Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for upgrading software on line

A technology of software and software files, applied to electrical components, public keys for secure communication, program control devices, etc., can solve problems such as software system crashes, software implanted functional components, data errors, etc.

Inactive Publication Date: 2011-06-01
广东欧加控股有限公司
View PDF2 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method is simple and practical, but with the increasingly complex network environment, the following hidden dangers need to be considered: first, some data errors may occur when the software is transmitted in the network; second, malicious attacks by hackers, Tampering with the software files on the network server; third, the routing is artificially intervened, so that the software system of the product is linked to the wrong server and the wrong software is downloaded
If a security mechanism for online software upgrades is not established, but the software is directly downloaded and directly upgraded, when the above situation occurs, the software system may crash and the product cannot be used normally, or some software may be maliciously implanted into the software. functional parts

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for upgrading software on line
  • Method for upgrading software on line

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The gist of the present invention is to overcome the deficiencies of the prior art and provide a software online upgrade method, which establishes an associated verification and encryption mechanism at both ends of the network server and the product software system, so as to correctly identify the integrity of the software and prevent Wrong or tampered software is upgraded to the product, so that the product side can safely upgrade the software.

[0021] This software online upgrade method uses the asymmetry of the RSA encryption algorithm to encrypt the upgrade software to generate a pair of keys, that is, a public key and a private key. The public key is placed on the network server side, and the private key is placed in the software system of the product. , the public key is used for encryption, and the private key is used for decryption when the product is upgraded. The RSA algorithm is based on a very simple number theory fact. It multiplies two prime numbers and m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for upgrading software on line. The method comprises the following steps of: encrypting software to be upgraded by using asymmetry of a radio supervisory adapter (RSA) encryption algorithm to generate a public key and a private key which form a pair; and placing the public key at a network server end and the private key in a software system of a product, wherein the public key is used for encryption and the private key is used for decryption. Two prime numbers are multiplied by an RSA, and the product is publically used as an encryption key and is resolved into factors during decryption; but the two prime numbers can be more easily multiplied and the product can be extremely difficultly dissolved into the factors. The encryption and the decryption at the network server end and a product end are set by an RSA data encryption algorithm and a secure hash algorithm (SHA) 1 data digest algorithm respectively; the software can be downloaded and upgraded after settings are compared to be consistent; associated verification and encryption mechanisms are established at the two ends, namely the network server end and the product software system end; thus the integrity of the software is correctly identified, the wrong or tampered software is prevented from being upgraded into the product, and the software at the product end is securely upgraded.

Description

technical field [0001] The invention relates to a software upgrading method, in particular to an online safe and confidential software upgrading method. Background technique: [0002] At present, with the popularization of network applications and the increase of software complexity, more and more products provide online software upgrade functions, such as mobile phones, Internet TVs, set-top boxes, and players. The usual way is: the software system of the product connects to the network server, downloads the software and completes the upgrade. This method is simple and practical, but with the increasingly complex network environment, the following hidden dangers need to be considered: first, some data errors may occur when the software is transmitted in the network; second, malicious attacks by hackers, Tampering with the software files on the network server; Third, the routing is artificially intervened, so that the software system of the product is linked to the wrong se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/30G06F9/445
Inventor 林尚波
Owner 广东欧加控股有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products