CN113825135A - Micro base station architecture construction authentication method, FPGA and unit product - Google Patents
Micro base station architecture construction authentication method, FPGA and unit product Download PDFInfo
- Publication number
- CN113825135A CN113825135A CN202111104321.2A CN202111104321A CN113825135A CN 113825135 A CN113825135 A CN 113825135A CN 202111104321 A CN202111104321 A CN 202111104321A CN 113825135 A CN113825135 A CN 113825135A
- Authority
- CN
- China
- Prior art keywords
- authentication
- equipment
- base station
- micro base
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 41
- 238000010276 construction Methods 0.000 title claims abstract description 15
- 230000002457 bidirectional effect Effects 0.000 claims abstract description 11
- 238000004364 calculation method Methods 0.000 claims description 10
- 239000000284 extract Substances 0.000 claims description 6
- 230000003993 interaction Effects 0.000 abstract description 6
- 230000009286 beneficial effect Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000004891 communication Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/126—Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
- H04W88/085—Access point devices with remote components
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a micro base station architecture construction authentication method, an FPGA and a unit product, wherein the micro base station architecture construction authentication method comprises the following steps: the equipment sends equipment information and authentication information to opposite-end equipment, and waits for an authentication result; if waiting overtime or authentication failure, refusing data exchange; otherwise, waiting for the opposite terminal device to send the device information and the authentication information; if waiting overtime or authentication failure, refusing data exchange; otherwise, allowing data exchange with the opposite terminal equipment. The invention embeds an authentication module in each unit product, and when new equipment is connected, bidirectional authentication is preferentially carried out. And carrying out data interaction only after the authentication is successful, and otherwise, carrying out data exchange forbidding. Meanwhile, after the authentication fails for many times, the machine locking is carried out if the authentication is still unsuccessful, and the unlocking can be carried out again only by using special equipment after the machine locking. Therefore, the unit products of the 5G micro base stations RU, EU and DU are effectively prevented from being stolen.
Description
Technical Field
The invention relates to the technical field of 5G communication, in particular to a 5G micro base station architecture construction authentication method, an FPGA and a unit product.
Background
In the existing 5G micro base station architecture, a deployment mode of distributed combination of units such as RU, EU, and DU needs to be adopted to build the architecture of the 5G micro base station. In the early development of the micro base station, each adopted unit needs to be repeatedly debugged. In this case, the problem of the units is difficult to be simultaneously adjusted.
In the face of the above, a developer may directly adopt mature units developed by other companies to test and adapt to a developing project. Thus, the problem that mature unit products for building the micro base station are stolen exists. Therefore, it is necessary to provide a further solution to the above problems.
Disclosure of Invention
The invention aims to provide a micro base station architecture construction authentication method, an FPGA and a unit product, so as to overcome the defects in the prior art.
In order to solve the technical problems, the technical scheme of the invention is as follows:
a micro base station architecture construction authentication method comprises the following steps: the device and the opposite terminal device thereof; the micro base station architecture construction authentication method comprises the following steps:
the equipment sends equipment information and authentication information to opposite-end equipment, and waits for an authentication result;
if waiting overtime or authentication failure, refusing data exchange; otherwise, waiting for the opposite terminal device to send the device information and the authentication information;
if waiting overtime or authentication failure, refusing data exchange; otherwise, allowing data exchange with the opposite terminal equipment.
As an improvement of the micro base station architecture construction authentication method of the present invention, the micro base station architecture construction authentication method further includes:
judging whether to start the bidirectional authentication, if not, allowing the equipment and the opposite terminal equipment to carry out data exchange; otherwise, carrying out bidirectional authentication.
As an improvement of the micro base station architecture construction authentication method, before the step of bidirectional authentication, the method further comprises the following steps:
and judging the authentication failure times of the equipment and the opposite terminal equipment, and locking the equipment and/or the opposite terminal equipment when the authentication failure times are larger than the preset failure times of the corresponding equipment.
As an improvement of the method for establishing the authentication by the micro base station architecture, the device information of the device and the device at the opposite terminal both include: manufacturer code, product code, random number; the authentication information of the local device and the opposite terminal device is obtained by jointly calculating a built-in fixed secret key of the device and the manufacturer code, the product code and the random number of the device.
As an improvement of the micro base station architecture construction authentication method, the calculation process of the authentication information comprises the following steps:
and calculating the manufacturer code, the product code, the random number and the fixed key by using an MD5 algorithm, extracting values with different digits in a calculation result obtained by using an MD5 algorithm, and combining the extracted values with different digits into the authentication information.
As an improvement of the authentication method established by the micro base station architecture, the step of authenticating the equipment by the opposite terminal equipment comprises the following steps:
the opposite terminal equipment extracts the manufacturer code, the product code and the random number in the received equipment information;
calculating the extracted manufacturer code, product code and random number with a fixed secret key built in opposite terminal equipment through an MD5 algorithm, and comparing the obtained settlement result with the received authentication information;
if the two are consistent, the authentication is fed back to the equipment successfully; otherwise, the authentication is fed back to the equipment.
As an improvement of the method for establishing the authentication by the micro base station architecture, the method for authenticating the opposite terminal equipment by the equipment comprises the following steps:
the equipment extracts manufacturer codes, product codes and random numbers in the received equipment information;
calculating the extracted manufacturer code, product code and random number with a fixed secret key built in the equipment through an MD5 algorithm, and comparing the obtained settlement result with the received authentication information;
if the two are consistent, allowing data exchange with the opposite terminal equipment; otherwise, the data exchange is denied.
As an improvement of the micro base station architecture construction authentication method of the present invention, the micro base station architecture construction authentication method further includes:
the authentication failure times of the devices are also increased by 1 while the data exchange is denied.
In order to solve the technical problems, the technical scheme of the invention is as follows:
an FPGA, comprising:
a processor;
a memory storing a program;
when executed by the processor, the program implements the micro base station architecture building authentication method according to any one of claims 1 to 8.
In order to solve the technical problems, the technical scheme of the invention is as follows:
a product unit is used as a functional unit for building a micro base station architecture, and the FPGA is integrated in the product unit.
Compared with the prior art, the invention has the beneficial effects that: in order to prevent the unit products of the RU, EU and DU of the 5G micro base station from being stolen, the authentication module is arranged in each unit product, and when new equipment is connected, bidirectional authentication is preferentially carried out. And carrying out data interaction only after the authentication is successful, and otherwise, carrying out data exchange forbidding. Meanwhile, after the authentication fails for many times, the machine locking is carried out if the authentication is still unsuccessful, and the unlocking can be carried out again only by using special equipment after the machine locking. Therefore, the unit products of the 5G micro base stations RU, EU and DU are effectively prevented from being stolen.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flow chart of a method of an embodiment of a method for building authentication by using a micro base station architecture according to the present invention;
FIG. 2 is a schematic diagram of RU, EU and DU interaction relationship in the authentication method for building a micro base station architecture according to the present invention;
fig. 3 is a schematic diagram of authentication between the present device and an opposite device in the authentication method for building a micro base station architecture according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
An embodiment of the invention provides an authentication method for building a micro base station architecture, which can avoid the stealing of RU, EU and DU unit products in the building process of the micro base station architecture. Wherein, du (distributed unit) is a distributed unit, eu (expander unit) is an extended unit, and ru (remote unit) is a remote unit.
As shown in fig. 1, in the present embodiment, the micro base station architecture includes: this equipment and opposite terminal equipment thereof.
As shown in fig. 2, the present device and the peer device are selected from: RU, EU, DU. For example, when the micro base station architecture includes: in RU, EU and DU, DU and EU perform data interaction, and EU performs data interaction with RU at the same time. At this time, if the DU is the own device, the opposite device is EU. EU is the device, and its opposite end devices are DU and RU. And if the RU is taken as the equipment, the opposite end equipment is EU.
The method for establishing and authenticating the micro base station architecture comprises the following steps:
s1, judging whether to start the mutual authentication, if not, allowing the device and the opposite terminal device to exchange data; otherwise, step S2 is executed.
And S2, judging the authentication failure times of the equipment and the opposite terminal equipment, and locking the equipment and/or the opposite terminal equipment when the authentication failure times are larger than the preset failure times of the corresponding equipment. Otherwise, carrying out bidirectional authentication.
After the device is locked, the locked device needs to be unlocked by using a special device. Therefore, the equipment and the opposite terminal equipment are protected by locking the machine. And before the bidirectional authentication, the authentication failure times are preferentially judged, which is also beneficial to improving the authentication efficiency of the authentication method.
And S3, the device sends the device information and the authentication information to the opposite device, and waits for the authentication result.
In the present device, the device information includes: manufacturer code, product code, random number. Based on the equipment information, the authentication information is obtained by calculating a fixed secret key built in the equipment together with the manufacturer code, the product code and the random number of the equipment.
In one embodiment, the calculation of the authentication information includes: the manufacturer code, the product code, the random number and the fixed key are calculated by the MD5 algorithm, the values of different digits in the calculation result obtained by the MD5 algorithm are extracted, and the extracted values of different digits form authentication information. The MD5 algorithm described above is an encryption algorithm.
At this time, the manufacturer code and product code information are built in the device, and a random number is generated and then a built-in fixed key is added to perform MD5 calculation. And taking the 1 st, 8 th, 16 th, 24 th and 32 th bits of the calculated MD5 out to generate a final authentication code. Only the vendor code, the product code, the random number, and the authentication code are transmitted at the time of transmission of the authentication information.
S4, if waiting overtime or authentication failure, refusing data exchange, and adding 1 to the authentication failure times of the equipment; otherwise, waiting for the opposite terminal device to send the device information and the authentication information.
As shown in fig. 3, the present device is based on the device information and the authentication information as described above. The step of authenticating the equipment by the opposite terminal equipment comprises the following steps:
s41, the opposite terminal device extracts the manufacturer code, the product code and the random number in the received device information;
s42, calculating the extracted manufacturer code, product code and random number with a fixed secret key through an MD5 algorithm, and comparing the obtained settlement result with the received authentication information;
s43, if the two are consistent, the authentication is fed back to the equipment successfully; otherwise, the authentication is fed back to the equipment.
Namely, after receiving the authentication information, the opposite terminal device takes out the authentication code, and simultaneously calculates an authentication code in the same way, and compares whether the two codes are equal. Equality is considered legal, inequality or no response is considered illegal.
Similarly to the present device, in the peer device, the device information includes: manufacturer code, product code, random number. Based on the equipment information, the authentication information is obtained by calculating a fixed secret key built in the equipment together with the manufacturer code, the product code and the random number of the equipment.
In one embodiment, the calculation of the authentication information includes: the manufacturer code, the product code, the random number and the fixed key are calculated by the MD5 algorithm, the values of different digits in the calculation result obtained by the MD5 algorithm are extracted, and the extracted values of different digits form authentication information. The MD5 algorithm described above is an encryption algorithm.
At this time, the opposite terminal device is internally provided with manufacturer code and product code information, and simultaneously generates a random number and adds the built-in fixed key to perform MD5 calculation. And taking the 1 st, 8 th, 16 th, 24 th and 32 th bits of the calculated MD5 out to generate a final authentication code. Only the vendor code, the product code, the random number, and the authentication code are transmitted at the time of transmission of the authentication information.
S5, if waiting overtime or authentication failure, refusing data exchange, and adding 1 to the authentication failure times of the equipment; otherwise, allowing data exchange with the opposite terminal equipment.
As shown in fig. 3, the device information and the authentication information are based on the peer device as described above. The step of authenticating the opposite terminal equipment by the equipment comprises the following steps:
s51, the equipment extracts the manufacturer code, the product code and the random number in the received equipment information;
s52, calculating the extracted manufacturer code, product code and random number with a fixed secret key through an MD5 algorithm, and comparing the obtained settlement result with the received authentication information;
s53, if the two are consistent, allowing data exchange with the opposite terminal device; otherwise, the data exchange is denied.
Based on the same technical concept, another embodiment of the invention also provides an FPGA.
The FPGA of this embodiment includes:
a processor;
a memory storing a program.
When the program is executed by the processor, the method for establishing authentication of the micro base station architecture is realized.
Based on the same technical concept, the invention further provides a product unit.
The product unit of the embodiment can be used as a functional unit for building a micro base station architecture. And the FPGA as described in the above embodiments is integrated in the product unit. In one embodiment, the product unit may be a functional unit such as an RU, EU, or DU, in which an FPGA is integrated.
In summary, in order to prevent the unit products of RU, EU and DU of the 5G micro base station from being stolen, an authentication module is built in each unit product, and when a new device is connected, bidirectional authentication is preferentially performed. And carrying out data interaction only after the authentication is successful, and otherwise, carrying out data exchange forbidding. Meanwhile, after the authentication fails for many times, the machine locking is carried out if the authentication is still unsuccessful, and the unlocking can be carried out again only by using special equipment after the machine locking. Therefore, the unit products of the 5G micro base stations RU, EU and DU are effectively prevented from being stolen.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Furthermore, it should be understood that although the present description refers to embodiments, not every embodiment may contain only a single embodiment, and such description is for clarity only, and those skilled in the art should integrate the description, and the embodiments may be combined as appropriate to form other embodiments understood by those skilled in the art.
Claims (10)
1. A micro base station architecture construction authentication method comprises the following steps: the device and the opposite terminal device thereof; the method for establishing the authentication of the micro base station architecture is characterized by comprising the following steps:
the equipment sends equipment information and authentication information to opposite-end equipment, and waits for an authentication result;
if waiting overtime or authentication failure, refusing data exchange; otherwise, waiting for the opposite terminal device to send the device information and the authentication information;
if waiting overtime or authentication failure, refusing data exchange; otherwise, allowing data exchange with the opposite terminal equipment.
2. The micro base station architecture building authentication method according to claim 1, further comprising:
judging whether to start the bidirectional authentication, if not, allowing the equipment and the opposite terminal equipment to carry out data exchange; otherwise, carrying out bidirectional authentication.
3. The method for building authentication of micro base station architecture according to claim 2, further comprising, before the step of performing bidirectional authentication:
and judging the authentication failure times of the equipment and the opposite terminal equipment, and locking the equipment and/or the opposite terminal equipment when the authentication failure times are larger than the preset failure times of the corresponding equipment.
4. The method for building authentication of micro base station architecture according to claim 1, wherein the device information of the device and the device at the opposite end each include: manufacturer code, product code, random number; the authentication information of the local device and the opposite terminal device is obtained by jointly calculating a built-in fixed secret key of the device and the manufacturer code, the product code and the random number of the device.
5. The method for building authentication of micro base station architecture according to claim 4, wherein the calculation process of the authentication information comprises:
and calculating the manufacturer code, the product code, the random number and the fixed key by using an MD5 algorithm, extracting values with different digits in a calculation result obtained by using an MD5 algorithm, and combining the extracted values with different digits into the authentication information.
6. The micro base station architecture building authentication method according to claim 5, wherein the step of authenticating the equipment by the opposite terminal equipment comprises:
the opposite terminal equipment extracts the manufacturer code, the product code and the random number in the received equipment information;
calculating the extracted manufacturer code, product code and random number with a fixed secret key built in opposite terminal equipment through an MD5 algorithm, and comparing the obtained settlement result with the received authentication information;
if the two are consistent, the authentication is fed back to the equipment successfully; otherwise, the authentication is fed back to the equipment.
7. The method for building authentication of micro base station architecture according to claim 5, wherein the step of authenticating the peer device by the device comprises:
the equipment extracts manufacturer codes, product codes and random numbers in the received equipment information;
calculating the extracted manufacturer code, product code and random number with a fixed secret key built in the equipment through an MD5 algorithm, and comparing the obtained settlement result with the received authentication information;
if the two are consistent, allowing data exchange with the opposite terminal equipment; otherwise, the data exchange is denied.
8. The micro base station architecture building authentication method according to claim 1, further comprising:
the authentication failure times of the devices are also increased by 1 while the data exchange is denied.
9. An FPGA, wherein said FPGA comprises:
a processor;
a memory storing a program;
when executed by the processor, the program implements the micro base station architecture building authentication method according to any one of claims 1 to 8.
10. A product unit, characterized in that the product unit is used as a functional unit for building a micro base station architecture, and the FPGA of claim 9 is integrated in the product unit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111104321.2A CN113825135A (en) | 2021-09-18 | 2021-09-18 | Micro base station architecture construction authentication method, FPGA and unit product |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111104321.2A CN113825135A (en) | 2021-09-18 | 2021-09-18 | Micro base station architecture construction authentication method, FPGA and unit product |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113825135A true CN113825135A (en) | 2021-12-21 |
Family
ID=78922745
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111104321.2A Pending CN113825135A (en) | 2021-09-18 | 2021-09-18 | Micro base station architecture construction authentication method, FPGA and unit product |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113825135A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102624528A (en) * | 2012-03-02 | 2012-08-01 | 中国人民解放军总参谋部第六十一研究所 | IBAKA (Identity Based Authentication and Key Agreement) method |
CN103647777A (en) * | 2013-12-13 | 2014-03-19 | 华为技术有限公司 | Safety certificate method and bidirectional forwarding detection BFD equipment |
WO2017201753A1 (en) * | 2016-05-27 | 2017-11-30 | 华为技术有限公司 | Mobile network authentication method and apparatus |
CN111711625A (en) * | 2020-06-15 | 2020-09-25 | 江苏方天电力技术有限公司 | Power system information security encryption system based on power distribution terminal |
CN112351000A (en) * | 2020-10-16 | 2021-02-09 | 深圳Tcl新技术有限公司 | Bidirectional identity authentication method, system, device and storage medium |
CN112787801A (en) * | 2021-01-21 | 2021-05-11 | 深圳市西迪特科技有限公司 | Method for authentication between PON (Passive optical network) equipment based on MD5 algorithm |
-
2021
- 2021-09-18 CN CN202111104321.2A patent/CN113825135A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102624528A (en) * | 2012-03-02 | 2012-08-01 | 中国人民解放军总参谋部第六十一研究所 | IBAKA (Identity Based Authentication and Key Agreement) method |
CN103647777A (en) * | 2013-12-13 | 2014-03-19 | 华为技术有限公司 | Safety certificate method and bidirectional forwarding detection BFD equipment |
WO2017201753A1 (en) * | 2016-05-27 | 2017-11-30 | 华为技术有限公司 | Mobile network authentication method and apparatus |
CN111711625A (en) * | 2020-06-15 | 2020-09-25 | 江苏方天电力技术有限公司 | Power system information security encryption system based on power distribution terminal |
CN112351000A (en) * | 2020-10-16 | 2021-02-09 | 深圳Tcl新技术有限公司 | Bidirectional identity authentication method, system, device and storage medium |
CN112787801A (en) * | 2021-01-21 | 2021-05-11 | 深圳市西迪特科技有限公司 | Method for authentication between PON (Passive optical network) equipment based on MD5 algorithm |
Non-Patent Citations (1)
Title |
---|
杨东升;高珊珊;尹震宇;李明时;柴安颖;廉梦佳;: "面向智能产线的R-ECC身份认证方法", 计算机系统应用, no. 09 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
RU2506637C2 (en) | Method and device for verifying dynamic password | |
CN101252439B (en) | System and method for increasing information safety equipment security | |
CN107862803A (en) | Leased equipment unlocking method, Cloud Server, device end, equipment and system | |
CN106034123A (en) | Authentication method, application system server and client | |
CN104118392A (en) | Engine anti-theft authentication method and device of engine anti-theft system | |
CN108541324A (en) | A kind of unlocking method of electronic lock device, client and its electronic lock device | |
CN101102574A (en) | Terminal verification method and device | |
CN104426659A (en) | Dynamic password generating method, authentication method, authentication system and corresponding equipment | |
CN109286502B (en) | Method for recovering manager lock of encryption machine and encryption machine | |
CN108460875A (en) | A kind of entrance guard authentication method and device based on dynamic two-dimension code | |
CN106357679A (en) | Method, system and client for password authentication, and server and intelligent equipment | |
CN1786864A (en) | Method for safety identification of computer | |
CN109587683B (en) | Method and system for preventing short message from being monitored, application program and terminal information database | |
CN113825135A (en) | Micro base station architecture construction authentication method, FPGA and unit product | |
CN1705263B (en) | Validity verification method of mobile terminal user and mobile terminal thereof | |
CN101350048A (en) | Peripheral apparatus and method for verifying authority thereof | |
CN106911479A (en) | A kind of security certification system, method and terminal device | |
CN109684791A (en) | A kind of method for protecting software and device | |
CN110909366A (en) | Anti-flashing method and system based on software end encryption | |
JP2002198956A (en) | Communication equipment and its authentication method | |
CN113298983A (en) | ESAM security authentication-based electric intelligent lock security management and control method and device | |
CN112053476A (en) | Encryption method and system based on intelligent lock and mobile phone terminal | |
CN105117659A (en) | Anti-copying monitoring method used for data storage device | |
CN213847026U (en) | ETC safety certification equipment and system based on position information | |
CN114125850B (en) | Terminal locking method, terminal unlocking method, mobile terminal and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20230307 Address after: No. 138, Taodu Road, Dingshu Town, Yixing City, Wuxi City, Jiangsu Province, 214200 Applicant after: JIANGSU HENGXIN TECHNOLOGY Co.,Ltd. Applicant after: JIANGSU HENGXIN WIRELESS TECHNOLOGY Co.,Ltd. Address before: No. 138, Taodu Road, Dingshu Town, Yixing City, Wuxi City, Jiangsu Province, 214200 Applicant before: Jiangsu Hengxin Zhonglian Communication Technology Co.,Ltd. |