Method and system for remotely upgrading device

A technology for remote upgrade and equipment, applied in transmission system and key distribution, can solve the security problems of remote upgrade of equipment and other problems, and achieve the effect of reducing the risk of key leakage and improving security.

Inactive Publication Date: 2018-06-01
HENGBAO
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of this application is to propose a method and system for remote upgrade of equipment, which is used to solve the technical problem of potential safety hazards in remote upgrade of equipment in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for remotely upgrading device
  • Method and system for remotely upgrading device
  • Method and system for remotely upgrading device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] figure 1 It is a flow chart of the method for remotely upgrading equipment in the present application. Exemplarily, the device remote upgrade method is applicable to an encryption machine or other equipment with the encryption machine function. The private key of the asymmetric key generated by the encryption machine is placed in the safe computer room, and the private key cannot be exported, which ensures the safety of making the upgrade package.

[0028] Such as figure 1 As shown, the method for remotely upgrading equipment of the present application includes: randomly generating N groups of asymmetric keys, where N is a natural number (110); deriving the public keys of N groups of asymmetric keys and importing them into the device (120); making a remote Upgrade the package, and sign the remote upgrade package to obtain the signature result (130); encrypt the signature result with a symmetric key, and send it to the device (140).

[0029] Specifically, in step 120,...

Embodiment 2

[0038] figure 2 It is a schematic structural diagram of the system for remotely upgrading equipment in this application. It is applicable to the method for remotely upgrading equipment described in Embodiment 1. Such as figure 2 As shown, the remote upgrade system of the equipment of the present application includes:

[0039] Key generation module 21, for randomly generating N groups of asymmetric keys, N is a natural number;

[0040] The export module 22 is used to export the public keys of N groups of asymmetric keys and import them into the device;

[0041] The signature module 23 is used to make a remote upgrade package, and sign the remote upgrade package to obtain a signature result;

[0042] The sending module 24 is configured to encrypt the signature result with a symmetric key and send it to the device.

[0043] Wherein, the sending module 24 is further configured to send the encrypted data of the serial number of the asymmetric key used to sign the remote upgr...

Embodiment 3

[0046] image 3 It is a flow chart of another method for remotely upgrading equipment of the present application. Exemplarily, the device remote upgrade method is applicable to application devices that need to be upgraded. The application device receives the data sent by the encryption machine to complete the device upgrade.

[0047] Such as image 3 As shown, the method for remotely upgrading equipment of the present application includes: importing information including public keys of N groups of asymmetric keys, and performing initialization (310); receiving data carrying remote upgrade packages sent by an encryption machine (320); responding Since the remote upgrade package is legal, perform remote upgrade (330).

[0048] Specifically, in step 310, the imported information also includes: the same symmetric key as that of the encryption machine, serial numbers of N groups of asymmetric keys, and device parameters. Among them, the device parameters include: certificates, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and system for remotely upgrading a device, relates to the technical field of remote upgrade, and solves the technical problem of security risks in the remote upgradeof the device in the prior art. The method for remotely upgrading a device according to the application includes the steps of randomly generating N sets of asymmetric secret keys, where N is a naturalnumber; exporting a public key of the N sets of asymmetric secret keys and importing the public key into a device; making a remote upgrade package and signing the remote upgrade package to obtain a signature result; and encrypting the signature result with a symmetric secret key and sending the result to the device. This application is mainly used for device upgrades.

Description

technical field [0001] The present application relates to the technical field of remote upgrade, in particular to a method and system for remote upgrade of equipment. Background technique [0002] With the development of the Internet of Things, various equipment terminals have penetrated into various application scenarios, such as gas card terminal recharge, ETC card recharge, etc. Users can purchase a terminal device and recharge at home. Moreover, with the upgrade of application solutions, various devices are faced with the problem of remote upgrade. How to ensure the legality and security of remote upgrade becomes very important. [0003] Most of the existing remote upgrade solutions use symmetric encryption or asymmetric encryption on the firmware, and then write the secret key directly into the program, so that technical developers can obtain the secret key from the program , With the loss of development technicians, it will cause security risks. Contents of the inve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08H04L29/08
Inventor 任松松陆道如
Owner HENGBAO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products