CN113656053A - Processor upgrading method, device, equipment, storage medium and product - Google Patents

Processor upgrading method, device, equipment, storage medium and product Download PDF

Info

Publication number
CN113656053A
CN113656053A CN202110944662.4A CN202110944662A CN113656053A CN 113656053 A CN113656053 A CN 113656053A CN 202110944662 A CN202110944662 A CN 202110944662A CN 113656053 A CN113656053 A CN 113656053A
Authority
CN
China
Prior art keywords
processor
slave
master
encrypted communication
slave processor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110944662.4A
Other languages
Chinese (zh)
Inventor
王侠
曹选明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sengled Co Ltd
Original Assignee
Sengled Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sengled Co Ltd filed Critical Sengled Co Ltd
Priority to CN202110944662.4A priority Critical patent/CN113656053A/en
Publication of CN113656053A publication Critical patent/CN113656053A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • H04L41/082Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Stored Programmes (AREA)

Abstract

The invention provides a processor upgrading method, a processor upgrading device, processor upgrading equipment, a storage medium and a product. The method comprises the following steps: the main processor receives an upgrade file corresponding to encrypted communication sent by a cloud server; the master processor upgrades according to the upgrade file corresponding to the encrypted communication so that the master processor has an encrypted communication function, and sends the upgrade file corresponding to the encrypted communication to the slave processor; and the slave processor is upgraded according to the upgrade file corresponding to the encrypted communication so as to enable the slave processor to have the encrypted communication function. According to the method, the main processor and the auxiliary processor can be automatically upgraded into the processors with the encryption communication function, the encryption communication function can be realized without replacing hardware, and not only is the cost saved, but also the labor is saved.

Description

Processor upgrading method, device, equipment, storage medium and product
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method, an apparatus, a device, a storage medium, and a product for upgrading a processor.
Background
The master processor may assign certain processing tasks, such as data collection tasks, to one or more of the slave processors and may then provide the obtained data to the master processor for data transfer from processor to processor.
At present, the master processor and the slave processor communicate with each other through a communication interface, for example, a UART (Universal Asynchronous Receiver/Transmitter), USB (Universal-serial bus), or other interface.
When data transmission is carried out between the master processor and the slave processor, the data can be easily intercepted by other equipment, and the equipment serves as the master processor to send information to the slave processor according to the intercepted data. The existing solution is to replace the original master processor and slave processor with those with encryption function, even if the data is intercepted, the data cannot be decrypted, but a plurality of processors need to be replaced, so that the cost is high.
Disclosure of Invention
The invention provides a processor upgrading method, device, equipment, storage medium and product, which are used for solving the problem of higher cost caused by replacing a processor with an encryption function.
In a first aspect, the present invention provides a processor upgrade method for a processor upgrade apparatus, the apparatus comprising at least one master processor and at least one slave processor, the method comprising:
the main processor receives an upgrade file corresponding to encrypted communication sent by a cloud server;
the master processor upgrades according to the upgrade file corresponding to the encrypted communication so that the master processor has an encrypted communication function, and sends the upgrade file corresponding to the encrypted communication to the slave processor;
and the slave processor is upgraded according to the upgrade file corresponding to the encrypted communication so as to enable the slave processor to have the encrypted communication function.
In a second aspect, the present invention provides a processor upgrade apparatus, the apparatus comprising at least one master processor and at least one slave processor;
the main processor is used for receiving the upgrade file corresponding to the encrypted communication sent by the cloud server, upgrading according to the upgrade file corresponding to the encrypted communication so that the main processor has an encrypted communication function, and sending the upgrade file corresponding to the encrypted communication to the slave processor;
and the slave processor is used for upgrading according to the upgrading file corresponding to the encrypted communication so as to enable the slave processor to have the encrypted communication function.
In a third aspect, the present invention provides an electronic device comprising: a memory, a processor, and an input device; the processor includes: at least one master processor and at least one slave processor;
the processor, the memory and the input device are interconnected through a circuit;
the memory stores computer-executable instructions;
the input device is used for receiving data;
the processor executes computer-executable instructions stored by the memory, causing the processor to perform performing the method of the first aspect.
In a fourth aspect, the present invention provides a computer-readable storage medium having stored thereon computer-executable instructions for implementing the method according to the first aspect when executed by a processor.
In a fifth aspect, the invention provides a computer program product comprising a computer program which, when executed by a processor, implements the method of the first aspect.
According to the processor upgrading method, device, equipment, storage medium and product provided by the invention, the main processor receives the upgrading file corresponding to the encrypted communication sent by the cloud server; the master processor upgrades according to the upgrade file corresponding to the encrypted communication so that the master processor has an encrypted communication function, and sends the upgrade file corresponding to the encrypted communication to the slave processor; and the slave processor is upgraded according to the upgrade file corresponding to the encrypted communication so as to enable the slave processor to have the encrypted communication function. The main processor and the auxiliary processor can be automatically upgraded into the processors with encryption communication functions, and the encryption communication functions can be realized without replacing hardware, so that the cost is saved, and the labor is saved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
FIG. 1 is a schematic diagram of a network architecture for a processor upgrade method provided by the present invention;
FIG. 2 is a flowchart illustrating a processor upgrade method according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a processor upgrade method according to a second embodiment of the present invention;
FIG. 4 is a flowchart illustrating a processor upgrade method according to a third embodiment of the present invention;
FIG. 5 is a flowchart illustrating a processor upgrade method according to a fourth embodiment of the present invention;
FIG. 6 is a flowchart illustrating a processor upgrade method according to a fifth embodiment of the present invention;
FIG. 7 is a flowchart illustrating a processor upgrade method according to a sixth embodiment of the present invention;
FIG. 8 is a schematic structural diagram of a processor upgrade system according to a sixth embodiment of the present invention;
fig. 9 is a schematic structural diagram of a processor upgrading apparatus according to a seventh embodiment of the present invention;
FIG. 10 is a first block diagram of an electronic device for implementing a processor upgrade method of an embodiment of the present invention;
FIG. 11 is a second block diagram of an electronic device for implementing a processor upgrade method of an embodiment of the present invention.
With the foregoing drawings in mind, certain embodiments of the disclosure have been shown and described in more detail below. These drawings and written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the concepts of the disclosure to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
For a clear understanding of the technical solutions of the present application, a detailed description of the prior art solutions is first provided.
In the prior art, the master processor and the plurality of slave processors communicate with each other through a communication interface, for example, Universal Asynchronous Receiver Transmitter (UART), Inter-Integrated Circuit (I2C) bus, Serial Peripheral interface (spi) (Serial Peripheral interface), Universal Serial bus (usb) (Universal Serial bus). The illegal user is externally connected with a third-party hardware device through the communication interface, so that communication data between the master processor and the slave processor are intercepted, communication contents between the master processor and the slave processor are analyzed, the rule for controlling the slave processor device and the rule for disturbing the master processor device are obtained, and the master processor or the slave processor is counterfeited to send information.
However, in the conventional technology, the original master processor and slave processors are usually detached, the master processor and slave processors with encryption functions are replaced, and the data security is ensured by replacing the hardware, but the hardware replacement method is not only high in cost, but also usually involves connecting the master processor with a plurality of slave processors, and the workload of workers is large by replacing the plurality of slave processors.
Therefore, in order to solve the problem of high cost caused by replacement of a processor with an encryption function in the prior art, the inventor finds in research that the processor can have an encryption communication function by upgrading the processor on the premise of not replacing hardware equipment, specifically, the cloud server sends an upgrade file corresponding to encryption communication to the master processor, the master processor receives the upgrade file and upgrades the upgrade file according to the upgrade file, the master processor sends the upgrade file to the slave processor, and the slave processor upgrades the upgrade file according to the upgrade file, so that the master processor and the slave processor which are successfully upgraded have the function of specifically encrypting communication. The main processor and the auxiliary processor can be automatically upgraded into the processors with encryption communication functions, and the encryption communication functions can be realized without replacing hardware, so that the cost is saved, and the labor is saved.
Therefore, the inventor proposes a technical scheme of the embodiment of the invention based on the above creative discovery. The following describes a network architecture and an application scenario of the processor upgrading method provided by the embodiment of the present invention.
As shown in fig. 1, a network architecture corresponding to a processor upgrading method provided in an embodiment of the present invention includes: the cloud server 1 and the processor upgrading device 2, wherein the processor upgrading device 2 comprises at least one main processor 3 and at least one slave processor 4, and the main processor 3 is in communication connection with the slave processor 4. The cloud server 1 is in communication connection with the processor upgrading device 2, specifically, the cloud server 1 is in communication with a main processor 3 in the processor upgrading device 2, the cloud server 1 sends an upgrading file corresponding to encrypted communication to the processor upgrading device 2, the main processor 3 in the processor upgrading device 2 receives the upgrading file corresponding to the encrypted communication, the main processor 3 is upgraded according to the upgrading file corresponding to the encrypted communication, so that the main processor 3 has the function of encrypted communication, further, the main processor 3 sends the upgrading file corresponding to the encrypted communication to a slave processor 4, the slave processor 4 is upgraded according to the upgrading file corresponding to the encrypted communication, so that the slave processor 4 has the function of encrypted communication, so that the upgrading of the main processor and the slave processor is completed, the upgraded processor has the function of encrypted communication, and when data transmission is performed between the subsequent main processor and slave processors, the data can be encrypted, and the security of the data is ensured. The main processor and the auxiliary processor can be automatically upgraded into the processors with encryption communication functions, and the encryption communication functions can be realized without replacing hardware, so that the cost is saved, and the labor is saved.
Example one
Fig. 2 is a schematic flowchart of a processor upgrading method according to an embodiment of the present invention, and as shown in fig. 2, an execution main body of the processor upgrading method according to the embodiment is a processor upgrading device, and the processor upgrading method according to the embodiment includes the following steps:
step 101, a main processor receives an upgrade file corresponding to encrypted communication sent by a cloud server.
In this embodiment, the processor upgrading apparatus includes at least one master processor and at least one slave processor, where the master processor and the slave processor communicate via a communication interface, where the communication interface includes a Universal Asynchronous Receiver Transmitter/Transmitter (UART), an I2C bus (Inter-Integrated Circuit), a Serial Peripheral interface (spi) (Serial Peripheral interface), and a Universal Serial bus (usb) (Universal Serial bus). The communication interface is not limited to the above interface.
In this embodiment, the processor upgrading device is further in communication connection with the cloud server, specifically, the processor upgrading device further includes a communication module, the main processor communicates with the cloud server through the communication module, the cloud server sends an upgrade file corresponding to encrypted communication to the processor upgrading device, the main processor receives the upgrade file corresponding to encrypted communication sent by the cloud server through the communication module, and further the main processor is in communication connection with the slave processor.
And 102, upgrading the main processor according to the upgrading file corresponding to the encrypted communication so that the main processor has the encrypted communication function, and sending the upgrading file corresponding to the encrypted communication to the secondary processor.
In this embodiment, the master processor performs upgrading according to the upgrade file corresponding to the encrypted communication, the master processor that succeeds in upgrading has an encryption function, and the master processor sends the upgrade file corresponding to the encrypted communication to the slave processor through the communication interface.
And 103, upgrading the slave processor according to the upgrading file corresponding to the encrypted communication so as to enable the slave processor to have the encrypted communication function.
In this embodiment, the slave processor receives the upgrade file corresponding to the encrypted communication sent by the master processor through the communication interface, and the slave processor performs upgrade according to the upgrade file corresponding to the encrypted communication, thereby completing the specific encrypted communication function of the upgraded slave processor. The upgraded master processor and slave processor have the encryption communication function, and when the master processor and slave processor perform data transmission later, data can be encrypted, so that the security of the data is ensured.
In this embodiment, the master processor and the slave processor can be automatically upgraded to the processors with the encryption communication function, and the encryption communication function can be realized without replacing hardware, so that not only is the cost saved, but also the labor is saved.
Example two
Fig. 3 is a schematic flowchart of a processor upgrading method according to a second embodiment of the present invention, and as shown in fig. 3, on the basis of the processor upgrading method according to the first embodiment of the present invention, after step 102, the method includes the following steps:
at step 1021, the master processor determines whether the slave processor has been successfully upgraded.
In step 1022, if the slave processor is successfully upgraded, the master processor enables the encrypted communication protocol, and the master controller controls the slave processor to enable the encrypted communication protocol.
In this embodiment, the master processor further determines whether the slave processor is successfully upgraded, and if the master processor determines that the slave processor is successfully upgraded, the encryption protocol may be enabled, specifically, the master processor enables the encryption communication protocol, and the master processor controls the slave processor to start the encryption communication protocol.
In this embodiment, after the master processor determines that the slave processor is successfully upgraded, the master processor and the slave processor enable an encryption communication protocol, so as to ensure the security of data transmission between the master processor and the slave processor.
Example III
Fig. 4 is a schematic flowchart of a processor upgrading method according to a third embodiment of the present invention, and as shown in fig. 4, based on the processor upgrading method according to the second embodiment of the present invention, the step 1022 of controlling the slave processor to enable the encrypted communication protocol by the master controller is further refined, which includes the following steps:
at step 1022a, the master processor sends an open encryption communication command to the slave processor.
In this embodiment, the master processor sends the encryption communication starting instruction to the slave processor through the communication interface.
In step 1022b, the slave processor enables the encrypted communication protocol according to the open encrypted communication instruction.
In this embodiment, the slave processor receives an encryption starting communication instruction sent by the master processor through the communication interface, the slave processor starts an encryption communication protocol according to the encryption starting communication instruction, after the encryption communication protocol is started, the master processor and the slave processor send encrypted data to each other, the encryption algorithm may be symmetric encryption or asymmetric encryption, and the encryption algorithm includes advanced encryption standard AES, symmetric key encryption algorithm DES, block cipher algorithm TEA, and the like.
Example four
Fig. 5 is a schematic flowchart of a processor upgrading method provided by the fourth embodiment of the present invention, and as shown in fig. 5, on the basis of the processor upgrading method provided by the third embodiment of the present invention, step 1022b is further refined, including the following steps:
in step 1022c, the master processor sends an upgrade query request to the slave processor.
In this embodiment, after the master processor sends the upgrade file corresponding to the encrypted communication to the slave processor, the master processor sends an upgrade query request to the slave processor through the communication interface at a preset time interval.
And step 1022d, the slave processor sends the upgrade query feedback information to the master processor according to the query request.
In this embodiment, the slave processor receives an upgrade query request sent by the master processor through the communication interface, and sends upgrade query feedback information to the master processor according to the upgrade query request, where the upgrade query feedback information includes current firmware version information of the slave processor and an encryption algorithm identifier corresponding to the slave processor.
The current firmware version information includes a current software version number, a hardware version number, a serial number, a chip number, and the like. The encryption algorithm identifier is used for determining which encryption algorithm is used by the processor.
And 1022e, the main processor determines whether the processor is upgraded successfully according to the upgrade query feedback information.
In this embodiment, the master processor receives the upgrade query feedback information sent by the slave processor through the communication interface, and further determines whether the processor is upgraded successfully according to the upgrade query feedback information.
EXAMPLE five
Fig. 6 is a schematic flowchart of a processor upgrading method provided by the fifth embodiment of the present invention, and as shown in fig. 6, on the basis of the processor upgrading method provided by the fourth embodiment of the present invention, step 1022e is further refined, including the following steps:
1022f, the master processor analyzes the feedback information to obtain the current firmware version information of the slave processor and the corresponding encryption algorithm identifier of the slave processor.
In this embodiment, the master processor receives the feedback information and then analyzes the feedback information to obtain the current firmware version information of the processor and the encryption algorithm identifier corresponding to the slave processor.
1022g, the master processor matches the current firmware version information corresponding to the slave processor with the current firmware information corresponding to the master processor, and matches the encryption algorithm identifier corresponding to the slave processor with the encryption algorithm identifier corresponding to the master processor.
In this embodiment, the master processor matches the current firmware version information corresponding to the slave processor with the current firmware version information corresponding to the master processor, further matches the encryption algorithm identifier corresponding to the slave processor with the encryption algorithm identifier corresponding to the master processor, and determines whether the slave processor is successfully upgraded according to a matching result.
1022h, if the current firmware version information corresponding to the slave processor is matched with the current firmware information corresponding to the master processor and the encryption algorithm identifier corresponding to the slave processor is matched with the encryption algorithm identifier corresponding to the master processor, the master processor determines that the slave processor is upgraded successfully.
In this embodiment, if the current firmware version information corresponding to the slave processor matches the firmware version information corresponding to the master processor, the slave processor and the master processor are described, and the encryption algorithm identifier corresponding to the slave processor matches the encryption algorithm identifier corresponding to the master processor, the master processor determines that the slave processor is successfully upgraded.
EXAMPLE six
On the basis of the processor upgrading method provided by the fourth embodiment of the present invention, before step 101, the method further includes:
step 101a, the main processor sends version information to the cloud server, so that the cloud server sends an upgrade file corresponding to encrypted communication after determining that the main processor does not have an encrypted communication function according to the version information.
In this embodiment, the main processor sends version information to the cloud server, the cloud server receives the version information, and determines whether the main processor has a function of encrypted communication according to the version information, specifically, the cloud server determines whether the main processor is configured with a discrete key before leaving a factory according to the version information, and if the version information includes a discrete key identifier, it is determined that the main processor is configured with the discrete key before leaving the factory, and the main processor has the function of encrypted communication and does not need to be upgraded; and if the version information does not contain the discrete key identification, determining that the discrete key is not configured before the main processor leaves the factory, and the main processor does not have the function of encrypted communication. Here, the discrete key refers to a key dispersed in a plurality of storage areas in the main processor. And the cloud processor sends the upgrading file corresponding to the encrypted communication to the main processor after determining that the main processor does not have the encrypted communication function, and the main processor further upgrades according to the upgrading file corresponding to the encrypted communication.
EXAMPLE seven
Fig. 7 is a schematic flowchart of a processor upgrading method according to a seventh embodiment of the present invention, and as shown in fig. 7, an execution main body of the processor upgrading method according to the present embodiment is a processor upgrading system, and the processor upgrading method according to the present embodiment includes the following steps:
in step 201, a cloud server receives an upgrade request sent by a user.
Referring to fig. 8, the processor upgrading system includes a cloud server and a processor upgrading device, where the processor upgrading device includes at least one master processor and at least one slave processor, the master processor is communicatively connected to the slave processor, and further, the master processor and the slave processor communicate with each other through a communication interface. The cloud server is in communication connection with the processor upgrading device, specifically, the processor upgrading device comprises a communication module, and the cloud server is in communication with a main processor of the processor upgrading device through the communication module. The cloud server is also in communication connection with the user terminal and receives an upgrading request triggered by the user through the user terminal.
Step 202, the cloud server sends an upgrade file corresponding to the encrypted communication to the main processor.
In this embodiment, the cloud server sends the locally pre-stored upgrade file corresponding to the encrypted communication to the main processor in the processor upgrade device.
And step 203, the main processor upgrades according to the upgrade file corresponding to the encrypted communication so that the main processor has the encrypted communication function.
In this embodiment, the main processor receives the upgrade file corresponding to the encrypted communication sent by the cloud server through the communication module, and further, the main processor performs automatic upgrade according to the upgrade file corresponding to the encrypted communication, so that the upgraded main processor has a function of encrypted communication.
And step 204, the master processor sends the upgrade file corresponding to the encrypted communication to the slave processor.
In this embodiment, the master processor sends the upgrade file corresponding to the encrypted communication to the slave processor through the communication interface.
And step 205, upgrading the slave processor according to the upgrade file corresponding to the encrypted communication so that the slave processor has the encrypted communication function.
In this embodiment, the slave processor receives the upgrade file corresponding to the encrypted communication sent by the master processor through the communication interface, and the slave processor performs upgrade according to the upgrade file corresponding to the encrypted communication, so that the upgraded slave processor has the function of encrypted communication. The upgraded master processor and slave processor have the encryption communication function, and when the master processor and slave processor perform data transmission later, data can be encrypted, so that the security of the data is ensured.
In this embodiment, the master processor and the slave processor can be automatically upgraded to the processors with the encryption communication function, and the encryption communication function can be realized without replacing hardware, so that not only is the cost saved, but also the labor is saved.
Optionally, before step 202, the method further includes:
in step 202a, the cloud server sends a version information acquisition request to the main processor.
In this embodiment, the cloud server generates a version information acquisition request after receiving an upgrade request triggered by a user through a user terminal, and sends the version information acquisition request to the main processor.
In step 202b, the main processor sends the version information to the cloud server according to the version information acquisition request.
In this embodiment, the main processor receives the version information acquisition request and then sends the version information to the cloud server.
And step 202c, the cloud server determines whether the main processor has the function of encrypted communication according to the version information, and if not, the step 202 is executed.
In this embodiment, the cloud server determines whether the main processor has a function of encrypted communication after receiving the version information, specifically, the cloud server determines whether the main processor has been configured with a discrete key before leaving a factory according to the version information, and if the version information includes a discrete key identifier, it determines that the main processor has been configured with the discrete key before leaving the factory, and the main processor has the function of encrypted communication and does not need to be upgraded; and if the version information does not contain the discrete key identification, determining that the discrete key is not configured before the main processor leaves the factory, and the main processor does not have the function of encrypted communication. Here, the discrete key refers to a key dispersed in a plurality of storage areas in the main processor. And the cloud processor sends the upgrading file corresponding to the encrypted communication to the main processor after determining that the main processor does not have the encrypted communication function, and the main processor further upgrades according to the upgrading file corresponding to the encrypted communication.
Example eight
Fig. 9 is a schematic structural diagram of a processor upgrade apparatus according to an eighth embodiment of the present invention.
The device provided by the invention comprises at least one master processor and at least one slave processor; the main processor is used for receiving the upgrade file corresponding to the encrypted communication sent by the cloud server, upgrading according to the upgrade file corresponding to the encrypted communication so that the main processor has an encrypted communication function, and sending the upgrade file corresponding to the encrypted communication to the slave processor; and the slave processor is used for upgrading according to the upgrading file corresponding to the encrypted communication so as to enable the slave processor to have the encrypted communication function.
Referring to fig. 9, the processor upgrading apparatus in this embodiment at least includes a master processor and a slave processor, where the master processor and the slave processor communicate via a communication interface, where the communication interface includes a Universal Asynchronous Receiver/Transmitter (UART), an I2C bus (Inter-Integrated Circuit), a Serial Peripheral interface (spi) (Serial Peripheral interface), and a Universal Serial bus (usb) (Universal Serial bus). The communication interface is not limited to the above interface. The processor upgrading device is further in communication connection with the cloud server, specifically, the processor upgrading device further comprises a communication module, the main processor is in communication with the cloud server through the communication module, the cloud server sends upgrading files corresponding to encrypted communication to the processor upgrading device, and the main processor receives the upgrading files corresponding to the encrypted communication sent by the cloud server through the communication module.
In this embodiment, the master processor performs upgrading according to the upgrade file corresponding to the encrypted communication, the master processor that succeeds in upgrading has an encryption function, and the master processor sends the upgrade file corresponding to the encrypted communication to the slave processor through the communication interface. The slave processor receives the upgrading file corresponding to the encrypted communication sent by the master processor through the communication interface, upgrades according to the upgrading file corresponding to the encrypted communication, and the upgraded slave processor has a specific encrypted communication function.
In this embodiment, the master processor and the slave processor can be automatically upgraded to the processors with the encryption communication function, and the encryption communication function can be realized without replacing hardware, so that not only is the cost saved, but also the labor is saved.
Optionally, the master processor is further configured to determine whether the slave processor is successfully upgraded, and if so, enable the encrypted communication protocol, and control the slave processor to enable the encrypted communication protocol.
In this embodiment, the master processor further determines whether the slave processor is successfully upgraded, and if the master processor determines that the slave processor is successfully upgraded, the encryption protocol may be enabled, specifically, the master processor enables the encryption communication protocol, and the master processor controls the slave processor to start the encryption communication protocol.
Optionally, the master processor, when controlling the slave processor to enable the encrypted communication protocol, is specifically configured to: and sending an encryption communication starting instruction to the slave processor so that the slave processor starts the encryption communication protocol according to the encryption communication starting instruction.
In this embodiment, the master processor sends an encryption starting communication instruction to the slave processor through the communication interface, the slave processor receives the encryption starting communication instruction sent by the master processor through the communication interface, the slave processor starts an encryption communication protocol according to the encryption starting communication instruction, after the encryption communication protocol is started, the master processor and the slave processor send encrypted data to each other, the encryption algorithm may be symmetric encryption or asymmetric inking, and the encryption algorithm includes advanced encryption standard AES, symmetric key encryption algorithm DES, block cipher algorithm TEA, and the like.
Optionally, when determining whether the slave processor is upgraded successfully, the master processor is specifically configured to: sending an upgrade query request to the slave processor so that the slave processor sends upgrade query feedback information to the master processor according to the query request; and determining whether the processor is upgraded successfully according to the upgrade inquiry feedback information.
In this embodiment, the master processor sends an upgrade query request to the slave processor through the communication interface, the slave processor receives the upgrade query request sent by the master processor through the communication interface, and the slave processor sends upgrade query feedback information to the master processor according to the upgrade query request, where the upgrade query feedback information includes current firmware version information of the slave processor and an encryption algorithm identifier corresponding to the slave processor. The master processor receives upgrade inquiry feedback information sent by the slave processor through the communication interface, and further determines whether the processor is upgraded successfully according to the upgrade inquiry feedback information.
Optionally, when determining whether the processor is successfully upgraded according to the upgrade query feedback information, the main processor is specifically configured to: analyzing the feedback information to obtain the current firmware version information of the slave processor and the encryption algorithm identification corresponding to the slave processor; if so, matching the current firmware version information corresponding to the slave processor with the current firmware information corresponding to the master processor, and matching the encryption algorithm identification corresponding to the slave processor with the encryption algorithm identification corresponding to the master processor; and if the current firmware version information corresponding to the slave processor is matched with the current firmware information corresponding to the master processor and the encryption algorithm identifier corresponding to the slave processor is matched with the encryption algorithm identifier corresponding to the master processor, determining that the slave processor is upgraded successfully.
In this embodiment, the master processor parses the feedback information to obtain the current firmware version information of the processor and the encryption algorithm identifier corresponding to the slave processor. The current firmware version information includes a current software version number, a hardware version number, a serial number, a chip number, and the like. The encryption algorithm identification means that each encryption algorithm has the corresponding encryption algorithm identification.
And the master processor matches the current firmware version information corresponding to the slave processor with the current firmware version information corresponding to the master processor, further matches the encryption algorithm identifier corresponding to the slave processor with the encryption algorithm identifier corresponding to the master processor, and determines whether the slave processor is upgraded successfully according to the matching result. And if the current firmware version information corresponding to the slave processor is matched with the firmware version information corresponding to the master processor, the slave processor and the master processor are illustrated, and the encryption algorithm identifier corresponding to the slave processor is matched with the encryption algorithm identifier corresponding to the master processor, and the master processor determines that the slave processor is successfully upgraded.
Optionally, the main processor is configured to send the version information to the cloud server, so that the cloud server sends the upgrade file corresponding to the encrypted communication after determining that the main processor does not have the encrypted communication function according to the version information.
In this embodiment, the main process is configured to send version information to the cloud server, the cloud server receives the version information, and determines whether the main processor has a function of encrypted communication according to the version information, specifically, the cloud server determines whether the main processor has been configured with a discrete key before leaving a factory according to the version information, and if the version information includes a discrete key identifier, it is determined that the main processor has been configured with the discrete key before leaving the factory, and the main processor has the function of encrypted communication and does not need to be upgraded; and if the version information does not contain the discrete key identification, determining that the discrete key is not configured before the main processor leaves the factory, and the main processor does not have the function of encrypted communication. Here, the discrete key refers to a key dispersed in a plurality of storage areas in the main processor. And the cloud processor sends the upgrading file corresponding to the encrypted communication to the main processor after determining that the main processor does not have the encrypted communication function, and the main processor further upgrades according to the upgrading file corresponding to the encrypted communication.
Fig. 10 is a first block diagram of an electronic device for implementing a processor upgrade method according to an embodiment of the present invention, where, as shown in fig. 10, the electronic device 300 includes: a memory 301, a processor 302, and an input device 303, the processor 302 comprising: at least one master processor and at least one slave processor.
The processor 302, the memory 301 and the input device 303 are interconnected through a circuit;
the memory 301 stores computer-executable instructions;
the processor executes 302 the computer executable instructions stored by the memory to cause the processor to perform the method provided by any of the embodiments described above.
Fig. 11 is a second block diagram of an electronic device, such as a computer, a digital broadcast terminal, a messaging device, a tablet device, a personal digital assistant, a server cluster, etc., for implementing the processor upgrade method of an embodiment of the present invention, as shown in fig. 11.
Electronic device 400 may include one or more of the following components: processing component 402, memory 404, power component 406, input/output (I/O) interface 408, sensor component 410, and communication component 412.
The processing component 402 generally controls overall operation of the electronic device 400, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 402 may include one or more communication components 414 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 402 can include one or more modules that facilitate interaction between the processing component 402 and other components.
The memory 404 is configured to store various types of data to support operations at the electronic device 400. Examples of such data include instructions for any application or method operating on the electronic device 400, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 404 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power supply component 406 provides power to the various components of the electronic device 400. Power components 406 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for electronic device 400.
The I/O interface 408 provides an interface between the processing component 402 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
Sensor assembly 410 includes one or more sensors for providing various aspects of status assessment for electronic device 400. For example, the sensor component 410 may detect an open/closed state of the electronic device 400, the relative positioning of components, such as a display and keypad of the electronic device 400, the sensor component 410 may also detect a change in the position of the electronic device 400 or a component of the electronic device 400, the presence or absence of user contact with the electronic device 400, orientation or acceleration/deceleration of the electronic device 400, and a change in the temperature of the electronic device 400. The sensor assembly 410 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 410 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 410 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 412 is configured to facilitate wired or wireless communication between the electronic device 400 and other devices. The electronic device 400 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 412 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 412 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the electronic device 400 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a computer-readable storage medium comprising instructions, such as the memory 404 comprising instructions, executable by the communication component 414 of the electronic device 400 to perform the above-described method is also provided. For example, the computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
In an exemplary embodiment, a computer-readable storage medium is also provided, in which computer-executable instructions are stored, the computer-executable instructions being executed by a processor to perform the method in any one of the above-mentioned embodiments.
In an exemplary embodiment, a computer program product is also provided, comprising a computer program for execution by a processor of the method in any of the above embodiments.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This invention is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (15)

1. A processor upgrade method for a processor upgrade apparatus, the apparatus comprising at least one master processor and at least one slave processor, the method comprising:
the main processor receives an upgrade file corresponding to encrypted communication sent by a cloud server;
the master processor upgrades according to the upgrade file corresponding to the encrypted communication so that the master processor has an encrypted communication function, and sends the upgrade file corresponding to the encrypted communication to the slave processor;
and the slave processor is upgraded according to the upgrade file corresponding to the encrypted communication so as to enable the slave processor to have the encrypted communication function.
2. The method of claim 1, wherein after sending the upgrade file corresponding to the encrypted communication to the slave processor, further comprising:
the master processor determines whether the slave processor is upgraded successfully;
and if the slave processor is upgraded successfully, the master processor enables an encryption communication protocol, and the master controller controls the slave processor to enable the encryption communication protocol.
3. The method of claim 2, wherein the master controller controls the slave processors to enable an encrypted communication protocol, comprising:
the master processor sends an encryption communication starting instruction to the slave processor;
and the slave processor enables an encryption communication protocol according to the encryption communication starting instruction.
4. The method of claim 3, wherein the master processor determines whether the slave processor was successfully upgraded, further comprising:
the master processor sends an upgrading inquiry request to the slave processor;
the slave processor sends upgrading query feedback information to the master processor according to the query request;
and the main processor determines whether the processor is upgraded successfully according to the upgrade inquiry feedback information.
5. The method of claim 4, wherein the determining, by the main processor, whether the processor is upgraded successfully according to the upgrade query feedback information comprises:
the master processor analyzes the feedback information to obtain the current firmware version information of the slave processor and the encryption algorithm identification corresponding to the slave processor;
the master processor matches the current firmware version information corresponding to the slave processor with the current firmware information corresponding to the master processor, and matches the encryption algorithm identification corresponding to the slave processor with the encryption algorithm identification corresponding to the master processor;
and if the current firmware version information corresponding to the slave processor is matched with the current firmware information corresponding to the master processor and the encryption algorithm identifier corresponding to the slave processor is matched with the encryption algorithm identifier corresponding to the master processor, the master processor determines that the slave processor is upgraded successfully.
6. The method of claim 1, wherein before the main processor receives the upgrade file corresponding to the encrypted communication sent by the cloud server, the method further comprises:
the main processor sends version information to the cloud server so that the cloud server can send an upgrade file corresponding to encrypted communication after determining that the main processor does not have an encrypted communication function according to the version information.
7. A processor upgrade apparatus, characterized in that the apparatus comprises at least one master processor and at least one slave processor;
the main processor is used for receiving the upgrade file corresponding to the encrypted communication sent by the cloud server, upgrading according to the upgrade file corresponding to the encrypted communication so that the main processor has an encrypted communication function, and sending the upgrade file corresponding to the encrypted communication to the slave processor;
and the slave processor is used for upgrading according to the upgrading file corresponding to the encrypted communication so as to enable the slave processor to have the encrypted communication function.
8. The apparatus of claim 7, wherein the master processor is further configured to determine whether the slave processor is successfully upgraded, and if so, enable the encrypted communication protocol, and control the slave processor to enable the encrypted communication protocol.
9. The apparatus according to claim 8, wherein the master processor, when controlling the slave processor to enable the encrypted communication protocol, is specifically configured to:
and sending an encryption communication starting instruction to the slave processor so that the slave processor enables an encryption communication protocol according to the encryption communication starting instruction.
10. The apparatus as claimed in claim 7, wherein the master processor, when determining whether the slave processor is successfully upgraded, is specifically configured to:
sending an upgrade query request to the slave processor so that the slave processor sends upgrade query feedback information to the master processor according to the query request;
and determining whether the processor is upgraded successfully according to the upgrade inquiry feedback information.
11. The apparatus of claim 10, wherein the main processor, when determining whether the processor is successfully upgraded according to the upgrade query feedback information, is specifically configured to:
analyzing the feedback information to obtain the current firmware version information of the slave processor and the encryption algorithm identification corresponding to the slave processor;
if so, matching the current firmware version information corresponding to the slave processor with the current firmware information corresponding to the master processor, and matching the encryption algorithm identification corresponding to the slave processor with the encryption algorithm identification corresponding to the master processor;
and if the current firmware version information corresponding to the slave processor is matched with the current firmware information corresponding to the master processor and the encryption algorithm identifier corresponding to the slave processor is matched with the encryption algorithm identifier corresponding to the master processor, determining that the slave processor is upgraded successfully.
12. The apparatus of claim 7, wherein the main processor is configured to send version information to the cloud server, so that the cloud server sends an upgrade file corresponding to encrypted communication after determining that the main processor does not have an encrypted communication function according to the version information.
13. An electronic device, comprising: a memory, a processor, and an input device; the processor includes: at least one master processor and at least one slave processor;
the processor, the memory and the input device are interconnected through a circuit;
the memory stores computer-executable instructions;
the input device is used for receiving data;
the processor executes computer-executable instructions stored by the memory, causing the processor to perform the method of any of claims 1-6.
14. A computer-readable storage medium having computer-executable instructions stored thereon, which when executed by a processor, perform the method of any one of claims 1-6.
15. A computer program product, characterized in that it comprises a computer program which, when being executed by a processor, carries out the method of any one of claims 1 to 6.
CN202110944662.4A 2021-08-17 2021-08-17 Processor upgrading method, device, equipment, storage medium and product Pending CN113656053A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110944662.4A CN113656053A (en) 2021-08-17 2021-08-17 Processor upgrading method, device, equipment, storage medium and product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110944662.4A CN113656053A (en) 2021-08-17 2021-08-17 Processor upgrading method, device, equipment, storage medium and product

Publications (1)

Publication Number Publication Date
CN113656053A true CN113656053A (en) 2021-11-16

Family

ID=78491803

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110944662.4A Pending CN113656053A (en) 2021-08-17 2021-08-17 Processor upgrading method, device, equipment, storage medium and product

Country Status (1)

Country Link
CN (1) CN113656053A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115173998A (en) * 2022-07-05 2022-10-11 浙江中控技术股份有限公司 Multiprocessor interactive communication method, system and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103517448A (en) * 2012-07-16 2014-01-15 Tcl集团股份有限公司 Software upgrading method and system based on WiFiDirect
US20160285872A1 (en) * 2011-10-04 2016-09-29 Electro Industries/Gauge Tech Intelligent electronic devices, systems and methods for communicating messages over a network
CN107920074A (en) * 2017-11-17 2018-04-17 成都天翼空间科技有限公司 A kind of SDK automatically updating methods, terminal device and main control server
CN108182080A (en) * 2017-12-28 2018-06-19 重庆德科电子仪表有限公司 A kind of method of automobile instrument software upgrading
CN108260122A (en) * 2016-12-28 2018-07-06 沈阳美行科技有限公司 A kind of method, apparatus and related system obtained and transmit navigation upgrading data packet
CN108491222A (en) * 2018-03-27 2018-09-04 青岛海信智慧家居***股份有限公司 Gateway device upgrade method, device, gateway device and storage medium
CN111949293A (en) * 2020-08-06 2020-11-17 曙光信息产业(北京)有限公司 Firmware upgrading method and device, computer equipment and storage medium
CN112104619A (en) * 2020-08-27 2020-12-18 西南大学 Data access control system and method based on outsourcing ciphertext attribute encryption
CN112329000A (en) * 2020-07-22 2021-02-05 深圳Tcl新技术有限公司 Device verification method, master control device, controlled device and readable storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160285872A1 (en) * 2011-10-04 2016-09-29 Electro Industries/Gauge Tech Intelligent electronic devices, systems and methods for communicating messages over a network
CN103517448A (en) * 2012-07-16 2014-01-15 Tcl集团股份有限公司 Software upgrading method and system based on WiFiDirect
CN108260122A (en) * 2016-12-28 2018-07-06 沈阳美行科技有限公司 A kind of method, apparatus and related system obtained and transmit navigation upgrading data packet
CN107920074A (en) * 2017-11-17 2018-04-17 成都天翼空间科技有限公司 A kind of SDK automatically updating methods, terminal device and main control server
CN108182080A (en) * 2017-12-28 2018-06-19 重庆德科电子仪表有限公司 A kind of method of automobile instrument software upgrading
CN108491222A (en) * 2018-03-27 2018-09-04 青岛海信智慧家居***股份有限公司 Gateway device upgrade method, device, gateway device and storage medium
CN112329000A (en) * 2020-07-22 2021-02-05 深圳Tcl新技术有限公司 Device verification method, master control device, controlled device and readable storage medium
CN111949293A (en) * 2020-08-06 2020-11-17 曙光信息产业(北京)有限公司 Firmware upgrading method and device, computer equipment and storage medium
CN112104619A (en) * 2020-08-27 2020-12-18 西南大学 Data access control system and method based on outsourcing ciphertext attribute encryption

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115173998A (en) * 2022-07-05 2022-10-11 浙江中控技术股份有限公司 Multiprocessor interactive communication method, system and storage medium

Similar Documents

Publication Publication Date Title
RU2636524C2 (en) Method, device and system of administration communication control between account and device
US20200374686A1 (en) Embedded Universal Integrated Circuit Card Profile Management Method and Apparatus
CN107819572B (en) Command transmission method and device and electronic equipment
KR20160003992A (en) METHOD AND APPARATUS FOR PROFILE DOWNLOAD FOR eUICC
US11228901B2 (en) Method for installing subscriber profile and electronic device therefor
CN109995876B (en) File transmission method, device, system and computer storage medium
CN105119790A (en) Apparatus control method and device
CN104320774A (en) Updating method, device and facility
JP2023509896A (en) DEVICE SHARING METHODS AND ELECTRONIC DEVICES
CN105094904A (en) Application program installation method and device
CN105228141A (en) A kind of methods, devices and systems set up network and connect
CN113238763A (en) Application deployment method, device, storage medium and program product
EP3619633A1 (en) Method for providing service update and electronic device supporting the same
CN105631254A (en) Unlocking method and unlocking device
US11394534B2 (en) Electronic device sharing key with external electronic device and operating method for electronic device
CN105426210A (en) Method and device for upgrading system
CN113656053A (en) Processor upgrading method, device, equipment, storage medium and product
KR102545127B1 (en) Electronic device for managing application associated with a key of external electronic device and the method for the same
CN107733674B (en) Component upgrading method and terminal
CN110865823B (en) Pre-installation application control method, pre-installation application control device and storage medium
CN111699489A (en) Electronic device, information processing apparatus, information processing method, program, and information processing system
CN105099758A (en) Methods and devices for transmitting update data package
US10019604B2 (en) Method and apparatus of verifying terminal and medium
CN113178906A (en) Charging method, charging device, electronic device and storage medium
CN112947970A (en) Upgrading method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20211116

RJ01 Rejection of invention patent application after publication