Method, apparatus and system for software management
First Claim
1. A method for software management of a communication device comprising:
- receiving, by a receiver of the communication device, a software installation command sent by a first control device;
installing software according to the software installation command on a computer readable storage medium of the communication device;
generating with the communication device first identification information of the software after the software is installed, wherein the first identification information is a Dynamic Host Configuration Protocol Unique Identifier (DUID);
saving first authentication information required in managing the software to the computer storage medium of the communication device, wherein the first authentication information comprises an identification of the first control device, wherein the identification of the first control device is a hashed value calculated according to a certificate of the first control device, and wherein the identification of the first control device is acquired when a Secure Sockets Layer (SSL) connection is established between the first control device and the communication device;
receiving, by the receiver, a software management command for managing the software sent by a second control device, wherein the software management command comprises second authentication information and second identification information of the software, wherein the second identification information is a Universally Unique Identifier (QUID), wherein the second authentication information comprises an identification of the second control device, wherein the identification of the second control device is a hashed value calculated according to a certificate of the second control device, wherein the identification of the second control device is acquired when SSL connection is established between the second control device and the communication device, wherein the software management command comprises a software uninstall command;
acquiring the second authentication information corresponding to the software management command; and
executing with the communication device the software management command when the second authentication information is consistent with the first authentication information and when the second identification information of the software is consistent with the first identification information of the software.
2 Assignments
0 Petitions
Accused Products
Abstract
A method, apparatus and system for software management are provided that relate to the technical field of communications, and that allow software installed on a Universal Plug and Play (UPnP) device by a service provider to be managed only by that service provider. The method comprises receiving a software installation command sent by a first control device, installing software according to the software installation command and storing a first authentication information required during management of the software; receiving a software management command sent by a second control device, and acquiring a second authentication information corresponding to the software management command, which command is used in managing the software; when the second authentication information is consistent with the first authentication information, executing the software management command.
13 Citations
19 Claims
-
1. A method for software management of a communication device comprising:
-
receiving, by a receiver of the communication device, a software installation command sent by a first control device; installing software according to the software installation command on a computer readable storage medium of the communication device; generating with the communication device first identification information of the software after the software is installed, wherein the first identification information is a Dynamic Host Configuration Protocol Unique Identifier (DUID); saving first authentication information required in managing the software to the computer storage medium of the communication device, wherein the first authentication information comprises an identification of the first control device, wherein the identification of the first control device is a hashed value calculated according to a certificate of the first control device, and wherein the identification of the first control device is acquired when a Secure Sockets Layer (SSL) connection is established between the first control device and the communication device; receiving, by the receiver, a software management command for managing the software sent by a second control device, wherein the software management command comprises second authentication information and second identification information of the software, wherein the second identification information is a Universally Unique Identifier (QUID), wherein the second authentication information comprises an identification of the second control device, wherein the identification of the second control device is a hashed value calculated according to a certificate of the second control device, wherein the identification of the second control device is acquired when SSL connection is established between the second control device and the communication device, wherein the software management command comprises a software uninstall command; acquiring the second authentication information corresponding to the software management command; and executing with the communication device the software management command when the second authentication information is consistent with the first authentication information and when the second identification information of the software is consistent with the first identification information of the software. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 16, 17)
-
-
11. A non-transitory computer readable medium, comprising program code such that when executed, cause a communication device to:
-
receive a software installation command sent by a first control device; and install software according to the software installation command; generate first identification information of the software after the software is installed, wherein the first identification information is a Dynamic Host Configuration Protocol Unique Identifier (DUID); save first authentication information required in managing the software, wherein the first authentication information comprises an identification of the first control device, wherein the identification of the first control device is a hashed value calculated according to a certificate of the first control device, and wherein the identification of the first control device is acquired when a Secure Sockets Layer (SSL) connection is established between the first control device and the communication device; receive a software management command for managing the software sent by a second control device, wherein the software management command comprises a software uninstall command, second authentication information, and second identification information of the software, wherein the second identification information is a Universally Unique Identifier (UUID), and wherein the second authentication information comprises an identification of the second control device, wherein the identification of the second control device is a hashed value calculated according to a certificate of the second control device, and wherein the identification of the second control device is acquired when the SSL connection is established between the second control device and the communication device; and execute the software management command when the second authentication information is consistent with the first authentication information and when the second identification information of the software is consistent with the first identification information of the software. - View Dependent Claims (12, 13, 14, 15, 18, 19)
-
Specification