Supercharge Your Innovation With Domain-Expert AI Agents!

System upgrading method and related device

A system upgrade and upgrade instruction technology, applied in the field of system inspection, can solve the problems of developers' economic losses, reduce the safety and reliability of the upgrade system, and achieve the effect of ensuring safety and reliability

Inactive Publication Date: 2018-05-15
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the user upgrades the system by himself rather than through the developer, it may reduce the security and reliability of the system upgrade, and at the same time cause a large amount of economic losses to the developer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System upgrading method and related device
  • System upgrading method and related device
  • System upgrading method and related device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The core of the invention is to provide a system upgrading method. In the prior art, the system is usually encrypted by means of GPG encryption. When it is necessary to unlock the system encrypted by GPG, the public key and the private key are usually required to be unlocked together to succeed.

[0035] However, users or hackers can delete or replace GPG through technical means, so that the public key and private key of GPG will change so that users can successfully unlock the system through other public keys or private keys, thereby bypassing the developer’s direct control of the system. The system is upgraded or modified. Deleting or replacing GPG by the user is equivalent to bypassing the system's first check of encrypted information. If the user upgrades the system by himself rather than through the developer, it will cause a lot of economic losses to the developer.

[0036] And a kind of system upgrading method provided by the present invention can judge whethe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system upgrading method. The method includes the steps of obtaining an upgrading instruction of a current system, obtaining corresponding encrypting information of GPG encryption of the current system, judging whether the encryption information is consistent with original preset encryption information or not, if yes, allowing the current system to continue to be upgraded,and if not, forbidding the current system continuing to be upgraded. By means of the method, by detecting the encryption information two times, whether the upgrading behavior on the system is the upgrading behavior of an original user or not can be judged, and the security and reliability of system upgrading are ensured. The invention further provides a related device with the same advantages.

Description

technical field [0001] The invention relates to the field of system inspection, in particular to a system upgrading method and a related device. Background technique [0002] With the continuous advancement of science and technology in recent years, electronic products are more and more widely used in people's daily life. [0003] For various electronic products, especially smart products, there will be corresponding software systems to manage or provide corresponding services. When the system needs to be maintained or upgraded, the corresponding password is usually required to unlock it, and then the corresponding operation can be performed on the system. [0004] In the prior art, the system is usually encrypted by means of GPG encryption. When it is necessary to unlock the system encrypted by GPG, the public key and the private key are usually required to be unlocked together to succeed. [0005] However, users or hackers can delete or replace GPG through technical mea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F8/65G06F21/12
CPCG06F8/65G06F21/121
Inventor 闫晓峰
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More