Method of application program for prevention illegal update mobile terminal

An application program and mobile terminal technology, applied in the field of communication, can solve the problems of harming the mobile phone market, destroying mobile phones, etc., and achieve the effects of increasing anti-attack capabilities, ensuring security, and broad versatility

Inactive Publication Date: 2007-09-26
GLOBAL INNOVATION AGGREGATORS LLC
View PDF0 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, there is a risk in the mobile phone software upgrade method, that is, by downloading some illegal mobile phone software to the mobile phone, some original functions of the mobile phone may be destroyed, such as the network lock and card lock function of the mobile phone, thus causing harm to the mobile phone market

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of application program for prevention illegal update mobile terminal
  • Method of application program for prevention illegal update mobile terminal
  • Method of application program for prevention illegal update mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The specific implementation manners of the present invention will be described in detail below with reference to the accompanying drawings.

[0018] The invention adopts the encryption algorithm and combines the communication ability of the mobile phone to propose a new method for preventing the application program of the mobile terminal from being illegally upgraded.

[0019] The RSA encryption algorithm is a public key infrastructure (PKI for short) technology, which is an asymmetric algorithm based on a public key, which uses two very large prime numbers to generate completely different public keys (ie , the encryption key) and the private key (ie, the decryption key). Using the RSA algorithm for encryption and identity verification has a high ability to resist attacks. Introducing this algorithm into the mobile phone for security design can greatly improve the security performance of the mobile phone.

[0020] FIG. 1A to FIG. 1C show a flow chart of a method for pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The disclosed method for preventing illegal upgrading the mobile terminal application program comprises: S102, the mobile terminal and the upgrade device take interaction for upgrading; S1104, the terminal identifies the upgrade device, if the device passes the identification, goes to next step, or lese finishes the process; and S106, the mobile terminal validates the upgrade version program, if the version passes the validating, the terminal downloads the program for upgrading, or else finishes the process. This invention is efficient.

Description

technical field [0001] The present invention relates to the communication field, and more specifically relates to a method for preventing illegal upgrading of application programs of mobile terminals. Background technique [0002] Mobile phone software can be downloaded to the mobile phone with various download software, such as Qualcomm's Qualcomm Product Support Tool (QUALCOMM Product Support Tool, referred to as QPST), which can download the software of its corresponding platform to the mobile phone, which is the most convenient way for maintenance points. A simple version upgrade method commonly used. [0003] One of the most commonly used methods for mobile phone software upgrades is to download the corresponding download agent software into the mobile phone after the download software interacts with the mobile phone and start to enter a download mode. After the mobile phone enters the download mode, it runs under the control of the download agent software. The downloa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/32H04L9/32H04Q3/545G06F9/445H04W8/24H04W12/02H04W12/06
Inventor 杨小强胡红雷史幸川
Owner GLOBAL INNOVATION AGGREGATORS LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products