CN103297429A - Embedded upgrading file transmission method - Google Patents

Embedded upgrading file transmission method Download PDF

Info

Publication number
CN103297429A
CN103297429A CN2013101955797A CN201310195579A CN103297429A CN 103297429 A CN103297429 A CN 103297429A CN 2013101955797 A CN2013101955797 A CN 2013101955797A CN 201310195579 A CN201310195579 A CN 201310195579A CN 103297429 A CN103297429 A CN 103297429A
Authority
CN
China
Prior art keywords
upgrade
file
upgrading
embedded
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013101955797A
Other languages
Chinese (zh)
Other versions
CN103297429B (en
Inventor
石光辉
段晓辉
王道宪
崔雯雯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Peking University
Original Assignee
Peking University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Peking University filed Critical Peking University
Priority to CN201310195579.7A priority Critical patent/CN103297429B/en
Publication of CN103297429A publication Critical patent/CN103297429A/en
Application granted granted Critical
Publication of CN103297429B publication Critical patent/CN103297429B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention relates to an embedded upgrading file transmission method. The embedded upgrading file transmission method includes steps of 1) generating upgrading file information and encryption keys by an upgrading server and transmitting decryption keys to a third-part network management server; 2) connecting the third-part network management server with an upgrading client side, and transmitting client-side upgrading file information, upgrading server address and the decryption keys to the upgrading client side; 3) transmitting upgrading request to the upgrading server through the upgrading client side, and connecting the upgrading client side with the upgrading server according to the upgrading server address, acquiring differential files on the upgrading server according to the client side upgrading file information, decrypting to acquire verifying values according to the decryption keys, and transmitting the files to complete upgrading after verifying is succeeded. The embedded upgrading file transmission method overcomes the defect that an existing embedded upgrading file transmission is low in safety and easy to be attacked and lacks of prevention of file information disclosure and the like and has the advantages of high transmission efficiency and transmission safety coefficient, information privacy and complete identity authentication mechanism and the like.

Description

A kind of embedded upgrade file transmission method
Technical field
The present invention relates to the safety upgrade technology of embedded communication system, particularly a kind of transmission method of upgrade file safely and efficiently.
Background technology
The embedded remote communication equipment owing to reasons such as program operation troubles, functional requirement increase, performance retrofits, need carry out software upgrading to long-range equipment in the middle of running.In the middle of the process of upgrading, at first need to realize the remote transmission of file from the service end to the embedded device.Under the network communications environment of complexity, exist the possibility that vital document transmission content is divulged a secret, communication process is monitored, core technology is stolen, the malicious attack to built-in network equipment also may occur, therefore guarantee that the upgrade file safety of transmission is most important.Because there are factors such as speed instability, propagation delay in the telecommunication network transmission, also needs to consider especially the reliability of file transfer, and improve the upgrade file efficiency of transmission.
Present most of embedded remote upgrade technique, the upgrade file safety of transmission is not caused enough attention, existing embedded upgrade file transmission safety mechanism great majority just are encrypted upgrade file or encode, file transfer only relates to service end and client, lack perfect authentication mechanism, information of upgrade file is revealed the mechanism of also not taking precautions against.For the embedded communication equipment that is in the network core status, need to realize the perfect upgrade file transmission means of a cover especially.
Summary of the invention
The object of the present invention is to provide a kind of upgrade file transmission method based on differential file coding, reliable verification scheme and secure identity checking.
In order to achieve the above object, technical scheme of the present invention is: a kind of embedded upgrade file transmission method, and its step comprises:
1) upgrade server generation information of upgrade file and encryption key send the deciphering PKI to third party's network management server simultaneously;
2) described third party's network management server and described updating client connect, and described client information of upgrade file, upgrade server address and deciphering PKI are sent to described updating client;
3) described updating client sends upgrade request to upgrade server, connect according to described upgrade server address and described upgrade server, obtain differential file on the upgrade server according to described client information of upgrade file, decrypt check value according to described deciphering PKI, transfer files is finished upgrading after the verification succeeds.
Further, described updating client restores the upgraded edition presents as follows with the differential file and the local version that receive:
Described updating client at first reads the version information of the starting block of differential file, if current version, then according to the first address of piece and block length from current version file copy data to original also; Secondly, if upgrade version, then according to its block length, copy data is to going back original from differential file; At last, reduce each piece successively, finish up to differential file.
Further, compare the check code of described also original and the check code after the deciphering as follows:
1) client is utilized the cryptographic check sign indicating number that the PKI deciphering receives, and selects hash function to calculate the also hashed value of original;
2) whether the check code after the comparison deciphering is consistent with hashed value, if identical, then file transmission information is complete, and file transmit leg identity is safety;
3) if inequality, the supporting paper transmission is wrong, and file transmits again.
Further, described hash function is MD5, SHA.
Further, the generation method of described differential file is: in upgrade server, upgraded edition presents in the information of upgrade file is one with several bytes and is divided into some, and block-by-block and the comparison of current version file.
Further, described comparison method is:
1) calculates weak hash value and the strong hash value of each piece, and save as the Hash table respectively;
2) comparison current version character block and the preceding several characters that upgrade the version character block, if coupling, then compare its weak hash value and strong hash value successively, if all mate, then preserve the current version character block at first address, block length and the version flag of current version file in differential file;
3) if upgrade the piece that the version character block can not find coupling, then preserve the content of the length, version flag and this piece that upgrade the version character block in differential file.
Further, described encryption and/or decruption key are RSA or ECC private key and/or the PKIs that produces by random fashion.
Further, described upgrade server address is set up TCP with described upgrade server and is connected.
Further, described third party's network management server and described updating client are according to the concurrent carry information that establishes a communications link of the network management system by safety identification authentication.
Further, described transmission information via DES, AES cryptographic algorithm are encrypted.
Beneficial effect:
Embedded upgrade file transmission method disclosed by the invention, it is low to have solved existing embedded upgrade file transmission security degree, easily under fire, lack fileinfo and reveal shortcomings such as strick precaution, have the efficiency of transmission height, transmission security coefficient height, information privacy, advantage such as ID authentication mechanism is more perfect.
Description of drawings
Fig. 1 is schematic flow sheet among embedded upgrade file transmission method one embodiment of safety of the present invention;
Fig. 2 is file transfer process schematic diagram among embedded upgrade file transmission method one embodiment of safety of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described, be understandable that described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those skilled in the art belong to the scope of protection of the invention not making the every other embodiment that obtains under the creative work prerequisite.
Be schematic flow sheet among embedded upgrade file transmission method one embodiment of safety of the present invention as shown in Figure 1;
Technical scheme of the present invention is that a kind of safe transmission mode relates to third party's network management server, upgrading host server and updating client.
Among the present invention, the PKI of fileinfo, upgrade server address information and deciphering that third party's network management server is responsible for notifying updating client to upgrade, method is as follows:
Set up the safe communication channel by the network management system with safety identification authentication between third party's network management server (every and client can be carried out the server with Network Management Function of safety identification authentication) and the client, the information that sends needs to encrypt through too high level of security cryptographic algorithm, can comprise DES, AES cryptographic algorithm.
Network management system be a software and hardware combining based on the distributed network application system of software, its objective is supervising the network, network-efficient is normally moved.
Network Management Function generally is divided into five big management functions such as performance management, configuration management, safety management, accounting management and fault management.
Network management object generally comprises router, switch, HUB etc.In recent years, network management object has the trend of extension, namely entity nearly all in the network: the network equipment, application program, server system, auxiliary equipment such as ups power etc. are all as managed object.Provide a comprehensive and systematic network view to network system administrator.
Upgrade server and third party's network management server belong to administrative center together, administrative center is responsible for network management and the upgrade job of embedded client, the administrative center staff is management upgrade server and third party's network management server simultaneously, and the PKI of providing generates and inform third party's network management server by upgrade server.
In one embodiment of the invention, after upgrade server is received the client upgrade request, to the client current version of its transmission institute upgrade file and the difference partial document between the renewal version, and the check information after encrypting, wherein need to convert upgrade file to the binary file form.
In one embodiment of the invention, the generation method of differential file is: in upgrade server, the upgraded edition presents is one with several bytes and is divided into some, and block-by-block and the comparison of current version file.
Described comparative approach is as follows:
At first calculate weak hash value and the strong hash value of each piece, and save as the Hash table respectively; Weak hash value refers to that the collision probability of two character block cryptographic Hash is higher, but computational speed is very fast.Strong hash value refers to that the collision probability of two character block cryptographic Hash is very low, but computational speed is slower.
In one embodiment of the invention, comparison current version character block and the preceding several characters that upgrade the version character block, if coupling, compare its weak hash value and strong hash value successively, if all mate, then preserve the current version character block at first address, block length and the version flag of current version file in differential file.If upgrade the piece that the version character block can not find coupling, then preserve the content of the length, version flag and this piece that upgrade the version character block in differential file.So then generated differential file.
In one embodiment of the invention, described encryption and decryption key is respectively RSA or the ECC(elliptic curve encryption algorithm that produces by random fashion) private key and PKI, in upgrade server, with RSA or ECC encrypted private key check information, and send RSA or ECC PKI to third party's network management server.
In one embodiment of the invention, check information is to utilize hash functions such as MD5, SHA that the upgraded edition presents is calculated its hashed value, and specific algorithm is selected to decide according to the client computational speed.
In one embodiment of the invention, client restores the upgraded edition presents with the differential file and the local version that receive, the check code after comparing its check code and deciphering.
In one embodiment of the invention, method of reducing is the version information that client at first reads the starting block of differential file, if current version, then according to the first address of piece and block length from current version file copy data to original also; If the renewal version, then according to its block length, copy data is to going back original from differential file.Reduce each piece so successively, finish up to differential file.
In one embodiment of the invention, comparison check code method is that at first client utilizes PKI to decipher the cryptographic check sign indicating number that receives, and calculates the also hashed value of original with selected hash function then, and whether the check code after the comparison deciphering is consistent with hashed value.If identical, then file transmission information is complete, and file transmit leg identity is safe; If inequality, the supporting paper transmission is wrong, needs transmission again.
Embodiment:
Fig. 2 is file transfer process schematic diagram among embedded upgrade file transmission method one embodiment of safety of the present invention.
Upgrade-system needs the kernel image file of updating client, and upgrade server sends the RSA PKI for third party snmp network management system server, and kernel image file information; The snmp agency of third party snmp network management system server calls client, by snmp proxy call updating client program, send the transaction file name kernel_new of kernel reflection to it, transaction file version 1, upgrade server IP address, and the RSA PKI, the snmp consultation carries out safety encipher to the information of its transmission.
After updating client is called, preserve the information of upgrade file and the RSA PKI that receive, set up TCP to upgrade server and connect, send solicited message, comprise filename kernel_new and the upgrade file version 1 of upgrading, current file version 0.Server is received solicited message, find this document, obtain the differential file that it upgrades version 1 and current version 0, calculate the MD5 Hash functional value of upgrading the version kernel, and use the RSA encrypted private key, the hashed value (being check code) after sending the kernel differential file and encrypt to client then.
Upgrade server just produces RSA key at random before upgrading, and moves the upgrade service program always, and its kernel differential file also can just generate before upgrading in advance.
Client receives kernel differential file and cryptographic check sign indicating number, at first restores the kernel transaction file, calculates its MD5 hashed value; Client RSA PKI is deciphered the check code of receiving then, and the check code after the deciphering and the local MD5 hashed value of calculating are compared.If identical, then return to third party's network management server and escalate into function signal; If different, then transmit kernel file again, still fail after transmit N time, then return the upgrading failure signal to third party's network management server.

Claims (10)

1. embedded upgrade file transmission method, its step comprises:
1) upgrade server generation information of upgrade file and encryption key send the deciphering PKI to third party's network management server simultaneously;
2) described third party's network management server and described updating client connect, and described client information of upgrade file, upgrade server address and deciphering PKI are sent to described updating client;
3) described updating client sends upgrade request to upgrade server, connect according to described upgrade server address and described upgrade server, obtain differential file on the upgrade server according to described client information of upgrade file, decrypt check value according to described deciphering PKI, transfer files is finished upgrading after the verification succeeds.
2. embedded upgrade file transmission method as claimed in claim 1 also comprises, described updating client restores the upgraded edition presents as follows with the differential file and the local version that receive:
Described updating client at first reads the version information of the starting block of differential file, if current version, then according to the first address of piece and block length from current version file copy data to original also; Secondly, if upgrade version, then according to its block length, copy data is to going back original from differential file; At last, reduce each piece successively, finish up to differential file.
3. embedded upgrade file transmission method as claimed in claim 2 is characterized in that, compares the check code of described also original and the check code after the deciphering as follows:
1) client is utilized the cryptographic check sign indicating number that the PKI deciphering receives, and selects hash function to calculate the also hashed value of original;
2) whether the check code after the comparison deciphering is consistent with hashed value, if identical, then file transmission information is complete, and file transmit leg identity is safety;
3) if inequality, the supporting paper transmission is wrong, and file transmits again.
4. embedded upgrade file transmission method as claimed in claim 3 is characterized in that, described hash function is MD5, SHA.
5. embedded upgrade file transmission method as claimed in claim 1, it is characterized in that, the generation method of described differential file is: in upgrade server, upgraded edition presents in the information of upgrade file is one with several bytes and is divided into some, and block-by-block and the comparison of current version file.
6. embedded upgrade file transmission method as claimed in claim 5 is characterized in that described comparison method is:
1) calculates weak hash value and the strong hash value of each piece, and save as the Hash table respectively;
2) comparison current version character block and the preceding several characters that upgrade the version character block, if coupling, then compare its weak hash value and strong hash value successively, if all mate, then preserve the current version character block at first address, block length and the version flag of current version file in differential file;
3) if upgrade the piece that the version character block can not find coupling, then preserve the content of the length, version flag and this piece that upgrade the version character block in differential file.
7. embedded upgrade file transmission method as claimed in claim 1 is characterized in that, described encryption and/or decruption key are RSA or ECC private key and/or the PKIs that produces by random fashion.
8. embedded upgrade file transmission method as claimed in claim 1 is characterized in that, described upgrade server address is set up TCP with described upgrade server and is connected.
9. embedded upgrade file transmission method as claimed in claim 1 is characterized in that, described third party's network management server and described updating client are according to the concurrent carry information that establishes a communications link of the network management system by safety identification authentication.
10. embedded upgrade file transmission method as claimed in claim 9 is characterized in that, described transmission information via DES, AES cryptographic algorithm are encrypted.
CN201310195579.7A 2013-05-23 2013-05-23 A kind of embedded upgrade file transmission method Expired - Fee Related CN103297429B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310195579.7A CN103297429B (en) 2013-05-23 2013-05-23 A kind of embedded upgrade file transmission method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310195579.7A CN103297429B (en) 2013-05-23 2013-05-23 A kind of embedded upgrade file transmission method

Publications (2)

Publication Number Publication Date
CN103297429A true CN103297429A (en) 2013-09-11
CN103297429B CN103297429B (en) 2016-12-28

Family

ID=49097749

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310195579.7A Expired - Fee Related CN103297429B (en) 2013-05-23 2013-05-23 A kind of embedded upgrade file transmission method

Country Status (1)

Country Link
CN (1) CN103297429B (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103546576A (en) * 2013-10-31 2014-01-29 中安消技术有限公司 Remote automatic updating method and system of embedded equipment
CN103617215A (en) * 2013-11-20 2014-03-05 上海爱数软件有限公司 Method for generating multi-version files by aid of data difference algorithm
CN104052818A (en) * 2014-06-27 2014-09-17 青岛海信移动通信技术股份有限公司 Version upgrade method and device for mobile terminal
CN104980410A (en) * 2014-04-14 2015-10-14 领步科技集团有限公司 Encryption method for remote upgrading of software of on-line power quality monitoring equipment
CN106685717A (en) * 2016-12-29 2017-05-17 深圳前海勇艺达机器人有限公司 Updating method and device for intelligent terminal
CN107040532A (en) * 2017-04-05 2017-08-11 成都爱途享科技有限公司 The data assessment device that a kind of use is verified in check code
CN107223322A (en) * 2017-04-25 2017-09-29 深圳市汇顶科技股份有限公司 The method, apparatus and system of signature verification
CN107580070A (en) * 2017-09-27 2018-01-12 威创集团股份有限公司 A kind of method, system and the relevant apparatus of the transmission of computer remote file
CN108199827A (en) * 2018-01-09 2018-06-22 武汉斗鱼网络科技有限公司 Client code integrity checking method, storage medium, electronic equipment and system
CN109358883A (en) * 2018-11-05 2019-02-19 珠海格力电器股份有限公司 Programme upgrade method, system and application system, storage medium
CN109977674A (en) * 2017-12-28 2019-07-05 航天信息股份有限公司 The method for upgrading software and device of embedded device
CN110879713A (en) * 2018-09-06 2020-03-13 山东华软金盾软件股份有限公司 Android-end strong encryption plug-in hot update management method
CN111880829A (en) * 2020-08-06 2020-11-03 武汉众邦银行股份有限公司 Distributed application file synchronization method based on Linux
CN113204366A (en) * 2021-06-02 2021-08-03 上海酒贝乐信息技术有限公司 Remote upgrading method for intelligent wine selling machine system
CN113741943A (en) * 2021-11-08 2021-12-03 湘投云储科技有限公司 Embedded equipment program upgrading system and method
CN114422570A (en) * 2021-12-31 2022-04-29 深圳市联软科技股份有限公司 Cross-platform multi-module communication method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101557308A (en) * 2009-05-06 2009-10-14 成都市华为赛门铁克科技有限公司 File upgrading method and terminal device
CN101951391A (en) * 2010-04-13 2011-01-19 杭州海康威视系统技术有限公司 Method, device and system for remotely upgrading monitoring equipment
CN102955700A (en) * 2011-08-18 2013-03-06 腾讯科技(深圳)有限公司 System and method for upgrading software

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101557308A (en) * 2009-05-06 2009-10-14 成都市华为赛门铁克科技有限公司 File upgrading method and terminal device
CN101951391A (en) * 2010-04-13 2011-01-19 杭州海康威视系统技术有限公司 Method, device and system for remotely upgrading monitoring equipment
CN102955700A (en) * 2011-08-18 2013-03-06 腾讯科技(深圳)有限公司 System and method for upgrading software

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103546576A (en) * 2013-10-31 2014-01-29 中安消技术有限公司 Remote automatic updating method and system of embedded equipment
CN103546576B (en) * 2013-10-31 2017-08-11 中安消技术有限公司 A kind of embedded device remote automatic upgrading method and system
CN103617215A (en) * 2013-11-20 2014-03-05 上海爱数软件有限公司 Method for generating multi-version files by aid of data difference algorithm
CN103617215B (en) * 2013-11-20 2017-02-08 上海爱数信息技术股份有限公司 Method for generating multi-version files by aid of data difference algorithm
CN104980410A (en) * 2014-04-14 2015-10-14 领步科技集团有限公司 Encryption method for remote upgrading of software of on-line power quality monitoring equipment
CN104052818B (en) * 2014-06-27 2017-07-11 青岛海信移动通信技术股份有限公司 The version upgrading method and device of a kind of mobile terminal
CN104052818A (en) * 2014-06-27 2014-09-17 青岛海信移动通信技术股份有限公司 Version upgrade method and device for mobile terminal
CN106685717A (en) * 2016-12-29 2017-05-17 深圳前海勇艺达机器人有限公司 Updating method and device for intelligent terminal
CN107040532A (en) * 2017-04-05 2017-08-11 成都爱途享科技有限公司 The data assessment device that a kind of use is verified in check code
CN107040532B (en) * 2017-04-05 2020-11-03 成都爱途享科技有限公司 Data evaluation device using verification code for verification
CN107223322A (en) * 2017-04-25 2017-09-29 深圳市汇顶科技股份有限公司 The method, apparatus and system of signature verification
CN107223322B (en) * 2017-04-25 2020-07-24 深圳市汇顶科技股份有限公司 Signature verification method, device and system
CN107580070A (en) * 2017-09-27 2018-01-12 威创集团股份有限公司 A kind of method, system and the relevant apparatus of the transmission of computer remote file
CN109977674A (en) * 2017-12-28 2019-07-05 航天信息股份有限公司 The method for upgrading software and device of embedded device
CN108199827A (en) * 2018-01-09 2018-06-22 武汉斗鱼网络科技有限公司 Client code integrity checking method, storage medium, electronic equipment and system
CN110879713A (en) * 2018-09-06 2020-03-13 山东华软金盾软件股份有限公司 Android-end strong encryption plug-in hot update management method
CN109358883A (en) * 2018-11-05 2019-02-19 珠海格力电器股份有限公司 Programme upgrade method, system and application system, storage medium
CN109358883B (en) * 2018-11-05 2021-12-24 珠海格力电器股份有限公司 Program upgrading method, system, application system and storage medium
CN111880829A (en) * 2020-08-06 2020-11-03 武汉众邦银行股份有限公司 Distributed application file synchronization method based on Linux
CN113204366A (en) * 2021-06-02 2021-08-03 上海酒贝乐信息技术有限公司 Remote upgrading method for intelligent wine selling machine system
CN113741943A (en) * 2021-11-08 2021-12-03 湘投云储科技有限公司 Embedded equipment program upgrading system and method
CN113741943B (en) * 2021-11-08 2022-03-18 湘投云储科技有限公司 Embedded equipment program upgrading system and method
CN114422570A (en) * 2021-12-31 2022-04-29 深圳市联软科技股份有限公司 Cross-platform multi-module communication method and system
CN114422570B (en) * 2021-12-31 2024-05-14 深圳市联软科技股份有限公司 Cross-platform multi-module communication method and system

Also Published As

Publication number Publication date
CN103297429B (en) 2016-12-28

Similar Documents

Publication Publication Date Title
CN103297429A (en) Embedded upgrading file transmission method
CN106656476B (en) Password protection method and device and computer readable storage medium
CN103067401B (en) Method and system for key protection
CN110048849B (en) Multi-layer protection session key negotiation method
CN111447276B (en) Encryption continuous transmission method with key agreement function
CN111404664B (en) Quantum secret communication identity authentication system and method based on secret sharing and multiple mobile devices
CN111435913A (en) Identity authentication method and device for terminal of Internet of things and storage medium
CN113099443A (en) Equipment authentication method, device, equipment and system
CN113630248B (en) Session key negotiation method
CN113612610B (en) Session key negotiation method
CN103546421A (en) Network work communication security and secrecy system on basis of PKI (public key infrastructure) technology and method for implementing network work communication security and secrecy system
CN110362984B (en) Method and device for operating service system by multiple devices
CN111914291A (en) Message processing method, device, equipment and storage medium
CN114584306B (en) Data processing method and related device
CN112765626A (en) Authorization signature method, device and system based on escrow key and storage medium
CN112202556A (en) Security authentication method, device and system
CN112270020A (en) Terminal equipment safety encryption device based on safety chip
CN112865965B (en) Train service data processing method and system based on quantum key
CN112202773B (en) Computer network information security monitoring and protection system based on internet
CN109726578A (en) A kind of anti-fake solution of novel dynamic two-dimension code
CN102118311A (en) Data transmission method
CN115174071A (en) Safe transmission method and system for remote upgrading scene of train-mounted software
CN114745115A (en) Information transmission method and device, computer equipment and storage medium
CN113656814A (en) Equipment key safety management method and system
CN104052756A (en) Method and system for service network elements to have safe access to service controller

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20161228

Termination date: 20210523

CF01 Termination of patent right due to non-payment of annual fee