Firmware upgrading method
A firmware upgrade and firmware technology, which is applied in software deployment, electrical components, user identity/authority verification, etc., can solve problems such as easy to be tampered with and upgrade firmware, interfere with servers, steal firmware, etc., to reduce dependencies, optimize security issues, The effect of preventing leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0050] Such as figure 1 As shown, a firmware upgrade method is mainly to realize the upgrade of the terminal device based on the network, which specifically includes:
[0051] The terminal device obtains the blockchain identity and the corresponding identification document of each server node in the blockchain, and obtains the public key based on the identification document.
[0052] The terminal device encrypts its own information using the public key to obtain an upgrade request package, and sends the upgrade request package to the server.
[0053] For example, after the device goes online, it queries the DID of the server node in the blockchain and returns the DID document. The device uses the RSA public key in the server DID document to encrypt its own firmware version and DID to form an upgrade request package and send it to the server.
[0054] Specifically, the DID document is a string of key-value pairs in JSON. The DID document on the server side should contain the ser...
Embodiment 2
[0065] Such as figure 2 As shown, a firmware upgrade method is mainly based on other terminal devices to achieve upgrades, including:
[0066] The terminal device to be upgraded broadcasts an upgrade password.
[0067] For example, if the upgrade of the device to be upgraded is blocked due to network problems, the upgrade password is broadcasted by means of Bluetooth or Lora.
[0068] At least one terminal device that receives the upgrade password establishes a pairing relationship with the terminal device to be upgraded as an auxiliary device, and the auxiliary device sends a response password and at least one random number to the terminal device to be upgraded.
[0069] For example, if a device within the range supports an upgrade password, it can understand the password information and establish a pairing relationship with the device to be upgraded, and then the auxiliary device sends a positive password response to the device to be upgraded, and sends a random number and...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

