CN103297429A - Embedded upgrading file transmission method - Google Patents
Embedded upgrading file transmission method Download PDFInfo
- Publication number
- CN103297429A CN103297429A CN2013101955797A CN201310195579A CN103297429A CN 103297429 A CN103297429 A CN 103297429A CN 2013101955797 A CN2013101955797 A CN 2013101955797A CN 201310195579 A CN201310195579 A CN 201310195579A CN 103297429 A CN103297429 A CN 103297429A
- Authority
- CN
- China
- Prior art keywords
- upgrade
- file
- upgrading
- embedded
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention relates to an embedded upgrading file transmission method. The embedded upgrading file transmission method includes steps of 1) generating upgrading file information and encryption keys by an upgrading server and transmitting decryption keys to a third-part network management server; 2) connecting the third-part network management server with an upgrading client side, and transmitting client-side upgrading file information, upgrading server address and the decryption keys to the upgrading client side; 3) transmitting upgrading request to the upgrading server through the upgrading client side, and connecting the upgrading client side with the upgrading server according to the upgrading server address, acquiring differential files on the upgrading server according to the client side upgrading file information, decrypting to acquire verifying values according to the decryption keys, and transmitting the files to complete upgrading after verifying is succeeded. The embedded upgrading file transmission method overcomes the defect that an existing embedded upgrading file transmission is low in safety and easy to be attacked and lacks of prevention of file information disclosure and the like and has the advantages of high transmission efficiency and transmission safety coefficient, information privacy and complete identity authentication mechanism and the like.
Description
Technical field
The present invention relates to the safety upgrade technology of embedded communication system, particularly a kind of transmission method of upgrade file safely and efficiently.
Background technology
The embedded remote communication equipment owing to reasons such as program operation troubles, functional requirement increase, performance retrofits, need carry out software upgrading to long-range equipment in the middle of running.In the middle of the process of upgrading, at first need to realize the remote transmission of file from the service end to the embedded device.Under the network communications environment of complexity, exist the possibility that vital document transmission content is divulged a secret, communication process is monitored, core technology is stolen, the malicious attack to built-in network equipment also may occur, therefore guarantee that the upgrade file safety of transmission is most important.Because there are factors such as speed instability, propagation delay in the telecommunication network transmission, also needs to consider especially the reliability of file transfer, and improve the upgrade file efficiency of transmission.
Present most of embedded remote upgrade technique, the upgrade file safety of transmission is not caused enough attention, existing embedded upgrade file transmission safety mechanism great majority just are encrypted upgrade file or encode, file transfer only relates to service end and client, lack perfect authentication mechanism, information of upgrade file is revealed the mechanism of also not taking precautions against.For the embedded communication equipment that is in the network core status, need to realize the perfect upgrade file transmission means of a cover especially.
Summary of the invention
The object of the present invention is to provide a kind of upgrade file transmission method based on differential file coding, reliable verification scheme and secure identity checking.
In order to achieve the above object, technical scheme of the present invention is: a kind of embedded upgrade file transmission method, and its step comprises:
1) upgrade server generation information of upgrade file and encryption key send the deciphering PKI to third party's network management server simultaneously;
2) described third party's network management server and described updating client connect, and described client information of upgrade file, upgrade server address and deciphering PKI are sent to described updating client;
3) described updating client sends upgrade request to upgrade server, connect according to described upgrade server address and described upgrade server, obtain differential file on the upgrade server according to described client information of upgrade file, decrypt check value according to described deciphering PKI, transfer files is finished upgrading after the verification succeeds.
Further, described updating client restores the upgraded edition presents as follows with the differential file and the local version that receive:
Described updating client at first reads the version information of the starting block of differential file, if current version, then according to the first address of piece and block length from current version file copy data to original also; Secondly, if upgrade version, then according to its block length, copy data is to going back original from differential file; At last, reduce each piece successively, finish up to differential file.
Further, compare the check code of described also original and the check code after the deciphering as follows:
1) client is utilized the cryptographic check sign indicating number that the PKI deciphering receives, and selects hash function to calculate the also hashed value of original;
2) whether the check code after the comparison deciphering is consistent with hashed value, if identical, then file transmission information is complete, and file transmit leg identity is safety;
3) if inequality, the supporting paper transmission is wrong, and file transmits again.
Further, described hash function is MD5, SHA.
Further, the generation method of described differential file is: in upgrade server, upgraded edition presents in the information of upgrade file is one with several bytes and is divided into some, and block-by-block and the comparison of current version file.
Further, described comparison method is:
1) calculates weak hash value and the strong hash value of each piece, and save as the Hash table respectively;
2) comparison current version character block and the preceding several characters that upgrade the version character block, if coupling, then compare its weak hash value and strong hash value successively, if all mate, then preserve the current version character block at first address, block length and the version flag of current version file in differential file;
3) if upgrade the piece that the version character block can not find coupling, then preserve the content of the length, version flag and this piece that upgrade the version character block in differential file.
Further, described encryption and/or decruption key are RSA or ECC private key and/or the PKIs that produces by random fashion.
Further, described upgrade server address is set up TCP with described upgrade server and is connected.
Further, described third party's network management server and described updating client are according to the concurrent carry information that establishes a communications link of the network management system by safety identification authentication.
Further, described transmission information via DES, AES cryptographic algorithm are encrypted.
Beneficial effect:
Embedded upgrade file transmission method disclosed by the invention, it is low to have solved existing embedded upgrade file transmission security degree, easily under fire, lack fileinfo and reveal shortcomings such as strick precaution, have the efficiency of transmission height, transmission security coefficient height, information privacy, advantage such as ID authentication mechanism is more perfect.
Description of drawings
Fig. 1 is schematic flow sheet among embedded upgrade file transmission method one embodiment of safety of the present invention;
Fig. 2 is file transfer process schematic diagram among embedded upgrade file transmission method one embodiment of safety of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described, be understandable that described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those skilled in the art belong to the scope of protection of the invention not making the every other embodiment that obtains under the creative work prerequisite.
Be schematic flow sheet among embedded upgrade file transmission method one embodiment of safety of the present invention as shown in Figure 1;
Technical scheme of the present invention is that a kind of safe transmission mode relates to third party's network management server, upgrading host server and updating client.
Among the present invention, the PKI of fileinfo, upgrade server address information and deciphering that third party's network management server is responsible for notifying updating client to upgrade, method is as follows:
Set up the safe communication channel by the network management system with safety identification authentication between third party's network management server (every and client can be carried out the server with Network Management Function of safety identification authentication) and the client, the information that sends needs to encrypt through too high level of security cryptographic algorithm, can comprise DES, AES cryptographic algorithm.
Network management system be a software and hardware combining based on the distributed network application system of software, its objective is supervising the network, network-efficient is normally moved.
Network Management Function generally is divided into five big management functions such as performance management, configuration management, safety management, accounting management and fault management.
Network management object generally comprises router, switch, HUB etc.In recent years, network management object has the trend of extension, namely entity nearly all in the network: the network equipment, application program, server system, auxiliary equipment such as ups power etc. are all as managed object.Provide a comprehensive and systematic network view to network system administrator.
Upgrade server and third party's network management server belong to administrative center together, administrative center is responsible for network management and the upgrade job of embedded client, the administrative center staff is management upgrade server and third party's network management server simultaneously, and the PKI of providing generates and inform third party's network management server by upgrade server.
In one embodiment of the invention, after upgrade server is received the client upgrade request, to the client current version of its transmission institute upgrade file and the difference partial document between the renewal version, and the check information after encrypting, wherein need to convert upgrade file to the binary file form.
In one embodiment of the invention, the generation method of differential file is: in upgrade server, the upgraded edition presents is one with several bytes and is divided into some, and block-by-block and the comparison of current version file.
Described comparative approach is as follows:
At first calculate weak hash value and the strong hash value of each piece, and save as the Hash table respectively; Weak hash value refers to that the collision probability of two character block cryptographic Hash is higher, but computational speed is very fast.Strong hash value refers to that the collision probability of two character block cryptographic Hash is very low, but computational speed is slower.
In one embodiment of the invention, comparison current version character block and the preceding several characters that upgrade the version character block, if coupling, compare its weak hash value and strong hash value successively, if all mate, then preserve the current version character block at first address, block length and the version flag of current version file in differential file.If upgrade the piece that the version character block can not find coupling, then preserve the content of the length, version flag and this piece that upgrade the version character block in differential file.So then generated differential file.
In one embodiment of the invention, described encryption and decryption key is respectively RSA or the ECC(elliptic curve encryption algorithm that produces by random fashion) private key and PKI, in upgrade server, with RSA or ECC encrypted private key check information, and send RSA or ECC PKI to third party's network management server.
In one embodiment of the invention, check information is to utilize hash functions such as MD5, SHA that the upgraded edition presents is calculated its hashed value, and specific algorithm is selected to decide according to the client computational speed.
In one embodiment of the invention, client restores the upgraded edition presents with the differential file and the local version that receive, the check code after comparing its check code and deciphering.
In one embodiment of the invention, method of reducing is the version information that client at first reads the starting block of differential file, if current version, then according to the first address of piece and block length from current version file copy data to original also; If the renewal version, then according to its block length, copy data is to going back original from differential file.Reduce each piece so successively, finish up to differential file.
In one embodiment of the invention, comparison check code method is that at first client utilizes PKI to decipher the cryptographic check sign indicating number that receives, and calculates the also hashed value of original with selected hash function then, and whether the check code after the comparison deciphering is consistent with hashed value.If identical, then file transmission information is complete, and file transmit leg identity is safe; If inequality, the supporting paper transmission is wrong, needs transmission again.
Embodiment:
Fig. 2 is file transfer process schematic diagram among embedded upgrade file transmission method one embodiment of safety of the present invention.
Upgrade-system needs the kernel image file of updating client, and upgrade server sends the RSA PKI for third party snmp network management system server, and kernel image file information; The snmp agency of third party snmp network management system server calls client, by snmp proxy call updating client program, send the transaction file name kernel_new of kernel reflection to it, transaction file version 1, upgrade server IP address, and the RSA PKI, the snmp consultation carries out safety encipher to the information of its transmission.
After updating client is called, preserve the information of upgrade file and the RSA PKI that receive, set up TCP to upgrade server and connect, send solicited message, comprise filename kernel_new and the upgrade file version 1 of upgrading, current file version 0.Server is received solicited message, find this document, obtain the differential file that it upgrades version 1 and current version 0, calculate the MD5 Hash functional value of upgrading the version kernel, and use the RSA encrypted private key, the hashed value (being check code) after sending the kernel differential file and encrypt to client then.
Upgrade server just produces RSA key at random before upgrading, and moves the upgrade service program always, and its kernel differential file also can just generate before upgrading in advance.
Client receives kernel differential file and cryptographic check sign indicating number, at first restores the kernel transaction file, calculates its MD5 hashed value; Client RSA PKI is deciphered the check code of receiving then, and the check code after the deciphering and the local MD5 hashed value of calculating are compared.If identical, then return to third party's network management server and escalate into function signal; If different, then transmit kernel file again, still fail after transmit N time, then return the upgrading failure signal to third party's network management server.
Claims (10)
1. embedded upgrade file transmission method, its step comprises:
1) upgrade server generation information of upgrade file and encryption key send the deciphering PKI to third party's network management server simultaneously;
2) described third party's network management server and described updating client connect, and described client information of upgrade file, upgrade server address and deciphering PKI are sent to described updating client;
3) described updating client sends upgrade request to upgrade server, connect according to described upgrade server address and described upgrade server, obtain differential file on the upgrade server according to described client information of upgrade file, decrypt check value according to described deciphering PKI, transfer files is finished upgrading after the verification succeeds.
2. embedded upgrade file transmission method as claimed in claim 1 also comprises, described updating client restores the upgraded edition presents as follows with the differential file and the local version that receive:
Described updating client at first reads the version information of the starting block of differential file, if current version, then according to the first address of piece and block length from current version file copy data to original also; Secondly, if upgrade version, then according to its block length, copy data is to going back original from differential file; At last, reduce each piece successively, finish up to differential file.
3. embedded upgrade file transmission method as claimed in claim 2 is characterized in that, compares the check code of described also original and the check code after the deciphering as follows:
1) client is utilized the cryptographic check sign indicating number that the PKI deciphering receives, and selects hash function to calculate the also hashed value of original;
2) whether the check code after the comparison deciphering is consistent with hashed value, if identical, then file transmission information is complete, and file transmit leg identity is safety;
3) if inequality, the supporting paper transmission is wrong, and file transmits again.
4. embedded upgrade file transmission method as claimed in claim 3 is characterized in that, described hash function is MD5, SHA.
5. embedded upgrade file transmission method as claimed in claim 1, it is characterized in that, the generation method of described differential file is: in upgrade server, upgraded edition presents in the information of upgrade file is one with several bytes and is divided into some, and block-by-block and the comparison of current version file.
6. embedded upgrade file transmission method as claimed in claim 5 is characterized in that described comparison method is:
1) calculates weak hash value and the strong hash value of each piece, and save as the Hash table respectively;
2) comparison current version character block and the preceding several characters that upgrade the version character block, if coupling, then compare its weak hash value and strong hash value successively, if all mate, then preserve the current version character block at first address, block length and the version flag of current version file in differential file;
3) if upgrade the piece that the version character block can not find coupling, then preserve the content of the length, version flag and this piece that upgrade the version character block in differential file.
7. embedded upgrade file transmission method as claimed in claim 1 is characterized in that, described encryption and/or decruption key are RSA or ECC private key and/or the PKIs that produces by random fashion.
8. embedded upgrade file transmission method as claimed in claim 1 is characterized in that, described upgrade server address is set up TCP with described upgrade server and is connected.
9. embedded upgrade file transmission method as claimed in claim 1 is characterized in that, described third party's network management server and described updating client are according to the concurrent carry information that establishes a communications link of the network management system by safety identification authentication.
10. embedded upgrade file transmission method as claimed in claim 9 is characterized in that, described transmission information via DES, AES cryptographic algorithm are encrypted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310195579.7A CN103297429B (en) | 2013-05-23 | 2013-05-23 | A kind of embedded upgrade file transmission method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310195579.7A CN103297429B (en) | 2013-05-23 | 2013-05-23 | A kind of embedded upgrade file transmission method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103297429A true CN103297429A (en) | 2013-09-11 |
CN103297429B CN103297429B (en) | 2016-12-28 |
Family
ID=49097749
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310195579.7A Expired - Fee Related CN103297429B (en) | 2013-05-23 | 2013-05-23 | A kind of embedded upgrade file transmission method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103297429B (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103546576A (en) * | 2013-10-31 | 2014-01-29 | 中安消技术有限公司 | Remote automatic updating method and system of embedded equipment |
CN103617215A (en) * | 2013-11-20 | 2014-03-05 | 上海爱数软件有限公司 | Method for generating multi-version files by aid of data difference algorithm |
CN104052818A (en) * | 2014-06-27 | 2014-09-17 | 青岛海信移动通信技术股份有限公司 | Version upgrade method and device for mobile terminal |
CN104980410A (en) * | 2014-04-14 | 2015-10-14 | 领步科技集团有限公司 | Encryption method for remote upgrading of power quality on-line monitoring equipment software |
CN106685717A (en) * | 2016-12-29 | 2017-05-17 | 深圳前海勇艺达机器人有限公司 | Updating method and device for intelligent terminal |
CN107040532A (en) * | 2017-04-05 | 2017-08-11 | 成都爱途享科技有限公司 | The data assessment device that a kind of use is verified in check code |
CN107223322A (en) * | 2017-04-25 | 2017-09-29 | 深圳市汇顶科技股份有限公司 | The method, apparatus and system of signature verification |
CN107580070A (en) * | 2017-09-27 | 2018-01-12 | 威创集团股份有限公司 | A kind of method, system and the relevant apparatus of the transmission of computer remote file |
CN108199827A (en) * | 2018-01-09 | 2018-06-22 | 武汉斗鱼网络科技有限公司 | Client code integrity checking method, storage medium, electronic equipment and system |
CN109358883A (en) * | 2018-11-05 | 2019-02-19 | 珠海格力电器股份有限公司 | Program upgrading method, system, application system and storage medium |
CN109977674A (en) * | 2017-12-28 | 2019-07-05 | 航天信息股份有限公司 | The method for upgrading software and device of embedded device |
CN110879713A (en) * | 2018-09-06 | 2020-03-13 | 山东华软金盾软件股份有限公司 | Android-end strong encryption plug-in hot update management method |
CN111880829A (en) * | 2020-08-06 | 2020-11-03 | 武汉众邦银行股份有限公司 | Distributed application file synchronization method based on Linux |
CN113204366A (en) * | 2021-06-02 | 2021-08-03 | 上海酒贝乐信息技术有限公司 | Remote upgrading method for intelligent wine selling machine system |
CN113741943A (en) * | 2021-11-08 | 2021-12-03 | 湘投云储科技有限公司 | Embedded equipment program upgrading system and method |
CN114422570A (en) * | 2021-12-31 | 2022-04-29 | 深圳市联软科技股份有限公司 | Cross-platform multi-module communication method and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101557308A (en) * | 2009-05-06 | 2009-10-14 | 成都市华为赛门铁克科技有限公司 | File upgrading method and terminal device |
CN101951391A (en) * | 2010-04-13 | 2011-01-19 | 杭州海康威视系统技术有限公司 | Method, device and system for remotely upgrading monitoring equipment |
CN102955700A (en) * | 2011-08-18 | 2013-03-06 | 腾讯科技(深圳)有限公司 | System and method for upgrading software |
-
2013
- 2013-05-23 CN CN201310195579.7A patent/CN103297429B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101557308A (en) * | 2009-05-06 | 2009-10-14 | 成都市华为赛门铁克科技有限公司 | File upgrading method and terminal device |
CN101951391A (en) * | 2010-04-13 | 2011-01-19 | 杭州海康威视系统技术有限公司 | Method, device and system for remotely upgrading monitoring equipment |
CN102955700A (en) * | 2011-08-18 | 2013-03-06 | 腾讯科技(深圳)有限公司 | System and method for upgrading software |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103546576B (en) * | 2013-10-31 | 2017-08-11 | 中安消技术有限公司 | A kind of embedded device remote automatic upgrading method and system |
CN103546576A (en) * | 2013-10-31 | 2014-01-29 | 中安消技术有限公司 | Remote automatic updating method and system of embedded equipment |
CN103617215B (en) * | 2013-11-20 | 2017-02-08 | 上海爱数信息技术股份有限公司 | Method for generating multi-version files by aid of data difference algorithm |
CN103617215A (en) * | 2013-11-20 | 2014-03-05 | 上海爱数软件有限公司 | Method for generating multi-version files by aid of data difference algorithm |
CN104980410A (en) * | 2014-04-14 | 2015-10-14 | 领步科技集团有限公司 | Encryption method for remote upgrading of power quality on-line monitoring equipment software |
CN104052818B (en) * | 2014-06-27 | 2017-07-11 | 青岛海信移动通信技术股份有限公司 | The version upgrading method and device of a kind of mobile terminal |
CN104052818A (en) * | 2014-06-27 | 2014-09-17 | 青岛海信移动通信技术股份有限公司 | Version upgrade method and device for mobile terminal |
CN106685717A (en) * | 2016-12-29 | 2017-05-17 | 深圳前海勇艺达机器人有限公司 | Updating method and device for intelligent terminal |
CN107040532A (en) * | 2017-04-05 | 2017-08-11 | 成都爱途享科技有限公司 | The data assessment device that a kind of use is verified in check code |
CN107040532B (en) * | 2017-04-05 | 2020-11-03 | 成都爱途享科技有限公司 | Data evaluation device using verification code for verification |
CN107223322A (en) * | 2017-04-25 | 2017-09-29 | 深圳市汇顶科技股份有限公司 | The method, apparatus and system of signature verification |
CN107223322B (en) * | 2017-04-25 | 2020-07-24 | 深圳市汇顶科技股份有限公司 | Signature verification method, device and system |
CN107580070A (en) * | 2017-09-27 | 2018-01-12 | 威创集团股份有限公司 | A kind of method, system and the relevant apparatus of the transmission of computer remote file |
CN109977674A (en) * | 2017-12-28 | 2019-07-05 | 航天信息股份有限公司 | The method for upgrading software and device of embedded device |
CN108199827A (en) * | 2018-01-09 | 2018-06-22 | 武汉斗鱼网络科技有限公司 | Client code integrity checking method, storage medium, electronic equipment and system |
CN110879713A (en) * | 2018-09-06 | 2020-03-13 | 山东华软金盾软件股份有限公司 | Android-end strong encryption plug-in hot update management method |
CN109358883A (en) * | 2018-11-05 | 2019-02-19 | 珠海格力电器股份有限公司 | Program upgrading method, system, application system and storage medium |
CN109358883B (en) * | 2018-11-05 | 2021-12-24 | 珠海格力电器股份有限公司 | Program upgrading method, system, application system and storage medium |
CN111880829A (en) * | 2020-08-06 | 2020-11-03 | 武汉众邦银行股份有限公司 | Distributed application file synchronization method based on Linux |
CN113204366A (en) * | 2021-06-02 | 2021-08-03 | 上海酒贝乐信息技术有限公司 | Remote upgrading method for intelligent wine selling machine system |
CN113741943A (en) * | 2021-11-08 | 2021-12-03 | 湘投云储科技有限公司 | Embedded equipment program upgrading system and method |
CN113741943B (en) * | 2021-11-08 | 2022-03-18 | 湘投云储科技有限公司 | Embedded equipment program upgrading system and method |
CN114422570A (en) * | 2021-12-31 | 2022-04-29 | 深圳市联软科技股份有限公司 | Cross-platform multi-module communication method and system |
CN114422570B (en) * | 2021-12-31 | 2024-05-14 | 深圳市联软科技股份有限公司 | Cross-platform multi-module communication method and system |
Also Published As
Publication number | Publication date |
---|---|
CN103297429B (en) | 2016-12-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103297429A (en) | Embedded upgrading file transmission method | |
CN106656476B (en) | Password protection method and device and computer readable storage medium | |
CN103067401B (en) | Method and system for key protection | |
CN111447276B (en) | Encryption continuous transmission method with key agreement function | |
CN110048849B (en) | Multi-layer protection session key negotiation method | |
CN113099443A (en) | Equipment authentication method, device, equipment and system | |
CN111435913A (en) | Identity authentication method and device for terminal of Internet of things and storage medium | |
CN111404664B (en) | Quantum secret communication identity authentication system and method based on secret sharing and multiple mobile devices | |
CN113630248B (en) | Session key negotiation method | |
CN113612610B (en) | Session key negotiation method | |
CN103546421A (en) | Network work communication security and secrecy system on basis of PKI (public key infrastructure) technology and method for implementing network work communication security and secrecy system | |
CN112865965B (en) | Train service data processing method and system based on quantum key | |
CN110362984B (en) | Method and device for operating service system by multiple devices | |
CN111914291A (en) | Message processing method, device, equipment and storage medium | |
CN112202773B (en) | Computer network information security monitoring and protection system based on internet | |
CN114584306B (en) | Data processing method and related device | |
CN109729000B (en) | Instant messaging method and device | |
CN112765626A (en) | Authorization signature method, device and system based on escrow key and storage medium | |
CN109726578A (en) | A kind of anti-fake solution of novel dynamic two-dimension code | |
CN112270020A (en) | Terminal equipment safety encryption device based on safety chip | |
CN112202556A (en) | Security authentication method, device and system | |
CN102118311A (en) | Data transmission method | |
CN115333732A (en) | Anti-cloning structure and method for Internet of things equipment | |
CN115174071A (en) | Safe transmission method and system for remote upgrading scene of train-mounted software | |
CN114745115A (en) | Information transmission method and device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20161228 Termination date: 20210523 |
|
CF01 | Termination of patent right due to non-payment of annual fee |