WO2022257927A1 - 密钥烧录方法、装置、电子设备板卡及存储介质 - Google Patents

密钥烧录方法、装置、电子设备板卡及存储介质 Download PDF

Info

Publication number
WO2022257927A1
WO2022257927A1 PCT/CN2022/097405 CN2022097405W WO2022257927A1 WO 2022257927 A1 WO2022257927 A1 WO 2022257927A1 CN 2022097405 W CN2022097405 W CN 2022097405W WO 2022257927 A1 WO2022257927 A1 WO 2022257927A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
burned
information
configuration information
burning
Prior art date
Application number
PCT/CN2022/097405
Other languages
English (en)
French (fr)
Inventor
朱博文
Original Assignee
广州视源电子科技股份有限公司
广州视睿电子科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 广州视源电子科技股份有限公司, 广州视睿电子科技有限公司 filed Critical 广州视源电子科技股份有限公司
Publication of WO2022257927A1 publication Critical patent/WO2022257927A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/633Control signals issued by server directed to the network components or client
    • H04N21/6332Control signals issued by server directed to the network components or client directed to client
    • H04N21/6334Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key

Definitions

  • the embodiments of the present application relate to the technical field of communications, for example, to a method and device for burning a key, an electronic device board, and a storage medium.
  • smart TVs are based on Internet application technology, have open operating systems and chips, and have open application platforms. They can realize two-way human-computer interaction functions and integrate video and audio , entertainment, data and other functions in one to meet the diverse and personalized needs of users of TV products.
  • the embodiment of the present application provides a key burning method, device, electronic device board and storage medium, which effectively reduces maintenance costs caused by unburned keys or wrongly programmed keys.
  • the embodiment of the present application provides a key burning method, which is applied to electronic equipment boards, including: acquiring configuration information of the key to be burned, the configuration information is determined by the remote device according to the mapping strategy,
  • the mapping strategy includes a mapping relationship between board identification and key information;
  • the key to be burned is burned based on the verification result.
  • the embodiment of the present application also provides a key burning device, including:
  • the obtaining module is configured to obtain the configuration information of the key to be burned, the configuration information is determined by the remote device according to the mapping strategy, and the mapping strategy includes the mapping relationship between the board identification and the key information;
  • a verification module configured to verify the key to be burned according to the configuration information
  • the burning module is configured to burn the key to be burned based on the verification result.
  • the embodiment of the present application further provides a terminal device, including:
  • a storage device configured to store at least one program
  • the at least one program is executed by the at least one processor, so that the at least one processor implements the key burning method provided in the embodiment of the present application.
  • the embodiment of the present application further provides a computer-readable storage medium, on which a computer program is stored, and when the program is executed by a processor, the key burning method provided in the embodiment of the present application is implemented.
  • Fig. 1 is a schematic flow chart of a key burning method provided by an embodiment of the present application
  • FIG. 2 is a schematic flow diagram of a key burning method provided in another embodiment of the present application.
  • FIG. 3 is a schematic flow diagram of a key burning method provided in an exemplary embodiment of the present application.
  • FIG. 4 is a schematic diagram of a sequence of a key burning method provided in an exemplary embodiment of the present application.
  • FIG. 5 is a schematic structural diagram of a key burning device provided by an embodiment of the present application.
  • FIG. 6 is a schematic structural diagram of an electronic device board provided by an embodiment of the present application.
  • Fig. 1 is a schematic flow chart of a key burning method provided by an embodiment of the present application, the method is applicable to reduce the cost of burning, and the method can be executed by a key burning device, wherein the device can be controlled by software and/or implemented by hardware, and generally integrated on an electronic device board.
  • the electronic device board includes but is not limited to: a smart TV board and other devices.
  • Electronic equipment boards can be considered as electronic equipment boards.
  • a key burning method provided by an embodiment of the present application includes the following steps:
  • the configuration information is determined by the remote device according to a mapping strategy, and the mapping strategy includes a mapping relationship between board identifiers and key information.
  • the key to be burned can be regarded as the key that needs to be burned for the board card of the electronic device.
  • the configuration information can be regarded as the configuration file of the key to be burned.
  • the configuration information may include information required for burning the key to be burned, and the content included in the configuration information is not limited here.
  • the configuration information may include the key to be burned or download information of the key to be burned.
  • the remote device may be a device that realizes the remote burning of the key to be burned on the board of the electronic device.
  • the remote device may be a server, which is not limited here.
  • the mapping strategy can be regarded as the strategy of electronic device boards and keys deployed on the remote device. The mapping strategy can identify the keys that should be burned for different electronic device boards. Not all electronic equipment boards need to be programmed remotely, so this application can deploy the keys to be burned required by different electronic equipment boards through the mapping strategy, so as to realize remote key programming.
  • the board identification can be regarded as the information identifying the board of the electronic device.
  • the key information can be regarded as the information required for burning the key.
  • the key information is not limited here, as long as the burning of the key to be burned can be completed based on the key information.
  • the configuration information can be issued by the remote device actively, and the electronic device board can be directly obtained; the configuration information can also be triggered by the remote device after the electronic device board sends the request information. After sending the request information, the electronic device board acquires configuration information corresponding to the request information.
  • the configuration information sent to the electronics board may be determined by a mapping policy.
  • the mapping policy may include multiple sets of mapping relationships between board IDs and key information.
  • the configuration information sent to the board of the electronic device may be determined based on the board identifier, and the corresponding key information is sent to the board of the electronic device matching the board identifier.
  • the timing of sending is not limited here, such as sending after obtaining the request information from the electronic device board; another example is sending at a set time; and another example is sending after detecting an update request.
  • the triggering of the request information is not limited, for example, the request information is triggered when the board of the electronic device is powered on, or the request information is triggered at a preset time.
  • An update request can be triggered when the mapping policy changes.
  • the change of the mapping policy can be regarded as the change of the mapping relationship between the card ID and the key information.
  • the triggered update request can be used to send configuration information to the board card of the electronic device corresponding to the board card ID of the mapping policy change, so as to complete the burning of the key.
  • the remote device when the remote device determines that a certain key of the electronic device board corresponding to a certain board ID is programmed incorrectly, the remote device can update the mapping strategy of the board ID, and then send the board Identify the corresponding electronic device board to send configuration information, the configuration information may include changed key information, so as to re-burn the wrong key before burning.
  • the remote device may actively send the configuration information corresponding to the board ID to the electronic device board corresponding to the board ID .
  • the electronic device board when it detects that a certain key has not been burned, it can send request information to the remote device, and the remote device sends corresponding configuration information based on the request information, so as to realize the key to be burned. of burning.
  • a certain key can be regarded as a key to be burned.
  • the remote device can update the mapping strategy to complete the burning of the key to be burned based on the updated mapping strategy.
  • this step can verify the key to be burned based on the configuration information to verify whether the key to be burned is correct and complete.
  • this step can realize the verification of the integrity of the key to be burned. For example, verify the decrypted key (KEY), that is, the integrity of the key to be burned, and verify the KEY (that is, the key obtained from the remote device, which can be the encrypted key to be burned) integrity.
  • KEY decrypted key
  • the remote device which can be the encrypted key to be burned
  • How to perform integrity verification is not limited here, such as performing verification based on a check code.
  • the encrypted key to be burned can be downloaded based on the verification code (included in the configuration information) of the encrypted key to be burned.
  • the integrity verification of the key to be burned is encrypted by the verification code downloaded when recording the key.
  • the integrity verification of the key to be burned can be performed based on the check code of the key to be burned included in the configuration information and the check code obtained after decryption.
  • the key to be burned downloaded from the remote device may be verified based on the verification code of the key to be burned and the verification code downloaded from the remote device.
  • the check code includes but not limited to md5 code.
  • Verifying the key to be burned according to the configuration information includes:
  • the encrypted key to be burned is verified based on the encrypted verification code of the key to be burned, and the decrypted key to be burned is verified based on the verification code of the key to be burned.
  • the verification result can indicate whether the verification has passed or failed.
  • the burning operation can be performed directly; when the verification result indicates that the verification has failed, the burning can be ended and continue to monitor whether the configuration information is obtained again , to continue to perform the verification operation until the programming is completed.
  • this embodiment may also include transmitting the burning result and verification result of the board of the electronic device to the remote device for backup by the remote device.
  • the configuration information of the key to be burned is first obtained, and the configuration information is determined by the remote device according to the mapping strategy, and the mapping strategy includes the board identification and key information and then verify the key to be burned according to the configuration information; finally burn the key to be burned based on the verification result.
  • the configuration information issued by the remote device can be directly obtained without returning to the factory or on-site maintenance, and the key burning can be completed based on the configuration information, thereby effectively reducing the Increased maintenance costs due to unburned or wrongly programmed keys.
  • the configuration information is triggered to be sent after an update request is acquired, and the update request is triggered when the mapping policy is changed.
  • the configuration information is sent to the electronic device board after the remote device obtains the update request.
  • the mapping strategy can be changed when the user's key requirements change.
  • the configuration information includes key information corresponding to the board identification of the electronic equipment board, and the key information corresponding to the board identification of the electronic equipment board indicates that the key to be burned At least one of the following information: download status indication information, type information, download information, check code and additional information.
  • the download status indication information can be regarded as information indicating whether downloading is possible. It should be noted that even if the mapping policy of the key to be burned is arranged on the remote device, due to some reasons (not limited here, such as key restoration), the key to be burned cannot be downloaded. Therefore, the key information in this embodiment may include download status indication information to indicate whether the key to be burned can be downloaded. If the key to be burned cannot be downloaded, then end the operation and continue to monitor whether the configuration information is obtained.
  • the type information can be regarded as the information identifying the key type.
  • the download information can be considered as information for downloading keys.
  • the verification code can be regarded as information for verification.
  • the additional information is not limited and can be set based on actual needs.
  • the verifying the key to be burned according to the configuration information includes:
  • the key to be burned is verified based on the key verification code.
  • the configuration information before verifying the key to be burned according to the configuration information, it further includes:
  • the download status indication information indicates that downloading is not possible
  • the operation is terminated, and whether new configuration information is acquired is continued to be monitored.
  • the new configuration information may be the configuration information of the key to be burned resent by the remote device, or the configuration information of the remaining keys.
  • the burning of the key to be burned based on the verification result includes:
  • the electronic device board can call the application programming interface (Application Programming Interface, API) to realize the burning of the key to be burned.
  • API Application Programming Interface
  • the verification information may be regarded as information indicating verification failure, and the verification information may also indicate a failure reason. Reporting the verification information can be considered as backtracking the KEY information to the remote device, that is, the server.
  • the status of multiple stages of the electronic device can be transmitted to the remote device for backup by the remote device, such as the status of whether the download is successful or not, and whether the programming is successful or not.
  • Fig. 2 is a schematic flowchart of a key burning method provided by another embodiment of the present application. In this embodiment, it includes: determining the burning state of the key in the pre-stored key pool;
  • a key burning method provided by another embodiment of the present application includes the following steps:
  • the key pool can be considered as a collection of all keys that can be burned by electronic equipment boards.
  • the key pool may include keys that are not purchased by users of electronic device boards or do not need to be burned.
  • this step can traverse all the keys in the key pool to determine the burning status of the key.
  • the burning state may be a state indicating whether the corresponding key is burned. How to determine the programming status is not limited here.
  • this step can determine the key to be burned.
  • the burning state of the key to be burned can be unburned.
  • S230 Send request information of the key to be burned, where the request information includes the board identification of the electronic device board, and the request information is used to request the configuration information.
  • a request message may be sent to the remote device to request configuration information of the key to be burned.
  • the remote device may query the mapping policy based on the board ID, so as to send corresponding configuration information to the electronic device ID.
  • the key information included in the configuration information sent to the electronic device may include configuration information of a key to be burned by the electronic device, and the key to be burned includes a key to be burned. Keys to be burned include wrongly burned keys, unburned keys, and newly added keys that need to be burned.
  • a method for burning a key provided in an embodiment of the present application specifically includes an operation of triggering request information.
  • the method can effectively request the remote device to remotely control the board of the electronic device to burn the key based on the request information, effectively reducing the maintenance cost caused by the key not being burned or burning wrongly.
  • a key burning method provided by this application can be considered as a method for remotely burning software KEY that can be deployed in the cloud.
  • KEY software KEY that can be deployed in the cloud.
  • many smart TVs are now Both need to burn a lot of key KEYs to support video resources in a specified format or to determine uniqueness, such as TV serial number, HDCP key, Widevine Key, etc.
  • KEYs are usually designed to be stored in a disk partition that cannot be erased by conventional system update methods such as upgrades and over-the-air technology (Over-the-Air Technology, OTA), so as to maintain their uniqueness, but if these KEYs are in production If there is no programming in the process, or the programming is wrong, it will lead to a large number of rework and on-site repairs.
  • OTA Over-the-Air Technology
  • This application mainly involves three terminals, namely client, server and system.
  • the client is mainly implemented in the application program and will be pre-installed in the system
  • the server is mainly implemented by the remote background system, and the server is unified. Scheduling control
  • the system end is realized by the interface of the system programming end.
  • Fig. 3 is a schematic flow chart of a key burning method provided in an example embodiment of the present application
  • Fig. 4 is a timing diagram of a key burning method provided in an example embodiment of the present application
  • see Fig. 3 and Fig. 4 the customer
  • the functions of the terminal are mainly implemented by the application program, which will be pre-installed into the system, that is, the board.
  • the application mainly realizes the following functions:
  • Key detection that is, to obtain the burning status of the current specified type KEY in Figure 3, and then determine whether there is burning.
  • the currently specified type KEY can be regarded as the KEY that has been customized for the current board, and is represented by a key pool in this application.
  • the configuration file can be considered as the information returned by the server.
  • the downloadable status can be regarded as download status indication information, which is used to indicate whether the corresponding KEY can be downloaded, that is, to determine whether there is a KEY.
  • the type of KEY can be used to burn the corresponding KEY. Different types of KEY correspond to different burning methods, which are not limited here.
  • the download link can be regarded as download information, and the corresponding KEY can be downloaded based on the download link.
  • the additional information is not limited here, and any required information can be set as the additional information according to the actual situation. It should be noted that the English definition of the key in this application is not case-sensitive, and the key is expressed regardless of the case.
  • the server may store keys corresponding to different electronic device boards, so this embodiment may request the server for the key to be burned based on the product serial number (Serial Number, SN).
  • the coordination parameter can be regarded as a parameter that the coordination SN can identify the board of the electronic device. After the server obtains the coordination parameters such as SN, it can detect whether there is a corresponding burning KEY, that is, the key to be burned.
  • the integrity (md5) verification of the KEY is based on the verification code, such as verifying the integrity of the KEY based on the md5 code of the encrypted key, and verifying the integrity of the burned KEY based on the md5 code of the key.
  • Integrity verification of the burning part of the KEY that is, to verify the integrity of the burning KEY.
  • the destruction of KEY such as deleting the temporary files generated in the process of burning KEY, the temporary files include the downloaded KEY; and updating the burning logo.
  • the server can be realized by the background and controlled by the corresponding server.
  • the server mainly realizes the following functions:
  • mapping strategy which includes the type of KEY, the electronic device board associated with KEY, and the SN associated with KEY.
  • the key information in the mapping policy may be the type of KEY
  • the board identification may be represented by the electronic device board associated with the KEY and the SN associated with the KEY. This part can refer to the configuration file processing of the CBD background.
  • KEY deployment such as formulating a mapping strategy.
  • the response format for the client's request 1. Detection response; 2. Download response; 3. Abnormal warning response, wherein the detection response can be considered as detecting whether there is a corresponding key to be burned through system parameters such as SN Response; the download response can be considered as the response of the client to download the key to be burned based on the download link; the abnormal warning response can be considered as the KEY sent to the client when the client finds an exception during the integrity check, that is, the verification fails
  • the server makes a response after the information, and the response includes a response indicating that the KEY has been received.
  • the KEY is encrypted on the server side, and the encrypted md5 is obtained after encryption.
  • the integrity generation of KEY Encrypt the md5 code of KEY, and generate the md5 code of the burning part of KEY.
  • the system side mainly realizes the following functions:
  • the extra KEY in Figure 4 can be regarded as the key to be burned.
  • the business end can be considered as the client.
  • the server end can be regarded as the remote device end, and the system end can be regarded as the electronic device board end.
  • the key burning method provided by the embodiment of this application can reduce after-sales loss costs; provide an executable way for later remote repair and burning; can respond to customer feedback in the first time and improve customer satisfaction; can deploy burning strategies in the cloud, Do controllable remote programming.
  • the application can respond to customer feedback through the mapping strategy, and when the user has a KEY requirement change, the mapping strategy can be changed to respond to customer feedback.
  • Figure 5 is a schematic structural diagram of a key burning device provided by the embodiment of the present application, which is applicable to reduce the cost of burning, wherein the device can be realized by software and/or hardware, and is generally integrated on the electronic equipment board on the card.
  • the device includes:
  • the acquisition module 31 is configured to acquire the configuration information of the key to be burned, the configuration information is determined by the remote device according to the mapping strategy, and the mapping strategy includes the mapping relationship between the board identification and the key information;
  • a verification module 32 is configured to verify the key to be burned according to the configuration information
  • the burning module 33 is configured to burn the key to be burned based on the verification result.
  • the device first obtains the configuration information of the key to be burned through the acquisition module 31, and the configuration information is determined by the remote device according to the mapping strategy, and the mapping strategy includes the mapping of the board identification and the key information Then, the key to be burned is verified by the verification module 32 according to the configuration information; finally, the key to be burned is burned by the burning module 33 based on the verification result.
  • This embodiment provides a key burning device, which can directly obtain the configuration information issued by the remote device without returning to the factory or on-site maintenance when there is a key burning error or not burning.
  • the information completes the key burning, thereby effectively reducing the maintenance cost caused by the key not being burned or burning errors.
  • the device also includes a sending module, configured to:
  • the configuration information is triggered to be sent after an update request is acquired, and the update request is triggered when the mapping policy is changed.
  • the configuration information includes key information corresponding to the board identification of the electronic equipment board, and the key information corresponding to the board identification of the electronic equipment board indicates that the key to be burned At least one of the following information: download status indication information, type information, download information, check code and additional information.
  • the checking module 32 is set to:
  • the key to be burned is verified based on the key verification code.
  • the device further includes a determining module configured to perform the following operations before verifying the key to be burned according to the configuration information:
  • the download status indication information indicates that downloading is not possible
  • the operation is terminated, and whether new configuration information is acquired is continued to be monitored.
  • the burning module 33 is set to:
  • the above-mentioned key burning device can execute the key burning method provided by any embodiment of the present application, and has corresponding functional modules and beneficial effects for executing the method.
  • FIG. 6 is a schematic structural diagram of an electronic device board provided by an embodiment of the present application.
  • the electronic equipment board provided by the embodiment of the present application includes: one or more processors 41 and storage devices 42; Take a processor 41 as an example; the storage device 42 is configured to store one or more programs; the one or more programs are executed by the one or more processors 41, so that the one or more processors 41 realize The key burning method described in any one of the embodiments of this application.
  • the electronic equipment board may further include: an input device 43 and an output device 44 .
  • the processor 41, the storage device 42, the input device 43 and the output device 44 in the electronic device board can be connected via a bus or in other ways.
  • connection via a bus is taken as an example.
  • the storage device 42 in the electronic equipment board can be configured to store one or more programs, and the programs can be software programs, computer-executable programs and modules, as in the foregoing embodiments of the present application.
  • the program instructions/modules corresponding to the provided key burning method for example, the modules in the key burning device shown in FIG. 5 , including: acquisition module 31, verification module 32 and burning module 33).
  • the processor 41 runs the software programs, instructions and modules stored in the storage device 42 to execute various functional applications and data processing of the electronic equipment board, that is, to realize the key burning method in the above method embodiment.
  • the storage device 42 may include a program storage area and a data storage area, wherein the program storage area may store an operating system and at least one application required by a function; the data storage area may store data created according to the use of electronic equipment boards, etc.
  • the storage device 42 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid-state storage devices.
  • the storage device 42 may include memories located remotely from the processor 41, and these remote memories may be connected to the device through a network. Examples of the aforementioned networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
  • the input device 43 can be configured to receive input numbers or character information, and generate key signal input related to user settings and function control of the electronic equipment board.
  • the output device 44 may include a display device such as a display screen.
  • the program when the one or more programs included in the above-mentioned electronic equipment board are executed by the one or more processors 41, the program performs the following operations:
  • the configuration information is determined by the remote device according to the mapping strategy, and the mapping strategy includes the mapping relationship between the card identification and the key information;
  • the key to be burned is burned based on the verification result.
  • An embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, and when the program is executed by a processor, it is used to perform a key burning method, the method comprising:
  • the configuration information is determined by the remote device according to the mapping strategy, and the mapping strategy includes the mapping relationship between the card identification and the key information;
  • the key to be burned is burned based on the verification result.
  • the program when executed by the processor, it can also be used to execute the key burning method provided in any embodiment of the present application.
  • the computer storage medium in the embodiments of the present application may use any combination of one or more computer-readable media.
  • the computer readable medium may be a computer readable signal medium or a computer readable storage medium.
  • a computer-readable storage medium may be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, device, or device, or any combination thereof. More specific examples (non-exhaustive list) of computer-readable storage media include: electrical connections with one or more conductors, portable computer disks, hard disks, Random Access Memory (RAM), read-only memory (Read Only Memory, ROM), Erasable Programmable Read Only Memory (EPROM), flash memory, optical fiber, portable CD-ROM, optical storage device, magnetic storage device, or any suitable combination of the above .
  • a computer readable storage medium may be any tangible medium that contains or stores a program for use by or in connection with an instruction execution system, apparatus, or device.
  • a computer readable signal medium may include a data signal carrying computer readable program code in baseband or as part of a carrier wave. Such propagated data signals may take many forms, including but not limited to: electromagnetic signals, optical signals, or any suitable combination of the foregoing.
  • a computer-readable signal medium may also be any computer-readable medium other than a computer-readable storage medium, which can send, propagate, or transmit a program for use by or in conjunction with an instruction execution system, apparatus, or device. .
  • the computer readable storage medium may be a non-transitory computer readable storage medium.
  • Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wires, optical cables, radio frequency (Radio Frequency, RF), etc., or any suitable combination of the above.
  • any appropriate medium including but not limited to: wireless, wires, optical cables, radio frequency (Radio Frequency, RF), etc., or any suitable combination of the above.
  • Computer program codes for performing the operations of the present application may be written in one or more programming languages or combinations thereof, including object-oriented programming languages such as Java, Smalltalk, C++, and conventional A procedural programming language, such as the "C" language or similar programming language.
  • the program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server.
  • the remote computer can be connected to the user computer through any kind of network, including a local area network (LAN) or a wide area network (WAN), or it can be connected to an external computer (such as through the Internet using an Internet service provider). connect).
  • LAN local area network
  • WAN wide area network
  • connect such as AT&T, MCI, Sprint, EarthLink, MSN, GTE, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Storage Device Security (AREA)
  • Lock And Its Accessories (AREA)

Abstract

本申请实施例公开了一种密钥烧录方法、装置、电子设备板卡及存储介质。所述方法包括:获取待烧录密钥的配置信息,所述配置信息由远端设备根据映射策略确定,所述映射策略包括板卡标识和密钥信息的映射关系;根据所述配置信息对所述待烧录密钥进行校验;基于校验结果烧录所述待烧录密钥。

Description

密钥烧录方法、装置、电子设备板卡及存储介质
本申请要求在2021年6月7日提交中国专利局、申请号为202110633612.4的中国专利申请的优先权,以上申请的全部内容通过引用结合在本申请中。
技术领域
本申请实施例涉及通信技术领域,例如涉及一种密钥烧录方法、装置、电子设备板卡及存储介质。
背景技术
随着科技的发展,电子设备板卡得到了广泛的应用。电子设备板卡种类众多,以电子设备板卡为智能电视为例,智能电视是基于Internet应用技术,具备开放式操作系统与芯片,拥有开放式应用平台,可实现双向人机交互功能,集影音、娱乐、数据等多种功能于一体,以满足用户多样化和个性化需求的电视产品。
目前很多智能电视都需要烧录很多的密钥用于支持制定格式的视频资源或者确定唯一性。然而,若智能电视中的密钥在生产过程中没有烧录或烧录错误,则会导致大批量的返工和现场维修,增加了维修成本。
发明内容
本申请实施例提供了一种密钥烧录方法、装置、电子设备板卡及存储介质,有效降低了密钥未烧录或烧录错误所增加的维修成本。
第一方面,本申请实施例提供了一种密钥烧录方法,应用于电子设备板卡,包括:获取待烧录密钥的配置信息,所述配置信息由远端设备根据映射策略确定,所述映射策略包括板卡标识和密钥信息的映射关系;
根据所述配置信息对所述待烧录密钥进行校验;
基于校验结果烧录所述待烧录密钥。
第二方面,本申请实施例还提供了一种密钥烧录装置,包括:
获取模块,设置为获取待烧录密钥的配置信息,所述配置信息由远端设备根据映射策略确定,所述映射策略包括板卡标识和密钥信息的映射关系;
校验模块,设置为根据所述配置信息对所述待烧录密钥进行校验;
烧录模块,设置为基于校验结果烧录所述待烧录密钥。
第三方面,本申请实施例还提供了一种终端设备,包括:
至少一个处理器;
存储装置,设置为存储至少一个程序;
所述至少一个程序被所述至少一个处理器执行,使得所述至少一个处理器实现本申请实施例提供的密钥烧录方法。
第四方面,本申请实施例还提供了一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现本申请实施例提供的密钥烧录方法。
附图说明
图1为本申请一实施例提供的一种密钥烧录方法的流程示意图;
图2为本申请另一实施例提供的一种密钥烧录方法的流程示意图;
图3为本申请示例实施例提供的一种密钥烧录方法的流程示意图;
图4为本申请示例实施例提供的一种密钥烧录方法的时序示意图;
图5为本申请一实施例提供的一种密钥烧录装置的结构示意图;
图6为本申请一实施例提供的一种电子设备板卡的结构示意图。
具体实施方式
在更加详细地讨论示例性实施例之前应当提到的是,一些示例性实施例被描述成作为流程图描绘的处理或方法。虽然流程图将多项操作(或步骤)描述成顺序的处理,但是其中的许多操作可以被并行地、并发地或者同时实施。此外,多项操作的顺序可以被重新安排。当其操作完成时所述处理可以被终止,但是还可以具有未包括在附图中的附加步骤。所述处理可以对应于方法、函数、规程、子例程、子程序等等。此外,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。
本申请使用的术语“包括”及其变形是开放性包括,即“包括但不限于”。术语“基于”是“至少部分地基于”。术语“一个实施例”表示“至少一个实施例”。
需要注意,本申请中提及的“第一”、“第二”等概念仅用于对相应内容进行区分,并非用于限定顺序或者相互依存关系。
需要注意,本申请中提及的“一个”、“多个”的修饰是示意性而非限制性的,本领域技术人员应当理解,除非在上下文另有明确指出,否则应该理解为“一个或多个”。
图1为本申请一实施例提供的一种密钥烧录方法的流程示意图,该方法可适用于降低烧录成本的情况,该方法可以由密钥烧录装置来执行,其中该装置可由软件和/或硬件实现,并 一般集成在电子设备板卡上,在本实施例中电子设备板卡包括但不限于:智能电视板卡等设备。电子设备板卡可以认为是电子设备的板卡。
如图1所示,本申请一实施例提供的一种密钥烧录方法,包括如下步骤:
S110、获取待烧录密钥的配置信息,所述配置信息由远端设备根据映射策略确定,所述映射策略包括板卡标识和密钥信息的映射关系。
在本实施例中,待烧录密钥可以认为是电子设备板卡需要烧录的密钥。配置信息可以认为是待烧录密钥的配置文件。配置信息中可以包括烧录待烧录密钥所需的信息,此处不对配置信息所包括的内容进行限定。示例性的,配置信息中可以包括待烧录密钥或待烧录密钥的下载信息。
远端设备可以为实现电子设备板卡待烧录密钥远程烧录的设备。远端设备可以为服务器,此处不作限定。映射策略可以认为是在远端设备上部署的电子设备板卡和密钥的策略。映射策略能够标识不同电子设备板卡所应烧录的密钥。电子设备板卡并非都需要进行远端烧录,故本申请可以通过映射策略部署不同电子设备板卡所需烧录的待烧录密钥,从而实现远程密钥的烧录。
板卡标识可以认为是标识电子设备板卡的信息。密钥信息可以认为是烧录密钥所需信息。此处不对密钥信息进行限定,只要能够基于密钥信息完成待烧录密钥烧录即可。
本实施例不对获取手段进行限定,配置信息可以由远端设备主动下发,电子设备板卡直接获取即可;配置信息也可以是电子设备板卡发送请求信息后,触发远端设备下发,电子设备板卡在发送请求信息后,获取对应请求信息的配置信息。
发送至电子设备板卡的配置信息可以由映射策略确定。映射策略中可以包括有多组板卡标识和密钥信息的映射关系。发送至电子设备板卡的配置信息可以基于板卡标识确定,向与板卡标识匹配的电子设备板卡发送对应的密钥信息。此处不对发送时机进行限定,如在获取到电子设备板卡的请求信息后发送;又如在设定时间发送;再如检测到更新请求后发送。
其中,请求信息的触发不作限定,如在电子设备板卡上电时,触发请求信息,或在预设时间触发请求信息。在映射策略变更时可以触发更新请求。映射策略变更可以认为是板卡标识和密钥信息的映射关系变更。触发的更新请求可以用于映射策略变更的板卡标识所对应的电子设备板卡发送配置信息,以完成密钥烧录。
在一个实施例中,在远端设备确定某一板卡标识对应的电子设备板卡的某一密钥烧录错误时,远端设备可以更新该板卡标识的映射策略,然后向该板卡标识对应的电子设备板卡发送配置信息,该配置信息可以包括有变更后的密钥信息,以重新烧录之前烧录错误的密钥。
在一个实施例中,在远端设备确定某一板卡标识未烧录某一密钥时,远端设备可以主动 向该板卡标识对应的电子设备板卡发送该板卡标识对应的配置信息。
在一个实施例中,在电子设备板卡检测到未烧录某一密钥时,可以向远端设备发送请求信息,远端设备基于请求信息发送对应的配置信息,以实现待烧录密钥的烧录。本实施例中某一密钥可以认为是待烧录密钥。
在一个实施例中,若使用电子设备板卡的用户有增加新的密钥的需求,则远端设备可以更新映射策略,以基于更新后的映射策略完成待烧录密钥的烧录。
S120、根据所述配置信息对所述待烧录密钥进行校验。
获取配置信息后,本步骤可以基于配置信息对待烧录密钥进行校验,以验证待烧录密钥是否正确且完整。
在一个实施例中,本步骤可以实现待烧录密钥的完整性的校验。如校验解密后密钥(KEY),即待烧录密钥的完整性,校验KEY(即从远端设备获取的密钥,该密钥可以为经过加密后的待烧录密钥)的完整性。
此处不对如何进行完整性校验进行限定,如基于校验码进行校验。
在一个实施例中,在从远端设备获取加密后的待烧录密钥后,可以基于加密后的待烧录密钥的校验码(包含在配置信息中)和下载加密后的待烧录密钥时下载的校验码进行加密后的待烧录密钥的完整性校验。
在一个实施例中,可以基于配置信息中所包括的待烧录密钥的校验码和解密后得到的校验码,进行待烧录密钥的完整性校验。
在一个实施例中,可以基于待烧录密钥的校验码和从远端设备下载的校验码校验从远端设备下载的待烧录密钥。
本实施例中,校验码包括但不限于md5码。
根据配置信息对待烧录密钥进行校验包括:
基于密钥下载信息下载加密后的待烧录密钥;
基于加密后的待烧录密钥的校验码对加密后的待烧录密钥进行校验,基于待烧录密钥的校验码对解密后的待烧录密钥进行校验。
S130、基于校验结果烧录所述待烧录密钥。
校验结果可以指示校验通过和校验失败,在校验通过时,可以直接执行烧录操作;在校验结果指示校验失败时,可以结束本次烧录继续监测是否再次获取到配置信息,以继续执行校验操作,直至完成烧录。
在本实施例中,本实施例还可以包括向远端设备传输电子设备板卡的烧录结果、校验结果等,以供远端设备备份。
本申请实施例提供的一种密钥烧录方法,首先获取待烧录密钥的配置信息,所述配置信息由远端设备根据映射策略确定,所述映射策略包括板卡标识和密钥信息的映射关系;然后根据所述配置信息对所述待烧录密钥进行校验;最后基于校验结果烧录所述待烧录密钥。利用上述技术方案,在出现密钥烧录错误或未烧录时,无需返厂或现场维修,可直接获取远端设备下发的配置信息,基于配置信息完成密钥烧录,从而有效降低了密钥未烧录或烧录错误所增加的维修成本。
在上述实施例的基础上,提出了上述实施例的变型实施例,在此需要说明的是,为了使描述简要,在变型实施例中仅描述与上述实施例的不同之处。
在一个实施例中,所述配置信息在获取到更新请求后触发发送,所述更新请求在所述映射策略变更的情况下触发。
配置信息在远端设备获取到更新请求后发送至电子设备板卡。映射策略可以在用户对密钥需求变更时变更。
在一个实施例中,所述配置信息包括所述电子设备板卡的板卡标识对应的密钥信息,所述电子设备板卡的板卡标识对应的密钥信息指示所述待烧录密钥的如下至少之一信息:下载状态指示信息、类型信息、下载信息、校验码和附加信息。
下载状态指示信息可以认为是指示是否可以下载的信息。需要注意的是,即使远端设备上布置了待烧录密钥的映射策略,但是由于某些原因(此处不作限定,如密钥修复),待烧录密钥不可下载。故,本实施例中的密钥信息可以包括下载状态指示信息以指示待烧录密钥是否可以下载。若待烧录密钥不可以下载,则结束操作,继续监测是否获取到配置信息。
类型信息可以认为是标识密钥类型的信息。下载信息可以认为是用于下载密钥的信息。校验码可以认为是用于进行校验的信息。附加信息不作限定可以基于实际需求设定。
在一个实施例中,所述根据所述配置信息对所述待烧录密钥进行校验,包括:
基于所述密钥下载信息下载所述待烧录密钥;
基于所述密钥校验码校验所述待烧录密钥。
在一个实施例中,在根据所述配置信息对所述待烧录密钥进行校验之前,还包括:
在所述下载状态指示信息指示可下载时,执行校验操作;
在所述下载状态指示信息指示不可下载时,结束操作,并继续监测是否获取到新的配置信息。
新的配置信息可以是远端设备重新发送的待烧录密钥的配置信息,也可以为其余密钥的配置信息。
在一个实施例中,所述基于校验结果烧录所述待烧录密钥,包括:
若校验结果指示校验通过,则烧录所述待烧录密钥;
若校验结果指示校验失败,则上报校验信息,并继续监测是否获取到新的配置信息。
烧录待烧录密钥时,电子设备板卡可以调用应用程序接口(Application Programming Interface,API)实现待烧录密钥的烧录。
校验信息可以认为是指示校验失败的信息,校验信息还可以指示失败原因。上报校验信息可以认为是将KEY的信息回溯给远端设备,即服务端。
需要注意的是,本实施例中电子设备的多个阶段的状态均可以传输至远端设备,以供远端设备进行备份,如下载成功与否的状态,烧录成功与否的状态。
图2为本申请另一实施例提供的一种密钥烧录方法的流程示意图,在本实施例中,包括:确定预存储的密钥池中密钥的烧录状态;
基于所述烧录状态,确定待烧录密钥;
发送所述待烧录密钥的请求信息,所述请求信息包括所述电子设备板卡的板卡标识,所述请求信息用于请求所述配置信息。
本实施例尚未详尽的内容请参考前述实施例。
如图2所示,本申请另一实施例提供的一种密钥烧录方法,包括如下步骤:
S210、确定预存储的密钥池中密钥的烧录状态。
密钥池可以认为是电子设备板卡所能够烧录的所有密钥形成的集合。密钥池中可以包括电子设备板卡的用户未购买或不需要烧录的密钥。
在进行密钥烧录前,本步骤可以遍历密钥池中所有密钥,确定密钥的烧录状态。烧录状态可以为表征对应密钥是否烧录的状态。此处不对如何确定烧录状态进行限定。
S220、基于所述烧录状态,确定待烧录密钥。
在确定烧录状态后,本步骤可以确定待烧录密钥。待烧录密钥的烧录状态可以为未烧录。
S230、发送所述待烧录密钥的请求信息,所述请求信息包括所述电子设备板卡的板卡标识,所述请求信息用于请求所述配置信息。
确定待烧录密钥后,本步骤可以向远端设备发送请求信息,以请求待烧录密钥的配置信息。远端设备获取到包括电子设备板卡的板卡标识的请求信息后,可以基于该板卡标识查询映射策略,以将对应的配置信息发送至电子设备标识。发送至电子设备的配置信息所包括的密钥信息可以包括电子设备所需烧录的密钥的配置信息,所需烧录的密钥包括待烧录密钥。待烧录密钥包括烧录错误的密钥、未烧录的密钥和新增需要烧录的密钥。
S240、获取待烧录密钥的配置信息,所述配置信息由远端设备根据映射策略确定,所述映射策略包括板卡标识和密钥信息的映射关系。
S250、根据所述配置信息对所述待烧录密钥进行校验。
S260、基于校验结果烧录所述待烧录密钥。
本申请实施例提供的一种密钥烧录方法,具体包括了触发请求信息的操作。利用该方法,能够有效的基于请求信息请求远端设备远程控制电子设备板卡进行密钥烧录,有效降低了密钥未烧录或烧录错误所增加的维修成本。
以下对本申请进行示例性描述,本申请提供的一种密钥烧录方法可以认为是一种可云端部署策略的远程烧录软件KEY的方法,以电子设备为智能电视为例,现在很多智能电视都需要烧录很多的关键KEY用于支持制定格式的视频资源或者确定唯一性,例如电视序列号,HDCP key,Widevine Key等。这些关键KEY通常会设计存储在一个通过升级、空中下载技术(Over-the-Air Technology,OTA)等常规系统更新方式无法擦除的磁盘分区,以便保持其独有性,但是如果这些KEY在生产过程没有烧录,或者烧录错误,就会导致大批量的返工和现场维修,本方案是基于该场景,设计出远程烧录的方式。
此外,出货的电子设备并非全部都需要远程烧录,需要在云端部署策略,控制哪些电子设备烧录哪些KEY,根据云端部署的策略,可控的远程向设备端烧录KEY。
本申请中主要涉及三端,即客户端、服务端和系统端,其中,客户端主要在应用程序中实现,会预装在系统中;服务端主要由远程后台系统来实现,由服务器做统一调度控制;系统端是系统烧录端接口实现的。
图3为本申请示例实施例提供的一种密钥烧录方法的流程示意图;图4为本申请示例实施例提供的一种密钥烧录方法的时序示意图;参见图3和图4,客户端的功能主要由应用程序实现,会预装到系统,即板卡中。应用程序主要实现如下功能:
1.key的检测,即图3中获取当前制定类型KEY烧录状态,然后确定是否有烧录。其中,当前制定类型KEY可以认为当前板卡已经定制的KEY,在本申请中通过密钥池表征。
2.配置文件解析,配置文件可以认为是服务端返回信息。其中,是否可以下载状态可以认为是下载状态指示信息,用于指示对应KEY是否可以下载,即用于判断是否有KEY。KEY的类型可以用于烧录对应的KEY,不同类型的KEY对应的烧录方式不同,此处不作限定。下载链接可以认为是下载信息,基于下载链接可以下载对应的KEY。此处不对附加信息进行限定,可以根据实际情况设定任一所需信息作为附加信息。需要注意的是,本申请中密钥的英文释义不区分大小写,无论大小写表示的均是密钥。
需要注意的是,服务端可以存储有不同电子设备板卡所对应的密钥,故本实施例可以基于产品序列号(Serial Number,SN)向服务端请求待烧录密钥。协同参数可以认为是协同SN能够标识电子设备板卡的参数。服务端在获取到SN等协同参数后,可以检测是否有对应的 烧录KEY,即待烧录密钥。
3.KEY下载。
4.KEY的完整性(md5)校验,即基于校验码,如基于加密后密钥的md5码校验KEY的完整性,基于密钥的md5码校验烧录KEY的完整性。
5.KEY的解密。
6.KEY的烧录部分完整性校验,即验证烧录KEY的完整性。
7.KEY的烧录。
8.KEY的多种状态反馈。如KEY的烧录结果、KEY的信息等。
9.KEY的析构,如删除烧录KEY过程中产生的临时文件,临时文件包括下载的KEY;又如更新烧录标识。
服务端可由后台实现,由对应的服务器做控制,服务端主要实现如下功能:
1.KEY的唯一性映射绑定:即映射策略,映射策略包括KEY的类型、KEY关联的电子设备板卡、KEY关联的SN。其中,映射策略中的密钥信息可以为KEY的类型,板卡标识可以通过KEY关联的电子设备板卡、KEY关联的SN表征。这部分可以参考CBD后台的配置文件处理。
2.KEY的部署,如制定映射策略。
3.针对客户端的请求进行响应格式制定:1.检测响应;2.下载响应;3.异常预警响应,其中,检测响应可以认为是通过SN等系统参数检测是否有对应的待烧录密钥的响应;下载响应可以认为是客户端基于下载链接进行待烧录密钥下载的响应;异常预警响应可以认为是在客户端在进行完整性检验发现异常,即校验失败时,向客户端发送KEY的信息后服务端所做响应,该响应包括指示接收到KEY的信息的响应。
4.KEY的服务端加密,加密后得到加密md5。
5.KEY的完整性生成:加密KEY的md5码,KEY的烧录部分md5码生成。
系统端主要实现如下功能:
1.远程烧录成功宏控制;
2.远程烧录成功显示(工厂菜单部分)以反馈用户;
3.信息同步。
图4中额外KEY可以认为待烧录密钥。业务端可以认为是客户端。图4中服务端可以认为是远程设备端,系统端可以认为是电子设备板卡端。
本申请实施例提供的密钥烧录方法可以减少售后损失费用;为后期远程修复和烧录提供可执行途径;可以在第一时间响应客户反馈,提高客户满意度;可云端部署烧录策略,做可 控远程烧录。其中,本申请可以通过映射策略响应客户反馈,在用户有KEY需求变更时,可以通过更改映射策略以响应客户反馈。
图5为本申请实施例提供的一种密钥烧录装置的结构示意图,该装置可适用于降低烧录成本的情况,其中该装置可由软件和/或硬件实现,并一般集成在电子设备板卡上。
如图5所示,该装置包括:
获取模块31,设置为获取待烧录密钥的配置信息,所述配置信息由远端设备根据映射策略确定,所述映射策略包括板卡标识和密钥信息的映射关系;
校验模块32,设置为根据所述配置信息对所述待烧录密钥进行校验;
烧录模块33,设置为基于校验结果烧录所述待烧录密钥。
在本实施例中,该装置首先通过获取模块31获取待烧录密钥的配置信息,所述配置信息由远端设备根据映射策略确定,所述映射策略包括板卡标识和密钥信息的映射关系;然后通过校验模块32根据所述配置信息对所述待烧录密钥进行校验;最后通过烧录模块33基于校验结果烧录所述待烧录密钥。
本实施例提供了一种密钥烧录装置,利用该装置在出现密钥烧录错误或未烧录时,无需返厂或现场维修,可直接获取远端设备下发的配置信息,基于配置信息完成密钥烧录,从而有效降低了密钥未烧录或烧录错误所增加的维修成本。
在一个实施例中,该装置还包括发送模块,设置为:
确定预存储的密钥池中密钥的烧录状态;
基于所述烧录状态,确定待烧录密钥;
发送所述待烧录密钥的请求信息,所述请求信息包括所述电子设备板卡的板卡标识,所述请求信息用于请求所述配置信息。
在一个实施例中,所述配置信息在获取到更新请求后触发发送,所述更新请求在所述映射策略变更的情况下触发。
在一个实施例中,所述配置信息包括所述电子设备板卡的板卡标识对应的密钥信息,所述电子设备板卡的板卡标识对应的密钥信息指示所述待烧录密钥的如下至少之一信息:下载状态指示信息、类型信息、下载信息、校验码和附加信息。
在一个实施例中,校验模块32设置为:
基于所述密钥下载信息下载所述待烧录密钥;
基于所述密钥校验码校验所述待烧录密钥。
在一个实施例中,该装置还包括,确定模块,设置为在根据所述配置信息对所述待烧录密钥进行校验之前,执行如下操作:
在所述下载状态指示信息指示可下载时,执行校验操作;
在所述下载状态指示信息指示不可下载时,结束操作,并继续监测是否获取到新的配置信息。
在一个实施例中,烧录模块33,设置为:
若校验结果指示校验通过,则烧录所述待烧录密钥;
若校验结果指示校验失败,则上报校验信息,并继续监测是否获取到新的配置信息。
上述密钥烧录装置可执行本申请任意实施例所提供的密钥烧录方法,具备执行方法相应的功能模块和有益效果。
图6为本申请实施例提供的一种电子设备板卡的结构示意图。如图6所示,本申请实施例提供的电子设备板卡包括:一个或多个处理器41和存储装置42;该电子设备板卡中的处理器41可以是一个或多个,图6中以一个处理器41为例;存储装置42设置为存储一个或多个程序;所述一个或多个程序被所述一个或多个处理器41执行,使得所述一个或多个处理器41实现如本申请实施例中任一项所述的密钥烧录方法。
所述电子设备板卡还可以包括:输入装置43和输出装置44。
电子设备板卡中的处理器41、存储装置42、输入装置43和输出装置44可以通过总线或其他方式连接,图6中以通过总线连接为例。
该电子设备板卡中的存储装置42作为一种计算机可读存储介质,可设置为存储一个或多个程序,所述程序可以是软件程序、计算机可执行程序以及模块,如本申请前述实施例所提供密钥烧录方法对应的程序指令/模块(例如,附图5所示的密钥烧录装置中的模块,包括:获取模块31、校验模块32和烧录模块33)。处理器41通过运行存储在存储装置42中的软件程序、指令以及模块,从而执行电子设备板卡的多种功能应用以及数据处理,即实现上述方法实施例中密钥烧录方法。
存储装置42可包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序;存储数据区可存储根据电子设备板卡的使用所创建的数据等。此外,存储装置42可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他非易失性固态存储器件。在一些实例中,存储装置42可包括相对于处理器41远程设置的存储器,这些远程存储器可以通过网络连接至设备。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
输入装置43可设置为接收输入的数字或字符信息,以及产生与电子设备板卡的用户设置以及功能控制有关的键信号输入。输出装置44可包括显示屏等显示设备。
并且,当上述电子设备板卡所包括一个或者多个程序被所述一个或者多个处理器41执行 时,程序进行如下操作:
获取待烧录密钥的配置信息,所述配置信息由远端设备根据映射策略确定,所述映射策略包括板卡标识和密钥信息的映射关系;
根据所述配置信息对所述待烧录密钥进行校验;
基于校验结果烧录所述待烧录密钥。
本申请实施例提供了一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时用于执行密钥烧录方法,该方法包括:
获取待烧录密钥的配置信息,所述配置信息由远端设备根据映射策略确定,所述映射策略包括板卡标识和密钥信息的映射关系;
根据所述配置信息对所述待烧录密钥进行校验;
基于校验结果烧录所述待烧录密钥。
例如,该程序被处理器执行时还可以用于执行本申请任意实施例所提供的密钥烧录方法。
本申请实施例的计算机存储介质,可以采用一个或多个计算机可读的介质的任意组合。计算机可读介质可以是计算机可读信号介质或者计算机可读存储介质。计算机可读存储介质例如可以是,但不限于电、磁、光、电磁、红外线、或半导体的系统、装置或器件,或者任意以上的组合。计算机可读存储介质的更具体的例子(非穷举的列表)包括:具有一个或多个导线的电连接、便携式计算机磁盘、硬盘、随机存取存储器(Random Access Memory,RAM)、只读存储器(Read Only Memory,ROM)、可擦式可编程只读存储器(Erasable Programmable Read Only Memory,EPROM)、闪存、光纤、便携式CD-ROM、光存储器件、磁存储器件、或者上述的任意合适的组合。计算机可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。
计算机可读的信号介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了计算机可读的程序代码。这种传播的数据信号可以采用多种形式,包括但不限于:电磁信号、光信号或上述的任意合适的组合。计算机可读的信号介质还可以是计算机可读存储介质以外的任何计算机可读介质,该计算机可读介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。计算机可读存储介质可以是非暂态计算机可读存储介质。
计算机可读介质上包含的程序代码可以用任何适当的介质传输,包括但不限于:无线、电线、光缆、无线电频率(Radio Frequency,RF)等等,或者上述的任意合适的组合。
可以以一种或多种程序设计语言或其组合来编写用于执行本申请操作的计算机程序代码,所述程序设计语言包括面向对象的程序设计语言,诸如Java、Smalltalk、C++,还包括常规 的过程式程序设计语言,诸如“C”语言或类似的程序设计语言。程序代码可以完全地在用户计算机上执行、部分地在用户计算机上执行、作为一个独立的软件包执行、部分在用户计算机上部分在远程计算机上执行、或者完全在远程计算机或服务器上执行。在涉及远程计算机的情形中,远程计算机可以通过任意种类的网络,包括局域网(LAN)或广域网(WAN),连接到用户计算机,或者,可以连接到外部计算机(例如利用因特网服务提供商来通过因特网连接)。

Claims (10)

  1. 一种密钥烧录方法,应用于电子设备板卡,包括:
    获取待烧录密钥的配置信息,所述配置信息由远端设备根据映射策略确定,所述映射策略包括板卡标识和密钥信息的映射关系;
    根据所述配置信息对所述待烧录密钥进行校验;
    基于校验结果烧录所述待烧录密钥。
  2. 根据权利要求1所述的方法,还包括:
    确定预存储的密钥池中密钥的烧录状态;
    基于所述烧录状态,确定待烧录密钥;
    发送所述待烧录密钥的请求信息,所述请求信息包括所述电子设备板卡的板卡标识,所述请求信息用于请求所述配置信息。
  3. 根据权利要求1所述的方法,其中,所述配置信息在获取到更新请求后触发发送,所述更新请求在所述映射策略变更的情况下触发。
  4. 根据权利要求1所述的方法,其中,所述配置信息包括所述电子设备板卡的板卡标识对应的密钥信息,所述电子设备板卡的板卡标识对应的密钥信息指示所述待烧录密钥的如下至少之一信息:下载状态指示信息、类型信息、下载信息、校验码和附加信息。
  5. 根据权利要求4所述的方法,其中,所述根据所述配置信息对所述待烧录密钥进行校验,包括:
    基于所述密钥下载信息下载所述待烧录密钥;
    基于所述密钥校验码校验所述待烧录密钥。
  6. 根据权利要求4所述的方法,在根据所述配置信息对所述待烧录密钥进行校验之前,还包括:
    响应于确定所述下载状态指示信息指示可下载,执行校验操作;
    响应于确定所述下载状态指示信息指示不可下载,结束操作,并继续监测是否获取到新的配置信息。
  7. 根据权利要求1所述的方法,其中,所述基于校验结果烧录所述待烧录密钥,包括:
    响应于确定校验结果指示校验通过,烧录所述待烧录密钥;
    响应于确定校验结果指示校验失败,上报校验信息,并继续监测是否获取到新的配置信息。
  8. 一种密钥烧录装置,包括:
    获取模块,设置为获取待烧录密钥的配置信息,所述配置信息由远端设备根据映射策略确定,所述映射策略包括板卡标识和密钥信息的映射关系;
    校验模块,设置为根据所述配置信息对所述待烧录密钥进行校验;
    烧录模块,设置为基于校验结果烧录所述待烧录密钥。
  9. 一种电子设备板卡,包括:
    至少一个处理器;
    存储装置,设置为存储至少一个程序;
    当所述至少一个程序被所述至少一个处理器执行,使得所述至少一个处理器实现如权利要求1-7中任一所述的密钥烧录方法。
  10. 一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现如权利要求1-7中任一所述的密钥烧录方法。
PCT/CN2022/097405 2021-06-07 2022-06-07 密钥烧录方法、装置、电子设备板卡及存储介质 WO2022257927A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110633612.4 2021-06-07
CN202110633612.4A CN115515012A (zh) 2021-06-07 2021-06-07 一种密钥烧录方法、装置、电子设备板卡及存储介质

Publications (1)

Publication Number Publication Date
WO2022257927A1 true WO2022257927A1 (zh) 2022-12-15

Family

ID=84425703

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/097405 WO2022257927A1 (zh) 2021-06-07 2022-06-07 密钥烧录方法、装置、电子设备板卡及存储介质

Country Status (2)

Country Link
CN (1) CN115515012A (zh)
WO (1) WO2022257927A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117743061A (zh) * 2024-02-19 2024-03-22 四川天邑康和通信股份有限公司 基于fttr的fpga密钥无线静态测试方法、装置、设备及介质

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117521031B (zh) * 2023-12-12 2024-06-18 深圳市博欣锐捷科技有限公司 数字版权密钥烧录方法及其装置

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103929670A (zh) * 2014-04-30 2014-07-16 深圳市九洲电器有限公司 一种机顶盒的烧写方法和系统
CN109753770A (zh) * 2019-01-07 2019-05-14 北京地平线机器人技术研发有限公司 确定烧录数据的方法及装置、烧录方法及装置、电子设备
CN111651173A (zh) * 2020-06-11 2020-09-11 深圳创维-Rgb电子有限公司 key码数据烧录方法、装置、终端设备和可读存储介质
CN111797038A (zh) * 2020-07-03 2020-10-20 深圳市慧为智能科技股份有限公司 烧录控制方法、系统、装置、设备及计算机可读存储介质
CN112799689A (zh) * 2021-01-27 2021-05-14 深圳创维-Rgb电子有限公司 可变烧录数据存储、烧录与校验方法、装置及存储介质
CN114499851A (zh) * 2022-01-30 2022-05-13 重庆长安汽车股份有限公司 一种基于端云一体化实现安全灌装根密钥的方法

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104426760A (zh) * 2013-08-23 2015-03-18 中兴通讯股份有限公司 流映射处理方法及装置
CN106445401B (zh) * 2015-08-11 2020-01-07 群联电子股份有限公司 表格更新方法、存储器储存装置及存储器控制电路单元
CN108156126B (zh) * 2016-12-02 2020-12-08 阿里巴巴集团控股有限公司 物联网设备的烧录校验方法及装置、身份认证方法及装置
CN108279918A (zh) * 2018-01-16 2018-07-13 深圳市太美亚电子科技有限公司 一种基于usb的固件烧录方法、系统及终端
CN109117171A (zh) * 2018-08-27 2019-01-01 郑州云海信息技术有限公司 一种pcba板卡的变更方法、装置及系统
CN110086613B (zh) * 2019-04-28 2022-04-12 广州视源电子科技股份有限公司 一种烧录密钥的方法、装置、数字电视板卡及存储介质
CN110489141A (zh) * 2019-07-12 2019-11-22 苏州浪潮智能科技有限公司 一种刷新服务器平台代码的方法及系统

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103929670A (zh) * 2014-04-30 2014-07-16 深圳市九洲电器有限公司 一种机顶盒的烧写方法和系统
CN109753770A (zh) * 2019-01-07 2019-05-14 北京地平线机器人技术研发有限公司 确定烧录数据的方法及装置、烧录方法及装置、电子设备
CN111651173A (zh) * 2020-06-11 2020-09-11 深圳创维-Rgb电子有限公司 key码数据烧录方法、装置、终端设备和可读存储介质
CN111797038A (zh) * 2020-07-03 2020-10-20 深圳市慧为智能科技股份有限公司 烧录控制方法、系统、装置、设备及计算机可读存储介质
CN112799689A (zh) * 2021-01-27 2021-05-14 深圳创维-Rgb电子有限公司 可变烧录数据存储、烧录与校验方法、装置及存储介质
CN114499851A (zh) * 2022-01-30 2022-05-13 重庆长安汽车股份有限公司 一种基于端云一体化实现安全灌装根密钥的方法

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117743061A (zh) * 2024-02-19 2024-03-22 四川天邑康和通信股份有限公司 基于fttr的fpga密钥无线静态测试方法、装置、设备及介质
CN117743061B (zh) * 2024-02-19 2024-05-10 四川天邑康和通信股份有限公司 基于fttr的fpga密钥无线静态测试方法、装置、设备及介质

Also Published As

Publication number Publication date
CN115515012A (zh) 2022-12-23

Similar Documents

Publication Publication Date Title
WO2022257927A1 (zh) 密钥烧录方法、装置、电子设备板卡及存储介质
US11886866B2 (en) Credential management for IoT devices
WO2017071207A1 (zh) 一种应用安装方法、相关装置及应用安装系统
WO2017161947A1 (zh) 多系统ota升级方法和多系统设备
JP2012084159A5 (zh)
US20230259367A1 (en) Scalable life-cycle maintenance of hardware
CN105468393A (zh) 模块版本升级方法及终端装置
CN106131682B (zh) 机顶盒内置WiFi固件升级方法、装置及机顶盒
CN109391673A (zh) 一种管理更新文件的方法、系统及终端设备
WO2022142153A1 (zh) 电表升级方法、系统、智能电表及存储介质
CN112714158A (zh) 事务处理方法、中继网络、跨链网关、系统、介质和设备
US20170293481A1 (en) Updating Software Packets in Water Installation Controlling Apparatus
CN112838951B (zh) 一种终端设备的运维方法、装置、系统及存储介质
US9430638B2 (en) Authentication method, authentication apparatus and authentication device
CN104348578A (zh) 数据处理的方法及装置
US11368994B1 (en) Process for managing reconnections of devices in a network
CN110045969B (zh) 应用程序安装方法、服务器、系统、设备及存储介质
KR102434275B1 (ko) 공장 초기화 설정으로의 원격 재설정, 방법 및 장치
EP2557755B1 (en) Securely Performing Commands from a Remote Source
CN110493644B (zh) 电视应用升级方法、电视终端及服务器
KR100453504B1 (ko) 소프트웨어 인증 방법 및 시스템
CN116232571A (zh) 车机加密方法、装置、设备、存储介质及车辆
JP2021511583A (ja) 衛星装置を遠隔的に更新するための方法及び装置
US10979287B2 (en) Method and apparatus for receiving a solution when configuration function verification fails in a terminal
US11792288B2 (en) Wireless network device with directional communication functionality

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22819525

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 22819525

Country of ref document: EP

Kind code of ref document: A1