Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Terminal upgrading protection system and method based on block chain

A protection system and blockchain technology, applied in the terminal upgrade protection system based on blockchain and the field of Internet of Things, can solve the problems of terminal implantation of illegal upgrade packages, authentication leakage, terminal kidnapping, etc., to avoid illegal terminal addition of things. The effect of networking, reasonable number of nodes, and optimal network delay

Active Publication Date: 2020-08-11
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] With the intelligentization of terminals, more and more terminals are connected to the Internet, making the terminals of the Internet of Things more and more large. However, most terminals are small computing devices that can access the Internet through pre-installed software to realize Information interaction with the background system, the pre-installed software of the terminal needs to be continuously updated as the demand changes, but now most of them pass the user password authentication through the back-end and the terminal, and the back-end system sends instructions Or manually upgrade, however, user password authentication also has the possibility of leaking, which is prone to malicious attacks, causing the terminal to be easily implanted with illegal upgrade packages, resulting in the terminal being kidnapped

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal upgrading protection system and method based on block chain
  • Terminal upgrading protection system and method based on block chain
  • Terminal upgrading protection system and method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The implementation of the present invention will be described in detail below in conjunction with the accompanying drawings and examples, so as to fully understand and implement the process of how to apply technical means to solve technical problems and achieve technical effects in the present invention. It should be noted that, as long as there is no conflict, each embodiment and each feature of each embodiment in the present invention can be combined with each other, and the formed technical solutions are all within the protection scope of the present invention.

[0028] In addition, the steps shown in the flow diagrams of the figures may be performed in a computer system, such as a set of computer-executable instructions, and, although a logical order is shown in the flow diagrams, in some cases, the sequence may be different. The steps shown or described are performed in the order herein.

[0029] Please refer to figure 1 As shown, the present invention provides a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a terminal upgrading protection system and method based on a block chain. The system comprises an Internet-of-Things rear end and a plurality of terminals, wherein block chain nodes are respectively deployed on the Internet-of-Things rear end and the terminal; the Internet-of-Things rear end is used for grouping the block chain nodes deployed on the terminal into a pluralityof terminal groups through a decision tree induction algorithm; the rear end of the Internet-of-Things and the plurality of terminal groups construct a block chain network; and upgrading data is packaged, a transaction application is initiated to other block chain nodes in the block chain network, and the upgrading data is in consensus to the block chain network, and the terminal is used for completing upgrading processing by utilizing upgrading data obtained by the deployed block chain node through the consensus of the block chain network.

Description

technical field [0001] The present invention relates to the technical field of blockchain and Internet of Things technology, in particular to a terminal upgrade protection system and method based on blockchain. Background technique [0002] At present, the upsurge of blockchain has swept all walks of life and become one of the hottest and most attention-grabbing information technologies. With the development of block chain technology, more and more individuals and enterprises have begun to use block chain technology to solve some problems. [0003] The Internet of Things is a comprehensive technology and application based on computer science, including network, electronics, automatic identification, wireless, artificial intelligence, barcode, cloud computing, automation, embedded and other technologies. , Refrigerators, cars, equipment, furniture, goods, etc.) are connected to the Internet or local area network, so that they can communicate with each other, and humans can b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F8/65G06F21/64G06Q20/38G16Y10/75G16Y30/10
CPCG06F8/65G06F21/645G06Q20/3829G06Q20/3825G06Q20/3827G16Y10/75G16Y30/10
Inventor 龚开圳罗伟彬苏恒罗强
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products