CN100596057C - Method and system for secure update of terminals in a large range - Google Patents
Method and system for secure update of terminals in a large range Download PDFInfo
- Publication number
- CN100596057C CN100596057C CN200610109596.4A CN200610109596A CN100596057C CN 100596057 C CN100596057 C CN 100596057C CN 200610109596 A CN200610109596 A CN 200610109596A CN 100596057 C CN100596057 C CN 100596057C
- Authority
- CN
- China
- Prior art keywords
- terminal
- security update
- scs
- security
- sca
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 230000008569 process Effects 0.000 claims description 13
- 230000000977 initiatory effect Effects 0.000 claims description 6
- 238000012795 verification Methods 0.000 claims description 2
- 230000003247 decreasing effect Effects 0.000 abstract 1
- 238000011217 control strategy Methods 0.000 description 5
- 230000004044 response Effects 0.000 description 3
- 239000003795 chemical substances by application Substances 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000003780 insertion Methods 0.000 description 2
- 230000037431 insertion Effects 0.000 description 2
- 206010033799 Paralysis Diseases 0.000 description 1
- 230000008485 antagonism Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 239000012467 final product Substances 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Images
Abstract
The utility model discloses a safe update method for terminals over large range, which comprises: A, SCS ensures the execution delay time of the compulsive safe update instruction which is corresponding to each terminal controlled by the SCS; B, when SCS ensures that carrying out safe update for terminals over large range is needed, SCS controls each terminal to carry out safe update according tothe corresponding execution delay time of the compulsive safe update instruction. The utility model also discloses a safe update system for a large range of terminals, which comprises, an SCS and terminals controlled by the SCS; the SCS is used for ensuring the execution delay time of the compulsive safe update instruction which is corresponding to each terminal controlled by the SCS, and controlling each terminal to carry out safe update according to the corresponding execution delay time of the compulsive safe update instruction when the SCS ensures that the safe update for a large range ofterminals is needed; the terminal is used for safe update. With the technical proposal, the utility model has the advantages that the network congestion caused by carrying out safe update for a largerange of terminals is decreased.
Description
Technical field
The present invention relates to the network security technology field, especially relate to the method and system of secure update of terminal on a large scale.
Background technology
In order to guarantee network security, from the network security threats that the source antagonism is brought by dangerous terminal, associated response system (CRS) provides the multi-level safety control device that controls to application service control from network insertion.
As shown in Figure 1, main entity comprises among the CRS that proposes in ITU-T X.CRS motion: the security association server (SCS) of the security correlative agent of end side (SCA), network side, the network insertion controller (NAC) of network side and application service controller (ASC).SCA and SCS have constituted the core of associated reaction system.
Wherein, SCA is responsible for the security related information of collection terminal, it is handled generating security related information (SCI) report, and this report is reported SCS.After SCS received the SCI report that SCA sends, the security related information of collecting by SCA was assessed the safe condition and the safe class of terminal, and whether the safe condition of terminal is allowed to accesses network and the various application services of application.SCS is according to assessment result, and indication NAC or ASC do suitable control to the access to netwoks and the application access of terminal, and SCS also can be with the control advisory SCA to terminal.
When being fit to the security update information of terminal, carry out patch, assembly or the safety-relevant applications software of self operating system update if any being fit to terminal, perhaps during the lastest imformation of these patches, assembly or software, SCS can notify SCA to assist terminal to upgrade accordingly or upgrade.Security update information is at the security update server, for example on the Secure Application software server (SAS-S) shown in Fig. 1, the terminal operating system update service device (TOS-VS), after SCA receives the update instruction of SCS, obtain security update information according to the security update server info control terminal in the instruction to corresponding security update server and carry out security update.
In said method, the terminal in if same security update information is suitable on a large scale, then SCS sends the security update instruction with each terminal on a large scale, terminal is after receiving the security update instruction, promptly obtain lastest imformation to the security update server, tend to because great amount of terminals is initiated security update simultaneously, cause towards the network path of security update server congested, even since traffic carrying capacity increase suddenly sharply the paralysis that causes the security update server; In addition,, also caused the unexpected increasing of network traffics, increased system burden, and can cause network congestion because SCS sends the security update instruction respectively at each terminal.
Summary of the invention
In view of this, main purpose of the present invention is to provide to the method and system of secure update of terminal on a large scale, can realize the security update to terminal on a large scale, and reduce network congestion.
First aspect for achieving the above object the invention provides a kind ofly to the method for secure update of terminal on a large scale, and this method comprises:
Security correlative agent SCA on A, each terminal sends the terminal security relevant information to security association server S CS; Described SCS determines the safe class of terminal according to the terminal security relevant information that receives, and determines the pressure security update instruction execution lag time of each terminal correspondence according to the safe class of terminal;
B, when SCS determines to implement the security update of terminal on a large scale, control each terminal and carry out according to the pressure security update instruction of correspondence and postpone to carry out security update lag time.
Preferably, in the described steps A, SCS is further according to security service, network traffics or the bandwidth of customization, or above combination in any determines that the pressure security update instruction of each terminal correspondence carries out lag time.
Preferably, further comprise behind the described step B:
After terminal was finished security update, the SCA on the terminal sent new security related information to SCS immediately, and SCS carries out lag time according to the pressure security update instruction that the new security related information that receives redefines this terminal correspondence, returns execution in step B then.
Described step B can comprise:
B11, SCS carry out this instruction the SCA that is handed down to lag time on the counterpart terminal after lag time is carried out in the pressure security update instruction of each terminal correspondence of determining its control;
B12, when SCS determines to implement the security update of terminal on a large scale, the SCA on described each terminal sends and forces the security update instruction;
B13, SCA receive to force the security update instruction, and carry out according to the instruction that SCS issues and to postpone triggering terminal lag time and carry out security update.
Described step B can also comprise:
After B21, SCS determine that lag time is carried out in the pressure security update instruction of each terminal correspondence of its control, in self, preserve pressure security update instruction and carry out lag time for each terminal;
B22, determine to implement when terminal security upgrades on a large scale as SCS, carry out the SCA that postpones lag time on this terminal of correspondence according to the described instruction of each terminal correspondence and send and force the security update instruction;
B23, receive and force the SCA triggering terminal of security update instruction to carry out security update.
Preferably, comprise the security update project information in the described pressure security update instruction, SCA triggers described terminal carry out security update before, judge according to described security update project information whether terminal has carried out described renewal, if then finish this flow process; Otherwise, carry out the step that described triggering terminal is carried out security update.
Preferably, the digital signature that comprises SCS in the described pressure security update instruction;
Described SCA receives and forces further to comprise after the security update instruction: the digital signature to described SCS is verified, if the verification passes, then carries out described subsequent step; Otherwise finish this flow process, or after information from the indicator mistake to SCS that return, finish this flow process.
Preferably, if terminal off-line before carrying out security update among the step B13, then after reaching the standard grade once more, described SCS determines to force security update instruction execution lag time for this terminal again, and this time is handed down to SCA on the terminal; Described SCA carries out with the pressure security update instruction of new reception and substitutes original pressure security update instruction execution lag time lag time, returns execution in step B12 then.
Preferably, among the described step B12, SCS sends pressure security update instruction by the SCA of mode on described each terminal of broadcasting.
Described step B also can comprise:
B31, SCS will carry out for the pressure security update instruction that each terminal is determined and be handed down to the network access controller that this terminal connects lag time after lag time is carried out in the pressure security update instruction of each terminal correspondence of determining its control;
B32, when SCS determines to implement the security update of terminal on a large scale, send to described network access controller and to force the security update instruction;
B33, receive the network access controller of forcing the security update instruction and carry out lag time, postpone to initiate security update each terminal according to the described instruction of each terminal correspondence.
Preferably, among the described step B33, the network access controller initiation to the security update of this terminal is:
After the access request that receives from this terminal, this request is redirected to the security update server.
Second aspect for achieving the above object the invention provides a kind ofly to the system of secure update of terminal on a large scale, and this system comprises: the terminal of SCS and this SCS control comprises SCA on the described terminal;
Described SCA is used for the security related information to described SCS reporting terminal;
Described SCS is used for determining according to the described security related information that SCA reports the safe class of this SCA counterpart terminal, and determine that according to safe class the pressure security update instruction of counterpart terminal carries out lag time, and when determining the security update that to implement terminal on a large scale, control each terminal and carry out according to the pressure security update instruction of correspondence and postpone to carry out security update lag time;
Described terminal is used to carry out security update.
Preferably, the pressure security update instruction of each terminal correspondence of its control that SCS further will determine is carried out and is handed down to corresponding SCA lag time, and, send pressure security update instruction to each SCA according to the security update information that the terminal of determining is on a large scale forced Update Level;
Described SCA is further used for according to the pressure security update instruction that receives and forces the security update instruction to be carried out to postpone triggering terminal lag time carrying out security update.
Preferably, described SCS sends with the SCA of broadcast mode in this SCS control range and forces the security update instruction.
Further can comprise in this system: network access controller;
The pressure security update instruction of each terminal correspondence of its control that described SCS further will determine is carried out and is handed down to corresponding network access controller lag time, and, send pressure security update instruction to described network access controller according to the security update information that the terminal of determining is on a large scale forced Update Level;
Described network access controller is used for carrying out lag time according to the pressure security update instruction that receives according to the described instruction of each terminal correspondence, postpones the security update of initiation to each terminal.
Preferably, described SCS is further used for preserving the pressure security update instruction execution lag time of described each terminal correspondence in self; And when determining the security update that to implement terminal on a large scale, carry out according to the described instruction of each terminal correspondence and to postpone each terminal of subtend lag time and send and force security update instruction; Described terminal is carried out security update according to the described pressure security update instruction that receives.
From such scheme as can be seen, among the present invention, SCS determines the pressure security update instruction execution lag time of each terminal correspondence of its control, when SCS determines to implement the security update of terminal on a large scale, control each terminal and carry out security update according to pressure security update instruction execution delay lag time of correspondence, thereby prevented that all terminals are initiated to upgrade to the security update server at synchronization, have reduced network congestion when the security update of implementing terminal on a large scale;
Also determine the terminal security grade among the present invention according to the security related information of terminal, and determine to force security update to instruct according to the safe class of terminal and carry out lag time, force the security update instruction to carry out weak point lag time as the low terminal of safe class, thereby make the terminal that needs most renewal to carry out security update as early as possible, more effectively reduced security breaches;
And then among the present invention, SCS sends to controlled SCA by broadcast mode and forces the security update instruction, sends to controlled SCA one by one with respect to SCS and forces the security update instruction, greatly reduces the burden of system.
Description of drawings
Fig. 1 forms schematic diagram for the CRS system;
Fig. 2 for the present invention to the overview flow chart of secure update of terminal method on a large scale;
Fig. 3 for the present invention to the flow chart of secure update of terminal method specific embodiment on a large scale;
Fig. 4 forms schematic diagram for the present invention to the system of secure update of terminal on a large scale.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, the present invention is described in further detail below in conjunction with accompanying drawing.
The present invention is primarily aimed at the security update of particular importance, and this security update need force terminal to be carried out on a large scale.Main thought of the present invention is, SCS determines the pressure security update instruction execution lag time of each terminal correspondence of its control, when SCS determines to implement the security update of terminal on a large scale, control each terminal and carry out according to the pressure security update instruction of correspondence and postpone to carry out security update lag time.
The overall procedure of the inventive method specifically comprises the steps: as shown in Figure 2
The specific implementation of step 202 can be, SCS is after the security related information report that receives SCA on the self terminal, and the pressure security update instruction of this SCA correspondence that will determine when SCA returns response is carried out and is handed down to SCA lag time; After this, when SCS determines to implement the renewal of terminal pressure on a large scale, send pressure security update instruction to each SCA of this SCS control, SCA receives and forces the security update instruction, carry out lag time according to the pressure security update instruction that receives, the terminal that postpones the control place is initiated security update to the security update server of correspondence; In this case, SCS can be subjected to the SCA transmission of this SCS control to force security update to be instructed to all by the mode of broadcasting.
The specific implementation of step 202 also can be that SCS issues by the control strategy to network access controller, and is set the pressure security update instruction execution lag time of each terminal correspondence of its control in network access controller; When SCS determines to implement the renewal of terminal pressure on a large scale, sent by network access controllers of this SCS control to all and force security update to be instructed; Network access controller is carried out according to the pressure security update instruction of each terminal correspondence and is postponed lag time to carry out following processing: if receive the network access request of self terminal, then this network access request heavily is directed to the security update server, the security update server sends to terminal with the above-mentioned security update information that need execute and carries out security update.
The specific implementation of step 202 can also be, SCS saves as the pressure security update instruction execution lag time that the SCA on each terminal determines in self, when SCS determines to implement the renewal of terminal pressure on a large scale, lag time is carried out in pressure security update instruction according to each SCA correspondence, postpones to send the pressure update instruction to this SCA; Receive the SCA triggering terminal of forcing update instruction and initiate security update to the security update server of correspondence.
Below by specific embodiment the inventive method is elaborated.
The flow process of specific embodiments of the invention specifically comprises the steps: as shown in Figure 3
In the CRS system in ITU-T X.CRS motion, the SCA on the terminal can report to SCS by sending SCI when terminal is connected to network, inform the safe condition of terminal.In follow-up process, the safety control strategy that SCA issues according to SCS except meeting requires to send the SCI report, and when the safe condition of terminal changed, SCA needed to send new SCI and reports to SCS.
In this step, SCS can determine the pressure security update instruction execution lag time of this SCA then according to the safe class of assessing terminal from the SCI report analysis of SCA according to safe class; For example, it is short more that lag time is carried out in the low more pressure security update instruction of user's safe class.SCS mainly determines that according to user's safe class above-mentioned instruction carries out lag time, in addition, SCS can also be further according to security service, network traffics or the bandwidth of customization, or above combination in any determines that the pressure security update instruction of this SCA correspondence carries out lag time.Network traffics here and bandwidth can comprise the network traffics or the bandwidth of core net, and the security update server network traffics or the bandwidth that can bear.In addition, forcing the security update instruction to be carried out can if this value is 0, shows after SCA receives the pressure update instruction and carry out this instruction immediately since 0 lag time.
In the present embodiment, in SCS, preestablish security strategy, can determine the severity level of security update information according to this security strategy SCS.When on the security update server new security update being arranged, the security update server sends to SCS with security update information, SCS determines the severity level of security update information according to security strategy, if determining the severity level of this security update information, SCS reaches when terminal is forced the degree of renewal on a large scale, SCS will give the whole network user by broadcast mode, and promptly the SCA on all controlled terminals sends and forces the security update instruction.
Force the security update instruction can be by expressly sending, but comprise the digital signature of SCS in the instruction, thus the integrality and the source authenticity of the pressure security update instruction that makes SCA to trust to be received.Specifically can comprise the security update project information in this pressure security update instruction, as upgrading classification, refresh routine title and update service device information etc.
Security update project information in step 305, the SCA reading command, mounted security update program on security update project information and the terminal is compared, judge whether terminal has installed this security update,, then finish this security update flow process if install; Otherwise, execution in step 306.
Here, if judge install after, though finish this security update flow process, but the security strategy that SCA issues according to SCS, still can report the SCI report to SCS, SCS will carry out according to SCI report generation pressure security update instruction once more and be handed down to this SCA lag time, then this SCA carries out according to new pressure security update instruction and resets the timing that timer is carried out in corresponding pressure security update instruction lag time, and forces security update instruction back to carry out above-mentioned steps 304 and step thereafter receiving once more.
In the present embodiment, SCA also can carry out to set lag time and activate according to the pressure security update instruction that receives in this step and force the security update instruction to carry out timer.
In this step, if terminal is before timer makes zero, owing to causing security update, reasons such as off-line do not carry out, after then terminal is reached the standard grade once more, SCA sends the SCI report to SCS, promptly re-execute step 301 and reach step thereafter, then in step 302 thereafter, SCA resets the timing of above-mentioned timer lag time according to the new pressure security update instruction execution that receives.
More than the inventive method is illustrated, again system of the present invention is described below.
System to secure update of terminal on a large scale provided by the invention mainly comprises the terminal of SCS and this SCS control as shown in Figure 4; Wherein, SCS is used for the pressure security update instruction of each terminal correspondence of definite its control and carries out lag time, and when determining the security update that to implement terminal on a large scale, control each terminal and carry out according to the pressure security update instruction of correspondence and postpone to carry out security update lag time; Terminal is used to carry out security update.
SCS further can carry out the pressure security update instruction of each SCA correspondence of determining and be handed down to corresponding SCA lag time, and the security update information of forcing Update Level according to the terminal of determining on a large scale, send pressure security update instruction to each SCA, SCS can send by the SCA of broadcast mode in this SCS control range and force the security update instruction here; Then SCA is further according to the pressure security update instruction that receives with force the security update instruction to be carried out to postpone triggering terminal lag time to carry out security update.
Further comprise the security update server in this system, be used for providing security update information to terminal; Terminal and described security update server interaction are obtained security update information and are carried out security update.
In the system of the present invention, SCS can not be handed down to this time corresponding SCA after lag time is carried out in the pressure security update instruction of determining each SCA, but lag time is carried out in the pressure security update instruction of each SCA correspondence of preservation in self; Then after the security update information of determining the Update Level of terminal pressure on a large scale, SCS does not send to each SCA immediately and forces the security update instruction, but carry out lag time according to the pressure security update instruction of each SCA correspondence, postpone to send pressure security update instruction to SCA.
System of the present invention also can comprise SCS, terminal and network access controller, SCS is used for after lag time is carried out in the pressure security update instruction of determining each terminal the network access controller that sends to its connection lag time being carried out in this pressure security update instruction; Then network access controller receives the pressure update instruction that sends to terminal from SCS, and carries out the security update of delay initiation lag time to each terminal according to the pressure security update instruction of each terminal correspondence.Here network access controller initiate the security update of each terminal be: if receive network access request from this terminal, this network access request heavily is directed to the security update server, and the security update server sends to terminal with the above-mentioned security update information that need execute and carries out security update.
Further comprise the security update server in the system of the present invention, be used for the security update information of correspondence being handed down to terminal according to the update request of coming self terminal; Or the security update information of correspondence is handed down to the terminal of initiating network access request according to the network access request that heavily leads from network access controller; Terminal is upgraded according to the security update information and executing that receives.
SCA in the system of the present invention on terminal, the terminal, network access controller, security update server and SCS in carrying out prior art performed mutual, performed operating in the above-mentioned explanation to the inventive method all described in detail, below only be concise and to the point the description, the explanation with reference to the inventive method part in the specific implementation process gets final product.
Can be applied in the wireless communication system in the present invention, then above-mentioned terminal is a wireless terminal.And the security update server can be arranged in the external packet data network, also can be arranged on wireless core network inside, can also the mirror image server of security update server be set again in core net inside except that externally being provided with the security update server in the packet data network.By the inner security update server that is provided with of core net, or the mirror image server of security update server has reduced security update taking Internet resources according to from the update request of SCA terminal being carried out security update.
More than be explanation, in concrete implementation process, can carry out suitable improvement, to adapt to the concrete needs of concrete condition method of the present invention to the specific embodiment of the invention.Therefore be appreciated that according to the specific embodiment of the present invention just to play an exemplary role, not in order to restriction protection scope of the present invention.
Claims (16)
1, a kind of to the method for secure update of terminal on a large scale, it is characterized in that this method comprises:
Security correlative agent SCA on A, each terminal sends the terminal security relevant information to security association server S CS; Described SCS determines the safe class of terminal according to the terminal security relevant information that receives, and determines the pressure security update instruction execution lag time of each terminal correspondence according to the safe class of terminal;
B, when SCS determines to implement the security update of terminal on a large scale, control each terminal and carry out according to the pressure security update instruction of correspondence and postpone to carry out security update lag time.
2, method according to claim 1, it is characterized in that, in the described steps A, SCS is further according to security service, network traffics or the bandwidth of customization, or above combination in any determines that the pressure security update instruction of each terminal correspondence carries out lag time.
3, method according to claim 1 and 2 is characterized in that, further comprises behind the described step B:
After terminal was finished security update, the SCA on the terminal sent new security related information to SCS immediately, and SCS carries out lag time according to the pressure security update instruction that the new security related information that receives redefines this terminal correspondence, returns execution in step B then.
4, method according to claim 1 is characterized in that, described step B comprises:
B11, SCS carry out this instruction the SCA that is handed down to lag time on the counterpart terminal after lag time is carried out in the pressure security update instruction of each terminal correspondence of determining its control;
B12, when SCS determines to implement the security update of terminal on a large scale, the SCA on described each terminal sends and forces the security update instruction;
B13, SCA receive to force the security update instruction, and carry out according to the instruction that SCS issues and to postpone triggering terminal lag time and carry out security update.
5, method according to claim 1 is characterized in that, described step B comprises:
After B21, SCS determine that lag time is carried out in the pressure security update instruction of each terminal correspondence of its control, in self, preserve pressure security update instruction and carry out lag time for each terminal;
B22, determine to implement when terminal security upgrades on a large scale as SCS, carry out the SCA that postpones lag time on this terminal of correspondence according to the described instruction of each terminal correspondence and send and force the security update instruction;
B23, receive and force the SCA triggering terminal of security update instruction to carry out security update.
6, according to claim 4 or 5 described methods, it is characterized in that, comprise the security update project information in the described pressure security update instruction, SCA triggers described terminal carry out security update before, judge according to described security update project information whether terminal has carried out described renewal, if then finish this flow process; Otherwise, carry out the step that described triggering terminal is carried out security update.
7, according to claim 4 or 5 described methods, it is characterized in that, comprise the digital signature of SCS in the described pressure security update instruction;
Described SCA receives and forces further to comprise after the security update instruction: the digital signature to described SCS is verified, if the verification passes, then carries out described subsequent step; Otherwise finish this flow process, or after information from the indicator mistake to SCS that return, finish this flow process.
8, method according to claim 4, it is characterized in that, if terminal off-line before carrying out security update among the step B13, then after would reaching the standard grade once more, described SCS determine to force the security update instruction for this terminal again and carries out lag time, and this time is handed down to SCA on the terminal; Described SCA carries out with the pressure security update instruction of new reception and substitutes original pressure security update instruction execution lag time lag time, returns execution in step B12 then.
9, method according to claim 4 is characterized in that, among the described step B12, SCS sends pressure security update instruction by the SCA of mode on described each terminal of broadcasting.
10, method according to claim 1 is characterized in that, described step B comprises:
B31, SCS will carry out for the pressure security update instruction that each terminal is determined and be handed down to the network access controller that this terminal connects lag time after lag time is carried out in the pressure security update instruction of each terminal correspondence of determining its control;
B32, when SCS determines to implement the security update of terminal on a large scale, send to described network access controller and to force the security update instruction;
B33, receive the network access controller of forcing the security update instruction and carry out lag time, postpone to initiate security update each terminal according to the described instruction of each terminal correspondence.
11, method according to claim 10 is characterized in that, among the described step B33, the network access controller initiation to the security update of this terminal is:
After the access request that receives from this terminal, this request is redirected to the security update server.
12, a kind of to the system of secure update of terminal on a large scale, it is characterized in that this system comprises: the terminal of SCS and this SCS control comprises SCA on the described terminal;
Described SCA is used for the security related information to described SCS reporting terminal;
Described SCS is used for determining according to the described security related information that SCA reports the safe class of this SCA counterpart terminal, and determine that according to safe class the pressure security update instruction of counterpart terminal carries out lag time, and when determining the security update that to implement terminal on a large scale, control each terminal and carry out according to the pressure security update instruction of correspondence and postpone to carry out security update lag time;
Described terminal is used to carry out security update.
13, system according to claim 12, it is characterized in that, the pressure security update instruction of each terminal correspondence of its control that SCS further will determine is carried out and is handed down to corresponding SCA lag time, and, send pressure security update instruction to each SCA according to the security update information that the terminal of determining is on a large scale forced Update Level;
Described SCA is further used for according to the pressure security update instruction that receives and forces the security update instruction to be carried out to postpone triggering terminal lag time carrying out security update.
14, system according to claim 13 is characterized in that, described SCS sends with the SCA of broadcast mode in this SCS control range and forces the security update instruction.
15, system according to claim 12 is characterized in that, further comprises in this system: network access controller;
The pressure security update instruction of each terminal correspondence of its control that described SCS further will determine is carried out and is handed down to corresponding network access controller lag time, and, send pressure security update instruction to described network access controller according to the security update information that the terminal of determining is on a large scale forced Update Level;
Described network access controller is used for carrying out lag time according to the pressure security update instruction that receives according to the described instruction of each terminal correspondence, postpones the security update of initiation to each terminal.
16, system according to claim 12 is characterized in that, described SCS is further used for preserving the pressure security update instruction execution lag time of described each terminal correspondence in self; And when determining the security update that to implement terminal on a large scale, carry out according to the described instruction of each terminal correspondence and to postpone each terminal of subtend lag time and send and force security update instruction; Described terminal is carried out security update according to the described pressure security update instruction that receives.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200610109596.4A CN100596057C (en) | 2006-08-14 | 2006-08-14 | Method and system for secure update of terminals in a large range |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200610109596.4A CN100596057C (en) | 2006-08-14 | 2006-08-14 | Method and system for secure update of terminals in a large range |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101127591A CN101127591A (en) | 2008-02-20 |
CN100596057C true CN100596057C (en) | 2010-03-24 |
Family
ID=39095528
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200610109596.4A Expired - Fee Related CN100596057C (en) | 2006-08-14 | 2006-08-14 | Method and system for secure update of terminals in a large range |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100596057C (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102083129B (en) * | 2010-04-29 | 2014-02-05 | 电信科学技术研究院 | Reporting method and equipment of PHR (Power Headroom Report) |
EP3906633A4 (en) * | 2019-01-02 | 2022-08-17 | Nokia Solutions and Networks Oy | Method, system and apparatus for unified security configuration management |
CN110943978A (en) * | 2019-11-14 | 2020-03-31 | 光通天下网络科技股份有限公司 | Security policy configuration method and device, electronic equipment and medium |
-
2006
- 2006-08-14 CN CN200610109596.4A patent/CN100596057C/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
CN101127591A (en) | 2008-02-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109525540B (en) | Intelligent device binding method and device | |
CN110740460B (en) | Network access method and device of equipment, network equipment and storage medium | |
CN111865736B (en) | Equipment control method and device | |
US20170141932A1 (en) | Internet Access Traffic Sharing Method, Device and Terminal | |
CN108833565B (en) | Method and device for monitoring server, server and storage medium | |
KR100941540B1 (en) | System and method for setting configuration-value inthereof | |
CN110831245B (en) | Network connection method, device and router | |
CN111542081B (en) | Communication switching method and device and Internet of things communication module | |
CN100596057C (en) | Method and system for secure update of terminals in a large range | |
CN109391686B (en) | Processing method of access request and CDN node server | |
CN111405481B (en) | Network resource scheduling method, device, system, electronic equipment and medium | |
CN107395734B (en) | Method and device for controlling access terminal of Internet of things | |
CN105472465A (en) | Set-top box upgrading method and set-top box upgrading device | |
CN111385126A (en) | Equipment behavior control method, device, system and storage medium | |
CN111263388B (en) | Mobile network environment testing method and device, computer equipment and storage medium | |
CN101174994A (en) | Network card test system and method thereof | |
US10869230B2 (en) | Access control method and apparatus for service in broadband cluster system, and cluster terminal | |
CN114630391B (en) | Communication method, device and system under network co-establishment sharing scene and sharing base station | |
CN109803185B (en) | ONU and OLT matching method, device and storage medium | |
CN112469087B (en) | Method for adjusting communication rate of air conditioning equipment, terminal and storage medium | |
CN114567552A (en) | Vehicle-mounted V2X equipment upgrading method and device, computer equipment and storage medium | |
CN114257503A (en) | Method, server, system and storage medium for accelerating domain name deployment | |
CN109548020B (en) | Compensation method and device after authentication failure, server and storage medium | |
CN113515056A (en) | Function execution method and intelligent household appliance | |
CN109462423B (en) | Method, device, equipment and medium for checking data transmission unit |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20100324 Termination date: 20200814 |