File upgrading method and terminal device

A terminal device and file technology, applied in the computer field, can solve the problems of upgrade file attack, low file reliability, terminal device attack, etc., and achieve the effect of improving reliability

Inactive Publication Date: 2009-10-14
HUAWEI DIGITAL TECH (CHENGDU) CO LTD
View PDF0 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the process of implementing the present invention, the inventor found that the prior art has at least the following disadvantages: since the upgrade file is directly transmitted by the server through the network, the upgrade file may be modified or atta

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File upgrading method and terminal device
  • File upgrading method and terminal device
  • File upgrading method and terminal device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0026] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0027] In the embodiment of the present invention, the server first verifies the upgrade authority of the terminal device, and after verification, transmits the file to be upgraded to the terminal device, and the terminal device then upgrades the file.

[0028] figure 1 It is an overall flow chart of the file upgrading method of the embodiment of the present invention.

[0029] In this embodiment, when the user needs to upgrade the file of the terminal device used...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiment of the invention discloses a file upgrading method which comprises the steps as follows: upgrading request is sent by the terminal device to a server, so as to determine upgrading authority of the terminal device; if upgrading authority of the terminal device is verified by the server, feedback information from the server is received by the terminal device; the terminal device obtains upgrading file according to the feedback information, wherein, the upgrading file comprises encrypted original file and head information; when the upgrading file is verified to be not revised according to the head information and the feedback information by the terminal device, upgrading operation is carried out. The embodiment of the invention further provides a terminal device which is applicable to improving of reliability of upgrading.

Description

technical field [0001] The embodiments of the present invention relate to the field of computers, and in particular, to a method for upgrading files and a terminal device. Background technique [0002] At present, after using the network security device for a certain period of time, users need to upgrade the database to enjoy better services. The database refers to the non-operable resource content loaded by the program. For example, the database of the intrusion prevention system in the network security device is the "rule database", and the anti-virus database is the "virus database". At present, many illegal users can upgrade on unauthorized devices by stealing database files, or avoid license expiration by modifying the system time, or upgrade by tampering with the database to make it legal. [0003] In order to control the upgrade behavior of illegal users and ensure the normal rights and interests of legitimate users, in the prior art, when a user initiates a request ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L29/06
Inventor 陈建明
Owner HUAWEI DIGITAL TECH (CHENGDU) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products