CN104462948A - Information processing method and electronic equipment - Google Patents

Information processing method and electronic equipment Download PDF

Info

Publication number
CN104462948A
CN104462948A CN201310447663.3A CN201310447663A CN104462948A CN 104462948 A CN104462948 A CN 104462948A CN 201310447663 A CN201310447663 A CN 201310447663A CN 104462948 A CN104462948 A CN 104462948A
Authority
CN
China
Prior art keywords
electronic equipment
password
unit
firmware program
prescribed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310447663.3A
Other languages
Chinese (zh)
Other versions
CN104462948B (en
Inventor
陈实
李俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201310447663.3A priority Critical patent/CN104462948B/en
Priority claimed from CN201310447663.3A external-priority patent/CN104462948B/en
Publication of CN104462948A publication Critical patent/CN104462948A/en
Application granted granted Critical
Publication of CN104462948B publication Critical patent/CN104462948B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/572Secure firmware programming, e.g. of basic input output system [BIOS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses an information processing method and electronic equipment. The first electronic equipment is provided with a firmware unit and a storage unit, and a firmware program is stored in the firmware unit. The method includes the steps that the first electronic equipment is connected with the second electronic equipment; a triggering instruction is obtained from the second electronic equipment, and the triggering instruction is used for indicating and updating or optimizing the firmware program; the first electronic equipment is restarted in response to the triggering instruction; a central processing unit of the first electronic equipment is used for loading the first part of the firmware program so that the first electronic equipment can be in a firmware program updating mode; a first password is obtained from the second electronic equipment; a preset password is obtained; the first password is compared with the preset password, and a first comparison result is obtained; when the first comparison result shows that the first password is identical with the preset password, the second electronic equipment currently connected is the equipment legally bond with the first electronic equipment, and at the moment, the second part of the firmware program is updated or optimized.

Description

A kind of information processing method and a kind of electronic equipment
Technical field
The present invention relates to electronic technology field, particularly relate to a kind of information processing method and a kind of electronic equipment.
Background technology
Along with the development of science and technology, electronic equipment have also been obtained development at full speed, and the kind of electronic product also gets more and more, and people have also enjoyed the various facilities that scientific development brings, present people can pass through various types of electronic equipment, enjoy the comfortable life along with development in science and technology brings.
Such as, Intelligent mobile equipment, such as mobile phone, panel computer etc., can be started fast by fastboot(), Recovery(repairs) or OTA(Over-the-Air Technology, over the air) etc. mode upgrade firmware, be exactly generally repacking operation system, be commonly called as brush machine.
Existing electronic equipment can pass through brush machine, can improve the service efficiency of electronic equipment, can improve the defect of version in the past or improve the performance of some aspect, and, there is different brush machine modes for different electronic equipments.The public key certificate that some electronic equipment can be provided by producer carries out sign test to firmware, when sign test success, just allows the operation of brush machine.
But present inventor is in the process realizing invention technical scheme in the embodiment of the present application, find that above-mentioned technology at least exists following technical matters:
Due in prior art, if disabled user obtains not one's own electronic equipment, when carrying out the compulsory brush machine of malice, the security with regard to there is electronic equipment can not get the technical matters ensured.
Summary of the invention
The embodiment of the present application is by providing a kind of method of information processing and a kind of electronic equipment, if solve disabled user in prior art to obtain not one's own electronic equipment, when carrying out the compulsory brush machine of malice, the security that there is electronic equipment can not get the technical matters ensured, and then achieves the technique effect of the security that can ensure electronic equipment.
The embodiment of the present application provides a kind of method of information processing, is applied to the first electronic equipment, and described electronic equipment has firmware unit and storage unit; Store firmware program in described firmware unit, described method comprises: connect with the second electronic equipment; Obtain triggering command from the second electronic equipment, obtain a triggering command, described triggering command is used to indicate and upgrades or optimize described firmware program; Respond described triggering command, restart described first electronic equipment; The central processing unit of described first electronic equipment loads the Part I of described firmware program, is in firmware program updating pattern to make described electronic equipment; Obtain first password from described second electronic equipment, described first password is for characterizing the second facility information of described second electronic equipment of current connection; Obtain prescribed password, described prescribed password is for characterizing the facility information of the equipment of the legal binding of described first electronic equipment; Described first password and described prescribed password are compared, obtains the first comparison result; When described first comparison result shows that described first password is consistent with described prescribed password, the second electronic equipment characterizing described current connection is the equipment of the legal binding of described first electronic equipment, now, upgrades or optimize the Part II of described firmware program.
Further, before described and described second electronic equipment connects, described method also comprises: bind with at least one electronic equipment; Acquisition for characterizing at least one facility information of at least one electronic equipment described as described prescribed password, and is stored in the fixed area of described storage unit.
Further, described from after described second electronic equipment obtains first password, described method also comprises: the temporary realm described first password being stored in described storage unit.
Further, described acquisition prescribed password, is specially: obtain described prescribed password from the described fixed area of described storage unit.
Further, described, described first password and described prescribed password are compared, after obtaining the first comparison result, described method also comprises: when described first comparison result shows described first password and described prescribed password is inconsistent, the second electronic equipment characterizing described current connection be described first electronic equipment illegally bind equipment time, now, the described Part II upgrading or optimize described firmware program is forbidden.
Further, after by described first password and described prescribed password comparison, described method also comprises: the data whether having renewal in storage directory corresponding on detection of handset SD card.
Further, the described Part II of described firmware program is specially: the operating system OS part of described first electronic equipment, and/or the basic input-output system BIOS part of described first electronic equipment.
On the other hand, the embodiment of the present application additionally provides a kind of electronic equipment, comprises and has firmware unit and storage unit, and wherein, store firmware program in described firmware unit, described electronic equipment also comprises:
Linkage unit, for connecting with the second electronic equipment.
First obtains unit, and for obtaining triggering command from the second electronic equipment, described triggering command is used to indicate and upgrades or optimize described firmware program;
Response unit, for responding described triggering command, restarts described first electronic equipment;
Loading unit, the central processing unit for described first electronic equipment loads the Part I of described firmware program, is in firmware program updating pattern to make described electronic equipment;
Second obtains unit, and for obtaining first password from described second electronic equipment, described first password is for characterizing the second facility information of described second electronic equipment of current connection;
3rd obtains unit, and for obtaining prescribed password, described prescribed password is for characterizing the facility information of the equipment of the legal binding of described first electronic equipment;
Comparing unit, for described first password and described prescribed password being compared, obtains the first comparison result;
Updating block, for when described first comparison result shows that described first password is consistent with described prescribed password, the second electronic equipment characterizing described current connection is the equipment of the legal binding of described first electronic equipment, now, upgrades or optimize the Part II of described firmware program.
Further, described electronic equipment also comprises: binding unit, for binding with at least one electronic equipment; First obtains subelement, for obtaining at least one facility information for characterizing at least one electronic equipment described as described prescribed password, and is stored in the fixed area of described storage unit.
Further, described electronic equipment also comprises: temporary storage cell, for described first password being stored in the temporary realm of described storage unit.
Further, described 3rd acquiring unit obtains described prescribed password specifically for the described fixed area from described storage unit.
Further, described electronic equipment also comprises: forbid updating block, for when described first comparison result shows described first password and described prescribed password is inconsistent, the second electronic equipment characterizing described current connection be described first electronic equipment illegally bind equipment time, now, the described Part II upgrading or optimize described firmware program is forbidden.
Further, described electronic equipment also comprises: detecting unit, for whether there being the data of renewal in storage directory corresponding on detection of handset SD card.
The one or more technical schemes provided in the embodiment of the present application, at least have following technique effect or advantage:
1, due to have employed the first electronic equipment obtain triggering command from the second electronic equipment time, respond this triggering command, thus be carried in the Part I of the first electronic equipment firmware program, first password is obtained from the second electronic equipment, prescribed password is obtained from the first electronic equipment, first password and prescribed password are compared, if after comparison, first password is consistent with prescribed password, so, just think that the second electronic equipment is the equipment of the legal binding of the first electronic equipment, now, the technical scheme of the Part II of renewal or optimization firmware program, so, efficiently solve in prior art, if disabled user obtains not one's own electronic equipment, when carrying out the compulsory brush machine of malice, security with regard to there is electronic equipment can not get the technical matters ensured, and then achieve the technique effect of the security that can ensure electronic equipment.
2, because the second electronic equipment that have employed from being connected with the first electronic equipment obtains first password, be stored in the temporary realm of this first electronic equipment storage unit, make when this first electronic equipment and this second electronic equipment disconnect, discharge this first password, and then the technique effect that the temporary realm of this storage unit can be made to re-use.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of the method for a kind of information processing in the embodiment of the present application;
Fig. 2 is the module map of a kind of electronic equipment in the embodiment of the present application.
Embodiment
The embodiment of the present application, by providing a kind of information processing method and a kind of electronic equipment, solves in prior art the technical matters that the security that there is electronic equipment can not get ensureing.
Technical scheme in the embodiment of the present application is solve the technical matters that the above-mentioned security that there is electronic equipment can not get guarantee, and general thought is as follows:
When the first electronic equipment and the second electronic equipment that include firmware unit and storage unit connect, and, when storing firmware program in firmware unit, obtain triggering command from the second electronic equipment, this triggering command is used to refer to and upgrades or optimize firmware program; Respond this triggering command, when restarting this first electronic equipment, the central processing unit of this first electronic equipment loads the Part I of this firmware program, thus makes this first electronic equipment be in generation patterns; Then, obtain for characterizing the current first password being connected to the second facility information of this second electronic equipment from the second electronic equipment; To reentry one the prescribed password of facility information of the equipment that can characterize the legal binding of this first electronic equipment; Finally, this first password and this prescribed password are compared, thus obtain the first comparison result, when this first comparison result shows that this first password is consistent with prescribed password, the second electronic equipment just characterizing current connection is the equipment of the legal binding of the first electronic equipment, therefore, just allows the Part II upgrading or optimize firmware program, otherwise, forbid upgrading.
In order to better understand technique scheme, below in conjunction with Figure of description and concrete embodiment, technique scheme is described in detail.
The method of a kind of information processing that the application provides, is applied in the first electronic equipment, and this first electronic equipment can be specifically mobile phone, PC(personal computer), notebook computer, the electronic equipment that panel computer etc. are different, the application does not do concrete restriction.
As shown in Figure 1, the embodiment of the present application provides a kind of method of information processing, and the method is applied in the first electronic equipment, and this first electronic equipment has firmware unit and storage unit, and store firmware program in this firmware unit, the method specifically comprises:
S101, connects with the second electronic equipment;
S102, obtains triggering command from the second electronic equipment, and described triggering command is used to indicate and upgrades or optimize described firmware program;
S103, responds described triggering command, restarts described first electronic equipment;
S104, the central processing unit of described first electronic equipment loads the Part I of described firmware program, is in firmware program updating pattern to make described first electronic equipment;
S105, obtains first password from described second electronic equipment, and described first password is for characterizing the second facility information of described second electronic equipment of current connection;
S106, obtain prescribed password, described prescribed password is for characterizing the facility information of the equipment of the legal binding of described first electronic equipment;
S107, compares described first password and described prescribed password, obtains the first comparison result;
S108, when described first comparison result shows that described first password is consistent with described prescribed password, the second electronic equipment characterizing described current connection is the equipment of the legal binding of described first electronic equipment, now, upgrades or optimize the Part II of described firmware program.
In a particular embodiment, using mobile phone as the first electronic equipment, using PC(personal computer) as the second electronic equipment, above-mentioned steps is described in detail.
Before performing above-mentioned step, need the binding connection of mobile phone and PC being carried out to certification.Concrete operation is as follows:
First, bind with at least one electronic equipment, namely can be able to bind with multiple electronic equipment, certainly, the number of the electronic equipment that can bind neither be unlimited, and user can arbitrarily be arranged, such as, 3,4 or 5 etc.
After binding, obtain at least one facility information for characterizing this at least one electronic equipment as prescribed password, and be stored in the fixed area of this storage unit.
Mobile phone and PC being carried out in the process of certification binding, by arranging user identity characteristic information, mobile phone and PC can bound.That is, by the password that input user is arranged, or the fingerprint of indicate identification feature, or acoustic information, image information etc. confirm this PC whether be the PC with this handset binding, if confirm input show that the information of user identity feature is correct information time, confirm that this PC is the PC with this handset binding, otherwise, be confirmed to be the mobile phone of unbundling.
If be confirmed to be the PC of this mobile phone of binding, the facility information just obtaining this PC from this PC is used as prescribed password, is stored in the fixed area of the storage unit of this mobile phone.Such as, the built-in SD card being stored in this mobile phone is first-class.
After mobile phone and multiple PC are bound, can delete the PC of binding, the amendment of increase etc., but, the quantity of the PC of the binding increased is limited, due to a user mobile phone of oneself and PC are bound time, reasonably conventional quantity also just at the most 5, 6, again how also can not more than 10, therefore, the PC of the binding increased not is unlimited, and, on this mobile phone, the memory size of the fixed area of storage unit is also less, the quantity of the PC of the binding that can hold is naturally namely limited, the capacity of the fixed area of this storage unit of quantity basis of the PC that specifically can bind and determining.
After this mobile phone and PC carry out the binding of certification, perform S101.
In S101, mobile phone is connected on PC, specifically by data line, mobile phone can be connected on PC.
Then, perform S102, obtain triggering command from the second electronic equipment, this triggering command is used to indicate and upgrades or optimize firmware program.
Particularly, when user has for this second electronic equipment, namely have when carrying out a trigger action to PC, can obtain a triggering command with the mobile phone be connected according to this trigger action, this triggering command is used to indicate and upgrades or optimize this firmware program.Namely this triggering command is used for carrying out brush machine to this mobile phone.
S103, responds this triggering command, restarts this first electronic equipment, namely restarts this mobile phone, makes this mobile phone enter generation patterns.
Specifically perform S104, the central processing unit of the first electronic equipment loads the Part I of this firmware program, is in firmware program updating pattern to make this first electronic equipment.
In the embodiment of the present application, the generation patterns entering the firmware program of this mobile phone specifically refers to that fastboot(starts fast) pattern, after the Part I entering this firmware program, this mobile phone just enters generation patterns, can carry out the step upgraded.
When entering the step of renewal, just need the process of carrying out a comparison.In order to avoid the malicious operation of disabled user, in the process of this comparison, effectively can avoid the malicious operation of disabled user, the security of effective guarantee user mobile phone information.
First, perform S105, obtain first password from described second electronic equipment, described first password is for characterizing the second facility information of described second electronic equipment of current connection;
Particularly, the first password of acquisition is stored in the temporary realm of storage unit, that is, the first password being stored in this temporary realm is temporary transient, and after this PC and mobile phone disconnect, the first password being stored in this temporary realm can be released.This first password can be specifically the key message of this PC, CPU ID in such as this PC, BIOS ID or mac address of nic etc., because these key messages can this PC of unique identification, therefore, the PC of the handset binding of this user is specifically identified with these key messages, particularly, after the key message in these PC can also being carried out hash encryption, the storage unit of mobile phone is sent to.
In a particular embodiment, also only the first electronic equipment is passed through user, namely the input media input of mobile phone can be verified when being the identity characteristic information of owner, and the key message in this above-mentioned PC can be sent to the storage unit of this mobile phone by this PC automatically.Otherwise, if can not verify when being the identity characteristic information of owner, the key message of this PC also automatically would not be sent.
When above-mentioned mobile phone and PC carry out the binding of certification, the key message in the PC this certification bound is stored in the fixed area of this mobile phone storage unit.
Then, perform S106, obtain prescribed password, described prescribed password is for characterizing the facility information of the equipment of the legal binding of the first electronic equipment.Particularly, when obtaining prescribed password, be obtain from the fixed area of this mobile phone storage unit.The prescribed password being stored in the fixed area of this storage unit can be multiple, these prescribed password is arranged by the form of list.
Then, perform S107, first password and prescribed password are compared, obtains the first comparison result.
Particularly, after mobile phone obtains first password and prescribed password, at interior of mobile phone, this first password and prescribed password are compared, to judge whether both is consistent.That is, specifically judge whether the first password obtained has identical with the information in prescribed password list.Such as, the first password obtaining this PC is specially the mac address of nic of this PC, is specially 94-39-EF-29-41-ED, just searches following list, and following list is specifically stored in the prescribed password list in this mobile phone storage unit, as shown in the table:
Mac address of nic
PC1
PC2
PC3
Judge to find through searching, the mac address of nic be stored in this mobile phone storage unit temporary realm is consistent with the mac address of nic of the PC3 being stored in fixed area in mobile phone storage unit, therefore, just show that the PC of current connection is the equipment of the legal binding of this mobile phone, determine be legal binding PC after, also need to detect the built-in SD card of this mobile phone, certainly, if after above-mentioned process searches judgement, find that the mac address of nic be stored in mobile phone temporary storage cell can not find identical mac address of nic in static memory cell, that is comparing result shows that this first password and prescribed password are inconsistent, also with regard to not needing, the built-in SD card of this mobile phone is detected, now, just forbid the Part II upgrading or optimize this firmware program.
Particularly, to when in mobile phone, SD card detects, if the data having renewal in storage directory corresponding on this SD card detected, namely correspond to the effective more new data of this mobile phone, now, just upgrade or optimize the Part II of this mobile phone firmware program, if the data not having in storage directory corresponding on this SD card to upgrade detected, also just forbid the Part II upgrading or optimize described firmware program.
Certainly, when first password and prescribed password are compared, be not limited only to the above-mentioned comparison that mac address of nic is carried out, can also be to CPU ID, BIOS ID, Deng comparison, can also be these facility informations are carried out hash after the comparison carried out together, just repeated no more in the embodiment of the present application.
In a particular embodiment, the Part II of this firmware program, specifically can refer to operating system (the Operating System of electronic equipment, OS) part, and/or Basic Input or Output System (BIOS) (Basic InputOutput System, BIOS) part, etc.
If the Part II of described firmware program is described operating system part, then the Part II of described firmware program and the Part I of described firmware program can refer to different parts, or the Part I of the Part II of described firmware program and described firmware program can refer to that namely the Part II of described firmware program can be just described firmware program itself with a part.
Above-mentioned specifically with the first electronic equipment for mobile phone, the second electronic equipment is the description that PC carries out, and certainly, the first electronic equipment can also be specifically panel computer etc., has just repeated no more in this application.
Based on same inventive concept, the embodiment of the present application also provides a kind of electronic equipment, and this electronic equipment comprises firmware unit and storage unit, wherein, stores firmware program in firmware unit, and as shown in Figure 2, this electronic equipment also comprises:
Linkage unit 201, for connecting with the second electronic equipment.
First obtains unit 202, and for obtaining triggering command from the second electronic equipment, described triggering command is used to indicate and upgrades or optimize described firmware program;
Response unit 203, for responding described triggering command, restarts described first electronic equipment;
Loading unit 204, the central processing unit for described first electronic equipment loads the Part I of described firmware program, is in firmware program updating pattern to make described electronic equipment;
Second obtains unit 205, and for obtaining first password from described second electronic equipment, described first password is for characterizing the second facility information of described second electronic equipment of current connection;
3rd obtains unit 206, and for obtaining prescribed password, described prescribed password is for characterizing the facility information of the equipment of the legal binding of described first electronic equipment;
Comparing unit 207, for described first password and described prescribed password being compared, obtains the first comparison result;
Updating block 208, for when described first comparison result shows that described first password is consistent with described prescribed password, the second electronic equipment characterizing described current connection is the equipment of the legal binding of described first electronic equipment, now, upgrades or optimize the Part II of described firmware program.
Preferably, this electronic equipment also comprises: binding unit, for binding with at least one electronic equipment;
First obtains subelement, for obtaining at least one facility information for characterizing at least one electronic equipment described as described prescribed password, and is stored in the fixed area of described storage unit.
Preferably, this electronic equipment also comprises: temporary storage cell, for described first password being stored in the temporary realm of described storage unit.
Preferably, the 3rd acquiring unit 206 obtains described prescribed password specifically for the described fixed area from described storage unit.
Preferably, this electronic equipment also comprises: forbid updating block, for when described first comparison result shows described first password and described prescribed password is inconsistent, the second electronic equipment characterizing described current connection be described first electronic equipment illegally bind equipment time, now, the described Part II upgrading or optimize described firmware program is forbidden.
Preferably, this electronic equipment also comprises: detecting unit, for whether there being the data of renewal in storage directory corresponding on detection of handset SD card.
The electronic equipment introduced due to the present embodiment is for implementing the electronic equipment that in the embodiment of the present application, information processing method adopts, so based on information processing method in the embodiment of the present application, those skilled in the art can understand embodiment and its various version of electronic equipment in the embodiment of the present application, so introduce no longer in detail for this electronic equipment at this.As long as those skilled in the art implement the electronic equipment that information processing method in the embodiment of the present application adopts, all belong to the application for protection scope.
The one or more technical schemes provided in the embodiment of the present application, at least have following technique effect or advantage:
1, due to have employed the first electronic equipment obtain triggering command from the second electronic equipment time, respond this triggering command, thus be carried in the Part I of the first electronic equipment firmware program, first password is obtained from the second electronic equipment, prescribed password is obtained from the first electronic equipment, first password and prescribed password are compared, if after comparison, first password is consistent with prescribed password, so, just think that the second electronic equipment is the equipment of the legal binding of the first electronic equipment, now, the technical scheme of the Part II of renewal or optimization firmware program, so, efficiently solve in prior art, if disabled user obtains not one's own electronic equipment, when carrying out the compulsory brush machine of malice, security with regard to there is electronic equipment can not get the technical matters ensured, and then achieve the technique effect of the security that can ensure electronic equipment.
2, because the second electronic equipment that have employed from being connected with the first electronic equipment obtains first password, be stored in the temporary realm of this first electronic equipment storage unit, make when this first electronic equipment and this second electronic equipment disconnect, discharge this first password, and then the technique effect that the temporary realm of this storage unit can be made to re-use.
Those skilled in the art should understand, embodiments of the invention can be provided as method, system or computer program.Therefore, the present invention can adopt the form of complete hardware embodiment, completely software implementation or the embodiment in conjunction with software and hardware aspect.And the present invention can adopt in one or more form wherein including the upper computer program implemented of computer-usable storage medium (including but not limited to magnetic disk memory, CD-ROM, optical memory etc.) of computer usable program code.
The present invention describes with reference to according to the process flow diagram of the method for the embodiment of the present invention, equipment (system) and computer program and/or block scheme.Should understand can by the combination of the flow process in each flow process in computer program instructions realization flow figure and/or block scheme and/or square frame and process flow diagram and/or block scheme and/or square frame.These computer program instructions can being provided to the processor of multi-purpose computer, special purpose computer, Embedded Processor or other programmable data processing device to produce a machine, making the instruction performed by the processor of computing machine or other programmable data processing device produce device for realizing the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
These computer program instructions also can be stored in can in the computer-readable memory that works in a specific way of vectoring computer or other programmable data processing device, the instruction making to be stored in this computer-readable memory produces the manufacture comprising command device, and this command device realizes the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
These computer program instructions also can be loaded in computing machine or other programmable data processing device, make on computing machine or other programmable devices, to perform sequence of operations step to produce computer implemented process, thus the instruction performed on computing machine or other programmable devices is provided for the step realizing the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
Although describe the preferred embodiments of the present invention, those skilled in the art once obtain the basic creative concept of cicada, then can make other change and amendment to these embodiments.So claims are intended to be interpreted as comprising preferred embodiment and falling into all changes and the amendment of the scope of the invention.
Obviously, those skilled in the art can carry out various change and modification to the present invention and not depart from the spirit and scope of the present invention.Like this, if these amendments of the present invention and modification belong within the scope of the claims in the present invention and equivalent technologies thereof, then the present invention is also intended to comprise these change and modification.

Claims (13)

1. an information processing method, is applied to the first electronic equipment, and described first electronic equipment has firmware unit and storage unit; Store firmware program in described firmware unit, described method comprises:
Connect with the second electronic equipment;
Obtain triggering command from the second electronic equipment, described triggering command is used to indicate and upgrades or optimize described firmware program;
Respond described triggering command, restart described first electronic equipment;
The central processing unit of described first electronic equipment loads the Part I of described firmware program, is in firmware program updating pattern to make described first electronic equipment;
Obtain first password from described second electronic equipment, described first password is for characterizing the second facility information of described second electronic equipment of current connection;
Obtain prescribed password, described prescribed password is for characterizing the facility information of the equipment of the legal binding of described first electronic equipment;
Described first password and described prescribed password are compared, obtains the first comparison result;
When described first comparison result shows that described first password is consistent with described prescribed password, the second electronic equipment characterizing described current connection is the equipment of the legal binding of described first electronic equipment, now, upgrades or optimize the Part II of described firmware program.
2. the method for claim 1, is characterized in that, before described and described second electronic equipment connects, described method also comprises:
Bind with at least one electronic equipment;
Acquisition for characterizing at least one facility information of at least one electronic equipment described as described prescribed password, and is stored in the fixed area of described storage unit.
3. the method for claim 1, is characterized in that, described from after described second electronic equipment obtains first password, described method also comprises:
Described first password is stored in the temporary realm of described storage unit.
4. method as claimed in claim 2, it is characterized in that, described acquisition prescribed password, is specially:
Described prescribed password is obtained from the described fixed area of described storage unit.
5. the method for claim 1, is characterized in that, described first password and described prescribed password are compared described, after obtaining the first comparison result, described method also comprises:
When described first comparison result shows described first password and described prescribed password is inconsistent, the second electronic equipment characterizing described current connection be described first electronic equipment illegally bind equipment time, now, the described Part II upgrading or optimize described firmware program is forbidden.
6. the method for claim 1, is characterized in that, after by described first password and described prescribed password comparison, described method also comprises:
The data of renewal whether are had in storage directory corresponding on detection of handset SD card.
7. the method as described in claim as arbitrary in claim 1-6, is characterized in that, the described Part II of described firmware program is specially:
The operating system OS part of described first electronic equipment, and/or the basic input-output system BIOS part of described first electronic equipment.
8. an electronic equipment, comprises and has firmware unit and storage unit, and wherein, store firmware program in described firmware unit, described electronic equipment also comprises:
Linkage unit, for connecting with the second electronic equipment;
First obtains unit, and for obtaining triggering command from the second electronic equipment, described triggering command is used to indicate and upgrades or optimize described firmware program;
Response unit, for responding described triggering command, restarts described first electronic equipment;
Loading unit, the central processing unit for described first electronic equipment loads the Part I of described firmware program, is in firmware program updating pattern to make described electronic equipment;
Second obtains unit, and for obtaining first password from described second electronic equipment, described first password is for characterizing the second facility information of described second electronic equipment of current connection;
3rd obtains unit, and for obtaining prescribed password, described prescribed password is for characterizing the facility information of the equipment of the legal binding of described first electronic equipment;
Comparing unit, for described first password and described prescribed password being compared, obtains the first comparison result;
Updating block, for when described first comparison result shows that described first password is consistent with described prescribed password, the second electronic equipment characterizing described current connection is the equipment of the legal binding of described first electronic equipment, now, upgrades or optimize the Part II of described firmware program.
9. electronic equipment as claimed in claim 8, it is characterized in that, described electronic equipment also comprises:
Binding unit, for binding with at least one electronic equipment;
First obtains subelement, for obtaining at least one facility information for characterizing at least one electronic equipment described as described prescribed password, and is stored in the fixed area of described storage unit.
10. electronic equipment as claimed in claim 8, it is characterized in that, described electronic equipment also comprises:
Temporary storage cell, for being stored in the temporary realm of described storage unit by described first password.
11. electronic equipments as claimed in claim 8, is characterized in that, described 3rd acquiring unit obtains described prescribed password specifically for the described fixed area from described storage unit.
12. electronic equipments as claimed in claim 8, it is characterized in that, described electronic equipment also comprises:
Forbid updating block, for when described first comparison result shows described first password and described prescribed password is inconsistent, the second electronic equipment characterizing described current connection be described first electronic equipment illegally bind equipment time, now, the described Part II upgrading or optimize described firmware program is forbidden.
13. electronic equipments as claimed in claim 8, it is characterized in that, described electronic equipment also comprises:
Whether detecting unit, for there being the data of renewal in storage directory corresponding on detection of handset SD card.
CN201310447663.3A 2013-09-25 A kind of information processing method and a kind of electronic equipment Active CN104462948B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310447663.3A CN104462948B (en) 2013-09-25 A kind of information processing method and a kind of electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310447663.3A CN104462948B (en) 2013-09-25 A kind of information processing method and a kind of electronic equipment

Publications (2)

Publication Number Publication Date
CN104462948A true CN104462948A (en) 2015-03-25
CN104462948B CN104462948B (en) 2018-06-01

Family

ID=

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105049572A (en) * 2015-08-12 2015-11-11 深圳市财富之舟科技有限公司 Method for finding repair parameters of mobile phone
CN113348110A (en) * 2019-01-30 2021-09-03 日立安斯泰莫株式会社 Electronic control device and safety verification method for electronic control device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006038287A1 (en) * 2004-10-06 2006-04-13 Syncplus, Inc. Synchronizing system, and synchronizing program
CN101384063A (en) * 2008-09-24 2009-03-11 中兴通讯股份有限公司 Method and system for terminal equipment repairing and updating, system manufacturing method
CN102378155A (en) * 2011-11-29 2012-03-14 深圳芯智汇科技有限公司 System and method for remotely controlling mobile terminal
CN102857526A (en) * 2011-06-28 2013-01-02 希姆通信息技术(上海)有限公司 System and method for synchronizing mobile phone and computer
CN102981881A (en) * 2012-12-10 2013-03-20 中兴通讯股份有限公司 Method and system for preventing mobile terminal from being updated to illegal firmware version

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006038287A1 (en) * 2004-10-06 2006-04-13 Syncplus, Inc. Synchronizing system, and synchronizing program
CN101384063A (en) * 2008-09-24 2009-03-11 中兴通讯股份有限公司 Method and system for terminal equipment repairing and updating, system manufacturing method
CN102857526A (en) * 2011-06-28 2013-01-02 希姆通信息技术(上海)有限公司 System and method for synchronizing mobile phone and computer
CN102378155A (en) * 2011-11-29 2012-03-14 深圳芯智汇科技有限公司 System and method for remotely controlling mobile terminal
CN102981881A (en) * 2012-12-10 2013-03-20 中兴通讯股份有限公司 Method and system for preventing mobile terminal from being updated to illegal firmware version

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105049572A (en) * 2015-08-12 2015-11-11 深圳市财富之舟科技有限公司 Method for finding repair parameters of mobile phone
CN105049572B (en) * 2015-08-12 2018-05-04 深圳市财富之舟科技有限公司 A kind of mobile phone reprocesses parameter lookup method
CN113348110A (en) * 2019-01-30 2021-09-03 日立安斯泰莫株式会社 Electronic control device and safety verification method for electronic control device
CN113348110B (en) * 2019-01-30 2024-03-22 日立安斯泰莫株式会社 Electronic control device and security verification method for electronic control device

Similar Documents

Publication Publication Date Title
CN102736978B (en) A kind of method and device detecting the installment state of application program
US11221838B2 (en) Hot update method, operating system, terminal device, system, and computer-readable storage medium for a system process
CN102236764B (en) Method and monitoring system for Android system to defend against desktop information attack
CN108763951B (en) Data protection method and device
CN103176824A (en) System upgrade method and system upgrade device
CN105335181A (en) OTA upgrade realization method and terminal
CN102340398A (en) Security policy setting and determining method, and method and device for executing operation by application program
CN105528225A (en) Application loading method and loading apparatus
CN110225078B (en) Application service updating method, system and terminal equipment
CN105637521A (en) Data processing method and intelligent terminal
CN103645918A (en) Software upgrading method and device for industrial endoscope
CN106155753A (en) A kind of application program installation method, device and terminal
CN103049708A (en) Audit configuration method and audit configuration system for database
CN103885802A (en) Driver installation method and device and client
CN106843947A (en) The treating method and apparatus of aacode defect
CN105677409A (en) System upgrading method and device
CN103455750B (en) The high peace verification method of a kind of embedded device and device
CN105718788A (en) Malicious application processing method and apparatus, and terminal
CN112925653B (en) Virtualization cluster expansion method, related equipment and computer readable storage medium
CN113032183A (en) System management method, device, computer equipment and storage medium
CN108595292B (en) System optimization method, mobile terminal and computer storage medium
CN116700768B (en) Application processing method and related device
CN107977313B (en) Debugging interface calling method and device
CN100374969C (en) Method for searching and killing virus and computer therefor
CN103365674A (en) Plug-in management method, device and system based on mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant