CN111240709A - Firmware upgrading method and system of POS equipment based on android system - Google Patents
Firmware upgrading method and system of POS equipment based on android system Download PDFInfo
- Publication number
- CN111240709A CN111240709A CN201911367733.8A CN201911367733A CN111240709A CN 111240709 A CN111240709 A CN 111240709A CN 201911367733 A CN201911367733 A CN 201911367733A CN 111240709 A CN111240709 A CN 111240709A
- Authority
- CN
- China
- Prior art keywords
- firmware
- file
- module
- android system
- package
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 24
- 238000012795 verification Methods 0.000 claims abstract description 49
- 238000004806 packaging method and process Methods 0.000 claims abstract description 45
- 238000004891 communication Methods 0.000 claims abstract description 30
- 238000011084 recovery Methods 0.000 claims abstract description 29
- 238000000605 extraction Methods 0.000 claims description 6
- 239000000284 extract Substances 0.000 claims description 3
- 238000012545 processing Methods 0.000 claims description 3
- 238000009417 prefabrication Methods 0.000 claims description 2
- 238000012423 maintenance Methods 0.000 abstract description 3
- 230000002093 peripheral effect Effects 0.000 abstract description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000001680 brushing effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Stored Programmes (AREA)
Abstract
The invention discloses a firmware upgrading method and system of POS equipment based on an android system, wherein the method comprises the following steps: encrypting and packaging the firmware image file into an OTA package to form an OTA upgrade package with the firmware image file; establishing a communication interface between the android system and the firmware and a firmware updating function; downloading an OTA upgrade package through an OTA upgrade program; entering a recovery mode of the android system, decrypting the OTA upgrade package, and completing integrity and validity verification; and calling a firmware updating function to update the firmware through the communication interface according to the firmware image file in the package file decrypted by the OTA updating package. By implementing the invention, the problem of wireless upgrading of the firmware of the POS equipment is solved, the SE type peripheral firmware can be wirelessly and remotely upgraded in batches for the POS machines which are already on the market, the machine recall caused by the change of the industry specification is reduced, and the maintenance cost of the equipment recall and the loss caused to customers and equipment manufacturers are reduced.
Description
Technical Field
The invention relates to the field of firmware upgrading, in particular to a method and a system for upgrading firmware of POS equipment based on an android system.
Background
Generally, firmware upgrade of a security module (SE) of an Android POS device is performed through factory line brushing, and with update of an industry specification, particularly for POS devices already on the market, if firmware upgrade is required, a machine call-back mode can be used, but this mode may cause loss to customers and device manufacturers.
Disclosure of Invention
The invention aims to provide a method and a system for upgrading firmware of POS equipment based on an android system.
The technical scheme adopted by the invention for solving the technical problems is as follows: a firmware upgrading method of POS equipment based on an android system is constructed, and the method comprises the following steps:
s1: encrypting and packaging the firmware image file into an OTA package to form an OTA upgrade package with the firmware image file;
s2: establishing a communication interface between the android system and the firmware and a firmware updating function;
s3: downloading the OTA upgrade package through an OTA upgrade program;
s4: entering a recovery mode of the android system, decrypting the OTA upgrade package, and completing integrity and validity verification;
s5: and calling the firmware updating function to update the firmware through the communication interface according to the firmware image file in the package file decrypted by the OTA updating package.
Preferably, in the firmware upgrading method of the POS device based on the android system, the encrypting and packaging the firmware image file into the OTA package includes:
s1-1: performing calculation and summarization processing on the firmware image file to obtain a hash value of the whole firmware image file to obtain a unique identifier Y;
s1-2: encrypting the unique identifier Y through a private key of an asymmetric key to obtain signature data;
s1-3: adding a manufacturer certificate and the signature data to the back of the firmware image file in a binary form to generate a packaged file;
s1-4: encrypting the packed file through the private key to generate a ciphertext packed file;
s1-5: and packaging the ciphertext packaging file into the OTA package.
Preferably, in the method for upgrading firmware of a POS device based on an android system according to the present invention, the step S2 includes:
and establishing a communication interface between the android system and the firmware in an android system driver layer, and realizing a firmware updating function in a recovery download binary file.
Preferably, in the method for upgrading firmware of a POS device based on an android system according to the present invention, step S4 includes:
and entering a recovery mode of the android system, extracting the ciphertext packaging file from the OTA upgrade package to a tmp directory of POS equipment, decrypting the ciphertext packaging file through a public key of an asymmetric key to obtain a packaging file, performing integrity verification on signature data in the packaging file, and performing legitimacy verification on a manufacturer certificate in the packaging file.
Preferably, in the firmware upgrade method for POS devices based on an android system, the integrity verification of the signature data in the package file and the validity verification of the manufacturer certificate in the package file include:
s4-1: prefabricating a public key of the asymmetric key and a manufacturer certificate into an android system;
s4-2: performing hash operation on the firmware image file in the packed file to obtain a hash value X;
s4-3: decrypting the signature data in the packaged file through the public key to obtain a decrypted unique identifier Y;
s4-4: comparing whether the hash value X is equal to the unique identifier Y or not, and if so, passing the integrity verification;
s4-5: and comparing the manufacturer certificate in the packaged file with a manufacturer certificate prefabricated in the android system, and if the manufacturer certificate in the packaged file is the same as the manufacturer certificate prefabricated in the android system, passing the validity verification.
Preferably, in the method for upgrading firmware of a POS device based on an android system according to the present invention, the step S5 includes:
and starting recovery to download the binary file, calling the firmware updating function to decompress the firmware image file of the packed file to obtain updating data, and updating the updating data to the firmware through the communication interface.
The invention also constructs a firmware upgrading system of the POS equipment based on the android system, which comprises the following steps:
the encryption module is used for encrypting and packaging the firmware image file into an OTA package to form an OTA upgrade package with the firmware image file;
the establishing module is used for establishing a communication interface between the android system and the firmware and a firmware updating function;
the download module is used for downloading the OTA upgrade package formed by the encryption module through an OTA upgrade program;
the decryption module is used for entering a recovery mode of the android system, decrypting the OTA upgrade package obtained by the download module and completing integrity and validity verification;
and the updating module is used for calling the firmware updating function to update the firmware through the communication interface according to the firmware image file decrypted by the decryption module to the OTA updating package.
Preferably, in the firmware upgrade system for POS devices based on an android system according to the present invention, the encryption module includes:
the abstract module is used for calculating and abstracting the firmware image file, acquiring the hash value of the whole firmware image file and obtaining a unique identifier Y;
the signature module is used for encrypting the unique identifier Y obtained by the digest module through a private key of an asymmetric key to obtain signature data;
the generating module is used for adding the manufacturer certificate and the signature data obtained by the signature module to the back of the firmware image file in a binary form to generate a packed file;
the ciphertext module is used for encrypting the packed file generated by the generating module through the private key to generate a ciphertext packed file;
and the packaging module is used for packaging the ciphertext packaging file generated by the ciphertext module into the OTA package.
Preferably, in the firmware upgrading system of the POS device based on the android system according to the present invention, the decryption module includes:
the prefabrication module is used for prefabricating the public key of the asymmetric key and a manufacturer certificate into the android system;
the extraction module enters a recovery mode of the android system, and extracts the ciphertext packaging file from the OTA upgrade package to a tmp directory of POS equipment;
the ciphertext decryption module is used for decrypting the ciphertext packed file extracted by the extraction module through the public key to obtain a packed file;
the operation module is used for carrying out Hash operation on the firmware image files in the packed files obtained by the ciphertext decryption module to obtain a Hash value X;
the signature decryption module is used for decrypting the signature data in the packed file obtained by the ciphertext decryption module through the public key to obtain a decrypted unique identifier Y;
the integrity verification module is used for comparing whether the hash value X obtained by the operation module is equal to the unique identifier Y obtained by the signature decryption module, and if the hash value X is equal to the unique identifier Y, the integrity verification is passed;
and the legality verification module is used for comparing the manufacturer certificate in the packed file obtained by the ciphertext decryption module with the manufacturer certificate prefabricated in the android system, and if the manufacturer certificate is the same as the manufacturer certificate, the legality verification is passed.
Preferably, in the firmware upgrading system of the POS device based on the android system, the establishing module is further configured to establish a communication interface between the android system and the firmware on an android system driver layer, and implement a firmware updating function in a recovery download binary file;
the firmware updating function is also used for starting recovery to download the binary file, calling the firmware updating function to decompress the firmware image file in the packed file decrypted by the decryption module to obtain updating data, and updating the updating data to the firmware through the communication interface.
By implementing the invention, the following beneficial effects are achieved:
the firmware image file is encrypted and packaged into the OTA package to form the OTA upgrade package with the firmware image file; establishing a communication interface between the android system and the firmware and a firmware updating function; downloading an OTA upgrade package through an OTA upgrade program; entering a recovery mode of the android system, decrypting the OTA upgrade package, and completing integrity and validity verification; according to the firmware image file in the package file decrypted by the OTA upgrade package, a firmware update function is called to upgrade the firmware through a communication interface, so that the problem of wireless upgrade of the POS equipment firmware is solved, SE type peripheral firmware can be wirelessly and remotely updated in batches for POS machines on the market, machine recall caused by industry standard change is reduced, and the maintenance cost of the equipment recall and the loss caused to customers and equipment manufacturers are reduced.
Drawings
The invention will be further described with reference to the accompanying drawings and examples, in which:
FIG. 1 is a flowchart of a firmware upgrading method for POS equipment based on an android system according to the present invention;
FIG. 2 is an encryption flow diagram of the present invention for cryptographically packaging a firmware image file into an OTA package;
fig. 3 is a block diagram of the firmware upgrading system of the POS device based on the android system according to the present invention.
Detailed Description
For a more clear understanding of the technical features, objects and effects of the present invention, embodiments of the present invention will now be described in detail with reference to the accompanying drawings.
As shown in fig. 1, the present invention constructs a firmware upgrade method for POS devices based on android systems, including the following steps:
step S1: at a server side, encrypting and packaging the firmware image file into an OTA package to form an OTA upgrade package with the firmware image file; the firmware is SE firmware in the present embodiment, and may be other firmware in other embodiments.
Specifically, as shown in fig. 2, the step of cryptographically packaging the firmware image file into the OTA packet includes:
s1-1: and performing calculation and summarization processing on the firmware image file, and acquiring the hash value of the whole firmware image file to obtain the unique identifier Y. It should be noted that the OS-zip file shown in fig. 2 is a firmware image file, and the unique identifier 010203040506 is shown by way of example and not limitation.
S1-2: and encrypting the unique identifier Y by a private key of the asymmetric key to obtain signature data. Similarly, the signature data 12345678 shown in fig. 2 is also by way of example and not limitation.
S1-3: and adding the manufacturer certificate and the signature data to the back of the firmware image file in a binary form to generate a packaged file. In other embodiments, the vendor certificate may be replaced with an authority certificate.
S1-4: encrypting the packed file through a private key to generate a ciphertext packed file;
s1-5: and packaging the ciphertext packaging file into the OTA package.
Step S2: establishing a communication interface between an android system and firmware and a firmware updating function at a POS (point of sale) equipment end; specifically, the method comprises the following steps: establishing a communication interface/dev/se between the android system and the firmware in an android system driver layer, and realizing a firmware updating function in a recovery download binary file: packet _ update _ se ("/dev/se", 1). The recovery download binary file is a binary execution file in a recovery mode, and the firmware update function is a program for upgrading the firmware.
Step S3: downloading an OTA upgrade package through an OTA upgrade program;
step S4: and entering a recovery mode of the android system, decrypting the OTA upgrade package, and finishing integrity and validity verification. Specifically, the method comprises the following steps:
and entering a recovery mode of the android system, extracting a ciphertext packaging file from the OTA upgrade package, temporarily storing the ciphertext packaging file in a tmp directory of the POS device, decrypting the ciphertext packaging file through a public key of the asymmetric key to obtain a packaging file, performing integrity verification on signature data in the packaging file, and performing legitimacy verification on a manufacturer certificate in the packaging file.
As shown in fig. 3, the step of performing integrity verification on the signature data in the packaged file and performing validity verification on the vendor certificate in the packaged file includes:
s4-1: the public key of the asymmetric key and the manufacturer certificate are prefabricated into the android system. In other embodiments, the authority certificate can be further prefabricated into the android system.
S4-2: carrying out Hash operation on the firmware image file in the packaged file to obtain a Hash value X;
s4-3: decrypting the signature data in the packaged file through the public key to obtain a decrypted unique identifier Y;
s4-4: comparing whether the hash value X is equal to the unique identifier Y or not, and if so, passing the integrity verification; if the data is not equal to the integrity verification result, the integrity verification fails, and the data is lost or tampered.
S4-5: comparing the manufacturer certificate in the packed file with a manufacturer certificate prefabricated in the android system, and if the manufacturer certificate in the packed file is the same as the manufacturer certificate prefabricated in the android system, passing the validity verification; if not, the validity verification is not passed. If one of the integrity verification and the validity verification fails, subsequent firmware upgrade cannot be performed.
Step S5: and calling a firmware updating function to update the firmware through the communication interface according to the firmware image file in the package file decrypted by the OTA updating package. Specifically, the method comprises the following steps: and starting recovery to download the binary file, calling a firmware updating function to decompress the firmware image file of the packed file to obtain updating data, and updating the updating data into the firmware through the communication interface to finish firmware upgrading.
By implementing the invention, the following beneficial effects are achieved:
the firmware image file is encrypted and packaged into the OTA package to form the OTA upgrade package with the firmware image file; establishing a communication interface between the android system and the firmware and a firmware updating function; downloading an OTA upgrade package through an OTA upgrade program; entering a recovery mode of the android system, decrypting the OTA upgrade package, and completing integrity and validity verification; according to the firmware image file in the package file decrypted by the OTA upgrade package, a firmware update function is called to upgrade the firmware through a communication interface, so that the problem of wireless upgrade of the POS equipment firmware is solved, SE type peripheral firmware can be wirelessly and remotely updated in batches for POS machines on the market, machine recall caused by industry standard change is reduced, and the maintenance cost of the equipment recall and the loss caused to customers and equipment manufacturers are reduced.
As shown in fig. 3, the present invention also constructs a firmware upgrade system for POS devices based on the android system, including: the POS terminal comprises an encryption module positioned at a server end, and an establishing module, a downloading module, a decryption module and an updating module positioned at a POS device end. Wherein
The encryption module is used for encrypting and packaging the firmware image file into an OTA package to form an OTA upgrade package with the firmware image file;
the establishing module is used for establishing a communication interface between the android system and the firmware and a firmware updating function;
the download module is used for downloading the OTA upgrade package formed by the encryption module through an OTA upgrade program;
the decryption module is used for entering a recovery mode of the android system, decrypting the OTA upgrade package obtained by the download module and completing integrity and validity verification;
and the updating module is used for calling a firmware updating function to update the firmware through the communication interface according to the firmware image file decrypted by the decryption module to the OTA updating package.
Specifically, in this embodiment, the encryption module includes:
the abstract module is used for calculating and abstracting the firmware image file, acquiring the hash value of the whole firmware image file and obtaining a unique identifier Y;
the signature module is used for encrypting the unique identifier Y obtained by the abstract module through a private key of the asymmetric key to obtain signature data;
and the generating module is used for adding the manufacturer certificate and the signature data obtained by the signature module to the back of the firmware image file in a binary form to generate a packaged file. In other embodiments, the vendor certificate may be replaced with an authority certificate.
The ciphertext module is used for encrypting the packed file generated by the generation module through a private key to generate a ciphertext packed file;
and the packaging module is used for packaging the ciphertext packaging file generated by the ciphertext module into the OTA package.
In this embodiment, the decryption module includes:
and the prefabricating module is used for prefabricating the public key of the asymmetric key and the manufacturer certificate into the android system. In other embodiments, the authority certificate can be further prefabricated into the android system.
The extraction module enters a recovery mode of the android system, and extracts the ciphertext packaging file from the OTA upgrade package to be temporarily stored in a tmp directory of the POS device;
the ciphertext decryption module is used for decrypting the ciphertext packed file extracted by the extraction module through the public key to obtain a packed file;
the operation module is used for carrying out Hash operation on the firmware image files in the packed files obtained by the ciphertext decryption module to obtain a Hash value X;
the signature decryption module is used for decrypting the signature data in the packed file obtained by the ciphertext decryption module through the public key to obtain a decrypted unique identifier Y;
the integrity verification module is used for comparing whether the hash value X obtained by the operation module is equal to the unique identifier Y obtained by the signature decryption module or not, and if so, the integrity verification is passed; if the data is not equal to the integrity verification result, the integrity verification fails, and the data is lost or tampered.
And the legality verification module is used for comparing the manufacturer certificate in the packed file obtained by the ciphertext decryption module with the manufacturer certificate prefabricated in the android system, and if the manufacturer certificate is the same as the manufacturer certificate, the legality verification is passed. If not, the validity verification is not passed. If one of the integrity verification and the validity verification fails, subsequent firmware upgrade cannot be performed.
In this embodiment, the establishing module is further configured to establish a communication interface between the android system and the firmware in an android system driver layer, and implement a firmware update function in a recovery download binary file;
the firmware updating module is also used for starting recovery to download the binary file, calling a firmware updating function to decompress the firmware image file in the packed file decrypted by the decryption module to obtain updating data, and updating the updating data into the firmware through the communication interface to finish firmware updating.
While the invention has been described with reference to specific embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted without departing from the scope of the invention. In addition, many modifications may be made to adapt a particular situation or material to the teachings of the invention without departing from its scope. Therefore, it is intended that the invention not be limited to the particular embodiment disclosed, but that the invention will include all embodiments falling within the scope of the appended claims.
Claims (10)
1. A firmware upgrading method of POS equipment based on an android system is characterized by comprising the following steps:
s1: encrypting and packaging the firmware image file into an OTA package to form an OTA upgrade package with the firmware image file;
s2: establishing a communication interface between the android system and the firmware and a firmware updating function;
s3: downloading the OTA upgrade package through an OTA upgrade program;
s4: entering a recovery mode of the android system, decrypting the OTA upgrade package, and completing integrity and validity verification;
s5: and calling the firmware updating function to update the firmware through the communication interface according to the firmware image file in the package file decrypted by the OTA updating package.
2. The firmware upgrade method for POS device based on android system as claimed in claim 1, wherein the step of encrypting and packaging the firmware image file into OTA package comprises:
s1-1: performing calculation and summarization processing on the firmware image file to obtain a hash value of the whole firmware image file to obtain a unique identifier Y;
s1-2: encrypting the unique identifier Y through a private key of an asymmetric key to obtain signature data;
s1-3: adding a manufacturer certificate and the signature data to the back of the firmware image file in a binary form to generate a packaged file;
s1-4: encrypting the packed file through the private key to generate a ciphertext packed file;
s1-5: and packaging the ciphertext packaging file into the OTA package.
3. The firmware upgrade method for POS devices based on android system as claimed in claim 1, wherein the step S2 includes:
and establishing a communication interface between the android system and the firmware in an android system driver layer, and realizing a firmware updating function in a recovery download binary file.
4. The firmware upgrade method for POS device based on android system as claimed in claim 2, wherein the step S4 includes:
and entering a recovery mode of the android system, extracting the ciphertext packaging file from the OTA upgrade package to a tmp directory of POS equipment, decrypting the ciphertext packaging file through a public key of an asymmetric key to obtain a packaging file, performing integrity verification on signature data in the packaging file, and performing legitimacy verification on a manufacturer certificate in the packaging file.
5. The method for upgrading firmware of POS equipment based on the android system as recited in claim 4, wherein the integrity verification of the signature data in the packaged file and the validity verification of the manufacturer certificate in the packaged file comprise:
s4-1: prefabricating a public key of the asymmetric key and a manufacturer certificate into an android system;
s4-2: performing hash operation on the firmware image file in the packed file to obtain a hash value X;
s4-3: decrypting the signature data in the packaged file through the public key to obtain a decrypted unique identifier Y;
s4-4: comparing whether the hash value X is equal to the unique identifier Y or not, and if so, passing the integrity verification;
s4-5: and comparing the manufacturer certificate in the packaged file with a manufacturer certificate prefabricated in the android system, and if the manufacturer certificate in the packaged file is the same as the manufacturer certificate prefabricated in the android system, passing the validity verification.
6. The firmware upgrade method for POS devices based on android system as claimed in claim 5, wherein the step S5 includes:
and starting recovery to download the binary file, calling the firmware updating function to decompress the firmware image file in the packed file to obtain updating data, and updating the updating data to the firmware through the communication interface.
7. A firmware upgrading system of POS equipment based on an android system is characterized by comprising the following components:
the encryption module is used for encrypting and packaging the firmware image file into an OTA package to form an OTA upgrade package with the firmware image file;
the establishing module is used for establishing a communication interface between the android system and the firmware and a firmware updating function;
the download module is used for downloading the OTA upgrade package formed by the encryption module through an OTA upgrade program;
the decryption module is used for entering a recovery mode of the android system, decrypting the OTA upgrade package obtained by the download module and completing integrity and validity verification;
and the updating module is used for calling the firmware updating function to update the firmware through the communication interface according to the firmware image file decrypted by the decryption module to the OTA updating package.
8. The firmware upgrade system for android-system-based POS devices of claim 7, wherein the encryption module comprises:
the abstract module is used for calculating and abstracting the firmware image file, acquiring the hash value of the whole firmware image file and obtaining a unique identifier Y;
the signature module is used for encrypting the unique identifier Y obtained by the digest module through a private key of an asymmetric key to obtain signature data;
the generating module is used for adding the manufacturer certificate and the signature data obtained by the signature module to the back of the firmware image file in a binary form to generate a packed file;
the ciphertext module is used for encrypting the packed file generated by the generating module through the private key to generate a ciphertext packed file;
and the packaging module is used for packaging the ciphertext packaging file generated by the ciphertext module into the OTA package.
9. The firmware upgrade system for android-system-based POS devices of claim 8, wherein the decryption module comprises:
the prefabrication module is used for prefabricating the public key of the asymmetric key and a manufacturer certificate into the android system;
the extraction module enters a recovery mode of the android system, and extracts the ciphertext packaging file from the OTA upgrade package to a tmp directory of POS equipment;
the ciphertext decryption module is used for decrypting the ciphertext packed file extracted by the extraction module through the public key to obtain a packed file;
the operation module is used for carrying out Hash operation on the firmware image files in the packed files obtained by the ciphertext decryption module to obtain a Hash value X;
the signature decryption module is used for decrypting the signature data in the packed file obtained by the ciphertext decryption module through the public key to obtain a decrypted unique identifier Y;
the integrity verification module is used for comparing whether the hash value X obtained by the operation module is equal to the unique identifier Y obtained by the signature decryption module, and if the hash value X is equal to the unique identifier Y, the integrity verification is passed;
and the legality verification module is used for comparing the manufacturer certificate in the packed file obtained by the ciphertext decryption module with the manufacturer certificate prefabricated in the android system, and if the manufacturer certificate is the same as the manufacturer certificate, the legality verification is passed.
10. The firmware upgrade system for POS devices based on an android system as claimed in claim 9, wherein the establishing module is further configured to establish a communication interface between the android system and the firmware at an android system driver layer, and implement a firmware update function in a recovery download binary file;
the updating module is further configured to start recovery to download the binary file, call the firmware updating function to decompress the firmware image file in the packed file decrypted by the decryption module to obtain updating data, and update the updating data to the firmware through the communication interface.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911367733.8A CN111240709A (en) | 2019-12-26 | 2019-12-26 | Firmware upgrading method and system of POS equipment based on android system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911367733.8A CN111240709A (en) | 2019-12-26 | 2019-12-26 | Firmware upgrading method and system of POS equipment based on android system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111240709A true CN111240709A (en) | 2020-06-05 |
Family
ID=70874096
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911367733.8A Pending CN111240709A (en) | 2019-12-26 | 2019-12-26 | Firmware upgrading method and system of POS equipment based on android system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111240709A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111857756A (en) * | 2020-07-23 | 2020-10-30 | 上海世麦智能科技有限公司 | Safe flashing method and system based on hardware encryption |
CN112394968A (en) * | 2020-11-10 | 2021-02-23 | 上海商米科技集团股份有限公司 | Over-the-air technology upgrading system and method for intelligent POS equipment |
CN112905211A (en) * | 2021-03-25 | 2021-06-04 | 苏州科达科技股份有限公司 | Firmware upgrade file updating method, system, equipment and storage medium |
CN113961941A (en) * | 2021-12-22 | 2022-01-21 | 北京辰光融信技术有限公司 | Method, device and equipment for enhancing security of printer system |
CN114143197A (en) * | 2021-11-29 | 2022-03-04 | 武汉天喻信息产业股份有限公司 | OTA (over the air) upgrading method, device and equipment of Internet of things equipment and readable storage medium |
CN114640461A (en) * | 2022-02-16 | 2022-06-17 | 深圳市优博讯科技股份有限公司 | Firmware tamper-proofing method and system based on security chip |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104506515A (en) * | 2014-12-17 | 2015-04-08 | 北京极科极客科技有限公司 | Firmware protection method and firmware protection device |
CN107995284A (en) * | 2017-11-29 | 2018-05-04 | 艾体威尔电子技术(北京)有限公司 | A kind of OTA upgrade methods suitable for POS machine |
CN108958768A (en) * | 2018-06-26 | 2018-12-07 | 浪潮(北京)电子信息产业有限公司 | A kind of GPU firmware update, device, equipment and computer readable storage medium |
CN109165034A (en) * | 2018-08-31 | 2019-01-08 | 深圳大势智能科技有限公司 | POS machine upgrade method, device, equipment and storage medium based on OTA |
CN110378104A (en) * | 2018-04-16 | 2019-10-25 | 北京升鑫网络科技有限公司 | A method of upgrading is anti-to distort |
CN110532735A (en) * | 2018-05-23 | 2019-12-03 | 霍尼韦尔环境自控产品(天津)有限公司 | Firmware upgrade method |
US20200028737A1 (en) * | 2017-02-23 | 2020-01-23 | Pax Computer Technology (Shenzhen) Co., Ltd. | Method and device for upgrading module firmware of pos machine |
-
2019
- 2019-12-26 CN CN201911367733.8A patent/CN111240709A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104506515A (en) * | 2014-12-17 | 2015-04-08 | 北京极科极客科技有限公司 | Firmware protection method and firmware protection device |
US20200028737A1 (en) * | 2017-02-23 | 2020-01-23 | Pax Computer Technology (Shenzhen) Co., Ltd. | Method and device for upgrading module firmware of pos machine |
CN107995284A (en) * | 2017-11-29 | 2018-05-04 | 艾体威尔电子技术(北京)有限公司 | A kind of OTA upgrade methods suitable for POS machine |
CN110378104A (en) * | 2018-04-16 | 2019-10-25 | 北京升鑫网络科技有限公司 | A method of upgrading is anti-to distort |
CN110532735A (en) * | 2018-05-23 | 2019-12-03 | 霍尼韦尔环境自控产品(天津)有限公司 | Firmware upgrade method |
CN108958768A (en) * | 2018-06-26 | 2018-12-07 | 浪潮(北京)电子信息产业有限公司 | A kind of GPU firmware update, device, equipment and computer readable storage medium |
CN109165034A (en) * | 2018-08-31 | 2019-01-08 | 深圳大势智能科技有限公司 | POS machine upgrade method, device, equipment and storage medium based on OTA |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111857756A (en) * | 2020-07-23 | 2020-10-30 | 上海世麦智能科技有限公司 | Safe flashing method and system based on hardware encryption |
CN112394968A (en) * | 2020-11-10 | 2021-02-23 | 上海商米科技集团股份有限公司 | Over-the-air technology upgrading system and method for intelligent POS equipment |
CN112905211A (en) * | 2021-03-25 | 2021-06-04 | 苏州科达科技股份有限公司 | Firmware upgrade file updating method, system, equipment and storage medium |
CN114143197A (en) * | 2021-11-29 | 2022-03-04 | 武汉天喻信息产业股份有限公司 | OTA (over the air) upgrading method, device and equipment of Internet of things equipment and readable storage medium |
CN114143197B (en) * | 2021-11-29 | 2024-04-02 | 武汉天喻信息产业股份有限公司 | OTA (over the air) upgrading method, device and equipment for Internet of things equipment and readable storage medium |
CN113961941A (en) * | 2021-12-22 | 2022-01-21 | 北京辰光融信技术有限公司 | Method, device and equipment for enhancing security of printer system |
CN114640461A (en) * | 2022-02-16 | 2022-06-17 | 深圳市优博讯科技股份有限公司 | Firmware tamper-proofing method and system based on security chip |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111240709A (en) | Firmware upgrading method and system of POS equipment based on android system | |
US11930360B2 (en) | Method and system for updating certificate issuer public key, and related device | |
CN108241517B (en) | Software upgrading method, client and electronic equipment | |
US11361087B2 (en) | Security data processing device | |
CN107682159B (en) | Trusted application management method and trusted application management system of intelligent terminal | |
CN109862099B (en) | Upgrade checking method, device, terminal and system | |
US20080189695A1 (en) | Updating of Data Instructions | |
CN111404682B (en) | Android environment key segmentation processing method and device | |
CN103577206A (en) | Method and device for installing application software | |
CN104702631A (en) | Method and system for upgrading client software | |
EP2372592A1 (en) | integrated circuit and system for installing computer code thereon | |
CN112560017B (en) | Method for realizing APK unified signature by using three-level certificate authentication | |
CN111026419A (en) | Application program upgrading method, device and system of single chip microcomputer | |
CN107729760B (en) | CSP implementation method based on Android system and intelligent terminal | |
EP1194869B1 (en) | Technique for secure remote configuration of a system | |
US7308718B1 (en) | Technique for secure remote configuration of a system | |
CN111538512A (en) | OTA (over the air) firmware upgrading method, device and equipment | |
CN114339676A (en) | Updating system, method and device for unmanned equipment | |
CN107995230B (en) | A kind of method for down loading and terminal | |
CN111064723B (en) | Over-the-air upgrading method and system based on backup system | |
CN116909603A (en) | Vehicle safety upgrading method and system | |
CN114816495A (en) | OTA (over the air) upgrading method and device, electronic equipment and readable storage medium | |
CN118070316B (en) | Offline authorization method, offline authorization system and storage medium based on security device | |
CN114297679B (en) | Method for encrypted transmission and upgrading of mirror image | |
CN112685697B (en) | Method and terminal for preventing cracking and tampering of Ann Zhuo Ying application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200605 |