Method for safely upgrading software, communication device and communication system

A technology of software security and equipment, applied in the field of communication, can solve problems such as complex software upgrade process and complex network structure, and achieve the effect of simple process and network and improved security

Active Publication Date: 2012-12-19
HUAWEI TECH CO LTD
View PDF2 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

During the research and practice of this method, the inventors of the present invention found that this method of upgrading with the help of third-party equipment not only complicates the software upgrading process, but also complicates the network structure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for safely upgrading software, communication device and communication system
  • Method for safely upgrading software, communication device and communication system
  • Method for safely upgrading software, communication device and communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The embodiment of the present invention provides a method for software security upgrade, because in the method, the upgrade package signature is verified by the device to be upgraded rather than by a third-party verification device, and the device to be upgraded pre-checks the upgrade package before running the upgrade package. The status of itself has been checked, so as to realize the safe upgrade of the software in the equipment to be upgraded more quickly. The embodiment of the present invention also provides a communication device and a communication system, which can also implement fast and safe software upgrades. The following describes the technical solutions in the embodiments of the present invention clearly and completely with reference to the accompanying drawings. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for safely upgrading software. The method comprises the following step that: a to-be-upgraded server obtains an upgrading packet and a signature of the upgrading packet and to-be-upgraded equipment checks an own state; if the upgrading packet signature is checked, signature checking of the upgrading packet is passed, the to-be-upgraded equipment runs the obtained upgrading packet. The method can check the validity of the upgrading packet and the own state of the to-be-upgraded equipment, therefore, safety in a process of upgrading the software is improved; furthermore, a software upgrading procedure of the method is simple, a required networking approach is also simple; a upgrading process of the entire software only requires participation of the to-be-upgraded equipment and a server without third-party equipment.

Description

Technical field [0001] The present invention relates to the field of communication technology, in particular to a method for software security upgrade, communication equipment and communication system. Background technique [0002] With the development of base station deployment to crowded places, base stations, especially small base stations, are facing more and more security threats. In order to deal with this threat to the security of the equipment itself, many devices require a certain degree of reliability in design. The Trusted Enviroment (TrE) module is used to verify the legitimacy of the equipment and its components and whether there are any abnormalities that have been attacked. The TrE module can provide a trustworthy environment, ensure the trusted execution of sensitive functions and guarantee storage Integrity and confidentiality of sensitive data. [0003] Trusted Platform Module (TPM) is the core module of TrE. TPM usually encapsulates several cryptographic functio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/10H04W24/04H04L9/32H04L9/30H04L12/24H04L29/06G06F9/445H04W12/041H04W12/106
Inventor 汪慧君赵兴军崔洋
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products