CN102065430A - Method for realizing safe access of terminal of internet of thing - Google Patents

Method for realizing safe access of terminal of internet of thing Download PDF

Info

Publication number
CN102065430A
CN102065430A CN2010106093660A CN201010609366A CN102065430A CN 102065430 A CN102065430 A CN 102065430A CN 2010106093660 A CN2010106093660 A CN 2010106093660A CN 201010609366 A CN201010609366 A CN 201010609366A CN 102065430 A CN102065430 A CN 102065430A
Authority
CN
China
Prior art keywords
terminal
node
turn
management node
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2010106093660A
Other languages
Chinese (zh)
Other versions
CN102065430B (en
Inventor
耿振民
刘彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuxi Dingchi Information Technology Co.,Ltd.
Original Assignee
SHANGHAI CINSEC INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI CINSEC INFORMATION TECHNOLOGY Co Ltd filed Critical SHANGHAI CINSEC INFORMATION TECHNOLOGY Co Ltd
Priority to CN201010609366.0A priority Critical patent/CN102065430B/en
Publication of CN102065430A publication Critical patent/CN102065430A/en
Application granted granted Critical
Publication of CN102065430B publication Critical patent/CN102065430B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a method for realizing safe access of a terminal of internet of thing, which comprises the steps of: storing an authorization message in an electronic key, and using the authorization message as an identity identification, wherein the authorization message is used as a private key signature by an authorized management node and stored in the authorized management node; writing the authorization message into the electronic key in an electronic key authorization list of the management node; when no terminal node connected with the electronic key applies to accessing the internet, searching a terminal authorization list by the management node to judge whether the access of the terminal node is allowed; and when the terminal node connected with the electronic key applies to accessing the internet, firstly executing the operation without the electronic key by the management node, and if the terminal is failed to access, searching the electronic key authorization list to judge whether the access of the terminal node is allowed. According to the method realizing the safe access of the terminal of the internet of thing, disclosed in the invention, the problem of safe access of the terminal can be effectively solved, a great amount of terminals of the internet of thing can be effectively managed, and the rapid automatic access of the terminals of the internet of thing can be realized.

Description

Realize the method that internet-of-things terminal safety inserts
Technical field
The invention belongs to the technology of Internet of things field, relate to a kind of safety access method, relate in particular to a kind of method that realizes that internet-of-things terminal safety inserts.
Background technology
Along with China's Internet development, the Internet of Things related notion has also progressed into people's sight.Internet of Things be all article by information sensing equipment and Internet connections such as radio-frequency (RF) identification, realize intelligent identification and management, be another information industry tide after computer, the Internet and mobile radio communication.Meanwhile, the Internet of Things safety problem also highlights, and the safe access problem of internet-of-things terminal is one of them.
The Internet of Things safety problem has two big difficult points perplexing people at present: the first, a lot of occasions of Internet of Things all adopt wireless transmission, how to prevent the access of illegal terminal; The second, internet-of-things terminal quantity is huge, and how effectively a large amount of terminal of management inserts.These safety problems must be well solved and could promote further developing of Internet of Things.
Summary of the invention
Technical problem to be solved by this invention is: a kind of method that realizes that internet-of-things terminal safety inserts is provided, can be by setting the interconnect scheme of Internet of Things node, cooperate electron key to reach the safety management of Internet of Things node, insert with the safety that realizes internet-of-things terminal.
For solving the problems of the technologies described above, the present invention adopts following technical scheme:
A kind of method that realizes that internet-of-things terminal safety inserts all is a node in the network behind each accessing terminal to network, and each node all has the sign of a uniqueness; The node that the network insertion service is provided is as management node, and management node must be furnished with the interface of electron key; Being connected directly to the node that management node comes access network is terminal node; Terminal node is the distributing terminals node no longer, and perhaps, terminal node is assigned the terminal node of electron key interface and does not have the terminal node of electron key interface; Management node manages terminal node;
Management node is safeguarding that two permissions lists manage its terminal node, comprises terminal permissions list and electron key grant column list; The terminal permissions list is preserved the authority information of terminal, and the authority of terminal is set;
Preserve authorization message in the electron key, simultaneously it is as identify label, and the management node that authorization message all is authorized to is kept at wherein after with private key signature; In the electron key grant column list of management node, write authorization message to electron key;
When not connecting the terminal node application access network of electron key, management node can be searched the terminal permissions list and judge whether to allow this terminal node to insert;
When being connected with the terminal node application access network of electron key, management node can be carried out the aforementioned operation that does not have under the electron key situation earlier, if the terminal access failure is searched the electron key grant column list again and judged whether to allow this terminal node to insert.
As a preferred embodiment of the present invention, described method further comprises: administrative staff's login management node, the access control attribute that the terminal permissions list is set allows or refuses the access of this terminal node.
As a preferred embodiment of the present invention, the terminal node access way is divided into automatic access and manually inserts two kinds.
As a preferred embodiment of the present invention, terminal node adopts automatic access way to insert, and comprises the steps:
S101, terminal equipment start, and search its management node; Turn to step S102;
S102, initiate to insert application to its management node; Turn to step S103;
S103, management node obtain terminal iidentification, search the terminal permissions list, judge whether that the terminal iidentification of coupling and authorization terminal insert automatically for allowing; If turn to step S111, otherwise turn to step 104;
S104, request electronic key information; Turn to step S105;
S105, judge whether to be connected with electron key; If turn to step S106, otherwise turn to step S107;
The signature of S106, transmission electron key; Turn to step S108;
S107, access failure turn to step S102;
S108, usefulness PKI visa signature, and obtain signature contents, in the electron key grant column list, search occurrence; Turn to step S109;
S109, judge whether the user name of coupling, and term of validity mistake not; If turn to step S110, otherwise turn to step S107;
Whether comprise this terminal equipment in the equipment item that S110, judgement allow to insert automatically; If turn to step S111, otherwise turn to step S107;
S111, insert successfully.
As a preferred embodiment of the present invention, terminal node adopts manual access way to insert, and comprises the steps:
S201, terminal equipment start; Turn to step S202;
Whether S202, judgement insert successful automatically; If turn to step S207, otherwise turn to step S203;
S203, etc. to be accessed, turn to step S204;
S204, browsing terminal permissions list show that request accesses terminal, and turns to step S205;
S205, find corresponding terminal node place record, turn to step S206;
S206, the access control item is set, clicks and insert, promptly allow its access, turn to step S207;
S207, insert successfully.
As a preferred embodiment of the present invention, no USB interface terminal access method comprises the steps:
Permission is set in management node terminal permissions list should be inserted automatically;
In management node terminal permissions list, manually insert.
As a preferred embodiment of the present invention, there is the USB interface terminal access method to comprise the steps:
Permission is set in management node terminal permissions list should be inserted automatically;
In management node terminal permissions list, manually insert;
At management node mandate USB softdog, allow to comprise in the automatic access device this terminal, with management node private key signature authorization message, write the USB softdog; The USB softdog is inserted this terminal, make its automatic access.
Beneficial effect of the present invention is: the method that the realization internet-of-things terminal safety that the present invention proposes inserts, can effectively solve the safe access problem of terminal, and effectively manage a large amount of internet-of-things terminals, can realize the fast automatic access of internet-of-things terminal.Its safety problem is converted into the safety problem of electron key, can prevent effectively that then illegal terminal from inserting; Not only convenient but also safety.
Description of drawings
Fig. 1 is the schematic diagram of node attribute of the present invention.
Fig. 2 is the schematic diagram of terminal permissions list of the present invention.
Fig. 3 is the schematic diagram of electron key grant column list of the present invention.
Fig. 4 is the schematic diagram of electron key attribute of the present invention.
Fig. 5 is the flow chart of the automatic access process of terminal of the present invention.
Fig. 6 is the flow chart of the manual access process of terminal of the present invention.
Embodiment
Describe the preferred embodiments of the present invention in detail below in conjunction with accompanying drawing.
Embodiment one
See also Fig. 1, the present invention has disclosed a kind of method that realizes that internet-of-things terminal safety inserts, and by working out the interconnect scheme of Internet of Things node, cooperates electron key to reach the safety management of Internet of Things node, inserts with the safety that realizes internet-of-things terminal.The interconnect scheme content comprises definition node attribute, electron key attribute, electron key grant column list, terminal permissions list, works out authentication method, authorization method and cut-in method.
All a node in the network behind each accessing terminal to network.As shown in Figure 1, each node all has the sign of a uniqueness, provides the node of network insertion service to can be used as management node, and management node must be furnished with the interface of electron key.Be connected directly to management node and come the node of access network to be called terminal node, terminal node can be assigned the terminal node of electron key interface and not have the terminal node of electron key interface.Management node can manage terminal node.Management node and terminal node are comparatively speaking, always occur in pairs.As shown in FIG., the B node is a terminal node with respect to the A node, and the B node is a management node with respect to the C node.
Management node is safeguarding that two permissions lists manage its terminal node, comprises terminal permissions list (as shown in Figure 2) and electron key grant column list (as shown in Figure 3).The terminal permissions list is preserved the authority information of terminal, and the authority of terminal can be set.
The attribute of electron key is preserved authorization message as shown in Figure 4 in the electron key, simultaneously it is as identify label, and the management node that authorization message all is authorized to is kept at wherein after with private key signature.Can in the electron key grant column list of management node, write authorization message to electron key.
When not connecting the terminal node application access network of electron key, management node can be searched the terminal permissions list and judge whether to allow this terminal node to insert; When being connected with the terminal node application access network of electron key, management node can be carried out the aforementioned operation that does not have under the electron key situation earlier, if the terminal access failure can be searched the electron key grant column list again and judge whether to allow this terminal node to insert.(not having the terminal of electron key interface can't adopt this mode to insert).Administrative staff also can the login management node, and " access control " attribute that the terminal permissions list is set allows or refuse the access of this terminal node.
According to above-mentioned interconnect scheme content, terminal access mode is divided into automatic access and manually inserts two kinds.
Terminal inserts detailed process as shown in Figure 5 automatically, and terminal node adopts the automatic access way of terminal to comprise the steps:
S101, terminal equipment start, and search its management node; Turn to step S102;
S102, initiate to insert application to its management node; Turn to step S103;
S103, management node obtain terminal iidentification, search the terminal permissions list, judge whether that the terminal iidentification of coupling and authorization terminal insert automatically for allowing; If turn to step S111, otherwise turn to step 104;
S104, request electronic key information; Turn to step S105;
S105, judge whether to be connected with electron key; If turn to step S106, otherwise turn to step S107;
The signature of S106, transmission electron key; Turn to step S108;
S107, access failure turn to step S102;
S108, usefulness PKI visa signature, and obtain signature contents, in the electron key grant column list, search occurrence; Turn to step S109;
S109, judge whether the user name of coupling, and term of validity mistake not; If turn to step S110, otherwise turn to step S107;
Whether comprise this terminal equipment in the equipment item that S110, judgement allow to insert automatically; If turn to step S111, otherwise turn to step S107;
S111, insert successfully.
Terminal manually inserts detailed process as shown in Figure 6, and terminal node adopts manual access way to comprise the steps:
S201, terminal equipment start; Turn to step S202;
Whether S202, judgement insert successful automatically; If turn to step S207, otherwise turn to step S203;
S203, etc. to be accessed, turn to step S204;
S204, browsing terminal permissions list show that request accesses terminal, and turns to step S205;
S205, find corresponding terminal node place record, turn to step S206;
S206, the access control item is set, clicks and insert, promptly allow its access, turn to step S207;
S207, insert successfully.
In sum, adopt method of the present invention can effectively solve the safe access problem of terminal, effectively manage a large amount of internet-of-things terminals, can realize the fast automatic access of internet-of-things terminal.Its safety problem is converted into the safety problem of electron key, can prevent effectively that then illegal terminal from inserting, not only convenient but also safety.
Embodiment two
According to rule request, the electron key interface of required standard, this example adopts the USB2.0 interface, electron key adopts the USB softdog, installation administration program in management node, the web-based management interface is provided, and hypervisor provides authentication, authorizes and safeguard the function (comprising Fig. 2, content shown in Figure 3) of authorization message.At terminal node USB softdog interactive program is installed.
No USB interface terminal access method:
1, permission being set in management node terminal permissions list should insert automatically
2, in management node terminal permissions list, manually insert
The USB interface terminal access method is arranged:
1, permission being set in management node terminal permissions list should insert automatically
2, in management node terminal permissions list, manually insert
3, at management node mandate USB softdog, allow to comprise in the automatic access device this terminal, with management node private key signature authorization message, write the USB softdog; The USB softdog is inserted this terminal, make its automatic access.
The operation of this way is very simple and convenient, and fail safe is also very high, and the USB softdog is just as the key of antitheft door.Difference is that the USB softdog can be cancelled the mandate to it after losing in management node, lose this key and lost efficacy.
Here description of the invention and application is illustrative, is not to want with scope restriction of the present invention in the above-described embodiments.Here the distortion of disclosed embodiment and change are possible, and the various parts of the replacement of embodiment and equivalence are known for those those of ordinary skill in the art.Those skilled in the art are noted that under the situation that does not break away from spirit of the present invention or substantive characteristics, and the present invention can be with other form, structure, layout, ratio, and realize with other assembly, material and parts.Under the situation that does not break away from the scope of the invention and spirit, can carry out other distortion and change here to disclosed embodiment.

Claims (7)

1. method that realizes that internet-of-things terminal safety inserts is characterized in that:
All be a node in the network behind each accessing terminal to network, each node all has the sign of a uniqueness; The node that the network insertion service is provided is as management node, and management node must be furnished with the interface of electron key; Being connected directly to the node that management node comes access network is terminal node; Terminal node is the distributing terminals node no longer, and perhaps, terminal node is assigned the terminal node of electron key interface and does not have the terminal node of electron key interface; Management node manages terminal node;
Management node is safeguarding that two permissions lists manage its terminal node, comprises terminal permissions list and electron key grant column list; The terminal permissions list is preserved the authority information of terminal, and the authority of terminal is set;
Preserve authorization message in the electron key, simultaneously it is as identify label, and the management node that authorization message all is authorized to is kept at wherein after with private key signature; In the electron key grant column list of management node, write authorization message to electron key;
When not connecting the terminal node application access network of electron key, management node can be searched the terminal permissions list and judge whether to allow this terminal node to insert;
When being connected with the terminal node application access network of electron key, management node can be carried out the aforementioned operation that does not have under the electron key situation earlier, if the terminal access failure is searched the electron key grant column list again and judged whether to allow this terminal node to insert.
2. the method that realization internet-of-things terminal safety according to claim 1 inserts is characterized in that:
Described method further comprises: administrative staff's login management node, the access control attribute that the terminal permissions list is set allows or refuses the access of this terminal node.
3. the method that realization internet-of-things terminal safety according to claim 1 inserts is characterized in that:
The terminal node access way is divided into automatic access and manually inserts two kinds.
4. the method that realization internet-of-things terminal safety according to claim 1 inserts is characterized in that:
Terminal node adopts automatic access way to insert, and comprises the steps:
S101, terminal equipment start, and search its management node; Turn to step S102;
S102, initiate to insert application to its management node; Turn to step S103;
S103, management node obtain terminal iidentification, search the terminal permissions list, judge whether that the terminal iidentification of coupling and authorization terminal insert automatically for allowing; If turn to step S111, otherwise turn to step 104;
S104, request electronic key information; Turn to step S105;
S105, judge whether to be connected with electron key; If turn to step S106, otherwise turn to step S107;
The signature of S106, transmission electron key; Turn to step S108;
S107, access failure turn to step S102;
S108, usefulness PKI visa signature, and obtain signature contents, in the electron key grant column list, search occurrence; Turn to step S109;
S109, judge whether the user name of coupling, and term of validity mistake not; If turn to step S110, otherwise turn to step S107;
Whether comprise this terminal equipment in the equipment item that S110, judgement allow to insert automatically; If turn to step S111, otherwise turn to step S107;
S111, insert successfully.
5. the method that realization internet-of-things terminal safety according to claim 1 inserts is characterized in that:
Terminal node adopts manual access way to insert, and comprises the steps:
S201, terminal equipment start; Turn to step S202;
Whether S202, judgement insert successful automatically; If turn to step S207, otherwise turn to step S203;
S203, etc. to be accessed, turn to step S204;
S204, browsing terminal permissions list show that request accesses terminal, and turns to step S205;
S205, find corresponding terminal node place record, turn to step S206;
S206, the access control item is set, clicks and insert, promptly allow its access, turn to step S207;
S207, insert successfully.
6. the method that realization internet-of-things terminal safety according to claim 1 inserts is characterized in that:
No USB interface terminal access method comprises the steps:
Permission is set in management node terminal permissions list should be inserted automatically;
In management node terminal permissions list, manually insert.
7. the method that realization internet-of-things terminal safety according to claim 1 inserts is characterized in that:
There is the USB interface terminal access method to comprise the steps:
Permission is set in management node terminal permissions list should be inserted automatically;
In management node terminal permissions list, manually insert;
At management node mandate USB softdog, allow to comprise in the automatic access device this terminal, with management node private key signature authorization message, write the USB softdog; The USB softdog is inserted this terminal, make its automatic access.
CN201010609366.0A 2010-12-28 2010-12-28 Method for realizing safe access of terminal of internet of thing Active CN102065430B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010609366.0A CN102065430B (en) 2010-12-28 2010-12-28 Method for realizing safe access of terminal of internet of thing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010609366.0A CN102065430B (en) 2010-12-28 2010-12-28 Method for realizing safe access of terminal of internet of thing

Publications (2)

Publication Number Publication Date
CN102065430A true CN102065430A (en) 2011-05-18
CN102065430B CN102065430B (en) 2013-07-24

Family

ID=44000481

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010609366.0A Active CN102065430B (en) 2010-12-28 2010-12-28 Method for realizing safe access of terminal of internet of thing

Country Status (1)

Country Link
CN (1) CN102065430B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102291430A (en) * 2011-06-28 2011-12-21 中国联合网络通信集团有限公司 Method for processing allocation information of Internet of things, Internet of things platform and system
CN102821092A (en) * 2012-07-03 2012-12-12 华为技术有限公司 Internet of Things system and Internet of Things service providing and monitoring method
CN102970676A (en) * 2011-09-01 2013-03-13 中兴通讯股份有限公司 Method for processing original data, internet of thing system and terminal
CN103281304A (en) * 2013-04-28 2013-09-04 苏州亿倍信息技术有限公司 Information safety processing method and system
WO2013189438A2 (en) * 2013-05-30 2013-12-27 中兴通讯股份有限公司 Method and system for preventing ordinary terminal from triggering things of internet device
CN104077905A (en) * 2014-06-04 2014-10-01 刘芬 System and method for automatically collecting positions of terminal nodes of internet of things
CN105101368A (en) * 2015-07-15 2015-11-25 小米科技有限责任公司 Network access method, equipment and system
WO2017024791A1 (en) * 2015-08-10 2017-02-16 华为技术有限公司 Authorization processing method and device
CN106936835A (en) * 2017-03-21 2017-07-07 厦门中控生物识别信息技术有限公司 The method and system that equipment is accessed
WO2018099285A1 (en) * 2016-12-02 2018-06-07 阿里巴巴集团控股有限公司 Internet of things device burning verification method and apparatus, and identity authentication method and apparatus
CN109359991A (en) * 2018-09-30 2019-02-19 北京奇虎科技有限公司 Cut-in method, device and the calculating equipment of internet of things equipment
CN111159693A (en) * 2019-12-28 2020-05-15 西安精雕软件科技有限公司 Electronic equipment permission verification method, device and system and readable medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101022418A (en) * 2007-03-14 2007-08-22 华为技术有限公司 HMIP identifying method, equipment and system
CN101222772A (en) * 2008-01-23 2008-07-16 西安西电捷通无线网络通信有限公司 Wireless multi-hop network authentication access method based on ID

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101022418A (en) * 2007-03-14 2007-08-22 华为技术有限公司 HMIP identifying method, equipment and system
CN101222772A (en) * 2008-01-23 2008-07-16 西安西电捷通无线网络通信有限公司 Wireless multi-hop network authentication access method based on ID
WO2009094941A1 (en) * 2008-01-23 2009-08-06 China Iwncomm Co., Ltd A method, device and system of id based wireless multi-hop network autentication access

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102291430B (en) * 2011-06-28 2013-11-20 中国联合网络通信集团有限公司 Method for processing allocation information of Internet of things, Internet of things platform and system
CN102291430A (en) * 2011-06-28 2011-12-21 中国联合网络通信集团有限公司 Method for processing allocation information of Internet of things, Internet of things platform and system
CN102970676B (en) * 2011-09-01 2018-04-10 中兴通讯股份有限公司 A kind of method handled initial data, Internet of things system and terminal
CN102970676A (en) * 2011-09-01 2013-03-13 中兴通讯股份有限公司 Method for processing original data, internet of thing system and terminal
CN102821092A (en) * 2012-07-03 2012-12-12 华为技术有限公司 Internet of Things system and Internet of Things service providing and monitoring method
CN102821092B (en) * 2012-07-03 2015-05-27 华为技术有限公司 Internet of Things system and Internet of Things service providing and monitoring method
CN103281304A (en) * 2013-04-28 2013-09-04 苏州亿倍信息技术有限公司 Information safety processing method and system
WO2013189438A2 (en) * 2013-05-30 2013-12-27 中兴通讯股份有限公司 Method and system for preventing ordinary terminal from triggering things of internet device
WO2013189438A3 (en) * 2013-05-30 2014-04-24 中兴通讯股份有限公司 Method and system for preventing ordinary terminal from triggering things of internet device
CN104077905A (en) * 2014-06-04 2014-10-01 刘芬 System and method for automatically collecting positions of terminal nodes of internet of things
CN105101368A (en) * 2015-07-15 2015-11-25 小米科技有限责任公司 Network access method, equipment and system
KR101962156B1 (en) * 2015-08-10 2019-03-26 후아웨이 테크놀러지 컴퍼니 리미티드 Authorization processing method and apparatus
KR20180022999A (en) * 2015-08-10 2018-03-06 후아웨이 테크놀러지 컴퍼니 리미티드 Authorization processing method and apparatus
CN106714075A (en) * 2015-08-10 2017-05-24 华为技术有限公司 Authorization processing method and equipment
WO2017024791A1 (en) * 2015-08-10 2017-02-16 华为技术有限公司 Authorization processing method and device
US10666661B2 (en) 2015-08-10 2020-05-26 Huawei Technologies Co., Ltd. Authorization processing method and device
CN106714075B (en) * 2015-08-10 2020-06-26 华为技术有限公司 Method and device for processing authorization
WO2018099285A1 (en) * 2016-12-02 2018-06-07 阿里巴巴集团控股有限公司 Internet of things device burning verification method and apparatus, and identity authentication method and apparatus
CN108156126A (en) * 2016-12-02 2018-06-12 阿里巴巴集团控股有限公司 The burning method of calibration and device of internet of things equipment, identity identifying method and device
US11050750B2 (en) 2016-12-02 2021-06-29 Alibaba Group Holding Limited Recording and verification method and apparatus of internet of things device, and identity authentication method and apparatus
CN106936835A (en) * 2017-03-21 2017-07-07 厦门中控生物识别信息技术有限公司 The method and system that equipment is accessed
CN106936835B (en) * 2017-03-21 2020-04-14 厦门中控智慧信息技术有限公司 Method and system for accessing equipment
CN109359991A (en) * 2018-09-30 2019-02-19 北京奇虎科技有限公司 Cut-in method, device and the calculating equipment of internet of things equipment
CN111159693A (en) * 2019-12-28 2020-05-15 西安精雕软件科技有限公司 Electronic equipment permission verification method, device and system and readable medium

Also Published As

Publication number Publication date
CN102065430B (en) 2013-07-24

Similar Documents

Publication Publication Date Title
CN102065430B (en) Method for realizing safe access of terminal of internet of thing
US8107927B2 (en) Dedicated memory partitions for users of a shared mobile device
CN102968501B (en) A kind of general full-text search method
CN104735091A (en) Linux system-based user access control method and device
CN102420902A (en) Method for classification management over right of using functions and mobile terminal
CN102136085B (en) Telecom smart card and telecom smart card-based non-contact application management method
CN102024121A (en) Platform security apparatus and method thereof
CN105101196A (en) User account management method and device
US20150350219A1 (en) Profile change management
CN103078859A (en) Service system authority management method, equipment and system
CN105630615A (en) Cross-system application control method and intelligent terminal
CN105046146A (en) Resource access method of Android system
CN103313238A (en) Safety system and safety protection method for mobile terminal
US20140099923A1 (en) Subscriber device unlock
CN102880897B (en) A kind of application data of smart card shares method and smart card
CN102801731B (en) A kind of method of protected data and device
CN106506511A (en) A kind of address list information processing method, device
CN106648384A (en) Method and device for service calling
CN106097514A (en) The communication verification method of a kind of chargeable smart lock and unlocking apparatus thereof
CN102158351B (en) Method and device for managing device management tree under multiple servers of device management client
CN104281862B (en) A kind of segmentation of ultrahigh frequency RFID memory field is continued and guard method
CN102572835B (en) A kind of automatic cut-in method of WLAN (wireless local area network) and device
CN103607508B (en) The management method of a kind of authority, device and mobile phone terminal
CN102411605A (en) Data processing method and device for graphics files based on CAD (computer-aided design)
CN107479827A (en) A kind of mixing storage system implementation method based on IO and separated from meta-data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: JIANGSU ZHEQIN TECHNOLOGY CO., LTD.

Free format text: FORMER OWNER: CHINASECUR INFORMATION TECHNOLOGY CO., LTD.

Effective date: 20140127

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 200433 YANGPU, SHANGHAI TO: 214125 WUXI, JIANGSU PROVINCE

TR01 Transfer of patent right

Effective date of registration: 20140127

Address after: Jinxi road Binhu District 214125 Jiangsu city of Wuxi province 7-1 No. 100 five floor

Patentee after: Jiangsu Zheqin Technology Co.,Ltd.

Address before: 200433, room 1, building 335, No. 6006, National Road, Shanghai, Yangpu District

Patentee before: SHANGHAI CINSEC INFORMATION TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right

Effective date of registration: 20230526

Address after: G1-706, China Sensor Network International Innovation Park, No. 200 Linghu Avenue, Xinwu District, Wuxi City, Jiangsu Province, 214142

Patentee after: Wuxi Dingchi Information Technology Co.,Ltd.

Address before: Floor 7-1, No. 100 Jinxi Road, Binhu District, Wuxi City, Jiangsu Province, 214125

Patentee before: Jiangsu Zheqin Technology Co.,Ltd.

TR01 Transfer of patent right