CN114640510A - Method for communication by adopting separated encryption servers - Google Patents
Method for communication by adopting separated encryption servers Download PDFInfo
- Publication number
- CN114640510A CN114640510A CN202210206333.4A CN202210206333A CN114640510A CN 114640510 A CN114640510 A CN 114640510A CN 202210206333 A CN202210206333 A CN 202210206333A CN 114640510 A CN114640510 A CN 114640510A
- Authority
- CN
- China
- Prior art keywords
- encryption server
- upper computer
- card machine
- encryption
- communicating
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/141—Setup of application sessions
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Abstract
The invention relates to a method for communication by adopting a separated encryption server, which comprises the steps of S1, respectively connecting and starting an upper computer and the encryption server, and connecting and starting the encryption server and a card machine, wherein the encryption server and the upper computer are separately designed; s2, the upper computer encrypts the plaintext through the encryption server and the card machine to form a ciphertext, the ciphertext is sent to the meter, the information fed back by the meter is received, and the information fed back is decrypted through the encryption server and the card machine to realize communication between the upper computer and the meter. The method improves communication speed and safety.
Description
Technical Field
The invention relates to the technical field of electric meters, in particular to a method for communication by adopting a separated encryption server.
Background
At present, protocol encryption communication of the electric energy meter 698 is popularized and applied in national networks, the market has higher and higher requirements on the communication success rate of the electric energy meter, and the functional requirements on the electric energy meter are more and more complex. In recent years, the release and update progress of new standard protocols of intelligent electric energy meters is fast, and in order to meet the requirements of communication safety, newly added functions of a power supply bureau or research and development of new products and repair of defects of manufacturers, the trend of testing ESAMs by each manufacturer to realize local encryption communication is inevitable. The standard telecommunication flow requires 698 background support 698 protocol local card secret machine or remote encryption machine.
However, the existing communication has some problems, the existing dynamic library calling work is completed in the upper computer, and the occupied memory capacity of the upper computer is limited, so that when the upper computer directly calls the card machine dynamic library, the memory leakage exists, the communication is easy to crash, and when the card machine returns data, the speed is very slow, and the overtime judgment of the program is influenced.
Disclosure of Invention
In view of the above problems, an object of the present invention is to provide a method for performing communication using a separate encryption server with high operation speed, large memory, reasonable design, and low cost.
In order to achieve the purpose, the technical scheme of the invention is as follows: a method of communicating using separate encryption servers, characterized by:
s1, respectively connecting and starting an upper computer and an encryption server, and connecting the encryption server and a card machine, wherein the encryption server and the upper computer are separately designed;
s2, the upper computer encrypts the plaintext through the encryption server and the card machine to form a ciphertext, the ciphertext is sent to the meter to receive the information fed back by the meter, and the encryption server and the card machine decrypt the fed-back information to realize the communication between the upper computer and the meter.
Further, the connection starting of the upper computer and the encryption server specifically comprises,
s111, starting the upper computer, and sending parameters of the upper computer to an encryption server;
s112, the encryption server judges whether to start, if so, S13 is executed, and if not, the encryption server is not connected with the upper computer;
s113, verifying whether the received parameters of the upper computer are matched with the stored information, if so, establishing connection with the upper computer, and if not, disconnecting the upper computer.
Further, the encryption server is connected with the card machine for starting, specifically comprising,
s121, the encryption server sends a card machine dynamic library connecting instruction to the card machine;
and S122, the card machine receives the instruction for connecting the card machine dynamic library and carries out parameter verification, the verification is successful, the connection with the encryption server is established, and otherwise, the connection is not established.
Further, the upper computer encrypts the plaintext through the encryption server and the card machine to form a ciphertext, specifically comprising,
s211, the upper computer sends an encryption instruction to an encryption server;
s212, the encryption server receives the encryption instruction and selects and calls a corresponding card machine dynamic library interface function;
s213, the card machine executes the encryption function according to the selected card machine dynamic library interface function and returns an execution result;
s214, the encryption server judges the returned execution result, and when the judgment result is correct, the encryption server feeds back the encrypted data to the upper computer.
Further, after receiving the encrypted data fed back by the encryption server, the upper computer also performs the following operations,
s215, judging whether the execution result is correct, if so, executing S216, otherwise, prompting the execution failure and ending the execution;
s216, the ciphertext frame is constructed and sent to the meter.
Furthermore, after the upper computer builds the ciphertext frame and sends the ciphertext frame to the meter, the method also comprises the following operations,
s217, the upper computer receives the meter return frame, extracts a data area to be decrypted and sends the data area to the encryption server in combination with a decryption instruction;
s218, the encryption server selects and calls the corresponding card machine dynamic library interface function so that the card machine can decrypt.
Further, the method also comprises the step of after the card machine executes decryption,
s219, the card machine transmits back an execution result, the encryption server judges whether the execution result is correct or not, and sends plaintext data to the upper computer when the execution result is correct;
and S220, the upper computer receives the returned information and judges whether the execution result is correct or not, if so, the clear text analysis is carried out, the result is displayed, and the execution is finished.
Further, the method also comprises the step of analyzing the error code and feeding the error code back to the upper computer when the encryption server judges that the execution result is incorrect.
Furthermore, the upper computer and the encryption server are located on the same local machine.
Furthermore, the upper computer and the encryption server are located on different local machines.
Compared with the prior art, the invention has the advantages that:
the encryption server is separated on the upper computer, and is independent, so that the problems of insufficient memory, memory leakage and system breakdown when the upper computer calls the dynamic library interface function in the prior art are solved, meanwhile, the encryption server is independent of the upper computer, the characteristic of large memory of the local computer can be fully utilized, the safety of data transmission and the reliability of successful communication are ensured, the encryption communication of a plurality of upper computers simultaneously connected with one server can be supported, and the application range and the possibility are expanded.
Drawings
Fig. 1 is a flowchart of encryption start-up in the present application.
Fig. 2 is a flowchart of encryption and decryption according to the present application.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to the same or similar elements or elements having the same or similar functions throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
As shown in fig. 1-2, a preferred embodiment of a method for communicating using a separate encryption server, the method includes the steps of,
s1, the upper computer and the encryption server, and the encryption server and the card machine are respectively connected and started, and the encryption server and the upper computer are separately designed;
s2, the upper computer encrypts the plaintext through the encryption server and the card machine to form a ciphertext, the ciphertext is sent to the meter, the information fed back by the meter is received, and the information fed back is decrypted through the encryption server and the card machine to realize communication between the upper computer and the meter.
Wherein, the host computer and the separation of encryption server, can both be on same local machine, also can both be on different local machines respectively, so, be convenient for realize many host computers and connect same encryption server simultaneously and carry out encryption communication, local card machine inserts on remote computer promptly, the backstage also can pass through IP remote access, satisfy the multi-user multilist self-adaptation and open the service communication requirement, insert the card machine on A computer, run encryption server on A computer, go to the local encryption service of visiting A computer through the IP on a plurality of computers such as B, C, D … …, satisfy the application demand that remote technology supported the communication scene.
Meanwhile, by the communication design, the dynamic library can be popularized to remote encryption dynamic library updating, for example, the application requirements of one-to-many local area network communication and remote technical support scenes are met.
Wherein, the upper computer is connected with the encryption server for starting, which comprises,
s111, starting the upper computer, and sending parameters of the upper computer to an encryption server;
s112, the encryption server judges whether to start, if so, S13 is executed, and if not, the encryption server is not connected with the upper computer;
s113, verifying whether the received parameters of the upper computer are matched with the stored information, if so, establishing connection with the upper computer, and if not, disconnecting the upper computer.
The upper computer parameters comprise a local computer IP, an encryption server port number and communication delay time.
And the connection start of the encryption server and the card machine correspondingly comprises,
s121, the encryption server sends a dynamic library instruction of the card machine to the card machine;
and S122, the card machine receives the instruction for connecting the card machine dynamic library and carries out parameter verification, the verification is successful, the connection with the encryption server is established, and otherwise, the connection is not established.
Wherein, the upper computer encrypts the plaintext through the encryption server and the card machine to form a ciphertext, which specifically comprises,
s211, the upper computer sends an encryption instruction to an encryption server;
s212, the encryption server receives the encryption instruction and selects and calls a corresponding card machine dynamic library interface function;
s213, the card machine executes the encryption function according to the selected card machine dynamic library interface function and returns an execution result;
and S214, the encryption server judges the returned execution result, and feeds back the encrypted data to the upper computer when the judgment result is correct.
Wherein, the specific way of checking the parameters is,
1. the encryption server is internally provided with 3 parameters of the ammeter key state, the ammeter number and the session negotiation counter;
2. the encryption server calls a dynamic library link instruction and sends 3 built-in parameters;
3. the dynamic library executes a link function and checks 3 parameters;
4. if the verification is successful, the function returns 0, otherwise, an error code is returned.
Meanwhile, after receiving the encrypted data fed back by the encryption server, the upper computer also performs the following operations,
s215, judging whether the execution result is correct, if so, executing S216, otherwise, prompting the execution failure and ending the execution;
s216, the ciphertext frame is constructed and sent to the meter.
The method also comprises the following operations after the upper computer builds the ciphertext frame and sends the ciphertext frame to the meter,
s217, the upper computer receives the meter return frame, extracts a data area to be decrypted and sends the data area to the encryption server in combination with a decryption instruction;
s218, the encryption server selects and calls a corresponding card machine dynamic library interface function so that the card machine can execute decryption.
The card machine also corresponds to the following operation after executing decryption,
s219, the card machine transmits back an execution result, the encryption server judges whether the execution result is correct or not, and sends plaintext data to the upper computer when the execution result is correct;
and S220, the upper computer receives the returned information and judges whether the execution result is correct or not, if so, the clear text analysis is carried out, the result is displayed, and the execution is finished.
It should be noted that, no matter whether encryption or decryption is performed, after the card machine executes the encryption/decryption function and returns the execution result, the encryption server analyzes the error code and then feeds the error code back to the upper computer when judging that the execution result is incorrect, and the upper computer uniformly considers that the result is incorrect after receiving the feedback information.
Therefore, the dynamic flexible space of the computer storage can be fully utilized on the basis of not changing the existing card machine dynamic library, the capacity of the computer storage space is usually Gb level, the residual space is sufficient, the local card machine dynamic library is independently packaged into a local service, and the service calling can be started when needed; and the system is separated from the upper computer, and the normal application of the upper computer cannot be influenced by the abnormal local service.
Moreover, a man-machine interaction monitoring log mechanism is added when the card machine dynamic library is moved to the computer end, so that the safety of data transmission and the reliability of successful communication are ensured; the man-machine interaction monitoring interface can store key information of encrypted communication, so that a message analysis optimization electric energy meter communication mechanism is supported, application requirements of an electric energy meter encrypted communication scene and a card machine manufacturer on real-time updating of a dynamic library are met, hardware cost is low, configuration is simple, even if the card machine manufacturer updates the card machine encrypted dynamic library, only an encryption server needs to be replaced, a background communication protocol is optimized, normal use can be achieved, the card machine service operation speed is called, and reliability is improved.
While embodiments of the invention have been shown and described, it will be understood by those skilled in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.
Claims (10)
1. A method of communicating using separate encryption servers, characterized by:
s1, the upper computer and the encryption server, and the encryption server and the card machine are respectively connected and started, and the encryption server and the upper computer are separately designed;
s2, the upper computer encrypts the plaintext through the encryption server and the card machine to form a ciphertext, the ciphertext is sent to the meter to receive the information fed back by the meter, and the encryption server and the card machine decrypt the fed-back information to realize the communication between the upper computer and the meter.
2. The method of communicating using a separate encryption server of claim 1, wherein: the upper computer is connected with the encryption server for starting, and specifically comprises,
s111, starting the upper computer, and sending parameters of the upper computer to an encryption server;
s112, the encryption server judges whether to start, if so, S13 is executed, and if not, the encryption server is not connected with the upper computer;
s113, verifying whether the received parameters of the upper computer are matched with the stored information, if so, establishing connection with the upper computer, and if not, disconnecting the upper computer.
3. The method of communicating using a separate encryption server of claim 1, wherein: the encryption server is connected with the card machine for starting, specifically comprising,
s121, the encryption server sends a card machine dynamic library connecting instruction to the card machine;
and S122, the card machine receives the instruction of connecting the dynamic library of the card machine and carries out parameter verification, the verification is successful, the connection is established with the encryption server, and otherwise, the connection is not connected.
4. The method of communicating using a separate encryption server of claim 1, wherein: the upper computer encrypts the plaintext through the encryption server and the card machine to form a ciphertext, and specifically comprises,
s211, the upper computer sends an encryption instruction to an encryption server;
s212, the encryption server receives the encryption instruction and selects and calls a corresponding card machine dynamic library interface function;
s213, the card machine executes the encryption function according to the selected card machine dynamic library interface function and returns an execution result;
s214, the encryption server judges the returned execution result, and when the judgment result is correct, the encryption server feeds back the encrypted data to the upper computer.
5. The method of communicating with a separate encryption server of claim 4, wherein: the upper computer also performs the following operations after receiving the encrypted data fed back by the encryption server,
s215, judging whether the execution result is correct, if so, executing S216, otherwise, prompting the execution failure and ending the execution;
s216, the ciphertext frame is constructed and sent to the meter.
6. The method of communicating with a separate encryption server of claim 5, wherein: the method also comprises the following operations after the upper computer builds the ciphertext frame and sends the ciphertext frame to the meter,
s217, the upper computer receives the meter return frame, extracts a data area to be decrypted and sends the data area to the encryption server in combination with a decryption instruction;
s218, the encryption server selects and calls the corresponding card machine dynamic library interface function so that the card machine can decrypt.
7. The method of communicating with a separate encryption server of claim 6, wherein: the method also includes after the card machine performs the decryption,
s219, the card machine transmits back an execution result, the encryption server judges whether the execution result is correct or not, and sends plaintext data to the upper computer when the execution result is correct;
and S220, the upper computer receives the returned information and judges whether the execution result is correct or not, if so, the clear text analysis is carried out, the result is displayed, and the execution is finished.
8. The method of communicating using a separate encryption server of claim 7, wherein: the method further comprises the step of analyzing the error code and feeding the error code back to the upper computer when the encryption server judges that the execution result is incorrect.
9. The method of communicating using a separate encryption server of claim 1, wherein:
the upper computer and the encryption server are located on the same local machine.
10. The method of communicating using a separate encryption server of claim 1, wherein:
the upper computer and the encryption server are located on different local machines.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210206333.4A CN114640510B (en) | 2022-03-02 | 2022-03-02 | Method for communication by adopting separated encryption server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210206333.4A CN114640510B (en) | 2022-03-02 | 2022-03-02 | Method for communication by adopting separated encryption server |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114640510A true CN114640510A (en) | 2022-06-17 |
CN114640510B CN114640510B (en) | 2023-07-04 |
Family
ID=81948132
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210206333.4A Active CN114640510B (en) | 2022-03-02 | 2022-03-02 | Method for communication by adopting separated encryption server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114640510B (en) |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150244529A1 (en) * | 2014-02-26 | 2015-08-27 | Unisys Corporation | Enhanced security for media encryption |
CN105243746A (en) * | 2015-10-21 | 2016-01-13 | 宁波三星医疗电气股份有限公司 | Switching method for charge control modes of single-phase intelligent electric energy meter |
WO2016126151A1 (en) * | 2015-02-05 | 2016-08-11 | Mtouche Technology Berhad | System for establishing secure communication between multiple electronic communication devices |
US9515997B1 (en) * | 2013-07-19 | 2016-12-06 | Amazon Technologies, Inc. | Inline data encryption |
CN205787091U (en) * | 2016-06-29 | 2016-12-07 | 中国南方电网有限责任公司电网技术研究中心 | For taking the simulation electric energy meter of control interactive terminal expense control Function detection |
CN108197501A (en) * | 2017-12-28 | 2018-06-22 | 天地融科技股份有限公司 | Information input equipment inputs encryption method, device and the information input equipment of information |
CN108809906A (en) * | 2017-05-03 | 2018-11-13 | 腾讯科技(深圳)有限公司 | Data processing method, system and device |
CN109450857A (en) * | 2018-10-12 | 2019-03-08 | 五八有限公司 | Encryption data configuration method, device, server, encryption equipment and storage medium |
US20190081776A1 (en) * | 2016-03-11 | 2019-03-14 | Nec Corporation | Encryption communication system, encryption communication method, security chip, communication apparatus, and control method and control program of communication apparatus |
CN110324143A (en) * | 2019-05-24 | 2019-10-11 | 平安科技(深圳)有限公司 | Data transmission method, electronic equipment and storage medium |
CN110944010A (en) * | 2019-12-13 | 2020-03-31 | 辽宁省计量科学研究院 | Anti-theft flow device control system and method |
CN113420309A (en) * | 2021-07-01 | 2021-09-21 | 广东工业大学 | Lightweight data protection system based on state cryptographic algorithm |
CN113507435A (en) * | 2021-06-01 | 2021-10-15 | 武汉天喻信息产业股份有限公司 | Data transmission method and system |
CN113612769A (en) * | 2021-08-02 | 2021-11-05 | 北京力天世技系统集成有限公司 | Data safety type connector |
CN114070614A (en) * | 2021-11-15 | 2022-02-18 | 中国工商银行股份有限公司 | Identity authentication method, device, equipment, storage medium and computer program product |
-
2022
- 2022-03-02 CN CN202210206333.4A patent/CN114640510B/en active Active
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9515997B1 (en) * | 2013-07-19 | 2016-12-06 | Amazon Technologies, Inc. | Inline data encryption |
US20150244529A1 (en) * | 2014-02-26 | 2015-08-27 | Unisys Corporation | Enhanced security for media encryption |
WO2016126151A1 (en) * | 2015-02-05 | 2016-08-11 | Mtouche Technology Berhad | System for establishing secure communication between multiple electronic communication devices |
CN105243746A (en) * | 2015-10-21 | 2016-01-13 | 宁波三星医疗电气股份有限公司 | Switching method for charge control modes of single-phase intelligent electric energy meter |
US20190081776A1 (en) * | 2016-03-11 | 2019-03-14 | Nec Corporation | Encryption communication system, encryption communication method, security chip, communication apparatus, and control method and control program of communication apparatus |
CN205787091U (en) * | 2016-06-29 | 2016-12-07 | 中国南方电网有限责任公司电网技术研究中心 | For taking the simulation electric energy meter of control interactive terminal expense control Function detection |
CN108809906A (en) * | 2017-05-03 | 2018-11-13 | 腾讯科技(深圳)有限公司 | Data processing method, system and device |
CN108197501A (en) * | 2017-12-28 | 2018-06-22 | 天地融科技股份有限公司 | Information input equipment inputs encryption method, device and the information input equipment of information |
CN109450857A (en) * | 2018-10-12 | 2019-03-08 | 五八有限公司 | Encryption data configuration method, device, server, encryption equipment and storage medium |
CN110324143A (en) * | 2019-05-24 | 2019-10-11 | 平安科技(深圳)有限公司 | Data transmission method, electronic equipment and storage medium |
CN110944010A (en) * | 2019-12-13 | 2020-03-31 | 辽宁省计量科学研究院 | Anti-theft flow device control system and method |
CN113507435A (en) * | 2021-06-01 | 2021-10-15 | 武汉天喻信息产业股份有限公司 | Data transmission method and system |
CN113420309A (en) * | 2021-07-01 | 2021-09-21 | 广东工业大学 | Lightweight data protection system based on state cryptographic algorithm |
CN113612769A (en) * | 2021-08-02 | 2021-11-05 | 北京力天世技系统集成有限公司 | Data safety type connector |
CN114070614A (en) * | 2021-11-15 | 2022-02-18 | 中国工商银行股份有限公司 | Identity authentication method, device, equipment, storage medium and computer program product |
Also Published As
Publication number | Publication date |
---|---|
CN114640510B (en) | 2023-07-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106302415A (en) | A kind of method verifying equipment validity and distribution automatic to legitimate device | |
EP2056195B1 (en) | Implementation method for updating the terminals in batches | |
CN101730987B (en) | Managing network components using USB keys | |
CN109890029B (en) | Automatic network distribution method of intelligent wireless equipment | |
CN102271133A (en) | Authentication method, device and system | |
CN107041171A (en) | Low-power consumption bluetooth BLE equipment, data update system and method | |
CN113162973B (en) | IP access method and device of SSL VPN | |
CN102075927A (en) | Security configuration method and system for wireless network equipment | |
CN102158483A (en) | Method and system for authenticating access of intelligent television, intelligent television and authentication server | |
WO2018113113A1 (en) | Double-system terminal wifi sharing method and device | |
CN114640510A (en) | Method for communication by adopting separated encryption servers | |
CN103841537A (en) | Control system and method using family gateway to deploy WLAN metropolitan area network | |
CN101388796B (en) | Information sending processing method, communication equipment and communication system | |
CN111356132B (en) | Bluetooth access control method, system, electronic equipment and storage medium | |
CN106453282A (en) | Method and system for controlling ATM equipment | |
CN107040928B (en) | Illegal WIFI detection method, terminal, aaa server and system | |
CN113709142B (en) | Hot spot distribution network method and device, intelligent terminal and storage medium | |
CN109451497A (en) | Wireless network connecting method and device, electronic equipment, storage medium | |
CN107451435B (en) | Management and control method, management and control machine and management and control system of hardware encryption machine | |
CN105263177B (en) | A kind of nothing is physically entered Android device WiFi networking method and device | |
CN102694681B (en) | Adaptive management entity, base station self-configuration method and system | |
CN113573339B (en) | Equipment wireless connection method and system | |
CN106888447A (en) | The processing method and system of secondary USIM application messages | |
CN113014592B (en) | Automatic registration system and method for Internet of things equipment | |
CN106878462A (en) | The means of communication and device of equipment room |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |