CN104426649A - Automatic secret key synchronization method and system, and secret key management platform - Google Patents
Automatic secret key synchronization method and system, and secret key management platform Download PDFInfo
- Publication number
- CN104426649A CN104426649A CN201310368619.3A CN201310368619A CN104426649A CN 104426649 A CN104426649 A CN 104426649A CN 201310368619 A CN201310368619 A CN 201310368619A CN 104426649 A CN104426649 A CN 104426649A
- Authority
- CN
- China
- Prior art keywords
- key
- terminal
- mdn
- management platform
- secret key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses an automatic secret key synchronization method and system, and a secret key management platform, and belongs to the field of communications. Secret key information is introduced to a secret key management platform through a terminal manufacturer, a terminal user initiates a service opening registration process to register an MDN and application identification to the secret key management platform, and the secret key management platform, based on a secret key synchronization request initiated by a terminal, establishes a binding relation among the MDN, the application identification, a secret key identification and a secret key and synchronizes the MDN, the secret key identification and the secret key to corresponding application platforms. According to the invention, a secret key automatic synchronization scheme is realized, the problems of long process, low efficiency and the like which are caused by users' intervention in synchronization of the secret key can be avoided, the secret key synchronization process is simplified, and the secret key synchronization efficiency is improved. Besides, the secret key management platform automatically synchronizes the terminal secret key so as to replace medium transmission and realize unified management of the secret key.
Description
Technical field
The present invention relates to the communications field, particularly a kind of method and system of automatic synchronization key and key management platform.
Background technology
Based on the M2M(Machine-to-Machine of hardware encipher, Machine To Machine) terminal, generally need, before terminal is dispatched from the factory, M2M terminal inner is entered in key information programming.Key information comprises encryption key, and for identifying the unique number of this key: key ID.
Before terminal formally uses, need to configure same key information in the application platform side of correspondence, to ensure that terminal and application platform can realize coded communication.
The common cipher key configuration mode in application platform side is: before terminal comes into operation, and cipher key related information corresponding for terminal is transmitted medium with CD etc. by keeper, is entered in corresponding application platform, thus realizes the synchronous of key by the mode of manual typing.
There is following problem in existing key synchronization scheme:
1, complicated operation: use the media such as CD, by manual typing, complex operation, complexity, efficiency is on the low side.
2, fail safe is low: terminal, may through distributing layer by layer before final deployment, and terminal and the key file matched with it circulates ability of taking turns in end user's hand more in circulation, thus the danger causing key information to have revealing in advance.
Summary of the invention
An embodiment of the present invention technical problem to be solved is: solve existing manual keying method of synchronization complex operation, problem that efficiency is on the low side.
The embodiment of the present invention another technical problem to be solved is: solve the problem that the fail safe of existing key synchronization mode is low.
An aspect of the embodiment of the present invention proposes a kind of method of automatic synchronization key, comprise: key management platform response is in the import operation of manufacturer terminal to the key information in hardware encipher terminal, key information in storage hardware ciphering terminal, this key information comprises key identification and key; The service fulfillment registration request that key management platform response is initiated in terminal use, storage service opens the Mobile Directory Number MDN and application identities that carry in registration request; The key synchronization request that key management platform response is initiated in hardware encipher terminal, the key identification carried according to key synchronization request and MDN, set up the binding relationship between MDN, application identities, key identification and key; Key management platform by the MDN in binding relationship, key identification and key synchronization to the application platform corresponding to the application identities in this binding relationship.
Manufacturer terminal can perform import operation to the key information in hardware encipher terminal before hardware encipher terminal is dispatched from the factory.
Hardware encipher terminal can initiate key synchronization request by note, so that the MDN that request recipient is used by note acquisition hardware encipher terminal.
Key management platform can by encrypted tunnel by the MDN in binding relationship, key identification and key synchronization to the application platform corresponding to the application identities in this binding relationship.
Wherein, key information comprises one or more groups key identification and key, the application that different keys can be corresponding different.When key information comprises many group keys mark and key, the key synchronization request that hardware encipher terminal is initiated also carries application identities, so that the key information of this application correspondence is synchronized to application platform by key management platform.
Another aspect of the embodiment of the present invention proposes a kind of key management platform, comprise: the first memory cell, for in response to the import operation of manufacturer terminal to the key information in hardware encipher terminal, the key information in storage hardware ciphering terminal, this key information comprises key identification and key; Second memory cell, for the service fulfillment registration request of initiating in response to terminal use, storage service opens the Mobile Directory Number MDN and application identities that carry in registration request; Binding relationship sets up unit, and for the key synchronization request initiated in response to hardware encipher terminal, the key identification carried according to key synchronization request and MDN, set up the binding relationship between MDN, application identities, key identification and key; Information synchronizing unit, for by the MDN in binding relationship, key identification and key synchronization to the application platform corresponding to the application identities in this binding relationship.
Information synchronizing unit, specifically to may be used for the MDN in binding relationship, key identification and key synchronization by encrypted tunnel to the application platform corresponding to the application identities in this binding relationship.
Another aspect of the embodiment of the present invention proposes a kind of system of automatic synchronization key, comprising: aforesaid key management platform.
This system also comprises hardware encipher terminal, and hardware encipher terminal initiates key synchronization request by note, so that the MDN that key management platform is used by note acquisition hardware encipher terminal.
The present invention has following beneficial effect:
First, manufacturer terminal is by key information importing secret key management platform, terminal use initiates service fulfillment register flow path, MDN and application identities are registered to key management platform, the key synchronization request that key management platform is initiated based on terminal, set up MDN, application identities, binding relationship between key identification and key, and by MDN, key identification and key synchronization are to corresponding application platform, achieve a kind of automatic synchronization scheme of key, avoid the long flow path that user's direct intervention key synchronization causes, the problems such as efficiency is low, simplify key synchronization process, improve key synchronization efficiency.Further, key management platform automatic synchronization terminal key, to replace medium transmission, can realize the unified management to key.
Secondly, before terminal is dispatched from the factory, key information is imported to unified key management platform, avoid key to propagate under the environment that safety is not controlled; Further, MDN can be obtained easily by note and verification terminal SIM/UIM card authenticity and by measures such as encrypted tunnel transmission security keys according to this, all can strengthen the fail safe of whole synchronizing process.
Again, key information can have many groups, can distinguish corresponding different application, according to different application, corresponding key information can be synchronized to different application platforms, can be suitable for the situation that multiple business needs key synchronization in key synchronization process.
Finally, using terminal SIM/UIM card information as determining the key message that terminal applies is bound, enhancing key management and synchronous operating flexibility, facilitating operation management.
By referring to the detailed description of accompanying drawing to exemplary embodiment of the present invention, further feature of the present invention and advantage thereof will become clear.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of a method embodiment of the automatic synchronization key that the present invention proposes.
Fig. 2 is the information interaction figure of a method embodiment of the automatic synchronization key that the present invention proposes.
Fig. 3 is the structural representation of a key management platform of the present invention embodiment.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Illustrative to the description only actually of at least one exemplary embodiment below, never as any restriction to the present invention and application or use.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
The complicated operation existed in view of existing manual keying synchronization scenario, the problem that efficiency is on the low side, and terminal and the key file that matches with it shift to an earlier date disclosure risk at the intermediate links key caused that circulates before terminal is finally disposed, the present invention proposes a kind of automatic synchronization cipher key scheme, go for such as mobile communications network environment, the problem such as can solve complicated operation that prior art exists, efficiency is on the low side and fail safe is low.The following detailed description of the solution of the present invention.
Fig. 1 is the schematic flow sheet of a method embodiment of the automatic synchronization key that the present invention proposes.
As shown in Figure 1, the method for the automatic synchronization key of the present embodiment comprises the following steps:
S101, key management platform response is in the import operation of manufacturer terminal to the key information in hardware encipher terminal, and the key information in storage hardware ciphering terminal, wherein, this key information comprises key identification (as key ID) and key.
It should be noted that, manufacturer terminal can perform import operation to the key information in hardware encipher terminal before hardware encipher terminal is dispatched from the factory, and to avoid key to propagate under the environment that safety is not controlled as far as possible, improves the fail safe of key synchronization.
Hardware encipher terminal can be such as M2M terminal, but is not limited thereto.
S102, the service fulfillment registration request that key management platform response is initiated in terminal use, storage service opens the MDN(Mobile Directory Number carried in registration request, Mobile Directory Number) and application identities.
Wherein, MDN can be SIM(Subscriber Identity Module, client identification module) card or UIM(User Identity Module, subscriber identification module) number that blocks.
S103, the key synchronization request that key management platform response is initiated in hardware encipher terminal, the key identification carried according to key synchronization request and MDN, set up the binding relationship between MDN, application identities, key identification and key.
Wherein, hardware encipher terminal can initiate key synchronization request by note, and such key management platform just can know by note the MDN that terminal uses, without the need to additionally carrying this information in synchronization request.
In binding relationship process of establishing, the key information that the key identification that key management platform is carried by key synchronization request can import from manufacturer terminal is finding corresponding key, and by application identities that the MDN that key synchronization request is carried finds registration process to store, thus these four information MDN, application identities, key identification and cipher key associated are got up, and set up binding relationship.
After the key synchronization request receiving the initiation of hardware encipher terminal, before setting up binding relationship, key management platform can also carry MDN according to key synchronization request and carry out legitimate verification to terminal, checking content can be such as the regulation whether inspection MDN meets relevant criterion, this MDN whether can also be stored according to key management platform, whether be chartered terminal to check this terminal, if store this MDN, illustrate that this terminal had carried out the registration process of above-mentioned steps S102.Only have registered terminal, key management platform just can carry out binding and follow-up synchronizing process.
S104, key management platform by the MDN in binding relationship, key identification and key synchronization to the application platform corresponding to the application identities in this binding relationship.
Particularly, key management platform just can find corresponding binding relationship record according to the key identification in synchronization request or MDN, just can determine to need synchronous application platform according to application identities in binding relationship record, then by the MDN in binding relationship record, key identification and key synchronization to this application platform, complete synchronizing process.
It should be noted that, in order to strengthen the fail safe of whole synchronizing process, key management platform can by encrypted tunnel by the MDN in binding relationship, key identification and key synchronization to the application platform corresponding to the application identities in this binding relationship.Wherein, encrypted tunnel such as can adopt SSH(Secure Shell Protocol, safety shell protocol) encrypted tunnel, also the key consulted in advance between key management platform and application platform and cryptographic algorithm can be adopted to be encrypted, and different encrypted tunnels can be adopted between key management platform and different application platforms.
In order to make the scheme of Fig. 1 clearly, Fig. 2 shows the information interaction figure of a method embodiment of the automatic synchronization key that the present invention proposes, and solution details with reference to S101 ~ S104, only simply can describe with regard to committed step here.
As shown in Figure 2, the method for the automatic synchronization key of the present embodiment comprises the following steps:
S201, the key information in hardware encipher terminal is imported to key management platform by manufacturer terminal before hardware encipher terminal is dispatched from the factory, and carries out unified management by key management platform.Wherein, this key information comprises key identification (as key ID) and key.
S202, before hardware encipher terminal is enabled, terminal use carries out service fulfillment registration to key management platform, sends service fulfillment registration request, carry MDN and application identities in service fulfillment registration request to key management platform.The service fulfillment registration request that key management platform response is initiated in terminal use, storage service opens the MDN and application identities that carry in registration request.
S203, hardware encipher terminal initiates key synchronization request to key management platform, and MDN and key identification are carried in this key synchronization request.
If hardware encipher terminal initiates key synchronization request by note to key management platform, then this key synchronization request is without the need to additionally carrying MDN, only carries key identification, and key management platform can obtain the MDN information of terminal by note.
S204, key management platform carries MDN according to key synchronization request and carries out legitimate verification to terminal, after being verified, the key identification carried according to key synchronization request and MDN, set up the binding relationship between MDN, application identities, key identification and key.
S205, key management platform by encrypted tunnel by the MDN in binding relationship, key identification and key synchronization to the application platform corresponding to the application identities in this binding relationship, complete synchronizing process.
Key management platform when terminal uses automatically by terminal key distribution of information to corresponding application platform, the scene needs could determining terminal and application corresponding relation when the project implementation can be met, especially can be suitable in the hardware chip encryption mode that terminal integrating third-party provides.
It should be noted that, key information involved in the present invention can comprise one or more groups key identification and key, the application that different keys can be corresponding different.Synchronizing process when only comprising a group key mark and key can reference diagram 1 and embodiment illustrated in fig. 2.
Synchronizing process when key information comprises many group keys mark and key can comprise the following steps:
S301, the key information in hardware encipher terminal is imported to key management platform by manufacturer terminal before hardware encipher terminal is dispatched from the factory, and carries out unified management by key management platform.Wherein, this key information comprises many group keys mark (as key ID) and key.
S302, before hardware encipher terminal is enabled, terminal use carries out service fulfillment registration to key management platform, repeatedly registration process can be initiated for different business, send service fulfillment registration request to key management platform during each registration, in service fulfillment registration request, carry MDN and application identities.Key management platform store M DN and application identities.When the user of same hardware encipher terminal initiates repeatedly to register, key management platform stores multiple application identities for a MDN.
S303, hardware encipher terminal initiates key synchronization request to key management platform, this key synchronization request is except carrying MDN, key identification, also carry application identities, so that in conjunction with MDN and application identities, key management platform determines that key information corresponding to key identification and which bar log-on message are bound.
S304, key management platform carries MDN according to key synchronization request and carries out legitimate verification to terminal, after being verified, according to key identification, MDN and application identities that key synchronization request is carried, set up the binding relationship between MDN, application identities, key identification and key.
S305, key management platform by encrypted tunnel by the MDN in binding relationship, key identification and key synchronization to the application platform corresponding to the application identities in this binding relationship, complete synchronizing process.
The present invention also proposes a kind of system of automatic synchronization key, comprising: key management platform, hardware encipher terminal, application platform.
Wherein, as shown in Figure 3, key management platform comprises:
First memory cell 401, in response to the import operation of manufacturer terminal to the key information in hardware encipher terminal, the key information in storage hardware ciphering terminal, this key information comprises key identification and key;
Second memory cell 402, for the service fulfillment registration request of initiating in response to terminal use, storage service opens the Mobile Directory Number MDN and application identities that carry in registration request;
Binding relationship sets up unit 403, and for the key synchronization request initiated in response to hardware encipher terminal, the key identification carried according to key synchronization request and MDN, set up the binding relationship between MDN, application identities, key identification and key;
Information synchronizing unit 404, for by the MDN in binding relationship, key identification and key synchronization to the application platform corresponding to the application identities in this binding relationship.
In one implementation, information synchronizing unit 404, specifically to may be used for the MDN in binding relationship, key identification and key synchronization by encrypted tunnel to the application platform corresponding to the application identities in this binding relationship.
Wherein, hardware encipher terminal can initiate key synchronization request by note, so that the MDN that key management platform is used by note acquisition hardware encipher terminal.
In addition, key information can be used for comprising one or more groups key identification and key, the application that different keys can be corresponding different.When key information comprises many group keys mark and key, the key synchronization request that hardware encipher terminal is initiated also carries application identities, so that the key information of this application correspondence is synchronized to application platform by key management platform.
The present invention has following beneficial effect:
First, manufacturer terminal is by key information importing secret key management platform, terminal use initiates service fulfillment register flow path, MDN and application identities are registered to key management platform, the key synchronization request that key management platform is initiated based on terminal, set up MDN, application identities, binding relationship between key identification and key, and by MDN, key identification and key synchronization are to corresponding application platform, achieve a kind of automatic synchronization scheme of key, avoid the long flow path that user's direct intervention key synchronization causes, the problems such as efficiency is low, simplify key synchronization process, improve key synchronization efficiency.Further, key management platform automatic synchronization terminal key, to replace medium transmission, can realize the unified management to key.
Secondly, before terminal is dispatched from the factory, key information is imported to unified key management platform, avoid key to propagate under the environment that safety is not controlled; Further, MDN can be obtained easily by note and verification terminal SIM/UIM card authenticity and by measures such as encrypted tunnel transmission security keys according to this, all can strengthen the fail safe of whole synchronizing process.
Again, key information can have many groups, can distinguish corresponding different application, according to different application, corresponding key information can be synchronized to different application platforms, can be suitable for the situation that multiple business needs key synchronization in key synchronization process.
Finally, using terminal SIM/UIM card information as determining the key message that terminal applies is bound, enhancing key management and synchronous operating flexibility, facilitating operation management.
One of ordinary skill in the art will appreciate that all or part of step realizing above-described embodiment can have been come by hardware, the hardware that also can carry out instruction relevant by program completes, described program can be stored in a kind of computer-readable recording medium, the above-mentioned storage medium mentioned can be read-only memory, disk or CD etc.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (10)
1. a method for automatic synchronization key, comprising:
Key management platform response in the import operation of manufacturer terminal to the key information in hardware encipher terminal, the key information in storage hardware ciphering terminal, this key information comprises key identification and key;
The service fulfillment registration request that key management platform response is initiated in terminal use, storage service opens the Mobile Directory Number MDN and application identities that carry in registration request;
The key synchronization request that key management platform response is initiated in hardware encipher terminal, the key identification carried according to key synchronization request and MDN, set up the binding relationship between MDN, application identities, key identification and key;
Key management platform by the MDN in binding relationship, key identification and key synchronization to the application platform corresponding to the application identities in this binding relationship.
2. method according to claim 1, is characterized in that, manufacturer terminal performs import operation to the key information in hardware encipher terminal before hardware encipher terminal is dispatched from the factory.
3. method according to claim 1, is characterized in that, hardware encipher terminal initiates key synchronization request by note, so that the MDN that request recipient is used by note acquisition hardware encipher terminal.
4. method according to claim 1, is characterized in that, key management platform by encrypted tunnel by the MDN in binding relationship, key identification and key synchronization to the application platform corresponding to the application identities in this binding relationship.
5. method according to claim 1, is characterized in that, key information comprises one or more groups key identification and key;
When key information comprises many group keys mark and key, the key synchronization request that hardware encipher terminal is initiated also carries application identities.
6. a key management platform, comprising:
First memory cell, in response to the import operation of manufacturer terminal to the key information in hardware encipher terminal, the key information in storage hardware ciphering terminal, this key information comprises key identification and key;
Second memory cell, for the service fulfillment registration request of initiating in response to terminal use, storage service opens the Mobile Directory Number MDN and application identities that carry in registration request;
Binding relationship sets up unit, and for the key synchronization request initiated in response to hardware encipher terminal, the key identification carried according to key synchronization request and MDN, set up the binding relationship between MDN, application identities, key identification and key;
Information synchronizing unit, for by the MDN in binding relationship, key identification and key synchronization to the application platform corresponding to the application identities in this binding relationship.
7. key management platform according to claim 6, is characterized in that, information synchronizing unit, specifically for by encrypted tunnel by the MDN in binding relationship, key identification and key synchronization to the application platform corresponding to the application identities in this binding relationship.
8. a system for automatic synchronization key, comprising: the key management platform described in claim 6 or 7.
9. system according to claim 8, is characterized in that, this system also comprises hardware encipher terminal, and hardware encipher terminal initiates key synchronization request by note, so that the MDN that key management platform is used by note acquisition hardware encipher terminal.
10. system according to claim 9, is characterized in that, key information comprises one or more groups key identification and key;
When key information comprises many group keys mark and key, the key synchronization request that hardware encipher terminal is initiated also carries application identities.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310368619.3A CN104426649B (en) | 2013-08-22 | 2013-08-22 | The method and system and key management platform of automatic synchronization key |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310368619.3A CN104426649B (en) | 2013-08-22 | 2013-08-22 | The method and system and key management platform of automatic synchronization key |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104426649A true CN104426649A (en) | 2015-03-18 |
CN104426649B CN104426649B (en) | 2018-10-30 |
Family
ID=52974677
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310368619.3A Active CN104426649B (en) | 2013-08-22 | 2013-08-22 | The method and system and key management platform of automatic synchronization key |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104426649B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106067875A (en) * | 2016-05-24 | 2016-11-02 | 珠海市魅族科技有限公司 | Intelligent terminal's encryption method and system |
CN110401677A (en) * | 2019-08-23 | 2019-11-01 | RealMe重庆移动通信有限公司 | Acquisition methods, device, storage medium and the electronic equipment of digital publishing rights key |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101873588A (en) * | 2010-05-27 | 2010-10-27 | 大唐微电子技术有限公司 | Method and system for realizing service application safety |
CN101959189A (en) * | 2010-09-21 | 2011-01-26 | 中兴通讯股份有限公司 | Method and system for managing access password and basic key |
CN102026180A (en) * | 2009-09-15 | 2011-04-20 | 中国移动通信集团公司 | M2M transmission control method, device and system |
-
2013
- 2013-08-22 CN CN201310368619.3A patent/CN104426649B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102026180A (en) * | 2009-09-15 | 2011-04-20 | 中国移动通信集团公司 | M2M transmission control method, device and system |
CN101873588A (en) * | 2010-05-27 | 2010-10-27 | 大唐微电子技术有限公司 | Method and system for realizing service application safety |
CN101959189A (en) * | 2010-09-21 | 2011-01-26 | 中兴通讯股份有限公司 | Method and system for managing access password and basic key |
Non-Patent Citations (1)
Title |
---|
中国移动通信集团公司: "中国移动无线机器通信协议—M 2 M 平台与终端接口", 《中国移动通信企业标准》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106067875A (en) * | 2016-05-24 | 2016-11-02 | 珠海市魅族科技有限公司 | Intelligent terminal's encryption method and system |
CN106067875B (en) * | 2016-05-24 | 2020-04-17 | 珠海市魅族科技有限公司 | Intelligent terminal encryption method and system |
CN110401677A (en) * | 2019-08-23 | 2019-11-01 | RealMe重庆移动通信有限公司 | Acquisition methods, device, storage medium and the electronic equipment of digital publishing rights key |
Also Published As
Publication number | Publication date |
---|---|
CN104426649B (en) | 2018-10-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101777978B (en) | Method and system based on wireless terminal for applying digital certificate and wireless terminal | |
CN103329501B (en) | The method of the content on the safety element that management is connected to equipment | |
CN101583124B (en) | Authentication method and system of subscriber identity module and terminal | |
CN101406021B (en) | SIM based authentication | |
EP2622786B1 (en) | Mobile handset identification and communication authentication | |
CN108259164B (en) | Identity authentication method and equipment of Internet of things equipment | |
KR20180029695A (en) | System and method for transmitting data using block-chain | |
CN101378582B (en) | User recognizing module, authentication center, authentication method and system | |
CN103067158A (en) | Encryption and decryption method, terminal device, gateway device and key management system | |
CN101237444B (en) | Secret key processing method, system and device | |
CN104660567B (en) | D2D terminal access authentications method, D2D terminals and server | |
CN101990201B (en) | Method, system and device for generating general bootstrapping architecture (GBA) secret key | |
CN104737566A (en) | Method for incorporating subscriber identity data into a subscriber identity module | |
CN103458400A (en) | Key management method for voice encryption communication system | |
CN103886661A (en) | Entrance guard management method and system | |
CN103415010A (en) | D2D network authentication method and system | |
CN101860850B (en) | Method for realizing mobile terminal to lock network or card by utilizing driver | |
CN101132649A (en) | Network access authentication method and its USIM card | |
CN106465109A (en) | Cellular network authentication | |
CN102264068B (en) | Shared key consultation method, system, network platform and terminal | |
JP2022513134A (en) | Ensuring secure attachments in size-limited authentication protocols | |
CN101841814A (en) | Terminal authentication method and system | |
CN104994498B (en) | The method and system that a kind of terminal applies are interacted with mobile phone card application | |
EP3550765B1 (en) | Service provisioning | |
CN105873059A (en) | Joint identity authentication method and system for power distribution communication wireless private network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |