Supercharge Your Innovation With Domain-Expert AI Agents!

A method, communication device and communication system for software security upgrade

A technology of software security and equipment, applied in the field of communication, can solve problems such as complex network structure and software upgrade process, and achieve the effect of improving security, process and simple networking

Active Publication Date: 2016-03-30
HUAWEI TECH CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

During the research and practice of this method, the inventors of the present invention found that this method of upgrading with the help of third-party equipment not only complicates the software upgrading process, but also complicates the network structure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, communication device and communication system for software security upgrade
  • A method, communication device and communication system for software security upgrade
  • A method, communication device and communication system for software security upgrade

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] An embodiment of the present invention provides a method for safely upgrading software. In the method, the signature of the upgrade package is verified by the device to be upgraded itself instead of using a third-party verification device, and the device to be upgraded has pre-checked the upgrade package before running the upgrade package. The state of the device itself is checked, so that the safe upgrade of the software in the device to be upgraded can be realized more quickly. The embodiment of the present invention also provides a communication device and a communication system, and the communication device and the communication system can also realize fast and safe software upgrade. The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for safely upgrading software, comprising: a device to be upgraded obtains an upgrade package and a signature of the upgrade package from a server; the device to be upgraded verifies its own state; if the verification passes, the signature of the upgrade package is verified; If the signature verification of the upgrade package passes, the device to be upgraded runs the obtained upgrade package. The method not only verifies the validity of the upgrade package, but also verifies the state of the equipment to be upgraded, which improves the security in the software upgrade process, and the software upgrade process described in the method is simple, and the required components The network method is also relatively simple, and the entire software upgrade process can only require the participation of the device to be upgraded and the server, without the use of third-party devices.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a method for safely upgrading software, communication equipment and a communication system. Background technique [0002] With the development of base station deployment to places with a large number of people, base stations, especially small base stations, are subject to more and more security threats. The Trusted Environment (TrustedEnviroment, TrE) module is used to verify the legitimacy of the device and its components and whether there is an abnormal attack. The TrE module can provide a trustworthy environment to ensure the trusted execution of sensitive functions and the protection of sensitive storage. Data integrity, confidentiality. [0003] Trusted Platform Module (Trusted Platform Module, TPM) is the core module of TrE. TPM usually encapsulates several cryptographic function modules in a chip in the form of System on Chip (SoC), which cannot be accessed without ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W12/10H04W24/04H04L9/32H04L9/30H04L12/24H04L29/06G06F9/445H04W12/041H04W12/106
Inventor 汪慧君赵兴军崔洋
Owner HUAWEI TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More