软件升级方法和ota升级系统
US10547604B2 (en) Information recording apparatus with shadow boot program for authentication with a server
CN106168899B (zh) 用于更新嵌入式控制设备的方法和更新网关
TWI436236B (zh) 安全更新現場可升級單元之方法與系統
JP5703391B2 (ja) 耐タンパー性ブート処理のためのシステム及び方法
CN104506515A (zh) 一种固件的保护方法和保护装置
US20080189695A1 (en) Updating of Data Instructions
WO2021159530A1 (zh) 一种车载设备升级方法及相关装置
US20130152180A1 (en) Device using secure processing zone to establish trust for digital rights management
JP2007293873A (ja) 電子装置の安全性を保証する方法、セキュリティシステム及び電子装置
CN109388961B (zh) 存储设备的安全控制方法及存储设备
WO2015042981A1 (zh) 加解密处理方法、装置和设备
CN103166759A (zh) 使用诊断链路连接器(dlc)和onstar系统的用于安全固件下载的方法和装置
TW201735578A (zh) 受控的安全碼認證
WO2012083823A1 (zh) 对终端进行锁网的方法和装置
CN111526159A (zh) 建立数据连接的方法、装置、终端设备及存储介质
JP6387908B2 (ja) 認証システム
CN113239363A (zh) 固件更新方法、装置、设备、可读存储介质及存储器系统
US11838282B2 (en) Information recording apparatus with server-based user authentication for accessing a locked operating system storage
US20220182248A1 (en) Secure startup method, controller, and control system
CN109508529B (zh) 一种支付终端安全启动校验的实现方法
CN116561734A (zh) 一种验证方法、装置、计算机及计算机配置系统
JP7508571B2 (ja) 車両の安全始動方法、安全始動装置、電子制御ユニット及び記憶媒体
KR101711024B1 (ko) 부정조작방지 장치 접근 방법 및 그 방법을 채용한 단말 장치

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: IDP00201505357

Country of ref document: ID

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112015021174

Country of ref document: BR

122 Ep: pct application non-entry in european phase

Ref document number: 13803441

Country of ref document: EP

Kind code of ref document: A2

ENP Entry into the national phase in:

Ref document number: 112015021174

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20150901