CN113360955A - Applet management method and device and server - Google Patents
Applet management method and device and server Download PDFInfo
- Publication number
- CN113360955A CN113360955A CN202110668329.5A CN202110668329A CN113360955A CN 113360955 A CN113360955 A CN 113360955A CN 202110668329 A CN202110668329 A CN 202110668329A CN 113360955 A CN113360955 A CN 113360955A
- Authority
- CN
- China
- Prior art keywords
- applet
- version
- instance
- security chip
- card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007726 management method Methods 0.000 title claims abstract description 40
- 238000000034 method Methods 0.000 claims abstract description 37
- 230000006870 function Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/71—Version control; Configuration management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/073—Special arrangements for circuits, e.g. for protecting identification code in memory
Abstract
The invention relates to an Applet management method, a device and a server, wherein the method comprises the following steps: when the new edition Applet is released, firstly, updating the information of the Applet into a preset table; the information of the Applet includes: an Applet name, version number and Applet executable file; configuring a currently default Applet version used by a security chip; recording the card application opened by each security chip and the information of the corresponding Applet based on the Instance and the card ID; according to the invention, by adding the version number in the Applet information and recording the detailed information of each safety chip, the Applet and the Instance, the version association relation between the Applet and the Instance on each chip is managed, and accurate version management can be realized by taking the safety chip as a dimension at the server side.
Description
Technical Field
The invention relates to the technical field of network information management, in particular to an Applet management method, device and server.
Background
For the same security chip, such as a security chip of a bus card, in a conventional air personalization process, a manner in which a server manages an Applet is generally that an Instance corresponds to an Applet, and a name label of the Applet and a name label of the Instance are generally fixed. The traditional management mode is simple and relatively stable, and is very suitable when the traffic is not large. However, as the number of services applied to the bus card and other cards increases, the development workload and the code management workload brought by the existing management mode are greatly increased, the possibility of errors is increased, and the management cost is high. When a plurality of applications are installed on a card, each application has an Applet, and each Applet corresponds to an Instance, so that the code of each Applet needs to be developed and managed. In addition, in a mode that an Instance corresponds to an Applet, the space occupation of the security chip is large, the number of applications opened in the security chip is limited, and the development of services is not facilitated.
Based on the above problems, we can think of solving with the implementation of single Applet multiple Instance, but the implementation of single Applet multiple Instance will bring new problems, that is: the problem that needs to be solved is how to smoothly upgrade and manage versions of applets without affecting the condition that a user opens a card.
Disclosure of Invention
In view of this, the present invention aims to overcome the defects in the prior art, and provides a method, an apparatus and a server for managing an Applet, so as to solve the problems that the existing Applet management method occupies a large space and has high management cost, and the existing single Applet multiple Instance implementation method cannot smoothly upgrade an Applet.
In order to achieve the purpose, the invention adopts the following technical scheme: an Applet management method, comprising:
when the new edition Applet is released, firstly updating the information of the Applet into a preset table; the information of the Applet includes: an Applet name, version number and Applet executable file;
configuring the currently used and default Applet version of the security chip so that the security chip adopts the currently used and default Applet version to open the card;
and recording the information of the card application opened by each security chip and the corresponding Applet based on the Instance and the card ID dimension.
Optionally, one or more card applications can be opened on each security chip, each card application corresponds to one or more versions of an Applet, and each version of the Applet corresponds to one or more Instance instances.
Optionally, when one card application corresponds to multiple versions of applets, the method further includes:
establishing association between the Instance originally associated with the first version Applet and the second version Applet through upgrading operation;
the second version Applet is an upgraded version of the first version Applet.
Optionally, the upgrading operation includes:
backing up the data of the Instance on the secure chip to a server;
deleting the Instance on the security chip;
creating an Instance associated with the second version Applet using the second version Applet;
and rewriting the data of the Instance backed up by the server side into the Instance associated with the second version Applet.
Optionally, the last two bytes in the Applet name represent the Applet version number.
Optionally, the method further includes:
for an Applet of any version in the security chip, if no Instance is associated with the Applet of the version, the server deletes the Applet of the version when the last Instance associated with the Applet of the version is deleted.
Optionally, the method further includes:
and configuring an Applet version used in the gray release of the security chip so that the security chip opens the card by adopting the Applet version released in the gray release.
The invention also provides an Applet management device of the smart card, which comprises the following components:
the form updating module is used for updating the information of the Applet into a preset form when the new version Applet is released; the information of the Applet includes: an Applet name, version number and Applet executable file;
the configuration module is used for configuring the currently used default Applet version of the security chip so that the security chip can be opened by adopting the currently used default Applet version;
and the recording module is used for recording the information of the card application and the corresponding Applet opened by each security chip based on the Instance and the ID dimension of the card.
Optionally, one or more card applications can be opened on each security chip, each card application corresponds to one or more versions of an Applet, and each version of the Applet corresponds to one or more Instance instances.
The present invention also provides a server, comprising:
an Applet management device as described above.
By adopting the technical scheme, the method for managing the Applet comprises the following steps: when the new edition Applet is released, firstly updating the information of the Applet into a preset table; the information of the Applet includes: an Applet name, version number and Applet executable file; configuring the currently used and default Applet version of the security chip so that the security chip adopts the currently used and default Applet version to open the card; recording the card application opened by each security chip and the information of the corresponding Applet based on the Instance and the ID dimension of the card; according to the invention, by adding the version number in the Applet information, recording the detailed information of each safety chip, each Applet and the Instance, managing the version association relationship between the Applet and the Instance on each safety chip, the safety chip information management of single Applet and multiple instances can be realized, and thus the space and cost occupied by the Applet management are reduced; aiming at the single Applet multi-Instance implementation mode, the invention can also realize the smooth upgrade of the Applet.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flow chart provided by an embodiment of an Applet management method according to the present invention;
fig. 2 is a schematic flowchart of a second embodiment of an Applet management method according to the present invention;
fig. 3 is a schematic structural diagram provided by an embodiment of an Applet managing apparatus according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be described in detail below. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the examples given herein without any inventive step, are within the scope of the present invention.
Fig. 1 is a schematic flow chart of an Applet management method according to an embodiment of the present invention.
As shown in fig. 1, the method for managing an Applet according to this embodiment includes:
s11: when the new edition Applet is released, firstly updating the information of the Applet into a preset table; the information of the Applet includes: an Applet name, version number and Applet executable file;
s12: configuring the currently used and default Applet version of the security chip so that the security chip adopts the currently used and default Applet version to open the card;
s13: and recording the information of the card application opened by each security chip and the corresponding Applet based on the Instance and the card ID dimension.
Furthermore, one or more card applications can be opened on each security chip, each card application corresponds to one or more versions of applets, and each version of applets corresponds to one or more Instance instances.
In order to solve the problems of large space occupation and high management cost caused by the way that one Applet corresponds to one Instance in the prior art, the embodiment can realize the management of a single Applet and multiple instances by increasing the version number in the information of the Applet.
The method described in this embodiment can represent the last two bytes in the Applet name as the Applet version number. For example, the name of the Applet is B000000333534E42FF00xxxx, where the last two bytes are the range of values of the version number of the Applet: 0000-FFFF. The benefits of this are: multiple versions of applets can be stored in the same security chip.
In practical applications, for example, when a new user wants to use a bus card in a certain city (suzhou) for the first time, the card is opened first, the server configures the Applet version currently used by default in suzhou to the security chip of the bus card according to the request of the user, creates an Instance1 by using the Applet version, and writes data related to suzhou into the newly created Instance1, so that the new user can use the Applet of a certain version by default when opening the card, and the server uniformly manages the bus card ID, the Applet information and the associated Instance. Suzhou above is in fact an example Instance associated with the version Applet. If the security chip is used in another city (building door) with the current version Applet, the server only needs to establish an Instance2 with the current version Applet and write data related to the building door into a newly established Instance2, at this time, the current version Applet in the security chip corresponds to two instances (Instance1 and Instance2), and the management mode actually expands the correspondence of the traditional Applet and Instance1 to many. Similarly, a second version of the Applet and an Instance associated with the second version of the Applet may also be configured within the security chip. In the method of the embodiment, the information of each Applet includes the name and version number of the Applet, so that applets with different names and different versions can be managed clearly.
In the embodiment, by adding the version number in the Applet information and recording the detailed information of each security chip, each Applet and each Instance, and managing the version association relationship between the Applet and the Instance on each security chip, the management of the chip information of a single Applet and multiple instances can be realized, so that the space and the cost occupied by the Applet management are reduced. Fig. 2 is a schematic flowchart of a second embodiment of an Applet management method according to the present invention.
As shown in fig. 2, the method for managing an Applet according to this embodiment includes:
s21: when the new edition Applet is released, firstly updating the information of the Applet into a preset table; the information of the Applet includes: an Applet name, version number and Applet executable file;
s22: configuring the currently used and default Applet version of the security chip so that the security chip adopts the currently used and default Applet version to open the card;
s23: and recording the information of the card application opened by each security chip and the corresponding Applet based on the Instance and the card ID dimension.
Furthermore, one or more card applications can be opened on each security chip, each card application corresponds to one or more versions of applets, and each version of applets corresponds to one or more Instance instances.
S24: when one card application corresponds to the applets of a plurality of versions, establishing association between the Instance originally associated with the Applet of the first version and the Applet of the second version through upgrading operation;
the second version Applet is an upgraded version of the first version Applet.
Further, the upgrading operation includes:
backing up the data of the Instance on the secure chip to a server;
deleting the Instance on the security chip;
creating an Instance associated with the second version Applet using the second version Applet;
and rewriting the data of the Instance backed up by the server side into the Instance associated with the second version Applet.
By adopting the method of the embodiment, multiple versions of Applets are installed in the same security chip, and the Applets and the Instance are in a many-to-many relationship. For example, as shown in tables 1 and 2 below, Applet V1 and Applet V2 may exist on a security chip, where Instance a and Instance B are associated with Applet V1, and Instance C and Instance D are associated with Applet V2; on another new security card, the association relationship may be that Instance A, Instance B, and Instance C are all associated with AppleT V2, and Instance D is associated with AppletV 2.
TABLE 1
TABLE 2
In table 1, one card application corresponds to two versions of applets (Applet V1 and Applet V2), example Instance a and Instance B are associated with Applet V1, and Instance C and Instance D are associated with Applet V2; if the Instance B is to be upgraded at this time, the Instance B on the secure chip needs to be backed up to the server side first when the Instance B is to be upgraded to be associated with the Applet V2; delete Instance B on the secure chip associated with Applet V1; instance B associated with Applet V2 is then created using Applet V2; and rewriting the data of the Instance B backed up by the server into the Instance B associated with the Applet V2, thereby realizing the upgrade of the Instance B from the Applet V1 to the Applet V2, as shown in Table 2.
If the Applet associated with the Instance is upgraded by adopting the prior art, the data of all instances associated with the Applet V1 is backed up to the server, all associated instances with the Applet V1 are deleted, then the Applet V1 (the old version of Applet) is deleted, then the Applet V2 (the new version of Applet) is downloaded, and then all instances associated with the Applet V2 are created by using the backup data of the server. This involves a very large number of steps in between, making upgrading an Applet virtually inoperable. Moreover, in the existing process, an old version of Applet can be deleted, so that Instance A which is not planned to be upgraded is lost, and the use of normal functions is influenced.
By adopting the method, the server can perform accurate version control on a certain security chip without worrying about that the upgrading action affects other instances or applets of other versions.
In the embodiment, by adding the version number in the Applet information and recording the detailed information of each security chip, each Applet and each Instance, and managing the version association relationship between the Applet and the Instance on each security chip, the management of the chip information of a single Applet and multiple instances can be realized, so that the space and the cost occupied by the Applet management are reduced; aiming at a single Applet multiple-Instance implementation mode or a multiple-Applet multiple-Instance implementation mode, the method can also realize smooth upgrade of the Applet; the method not only realizes the cost saving brought by a single (multiple) Applet multiple Instance mode, but also solves the problem of server management brought by the single (multiple) Applet multiple Instance.
Further, the method further comprises:
for an Applet of any version in the security chip, if the Instance is not associated with the Applet of the version, the server deletes the Applet of the version when the last Instance associated with the Applet of the version is deleted, so that the space of the security chip is further saved, and the occupation of useless resources is reduced.
Further, the method further comprises:
and configuring an Applet version used in the gray release of the security chip so that the security chip opens the card by adopting the Applet version released in the gray release. If the user is a greyscale user, a greyscale version Applet may be used to open the card. The method can also be applied to gray release of the Applet so as to meet the drive test requirement before the Applet goes on line.
It should be noted that the method described in this embodiment is compatible with the existing 1-to-1 management mechanism while supporting the single Applet multiple Instance and multiple Applet multiple Instance implementation modes, so that the method is good in compatibility and convenient for marketing.
Fig. 3 is a schematic structural diagram provided by an embodiment of an Applet managing apparatus according to the present invention.
As shown in fig. 3, the Applet management apparatus for a smart card according to this embodiment includes:
the form updating module 31 is configured to update information of the Applet to a preset form when the new version of the Applet is released; the information of the Applet includes: an Applet name, version number and Applet executable file;
the configuration module 32 is configured to configure a currently default Applet version used by the security chip, so that the security chip opens the card by using the currently default Applet version;
and the recording module 33 is configured to record information of the card application and the corresponding Applet, which are activated by each security chip, based on the Instance and the card ID dimension.
Furthermore, one or more card applications can be opened on each security chip, each card application corresponds to one or more versions of applets, and each version of applets corresponds to one or more Instance instances.
The operating principle of the Applet management apparatus in this embodiment is the same as that of the Applet management method in fig. 1 or fig. 2, and details are not repeated here.
In the embodiment, by adding the version number in the Applet information and recording the detailed information of each security chip, each Applet and each Instance, and managing the version association relationship between the Applet and the Instance on each security chip, the management of the chip information of a single Applet and multiple instances can be realized, so that the space and the cost occupied by the Applet management are reduced; aiming at a single Applet multiple-Instance implementation mode or a multiple-Applet multiple-Instance implementation mode, the method can also realize smooth upgrade of the Applet; the device not only realizes the cost saving brought by a single (multiple) Applet multiple Instance mode, but also solves the problem of server management brought by the single (multiple) Applet multiple Instance.
The present invention also provides a server, comprising:
such as the Applet management device described in fig. 3.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that the terms "first," "second," and the like in the description of the present invention are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present invention, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.
Claims (10)
1. An Applet management method, comprising:
when the new edition Applet is released, firstly updating the information of the Applet into a preset table; the information of the Applet includes: an Applet name, version number and Applet executable file;
configuring the currently used and default Applet version of the security chip so that the security chip adopts the currently used and default Applet version to open the card;
and recording the information of the card application opened by each security chip and the corresponding Applet based on the Instance and the card ID dimension.
2. The method of claim 1,
one or more card applications can be opened on each safety chip, each card application corresponds to one or more versions of Applet, and each version of Applet corresponds to one or more Instance instances.
3. The method according to claim 2, wherein when one card application corresponds to a plurality of versions of an Applet, the method further comprises:
establishing association between the Instance originally associated with the first version Applet and the second version Applet through upgrading operation;
the second version Applet is an upgraded version of the first version Applet.
4. The method of claim 3, wherein the upgrade operation comprises:
backing up the data of the Instance on the secure chip to a server;
deleting the Instance on the security chip;
creating an Instance associated with the second version Applet using the second version Applet;
and rewriting the data of the Instance backed up by the server side into the Instance associated with the second version Applet.
5. The method of claim 1,
the last two bytes in the Applet name represent the Applet version number.
6. The method of any of claims 1 to 5, further comprising:
for an Applet of any version in the security chip, if no Instance is associated with the Applet of the version, the server deletes the Applet of the version when the last Instance associated with the Applet of the version is deleted.
7. The method of any of claims 1 to 5, further comprising:
and configuring an Applet version used in the gray release of the security chip so that the security chip opens the card by adopting the Applet version released in the gray release.
8. An Applet management apparatus for a smart card, comprising:
the form updating module is used for updating the information of the Applet into a preset form when the new version Applet is released; the information of the Applet includes: an Applet name, version number and Applet executable file;
the configuration module is used for configuring the currently used default Applet version of the security chip so that the security chip can be opened by adopting the currently used default Applet version;
and the recording module is used for recording the information of the card application and the corresponding Applet opened by each security chip based on the Instance and the ID dimension of the card.
9. The apparatus of claim 8,
one or more card applications can be opened on each safety chip, each card application corresponds to one or more versions of Applet, and each version of Applet corresponds to one or more Instance instances.
10. A server, comprising:
the Applet management device according to claim 8 or 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110668329.5A CN113360955A (en) | 2021-06-16 | 2021-06-16 | Applet management method and device and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110668329.5A CN113360955A (en) | 2021-06-16 | 2021-06-16 | Applet management method and device and server |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113360955A true CN113360955A (en) | 2021-09-07 |
Family
ID=77534476
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110668329.5A Pending CN113360955A (en) | 2021-06-16 | 2021-06-16 | Applet management method and device and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113360955A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016083532A2 (en) * | 2014-11-27 | 2016-06-02 | Bundesdruckerei Gmbh | Method for installing software on a chip card by means of an installation machine |
CN106469069A (en) * | 2015-08-17 | 2017-03-01 | 中兴通讯股份有限公司 | A kind of version upgrading method and system |
US20180004561A1 (en) * | 2016-06-30 | 2018-01-04 | Amazon Technologies, Inc. | Performance variability reduction using an opportunistic hypervisor |
CN109446785A (en) * | 2018-10-15 | 2019-03-08 | 江苏恒宝智能***技术有限公司 | A kind of memory management method of smart card and its personal data |
US10268477B1 (en) * | 2018-05-30 | 2019-04-23 | Microsoft Technology Licensing, Llc | Modeling lifetime of hybrid software application using application manifest |
US10419641B1 (en) * | 2018-04-13 | 2019-09-17 | Lexmark International, Inc. | Chip and supply item for imaging device, including communication |
CN111488578A (en) * | 2019-01-28 | 2020-08-04 | 维萨国际服务协会 | Continuous vulnerability management for modern applications |
-
2021
- 2021-06-16 CN CN202110668329.5A patent/CN113360955A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016083532A2 (en) * | 2014-11-27 | 2016-06-02 | Bundesdruckerei Gmbh | Method for installing software on a chip card by means of an installation machine |
CN106469069A (en) * | 2015-08-17 | 2017-03-01 | 中兴通讯股份有限公司 | A kind of version upgrading method and system |
US20180004561A1 (en) * | 2016-06-30 | 2018-01-04 | Amazon Technologies, Inc. | Performance variability reduction using an opportunistic hypervisor |
US10419641B1 (en) * | 2018-04-13 | 2019-09-17 | Lexmark International, Inc. | Chip and supply item for imaging device, including communication |
US10268477B1 (en) * | 2018-05-30 | 2019-04-23 | Microsoft Technology Licensing, Llc | Modeling lifetime of hybrid software application using application manifest |
CN109446785A (en) * | 2018-10-15 | 2019-03-08 | 江苏恒宝智能***技术有限公司 | A kind of memory management method of smart card and its personal data |
CN111488578A (en) * | 2019-01-28 | 2020-08-04 | 维萨国际服务协会 | Continuous vulnerability management for modern applications |
Non-Patent Citations (1)
Title |
---|
孙彬: "气压传感器IC在智能手机Android***上的驱动开发及功能实现", 《中国优秀硕士学位论文全文数据库信息科技辑》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10824411B2 (en) | Install file size optimization and installation verification system | |
US7330967B1 (en) | System and method for injecting drivers and setup information into pre-created images for image-based provisioning | |
US6920555B1 (en) | Method for deploying an image into other partition on a computer system by using an imaging tool and coordinating migration of user profile to the imaged computer system | |
TWI428830B (en) | Converting machines to virtual machines | |
US6408434B1 (en) | System and method for using a substitute directory to automatically install an update program | |
US6138179A (en) | System for automatically partitioning and formatting a primary hard disk for installing software in which selection of extended partition size is not related to size of hard disk | |
US20150378849A1 (en) | Method and device for backing up, restoring a virtual machine | |
US20100325622A1 (en) | Updating Firmware of an Electronic Device | |
US6154835A (en) | Method for automatically configuring and formatting a computer system and installing software | |
WO2020103904A1 (en) | Cloud desktop upgrade method, device, cloud server, and storage medium | |
US20020046216A1 (en) | Information-processing apparatus and information-processing method | |
WO2022089615A1 (en) | Method for creating private image in public cloud, and related device | |
CN107463467B (en) | Method and system capable of quickly restoring virtualization platform | |
CN110647333A (en) | Firmware upgrading method and equipment configured to upgrade firmware therein | |
WO2016067725A1 (en) | Disk distribution system | |
WO2022095366A1 (en) | Redis-based data reading method and apparatus, device, and readable storage medium | |
US20040221024A1 (en) | Apparatus and method for setting environment of client in client / server system, and program recording medium therefor | |
CN107193563B (en) | Method for managing server stateless firmware version | |
US7996631B1 (en) | System and method for accessing storage devices attached to a stateless client | |
CN113360955A (en) | Applet management method and device and server | |
US20070079279A1 (en) | Embedded device with software registry | |
US20190138407A1 (en) | Systems and methods of deploying an operating system from a resilient virtual drive | |
WO2010027358A1 (en) | System and method for supporting multiple hardware platforms with a single disk image | |
CN107944010A (en) | The method and apparatus of reading and writing of files in a kind of distributed file system | |
US11526362B2 (en) | Automatic hydration of feature file batches |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |