Device, terminal and method for preventing illegal updating of terminal

A terminal and equipment technology, applied in the field of mobile terminal software version upgrade, can solve the problems of destroying the terminal and end market harm, and achieve the effect of protecting vital interests and protecting the terminal market

Active Publication Date: 2012-02-15
ZTE CORP
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, there is a risk in the terminal software upgrade method. By downloading some illegal terminal software to the terminal, some original functions of the terminal may be destroyed, such as the terminal’s network lock and card lock functions, thus causing harm to the terminal market.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device, terminal and method for preventing illegal updating of terminal
  • Device, terminal and method for preventing illegal updating of terminal
  • Device, terminal and method for preventing illegal updating of terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] Such as figure 1 Shown is a flow chart of the device side entering the version protection mode according to the embodiment of the present invention.

[0050] S101: The PC sends a mode query command to the terminal, and the command may be a diag command for mode query; the modes to be queried include entering a version protection mode and exiting a version protection mode.

[0051] S102: The PC side receives the mode status returned by the terminal. If the terminal has entered the version protection mode, exit and return successfully; if the terminal has not entered the version protection mode, execute S103.

[0052] S103: the PC sends an identity verification message to the terminal;

[0053] S104: The PC receives the identity verification result returned by the terminal. If the verification fails, it exits and returns failure; if the identity verification succeeds, it executes S105.

[0054] S105: The PC sends a mode switching instruction to the terminal, instructing...

Embodiment 2

[0057] Such as figure 2 Shown is a flow chart of exiting the version protection mode according to the embodiment of the present invention.

[0058] S201: The PC sends a mode query command to the terminal, and the command may be a diag command for mode query; the modes to be queried include entering a version protection mode and exiting a version protection mode.

[0059]S202: The PC side receives the mode status returned by the terminal. If the current status of the terminal is that it has exited the version protection mode, exit and return successfully; if the terminal has not exited the version protection mode, execute S203.

[0060] S203: the PC sends an identity verification message to the terminal;

[0061] S204: The PC receives the identity verification result returned by the terminal. If the identity verification fails, it exits and returns failure; if the identity verification succeeds, it executes S205.

[0062] S205: The PC sends a mode switching instruction to th...

Embodiment 3

[0065] Such as image 3 Shown is a flowchart of the process of entering or exiting the version protection mode at the terminal side according to the embodiment of the present invention.

[0066] S301: After receiving the mode query instruction, the terminal queries the current mode of the terminal, and the current mode includes entering version protection or exiting version protection;

[0067] S302: The terminal returns the current mode state to the PC side.

[0068] If the current mode status needs to be switched, the following steps are required;

[0069] S303: The terminal receives an identity verification message.

[0070] S304: The terminal judges whether the identity of the PC side is legal.

[0071] S305: The terminal feeds back an identity verification result to the PC; the result includes identity verification success and identity verification failure.

[0072] S306: If the identity verification is successful, the terminal receives a mode switching instruction, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a device, terminal and method for preventing illegal updating of the terminal. The method comprises the following steps of: sending an instruction for mode switching to the terminal by the device, and then switching the terminal to a target mode according to the instruction after the instruction for mode switching is received by the terminal, wherein the mode switching comprises an entry edition protection mode and an exit edition protection mode. By adopting the technical scheme of the invention, the terminal can be simply and efficiently prevented from being illegally updated.

Description

technical field [0001] The invention relates to the technical field of mobile terminal software version upgrades, and is a method for preventing illegal upgrades of terminals. In the method, the terminal is set to a version protection mode before leaving the factory, and the terminal is prohibited from responding to the specified diag command on the PC side, so that the upgrade cannot be performed; exit the version protection Mode, you can upgrade normally. This method has high versatility and portability, and is suitable for preventing illegal upgrades of various mobile terminals. Background technique [0002] The software version of the mobile terminal can be downloaded to the terminal through various downloading software (for example: QPST of Qualcomm) so as to achieve the function of upgrading the software version of the terminal. [0003] One of the most commonly used methods for terminal software upgrades is: after downloading the software and interacting with the ter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/22G06F21/51
Inventor 孟妍妍何博涛谢卓
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products