CN113343212A - Device registration method and apparatus, electronic device, and storage medium - Google Patents

Device registration method and apparatus, electronic device, and storage medium Download PDF

Info

Publication number
CN113343212A
CN113343212A CN202110710156.9A CN202110710156A CN113343212A CN 113343212 A CN113343212 A CN 113343212A CN 202110710156 A CN202110710156 A CN 202110710156A CN 113343212 A CN113343212 A CN 113343212A
Authority
CN
China
Prior art keywords
registration
authorization file
server
license authorization
terminal device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110710156.9A
Other languages
Chinese (zh)
Other versions
CN113343212B (en
Inventor
雷震宇
王杨东
伊帅
张帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Sensetime Technology Co Ltd
Original Assignee
Chengdu Sensetime Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Sensetime Technology Co Ltd filed Critical Chengdu Sensetime Technology Co Ltd
Priority to CN202110710156.9A priority Critical patent/CN113343212B/en
Publication of CN113343212A publication Critical patent/CN113343212A/en
Application granted granted Critical
Publication of CN113343212B publication Critical patent/CN113343212B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The method is applied to terminal equipment, a permission authorization file is stored in a memory of the terminal equipment, and the permission authorization file comprises a registration security certificate. The method comprises the following steps: acquiring an encryption key of the license authorization file from an encryption chip of the terminal equipment; decrypting the license authorization file according to the encryption key to obtain the decrypted license authorization file; acquiring a registration security certificate according to the decrypted license authorization file; generating an authentication signature according to the registered security certificate; sending a registration request to the server according to the authentication signature so that the server verifies the authentication signature; and in the case of receiving the registration information sent by the server, establishing communication connection with the server. The embodiment of the disclosure can improve the security of registering the security certificate.

Description

Device registration method and apparatus, electronic device, and storage medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a device registration method and apparatus, an electronic device, and a storage medium.
Background
In the scenario of Internet of Things, connection between an Internet of Things (IoT) device on an edge side and the Internet of Things generally needs to be established through an open public network. When the edge IoT device accesses the cloud-side system, security authentication needs to be performed through the registered security credentials of the edge IoT device to confirm the legal identity of the device. In the related art, the registration security credentials of the edge IoT device are usually directly stored in the memory of the device, which presents a security risk.
Disclosure of Invention
The present disclosure provides a technical solution for device registration.
According to an aspect of the present disclosure, there is provided a device registration method applied to a terminal device, where a memory of the terminal device stores a license authorization file of the terminal device, and the license authorization file includes a registration security credential of the terminal device, the method including:
acquiring an encryption key of the license authorization file from an encryption chip of the terminal equipment; decrypting the license authorization file according to the encryption key to obtain a decrypted license authorization file; acquiring the registration security certificate according to the decrypted license authorization file; generating an authentication signature according to the registration security certificate; sending a registration request to a server according to the authentication signature so that the server verifies the authentication signature; and under the condition of receiving the registration information sent by the server, establishing communication connection with the server.
In a possible implementation manner, before obtaining the encryption key of the license authorization file from the encryption chip of the terminal device, the method further includes: writing the registration security certificate into an initial license authorization file, and encrypting through the encryption key to obtain the license authorization file; storing the license authorization file in the memory; and storing the encryption key into the encryption chip.
In a possible implementation manner, the obtaining, from an encryption chip of the terminal device, an encryption key of the license authorization file includes: and calling a security interface of the encryption chip, and reading the encryption key from the encryption chip.
In a possible implementation manner, the obtaining the registration security credential according to the decrypted license authorization file includes: analyzing the decrypted license authorization file to obtain the file content of the decrypted license authorization file; and determining the registration security certificate according to the preset field of the file content.
In a possible implementation manner, the sending, by the terminal device, a registration request to the server according to the authentication signature includes: sending a registration request to the agent process, wherein the registration request comprises the authentication signature; the proxy process sends the registration request to the server via the HTTP protocol.
In a possible implementation manner, the establishing a communication connection with the server in a case of receiving the registration information sent by the server includes: the agent process forwards the registration information to the terminal equipment under the condition of receiving the registration information sent by the server; and the terminal equipment establishes communication connection with the server through the proxy process according to the registration information.
In one possible implementation manner, the terminal device includes an edge internet of things device or an edge artificial intelligence internet of things device.
According to an aspect of the present disclosure, there is provided a device registration apparatus, applied to a terminal device, where a memory of the terminal device stores a license authorization file of the terminal device, and the license authorization file includes a registration security credential of the terminal device, the apparatus includes:
the key acquisition module is used for acquiring the encryption key of the license authorization file from an encryption chip of the terminal equipment; the decryption module is used for decrypting the license authorization file according to the encryption key to obtain the decrypted license authorization file; the certificate acquisition module is used for acquiring the registration security certificate according to the decrypted license authorization file; the signature generation module is used for generating an authentication signature according to the registration security certificate; the request sending module is used for sending a registration request to a server according to the authentication signature so that the server can verify the authentication signature; and the communication connection establishing module is used for establishing communication connection with the server under the condition of receiving the registration information sent by the server.
In a possible implementation manner, before the key obtaining module, the apparatus further includes: the certificate writing module is used for writing the registration security certificate into an initial license authorization file and encrypting the initial license authorization file through the encryption key to obtain the license authorization file; a license file storage module for storing the license authorization file in the memory; and the key storage module is used for storing the encryption key into the encryption chip.
In one possible implementation manner, the key obtaining module is configured to: and calling a security interface of the encryption chip, and reading the encryption key from the encryption chip.
In one possible implementation manner, the credential obtaining module is configured to: analyzing the decrypted license authorization file to obtain the file content of the decrypted license authorization file; and determining the registration security certificate according to the preset field of the file content.
In a possible implementation manner, a proxy process is run in the terminal device, and the request sending module is configured to: sending a registration request to the agent process, wherein the registration request comprises the authentication signature; the proxy process sends the registration request to the server via the HTTP protocol.
In one possible implementation manner, the communication connection establishing module is configured to: the agent process forwards the registration information to the terminal equipment under the condition of receiving the registration information sent by the server; and the terminal equipment establishes communication connection with the server through the proxy process according to the registration information.
In one possible implementation manner, the terminal device includes an edge internet of things device or an edge artificial intelligence internet of things device.
According to an aspect of the present disclosure, there is provided an electronic device including: a processor; a memory for storing processor-executable instructions; wherein the processor is configured to invoke the memory-stored instructions to perform the above-described method.
According to an aspect of the present disclosure, there is provided a computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the above-described method.
In the disclosed embodiment, the registration security credentials are combined with the license authorization file and stored in its entirety; when the equipment is registered, the encryption key of the license authorization file can be obtained from the encryption chip, the license authorization file is decrypted through the encryption key, the registration security certificate is obtained from the decrypted license authorization file, the authentication signature is generated and the server is registered, and therefore the security of the registration security certificate is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure. Other features and aspects of the present disclosure will become apparent from the following detailed description of exemplary embodiments, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and, together with the description, serve to explain the principles of the disclosure.
Fig. 1 shows a flowchart of a device registration method according to an embodiment of the present disclosure.
Fig. 2 shows a schematic diagram of a registration preparation phase of a device registration method according to an embodiment of the present disclosure.
Fig. 3 shows a schematic diagram of the registration phase of a device registration method according to an embodiment of the present disclosure.
Fig. 4 shows a block diagram of a device registration apparatus according to an embodiment of the present disclosure.
Fig. 5 shows a block diagram of an electronic device in accordance with an embodiment of the disclosure.
Fig. 6 illustrates a block diagram of an electronic device in accordance with an embodiment of the disclosure.
Detailed Description
Various exemplary embodiments, features and aspects of the present disclosure will be described in detail below with reference to the accompanying drawings. In the drawings, like reference numbers can indicate functionally identical or similar elements. While the various aspects of the embodiments are presented in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
The word "exemplary" is used exclusively herein to mean "serving as an example, embodiment, or illustration. Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments.
The term "and/or" herein is merely an association describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the term "at least one" herein means any one of a plurality or any combination of at least two of a plurality, for example, including at least one of A, B, C, and may mean including any one or more elements selected from the group consisting of A, B and C.
Furthermore, in the following detailed description, numerous specific details are set forth in order to provide a better understanding of the present disclosure. It will be understood by those skilled in the art that the present disclosure may be practiced without some of these specific details. In some instances, methods, means, elements and circuits that are well known to those skilled in the art have not been described in detail so as not to obscure the present disclosure.
In the internet of things scenario, there are various marginal IoT devices, such as express cabinets, card readers, vending machines, and the like. In recent years, in an artificial intelligence internet of things AIoT scene in which an artificial intelligence AI and an internet of things IoT are fused, various edge AIoT devices, such as a face brushing panel machine, an intelligent edge node device, and the like, have appeared.
The connection between the edge IoT device or the edge AIoT device and the internet of things generally needs to be established through an open public network, and the security authentication needs to be performed through a registered security credential accessed by the device to confirm the legal identity of the device. The registration security credential of the device refers to an asymmetric key used for registering the device in the central service system and used for generating an authentication signature.
How the security credentials of the edge IoT devices are securely stored is one of the keys to protect the business interests of the company. In the related art, the registered security credentials are typically stored in a memory of the device, which may cause an uncontrolled registration of the security credentials if the device is uncontrolled or lost.
These edge IoT devices or edge AIoT devices also typically need a License authorization file (License file) in order to authorize the use of the device local system. When the equipment leaves a factory, the encryption key of the license authorization file can be stored/burned into the encryption chip of the equipment, the user can obtain the encryption key only through the encryption chip, the license authorization file is decrypted through the encryption key, and the safety is high.
According to the device registration method, the registration security certificate can be written into the license authorization file, the whole license authorization file is protected through the encryption key, and the encryption key is safely stored in the encryption chip, so that the security of the registration security certificate is improved, and the security risk of the IoT device when the IoT device is out of control is reduced.
Fig. 1 shows a flowchart of a device registration method according to an embodiment of the present disclosure, and as shown in fig. 1, the device registration method includes:
in step S11, acquiring an encryption key of the license authorization file from an encryption chip of the terminal device;
in step S12, the license authorization file is decrypted according to the encryption key, so as to obtain a decrypted license authorization file;
in step S13, acquiring the registration security credential according to the decrypted license authorization file;
in step S14, generating an authentication signature based on the registered security credentials;
in step S15, a registration request is sent to a server according to the authentication signature, so that the server verifies the authentication signature;
in step S16, when the registration information transmitted by the server is received, a communication connection is established with the server.
In one possible implementation, the device registration method may be performed by an electronic device, such as a terminal device, which may be a User Equipment (UE), a mobile device, a User terminal, a cellular phone, a cordless phone, a Personal Digital Assistant (PDA), a handheld device, a computing device, a vehicle-mounted device, a wearable device, or the like, and the method may be implemented by a processor calling computer-readable instructions stored in a memory.
In the internet of things scenario, a terminal device executing the device registration method according to the embodiment of the present disclosure may be, for example, an edge internet of things IoT device or an edge artificial intelligence internet of things AIoT device. The present disclosure is not limited to a particular class of terminal devices.
In a possible implementation manner, when the terminal device leaves a factory, the registration security credential of the terminal device may be written into a preset field of the license authorization file, and the license authorization file is encrypted by the encryption key to obtain the license authorization file in a ciphertext form.
Wherein, the encrypted license authorization file can be packaged with the software program of the device and stored in the memory (such as a disk) of the terminal device; and, the encryption key of the license authority file is stored in the encryption chip of the device.
Therefore, the encrypted license file is stored in the memory of the terminal device, the license file comprises the registration security certificate of the terminal device, the encryption chip of the terminal device stores the encryption key of the license file, and the security is high.
After the terminal device is deployed to a corresponding location or place, when the terminal device is started, the terminal device may connect with a server (e.g., a central server, a cloud server, etc.) through a public network and register with the server, so that the server may confirm the legal identity of the terminal device.
In one possible implementation manner, in step S11, the encryption key of the license authorization file may be obtained from an encryption chip of the terminal device. The security interface of the encryption chip can be called to read the license authorization file encryption key from the encryption chip.
In one possible implementation manner, in step S12, the license authority file in the memory may be decrypted by the encryption key, so as to obtain the decrypted license authority file.
In one possible implementation manner, in step S13, the registration security credential may be obtained according to the decrypted license authorization file. The decrypted license authorization file can be analyzed to obtain the file content of the decrypted license authorization file; and determining the preset field of the file content as a registration security certificate.
In one possible implementation, in step S14, an authentication signature may be generated according to the acquired registration security credential. The present disclosure does not limit the manner in which the authentication signature is generated.
In a possible implementation manner, in step S15, according to the authentication signature, the terminal device may send a registration request to the server through the public network, so that the server verifies the authentication signature and verifies the registration authentication information of the terminal device. The server returns registration information to the terminal device when the authentication signature is successfully verified.
In a possible implementation manner, in step S16, the terminal device establishes a communication connection with the server in case of receiving the registration information sent by the server, thereby completing the registration process.
According to the equipment registration method of the embodiment of the disclosure, the registration security certificate is combined with the permission authorization file and stored integrally; when the equipment is registered, the encryption key of the license authorization file can be obtained from the encryption chip, the license authorization file is decrypted through the encryption key, the registration security certificate is obtained from the decrypted license authorization file, the authentication signature is generated and the server is registered, and therefore the security of the registration security certificate is improved.
A device registration method according to an embodiment of the present disclosure is explained below.
As described above, the registered security credentials may be written when the terminal device is shipped. In one possible implementation manner, before step S11, the device registration method according to the embodiment of the present disclosure may further include:
writing the registration security certificate into an initial license authorization file, and encrypting through the encryption key to obtain the license authorization file;
storing the license authorization file in the memory;
and storing the encryption key into the encryption chip.
That is, the terminal device may have an initial license authorization file for authorizing the terminal device's local system to use various functions of the device itself (e.g., various applications). If the registered security certificate is directly stored in the encryption chip, the capacity of the encryption chip may be exceeded, and meanwhile, the factory configuration process is greatly changed, so that the complexity of the factory configuration process can be improved.
In this case, the registration security credential of the terminal device may be written into a preset field of the initial license authorization file; and then, the encrypted license authorization file is obtained by encrypting through the encryption key of the license authorization file.
In a possible implementation manner, the encrypted license authorization file may be directly stored in a memory (e.g. a disk) of the terminal device, or the encrypted license authorization file may be packaged with a software program of the device and stored in the memory of the terminal device, and the encryption key is burned into an encryption chip of the terminal device, so as to implement the combination and encrypted storage of the registration security credential and the license authorization file.
By the method, the safety of the registered safety certificate can be improved, the safety risk when the equipment is out of control is reduced, and the influence on the factory configuration process is small.
After the terminal device is deployed to a corresponding position or place, the terminal device can be connected with the server through the public network and registered with the server under the conditions of starting, restarting or disconnecting the network and reconnecting the terminal device and the like. Step S11-step S14 may be a registration preparation phase.
In one possible implementation, step S11 may include: and calling a security interface of the encryption chip, and reading the encryption key from the encryption chip.
That is to say, the terminal device may call the secure interface of the encryption chip to read the encryption key of the license file from the encryption chip in the preparation stage of registration. The encryption chip is read in a restrictive manner, so that the encryption key is prevented from being leaked to a third party, and the security of the license authorization file and the registration security certificate is ensured.
In one possible implementation manner, after obtaining the encryption key, the license authority file may be decrypted by the encryption key in step S12, so as to obtain a decrypted license authority file. The present disclosure does not limit the manner of decryption.
In one possible implementation, step S13 may include:
analyzing the decrypted license authorization file to obtain the file content of the decrypted license authorization file; and determining the registration security certificate according to the preset field of the file content.
That is, the decrypted license file may be analyzed to obtain the file content of the decrypted license file, and the analysis manner of the license file is not limited in the present disclosure.
In one possible implementation manner, according to the file content of the license authorization file, the content of a preset field (e.g. 128-th and 256-th bits) of the file content can be read and determined as the registration security credential.
In this manner, the registration security credentials may be obtained from the license authorization file.
Further, in step S14, an authentication signature may be generated from the acquired registration security credential so that registration may be performed based on the authentication signature. The present disclosure does not limit the manner in which the authentication signature is generated.
Fig. 2 shows a schematic diagram of a registration preparation phase of a device registration method according to an embodiment of the present disclosure. As shown in fig. 2, the steps of the registration preparation phase may be performed at device start-up.
In step 2-1, the encryption chip can be called to obtain an encryption key;
in step 2-2, the license authorization file can be decrypted and analyzed through the encryption key, and a preset field of the file content of the license authorization file is obtained;
in step 2-3, a registration security certificate for equipment access can be acquired through a preset field of the license authorization file;
in step 2-4, an authentication signature may be generated based on the registered security credentials. Further, a device registration procedure may be initiated.
In one possible implementation, an agent process is run in the terminal device for connecting to the server. In the device registration phase of step S15-step S16, the terminal device may perform registration through a proxy process.
In one possible implementation, step S15 may include:
sending a registration request to the agent process, wherein the registration request comprises the authentication signature;
the proxy process sends the registration request to the server via the HTTP protocol.
That is, based on the generated authentication signature, the terminal device may generate a registration request including the authentication signature. The terminal device may send a registration request to the proxy process, which sends the registration request to the server via the HTTP protocol.
In a possible implementation manner, after receiving the registration request, the server may verify the authentication signature and verify the registration authentication information of the terminal device. The server returns registration information to the terminal device when the authentication signature is successfully verified.
In this way, a registration request process may be implemented.
In one possible implementation, step S16 may include:
the agent process forwards the registration information to the terminal equipment under the condition of receiving the registration information sent by the server;
and the terminal equipment establishes communication connection with the server through the proxy process according to the registration information.
That is, the registration information returned by the server is sent to the proxy process, which forwards the registration information to the terminal device upon receipt. And the terminal equipment establishes communication connection with the server through the proxy process according to the registration information, thereby completing the registration process.
Fig. 3 shows a schematic diagram of the registration phase of a device registration method according to an embodiment of the present disclosure. As shown in fig. 3, the terminal device 31, the proxy process 32, and the server 33 are included. In the registration phase:
in step 3-1, the terminal device 31 sends a registration request to the agent process 32;
in step 3-2, the agent process 32 sends a registration request to the server 33;
in step 3-3, the server 33 returns registration information to the agent process 32 in the case where the authentication signature is successfully verified;
in step 3-4, the proxy process 32 forwards the registration information to the terminal device 31.
In this way, a registration process of the terminal device can be achieved.
According to the device registration method of the embodiment of the disclosure, the registration security certificate and the permission authorization file can be combined, the registration security certificate is used as an attribute in the permission authorization file, the whole permission authorization file is protected through the encryption key, and the encryption key is safely stored in the encryption chip.
Therefore, the encryption chip ensures the confidentiality and the uniqueness of the license authorization file, and ensures that the equipment cannot normally register once the license authorization file is tampered. The registration security certificate of the equipment is placed in the permission authorization file, so that the leakage of the security certificate of the equipment can be avoided even if the equipment is lost. Meanwhile, the limited reading mode of the encryption chip can ensure that the encryption key cannot be leaked to a third party, so that the registration security certificate cannot be leaked, and the security of equipment registration is improved.
According to the device registration method of the embodiment of the disclosure, when the terminal device registers, the encryption key can be obtained from the encryption chip in a secure interface calling mode, the license authorization file is decrypted through the encryption key, the registration security certificate is obtained from the decrypted license authorization file, the authentication signature is generated, the registration request is generated according to the authentication signature, the registration request is transmitted to the proxy service process on the terminal device, the registration security certificate of the device is ensured not to fall off the disk (namely, not to be stored in the disk of the device), and then the proxy service process sends the registration request to the cloud server, so that the successful registration can be directly realized, and the security of the registration security certificate is further improved.
The device registration method can be applied to application scenes such as an Internet of things (IoT), a secure storage and a security chip, and is executed in edge IoT devices/edge AIoT devices such as a face-brushing panel machine and an intelligent edge node device, so that the security of the registered security credentials of the device access network is improved.
It is understood that the above-mentioned method embodiments of the present disclosure can be combined with each other to form a combined embodiment without departing from the logic of the principle, which is limited by the space, and the detailed description of the present disclosure is omitted. Those skilled in the art will appreciate that in the above methods of the specific embodiments, the specific order of execution of the steps should be determined by their function and possibly their inherent logic.
In addition, the present disclosure also provides a device registration apparatus, an electronic device, a computer-readable storage medium, and a program, which can be used to implement any device registration method provided by the present disclosure, and the corresponding technical solutions and descriptions and corresponding descriptions in the method section are not repeated.
Fig. 4 shows a block diagram of a device registration apparatus according to an embodiment of the present disclosure. The device is applied to terminal equipment, wherein a memory of the terminal equipment stores a permission authorization file of the terminal equipment, and the permission authorization file comprises a registration security certificate of the terminal equipment. As shown in fig. 4, the apparatus includes:
a key obtaining module 41, configured to obtain an encryption key of the license authorization file from an encryption chip of the terminal device;
the decryption module 42 is configured to decrypt the license authorization file according to the encryption key to obtain a decrypted license authorization file;
a certificate obtaining module 43, configured to obtain the registration security certificate according to the decrypted license authorization file;
a signature generation module 44, configured to generate an authentication signature according to the registration security credential;
a request sending module 45, configured to send a registration request to a server according to the authentication signature, so that the server verifies the authentication signature;
and a communication connection establishing module 46, configured to establish a communication connection with the server when receiving the registration information sent by the server.
In a possible implementation manner, before the key obtaining module, the apparatus further includes: the certificate writing module is used for writing the registration security certificate into an initial license authorization file and encrypting the initial license authorization file through the encryption key to obtain the license authorization file; a license file storage module for storing the license authorization file in the memory; and the key storage module is used for storing the encryption key into the encryption chip.
In one possible implementation manner, the key obtaining module is configured to: and calling a security interface of the encryption chip, and reading the encryption key from the encryption chip.
In one possible implementation manner, the credential obtaining module is configured to: analyzing the decrypted license authorization file to obtain the file content of the decrypted license authorization file; and determining the registration security certificate according to the preset field of the file content.
In a possible implementation manner, a proxy process is run in the terminal device, and the request sending module is configured to: sending a registration request to the agent process, wherein the registration request comprises the authentication signature; the proxy process sends the registration request to the server via the HTTP protocol.
In one possible implementation manner, the communication connection establishing module is configured to: the agent process forwards the registration information to the terminal equipment under the condition of receiving the registration information sent by the server; and the terminal equipment establishes communication connection with the server through the proxy process according to the registration information.
In one possible implementation manner, the terminal device includes an edge internet of things device or an edge artificial intelligence internet of things device.
In some embodiments, functions of or modules included in the apparatus provided in the embodiments of the present disclosure may be used to execute the method described in the above method embodiments, and specific implementation thereof may refer to the description of the above method embodiments, and for brevity, will not be described again here.
Embodiments of the present disclosure also provide a computer-readable storage medium having stored thereon computer program instructions, which when executed by a processor, implement the above-mentioned method. The computer readable storage medium may be a volatile or non-volatile computer readable storage medium.
An embodiment of the present disclosure further provides an electronic device, including: a processor; a memory for storing processor-executable instructions; wherein the processor is configured to invoke the memory-stored instructions to perform the above-described method.
The disclosed embodiments also provide a computer program product comprising computer readable code or a non-transitory computer readable storage medium carrying computer readable code, which when run in a processor of an electronic device, the processor in the electronic device performs the above method.
The electronic device may be provided as a terminal, server, or other form of device.
Fig. 5 illustrates a block diagram of an electronic device 800 in accordance with an embodiment of the disclosure. For example, the electronic device 800 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, or the like terminal.
Referring to fig. 5, electronic device 800 may include one or more of the following components: processing component 802, memory 804, power component 806, multimedia component 808, audio component 810, input/output (I/O) interface 812, sensor component 814, and communication component 816.
The processing component 802 generally controls overall operation of the electronic device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing components 802 may include one or more processors 820 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 802 can include one or more modules that facilitate interaction between the processing component 802 and other components. For example, the processing component 802 can include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operations at the electronic device 800. Examples of such data include instructions for any application or method operating on the electronic device 800, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 804 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power supply component 806 provides power to the various components of the electronic device 800. The power components 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the electronic device 800.
The multimedia component 808 includes a screen that provides an output interface between the electronic device 800 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 808 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the electronic device 800 is in an operation mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the electronic device 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 also includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 814 includes one or more sensors for providing various aspects of state assessment for the electronic device 800. For example, the sensor assembly 814 may detect an open/closed state of the electronic device 800, the relative positioning of components, such as a display and keypad of the electronic device 800, the sensor assembly 814 may also detect a change in the position of the electronic device 800 or a component of the electronic device 800, the presence or absence of user contact with the electronic device 800, orientation or acceleration/deceleration of the electronic device 800, and a change in the temperature of the electronic device 800. Sensor assembly 814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 814 may also include a light sensor, such as a Complementary Metal Oxide Semiconductor (CMOS) or Charge Coupled Device (CCD) image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate wired or wireless communication between the electronic device 800 and other devices. The electronic device 800 may access a wireless network based on a communication standard, such as a wireless network (WiFi), a second generation mobile communication technology (2G) or a third generation mobile communication technology (3G), or a combination thereof. In an exemplary embodiment, the communication component 816 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 816 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the electronic device 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer-readable storage medium, such as the memory 804, is also provided that includes computer program instructions executable by the processor 820 of the electronic device 800 to perform the above-described methods.
Fig. 6 illustrates a block diagram of an electronic device 1900 in accordance with an embodiment of the disclosure. For example, the electronic device 1900 may be provided as a server. Referring to fig. 6, electronic device 1900 includes a processing component 1922 further including one or more processors and memory resources, represented by memory 1932, for storing instructions, e.g., applications, executable by processing component 1922. The application programs stored in memory 1932 may include one or more modules that each correspond to a set of instructions. Further, the processing component 1922 is configured to execute instructions to perform the above-described method.
The electronic device 1900 may also include a power component 1926 configured to perform power management of the electronic device 1900, a wired or wireless network interface 1950 configured to connect the electronic device 1900 to a network, and an input/output (I/O) interface 1958. The electronic device 1900 may operate based on an operating system, such as the Microsoft Server operating system (Windows Server), stored in the memory 1932TM) Apple Inc. of the present application based on the graphic user interface operating System (Mac OS X)TM) Multi-user, multi-process computer operating system (Unix)TM) Free and open native code Unix-like operating System (Linux)TM) Open native code Unix-like operating System (FreeBSD)TM) Or the like.
In an exemplary embodiment, a non-transitory computer readable storage medium, such as the memory 1932, is also provided that includes computer program instructions executable by the processing component 1922 of the electronic device 1900 to perform the above-described methods.
The present disclosure may be systems, methods, and/or computer program products. The computer program product may include a computer-readable storage medium having computer-readable program instructions embodied thereon for causing a processor to implement various aspects of the present disclosure.
The computer readable storage medium may be a tangible device that can hold and store the instructions for use by the instruction execution device. The computer readable storage medium may be, for example, but is not limited to, an electronic memory device, a magnetic memory device, an optical memory device, an electromagnetic memory device, a semiconductor memory device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a Static Random Access Memory (SRAM), a portable compact disc read-only memory (CD-ROM), a Digital Versatile Disc (DVD), a memory stick, a floppy disk, a mechanical coding device, such as punch cards or in-groove projection structures having instructions stored thereon, and any suitable combination of the foregoing. Computer-readable storage media as used herein is not to be construed as transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission medium (e.g., optical pulses through a fiber optic cable), or electrical signals transmitted through electrical wires.
The computer-readable program instructions described herein may be downloaded from a computer-readable storage medium to a respective computing/processing device, or to an external computer or external storage device via a network, such as the internet, a local area network, a wide area network, and/or a wireless network. The network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. The network adapter card or network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage in a computer-readable storage medium in the respective computing/processing device.
The computer program instructions for carrying out operations of the present disclosure may be assembler instructions, Instruction Set Architecture (ISA) instructions, machine-related instructions, microcode, firmware instructions, state setting data, or source or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The computer-readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider). In some embodiments, the electronic circuitry that can execute the computer-readable program instructions implements aspects of the present disclosure by utilizing the state information of the computer-readable program instructions to personalize the electronic circuitry, such as a programmable logic circuit, a Field Programmable Gate Array (FPGA), or a Programmable Logic Array (PLA).
Various aspects of the present disclosure are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the disclosure. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer-readable program instructions.
These computer-readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer-readable program instructions may also be stored in a computer-readable storage medium that can direct a computer, programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer-readable medium storing the instructions comprises an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer, other programmable apparatus or other devices implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The computer program product may be embodied in hardware, software or a combination thereof. In an alternative embodiment, the computer program product is embodied in a computer storage medium, and in another alternative embodiment, the computer program product is embodied in a Software product, such as a Software Development Kit (SDK), or the like.
Having described embodiments of the present disclosure, the foregoing description is intended to be exemplary, not exhaustive, and not limited to the disclosed embodiments. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein is chosen in order to best explain the principles of the embodiments, the practical application, or improvements made to the technology in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.

Claims (10)

1. A device registration method is applied to a terminal device, wherein a memory of the terminal device stores a license authorization file of the terminal device, and the license authorization file comprises a registration security credential of the terminal device, and the method comprises the following steps:
acquiring an encryption key of the license authorization file from an encryption chip of the terminal equipment;
decrypting the license authorization file according to the encryption key to obtain a decrypted license authorization file;
acquiring the registration security certificate according to the decrypted license authorization file;
generating an authentication signature according to the registration security certificate;
sending a registration request to a server according to the authentication signature so that the server verifies the authentication signature;
and under the condition of receiving the registration information sent by the server, establishing communication connection with the server.
2. The method according to claim 1, wherein before obtaining the encryption key of the license authority file from the encryption chip of the terminal device, the method further comprises:
writing the registration security certificate into an initial license authorization file, and encrypting through the encryption key to obtain the license authorization file;
storing the license authorization file in the memory;
and storing the encryption key into the encryption chip.
3. The method according to claim 1 or 2, wherein the obtaining the encryption key of the license authorization file from the encryption chip of the terminal device comprises:
and calling a security interface of the encryption chip, and reading the encryption key from the encryption chip.
4. The method according to any one of claims 1-3, wherein the obtaining the registration security credentials according to the decrypted license authority file comprises:
analyzing the decrypted license authorization file to obtain the file content of the decrypted license authorization file;
and determining the registration security certificate according to the preset field of the file content.
5. The method according to any one of claims 1 to 4, wherein an agent process runs in the terminal device, and the sending a registration request to a server according to the authentication signature comprises:
sending a registration request to the agent process, wherein the registration request comprises the authentication signature;
the proxy process sends the registration request to the server via the HTTP protocol.
6. The method according to claim 5, wherein the establishing a communication connection with the server in case of receiving the registration information sent by the server comprises:
the agent process forwards the registration information to the terminal equipment under the condition of receiving the registration information sent by the server;
and the terminal equipment establishes communication connection with the server through the proxy process according to the registration information.
7. The method according to any one of claims 1-6, wherein the terminal device comprises an edge IOT device or an edge artificial intelligence IOT device.
8. An apparatus for registering a device, applied to a terminal device, where a memory of the terminal device stores a license authorization file of the terminal device, and the license authorization file includes a registration security credential of the terminal device, the apparatus comprising:
the key acquisition module is used for acquiring the encryption key of the license authorization file from an encryption chip of the terminal equipment;
the decryption module is used for decrypting the license authorization file according to the encryption key to obtain the decrypted license authorization file;
the certificate acquisition module is used for acquiring the registration security certificate according to the decrypted license authorization file;
the signature generation module is used for generating an authentication signature according to the registration security certificate;
the request sending module is used for sending a registration request to a server according to the authentication signature so that the server can verify the authentication signature;
and the communication connection establishing module is used for establishing communication connection with the server under the condition of receiving the registration information sent by the server.
9. An electronic device, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to invoke the memory-stored instructions to perform the method of any of claims 1 to 7.
10. A computer readable storage medium having computer program instructions stored thereon, which when executed by a processor implement the method of any one of claims 1 to 7.
CN202110710156.9A 2021-06-25 2021-06-25 Device registration method and apparatus, electronic device, and storage medium Active CN113343212B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110710156.9A CN113343212B (en) 2021-06-25 2021-06-25 Device registration method and apparatus, electronic device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110710156.9A CN113343212B (en) 2021-06-25 2021-06-25 Device registration method and apparatus, electronic device, and storage medium

Publications (2)

Publication Number Publication Date
CN113343212A true CN113343212A (en) 2021-09-03
CN113343212B CN113343212B (en) 2023-02-24

Family

ID=77478736

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110710156.9A Active CN113343212B (en) 2021-06-25 2021-06-25 Device registration method and apparatus, electronic device, and storage medium

Country Status (1)

Country Link
CN (1) CN113343212B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113747438A (en) * 2021-09-12 2021-12-03 胡忠南 WLAN access management method, device and system
CN114676392A (en) * 2022-03-18 2022-06-28 北京百度网讯科技有限公司 Trusted authorization method and device for application and electronic equipment
CN114697047A (en) * 2022-06-01 2022-07-01 树根互联股份有限公司 Sub-device registration method in Internet of things, cloud server and gateway device
CN114936365A (en) * 2022-01-27 2022-08-23 华为技术有限公司 System, method and device for protecting secret data
CN114978899A (en) * 2022-05-11 2022-08-30 业成科技(成都)有限公司 AIoT equipment updating method and device
CN115189929A (en) * 2022-06-27 2022-10-14 苏州华兴源创科技股份有限公司 Method, device, computer equipment and storage medium for authorization authentication
CN114676392B (en) * 2022-03-18 2024-06-04 北京百度网讯科技有限公司 Application trusted authorization method and device and electronic equipment

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009061171A2 (en) * 2007-11-09 2009-05-14 Mimos Berhad Secure software licensing control mechanism
CN102314572A (en) * 2011-10-14 2012-01-11 迈普通信技术股份有限公司 Registration information file generation method and device, and use authorization method of application software
CN107358067A (en) * 2017-07-06 2017-11-17 成都睿胜科技有限公司 SCK is derived with License realize encryption and the method decrypted in softdog
CN110096849A (en) * 2019-04-02 2019-08-06 深圳市中博科创信息技术有限公司 A kind of License authorization and authentication method, device, equipment and readable storage medium storing program for executing
CN110224998A (en) * 2019-05-20 2019-09-10 平安普惠企业管理有限公司 A kind of micro services register method and device
CN111193817A (en) * 2019-12-30 2020-05-22 深圳市康冠智能科技有限公司 Method and device for automatically registering equipment serial number, computer equipment and storage medium
CN112039878A (en) * 2020-08-28 2020-12-04 北京飞讯数码科技有限公司 Equipment registration method and device, computer equipment and storage medium
CN112417379A (en) * 2020-11-10 2021-02-26 迈普通信技术股份有限公司 Cluster license management method and device, authorization server and storage medium
CN112528236A (en) * 2020-12-18 2021-03-19 深圳竹云科技有限公司 Application software authorization method based on virtual machine
CN112926047A (en) * 2021-03-30 2021-06-08 中国建设银行股份有限公司 Authorization control method and device for localized deployment product, electronic equipment and medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009061171A2 (en) * 2007-11-09 2009-05-14 Mimos Berhad Secure software licensing control mechanism
CN102314572A (en) * 2011-10-14 2012-01-11 迈普通信技术股份有限公司 Registration information file generation method and device, and use authorization method of application software
CN107358067A (en) * 2017-07-06 2017-11-17 成都睿胜科技有限公司 SCK is derived with License realize encryption and the method decrypted in softdog
CN110096849A (en) * 2019-04-02 2019-08-06 深圳市中博科创信息技术有限公司 A kind of License authorization and authentication method, device, equipment and readable storage medium storing program for executing
CN110224998A (en) * 2019-05-20 2019-09-10 平安普惠企业管理有限公司 A kind of micro services register method and device
CN111193817A (en) * 2019-12-30 2020-05-22 深圳市康冠智能科技有限公司 Method and device for automatically registering equipment serial number, computer equipment and storage medium
CN112039878A (en) * 2020-08-28 2020-12-04 北京飞讯数码科技有限公司 Equipment registration method and device, computer equipment and storage medium
CN112417379A (en) * 2020-11-10 2021-02-26 迈普通信技术股份有限公司 Cluster license management method and device, authorization server and storage medium
CN112528236A (en) * 2020-12-18 2021-03-19 深圳竹云科技有限公司 Application software authorization method based on virtual machine
CN112926047A (en) * 2021-03-30 2021-06-08 中国建设银行股份有限公司 Authorization control method and device for localized deployment product, electronic equipment and medium

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
KUO-YU TSAI等: ""Android App copy protection mechanism with semi-trusted loader"", 《2015 17TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT)》 *
何永瑾 等: ""基于注册码的软件授权保护系统的设计与实现"", 《信息技术与网络安全》 *
苏铓 等: ""基于代理重加密的物联网云节点授权可信更新机制"", 《计算机研究与发展》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113747438A (en) * 2021-09-12 2021-12-03 胡忠南 WLAN access management method, device and system
CN114936365A (en) * 2022-01-27 2022-08-23 华为技术有限公司 System, method and device for protecting secret data
CN114936365B (en) * 2022-01-27 2023-03-24 华为技术有限公司 System, method and device for protecting secret data
CN114676392A (en) * 2022-03-18 2022-06-28 北京百度网讯科技有限公司 Trusted authorization method and device for application and electronic equipment
CN114676392B (en) * 2022-03-18 2024-06-04 北京百度网讯科技有限公司 Application trusted authorization method and device and electronic equipment
CN114978899A (en) * 2022-05-11 2022-08-30 业成科技(成都)有限公司 AIoT equipment updating method and device
CN114978899B (en) * 2022-05-11 2024-04-16 业成光电(深圳)有限公司 AIoT equipment updating method and device
CN114697047A (en) * 2022-06-01 2022-07-01 树根互联股份有限公司 Sub-device registration method in Internet of things, cloud server and gateway device
CN115189929A (en) * 2022-06-27 2022-10-14 苏州华兴源创科技股份有限公司 Method, device, computer equipment and storage medium for authorization authentication
CN115189929B (en) * 2022-06-27 2024-06-07 苏州华兴源创科技股份有限公司 Authorization authentication method, device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN113343212B (en) 2023-02-24

Similar Documents

Publication Publication Date Title
EP3001640B1 (en) Secure information exchange methods and wearable device
CN113343212B (en) Device registration method and apparatus, electronic device, and storage medium
EP3001637B1 (en) Methods and devices for authorizing operation
CN113242224B (en) Authorization method and device, electronic equipment and storage medium
CN109146470B (en) Method and device for generating payment code
CN113259344B (en) Remote access method and device, electronic equipment and storage medium
US10313870B2 (en) Identity verification method and apparatus, and storage medium
CN107766701B (en) Electronic equipment, dynamic library file protection method and device
CN110765434A (en) Identity authentication method and device, electronic equipment and storage medium
US20220294624A1 (en) Encryption method and device, electronic apparatus and storage medium
CN109246110B (en) Data sharing method and device and computer readable storage medium
CN111917728A (en) Password verification method and device
CN111030897A (en) Wired network distribution method and device, electronic equipment and storage medium
CN110753106A (en) File uploading method and device and electronic equipment
CN112784243A (en) Authorization management method and device, electronic equipment and storage medium
CN108712384B (en) Terminal authentication method and device, terminal and server
CN107302519B (en) Identity authentication method and device for terminal equipment, terminal equipment and server
CN108924136B (en) Authorization authentication method, device and storage medium
CN113868505A (en) Data processing method and device, electronic equipment, server and storage medium
CN110740360B (en) Multimedia resource playing method and device
CN111241522B (en) Firmware signature method and device and storage medium
CN107318148B (en) Wireless local area network access information storage method and device
CN114221788B (en) Login method, login device, electronic equipment and storage medium
CN111695158B (en) Operation method and device
CN117077094A (en) User identity verification method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant