Nothing Special   »   [go: up one dir, main page]

CN111240709A - Firmware upgrading method and system of POS equipment based on android system - Google Patents

Firmware upgrading method and system of POS equipment based on android system Download PDF

Info

Publication number
CN111240709A
CN111240709A CN201911367733.8A CN201911367733A CN111240709A CN 111240709 A CN111240709 A CN 111240709A CN 201911367733 A CN201911367733 A CN 201911367733A CN 111240709 A CN111240709 A CN 111240709A
Authority
CN
China
Prior art keywords
firmware
file
module
android system
package
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911367733.8A
Other languages
Chinese (zh)
Inventor
阳广
张波
郭颂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Urovo Technology Corp Ltd
Original Assignee
Shenzhen Urovo Technology Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Urovo Technology Corp Ltd filed Critical Shenzhen Urovo Technology Corp Ltd
Priority to CN201911367733.8A priority Critical patent/CN111240709A/en
Publication of CN111240709A publication Critical patent/CN111240709A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses a firmware upgrading method and system of POS equipment based on an android system, wherein the method comprises the following steps: encrypting and packaging the firmware image file into an OTA package to form an OTA upgrade package with the firmware image file; establishing a communication interface between the android system and the firmware and a firmware updating function; downloading an OTA upgrade package through an OTA upgrade program; entering a recovery mode of the android system, decrypting the OTA upgrade package, and completing integrity and validity verification; and calling a firmware updating function to update the firmware through the communication interface according to the firmware image file in the package file decrypted by the OTA updating package. By implementing the invention, the problem of wireless upgrading of the firmware of the POS equipment is solved, the SE type peripheral firmware can be wirelessly and remotely upgraded in batches for the POS machines which are already on the market, the machine recall caused by the change of the industry specification is reduced, and the maintenance cost of the equipment recall and the loss caused to customers and equipment manufacturers are reduced.

Description

Firmware upgrading method and system of POS equipment based on android system
Technical Field
The invention relates to the field of firmware upgrading, in particular to a method and a system for upgrading firmware of POS equipment based on an android system.
Background
Generally, firmware upgrade of a security module (SE) of an Android POS device is performed through factory line brushing, and with update of an industry specification, particularly for POS devices already on the market, if firmware upgrade is required, a machine call-back mode can be used, but this mode may cause loss to customers and device manufacturers.
Disclosure of Invention
The invention aims to provide a method and a system for upgrading firmware of POS equipment based on an android system.
The technical scheme adopted by the invention for solving the technical problems is as follows: a firmware upgrading method of POS equipment based on an android system is constructed, and the method comprises the following steps:
s1: encrypting and packaging the firmware image file into an OTA package to form an OTA upgrade package with the firmware image file;
s2: establishing a communication interface between the android system and the firmware and a firmware updating function;
s3: downloading the OTA upgrade package through an OTA upgrade program;
s4: entering a recovery mode of the android system, decrypting the OTA upgrade package, and completing integrity and validity verification;
s5: and calling the firmware updating function to update the firmware through the communication interface according to the firmware image file in the package file decrypted by the OTA updating package.
Preferably, in the firmware upgrading method of the POS device based on the android system, the encrypting and packaging the firmware image file into the OTA package includes:
s1-1: performing calculation and summarization processing on the firmware image file to obtain a hash value of the whole firmware image file to obtain a unique identifier Y;
s1-2: encrypting the unique identifier Y through a private key of an asymmetric key to obtain signature data;
s1-3: adding a manufacturer certificate and the signature data to the back of the firmware image file in a binary form to generate a packaged file;
s1-4: encrypting the packed file through the private key to generate a ciphertext packed file;
s1-5: and packaging the ciphertext packaging file into the OTA package.
Preferably, in the method for upgrading firmware of a POS device based on an android system according to the present invention, the step S2 includes:
and establishing a communication interface between the android system and the firmware in an android system driver layer, and realizing a firmware updating function in a recovery download binary file.
Preferably, in the method for upgrading firmware of a POS device based on an android system according to the present invention, step S4 includes:
and entering a recovery mode of the android system, extracting the ciphertext packaging file from the OTA upgrade package to a tmp directory of POS equipment, decrypting the ciphertext packaging file through a public key of an asymmetric key to obtain a packaging file, performing integrity verification on signature data in the packaging file, and performing legitimacy verification on a manufacturer certificate in the packaging file.
Preferably, in the firmware upgrade method for POS devices based on an android system, the integrity verification of the signature data in the package file and the validity verification of the manufacturer certificate in the package file include:
s4-1: prefabricating a public key of the asymmetric key and a manufacturer certificate into an android system;
s4-2: performing hash operation on the firmware image file in the packed file to obtain a hash value X;
s4-3: decrypting the signature data in the packaged file through the public key to obtain a decrypted unique identifier Y;
s4-4: comparing whether the hash value X is equal to the unique identifier Y or not, and if so, passing the integrity verification;
s4-5: and comparing the manufacturer certificate in the packaged file with a manufacturer certificate prefabricated in the android system, and if the manufacturer certificate in the packaged file is the same as the manufacturer certificate prefabricated in the android system, passing the validity verification.
Preferably, in the method for upgrading firmware of a POS device based on an android system according to the present invention, the step S5 includes:
and starting recovery to download the binary file, calling the firmware updating function to decompress the firmware image file of the packed file to obtain updating data, and updating the updating data to the firmware through the communication interface.
The invention also constructs a firmware upgrading system of the POS equipment based on the android system, which comprises the following steps:
the encryption module is used for encrypting and packaging the firmware image file into an OTA package to form an OTA upgrade package with the firmware image file;
the establishing module is used for establishing a communication interface between the android system and the firmware and a firmware updating function;
the download module is used for downloading the OTA upgrade package formed by the encryption module through an OTA upgrade program;
the decryption module is used for entering a recovery mode of the android system, decrypting the OTA upgrade package obtained by the download module and completing integrity and validity verification;
and the updating module is used for calling the firmware updating function to update the firmware through the communication interface according to the firmware image file decrypted by the decryption module to the OTA updating package.
Preferably, in the firmware upgrade system for POS devices based on an android system according to the present invention, the encryption module includes:
the abstract module is used for calculating and abstracting the firmware image file, acquiring the hash value of the whole firmware image file and obtaining a unique identifier Y;
the signature module is used for encrypting the unique identifier Y obtained by the digest module through a private key of an asymmetric key to obtain signature data;
the generating module is used for adding the manufacturer certificate and the signature data obtained by the signature module to the back of the firmware image file in a binary form to generate a packed file;
the ciphertext module is used for encrypting the packed file generated by the generating module through the private key to generate a ciphertext packed file;
and the packaging module is used for packaging the ciphertext packaging file generated by the ciphertext module into the OTA package.
Preferably, in the firmware upgrading system of the POS device based on the android system according to the present invention, the decryption module includes:
the prefabrication module is used for prefabricating the public key of the asymmetric key and a manufacturer certificate into the android system;
the extraction module enters a recovery mode of the android system, and extracts the ciphertext packaging file from the OTA upgrade package to a tmp directory of POS equipment;
the ciphertext decryption module is used for decrypting the ciphertext packed file extracted by the extraction module through the public key to obtain a packed file;
the operation module is used for carrying out Hash operation on the firmware image files in the packed files obtained by the ciphertext decryption module to obtain a Hash value X;
the signature decryption module is used for decrypting the signature data in the packed file obtained by the ciphertext decryption module through the public key to obtain a decrypted unique identifier Y;
the integrity verification module is used for comparing whether the hash value X obtained by the operation module is equal to the unique identifier Y obtained by the signature decryption module, and if the hash value X is equal to the unique identifier Y, the integrity verification is passed;
and the legality verification module is used for comparing the manufacturer certificate in the packed file obtained by the ciphertext decryption module with the manufacturer certificate prefabricated in the android system, and if the manufacturer certificate is the same as the manufacturer certificate, the legality verification is passed.
Preferably, in the firmware upgrading system of the POS device based on the android system, the establishing module is further configured to establish a communication interface between the android system and the firmware on an android system driver layer, and implement a firmware updating function in a recovery download binary file;
the firmware updating function is also used for starting recovery to download the binary file, calling the firmware updating function to decompress the firmware image file in the packed file decrypted by the decryption module to obtain updating data, and updating the updating data to the firmware through the communication interface.
By implementing the invention, the following beneficial effects are achieved:
the firmware image file is encrypted and packaged into the OTA package to form the OTA upgrade package with the firmware image file; establishing a communication interface between the android system and the firmware and a firmware updating function; downloading an OTA upgrade package through an OTA upgrade program; entering a recovery mode of the android system, decrypting the OTA upgrade package, and completing integrity and validity verification; according to the firmware image file in the package file decrypted by the OTA upgrade package, a firmware update function is called to upgrade the firmware through a communication interface, so that the problem of wireless upgrade of the POS equipment firmware is solved, SE type peripheral firmware can be wirelessly and remotely updated in batches for POS machines on the market, machine recall caused by industry standard change is reduced, and the maintenance cost of the equipment recall and the loss caused to customers and equipment manufacturers are reduced.
Drawings
The invention will be further described with reference to the accompanying drawings and examples, in which:
FIG. 1 is a flowchart of a firmware upgrading method for POS equipment based on an android system according to the present invention;
FIG. 2 is an encryption flow diagram of the present invention for cryptographically packaging a firmware image file into an OTA package;
fig. 3 is a block diagram of the firmware upgrading system of the POS device based on the android system according to the present invention.
Detailed Description
For a more clear understanding of the technical features, objects and effects of the present invention, embodiments of the present invention will now be described in detail with reference to the accompanying drawings.
As shown in fig. 1, the present invention constructs a firmware upgrade method for POS devices based on android systems, including the following steps:
step S1: at a server side, encrypting and packaging the firmware image file into an OTA package to form an OTA upgrade package with the firmware image file; the firmware is SE firmware in the present embodiment, and may be other firmware in other embodiments.
Specifically, as shown in fig. 2, the step of cryptographically packaging the firmware image file into the OTA packet includes:
s1-1: and performing calculation and summarization processing on the firmware image file, and acquiring the hash value of the whole firmware image file to obtain the unique identifier Y. It should be noted that the OS-zip file shown in fig. 2 is a firmware image file, and the unique identifier 010203040506 is shown by way of example and not limitation.
S1-2: and encrypting the unique identifier Y by a private key of the asymmetric key to obtain signature data. Similarly, the signature data 12345678 shown in fig. 2 is also by way of example and not limitation.
S1-3: and adding the manufacturer certificate and the signature data to the back of the firmware image file in a binary form to generate a packaged file. In other embodiments, the vendor certificate may be replaced with an authority certificate.
S1-4: encrypting the packed file through a private key to generate a ciphertext packed file;
s1-5: and packaging the ciphertext packaging file into the OTA package.
Step S2: establishing a communication interface between an android system and firmware and a firmware updating function at a POS (point of sale) equipment end; specifically, the method comprises the following steps: establishing a communication interface/dev/se between the android system and the firmware in an android system driver layer, and realizing a firmware updating function in a recovery download binary file: packet _ update _ se ("/dev/se", 1). The recovery download binary file is a binary execution file in a recovery mode, and the firmware update function is a program for upgrading the firmware.
Step S3: downloading an OTA upgrade package through an OTA upgrade program;
step S4: and entering a recovery mode of the android system, decrypting the OTA upgrade package, and finishing integrity and validity verification. Specifically, the method comprises the following steps:
and entering a recovery mode of the android system, extracting a ciphertext packaging file from the OTA upgrade package, temporarily storing the ciphertext packaging file in a tmp directory of the POS device, decrypting the ciphertext packaging file through a public key of the asymmetric key to obtain a packaging file, performing integrity verification on signature data in the packaging file, and performing legitimacy verification on a manufacturer certificate in the packaging file.
As shown in fig. 3, the step of performing integrity verification on the signature data in the packaged file and performing validity verification on the vendor certificate in the packaged file includes:
s4-1: the public key of the asymmetric key and the manufacturer certificate are prefabricated into the android system. In other embodiments, the authority certificate can be further prefabricated into the android system.
S4-2: carrying out Hash operation on the firmware image file in the packaged file to obtain a Hash value X;
s4-3: decrypting the signature data in the packaged file through the public key to obtain a decrypted unique identifier Y;
s4-4: comparing whether the hash value X is equal to the unique identifier Y or not, and if so, passing the integrity verification; if the data is not equal to the integrity verification result, the integrity verification fails, and the data is lost or tampered.
S4-5: comparing the manufacturer certificate in the packed file with a manufacturer certificate prefabricated in the android system, and if the manufacturer certificate in the packed file is the same as the manufacturer certificate prefabricated in the android system, passing the validity verification; if not, the validity verification is not passed. If one of the integrity verification and the validity verification fails, subsequent firmware upgrade cannot be performed.
Step S5: and calling a firmware updating function to update the firmware through the communication interface according to the firmware image file in the package file decrypted by the OTA updating package. Specifically, the method comprises the following steps: and starting recovery to download the binary file, calling a firmware updating function to decompress the firmware image file of the packed file to obtain updating data, and updating the updating data into the firmware through the communication interface to finish firmware upgrading.
By implementing the invention, the following beneficial effects are achieved:
the firmware image file is encrypted and packaged into the OTA package to form the OTA upgrade package with the firmware image file; establishing a communication interface between the android system and the firmware and a firmware updating function; downloading an OTA upgrade package through an OTA upgrade program; entering a recovery mode of the android system, decrypting the OTA upgrade package, and completing integrity and validity verification; according to the firmware image file in the package file decrypted by the OTA upgrade package, a firmware update function is called to upgrade the firmware through a communication interface, so that the problem of wireless upgrade of the POS equipment firmware is solved, SE type peripheral firmware can be wirelessly and remotely updated in batches for POS machines on the market, machine recall caused by industry standard change is reduced, and the maintenance cost of the equipment recall and the loss caused to customers and equipment manufacturers are reduced.
As shown in fig. 3, the present invention also constructs a firmware upgrade system for POS devices based on the android system, including: the POS terminal comprises an encryption module positioned at a server end, and an establishing module, a downloading module, a decryption module and an updating module positioned at a POS device end. Wherein
The encryption module is used for encrypting and packaging the firmware image file into an OTA package to form an OTA upgrade package with the firmware image file;
the establishing module is used for establishing a communication interface between the android system and the firmware and a firmware updating function;
the download module is used for downloading the OTA upgrade package formed by the encryption module through an OTA upgrade program;
the decryption module is used for entering a recovery mode of the android system, decrypting the OTA upgrade package obtained by the download module and completing integrity and validity verification;
and the updating module is used for calling a firmware updating function to update the firmware through the communication interface according to the firmware image file decrypted by the decryption module to the OTA updating package.
Specifically, in this embodiment, the encryption module includes:
the abstract module is used for calculating and abstracting the firmware image file, acquiring the hash value of the whole firmware image file and obtaining a unique identifier Y;
the signature module is used for encrypting the unique identifier Y obtained by the abstract module through a private key of the asymmetric key to obtain signature data;
and the generating module is used for adding the manufacturer certificate and the signature data obtained by the signature module to the back of the firmware image file in a binary form to generate a packaged file. In other embodiments, the vendor certificate may be replaced with an authority certificate.
The ciphertext module is used for encrypting the packed file generated by the generation module through a private key to generate a ciphertext packed file;
and the packaging module is used for packaging the ciphertext packaging file generated by the ciphertext module into the OTA package.
In this embodiment, the decryption module includes:
and the prefabricating module is used for prefabricating the public key of the asymmetric key and the manufacturer certificate into the android system. In other embodiments, the authority certificate can be further prefabricated into the android system.
The extraction module enters a recovery mode of the android system, and extracts the ciphertext packaging file from the OTA upgrade package to be temporarily stored in a tmp directory of the POS device;
the ciphertext decryption module is used for decrypting the ciphertext packed file extracted by the extraction module through the public key to obtain a packed file;
the operation module is used for carrying out Hash operation on the firmware image files in the packed files obtained by the ciphertext decryption module to obtain a Hash value X;
the signature decryption module is used for decrypting the signature data in the packed file obtained by the ciphertext decryption module through the public key to obtain a decrypted unique identifier Y;
the integrity verification module is used for comparing whether the hash value X obtained by the operation module is equal to the unique identifier Y obtained by the signature decryption module or not, and if so, the integrity verification is passed; if the data is not equal to the integrity verification result, the integrity verification fails, and the data is lost or tampered.
And the legality verification module is used for comparing the manufacturer certificate in the packed file obtained by the ciphertext decryption module with the manufacturer certificate prefabricated in the android system, and if the manufacturer certificate is the same as the manufacturer certificate, the legality verification is passed. If not, the validity verification is not passed. If one of the integrity verification and the validity verification fails, subsequent firmware upgrade cannot be performed.
In this embodiment, the establishing module is further configured to establish a communication interface between the android system and the firmware in an android system driver layer, and implement a firmware update function in a recovery download binary file;
the firmware updating module is also used for starting recovery to download the binary file, calling a firmware updating function to decompress the firmware image file in the packed file decrypted by the decryption module to obtain updating data, and updating the updating data into the firmware through the communication interface to finish firmware updating.
While the invention has been described with reference to specific embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted without departing from the scope of the invention. In addition, many modifications may be made to adapt a particular situation or material to the teachings of the invention without departing from its scope. Therefore, it is intended that the invention not be limited to the particular embodiment disclosed, but that the invention will include all embodiments falling within the scope of the appended claims.

Claims (10)

1. A firmware upgrading method of POS equipment based on an android system is characterized by comprising the following steps:
s1: encrypting and packaging the firmware image file into an OTA package to form an OTA upgrade package with the firmware image file;
s2: establishing a communication interface between the android system and the firmware and a firmware updating function;
s3: downloading the OTA upgrade package through an OTA upgrade program;
s4: entering a recovery mode of the android system, decrypting the OTA upgrade package, and completing integrity and validity verification;
s5: and calling the firmware updating function to update the firmware through the communication interface according to the firmware image file in the package file decrypted by the OTA updating package.
2. The firmware upgrade method for POS device based on android system as claimed in claim 1, wherein the step of encrypting and packaging the firmware image file into OTA package comprises:
s1-1: performing calculation and summarization processing on the firmware image file to obtain a hash value of the whole firmware image file to obtain a unique identifier Y;
s1-2: encrypting the unique identifier Y through a private key of an asymmetric key to obtain signature data;
s1-3: adding a manufacturer certificate and the signature data to the back of the firmware image file in a binary form to generate a packaged file;
s1-4: encrypting the packed file through the private key to generate a ciphertext packed file;
s1-5: and packaging the ciphertext packaging file into the OTA package.
3. The firmware upgrade method for POS devices based on android system as claimed in claim 1, wherein the step S2 includes:
and establishing a communication interface between the android system and the firmware in an android system driver layer, and realizing a firmware updating function in a recovery download binary file.
4. The firmware upgrade method for POS device based on android system as claimed in claim 2, wherein the step S4 includes:
and entering a recovery mode of the android system, extracting the ciphertext packaging file from the OTA upgrade package to a tmp directory of POS equipment, decrypting the ciphertext packaging file through a public key of an asymmetric key to obtain a packaging file, performing integrity verification on signature data in the packaging file, and performing legitimacy verification on a manufacturer certificate in the packaging file.
5. The method for upgrading firmware of POS equipment based on the android system as recited in claim 4, wherein the integrity verification of the signature data in the packaged file and the validity verification of the manufacturer certificate in the packaged file comprise:
s4-1: prefabricating a public key of the asymmetric key and a manufacturer certificate into an android system;
s4-2: performing hash operation on the firmware image file in the packed file to obtain a hash value X;
s4-3: decrypting the signature data in the packaged file through the public key to obtain a decrypted unique identifier Y;
s4-4: comparing whether the hash value X is equal to the unique identifier Y or not, and if so, passing the integrity verification;
s4-5: and comparing the manufacturer certificate in the packaged file with a manufacturer certificate prefabricated in the android system, and if the manufacturer certificate in the packaged file is the same as the manufacturer certificate prefabricated in the android system, passing the validity verification.
6. The firmware upgrade method for POS devices based on android system as claimed in claim 5, wherein the step S5 includes:
and starting recovery to download the binary file, calling the firmware updating function to decompress the firmware image file in the packed file to obtain updating data, and updating the updating data to the firmware through the communication interface.
7. A firmware upgrading system of POS equipment based on an android system is characterized by comprising the following components:
the encryption module is used for encrypting and packaging the firmware image file into an OTA package to form an OTA upgrade package with the firmware image file;
the establishing module is used for establishing a communication interface between the android system and the firmware and a firmware updating function;
the download module is used for downloading the OTA upgrade package formed by the encryption module through an OTA upgrade program;
the decryption module is used for entering a recovery mode of the android system, decrypting the OTA upgrade package obtained by the download module and completing integrity and validity verification;
and the updating module is used for calling the firmware updating function to update the firmware through the communication interface according to the firmware image file decrypted by the decryption module to the OTA updating package.
8. The firmware upgrade system for android-system-based POS devices of claim 7, wherein the encryption module comprises:
the abstract module is used for calculating and abstracting the firmware image file, acquiring the hash value of the whole firmware image file and obtaining a unique identifier Y;
the signature module is used for encrypting the unique identifier Y obtained by the digest module through a private key of an asymmetric key to obtain signature data;
the generating module is used for adding the manufacturer certificate and the signature data obtained by the signature module to the back of the firmware image file in a binary form to generate a packed file;
the ciphertext module is used for encrypting the packed file generated by the generating module through the private key to generate a ciphertext packed file;
and the packaging module is used for packaging the ciphertext packaging file generated by the ciphertext module into the OTA package.
9. The firmware upgrade system for android-system-based POS devices of claim 8, wherein the decryption module comprises:
the prefabrication module is used for prefabricating the public key of the asymmetric key and a manufacturer certificate into the android system;
the extraction module enters a recovery mode of the android system, and extracts the ciphertext packaging file from the OTA upgrade package to a tmp directory of POS equipment;
the ciphertext decryption module is used for decrypting the ciphertext packed file extracted by the extraction module through the public key to obtain a packed file;
the operation module is used for carrying out Hash operation on the firmware image files in the packed files obtained by the ciphertext decryption module to obtain a Hash value X;
the signature decryption module is used for decrypting the signature data in the packed file obtained by the ciphertext decryption module through the public key to obtain a decrypted unique identifier Y;
the integrity verification module is used for comparing whether the hash value X obtained by the operation module is equal to the unique identifier Y obtained by the signature decryption module, and if the hash value X is equal to the unique identifier Y, the integrity verification is passed;
and the legality verification module is used for comparing the manufacturer certificate in the packed file obtained by the ciphertext decryption module with the manufacturer certificate prefabricated in the android system, and if the manufacturer certificate is the same as the manufacturer certificate, the legality verification is passed.
10. The firmware upgrade system for POS devices based on an android system as claimed in claim 9, wherein the establishing module is further configured to establish a communication interface between the android system and the firmware at an android system driver layer, and implement a firmware update function in a recovery download binary file;
the updating module is further configured to start recovery to download the binary file, call the firmware updating function to decompress the firmware image file in the packed file decrypted by the decryption module to obtain updating data, and update the updating data to the firmware through the communication interface.
CN201911367733.8A 2019-12-26 2019-12-26 Firmware upgrading method and system of POS equipment based on android system Pending CN111240709A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911367733.8A CN111240709A (en) 2019-12-26 2019-12-26 Firmware upgrading method and system of POS equipment based on android system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911367733.8A CN111240709A (en) 2019-12-26 2019-12-26 Firmware upgrading method and system of POS equipment based on android system

Publications (1)

Publication Number Publication Date
CN111240709A true CN111240709A (en) 2020-06-05

Family

ID=70874096

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911367733.8A Pending CN111240709A (en) 2019-12-26 2019-12-26 Firmware upgrading method and system of POS equipment based on android system

Country Status (1)

Country Link
CN (1) CN111240709A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111857756A (en) * 2020-07-23 2020-10-30 上海世麦智能科技有限公司 Safe flashing method and system based on hardware encryption
CN112394968A (en) * 2020-11-10 2021-02-23 上海商米科技集团股份有限公司 Over-the-air technology upgrading system and method for intelligent POS equipment
CN112905211A (en) * 2021-03-25 2021-06-04 苏州科达科技股份有限公司 Firmware upgrade file updating method, system, equipment and storage medium
CN113961941A (en) * 2021-12-22 2022-01-21 北京辰光融信技术有限公司 Method, device and equipment for enhancing security of printer system
CN114143197A (en) * 2021-11-29 2022-03-04 武汉天喻信息产业股份有限公司 OTA (over the air) upgrading method, device and equipment of Internet of things equipment and readable storage medium
CN114640461A (en) * 2022-02-16 2022-06-17 深圳市优博讯科技股份有限公司 Firmware tamper-proofing method and system based on security chip

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104506515A (en) * 2014-12-17 2015-04-08 北京极科极客科技有限公司 Firmware protection method and firmware protection device
CN107995284A (en) * 2017-11-29 2018-05-04 艾体威尔电子技术(北京)有限公司 A kind of OTA upgrade methods suitable for POS machine
CN108958768A (en) * 2018-06-26 2018-12-07 浪潮(北京)电子信息产业有限公司 A kind of GPU firmware update, device, equipment and computer readable storage medium
CN109165034A (en) * 2018-08-31 2019-01-08 深圳大势智能科技有限公司 POS machine upgrade method, device, equipment and storage medium based on OTA
CN110378104A (en) * 2018-04-16 2019-10-25 北京升鑫网络科技有限公司 A method of upgrading is anti-to distort
CN110532735A (en) * 2018-05-23 2019-12-03 霍尼韦尔环境自控产品(天津)有限公司 Firmware upgrade method
US20200028737A1 (en) * 2017-02-23 2020-01-23 Pax Computer Technology (Shenzhen) Co., Ltd. Method and device for upgrading module firmware of pos machine

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104506515A (en) * 2014-12-17 2015-04-08 北京极科极客科技有限公司 Firmware protection method and firmware protection device
US20200028737A1 (en) * 2017-02-23 2020-01-23 Pax Computer Technology (Shenzhen) Co., Ltd. Method and device for upgrading module firmware of pos machine
CN107995284A (en) * 2017-11-29 2018-05-04 艾体威尔电子技术(北京)有限公司 A kind of OTA upgrade methods suitable for POS machine
CN110378104A (en) * 2018-04-16 2019-10-25 北京升鑫网络科技有限公司 A method of upgrading is anti-to distort
CN110532735A (en) * 2018-05-23 2019-12-03 霍尼韦尔环境自控产品(天津)有限公司 Firmware upgrade method
CN108958768A (en) * 2018-06-26 2018-12-07 浪潮(北京)电子信息产业有限公司 A kind of GPU firmware update, device, equipment and computer readable storage medium
CN109165034A (en) * 2018-08-31 2019-01-08 深圳大势智能科技有限公司 POS machine upgrade method, device, equipment and storage medium based on OTA

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111857756A (en) * 2020-07-23 2020-10-30 上海世麦智能科技有限公司 Safe flashing method and system based on hardware encryption
CN112394968A (en) * 2020-11-10 2021-02-23 上海商米科技集团股份有限公司 Over-the-air technology upgrading system and method for intelligent POS equipment
CN112905211A (en) * 2021-03-25 2021-06-04 苏州科达科技股份有限公司 Firmware upgrade file updating method, system, equipment and storage medium
CN114143197A (en) * 2021-11-29 2022-03-04 武汉天喻信息产业股份有限公司 OTA (over the air) upgrading method, device and equipment of Internet of things equipment and readable storage medium
CN114143197B (en) * 2021-11-29 2024-04-02 武汉天喻信息产业股份有限公司 OTA (over the air) upgrading method, device and equipment for Internet of things equipment and readable storage medium
CN113961941A (en) * 2021-12-22 2022-01-21 北京辰光融信技术有限公司 Method, device and equipment for enhancing security of printer system
CN114640461A (en) * 2022-02-16 2022-06-17 深圳市优博讯科技股份有限公司 Firmware tamper-proofing method and system based on security chip

Similar Documents

Publication Publication Date Title
CN111240709A (en) Firmware upgrading method and system of POS equipment based on android system
US11930360B2 (en) Method and system for updating certificate issuer public key, and related device
CN108241517B (en) Software upgrading method, client and electronic equipment
US11361087B2 (en) Security data processing device
CN107682159B (en) Trusted application management method and trusted application management system of intelligent terminal
CN109862099B (en) Upgrade checking method, device, terminal and system
US20080189695A1 (en) Updating of Data Instructions
CN111404682B (en) Android environment key segmentation processing method and device
CN103577206A (en) Method and device for installing application software
CN104702631A (en) Method and system for upgrading client software
EP2372592A1 (en) integrated circuit and system for installing computer code thereon
CN112560017B (en) Method for realizing APK unified signature by using three-level certificate authentication
CN111026419A (en) Application program upgrading method, device and system of single chip microcomputer
CN107729760B (en) CSP implementation method based on Android system and intelligent terminal
EP1194869B1 (en) Technique for secure remote configuration of a system
US7308718B1 (en) Technique for secure remote configuration of a system
CN111538512A (en) OTA (over the air) firmware upgrading method, device and equipment
CN114339676A (en) Updating system, method and device for unmanned equipment
CN107995230B (en) A kind of method for down loading and terminal
CN111064723B (en) Over-the-air upgrading method and system based on backup system
CN116909603A (en) Vehicle safety upgrading method and system
CN114816495A (en) OTA (over the air) upgrading method and device, electronic equipment and readable storage medium
CN118070316B (en) Offline authorization method, offline authorization system and storage medium based on security device
CN114297679B (en) Method for encrypted transmission and upgrading of mirror image
CN112685697B (en) Method and terminal for preventing cracking and tampering of Ann Zhuo Ying application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200605