CN113825135A - Micro base station architecture construction authentication method, FPGA and unit product - Google Patents

Micro base station architecture construction authentication method, FPGA and unit product Download PDF

Info

Publication number
CN113825135A
CN113825135A CN202111104321.2A CN202111104321A CN113825135A CN 113825135 A CN113825135 A CN 113825135A CN 202111104321 A CN202111104321 A CN 202111104321A CN 113825135 A CN113825135 A CN 113825135A
Authority
CN
China
Prior art keywords
authentication
equipment
base station
micro base
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111104321.2A
Other languages
Chinese (zh)
Inventor
谢贵亚
徐国强
金惠义
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Hengxin Technology Co Ltd
Jiangsu Hengxin Wireless Technology Co Ltd
Original Assignee
Jiangsu Hengxin Zhonglian Communications Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Hengxin Zhonglian Communications Technology Co Ltd filed Critical Jiangsu Hengxin Zhonglian Communications Technology Co Ltd
Priority to CN202111104321.2A priority Critical patent/CN113825135A/en
Publication of CN113825135A publication Critical patent/CN113825135A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • H04W88/085Access point devices with remote components

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a micro base station architecture construction authentication method, an FPGA and a unit product, wherein the micro base station architecture construction authentication method comprises the following steps: the equipment sends equipment information and authentication information to opposite-end equipment, and waits for an authentication result; if waiting overtime or authentication failure, refusing data exchange; otherwise, waiting for the opposite terminal device to send the device information and the authentication information; if waiting overtime or authentication failure, refusing data exchange; otherwise, allowing data exchange with the opposite terminal equipment. The invention embeds an authentication module in each unit product, and when new equipment is connected, bidirectional authentication is preferentially carried out. And carrying out data interaction only after the authentication is successful, and otherwise, carrying out data exchange forbidding. Meanwhile, after the authentication fails for many times, the machine locking is carried out if the authentication is still unsuccessful, and the unlocking can be carried out again only by using special equipment after the machine locking. Therefore, the unit products of the 5G micro base stations RU, EU and DU are effectively prevented from being stolen.

Description

Micro base station architecture construction authentication method, FPGA and unit product
Technical Field
The invention relates to the technical field of 5G communication, in particular to a 5G micro base station architecture construction authentication method, an FPGA and a unit product.
Background
In the existing 5G micro base station architecture, a deployment mode of distributed combination of units such as RU, EU, and DU needs to be adopted to build the architecture of the 5G micro base station. In the early development of the micro base station, each adopted unit needs to be repeatedly debugged. In this case, the problem of the units is difficult to be simultaneously adjusted.
In the face of the above, a developer may directly adopt mature units developed by other companies to test and adapt to a developing project. Thus, the problem that mature unit products for building the micro base station are stolen exists. Therefore, it is necessary to provide a further solution to the above problems.
Disclosure of Invention
The invention aims to provide a micro base station architecture construction authentication method, an FPGA and a unit product, so as to overcome the defects in the prior art.
In order to solve the technical problems, the technical scheme of the invention is as follows:
a micro base station architecture construction authentication method comprises the following steps: the device and the opposite terminal device thereof; the micro base station architecture construction authentication method comprises the following steps:
the equipment sends equipment information and authentication information to opposite-end equipment, and waits for an authentication result;
if waiting overtime or authentication failure, refusing data exchange; otherwise, waiting for the opposite terminal device to send the device information and the authentication information;
if waiting overtime or authentication failure, refusing data exchange; otherwise, allowing data exchange with the opposite terminal equipment.
As an improvement of the micro base station architecture construction authentication method of the present invention, the micro base station architecture construction authentication method further includes:
judging whether to start the bidirectional authentication, if not, allowing the equipment and the opposite terminal equipment to carry out data exchange; otherwise, carrying out bidirectional authentication.
As an improvement of the micro base station architecture construction authentication method, before the step of bidirectional authentication, the method further comprises the following steps:
and judging the authentication failure times of the equipment and the opposite terminal equipment, and locking the equipment and/or the opposite terminal equipment when the authentication failure times are larger than the preset failure times of the corresponding equipment.
As an improvement of the method for establishing the authentication by the micro base station architecture, the device information of the device and the device at the opposite terminal both include: manufacturer code, product code, random number; the authentication information of the local device and the opposite terminal device is obtained by jointly calculating a built-in fixed secret key of the device and the manufacturer code, the product code and the random number of the device.
As an improvement of the micro base station architecture construction authentication method, the calculation process of the authentication information comprises the following steps:
and calculating the manufacturer code, the product code, the random number and the fixed key by using an MD5 algorithm, extracting values with different digits in a calculation result obtained by using an MD5 algorithm, and combining the extracted values with different digits into the authentication information.
As an improvement of the authentication method established by the micro base station architecture, the step of authenticating the equipment by the opposite terminal equipment comprises the following steps:
the opposite terminal equipment extracts the manufacturer code, the product code and the random number in the received equipment information;
calculating the extracted manufacturer code, product code and random number with a fixed secret key built in opposite terminal equipment through an MD5 algorithm, and comparing the obtained settlement result with the received authentication information;
if the two are consistent, the authentication is fed back to the equipment successfully; otherwise, the authentication is fed back to the equipment.
As an improvement of the method for establishing the authentication by the micro base station architecture, the method for authenticating the opposite terminal equipment by the equipment comprises the following steps:
the equipment extracts manufacturer codes, product codes and random numbers in the received equipment information;
calculating the extracted manufacturer code, product code and random number with a fixed secret key built in the equipment through an MD5 algorithm, and comparing the obtained settlement result with the received authentication information;
if the two are consistent, allowing data exchange with the opposite terminal equipment; otherwise, the data exchange is denied.
As an improvement of the micro base station architecture construction authentication method of the present invention, the micro base station architecture construction authentication method further includes:
the authentication failure times of the devices are also increased by 1 while the data exchange is denied.
In order to solve the technical problems, the technical scheme of the invention is as follows:
an FPGA, comprising:
a processor;
a memory storing a program;
when executed by the processor, the program implements the micro base station architecture building authentication method according to any one of claims 1 to 8.
In order to solve the technical problems, the technical scheme of the invention is as follows:
a product unit is used as a functional unit for building a micro base station architecture, and the FPGA is integrated in the product unit.
Compared with the prior art, the invention has the beneficial effects that: in order to prevent the unit products of the RU, EU and DU of the 5G micro base station from being stolen, the authentication module is arranged in each unit product, and when new equipment is connected, bidirectional authentication is preferentially carried out. And carrying out data interaction only after the authentication is successful, and otherwise, carrying out data exchange forbidding. Meanwhile, after the authentication fails for many times, the machine locking is carried out if the authentication is still unsuccessful, and the unlocking can be carried out again only by using special equipment after the machine locking. Therefore, the unit products of the 5G micro base stations RU, EU and DU are effectively prevented from being stolen.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flow chart of a method of an embodiment of a method for building authentication by using a micro base station architecture according to the present invention;
FIG. 2 is a schematic diagram of RU, EU and DU interaction relationship in the authentication method for building a micro base station architecture according to the present invention;
fig. 3 is a schematic diagram of authentication between the present device and an opposite device in the authentication method for building a micro base station architecture according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
An embodiment of the invention provides an authentication method for building a micro base station architecture, which can avoid the stealing of RU, EU and DU unit products in the building process of the micro base station architecture. Wherein, du (distributed unit) is a distributed unit, eu (expander unit) is an extended unit, and ru (remote unit) is a remote unit.
As shown in fig. 1, in the present embodiment, the micro base station architecture includes: this equipment and opposite terminal equipment thereof.
As shown in fig. 2, the present device and the peer device are selected from: RU, EU, DU. For example, when the micro base station architecture includes: in RU, EU and DU, DU and EU perform data interaction, and EU performs data interaction with RU at the same time. At this time, if the DU is the own device, the opposite device is EU. EU is the device, and its opposite end devices are DU and RU. And if the RU is taken as the equipment, the opposite end equipment is EU.
The method for establishing and authenticating the micro base station architecture comprises the following steps:
s1, judging whether to start the mutual authentication, if not, allowing the device and the opposite terminal device to exchange data; otherwise, step S2 is executed.
And S2, judging the authentication failure times of the equipment and the opposite terminal equipment, and locking the equipment and/or the opposite terminal equipment when the authentication failure times are larger than the preset failure times of the corresponding equipment. Otherwise, carrying out bidirectional authentication.
After the device is locked, the locked device needs to be unlocked by using a special device. Therefore, the equipment and the opposite terminal equipment are protected by locking the machine. And before the bidirectional authentication, the authentication failure times are preferentially judged, which is also beneficial to improving the authentication efficiency of the authentication method.
And S3, the device sends the device information and the authentication information to the opposite device, and waits for the authentication result.
In the present device, the device information includes: manufacturer code, product code, random number. Based on the equipment information, the authentication information is obtained by calculating a fixed secret key built in the equipment together with the manufacturer code, the product code and the random number of the equipment.
In one embodiment, the calculation of the authentication information includes: the manufacturer code, the product code, the random number and the fixed key are calculated by the MD5 algorithm, the values of different digits in the calculation result obtained by the MD5 algorithm are extracted, and the extracted values of different digits form authentication information. The MD5 algorithm described above is an encryption algorithm.
At this time, the manufacturer code and product code information are built in the device, and a random number is generated and then a built-in fixed key is added to perform MD5 calculation. And taking the 1 st, 8 th, 16 th, 24 th and 32 th bits of the calculated MD5 out to generate a final authentication code. Only the vendor code, the product code, the random number, and the authentication code are transmitted at the time of transmission of the authentication information.
S4, if waiting overtime or authentication failure, refusing data exchange, and adding 1 to the authentication failure times of the equipment; otherwise, waiting for the opposite terminal device to send the device information and the authentication information.
As shown in fig. 3, the present device is based on the device information and the authentication information as described above. The step of authenticating the equipment by the opposite terminal equipment comprises the following steps:
s41, the opposite terminal device extracts the manufacturer code, the product code and the random number in the received device information;
s42, calculating the extracted manufacturer code, product code and random number with a fixed secret key through an MD5 algorithm, and comparing the obtained settlement result with the received authentication information;
s43, if the two are consistent, the authentication is fed back to the equipment successfully; otherwise, the authentication is fed back to the equipment.
Namely, after receiving the authentication information, the opposite terminal device takes out the authentication code, and simultaneously calculates an authentication code in the same way, and compares whether the two codes are equal. Equality is considered legal, inequality or no response is considered illegal.
Similarly to the present device, in the peer device, the device information includes: manufacturer code, product code, random number. Based on the equipment information, the authentication information is obtained by calculating a fixed secret key built in the equipment together with the manufacturer code, the product code and the random number of the equipment.
In one embodiment, the calculation of the authentication information includes: the manufacturer code, the product code, the random number and the fixed key are calculated by the MD5 algorithm, the values of different digits in the calculation result obtained by the MD5 algorithm are extracted, and the extracted values of different digits form authentication information. The MD5 algorithm described above is an encryption algorithm.
At this time, the opposite terminal device is internally provided with manufacturer code and product code information, and simultaneously generates a random number and adds the built-in fixed key to perform MD5 calculation. And taking the 1 st, 8 th, 16 th, 24 th and 32 th bits of the calculated MD5 out to generate a final authentication code. Only the vendor code, the product code, the random number, and the authentication code are transmitted at the time of transmission of the authentication information.
S5, if waiting overtime or authentication failure, refusing data exchange, and adding 1 to the authentication failure times of the equipment; otherwise, allowing data exchange with the opposite terminal equipment.
As shown in fig. 3, the device information and the authentication information are based on the peer device as described above. The step of authenticating the opposite terminal equipment by the equipment comprises the following steps:
s51, the equipment extracts the manufacturer code, the product code and the random number in the received equipment information;
s52, calculating the extracted manufacturer code, product code and random number with a fixed secret key through an MD5 algorithm, and comparing the obtained settlement result with the received authentication information;
s53, if the two are consistent, allowing data exchange with the opposite terminal device; otherwise, the data exchange is denied.
Based on the same technical concept, another embodiment of the invention also provides an FPGA.
The FPGA of this embodiment includes:
a processor;
a memory storing a program.
When the program is executed by the processor, the method for establishing authentication of the micro base station architecture is realized.
Based on the same technical concept, the invention further provides a product unit.
The product unit of the embodiment can be used as a functional unit for building a micro base station architecture. And the FPGA as described in the above embodiments is integrated in the product unit. In one embodiment, the product unit may be a functional unit such as an RU, EU, or DU, in which an FPGA is integrated.
In summary, in order to prevent the unit products of RU, EU and DU of the 5G micro base station from being stolen, an authentication module is built in each unit product, and when a new device is connected, bidirectional authentication is preferentially performed. And carrying out data interaction only after the authentication is successful, and otherwise, carrying out data exchange forbidding. Meanwhile, after the authentication fails for many times, the machine locking is carried out if the authentication is still unsuccessful, and the unlocking can be carried out again only by using special equipment after the machine locking. Therefore, the unit products of the 5G micro base stations RU, EU and DU are effectively prevented from being stolen.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Furthermore, it should be understood that although the present description refers to embodiments, not every embodiment may contain only a single embodiment, and such description is for clarity only, and those skilled in the art should integrate the description, and the embodiments may be combined as appropriate to form other embodiments understood by those skilled in the art.

Claims (10)

1. A micro base station architecture construction authentication method comprises the following steps: the device and the opposite terminal device thereof; the method for establishing the authentication of the micro base station architecture is characterized by comprising the following steps:
the equipment sends equipment information and authentication information to opposite-end equipment, and waits for an authentication result;
if waiting overtime or authentication failure, refusing data exchange; otherwise, waiting for the opposite terminal device to send the device information and the authentication information;
if waiting overtime or authentication failure, refusing data exchange; otherwise, allowing data exchange with the opposite terminal equipment.
2. The micro base station architecture building authentication method according to claim 1, further comprising:
judging whether to start the bidirectional authentication, if not, allowing the equipment and the opposite terminal equipment to carry out data exchange; otherwise, carrying out bidirectional authentication.
3. The method for building authentication of micro base station architecture according to claim 2, further comprising, before the step of performing bidirectional authentication:
and judging the authentication failure times of the equipment and the opposite terminal equipment, and locking the equipment and/or the opposite terminal equipment when the authentication failure times are larger than the preset failure times of the corresponding equipment.
4. The method for building authentication of micro base station architecture according to claim 1, wherein the device information of the device and the device at the opposite end each include: manufacturer code, product code, random number; the authentication information of the local device and the opposite terminal device is obtained by jointly calculating a built-in fixed secret key of the device and the manufacturer code, the product code and the random number of the device.
5. The method for building authentication of micro base station architecture according to claim 4, wherein the calculation process of the authentication information comprises:
and calculating the manufacturer code, the product code, the random number and the fixed key by using an MD5 algorithm, extracting values with different digits in a calculation result obtained by using an MD5 algorithm, and combining the extracted values with different digits into the authentication information.
6. The micro base station architecture building authentication method according to claim 5, wherein the step of authenticating the equipment by the opposite terminal equipment comprises:
the opposite terminal equipment extracts the manufacturer code, the product code and the random number in the received equipment information;
calculating the extracted manufacturer code, product code and random number with a fixed secret key built in opposite terminal equipment through an MD5 algorithm, and comparing the obtained settlement result with the received authentication information;
if the two are consistent, the authentication is fed back to the equipment successfully; otherwise, the authentication is fed back to the equipment.
7. The method for building authentication of micro base station architecture according to claim 5, wherein the step of authenticating the peer device by the device comprises:
the equipment extracts manufacturer codes, product codes and random numbers in the received equipment information;
calculating the extracted manufacturer code, product code and random number with a fixed secret key built in the equipment through an MD5 algorithm, and comparing the obtained settlement result with the received authentication information;
if the two are consistent, allowing data exchange with the opposite terminal equipment; otherwise, the data exchange is denied.
8. The micro base station architecture building authentication method according to claim 1, further comprising:
the authentication failure times of the devices are also increased by 1 while the data exchange is denied.
9. An FPGA, wherein said FPGA comprises:
a processor;
a memory storing a program;
when executed by the processor, the program implements the micro base station architecture building authentication method according to any one of claims 1 to 8.
10. A product unit, characterized in that the product unit is used as a functional unit for building a micro base station architecture, and the FPGA of claim 9 is integrated in the product unit.
CN202111104321.2A 2021-09-18 2021-09-18 Micro base station architecture construction authentication method, FPGA and unit product Pending CN113825135A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111104321.2A CN113825135A (en) 2021-09-18 2021-09-18 Micro base station architecture construction authentication method, FPGA and unit product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111104321.2A CN113825135A (en) 2021-09-18 2021-09-18 Micro base station architecture construction authentication method, FPGA and unit product

Publications (1)

Publication Number Publication Date
CN113825135A true CN113825135A (en) 2021-12-21

Family

ID=78922745

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111104321.2A Pending CN113825135A (en) 2021-09-18 2021-09-18 Micro base station architecture construction authentication method, FPGA and unit product

Country Status (1)

Country Link
CN (1) CN113825135A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102624528A (en) * 2012-03-02 2012-08-01 中国人民解放军总参谋部第六十一研究所 IBAKA (Identity Based Authentication and Key Agreement) method
CN103647777A (en) * 2013-12-13 2014-03-19 华为技术有限公司 Safety certificate method and bidirectional forwarding detection BFD equipment
WO2017201753A1 (en) * 2016-05-27 2017-11-30 华为技术有限公司 Mobile network authentication method and apparatus
CN111711625A (en) * 2020-06-15 2020-09-25 江苏方天电力技术有限公司 Power system information security encryption system based on power distribution terminal
CN112351000A (en) * 2020-10-16 2021-02-09 深圳Tcl新技术有限公司 Bidirectional identity authentication method, system, device and storage medium
CN112787801A (en) * 2021-01-21 2021-05-11 深圳市西迪特科技有限公司 Method for authentication between PON (Passive optical network) equipment based on MD5 algorithm

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102624528A (en) * 2012-03-02 2012-08-01 中国人民解放军总参谋部第六十一研究所 IBAKA (Identity Based Authentication and Key Agreement) method
CN103647777A (en) * 2013-12-13 2014-03-19 华为技术有限公司 Safety certificate method and bidirectional forwarding detection BFD equipment
WO2017201753A1 (en) * 2016-05-27 2017-11-30 华为技术有限公司 Mobile network authentication method and apparatus
CN111711625A (en) * 2020-06-15 2020-09-25 江苏方天电力技术有限公司 Power system information security encryption system based on power distribution terminal
CN112351000A (en) * 2020-10-16 2021-02-09 深圳Tcl新技术有限公司 Bidirectional identity authentication method, system, device and storage medium
CN112787801A (en) * 2021-01-21 2021-05-11 深圳市西迪特科技有限公司 Method for authentication between PON (Passive optical network) equipment based on MD5 algorithm

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
杨东升;高珊珊;尹震宇;李明时;柴安颖;廉梦佳;: "面向智能产线的R-ECC身份认证方法", 计算机系统应用, no. 09 *

Similar Documents

Publication Publication Date Title
RU2506637C2 (en) Method and device for verifying dynamic password
CN101252439B (en) System and method for increasing information safety equipment security
CN107862803A (en) Leased equipment unlocking method, Cloud Server, device end, equipment and system
CN106034123A (en) Authentication method, application system server and client
CN104118392A (en) Engine anti-theft authentication method and device of engine anti-theft system
CN108541324A (en) A kind of unlocking method of electronic lock device, client and its electronic lock device
CN101102574A (en) Terminal verification method and device
CN104426659A (en) Dynamic password generating method, authentication method, authentication system and corresponding equipment
CN109286502B (en) Method for recovering manager lock of encryption machine and encryption machine
CN108460875A (en) A kind of entrance guard authentication method and device based on dynamic two-dimension code
CN106357679A (en) Method, system and client for password authentication, and server and intelligent equipment
CN1786864A (en) Method for safety identification of computer
CN109587683B (en) Method and system for preventing short message from being monitored, application program and terminal information database
CN113825135A (en) Micro base station architecture construction authentication method, FPGA and unit product
CN1705263B (en) Validity verification method of mobile terminal user and mobile terminal thereof
CN101350048A (en) Peripheral apparatus and method for verifying authority thereof
CN106911479A (en) A kind of security certification system, method and terminal device
CN109684791A (en) A kind of method for protecting software and device
CN110909366A (en) Anti-flashing method and system based on software end encryption
JP2002198956A (en) Communication equipment and its authentication method
CN113298983A (en) ESAM security authentication-based electric intelligent lock security management and control method and device
CN112053476A (en) Encryption method and system based on intelligent lock and mobile phone terminal
CN105117659A (en) Anti-copying monitoring method used for data storage device
CN213847026U (en) ETC safety certification equipment and system based on position information
CN114125850B (en) Terminal locking method, terminal unlocking method, mobile terminal and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20230307

Address after: No. 138, Taodu Road, Dingshu Town, Yixing City, Wuxi City, Jiangsu Province, 214200

Applicant after: JIANGSU HENGXIN TECHNOLOGY Co.,Ltd.

Applicant after: JIANGSU HENGXIN WIRELESS TECHNOLOGY Co.,Ltd.

Address before: No. 138, Taodu Road, Dingshu Town, Yixing City, Wuxi City, Jiangsu Province, 214200

Applicant before: Jiangsu Hengxin Zhonglian Communication Technology Co.,Ltd.