CN100596057C - Method and system for secure update of terminals in a large range - Google Patents

Method and system for secure update of terminals in a large range Download PDF

Info

Publication number
CN100596057C
CN100596057C CN200610109596.4A CN200610109596A CN100596057C CN 100596057 C CN100596057 C CN 100596057C CN 200610109596 A CN200610109596 A CN 200610109596A CN 100596057 C CN100596057 C CN 100596057C
Authority
CN
China
Prior art keywords
terminal
security update
scs
security
sca
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN200610109596.4A
Other languages
Chinese (zh)
Other versions
CN101127591A (en
Inventor
贾科
姬长锋
位继伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN200610109596.4A priority Critical patent/CN100596057C/en
Publication of CN101127591A publication Critical patent/CN101127591A/en
Application granted granted Critical
Publication of CN100596057C publication Critical patent/CN100596057C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The utility model discloses a safe update method for terminals over large range, which comprises: A, SCS ensures the execution delay time of the compulsive safe update instruction which is corresponding to each terminal controlled by the SCS; B, when SCS ensures that carrying out safe update for terminals over large range is needed, SCS controls each terminal to carry out safe update according tothe corresponding execution delay time of the compulsive safe update instruction. The utility model also discloses a safe update system for a large range of terminals, which comprises, an SCS and terminals controlled by the SCS; the SCS is used for ensuring the execution delay time of the compulsive safe update instruction which is corresponding to each terminal controlled by the SCS, and controlling each terminal to carry out safe update according to the corresponding execution delay time of the compulsive safe update instruction when the SCS ensures that the safe update for a large range ofterminals is needed; the terminal is used for safe update. With the technical proposal, the utility model has the advantages that the network congestion caused by carrying out safe update for a largerange of terminals is decreased.

Description

To the method and system of secure update of terminal on a large scale
Technical field
The present invention relates to the network security technology field, especially relate to the method and system of secure update of terminal on a large scale.
Background technology
In order to guarantee network security, from the network security threats that the source antagonism is brought by dangerous terminal, associated response system (CRS) provides the multi-level safety control device that controls to application service control from network insertion.
As shown in Figure 1, main entity comprises among the CRS that proposes in ITU-T X.CRS motion: the security association server (SCS) of the security correlative agent of end side (SCA), network side, the network insertion controller (NAC) of network side and application service controller (ASC).SCA and SCS have constituted the core of associated reaction system.
Wherein, SCA is responsible for the security related information of collection terminal, it is handled generating security related information (SCI) report, and this report is reported SCS.After SCS received the SCI report that SCA sends, the security related information of collecting by SCA was assessed the safe condition and the safe class of terminal, and whether the safe condition of terminal is allowed to accesses network and the various application services of application.SCS is according to assessment result, and indication NAC or ASC do suitable control to the access to netwoks and the application access of terminal, and SCS also can be with the control advisory SCA to terminal.
When being fit to the security update information of terminal, carry out patch, assembly or the safety-relevant applications software of self operating system update if any being fit to terminal, perhaps during the lastest imformation of these patches, assembly or software, SCS can notify SCA to assist terminal to upgrade accordingly or upgrade.Security update information is at the security update server, for example on the Secure Application software server (SAS-S) shown in Fig. 1, the terminal operating system update service device (TOS-VS), after SCA receives the update instruction of SCS, obtain security update information according to the security update server info control terminal in the instruction to corresponding security update server and carry out security update.
In said method, the terminal in if same security update information is suitable on a large scale, then SCS sends the security update instruction with each terminal on a large scale, terminal is after receiving the security update instruction, promptly obtain lastest imformation to the security update server, tend to because great amount of terminals is initiated security update simultaneously, cause towards the network path of security update server congested, even since traffic carrying capacity increase suddenly sharply the paralysis that causes the security update server; In addition,, also caused the unexpected increasing of network traffics, increased system burden, and can cause network congestion because SCS sends the security update instruction respectively at each terminal.
Summary of the invention
In view of this, main purpose of the present invention is to provide to the method and system of secure update of terminal on a large scale, can realize the security update to terminal on a large scale, and reduce network congestion.
First aspect for achieving the above object the invention provides a kind ofly to the method for secure update of terminal on a large scale, and this method comprises:
Security correlative agent SCA on A, each terminal sends the terminal security relevant information to security association server S CS; Described SCS determines the safe class of terminal according to the terminal security relevant information that receives, and determines the pressure security update instruction execution lag time of each terminal correspondence according to the safe class of terminal;
B, when SCS determines to implement the security update of terminal on a large scale, control each terminal and carry out according to the pressure security update instruction of correspondence and postpone to carry out security update lag time.
Preferably, in the described steps A, SCS is further according to security service, network traffics or the bandwidth of customization, or above combination in any determines that the pressure security update instruction of each terminal correspondence carries out lag time.
Preferably, further comprise behind the described step B:
After terminal was finished security update, the SCA on the terminal sent new security related information to SCS immediately, and SCS carries out lag time according to the pressure security update instruction that the new security related information that receives redefines this terminal correspondence, returns execution in step B then.
Described step B can comprise:
B11, SCS carry out this instruction the SCA that is handed down to lag time on the counterpart terminal after lag time is carried out in the pressure security update instruction of each terminal correspondence of determining its control;
B12, when SCS determines to implement the security update of terminal on a large scale, the SCA on described each terminal sends and forces the security update instruction;
B13, SCA receive to force the security update instruction, and carry out according to the instruction that SCS issues and to postpone triggering terminal lag time and carry out security update.
Described step B can also comprise:
After B21, SCS determine that lag time is carried out in the pressure security update instruction of each terminal correspondence of its control, in self, preserve pressure security update instruction and carry out lag time for each terminal;
B22, determine to implement when terminal security upgrades on a large scale as SCS, carry out the SCA that postpones lag time on this terminal of correspondence according to the described instruction of each terminal correspondence and send and force the security update instruction;
B23, receive and force the SCA triggering terminal of security update instruction to carry out security update.
Preferably, comprise the security update project information in the described pressure security update instruction, SCA triggers described terminal carry out security update before, judge according to described security update project information whether terminal has carried out described renewal, if then finish this flow process; Otherwise, carry out the step that described triggering terminal is carried out security update.
Preferably, the digital signature that comprises SCS in the described pressure security update instruction;
Described SCA receives and forces further to comprise after the security update instruction: the digital signature to described SCS is verified, if the verification passes, then carries out described subsequent step; Otherwise finish this flow process, or after information from the indicator mistake to SCS that return, finish this flow process.
Preferably, if terminal off-line before carrying out security update among the step B13, then after reaching the standard grade once more, described SCS determines to force security update instruction execution lag time for this terminal again, and this time is handed down to SCA on the terminal; Described SCA carries out with the pressure security update instruction of new reception and substitutes original pressure security update instruction execution lag time lag time, returns execution in step B12 then.
Preferably, among the described step B12, SCS sends pressure security update instruction by the SCA of mode on described each terminal of broadcasting.
Described step B also can comprise:
B31, SCS will carry out for the pressure security update instruction that each terminal is determined and be handed down to the network access controller that this terminal connects lag time after lag time is carried out in the pressure security update instruction of each terminal correspondence of determining its control;
B32, when SCS determines to implement the security update of terminal on a large scale, send to described network access controller and to force the security update instruction;
B33, receive the network access controller of forcing the security update instruction and carry out lag time, postpone to initiate security update each terminal according to the described instruction of each terminal correspondence.
Preferably, among the described step B33, the network access controller initiation to the security update of this terminal is:
After the access request that receives from this terminal, this request is redirected to the security update server.
Second aspect for achieving the above object the invention provides a kind ofly to the system of secure update of terminal on a large scale, and this system comprises: the terminal of SCS and this SCS control comprises SCA on the described terminal;
Described SCA is used for the security related information to described SCS reporting terminal;
Described SCS is used for determining according to the described security related information that SCA reports the safe class of this SCA counterpart terminal, and determine that according to safe class the pressure security update instruction of counterpart terminal carries out lag time, and when determining the security update that to implement terminal on a large scale, control each terminal and carry out according to the pressure security update instruction of correspondence and postpone to carry out security update lag time;
Described terminal is used to carry out security update.
Preferably, the pressure security update instruction of each terminal correspondence of its control that SCS further will determine is carried out and is handed down to corresponding SCA lag time, and, send pressure security update instruction to each SCA according to the security update information that the terminal of determining is on a large scale forced Update Level;
Described SCA is further used for according to the pressure security update instruction that receives and forces the security update instruction to be carried out to postpone triggering terminal lag time carrying out security update.
Preferably, described SCS sends with the SCA of broadcast mode in this SCS control range and forces the security update instruction.
Further can comprise in this system: network access controller;
The pressure security update instruction of each terminal correspondence of its control that described SCS further will determine is carried out and is handed down to corresponding network access controller lag time, and, send pressure security update instruction to described network access controller according to the security update information that the terminal of determining is on a large scale forced Update Level;
Described network access controller is used for carrying out lag time according to the pressure security update instruction that receives according to the described instruction of each terminal correspondence, postpones the security update of initiation to each terminal.
Preferably, described SCS is further used for preserving the pressure security update instruction execution lag time of described each terminal correspondence in self; And when determining the security update that to implement terminal on a large scale, carry out according to the described instruction of each terminal correspondence and to postpone each terminal of subtend lag time and send and force security update instruction; Described terminal is carried out security update according to the described pressure security update instruction that receives.
From such scheme as can be seen, among the present invention, SCS determines the pressure security update instruction execution lag time of each terminal correspondence of its control, when SCS determines to implement the security update of terminal on a large scale, control each terminal and carry out security update according to pressure security update instruction execution delay lag time of correspondence, thereby prevented that all terminals are initiated to upgrade to the security update server at synchronization, have reduced network congestion when the security update of implementing terminal on a large scale;
Also determine the terminal security grade among the present invention according to the security related information of terminal, and determine to force security update to instruct according to the safe class of terminal and carry out lag time, force the security update instruction to carry out weak point lag time as the low terminal of safe class, thereby make the terminal that needs most renewal to carry out security update as early as possible, more effectively reduced security breaches;
And then among the present invention, SCS sends to controlled SCA by broadcast mode and forces the security update instruction, sends to controlled SCA one by one with respect to SCS and forces the security update instruction, greatly reduces the burden of system.
Description of drawings
Fig. 1 forms schematic diagram for the CRS system;
Fig. 2 for the present invention to the overview flow chart of secure update of terminal method on a large scale;
Fig. 3 for the present invention to the flow chart of secure update of terminal method specific embodiment on a large scale;
Fig. 4 forms schematic diagram for the present invention to the system of secure update of terminal on a large scale.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, the present invention is described in further detail below in conjunction with accompanying drawing.
The present invention is primarily aimed at the security update of particular importance, and this security update need force terminal to be carried out on a large scale.Main thought of the present invention is, SCS determines the pressure security update instruction execution lag time of each terminal correspondence of its control, when SCS determines to implement the security update of terminal on a large scale, control each terminal and carry out according to the pressure security update instruction of correspondence and postpone to carry out security update lag time.
The overall procedure of the inventive method specifically comprises the steps: as shown in Figure 2
Step 201, SCS determine the pressure security update instruction execution lag time of each terminal correspondence of its control;
Step 202, when SCS determines to implement the security update of terminal on a large scale, control each terminal and carry out according to the pressure security update instruction of correspondence and postpone to carry out security update lag time.
The specific implementation of step 202 can be, SCS is after the security related information report that receives SCA on the self terminal, and the pressure security update instruction of this SCA correspondence that will determine when SCA returns response is carried out and is handed down to SCA lag time; After this, when SCS determines to implement the renewal of terminal pressure on a large scale, send pressure security update instruction to each SCA of this SCS control, SCA receives and forces the security update instruction, carry out lag time according to the pressure security update instruction that receives, the terminal that postpones the control place is initiated security update to the security update server of correspondence; In this case, SCS can be subjected to the SCA transmission of this SCS control to force security update to be instructed to all by the mode of broadcasting.
The specific implementation of step 202 also can be that SCS issues by the control strategy to network access controller, and is set the pressure security update instruction execution lag time of each terminal correspondence of its control in network access controller; When SCS determines to implement the renewal of terminal pressure on a large scale, sent by network access controllers of this SCS control to all and force security update to be instructed; Network access controller is carried out according to the pressure security update instruction of each terminal correspondence and is postponed lag time to carry out following processing: if receive the network access request of self terminal, then this network access request heavily is directed to the security update server, the security update server sends to terminal with the above-mentioned security update information that need execute and carries out security update.
The specific implementation of step 202 can also be, SCS saves as the pressure security update instruction execution lag time that the SCA on each terminal determines in self, when SCS determines to implement the renewal of terminal pressure on a large scale, lag time is carried out in pressure security update instruction according to each SCA correspondence, postpones to send the pressure update instruction to this SCA; Receive the SCA triggering terminal of forcing update instruction and initiate security update to the security update server of correspondence.
Below by specific embodiment the inventive method is elaborated.
The flow process of specific embodiments of the invention specifically comprises the steps: as shown in Figure 3
Step 301, SCA send the security related information report to SCS.
In the CRS system in ITU-T X.CRS motion, the SCA on the terminal can report to SCS by sending SCI when terminal is connected to network, inform the safe condition of terminal.In follow-up process, the safety control strategy that SCA issues according to SCS except meeting requires to send the SCI report, and when the safe condition of terminal changed, SCA needed to send new SCI and reports to SCS.
Step 302, SCS issue the SCA safety control strategy and reply SCI report response, predetermined pressure security update instruction carried out to be included in the SCA safety control strategy lag time be handed down to SCA, after then receiving this safety control strategy, SCA forces the security update instruction to carry out timer according to forcing the security update instruction to carry out setting lag time, and timing is carried out lag time for the pressure security update instruction of reception.
In this step, SCS can determine the pressure security update instruction execution lag time of this SCA then according to the safe class of assessing terminal from the SCI report analysis of SCA according to safe class; For example, it is short more that lag time is carried out in the low more pressure security update instruction of user's safe class.SCS mainly determines that according to user's safe class above-mentioned instruction carries out lag time, in addition, SCS can also be further according to security service, network traffics or the bandwidth of customization, or above combination in any determines that the pressure security update instruction of this SCA correspondence carries out lag time.Network traffics here and bandwidth can comprise the network traffics or the bandwidth of core net, and the security update server network traffics or the bandwidth that can bear.In addition, forcing the security update instruction to be carried out can if this value is 0, shows after SCA receives the pressure update instruction and carry out this instruction immediately since 0 lag time.
Step 303, SCS determine when terminal is forced the security update information of Update Level on a large scale, and the security update instruction is forced in the SCA broadcasting on all controlled terminals, comprises the digital signature of SCS in this instruction.
In the present embodiment, in SCS, preestablish security strategy, can determine the severity level of security update information according to this security strategy SCS.When on the security update server new security update being arranged, the security update server sends to SCS with security update information, SCS determines the severity level of security update information according to security strategy, if determining the severity level of this security update information, SCS reaches when terminal is forced the degree of renewal on a large scale, SCS will give the whole network user by broadcast mode, and promptly the SCA on all controlled terminals sends and forces the security update instruction.
Force the security update instruction can be by expressly sending, but comprise the digital signature of SCS in the instruction, thus the integrality and the source authenticity of the pressure security update instruction that makes SCA to trust to be received.Specifically can comprise the security update project information in this pressure security update instruction, as upgrading classification, refresh routine title and update service device information etc.
Step 304, SCA verify digital signature after receiving and forcing update instruction judge whether the SCS that sends this instruction can trust, if then execution in step 305; Otherwise abandon this security update instruction, or further return the information of indicator mistake, finish this flow process then to SCS.
Security update project information in step 305, the SCA reading command, mounted security update program on security update project information and the terminal is compared, judge whether terminal has installed this security update,, then finish this security update flow process if install; Otherwise, execution in step 306.
Here, if judge install after, though finish this security update flow process, but the security strategy that SCA issues according to SCS, still can report the SCI report to SCS, SCS will carry out according to SCI report generation pressure security update instruction once more and be handed down to this SCA lag time, then this SCA carries out according to new pressure security update instruction and resets the timing that timer is carried out in corresponding pressure security update instruction lag time, and forces security update instruction back to carry out above-mentioned steps 304 and step thereafter receiving once more.
Step 306, SCA activate the pressure security update instruction that is provided with in the described step 302 and carry out timer, and after timer makes zero, the SCA triggering terminal sends update request according to the security update project information to the security update server, triggering security update operation is obtained security update information and is carried out security update.
In the present embodiment, SCA also can carry out to set lag time and activate according to the pressure security update instruction that receives in this step and force the security update instruction to carry out timer.
In this step, if terminal is before timer makes zero, owing to causing security update, reasons such as off-line do not carry out, after then terminal is reached the standard grade once more, SCA sends the SCI report to SCS, promptly re-execute step 301 and reach step thereafter, then in step 302 thereafter, SCA resets the timing of above-mentioned timer lag time according to the new pressure security update instruction execution that receives.
Step 307, after terminal is finished security update, variation has taken place in the safe condition that SCA determines terminal, immediately return execution in step 301, report new security related information to SCS, after this SCS will carry out according to SCI report generation pressure security update instruction once more and be handed down to this SCA lag time, this SCA carries out according to new pressure security update instruction and resets the timing of forcing security update instruction timer lag time, and forces security update instruction back to carry out above-mentioned steps 304 and step thereafter receiving once more.
More than the inventive method is illustrated, again system of the present invention is described below.
System to secure update of terminal on a large scale provided by the invention mainly comprises the terminal of SCS and this SCS control as shown in Figure 4; Wherein, SCS is used for the pressure security update instruction of each terminal correspondence of definite its control and carries out lag time, and when determining the security update that to implement terminal on a large scale, control each terminal and carry out according to the pressure security update instruction of correspondence and postpone to carry out security update lag time; Terminal is used to carry out security update.
SCS further can carry out the pressure security update instruction of each SCA correspondence of determining and be handed down to corresponding SCA lag time, and the security update information of forcing Update Level according to the terminal of determining on a large scale, send pressure security update instruction to each SCA, SCS can send by the SCA of broadcast mode in this SCS control range and force the security update instruction here; Then SCA is further according to the pressure security update instruction that receives with force the security update instruction to be carried out to postpone triggering terminal lag time to carry out security update.
Further comprise the security update server in this system, be used for providing security update information to terminal; Terminal and described security update server interaction are obtained security update information and are carried out security update.
In the system of the present invention, SCS can not be handed down to this time corresponding SCA after lag time is carried out in the pressure security update instruction of determining each SCA, but lag time is carried out in the pressure security update instruction of each SCA correspondence of preservation in self; Then after the security update information of determining the Update Level of terminal pressure on a large scale, SCS does not send to each SCA immediately and forces the security update instruction, but carry out lag time according to the pressure security update instruction of each SCA correspondence, postpone to send pressure security update instruction to SCA.
System of the present invention also can comprise SCS, terminal and network access controller, SCS is used for after lag time is carried out in the pressure security update instruction of determining each terminal the network access controller that sends to its connection lag time being carried out in this pressure security update instruction; Then network access controller receives the pressure update instruction that sends to terminal from SCS, and carries out the security update of delay initiation lag time to each terminal according to the pressure security update instruction of each terminal correspondence.Here network access controller initiate the security update of each terminal be: if receive network access request from this terminal, this network access request heavily is directed to the security update server, and the security update server sends to terminal with the above-mentioned security update information that need execute and carries out security update.
Further comprise the security update server in the system of the present invention, be used for the security update information of correspondence being handed down to terminal according to the update request of coming self terminal; Or the security update information of correspondence is handed down to the terminal of initiating network access request according to the network access request that heavily leads from network access controller; Terminal is upgraded according to the security update information and executing that receives.
SCA in the system of the present invention on terminal, the terminal, network access controller, security update server and SCS in carrying out prior art performed mutual, performed operating in the above-mentioned explanation to the inventive method all described in detail, below only be concise and to the point the description, the explanation with reference to the inventive method part in the specific implementation process gets final product.
Can be applied in the wireless communication system in the present invention, then above-mentioned terminal is a wireless terminal.And the security update server can be arranged in the external packet data network, also can be arranged on wireless core network inside, can also the mirror image server of security update server be set again in core net inside except that externally being provided with the security update server in the packet data network.By the inner security update server that is provided with of core net, or the mirror image server of security update server has reduced security update taking Internet resources according to from the update request of SCA terminal being carried out security update.
More than be explanation, in concrete implementation process, can carry out suitable improvement, to adapt to the concrete needs of concrete condition method of the present invention to the specific embodiment of the invention.Therefore be appreciated that according to the specific embodiment of the present invention just to play an exemplary role, not in order to restriction protection scope of the present invention.

Claims (16)

1, a kind of to the method for secure update of terminal on a large scale, it is characterized in that this method comprises:
Security correlative agent SCA on A, each terminal sends the terminal security relevant information to security association server S CS; Described SCS determines the safe class of terminal according to the terminal security relevant information that receives, and determines the pressure security update instruction execution lag time of each terminal correspondence according to the safe class of terminal;
B, when SCS determines to implement the security update of terminal on a large scale, control each terminal and carry out according to the pressure security update instruction of correspondence and postpone to carry out security update lag time.
2, method according to claim 1, it is characterized in that, in the described steps A, SCS is further according to security service, network traffics or the bandwidth of customization, or above combination in any determines that the pressure security update instruction of each terminal correspondence carries out lag time.
3, method according to claim 1 and 2 is characterized in that, further comprises behind the described step B:
After terminal was finished security update, the SCA on the terminal sent new security related information to SCS immediately, and SCS carries out lag time according to the pressure security update instruction that the new security related information that receives redefines this terminal correspondence, returns execution in step B then.
4, method according to claim 1 is characterized in that, described step B comprises:
B11, SCS carry out this instruction the SCA that is handed down to lag time on the counterpart terminal after lag time is carried out in the pressure security update instruction of each terminal correspondence of determining its control;
B12, when SCS determines to implement the security update of terminal on a large scale, the SCA on described each terminal sends and forces the security update instruction;
B13, SCA receive to force the security update instruction, and carry out according to the instruction that SCS issues and to postpone triggering terminal lag time and carry out security update.
5, method according to claim 1 is characterized in that, described step B comprises:
After B21, SCS determine that lag time is carried out in the pressure security update instruction of each terminal correspondence of its control, in self, preserve pressure security update instruction and carry out lag time for each terminal;
B22, determine to implement when terminal security upgrades on a large scale as SCS, carry out the SCA that postpones lag time on this terminal of correspondence according to the described instruction of each terminal correspondence and send and force the security update instruction;
B23, receive and force the SCA triggering terminal of security update instruction to carry out security update.
6, according to claim 4 or 5 described methods, it is characterized in that, comprise the security update project information in the described pressure security update instruction, SCA triggers described terminal carry out security update before, judge according to described security update project information whether terminal has carried out described renewal, if then finish this flow process; Otherwise, carry out the step that described triggering terminal is carried out security update.
7, according to claim 4 or 5 described methods, it is characterized in that, comprise the digital signature of SCS in the described pressure security update instruction;
Described SCA receives and forces further to comprise after the security update instruction: the digital signature to described SCS is verified, if the verification passes, then carries out described subsequent step; Otherwise finish this flow process, or after information from the indicator mistake to SCS that return, finish this flow process.
8, method according to claim 4, it is characterized in that, if terminal off-line before carrying out security update among the step B13, then after would reaching the standard grade once more, described SCS determine to force the security update instruction for this terminal again and carries out lag time, and this time is handed down to SCA on the terminal; Described SCA carries out with the pressure security update instruction of new reception and substitutes original pressure security update instruction execution lag time lag time, returns execution in step B12 then.
9, method according to claim 4 is characterized in that, among the described step B12, SCS sends pressure security update instruction by the SCA of mode on described each terminal of broadcasting.
10, method according to claim 1 is characterized in that, described step B comprises:
B31, SCS will carry out for the pressure security update instruction that each terminal is determined and be handed down to the network access controller that this terminal connects lag time after lag time is carried out in the pressure security update instruction of each terminal correspondence of determining its control;
B32, when SCS determines to implement the security update of terminal on a large scale, send to described network access controller and to force the security update instruction;
B33, receive the network access controller of forcing the security update instruction and carry out lag time, postpone to initiate security update each terminal according to the described instruction of each terminal correspondence.
11, method according to claim 10 is characterized in that, among the described step B33, the network access controller initiation to the security update of this terminal is:
After the access request that receives from this terminal, this request is redirected to the security update server.
12, a kind of to the system of secure update of terminal on a large scale, it is characterized in that this system comprises: the terminal of SCS and this SCS control comprises SCA on the described terminal;
Described SCA is used for the security related information to described SCS reporting terminal;
Described SCS is used for determining according to the described security related information that SCA reports the safe class of this SCA counterpart terminal, and determine that according to safe class the pressure security update instruction of counterpart terminal carries out lag time, and when determining the security update that to implement terminal on a large scale, control each terminal and carry out according to the pressure security update instruction of correspondence and postpone to carry out security update lag time;
Described terminal is used to carry out security update.
13, system according to claim 12, it is characterized in that, the pressure security update instruction of each terminal correspondence of its control that SCS further will determine is carried out and is handed down to corresponding SCA lag time, and, send pressure security update instruction to each SCA according to the security update information that the terminal of determining is on a large scale forced Update Level;
Described SCA is further used for according to the pressure security update instruction that receives and forces the security update instruction to be carried out to postpone triggering terminal lag time carrying out security update.
14, system according to claim 13 is characterized in that, described SCS sends with the SCA of broadcast mode in this SCS control range and forces the security update instruction.
15, system according to claim 12 is characterized in that, further comprises in this system: network access controller;
The pressure security update instruction of each terminal correspondence of its control that described SCS further will determine is carried out and is handed down to corresponding network access controller lag time, and, send pressure security update instruction to described network access controller according to the security update information that the terminal of determining is on a large scale forced Update Level;
Described network access controller is used for carrying out lag time according to the pressure security update instruction that receives according to the described instruction of each terminal correspondence, postpones the security update of initiation to each terminal.
16, system according to claim 12 is characterized in that, described SCS is further used for preserving the pressure security update instruction execution lag time of described each terminal correspondence in self; And when determining the security update that to implement terminal on a large scale, carry out according to the described instruction of each terminal correspondence and to postpone each terminal of subtend lag time and send and force security update instruction; Described terminal is carried out security update according to the described pressure security update instruction that receives.
CN200610109596.4A 2006-08-14 2006-08-14 Method and system for secure update of terminals in a large range Expired - Fee Related CN100596057C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200610109596.4A CN100596057C (en) 2006-08-14 2006-08-14 Method and system for secure update of terminals in a large range

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200610109596.4A CN100596057C (en) 2006-08-14 2006-08-14 Method and system for secure update of terminals in a large range

Publications (2)

Publication Number Publication Date
CN101127591A CN101127591A (en) 2008-02-20
CN100596057C true CN100596057C (en) 2010-03-24

Family

ID=39095528

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200610109596.4A Expired - Fee Related CN100596057C (en) 2006-08-14 2006-08-14 Method and system for secure update of terminals in a large range

Country Status (1)

Country Link
CN (1) CN100596057C (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102083129B (en) * 2010-04-29 2014-02-05 电信科学技术研究院 Reporting method and equipment of PHR (Power Headroom Report)
EP3906633A4 (en) * 2019-01-02 2022-08-17 Nokia Solutions and Networks Oy Method, system and apparatus for unified security configuration management
CN110943978A (en) * 2019-11-14 2020-03-31 光通天下网络科技股份有限公司 Security policy configuration method and device, electronic equipment and medium

Also Published As

Publication number Publication date
CN101127591A (en) 2008-02-20

Similar Documents

Publication Publication Date Title
CN109525540B (en) Intelligent device binding method and device
CN110740460B (en) Network access method and device of equipment, network equipment and storage medium
CN111865736B (en) Equipment control method and device
US20170141932A1 (en) Internet Access Traffic Sharing Method, Device and Terminal
CN108833565B (en) Method and device for monitoring server, server and storage medium
KR100941540B1 (en) System and method for setting configuration-value inthereof
CN110831245B (en) Network connection method, device and router
CN111542081B (en) Communication switching method and device and Internet of things communication module
CN100596057C (en) Method and system for secure update of terminals in a large range
CN109391686B (en) Processing method of access request and CDN node server
CN111405481B (en) Network resource scheduling method, device, system, electronic equipment and medium
CN107395734B (en) Method and device for controlling access terminal of Internet of things
CN105472465A (en) Set-top box upgrading method and set-top box upgrading device
CN111385126A (en) Equipment behavior control method, device, system and storage medium
CN111263388B (en) Mobile network environment testing method and device, computer equipment and storage medium
CN101174994A (en) Network card test system and method thereof
US10869230B2 (en) Access control method and apparatus for service in broadband cluster system, and cluster terminal
CN114630391B (en) Communication method, device and system under network co-establishment sharing scene and sharing base station
CN109803185B (en) ONU and OLT matching method, device and storage medium
CN112469087B (en) Method for adjusting communication rate of air conditioning equipment, terminal and storage medium
CN114567552A (en) Vehicle-mounted V2X equipment upgrading method and device, computer equipment and storage medium
CN114257503A (en) Method, server, system and storage medium for accelerating domain name deployment
CN109548020B (en) Compensation method and device after authentication failure, server and storage medium
CN113515056A (en) Function execution method and intelligent household appliance
CN109462423B (en) Method, device, equipment and medium for checking data transmission unit

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100324

Termination date: 20200814