CN110175040A - Data processing method, OTA client, electronic equipment and storage medium - Google Patents

Data processing method, OTA client, electronic equipment and storage medium Download PDF

Info

Publication number
CN110175040A
CN110175040A CN201910392785.4A CN201910392785A CN110175040A CN 110175040 A CN110175040 A CN 110175040A CN 201910392785 A CN201910392785 A CN 201910392785A CN 110175040 A CN110175040 A CN 110175040A
Authority
CN
China
Prior art keywords
fingerprint
algorithm
trusted storage
spatial
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910392785.4A
Other languages
Chinese (zh)
Other versions
CN110175040B (en
Inventor
鲍成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Silead Inc
Original Assignee
Silead Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Silead Inc filed Critical Silead Inc
Priority to CN201910392785.4A priority Critical patent/CN110175040B/en
Publication of CN110175040A publication Critical patent/CN110175040A/en
Application granted granted Critical
Publication of CN110175040B publication Critical patent/CN110175040B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

This specification embodiment provides a kind of data processing method, OTA client, electronic equipment and storage medium.The data processing method includes: that OTA client receives the algorithm upgrade request that OTA server-side is initiated;The first fingerprint algorithm is carried in algorithm upgrade request;OTA client confirms whether the first fingerprint algorithm is compatible with existing one or more second fingerprint algorithms;In incompatible second fingerprint algorithm of the first fingerprint algorithm, OTA client determines a trusted storage space for sky according to spatial strategy table from specified trusted storage spatial aggregation;Include the one-to-one relationship between fingerprint algorithm and trusted storage space in spatial strategy table;The deposit of first fingerprint algorithm is empty trusted storage space by OTA client;OTA client returns to updating result to OTA server-side.The OTA that this specification embodiment can release fingerprint algorithm upgrades the limitation to fingerprint algorithm new and old edition compatibility.

Description

Data processing method, OTA client, electronic equipment and storage medium
Technical field
This specification is related to fingerprint identification technology field, more particularly, to a kind of data processing method, OTA client, electricity Sub- equipment and storage medium.
Background technique
It is wireless that over the air (Over-the-Air, abbreviation OTA) refers to that electronic equipment (such as mobile terminal) passes through Network downloads the upgrade package on remote server, to the technology that system or application are upgraded, by the working procedure in hardware Or source code improves, it is made to obtain compatibility, performance or raising functionally.
For the fingerprint recognition system of electronic equipment, after OTA upgrading, it shall be guaranteed that version and old version after upgrading This holding compatibility, already present finger print data are still normal (such as: the fingerprint of typing still has, and can be with normal release).
During realizing the application, the inventor of the present application discovered that: when OTA upgrades fingerprint algorithm every time, need and Version before keeps compatibility, such as when fingerprint algorithm is upgraded to algorithm B from algorithm A, it is necessary to keep B can be with Compatible A, i.e. A is a subset of B, and the fingerprint function after being just able to maintain OTA upgrading in this way is normal, this will give fingerprint algorithm band Limit to, limits the efficiency of fingerprint algorithm.Moreover, if algorithm A is not the subset of algorithm B, in OTA After upgrading, old fingerprint template data will cannot use that (fingerprint of typing i.e. before customer upgrade unlocks result not after upgrading Know).Once this occurs, fingerprint template data that generally can only be old in OTA Force Deletion during upgrading, will so destroy The data of user can bring puzzlement to user.
Summary of the invention
This specification embodiment is designed to provide a kind of data processing method, OTA client, electronic equipment and storage Medium, to release limitation of the OTA upgrading of fingerprint algorithm to fingerprint algorithm new and old edition compatibility.
In order to achieve the above objectives, on the one hand, this specification embodiment provides a kind of data processing method, comprising:
OTA client receives the algorithm upgrade request that OTA server-side is initiated;First is carried in the algorithm upgrade request to refer to Line algorithm;
The OTA client confirms whether first fingerprint algorithm is compatible with existing one or more second fingerprints and calculates Method;
In incompatible second fingerprint algorithm of first fingerprint algorithm, the OTA client is according to spatial strategy Table determines a trusted storage space for sky from specified trusted storage spatial aggregation;Comprising referring in the spatial strategy table One-to-one relationship between line algorithm and trusted storage space;
The OTA client is described for empty trusted storage space by first fingerprint algorithm deposit;
The OTA client returns to updating result to the OTA server-side.
On the other hand, this specification embodiment additionally provides a kind of OTA client, and the OTA client includes client Using and trusted application, the trusted application include:
Upgrade request receiving module, for receiving the algorithm upgrade request of OTA server-side initiation;The algorithm upgrade request The first fingerprint algorithm of middle carrying;
Algorithm is compatible with judgment module, for confirming whether first fingerprint algorithm is compatible with existing one or more second Fingerprint algorithm;
Memory space determining module is used in incompatible second fingerprint algorithm of first fingerprint algorithm, according to Spatial strategy table determines a trusted storage space for sky from specified trusted storage spatial aggregation;The spatial strategy table In include one-to-one relationship between fingerprint algorithm and trusted storage space;
Fingerprint algorithm preserving module, for first fingerprint algorithm deposit is described for empty trusted storage space;
Updating result return module, for returning to updating result to the OTA server-side.
On the other hand, this specification embodiment additionally provides a kind of electronic equipment, and the electronic equipment is configured with OTA client End, the OTA client includes client application and trusted application, and the trusted application includes:
Upgrade request receiving module, for receiving the algorithm upgrade request of OTA server-side initiation;The algorithm upgrade request The first fingerprint algorithm of middle carrying;
Algorithm is compatible with judgment module, for confirming whether first fingerprint algorithm is compatible with existing one or more second Fingerprint algorithm;
Memory space determining module is used in incompatible second fingerprint algorithm of first fingerprint algorithm, according to Spatial strategy table determines a trusted storage space for sky from specified trusted storage spatial aggregation;The spatial strategy table In include one-to-one relationship between fingerprint algorithm and trusted storage space;
Fingerprint algorithm preserving module, for first fingerprint algorithm deposit is described for empty trusted storage space;
Updating result return module, for returning to updating result to the OTA server-side.
On the other hand, this specification embodiment additionally provides a kind of computer storage medium, is stored thereon with computer journey Sequence, the computer program perform the steps of when being executed by processor
Receive the algorithm upgrade request that OTA server-side is initiated;The first fingerprint algorithm is carried in the algorithm upgrade request;
Confirm whether first fingerprint algorithm is compatible with existing one or more second fingerprint algorithms;
In incompatible second fingerprint algorithm of first fingerprint algorithm, according to spatial strategy table from specified credible A trusted storage space for sky is determined in memory space set;It is deposited comprising fingerprint algorithm with credible in the spatial strategy table Store up the one-to-one relationship between space;
First fingerprint algorithm deposit is described for empty trusted storage space;
Updating result is returned to the OTA server-side.
On the other hand, this specification embodiment additionally provides another data processing method, comprising:
OTA client receives Client-initiated fingerprint typing request;Finger print data is carried in the fingerprint typing request;
The OTA client determining one can for empty from specified trusted storage spatial aggregation according to spatial strategy table Believe memory space;Include the one-to-one relationship between fingerprint algorithm and trusted storage space in the spatial strategy table;
It is empty trusted storage space that the OTA client is described as fingerprint template deposit using the finger print data, and Fingerprint algorithm is distributed for the fingerprint template;
The OTA client returns to fingerprint input result to the user.
On the other hand, this specification embodiment additionally provides another OTA client, and the OTA client includes client End application and trusted application, the trusted application include:
Typing request receiving module, for receiving Client-initiated fingerprint typing request;It is taken in the fingerprint typing request Band finger print data;
Memory space determining module, for determining one from specified trusted storage spatial aggregation according to spatial strategy table For empty trusted storage space;It is closed in the spatial strategy table comprising the one-to-one correspondence between fingerprint algorithm and trusted storage space System;
Fingerprint template recording module, for described for empty trusted storage using the finger print data as fingerprint template deposit Space, and fingerprint algorithm is distributed for the fingerprint template;
Input result return module, for returning to fingerprint input result to the user.
On the other hand, this specification embodiment additionally provides another electronic equipment, and the electronic equipment is configured with OTA visitor Family end, the OTA client include client application and trusted application, and the trusted application includes:
Typing request receiving module, for receiving Client-initiated fingerprint typing request;It is taken in the fingerprint typing request Band finger print data;
Memory space determining module, for determining one from specified trusted storage spatial aggregation according to spatial strategy table For empty trusted storage space;It is closed in the spatial strategy table comprising the one-to-one correspondence between fingerprint algorithm and trusted storage space System;
Fingerprint template recording module, for described for empty trusted storage using the finger print data as fingerprint template deposit Space, and fingerprint algorithm is distributed for the fingerprint template;
Input result return module, for returning to fingerprint input result to the user.
On the other hand, this specification embodiment additionally provides another computer storage medium, is stored thereon with computer Program, the computer program perform the steps of when being executed by processor
Receive Client-initiated fingerprint typing request;Finger print data is carried in the fingerprint typing request;
A trusted storage space for sky is determined from specified trusted storage spatial aggregation according to spatial strategy table;Institute It states in spatial strategy table comprising the one-to-one relationship between fingerprint algorithm and trusted storage space;
It using the finger print data as the fingerprint template deposit trusted storage space for sky, and is the fingerprint template Distribute fingerprint algorithm;
Fingerprint input result is returned to the user.
On the other hand, this specification embodiment additionally provides another data processing method, comprising:
OTA client receives the request of Client-initiated fingerprint recognition;Finger print data is carried in the fingerprint recognition request;
The OTA client determines the trusted storage space of non-empty in trusted storage spatial aggregation according to spatial strategy table; Include the one-to-one relationship between fingerprint algorithm and trusted storage space in the spatial strategy table;
The OTA client is according to the fingerprint algorithm and fingerprint template in the trusted storage space of the non-empty, to described Finger print data carries out fingerprint recognition;
The OTA client returns to fingerprint recognition result to the user.
On the other hand, this specification embodiment additionally provides another OTA client, and the OTA client includes client End application and trusted application, the trusted application include:
Request receiving module is identified, for receiving the request of Client-initiated fingerprint recognition;It is taken in the fingerprint recognition request Band finger print data;
Memory space determining module, for determining that the credible of non-empty is deposited in trusted storage spatial aggregation according to spatial strategy table Store up space;Include the one-to-one relationship between fingerprint algorithm and trusted storage space in the spatial strategy table;
Finger print data identification module, for the fingerprint algorithm and fingerprint mould in the trusted storage space according to the non-empty Plate carries out fingerprint recognition to the finger print data;
Recognition result return module, for returning to fingerprint recognition result to the user.
On the other hand, this specification embodiment additionally provides another electronic equipment, and the electronic equipment is configured with OTA visitor Family end, the OTA client include client application and trusted application, and the trusted application includes:
Request receiving module is identified, for receiving the request of Client-initiated fingerprint recognition;It is taken in the fingerprint recognition request Band finger print data;
Memory space determining module, for determining that the credible of non-empty is deposited in trusted storage spatial aggregation according to spatial strategy table Store up space;Include the one-to-one relationship between fingerprint algorithm and trusted storage space in the spatial strategy table;
Finger print data identification module, for the fingerprint algorithm and fingerprint mould in the trusted storage space according to the non-empty Plate carries out fingerprint recognition to the finger print data;
Recognition result return module, for returning to fingerprint recognition result to the user.
On the other hand, this specification embodiment additionally provides another computer storage medium, is stored thereon with computer Program, the computer program perform the steps of when being executed by processor
Receive the request of Client-initiated fingerprint recognition;Finger print data is carried in the fingerprint recognition request;
The trusted storage space of non-empty in trusted storage spatial aggregation is determined according to spatial strategy table;The spatial strategy table In include one-to-one relationship between fingerprint algorithm and trusted storage space;
According to the fingerprint algorithm and fingerprint template in the trusted storage space of the non-empty, the finger print data is referred to Line identification;
Fingerprint recognition result is returned to the user.
The technical solution provided by above this specification embodiment is as it can be seen that being based on this specification embodiment, in each OTA liter It, can be according to spatial strategy if the fingerprint algorithm of the incompatible legacy version of fingerprint algorithm of OTA client discovery new version when grade It is empty trusted storage space that table, which is fingerprint algorithm selected one of new version, to ensure that incompatible fingerprint algorithm can To be distributed in different trusted storage spaces, so that subsequent can be according to the fingerprint algorithm stored in these trusted storage spaces And fingerprint template carries out the identification of fingerprint line.To relieve the OTA upgrading of fingerprint algorithm to fingerprint algorithm new and old edition compatibility Limitation can normal OTA upgrading so that no matter whether the new and old of fingerprint algorithm is compatible with.So as to avoid existing skill Art because new and old edition is incompatible, caused by fingerprint recognition result it is unknown or destroy user fingerprint template data the problems such as.
Detailed description of the invention
In order to illustrate more clearly of this specification embodiment or technical solution in the prior art, below will to embodiment or Attached drawing needed to be used in the description of the prior art is briefly described, it should be apparent that, the accompanying drawings in the following description is only The some embodiments recorded in this specification, for those of ordinary skill in the art, in not making the creative labor property Under the premise of, it is also possible to obtain other drawings based on these drawings.In the accompanying drawings:
Fig. 1 is the structural block diagram of electronic equipment in some embodiments of this specification;
Fig. 2 is that the corresponding trusted storage space of trusted application is divided into multiple independent parts in some embodiments of this specification The schematic diagram divided;
Fig. 3 is that space Policy Table is located at the schematic diagram in client application in some embodiments of this specification;
Fig. 4 is that space Policy Table is located at the schematic diagram in trusted application in some embodiments of this specification;
Fig. 5 is the schematic diagram of space Policy Table in some embodiments of this specification;
Fig. 6 is the schematic diagram of space Policy Table in other embodiments of this specification;
Fig. 7 is the schematic diagram of space Policy Table in other embodiments of this specification;
Fig. 8 is the method flow of data processing method in some embodiments of this specification (fingerprint algorithm upgrades under scene) Figure;
Fig. 9 is the method flow diagram of data processing method (under fingerprint typing scene) in some embodiments of this specification;
Figure 10 is the method flow diagram of data processing method (under fingerprint recognition scene) in some embodiments of this specification;
Figure 11 is the structural block diagram of trusted application in some embodiments of this specification;
Figure 12 is the structural block diagram of trusted application in other embodiments of this specification;
Figure 13 is the structural block diagram of trusted application in other embodiments of this specification.
Specific embodiment
In order to make those skilled in the art more fully understand the technical solution in this specification, below in conjunction with this explanation Attached drawing in book embodiment is clearly and completely described the technical solution in this specification embodiment, it is clear that described Embodiment be only this specification a part of the embodiment, instead of all the embodiments.The embodiment of base in this manual, Every other embodiment obtained by those of ordinary skill in the art without making creative efforts, all should belong to The range of this specification protection.
The electronic equipment of this specification embodiment is the terminal device based on ARM TrustZone technology.Therefore, in this theory In the electronic equipment of bright book embodiment, there are two independent performing environments, i.e., credible performing environment (Trust Execution Environment, abbreviation TEE) and common performing environment (Rich Execution Environment, abbreviation REE).TEE and REE has oneself operating system (OS) and user application, and can be led to by safe Monitor between TEE and REE Letter.Generally, the application program operated in TEE environment is known as trusted application (Trust Application, abbreviation TA), fortune Application program of the row in REE environment is known as client application (Client Application, abbreviation CA).Wherein, CA can be with Call TA, TA that can get request and the required parameter of CA from shared drive, TA executes processing under TEE environment, obtains To processing result also can be written into shared drive, CA can get processing result by shared drive.CA and TA can To form the OTA client being configured in the electronic equipment of this specification embodiment, such as shown in Fig. 1.
In some embodiments of this specification, the electronic equipment can be desktop computer, tablet computer, notebook electricity Brain, smart phone, digital assistants, intelligent wearable device etc..Wherein, intelligent wearable device may include Intelligent bracelet, intelligence Energy wrist-watch, intelligent glasses, intelligent helmet etc..
In order to release limitation of the OTA upgrading of fingerprint algorithm to fingerprint algorithm new and old edition compatibility.Present invention People has found after study, and it is (or dedicated in TA that the dedicated secure memory space of TA can be divided into multiple trusted storage spaces Secure memory space in the multiple trusted storage spaces of creation, such as shown in Fig. 2.Each space can be used for storing incompatible Fingerprint algorithm version (such as algorithm A in Fig. 2, algorithm B, algorithm C, algorithm D and Shown in algorithm E) and its corresponding one or more fingerprint templates (such as in Fig. 2 in each trusted storage space Shown in template).It, can also be with and when inherently one group of the dedicated secure memory space of TA or multiple secure memory spaces By these secure memory spaces to should be used as having defaulted ready-portioned multiple trusted storage spaces.For theoretically, TA can be based on Dedicated secure memory space forms any amount trusted storage space.The finger print data for considering that user can actually input has Limit, can generally define the quantity in trusted storage space on demand.Such as in one exemplary embodiment, the dedicated peace of TA can be based on Full memory space forms five trusted storage spaces.
Meanwhile OTA client can also define and safeguard a spatial strategy table, may include finger in the spatial strategy table One-to-one relationship between line algorithm and trusted storage space, such as shown in Fig. 5.
In this way, in each OTA upgrading, if the fingerprint algorithm of the incompatible legacy version of fingerprint algorithm of discovery new version, It is fingerprint algorithm selected one of new version can be that empty trusted storage space (here " can for empty according to spatial strategy table Letter memory space " refers to that the current state in trusted storage space is sky, i.e., current not stored any fingerprint algorithm and fingerprint template Trusted storage space), to ensure that incompatible fingerprint algorithm can be distributed in different trusted storage spaces so that It is subsequent the identification of fingerprint line to be carried out according to the fingerprint algorithm and fingerprint template stored in these trusted storage spaces.To release The OTA of fingerprint algorithm upgrades the limitation to fingerprint algorithm new and old edition compatibility so that no matter fingerprint algorithm it is new and old Whether it is compatible with, it can normal OTA upgrading.So as to avoid the prior art because new and old edition is incompatible, caused by fingerprint know The problems such as other result is unknown or destroys the fingerprint template data of user.
Spatial strategy table in this specification embodiment can according to being placed in any suitable position, this specification to this not It is restricted.Such as in some embodiments of this specification, as shown in figure 3, spatial strategy table can be located at the side CA and is responsible for by CA It safeguards (specifically how to safeguard will be described hereinafter).And in other embodiments of this specification, as shown in figure 4, space plan Sketch form can also be located at the side TA and is responsible for safeguarding (specifically how to safeguard will be described hereinafter) by TA.
In conjunction with shown in Figure 11, in some embodiments of this specification, for convenience of fingerprint algorithm upgrading, above-mentioned OTA server-side TA may include upgrade request receiving module 111, algorithm compatible judgment module 112, memory space determining module 113, fingerprint Algorithm preserving module 114 and updating result return module 115.Wherein:
Upgrade request receiving module 111 can be used for receiving the algorithm upgrade request of OTA server-side initiation;The algorithm The first fingerprint algorithm can be carried in upgrade request.Wherein, upgrade request receiving module 111 can receive OTA server-side by CA The algorithm upgrade request of initiation.Since CA can receive the algorithm upgrade request of OTA server-side initiation, and can be written into altogether It enjoys in memory;It is asked correspondingly, upgrade request receiving module 111 can read the algorithm upgrading from the shared drive It asks.
Algorithm be compatible with judgment module 112, can be used to confirm that first fingerprint algorithm whether be compatible with existing one or Multiple second fingerprint algorithms.
Memory space determining module 113 can be used in incompatible second fingerprint algorithm of first fingerprint algorithm When, a trusted storage space for sky is determined from specified trusted storage spatial aggregation according to spatial strategy table;The sky Between include the one-to-one relationship between fingerprint algorithm and trusted storage space in Policy Table.
Fingerprint algorithm preserving module 114 can be used for for first fingerprint algorithm being stored in described for empty trusted storage Space.
Updating result return module 115 can be used for returning to updating result to the OTA server-side.Wherein, updating result Return module 115 can return to updating result to the OTA server-side by CA.Since updating result return module 115 can be with Updating result is written in shared drive;Correspondingly, CA can read updating result from the shared drive, and to described OTA server-side returns to the updating result.
In conjunction with shown in Figure 12, in some embodiments of this specification, for convenience of finger print data typing, above-mentioned TA may include Typing request receiving module 121, memory space determining module 122, fingerprint template recording module 123 and input result return module 124.Wherein:
Typing request receiving module 121 can be used for receiving Client-initiated fingerprint typing request;The fingerprint typing is asked Seek middle carrying finger print data.Wherein, typing request receiving module 121 can receive the typing of Client-initiated fingerprint by CA and ask It asks.Since CA can receive Client-initiated fingerprint typing request, and it is written into shared drive;Correspondingly, typing is requested Receiving module 121 can read the fingerprint typing request from the shared drive.
Memory space determining module 122 can be used for according to spatial strategy table from specified trusted storage spatial aggregation Determine a trusted storage space for sky;Include one between fingerprint algorithm and trusted storage space in the spatial strategy table One corresponding relationship.
Fingerprint template recording module 123 can be used for described using the finger print data as fingerprint template deposit being empty Trusted storage space, and fingerprint algorithm is distributed for the fingerprint template.
Input result return module 124 can be used for returning to fingerprint input result to the user.Wherein, input result Return module 124 can return to updating result to the user by CA.Since input result return module 124 can be by fingerprint Input result is written in shared drive;Correspondingly, CA can read fingerprint input result from the shared drive, and to institute It states user and returns to the fingerprint input result.
In conjunction with shown in Figure 13, in some embodiments of this specification, for convenience of fingerprint recognition, above-mentioned TA may include identification Request receiving module 131, memory space determining module 132, finger print data identification module 133 and record recognition result return module 134.Wherein:
It identifies request receiving module 131, can be used for receiving the request of Client-initiated fingerprint recognition;The fingerprint recognition is asked Seek middle carrying finger print data.Wherein, identification request receiving module 131 can receive Client-initiated fingerprint recognition by CA and ask It asks, i.e. CA can receive the request of Client-initiated fingerprint recognition, and be written into shared drive;Correspondingly, identification request connects The fingerprint recognition request can be read from the shared drive by receiving module 131.
Memory space determining module 132 can be used for determining non-empty in trusted storage spatial aggregation according to spatial strategy table Trusted storage space;Include the one-to-one relationship between fingerprint algorithm and trusted storage space in the spatial strategy table.
Finger print data identification module 133, can be used for fingerprint algorithm in the trusted storage space according to the non-empty and Fingerprint template carries out fingerprint recognition to the finger print data.
Recognition result return module 134 can be used for returning to fingerprint recognition result to the CA.Wherein, recognition result returns Fingerprint recognition result can be returned to the user by CA by returning module 134.Since recognition result return module 134 can will refer to Line recognition result is written in shared drive;Correspondingly, CA can read fingerprint recognition from the shared drive as a result, and to The user returns to the fingerprint recognition result.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this The function of each unit can be realized in the same or multiple software and or hardware when specification.
As shown in connection with fig. 8, in the case where fingerprint algorithm upgrades scene, the data processing method in some embodiments of this specification can To include the following steps:
S81, the algorithm upgrade request that OTA server-side is initiated is received;The calculation of the first fingerprint is carried in the algorithm upgrade request Method.
In this specification embodiment, the CA of OTA client is in the algorithm upgrade request for receiving the initiation of OTA server-side When, upgrade package remotely first can be descended from server end based on OTA technology, it, can after based on upgrade package formation algorithm upgrade request To be written into shared drive, for TA use.Wherein, upgrade package refers to the fingerprint algorithm of new version, that is, refers to this specification First fingerprint algorithm of embodiment.
Whether S82, confirmation first fingerprint algorithm are compatible with existing one or more second fingerprint algorithms.If described Incompatible second fingerprint algorithm of first fingerprint algorithm, thens follow the steps S83 and its subsequent step;Otherwise, step is executed S83b and its subsequent step.
In some embodiments of this specification, it can be based on any suitable existing version compatibility recognition methods, to sentence Whether disconnected first fingerprint algorithm and the second fingerprint algorithm are compatible with, this specification to this with no restriction.
S83a, in incompatible second fingerprint algorithm of first fingerprint algorithm, according to spatial strategy table from specified Trusted storage spatial aggregation in determine one for empty trusted storage space.
In the present specification, specified trusted storage spatial aggregation is the corresponding multiple trusted storage space institutes of above-mentioned TA The trusted storage spatial aggregation of composition.
If spatial strategy epitope is in the side CA and in the case where by CA being responsible for maintenance in some embodiments of this specification, institute Space identification can be carried by stating in algorithm upgrade request;The space identification is the CA from the spatial strategy table, selection A space identification for empty trusted storage space.For example, by traversal spatial strategy table, CA can know trusted storage The storage state in each trusted storage space in spatial aggregation may thereby determine that the storage shape in which current trusted storage space State is sky, and then can select a trusted storage space from the trusted storage space that these storage states are empty, to be used for Storage and the first incompatible fingerprint algorithm of the second fingerprint algorithm.Correspondingly, TA can take according in the algorithm upgrade request The space identification of band determines corresponding trusted storage space from the trusted storage spatial aggregation.
If spatial strategy epitope is in the side TA and in the case where by TA being responsible for maintenance in some embodiments of this specification, TA A corresponding space identification in trusted storage space for sky can be selected from the spatial strategy table, and is marked according to the space Know and determines corresponding trusted storage space from the trusted storage spatial aggregation.
S83b, in compatible second fingerprint algorithm of first fingerprint algorithm, by the second compatible fingerprint algorithm In corresponding trusted storage space, first fingerprint algorithm is replaced with by the second compatible fingerprint algorithm by described, and jump Execute step S85.
It S84, will be empty trusted storage space described in first fingerprint algorithm deposit.
In some embodiments of this specification, if spatial strategy epitope in the side TA and is responsible for maintenance by TA, will be described After the deposit of first fingerprint algorithm is empty trusted storage space, TA can also be by the corresponding fingerprint algorithm mark of the first fingerprint algorithm Knowledge is updated in spatial strategy table.I.e. in spatial strategy table, the corresponding fingerprint algorithm of the first fingerprint algorithm is identified, write-in with This is in the empty corresponding fingerprint algorithm identification field in trusted storage space, such as in Fig. 5, fingerprint algorithm mark A be written into In the corresponding fingerprint algorithm identification field of space a.
S85, Xiang Suoshu OTA server-side return to updating result.
It is stated that TA executes processing under TEE environment in step S81, obtained processing result can be filled into altogether It enjoys in memory, so that CA can get processing result by reading shared drive, and can be to the OTA server-side Return to updating result.
In some embodiments of this specification, if spatial strategy epitope is responsible for maintenance, and fingerprint algorithm in the side CA and by CA Algorithm mark distributed unitedly by CA in the case where, when updating result is to upgrade successfully, in the CA of the OTA client after upgrading The corresponding fingerprint algorithm mark of the first fingerprint algorithm can be carried.So that CA can be in spatial strategy table, it can be by The corresponding fingerprint algorithm mark write-in of one fingerprint algorithm with should be the corresponding fingerprint algorithm identification field in trusted storage space of sky In.
In some embodiments of this specification, if spatial strategy epitope is responsible for maintenance, and fingerprint algorithm in the side TA and by TA Algorithm mark distributed unitedly by TA in the case where, when updating result is to upgrade successfully, in the TA of the OTA client after upgrading The corresponding fingerprint algorithm mark of the first fingerprint algorithm can be carried.So that TA can refer in spatial strategy table by first Line algorithm corresponding fingerprint algorithm mark, write-in with should be in the corresponding fingerprint algorithm identification field in trusted storage space of sky.
It can be seen that the OTA due to relieving fingerprint algorithm upgrades new and old to fingerprint algorithm in this specification embodiment The limitation of version compatibility is used so that incompatible fingerprint algorithm can also carry out normal OTA upgrading so as to avoid destroying The already existing finger print data in family avoids the unknown risk of fingerprint recognition result, and avoids returning factory or return brush machine after sale, saves Cost.Moreover, because the OTA for relieving fingerprint algorithm upgrades the limitation to fingerprint algorithm new and old edition compatibility, researching and developing Without considering the problems of version compatibility when the fingerprint algorithm of new version, to reduce development difficulty, research and development fingerprint is improved The benefit of algorithm.
As shown in connection with fig. 9, under fingerprint typing scene, the data processing method in some embodiments of this specification be can wrap Include following steps:
S91, Client-initiated fingerprint typing request is received;Finger print data is carried in the fingerprint typing request.
In some embodiments of this specification, CA can receive Client-initiated fingerprint typing request, and will carry fingerprint In the fingerprint typing request write-in shared drive of data.Correspondingly, TA can obtain Client-initiated by reading shared drive Fingerprint typing request.
S92, determine that a trusted storage for sky is empty from specified trusted storage spatial aggregation according to spatial strategy table Between;Include the one-to-one relationship between fingerprint algorithm and trusted storage space in the spatial strategy table.
If spatial strategy epitope is in the side CA and in the case where by CA being responsible for maintenance in some embodiments of this specification, institute Space identification can also be carried by stating in fingerprint typing request;The space identification be the CA according to the spatial strategy table from finger In fixed trusted storage spatial aggregation, the space identification in the trusted storage space for sky selected.Correspondingly, TA can root According to the space identification carried in fingerprint typing request, corresponding trusted storage is determined from the trusted storage spatial aggregation Space.
If spatial strategy epitope is in the side TA and in the case where by TA being responsible for maintenance in some embodiments of this specification, TA A corresponding space identification in trusted storage space for sky can be selected from the spatial strategy table, and is marked according to the space Know and determines corresponding trusted storage space from the trusted storage spatial aggregation.
S93, it is the trusted storage space of sky for the finger print data is described as fingerprint template deposit, and is the fingerprint Template distributes fingerprint algorithm.
It can also include the deposit time stamp of fingerprint algorithm, example in some embodiments of this specification, in spatial strategy table As shown in Figure 6.In this way, can preferentially select newest deposit according to deposit time stamp when distributing fingerprint algorithm for the fingerprint template The fingerprint algorithm entered distributes to the fingerprint template.Since technology improves constantly, newer fingerprint algorithm, performance is general Also better, therefore, by preferentially selecting access time newest fingerprint algorithm to distribute to the fingerprint template, it can be conducive to mention The accuracy and safety of high fingerprint recognition.
It can also include custom field, such as Fig. 7 institute in spatial strategy table in other embodiments of this specification Show.By custom field convenience can be provided for subsequent expansion.
If spatial strategy epitope is in the side TA and in the case where by TA being responsible for maintenance in some embodiments of this specification, Using the finger print data as the fingerprint template deposit trusted storage space for sky, and fingerprint is distributed for the fingerprint template After algorithm, the fingerprint algorithm of the fingerprint algorithm can be identified write-in into the spatial strategy table by TA.
S94, Xiang Suoshu CA return to fingerprint input result.
In some embodiments of this specification, shared drive can be written in fingerprint input result by TA.Correspondingly, CA can be with Fingerprint input result is read from shared drive, and is returned to the user, so that the user can be known accordingly Whether fingerprint typing succeeds.
If spatial strategy epitope is in the side CA and in the case where by CA being responsible for maintenance in some embodiments of this specification, When fingerprint input result is typing success, the fingerprint algorithm of the promising fingerprint template distribution can be carried in the input result Mark, in order to which fingerprint algorithm mark is written into the spatial strategy table CA.
In conjunction with Figure 10, under fingerprint recognition scene, the data processing method in some embodiments of this specification may include Following steps:
S101, the request of Client-initiated fingerprint recognition is received;Finger print data is carried in the fingerprint recognition request.
In some embodiments of this specification, CA can receive the request of Client-initiated fingerprint recognition, and will carry fingerprint In the fingerprint recognition request write-in shared drive of data.Correspondingly, TA can obtain Client-initiated by reading shared drive Fingerprint recognition request.
S102 determines the trusted storage space of non-empty in trusted storage spatial aggregation according to spatial strategy table;The space plan Include the one-to-one relationship between fingerprint algorithm and trusted storage space in sketch form.
In some embodiments of this specification, by traversing spatial strategy table, TA can know trusted storage spatial aggregation In each trusted storage space storage state, may thereby determine that the storage state in which current trusted storage space is non-empty (being stored with fingerprint algorithm and fingerprint template in i.e. credible memory space).
S103 according to the fingerprint algorithm and fingerprint template in the trusted storage space of the non-empty, to the finger print data into Row fingerprint recognition.
The fingerprint algorithm in trusted storage space in some embodiments of this specification, by utilizing the non-empty one by one And fingerprint template, fingerprint recognition is carried out to the finger print data, the recognition result of the finger print data can be obtained.
S104, Xiang Suoshu CA return to fingerprint recognition result.
In some embodiments of this specification, shared drive can be written in fingerprint recognition result by TA.Correspondingly, CA can be with From shared drive read fingerprint recognition as a result, and be returned to the user so that the user can be known accordingly Whether fingerprint recognition succeeds.
Although procedures described above process includes the multiple operations occurred with particular order, it should however be appreciated that understand, These processes may include more or fewer operations, these operations can be executed sequentially or be executed parallel (such as using parallel Processor or multi-thread environment).
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability Include, so that process, method or equipment including a series of elements not only include those elements, but also including not having There is the other element being expressly recited, or further includes for this process, method or the intrinsic element of equipment.Do not having more In the case where more limitations, the element that is limited by sentence "including a ...", it is not excluded that including process, the side of the element There is also other identical elements in method or equipment.
It will be understood by those skilled in the art that the embodiment of this specification can provide as the production of method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or implementation combining software and hardware aspects can be used in this specification The form of example.Moreover, it wherein includes the computer of computer usable program code that this specification, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
This specification can describe in the general context of computer-executable instructions executed by a computer, such as journey Sequence module.Generally, program module include routines performing specific tasks or implementing specific abstract data types, programs, objects, Component, data structure etc..This specification can also be practiced in a distributed computing environment, in these distributed computing environment In, by executing task by the connected remote processing devices of communication network.In a distributed computing environment, program module It can be located in the local and remote computer storage media including storage equipment.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
The foregoing is merely the embodiments of this specification, are not limited to this specification.For art technology For personnel, this specification can have various modifications and variations.It is all made any within the spirit and principle of this specification Modification, equivalent replacement, improvement etc., should be included within the scope of the claims of this specification.

Claims (20)

1. a kind of data processing method characterized by comprising
OTA client receives the algorithm upgrade request that OTA server-side is initiated;The calculation of the first fingerprint is carried in the algorithm upgrade request Method;
The OTA client confirms whether first fingerprint algorithm is compatible with existing one or more second fingerprint algorithms;
In incompatible second fingerprint algorithm of first fingerprint algorithm, the OTA client according to spatial strategy table from A trusted storage space for sky is determined in specified trusted storage spatial aggregation;It is calculated in the spatial strategy table comprising fingerprint One-to-one relationship between method and trusted storage space;
The OTA client is described for empty trusted storage space by first fingerprint algorithm deposit;
The OTA client returns to updating result to the OTA server-side.
2. data processing method as described in claim 1, which is characterized in that further include:
In compatible second fingerprint algorithm of first fingerprint algorithm, corresponding credible by the second compatible fingerprint algorithm In memory space, the OTA client replaces with first fingerprint algorithm by the second compatible fingerprint algorithm for described.
3. data processing method as described in claim 1, which is characterized in that carry space mark in the algorithm upgrade request Know;The space identification is the client application in the OTA client from the spatial strategy table, and one selected is sky Trusted storage space space identification;
Correspondingly, described determine a trusted storage for sky according to spatial strategy table from specified trusted storage spatial aggregation Space, comprising:
According to the space identification carried in the algorithm upgrade request, determination is corresponding from the trusted storage spatial aggregation can Believe memory space.
4. data processing method as described in claim 1, which is characterized in that described to determine that one is empty according to spatial strategy table Trusted storage space, comprising:
A corresponding space identification in trusted storage space for sky is selected from the spatial strategy table, and is marked according to the space Know and determines corresponding trusted storage space from the trusted storage spatial aggregation.
5. a kind of OTA client, the OTA client includes client application and trusted application, which is characterized in that described credible Using including:
Upgrade request receiving module, for receiving the algorithm upgrade request of OTA server-side initiation;It is taken in the algorithm upgrade request The first fingerprint algorithm of band;
Algorithm is compatible with judgment module, for confirming whether first fingerprint algorithm is compatible with existing one or more second fingerprints Algorithm;
Memory space determining module is used in incompatible second fingerprint algorithm of first fingerprint algorithm, according to space Policy Table determines a trusted storage space for sky from specified trusted storage spatial aggregation;It is wrapped in the spatial strategy table Containing the one-to-one relationship between fingerprint algorithm and trusted storage space;
Fingerprint algorithm preserving module, for first fingerprint algorithm deposit is described for empty trusted storage space;
Updating result return module, for returning to updating result to the OTA server-side.
6. a kind of electronic equipment, the electronic equipment is configured with OTA client, the OTA client include client application and Trusted application, which is characterized in that the trusted application includes:
Upgrade request receiving module, for receiving the algorithm upgrade request of OTA server-side initiation;It is taken in the algorithm upgrade request The first fingerprint algorithm of band;
Algorithm is compatible with judgment module, for confirming whether first fingerprint algorithm is compatible with existing one or more second fingerprints Algorithm;
Memory space determining module is used in incompatible second fingerprint algorithm of first fingerprint algorithm, according to space Policy Table determines a trusted storage space for sky from specified trusted storage spatial aggregation;It is wrapped in the spatial strategy table Containing the one-to-one relationship between fingerprint algorithm and trusted storage space;
Fingerprint algorithm preserving module, for first fingerprint algorithm deposit is described for empty trusted storage space;
Updating result return module, for returning to updating result to the OTA server-side.
7. a kind of computer storage medium, is stored thereon with computer program, which is characterized in that the computer program is processed Device performs the steps of when executing
Receive the algorithm upgrade request that OTA server-side is initiated;The first fingerprint algorithm is carried in the algorithm upgrade request;
Confirm whether first fingerprint algorithm is compatible with existing one or more second fingerprint algorithms;
In incompatible second fingerprint algorithm of first fingerprint algorithm, according to spatial strategy table from specified trusted storage A trusted storage space for sky is determined in spatial aggregation;It is empty comprising fingerprint algorithm and trusted storage in the spatial strategy table Between between one-to-one relationship;
First fingerprint algorithm deposit is described for empty trusted storage space;
Updating result is returned to the OTA server-side.
8. a kind of data processing method characterized by comprising
OTA client receives Client-initiated fingerprint typing request;Finger print data is carried in the fingerprint typing request;
The OTA client determines one according to spatial strategy table from specified trusted storage spatial aggregation and deposits for the credible of sky Store up space;Include the one-to-one relationship between fingerprint algorithm and trusted storage space in the spatial strategy table;
The OTA client is institute using the finger print data as the fingerprint template deposit trusted storage space for sky State fingerprint template distribution fingerprint algorithm;
The OTA client returns to fingerprint input result to the user.
9. data processing method as claimed in claim 8, which is characterized in that carry space mark in the fingerprint typing request Know;The space identification be the OTA client client application according to the spatial strategy table from specified trusted storage In spatial aggregation, the space identification in the trusted storage space for sky selected;
Correspondingly, described determine a trusted storage for sky according to spatial strategy table from specified trusted storage spatial aggregation Space, comprising:
According to the space identification carried in fingerprint typing request, determination is corresponding from the trusted storage spatial aggregation can Believe memory space.
10. data processing method as claimed in claim 9, which is characterized in that carry promising institute in the fingerprint input result The fingerprint algorithm mark of the fingerprint algorithm of fingerprint template distribution is stated, in order to which the client application identifies the fingerprint algorithm It upgrades in the spatial strategy table.
11. data processing method as claimed in claim 8, which is characterized in that it is described can from specified according to spatial strategy table Believe and determine a trusted storage space for sky in memory space set, comprising:
A corresponding space identification in trusted storage space for sky is selected from the spatial strategy table, and is marked according to the space Know and determines corresponding trusted storage space from the trusted storage spatial aggregation.
12. data processing method as claimed in claim 8, which is characterized in that further include:
It is being the trusted storage space of sky for the finger print data is described as fingerprint template deposit, and is being the fingerprint template point After fingerprint algorithm, the OTA client upgrades to the fingerprint algorithm mark of the fingerprint algorithm in the spatial strategy table.
13. data processing method as claimed in claim 8, which is characterized in that include fingerprint algorithm in the spatial strategy table Deposit time stamp;Correspondingly, when distributing fingerprint algorithm for the fingerprint template, when the OTA client is according to the deposit Stamp is the fingerprint algorithm that the fingerprint template distributes newest deposit.
14. a kind of OTA client, the OTA client includes client application and trusted application, which is characterized in that it is described can Believe that application includes:
Typing request receiving module, for receiving Client-initiated fingerprint typing request;It carries and refers in the fingerprint typing request Line data;
Memory space determining module, for determining that one is empty from specified trusted storage spatial aggregation according to spatial strategy table Trusted storage space;Include the one-to-one relationship between fingerprint algorithm and trusted storage space in the spatial strategy table;
Fingerprint template recording module, for described for empty trusted storage sky using the finger print data as fingerprint template deposit Between, and fingerprint algorithm is distributed for the fingerprint template;
Input result return module, for returning to fingerprint input result to the user.
15. a kind of electronic equipment, the electronic equipment is configured with OTA client, the OTA client include client application and Trusted application, which is characterized in that the trusted application includes:
Typing request receiving module, for receiving Client-initiated fingerprint typing request;It carries and refers in the fingerprint typing request Line data;
Memory space determining module, for determining that one is empty from specified trusted storage spatial aggregation according to spatial strategy table Trusted storage space;Include the one-to-one relationship between fingerprint algorithm and trusted storage space in the spatial strategy table;
Fingerprint template recording module, for described for empty trusted storage sky using the finger print data as fingerprint template deposit Between, and fingerprint algorithm is distributed for the fingerprint template;
Input result return module, for returning to fingerprint input result to the user.
16. a kind of computer storage medium, is stored thereon with computer program, which is characterized in that the computer program is located Reason device performs the steps of when executing
Receive Client-initiated fingerprint typing request;Finger print data is carried in the fingerprint typing request;
A trusted storage space for sky is determined from specified trusted storage spatial aggregation according to spatial strategy table;The sky Between include the one-to-one relationship between fingerprint algorithm and trusted storage space in Policy Table;
Using the finger print data as the fingerprint template deposit trusted storage space for sky, and distributed for the fingerprint template Fingerprint algorithm;
Fingerprint input result is returned to the user.
17. a kind of data processing method characterized by comprising
OTA client receives the request of Client-initiated fingerprint recognition;Finger print data is carried in the fingerprint recognition request;
The OTA client determines the trusted storage space of non-empty in trusted storage spatial aggregation according to spatial strategy table;It is described Include the one-to-one relationship between fingerprint algorithm and trusted storage space in spatial strategy table;
The OTA client is according to the fingerprint algorithm and fingerprint template in the trusted storage space of the non-empty, to the fingerprint Data carry out fingerprint recognition;
The OTA client returns to fingerprint recognition result to the user.
18. a kind of OTA client, the OTA client includes client application and trusted application, which is characterized in that it is described can Believe that application includes:
Request receiving module is identified, for receiving the request of Client-initiated fingerprint recognition;It carries and refers in the fingerprint recognition request Line data;
Memory space determining module, the trusted storage for determining non-empty in trusted storage spatial aggregation according to spatial strategy table are empty Between;Include the one-to-one relationship between fingerprint algorithm and trusted storage space in the spatial strategy table;
Finger print data identification module, it is right for the fingerprint algorithm and fingerprint template in the trusted storage space according to the non-empty The finger print data carries out fingerprint recognition;
Recognition result return module, for returning to fingerprint recognition result to the user.
19. a kind of electronic equipment, the electronic equipment is configured with OTA client, the OTA client include client application and Trusted application, which is characterized in that the trusted application includes:
Request receiving module is identified, for receiving the request of Client-initiated fingerprint recognition;It carries and refers in the fingerprint recognition request Line data;
Memory space determining module, the trusted storage for determining non-empty in trusted storage spatial aggregation according to spatial strategy table are empty Between;Include the one-to-one relationship between fingerprint algorithm and trusted storage space in the spatial strategy table;
Finger print data identification module, it is right for the fingerprint algorithm and fingerprint template in the trusted storage space according to the non-empty The finger print data carries out fingerprint recognition;
Recognition result return module, for returning to fingerprint recognition result to the user.
20. a kind of computer storage medium, is stored thereon with computer program, which is characterized in that the computer program is located Reason device performs the steps of when executing
Receive the request of Client-initiated fingerprint recognition;Finger print data is carried in the fingerprint recognition request;
The trusted storage space of non-empty in trusted storage spatial aggregation is determined according to spatial strategy table;It is wrapped in the spatial strategy table Containing the one-to-one relationship between fingerprint algorithm and trusted storage space;
According to the fingerprint algorithm and fingerprint template in the trusted storage space of the non-empty, fingerprint knowledge is carried out to the finger print data Not;
Fingerprint recognition result is returned to the user.
CN201910392785.4A 2019-05-13 2019-05-13 Data processing method, OTA client, electronic device and storage medium Active CN110175040B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910392785.4A CN110175040B (en) 2019-05-13 2019-05-13 Data processing method, OTA client, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910392785.4A CN110175040B (en) 2019-05-13 2019-05-13 Data processing method, OTA client, electronic device and storage medium

Publications (2)

Publication Number Publication Date
CN110175040A true CN110175040A (en) 2019-08-27
CN110175040B CN110175040B (en) 2023-07-18

Family

ID=67690793

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910392785.4A Active CN110175040B (en) 2019-05-13 2019-05-13 Data processing method, OTA client, electronic device and storage medium

Country Status (1)

Country Link
CN (1) CN110175040B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113329107A (en) * 2021-08-03 2021-08-31 北京顶象技术有限公司 Method and device for coping with influence of operating system change on equipment fingerprint calculation

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202362788U (en) * 2011-11-21 2012-08-01 国民技术股份有限公司 Dependable computing device with USB (Universal Serial Bus) interfaces
CN105589064A (en) * 2016-01-08 2016-05-18 重庆邮电大学 Rapid establishing and dynamic updating system and method for WLAN position fingerprint database
WO2018006677A1 (en) * 2016-07-06 2018-01-11 中兴通讯股份有限公司 Smart upgrade method, server, terminal and system
CN108008969A (en) * 2017-12-28 2018-05-08 新华三技术有限公司 A kind of method for upgrading software version, device and the network equipment
CN108153546A (en) * 2017-12-25 2018-06-12 山大地纬软件股份有限公司 Flow definition compatibility determination method and decision-making system
CN109189450A (en) * 2018-10-24 2019-01-11 郑州云海信息技术有限公司 A kind of method and device of server firmware upgrading

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202362788U (en) * 2011-11-21 2012-08-01 国民技术股份有限公司 Dependable computing device with USB (Universal Serial Bus) interfaces
CN105589064A (en) * 2016-01-08 2016-05-18 重庆邮电大学 Rapid establishing and dynamic updating system and method for WLAN position fingerprint database
WO2018006677A1 (en) * 2016-07-06 2018-01-11 中兴通讯股份有限公司 Smart upgrade method, server, terminal and system
CN108153546A (en) * 2017-12-25 2018-06-12 山大地纬软件股份有限公司 Flow definition compatibility determination method and decision-making system
CN108008969A (en) * 2017-12-28 2018-05-08 新华三技术有限公司 A kind of method for upgrading software version, device and the network equipment
CN109189450A (en) * 2018-10-24 2019-01-11 郑州云海信息技术有限公司 A kind of method and device of server firmware upgrading

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113329107A (en) * 2021-08-03 2021-08-31 北京顶象技术有限公司 Method and device for coping with influence of operating system change on equipment fingerprint calculation
CN113329107B (en) * 2021-08-03 2021-11-09 北京顶象技术有限公司 Method and device for coping with influence of operating system change on equipment fingerprint calculation

Also Published As

Publication number Publication date
CN110175040B (en) 2023-07-18

Similar Documents

Publication Publication Date Title
CN105511943B (en) A kind of Docker container operation method and device
CN109324998A (en) A kind of document handling method, apparatus and system
DE112019005770T5 (en) Storage management for a cloud-based storage system
US20220011955A1 (en) Optimizing resiliency group formation stability
US20170286465A1 (en) Data management for tenants
CN103677973A (en) Distributed multi-task scheduling management system
CN108888951A (en) Game resource treating method and apparatus
CN112099800B (en) Code data processing method, device and server
CN101819543A (en) Snapshot data processing method, system and storage device
CN109299222A (en) Verification of data method and device
CN108959341A (en) A kind of method, device and equipment that data are synchronous
CN110719320B (en) Method and equipment for generating public cloud configuration adjustment information
CN109460439A (en) A kind of data processing method, device, medium and electronic equipment
CN103514298A (en) Method for achieving file lock and metadata server
CN110968554A (en) Block chain storage method, storage system and storage medium based on file chain blocks
CN102497286A (en) Method and device for matching management information base (MIB)
CN104182295B (en) A kind of data back up method and device
Copie et al. Benchmarking cloud databases for the requirements of the internet of things
CN108052622A (en) A kind of storage method based on non-relational database, device and equipment
CN103430178A (en) Method, apparatus and product of data updating
US9798483B2 (en) Object storage power consumption optimization
CN110175040A (en) Data processing method, OTA client, electronic equipment and storage medium
CN109582384A (en) The update method and device of configuration information
CN109684381A (en) Data hot statistics method and device
CN109388644A (en) A kind of data-updating method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant