WO2017036048A1 - 一种终端系统升级的方法及系统 - Google Patents

一种终端系统升级的方法及系统 Download PDF

Info

Publication number
WO2017036048A1
WO2017036048A1 PCT/CN2015/100248 CN2015100248W WO2017036048A1 WO 2017036048 A1 WO2017036048 A1 WO 2017036048A1 CN 2015100248 W CN2015100248 W CN 2015100248W WO 2017036048 A1 WO2017036048 A1 WO 2017036048A1
Authority
WO
WIPO (PCT)
Prior art keywords
security system
data packet
apk
ota data
security
Prior art date
Application number
PCT/CN2015/100248
Other languages
English (en)
French (fr)
Inventor
何小兵
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宇龙计算机通信科技(深圳)有限公司 filed Critical 宇龙计算机通信科技(深圳)有限公司
Publication of WO2017036048A1 publication Critical patent/WO2017036048A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates

Definitions

  • the present application relates to the field of terminal system upgrade, and in particular, to a method and system for upgrading a terminal system.
  • the main system is used to download OTA data packets, and then the main system and the security system are upgraded at the same time, and the security of the upgrade package is not considered. If the upgrade package is implanted with a virus or an application.
  • the APK carries a non-secure plug-in. After the upgrade, there is a security risk for the security system.
  • the technical problem to be solved by the present application is to provide a method and system for upgrading a terminal system, which solves the problem that the main system downloads an OTA data packet in the prior art, and then upgrades the main system and the security system at the same time, and does not consider the upgrade package.
  • Security issues if the upgrade package is implanted with a virus or the application APK carries a non-secure plug-in, after the upgrade, there is a security risk for the security system.
  • a method for upgrading a terminal system comprising:
  • the APK installation package is installed when the application package name in the APK matches the preset application package name and the digital signature in the APK matches the standard digital signature.
  • the obtaining the security system OTA data packet for the security system upgrade comprising:
  • the method for performing differentiated judgment on the downloaded OTA data packet, and confirming a security system OTA data packet used for security system upgrade includes:
  • All the APK installation packages that match the identity of the security system are packaged to form the security system OTA packet.
  • the method further includes:
  • a system for upgrading a terminal system comprising:
  • An acquiring unit configured to obtain, from the OTA data downloaded by the main system, a security system OTA data packet for security system upgrade, where the security system OTA data packet includes at least one APK installation package;
  • a first detecting unit configured to separately detect an application package name and a digital signature in each of the APKs
  • the installation unit is configured to install the APK installation package when the application package name in the APK matches the preset application package name, and the digital signature in the APK matches the standard digital signature.
  • the obtaining unit includes:
  • the differentiation determining unit is configured to perform differentiated judgment on the downloaded OTA data packet, and confirm a security system OTA data packet used for security system upgrade.
  • the differentiation determining unit includes:
  • the identifier determining unit is configured to determine whether the identifier of each APK installation package in the downloaded OTA data packet matches the identifier of the security system, and if yes, the APK installation package is used for the security system. Upgraded APK installation package;
  • the packaging processing unit is configured to package all the APK installation packages that match the identification of the security system to form the security system OTA data packet.
  • the above system optionally, also includes:
  • a second detecting unit configured to perform integrity and security detection on the downloaded OTA data packet.
  • the security system OTA data packet for the security system upgrade is obtained from the OTA data packet, where the security system OTA data packet is Include at least one APK installation package; detecting an application package name and a digital signature in each of the APKs; when the application package name in the APK matches the preset application package name, and the digital signature in the APK When matching with a standard digital signature, the APK installation package is securely tested for the application package name and digital signature in each APK installation package for security system upgrades, only if both are correct.
  • the installation operation of the APK guarantees the uniqueness of the APK and ensures the security of the security system. It can effectively prevent the unofficial APK from being embedded in the security system, posing a security risk.
  • FIG. 1 is a flowchart of an embodiment of a method for upgrading a terminal system according to the present application
  • FIG. 2 is a schematic structural diagram of a system embodiment of a terminal system upgrade according to the present application.
  • FIG. 1 a flowchart of an embodiment of a method for upgrading a terminal system according to the present application is shown. Includes the following steps:
  • Step S101 Obtain a security system OTA data packet for security system upgrade from the OTA data packet downloaded by the primary system, where the security system OTA data packet includes at least one APK installation package.
  • the dual system includes the main system and the security system.
  • the security system is another Android system, which is completely isolated from the main system.
  • the security system has higher security than the main system. Security requirements.
  • the main system and the security system are upgraded directly at the system layer, and the security verification of the OTA data packet is not performed, so that the terminal device has a security risk after the upgrade.
  • the OTA data packet processing method downloaded by the main system needs to be downloaded to the main system before acquiring the security system OTA data packet for the security system upgrade in the OTA data packet downloaded from the main system.
  • the OTA packet is detected and processed. The specific process is as follows:
  • the main system downloads and stores the OTA data packet, performs security detection on the OTA data packet, in particular, performs security detection on the ROM data packet in the OTA data packet, when the OTA data packet satisfies integrity and security.
  • security detection on the OTA data packet
  • the OTA data packet is secure and can be upgraded.
  • the operation is directly terminated without upgrading the system.
  • the primary system and the security system are upgraded respectively. After the downloaded OTA data packet is verified, the upgrade package for the primary system and The upgrade package for the security system is separated. Since the primary system is an open system, the primary system directly uses the corresponding primary system OTA data packet for the upgrade operation. Because the security system has high security requirements, before the security system is upgraded, Further verification of the security system OTA packet corresponding to the security system is required.
  • Step S102 detecting an application package name and a digital signature in each of the APKs.
  • the security system OTA data packet Before the security system is upgraded, the security system OTA data packet needs to be further verified.
  • the security system OTA data packet includes at least one APK installation package, and each APK installation package needs to be detected.
  • the application package name and digital signature in each APK installation package are detected,
  • the application package name can be set or customized.
  • the hacker changes the name of a malware to the application package name, if the user only detects the application package name, the terminal device may have a security risk.
  • Each official APK has one and only one digital certificate. If the digital signature is detected, the uniqueness and accuracy of the APK can be determined.
  • Step S103 When the application package name in the APK matches the preset application package name, and the digital signature in the APK matches the standard digital signature, the APK installation package is installed.
  • the APK is the official only APK, and the installation operation of the APK can be performed and upgraded.
  • the security system OTA data packets for the security system upgrade are confirmed.
  • the APK installation package is an APK installation package for security system upgrade; and all security systems
  • the identification of the matching APK installation package is packaged to form the security system OTA packet.
  • the application package name and the digital signature in each APK installation package used for the security system upgrade are detected, and only when both are correct, the APK is performed.
  • the installation operation ensures the uniqueness of the APK and ensures the security of the security system. It can effectively prevent the unofficial APK from being embedded in the security system, posing a security risk.
  • the present application further provides an embodiment of the terminal system upgrade system.
  • the system includes:
  • the obtaining unit 201 is configured to obtain, from the OTA data downloaded by the main system, a security system OTA data packet for the security system upgrade, where the security system OTA data packet includes at least one APK installation package.
  • the first detecting unit 202 is configured to separately detect an application package name and a digital signature in each of the APKs.
  • the installation unit 203 is configured to install the APK installation package when the application package name in the APK matches the preset application package name, and the digital signature in the APK matches the standard digital signature.
  • the obtaining unit includes:
  • the differentiation determining unit is configured to perform differentiated judgment on the downloaded OTA data packet, and confirm a security system OTA data packet used for security system upgrade.
  • the differentiation determining unit includes:
  • the identifier determining unit is configured to determine whether the identifier of each APK installation package in the downloaded OTA data packet matches the identifier of the security system, and if yes, the APK installation package is an APK installation package used for security system upgrade;
  • the packaging processing unit is configured to package all the APK installation packages that match the identification of the security system to form the security system OTA data packet.
  • a second detecting unit configured to perform integrity and security detection on the downloaded OTA data packet.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Stored Programmes (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本申请提供了一种终端系统升级的方法,主系统下载OTA数据包后,从所述OTA数据包中获取用于安全系统升级的安全系统OTA数据包,其中所述安全系统OTA数据包中至少包括一个APK安装包;对每个所述APK中的应用包名和数字签名分别进行检测;当所述APK中的应用包名与预设应用包名相匹配,并且所述APK中的数字签名与标准数字签名相匹配时,安全所述APK安装包,对用于安全系统升级的每个APK安装包中的应用包名和数字签名均进行检测,只有在两者均正确的情况下,才进行APK的安装操作,保证了APK的唯一性,也保证了安全系统的安全性,能够有效的防止非官方的APK植入安全系统中,造成安全隐患。

Description

一种终端系统升级的方法及系统
本申请要求于2015年08月31日提交中国专利局,申请号为201510548582.1、发明名称为“一种终端系统升级的方法及系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及终端系统升级领域,特别涉及一种终端系统升级的方法及系统。
背景技术
随着技术的发展,人们对双系统中安全系统的升级越来越关注。
现有的支持双系统的设备中,主要是采用主系统下载OTA数据包,然后同时进行主系统和安全系统的升级,并没有考虑升级包的安全性问题,若升级包被植入病毒或者应用APK携带非安全插件,升级后,对于安全系统来说,存在安全隐患。
因此,如何在系统升级的过程中,保证安全系统的安全性是本领域技术人员目前需要解决的技术问题。
发明内容
本申请所要解决的技术问题是提供一种终端系统升级的方法及系统,解决了现有技术中采用主系统下载OTA数据包,然后同时进行主系统和安全系统的升级,并没有考虑升级包的安全性问题,若升级包被植入病毒或者应用APK携带非安全插件,升级后,对于安全系统来说,存在安全隐患的问题。
其具体方案如下:
一种终端系统升级的方法,该方法包括:
从主系统下载的OTA数据包中,获取用于安全系统升级的安全系统OTA数据包,其中所述安全系统OTA数据包中至少包括一个APK安装包;
对每个所述APK中的应用包名和数字签名分别进行检测;
当所述APK中的应用包名与预设应用包名相匹配,并且所述APK中的数字签名与标准数字签名相匹配时,安装所述APK安装包。
上述的方法,可选的,所述获取用于安全系统升级的安全系统OTA数据包,包括:
对所述下载的OTA数据包进行差异化判断,确认用于安全系统升级的安全系统OTA数据包。
上述的方法,可选的,所述对所述下载的OTA数据包进行差异化判断,确认用于安全系统升级的安全系统OTA数据包,包括:
判断所述下载的OTA数据包中每个APK安装包的标识是否与安全系统的标识相匹配,若是,则所述APK安装包为用于安全系统升级的APK安装包;
对所有与安全系统的标识相匹配的APK安装包进行打包处理,组成所述安全系统OTA数据包。
上述的方法,可选的,在所述从OTA数据包中获取用于安全系统升级的安全系统OTA数据包之前,还包括:
对所述下载的OTA数据包进行完整性和安全性检测。
一种终端系统升级的系统,该系统包括:
获取单元,用于从主系统下载的OTA数据中,获取用于安全系统升级的安全系统OTA数据包,其中所述安全系统OTA数据包中至少包括一个APK安装包;
第一检测单元,用于对每个所述APK中的应用包名和数字签名分别进行检测;
安装单元,用于当所述APK中的应用包名与预设应用包名相匹配,并且所述APK中的数字签名与标准数字签名相匹配时,安装所述APK安装包。
上述的系统,可选的,所述获取单元包括:
差异化判断单元,用于对所述下载的OTA数据包进行差异化判断,确认用于安全系统升级的安全系统OTA数据包。
上述的系统,可选的,所述差异化判断单元包括:
标识判断单元,用于判断所述下载的OTA数据包中每个APK安装包的标识是否与安全系统的标识相匹配,若是,则所述APK安装包为用于安全系统 升级的APK安装包;
打包处理单元,用于对所有与安全系统的标识相匹配的APK安装包进行打包处理,组成所述安全系统OTA数据包。
上述的系统,可选的,还包括:
第二检测单元,用于对所述下载的OTA数据包进行完整性和安全性检测。
本申请提供的一种终端系统升级的方法中,主系统下载OTA数据包后,从所述OTA数据包中获取用于安全系统升级的安全系统OTA数据包,其中所述安全系统OTA数据包中至少包括一个APK安装包;对每个所述APK中的应用包名和数字签名分别进行检测;当所述APK中的应用包名与预设应用包名相匹配,并且所述APK中的数字签名与标准数字签名相匹配时,安全所述APK安装包,对用于安全系统升级的每个APK安装包中的应用包名和数字签名均进行检测,只有在两者均正确的情况下,才进行APK的安装操作,保证了APK的唯一性,也保证了安全系统的安全性,能够有效的防止非官方的APK植入安全系统中,造成安全隐患。
附图说明
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1是本申请的一种终端系统升级的方法实施例的流程图;
图2是本申请的一种终端系统升级的系统实施例的结构示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
参考图1,示出了本申请一种终端系统升级的方法实施例的流程图,可以 包括以下步骤:
步骤S101:从主系统下载的OTA数据包中,获取用于安全系统升级的安全系统OTA数据包,其中所述安全系统OTA数据包中至少包括一个APK安装包。
目前市面上支持双系统的终端设备如手机、pad等已经面世,双系统包括主系统和安全系统,安全系统为另外一个Android系统,与主系统完全隔离,安全系统相对于主系统具有更高的安全性要求。
现有技术中在主系统下载完OTA数据包后,直接在系统层同时对主系统和安全系统进行升级,没有对OTA数据包进行安全性验证,使得升级后,终端设备存在安全隐患。
为了解决上述问题,本申请中对主系统下载的OTA数据包处理方法,在从主系统下载的OTA数据包中,获取用于安全系统升级的安全系统OTA数据包之前,需要对主系统下载的OTA数据包进行检测处理,具体过程为:
在主系统下载完OTA数据包并存储后,对所述OTA数据包进行安全性检测,尤其对OTA数据包中的ROM数据包进行安全性检测,当所述OTA数据包满足完整性和安全性要求时,证明所述OTA数据包是安全的,可以进行升级操作,当所述OTA数据包不满足完整性和安全性要求时,直接结束操作,不进行系统的升级。
由于安全系统的安全性要求更高,本申请中为了满足安全系统的安全性,分别对主系统和安全系统进行升级操作,在验证完下载的OTA数据包后,将针对主系统的升级包和针对安全系统的升级包分离开,由于主系统为开放系统,那么主系统直接利用相对应的主系统OTA数据包进行升级操作,由于安全系统的安全性要求高,在进行安全系统的升级之前,还需要对安全系统相对应的安全系统OTA数据包进行进一步的验证操作。
步骤S102:对每个所述APK中的应用包名和数字签名分别进行检测。
在对安全系统进行升级之前,需要对安全系统OTA数据包进行进一步的安全校验,安全系统OTA数据包中包括至少一个APK安装包,需要对每个APK安装包进行检测。
本申请中,对每个APK安装包中的应用包名和数字签名均进行检测,由 于应用包名可以是设定的,也可以自定义的,当黑客将一个恶意软件的名称改为应用包名时,若用户只对应用包名进行检测,那么会导致终端设备存在安全隐患,而每一个官方的APK有且只有一个数字证书,若再对数字签名进行检测,则可以确定所述APK的唯一性及准确性。
步骤S103:当所述APK中的应用包名与预设应用包名相匹配,并且所述APK中的数字签名与标准数字签名相匹配时,安装所述APK安装包。
只有在检测到的APK中的应用包名和数字签名均与标准的对应的信息相匹配时,说明所述APK为官方的唯一的APK,此时可以进行所述APK的安装操作,进行升级。
通过对主系统下载的OTA数据包进行差异化判断,读取哪个包是针对主系统的,哪个包是针对安全系统的,来确认用于安全系统升级的安全系统OTA数据包。
差异化判断的具体过程为:
判断所述下载的OTA数据包中每个APK安装包的标识是否与安全系统的标识相匹配,若是,则所述APK安装包为用于安全系统升级的APK安装包;并对所有与安全系统的标识相匹配的APK安装包进行打包处理,组成所述安全系统OTA数据包。
本申请提供的一种终端系统升级的方法中,对用于安全系统升级的每个APK安装包中的应用包名和数字签名均进行检测,只有在两者均正确的情况下,才进行APK的安装操作,保证了APK的唯一性,也保证了安全系统的安全性,能够有效的防止非官方的APK植入安全系统中,造成安全隐患。
与上述本申请一种终端系统升级方法实施例所提供的方法相对应,参见图2,本申请还提供了一种终端系统升级系统实施例,在本实施例中,该系统包括:
获取单元201,用于从主系统下载的OTA数据中,获取用于安全系统升级的安全系统OTA数据包,其中所述安全系统OTA数据包中至少包括一个APK安装包。
第一检测单元202,用于对每个所述APK中的应用包名和数字签名分别进行检测。
安装单元203,用于当所述APK中的应用包名与预设应用包名相匹配,并且所述APK中的数字签名与标准数字签名相匹配时,安装所述APK安装包。
本申请中,所述获取单元包括:
差异化判断单元,用于对所述下载的OTA数据包进行差异化判断,确认用于安全系统升级的安全系统OTA数据包。
所述差异化判断单元包括:
标识判断单元,用于判断所述下载的OTA数据包中每个APK安装包的标识是否与安全系统的标识相匹配,若是,则所述APK安装包为用于安全系统升级的APK安装包;
打包处理单元,用于对所有与安全系统的标识相匹配的APK安装包进行打包处理,组成所述安全系统OTA数据包。
本申请中,还包括:
第二检测单元,用于对所述下载的OTA数据包进行完整性和安全性检测。
需要说明的是,本说明书中的各个实施例均采用递进的方式描述,每个实施例重点说明的都是与其他实施例的不同之处,各个实施例之间相同相似的部分互相参见即可。对于装置类实施例而言,由于其与方法实施例基本相似,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。
最后,还需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。
为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本申请时可以把各单元的功能在同一个或多个软件和/或硬件中实现。
通过以上的实施方式的描述可知,本领域的技术人员可以清楚地了解到本申请可借助软件加必需的通用硬件平台的方式来实现。基于这样的理解,本申 请的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品可以存储在存储介质中,如ROM/RAM、磁碟、光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例或者实施例的某些部分所述的方法。
以上对本申请所提供的一种终端系统升级方法及系统进行了详细介绍,本文中应用了具体个例对本申请的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本申请的方法及其核心思想;同时,对于本领域的一般技术人员,依据本申请的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本申请的限制。

Claims (8)

  1. 一种终端系统升级的方法,其特征在于,该方法包括:
    从主系统下载的OTA数据包中,获取用于安全系统升级的安全系统OTA数据包,其中所述安全系统OTA数据包中至少包括一个APK安装包;
    对每个所述APK中的应用包名和数字签名分别进行检测;
    当所述APK中的应用包名与预设应用包名相匹配,并且所述APK中的数字签名与标准数字签名相匹配时,安装所述APK安装包。
  2. 根据权利要求1所述的方法,其特征在于,所述获取用于安全系统升级的安全系统OTA数据包,包括:
    对所述下载的OTA数据包进行差异化判断,确认用于安全系统升级的安全系统OTA数据包。
  3. 根据权利要求2所述的方法,其特征在于,所述对所述下载的OTA数据包进行差异化判断,确认用于安全系统升级的安全系统OTA数据包,包括:
    判断所述下载的OTA数据包中每个APK安装包的标识是否与安全系统的标识相匹配,若是,则所述APK安装包为用于安全系统升级的APK安装包;
    对所有与安全系统的标识相匹配的APK安装包进行打包处理,组成所述安全系统OTA数据包。
  4. 根据权利要求1所述的方法,其特征在于,在所述从OTA数据包中获取用于安全系统升级的安全系统OTA数据包之前,还包括:
    对所述下载的OTA数据包进行完整性和安全性检测。
  5. 一种终端系统升级的系统,其特征在于,该系统包括:
    获取单元,用于从主系统下载的OTA数据包中,获取用于安全系统升级的安全系统OTA数据包,其中所述安全系统OTA数据包中至少包括一个APK安装包;
    第一检测单元,用于对每个所述APK中的应用包名和数字签名分别进行检测;
    安装单元,用于当所述APK中的应用包名与预设应用包名相匹配,并 且所述APK中的数字签名与标准数字签名相匹配时,安装所述APK安装包。
  6. 根据权利要求5所述的系统,其特征在于,所述获取单元包括:
    差异化判断单元,用于对所述下载的OTA数据包进行差异化判断,确认用于安全系统升级的安全系统OTA数据包。
  7. 根据权利要求6所述的系统,其特征在于,所述差异化判断单元包括:
    标识判断单元,用于判断所述下载的OTA数据包中每个APK安装包的标识是否与安全系统的标识相匹配,若是,则所述APK安装包为用于安全系统升级的APK安装包;
    打包处理单元,用于对所有与安全系统的标识相匹配的APK安装包进行打包处理,组成所述安全系统OTA数据包。
  8. 根据权利要求5所述的系统,其特征在于,还包括:
    第二检测单元,用于对所述下载的OTA数据包进行完整性和安全性检测。
PCT/CN2015/100248 2015-08-31 2015-12-31 一种终端系统升级的方法及系统 WO2017036048A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510548582.1 2015-08-31
CN201510548582.1A CN105049533B (zh) 2015-08-31 2015-08-31 一种终端系统升级的方法及系统

Publications (1)

Publication Number Publication Date
WO2017036048A1 true WO2017036048A1 (zh) 2017-03-09

Family

ID=54455736

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/100248 WO2017036048A1 (zh) 2015-08-31 2015-12-31 一种终端系统升级的方法及系统

Country Status (2)

Country Link
CN (1) CN105049533B (zh)
WO (1) WO2017036048A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111061495A (zh) * 2019-12-25 2020-04-24 深圳Tcl新技术有限公司 应用的安装方法、终端设备及存储介质

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105049533B (zh) * 2015-08-31 2019-02-01 宇龙计算机通信科技(深圳)有限公司 一种终端系统升级的方法及系统
CN105897461A (zh) * 2016-03-23 2016-08-24 广州视睿电子科技有限公司 多系统ota升级方法和多系统设备
CN106445615A (zh) * 2016-10-12 2017-02-22 北京元心科技有限公司 多系统ota升级的方法及装置
CN110113292B (zh) * 2018-02-01 2022-04-29 阿里巴巴集团控股有限公司 安全检测方法和应用权确认方法、装置及系统
CN108733385B (zh) * 2018-05-17 2022-04-19 广东小天才科技有限公司 应用程序安装方法、装置、设备及存储介质

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104281788A (zh) * 2013-07-05 2015-01-14 腾讯科技(深圳)有限公司 一种终端应用的保护方法及装置
CN105049533A (zh) * 2015-08-31 2015-11-11 宇龙计算机通信科技(深圳)有限公司 一种终端系统升级的方法及系统

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090138865A1 (en) * 2004-12-10 2009-05-28 Furbee Richard L Performing an operating system upgrade without multiple system interruptions
CN101008895A (zh) * 2006-01-24 2007-08-01 联想(北京)有限公司 一种计算机封闭操作系统的软件升级系统和方法
CN102141921A (zh) * 2010-02-03 2011-08-03 华为终端有限公司 一种终端设备系统升级方法及终端设备
CN102750491B (zh) * 2012-06-05 2016-03-09 宇龙计算机通信科技(深圳)有限公司 一种限制终端安装或升级第三方应用程序的方法及系统
CN103744693B (zh) * 2013-12-13 2017-12-08 乐视致新电子科技(天津)有限公司 一种多系统切换方法及电子设备
CN104168557B (zh) * 2014-08-28 2018-06-15 酷派软件技术(深圳)有限公司 操作系统的升级方法和操作系统的升级装置
CN104462989A (zh) * 2014-12-25 2015-03-25 宇龙计算机通信科技(深圳)有限公司 多系统间应用程序的安装方法、安装系统和终端
CN104461749B (zh) * 2014-12-30 2018-05-25 宇龙计算机通信科技(深圳)有限公司 一种多系统终端的应用程序同步方法、同步装置及终端
CN104866782A (zh) * 2015-05-29 2015-08-26 宇龙计算机通信科技(深圳)有限公司 一种数据处理方法和装置

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104281788A (zh) * 2013-07-05 2015-01-14 腾讯科技(深圳)有限公司 一种终端应用的保护方法及装置
CN105049533A (zh) * 2015-08-31 2015-11-11 宇龙计算机通信科技(深圳)有限公司 一种终端系统升级的方法及系统

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111061495A (zh) * 2019-12-25 2020-04-24 深圳Tcl新技术有限公司 应用的安装方法、终端设备及存储介质

Also Published As

Publication number Publication date
CN105049533B (zh) 2019-02-01
CN105049533A (zh) 2015-11-11

Similar Documents

Publication Publication Date Title
WO2017036048A1 (zh) 一种终端系统升级的方法及系统
EP3552098B1 (en) Operating system update management for enrolled devices
US20140150096A1 (en) Method for assuring integrity of mobile applications and apparatus using the method
WO2015101149A1 (zh) 基于应用证书来检测应用安装包的安全性的方法、终端以及辅助服务器
CN106355081A (zh) 一种安卓程序启动校验方法和装置
JP2009054165A (ja) ワイヤレス環境における安全なアプリケーションの配布及び実行
US20130055335A1 (en) Security enhancement methods and systems
CN104298915A (zh) 一种防止安装包被篡改的方法
US10412079B2 (en) NFC device, software installation method, software uninstallation method, computer program and article of manufacture
CN105704296B (zh) 一种应用环境克隆方法及装置
WO2018120885A1 (zh) 安装程序的验证方法及装置
WO2017008728A1 (zh) 一种划分终端开发模式和产品模式的方法及系统
US20160014123A1 (en) Apparatus and method for verifying integrity of applications
CN106709281B (zh) 补丁发放和获取方法、装置
US20210209579A1 (en) Method for processing a secure financial transaction using a commercial off-the-shelf or an internet of things device
WO2018000605A1 (zh) 一种安全支付方法及电子设备
US9965625B2 (en) Control system and authentication device
WO2016188231A1 (zh) 一种验证方法及装置
US8881291B2 (en) System and method for inhibiting the processing of new code modules by an outdated runtime environment
WO2020233044A1 (zh) 一种插件校验方法、设备、服务器及计算机可读存储介质
KR20160146146A (ko) 무결성 검증 방법 및 그 장치
WO2017220014A1 (zh) 系统权限管理方法、装置及智能终端
KR101382549B1 (ko) 모바일 환경에서 sns 콘텐츠의 사전 검증 방법
WO2019071828A1 (zh) 检测应用安装包二次打包的方法、存储介质、设备及系统
KR20150043954A (ko) 모바일 단말의 보안 엔진의 접근 제어 시스템 및 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15902852

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15902852

Country of ref document: EP

Kind code of ref document: A1