CN108174344B - GIS position information transmission encryption method and device in trunking communication - Google Patents

GIS position information transmission encryption method and device in trunking communication Download PDF

Info

Publication number
CN108174344B
CN108174344B CN201711421510.6A CN201711421510A CN108174344B CN 108174344 B CN108174344 B CN 108174344B CN 201711421510 A CN201711421510 A CN 201711421510A CN 108174344 B CN108174344 B CN 108174344B
Authority
CN
China
Prior art keywords
gis
position information
kmd
encryption
core network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711421510.6A
Other languages
Chinese (zh)
Other versions
CN108174344A (en
Inventor
段中荣
陈栖洲
李余
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu 30rtom Mobile Communication Co ltd
Original Assignee
Chengdu 30rtom Mobile Communication Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu 30rtom Mobile Communication Co ltd filed Critical Chengdu 30rtom Mobile Communication Co ltd
Priority to CN201711421510.6A priority Critical patent/CN108174344B/en
Publication of CN108174344A publication Critical patent/CN108174344A/en
Application granted granted Critical
Publication of CN108174344B publication Critical patent/CN108174344B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data

Abstract

The invention relates to the field of information processing in trunking communication, in particular to a GIS position information transmission encryption method and device in trunking communication. The core network receives the GIS position information which is encrypted once, and the GIS position information which is encrypted once is arranged in a KMD data frame format packet; the KMD analyzes and decrypts the KMD data frame format packet to obtain the GIS position information; secondly, encrypting the GIS position information for the second time; then, packaging the secondarily encrypted GIS position information according to a protocol stack format to form a core network data frame format packet, and transmitting the core network data frame format packet back to the KMD; the core network analyzes the returned core network data frame format packet to obtain secondary encrypted GIS position information; then forwarding information to a corresponding scheduling machine according to the KMS forwarded by the number of the subscriber; after the dispatching machine receives the KMD forwarding information, the KMD forwarding information is decrypted through a GIS cipher machine to obtain GIS position information; and the dispatching machine sends the GIS position information to a corresponding dispatching desk, namely a subscriber according to the number of the subscriber.

Description

GIS position information transmission encryption method and device in trunking communication
Technical Field
The invention relates to the field of information processing in trunking communication, in particular to a GIS position information transmission encryption method and device in trunking communication.
Background
The trunking communication system is a novel radio scheduling system, is developed from a simple wireless communication system, is a new system of a special scheduling wireless communication system, and is an advanced development stage of a special mobile communication system. The Chinese cluster is widely applied. GIS in trunked communication is a particular very important spatial information system, where positioning information is an important component of GIS. GIS positioning information has wide application in vehicle positioning, equipment positioning, personnel positioning and other aspects, especially is important for encryption protection in the fields of public safety, emergency, large-scale gathering, terrorist attack and the like, but currently, few GIS positioning information for a large batch of multiple devices is subjected to security encryption protection. The cryptographic technology is the core for ensuring the secure communication, and not only requires data encryption on a communication channel, but also authentication of the terminal identity and distribution of a secret key.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the GIS position information transmission encryption method and device in the trunking communication are provided for solving the problems that in the prior art, when a plurality of subscribers subscribe a plurality of GIS position information, a GIS reporting terminal does not know who the subscribers belong, and a one-to-one encryption and decryption mode cannot be formed because the GIS reporting terminal does not have the subscriber number. The GIS reporting terminal encrypts the GIS position information once through the TF card crypto-machine and then sends the GIS position information to the KMD through the core network, the KMD has a key of the GIS reporting terminal to decrypt the GIS position information and a key of the subscriber, and at the moment, the GIS position information is encrypted twice through the key of the subscriber and then sent to the subscriber after passing through the core network and the dispatcher. Because all the GIS report terminals and the keys of the subscribers exist in the KMD, the problem that a plurality of subscribers subscribe a plurality of GIS position information can be solved.
The technical scheme adopted by the invention is as follows:
a GIS position information transmission encryption method in trunking communication comprises the following steps:
step 1: the core network receives the GIS position information which is encrypted once, and the GIS position information which is encrypted once is arranged in a KMD data frame format packet;
step 2: the KMD analyzes and decrypts the KMD data frame format packet to obtain the GIS position information; secondly, encrypting the GIS position information for the second time; then, packaging the secondarily encrypted GIS position information according to a protocol stack format to form a core network data frame format packet, and transmitting the core network data frame format packet back to the KMD;
and step 3: the core network analyzes the returned core network data frame format packet to obtain secondary encrypted GIS position information; then forwarding information to a corresponding scheduling machine according to the KMS forwarded by the number of the subscriber;
step 4, after the dispatching machine receives the KMD forwarding information, the KMD forwarding information is decrypted through a GIS cipher machine to obtain GIS position information; and sending the GIS position information to a corresponding dispatching desk, namely the subscriber according to the subscriber number.
Further, the password resource injection device acquires an encryption and decryption key of the password security management device, and presets the encryption and decryption key on the GIS password machine, the password module and the KMD, wherein the GIS report terminal and the KMD preset an encryption key and a decryption key; the GIS cipher machine and the KMD preset secondary encryption and decryption keys; the primary encryption key is different from the secondary encryption key, and the decryption keys corresponding to the primary encryption key and the secondary encryption key are also different (for example, the primary encryption key is a key of a GIS (geographic information system) reporting terminal, and the secondary encryption key is a GIS key of a subscriber).
Further, the protocol format between the core network and the KMD at least comprises a protocol header number + information data + destination address; the KMD data frame format packet at least comprises a protocol header number, primary encrypted GIS position information and a destination address; the core network data frame format packet at least comprises a protocol head number, GIS position information of secondary encryption and a destination address; the protocol head number is the identification code of the reporting party, and the destination address is the number of the subscribing party.
Further, the KMD analyzes and decrypts the KMD data frame format packet to obtain the GIS position information, specifically, the KMD data frame format packet is analyzed, and the GIS position information encrypted once is decrypted by a decryption key to obtain the GIS position information; the decryption key is a decryption key that corresponds to the primary encryption key to form a home decryption key pair.
Further, the decryption key of the twice-encrypted GIS location information is a decryption key that forms an encryption/decryption key pair corresponding to the encryption key of the twice-encrypted GIS location information.
Furthermore, the primary encrypted GIS position information is encrypted through a cryptographic module embedded in the GIS reporting terminal, and the primary encrypted GIS position information is reported through the GIS reporting terminal.
Further, the cryptographic module is a TF card cryptographic machine; the TF card cipher machine is installed in a TF card slot inside the GIS reporting terminal in a compression joint mode, and encryption information interaction is carried out between the TF card cipher machine and the GIS reporting terminal through an SDIO serial interface, so that encryption and decryption processing of GIS position information services of the GIS reporting terminal is achieved.
Furthermore, the KMD performs information interaction with a GIS reporting terminal through a core network through a network interface, so as to realize online distribution and management of password resources in the trunking communication system.
The encryption device based on the encryption method comprises the following steps:
the core network is used for receiving the GIS position information encrypted once, embedding the GIS position information encrypted once in a KMD data frame format packet, and uploading the information to the KMD for decryption; analyzing the returned core network data frame format packet to obtain secondary encrypted GIS position information; then forwarding information to a corresponding scheduling machine according to the KMS forwarded by the number of the subscriber;
the KMD is used for analyzing and decrypting the KMD data frame format packet to obtain the GIS position information; secondly, encrypting the GIS position information for the second time; then, packaging the secondarily encrypted GIS position information according to a protocol stack format to form a core network data frame format packet, and transmitting the core network data frame format packet back to the KMD;
after the dispatching machine receives the KMD forwarding information, the KMD forwarding information is decrypted through a GIS cipher machine to obtain GIS position information; and sending the GIS position information to the corresponding subscriber according to the subscriber number.
In summary, due to the adoption of the technical scheme, the invention has the beneficial effects that:
the invention carries out transmission encryption based on GIS positioning information in a cluster communication system, provides confidentiality and integrity protection for the mass GIS positioning information transmission of multiple devices, prevents interception and decryption, and ensures the safety of information transmission.
And the GIS reporting terminal reports GIS positioning information at certain time intervals, and a dispatching desk on the dispatching machine is a subscriber of the GIS position information. When a plurality of subscribers exist, the GIS reporting terminal does not know the number of the subscribers, so the GIS reporting terminal is adopted in an encryption mode to encrypt GIS position information and report the position information to a core network through a TF card encryptor (cipher module), the core network transmits the corresponding GIS position information and the number of the subscribers to a KMD according to the subscription condition, a protocol header number fills the number of the reporting party, a destination address fills the number of the subscribers, the KMD decrypts the GIS position information encrypted once through a key of the GIS reporting terminal, the GIS position information is encrypted secondarily through a subscriber key and then is sent to a GIS cipher machine where the subscribers are located through the core network and a dispatcher, and the GIS cipher machine decrypts the GIS position information and then forwards the plaintext GIS position information to the dispatcher through the dispatcher, namely the dispatching machine is sent to the subscribers.
Drawings
The invention will now be described, by way of example, with reference to the accompanying drawings, in which:
fig. 1 is a schematic block diagram of the present invention.
Detailed Description
All of the features disclosed in this specification, or all of the steps in any method or process so disclosed, may be combined in any combination, except combinations of features and/or steps that are mutually exclusive.
Any feature disclosed in this specification may be replaced by alternative features serving equivalent or similar purposes, unless expressly stated otherwise. That is, unless expressly stated otherwise, each feature is only an example of a generic series of equivalent or similar features.
Description of the invention:
1. the GIS position Information refers to target positioning Information based on GIS (Geographic Information System).
2. KMD refers to a cryptographic resource management device: the equipment for managing the password resources is realized by running a software program on a processor. The method mainly completes KMD data frame format packet analysis, primary decryption and secondary encryption;
TF card crypto machine (crypto module): the GIS reporting terminal is a hardware device which is matched with the GIS reporting terminal to complete functions of encryption, decryption and the like.
GIS cipher machine: hardware devices capable of performing cryptographic functions.
And reporting the terminal by the GIS: the mobile terminal is a hardware device which acquires the position information and reports the position information.
The function of the dispatching machine is as follows: and the communication equipment is responsible for communication and displaying GIS position information.
A core network: and the network is responsible for communication, data forwarding and the like.
The subscriber is: is application software installed on the dispatcher; the acquisition of GIS location information and the like can be required.
3. The invention comprises password equipment such as a TF card password machine (password module), a GIS password machine, password resource management equipment (KMD) and the like, and also comprises a GIS reporting terminal, a scheduling machine and a core network; and the transmission safety of GIS encryption is ensured from the perspective of password safety.
The working principle is as follows: the GIS reporting terminal firstly encrypts GIS position information by a key of a built-in TF card encryption machine for the first time, the GIS position information encrypted for the first time is forwarded to the KMD through a core network, after the KMD reports the key decryption information of the terminal by the GIS, the key of a receiver of the GIS encryption machine is used for the secondary encryption of the GIS position information, the information is forwarded to the GIS encryption machine (receiver) through the core network, the GIS encryption machine decrypts the GIS position information encrypted for the second time by the self key, the decrypted GIS position information is forwarded to the dispatching machine, and the dispatching machine is forwarded to a dispatching desk (GIS subscriber).
The KMD carries out information interaction with managed password equipment (a GIS reporting terminal and a password module in the GIS reporting terminal) through a network interface through a core network (a trunking communication system) so as to realize online distribution and management of password resources of a configuration password machine in the trunking communication system. The cipher module (TF card encryption machine) is in an embedded module and is embedded into the communication terminal. The GIS cipher machine carries out information direct interaction with the core network through the network interface, and sends the subscriber number to the core network, so as to decrypt the GIS positioning information service. And after the TF card cipher machine (cipher module) and the GIS cipher machine are respectively bidirectionally authenticated with the KMD, relevant encryption business processing is carried out.
And acquiring a secret key of the password guarantee management equipment through the password resource injection equipment, and performing the primary and secondary encryption and decryption secret key prefabrication on the GIS password machine, the password module and the KMD. The KMD directly interacts with the password module and the GIS password machine to perform online key replacement and destruction management, so that online distribution management of password resources such as online password machine management and regular key replacement is realized.
The encryption process and processing schematic diagram of GIS positioning information is shown in fig. 1, and specifically includes:
(1) the GIS reporting terminal calls a TF cipher machine to encrypt GIS position information at one time;
(2) the GIS reporting terminal transmits the GIS position information after the primary encryption to a core network through a wireless network;
(3) the core network packages the GIS position information, the GIS reporting party and the number of a subscriber (dispatching desk) into a KMD data frame format packet and then sends the KMD data frame format packet to the core network;
(4) the KMD correctly analyzes the KMD data frame format packet according to a specified protocol format to obtain primary encrypted GIS position information, decrypts the GIS position information through a corresponding decryption key to obtain plaintext GI position information, secondarily encrypts the GIS position information by using a GIS key of a subscriber (a dispatching desk), and then forms a core network data frame format packet with the encrypted GIS position information to be transmitted back to a core network;
the core network analyzes the data frame format packet of the core network to obtain GIS position information after secondary encryption and forwards the GIS position information to the dispatching machine;
(5) and the scheduling machine calls the GIS cipher machine to decrypt the GIS position information encrypted secondarily to obtain the GIS position information.
(6) The dispatcher forwards the decrypted GIS position information to a subscriber (dispatching desk).
The invention is not limited to the foregoing embodiments. The invention extends to any novel feature or any novel combination of features disclosed in this specification and any novel method or process steps or any novel combination of features disclosed.

Claims (9)

1. A GIS position information transmission encryption method in trunking communication is characterized by comprising the following steps:
step 1: the method comprises the steps that a core network receives GIS position information which is sent by a GIS reporting terminal and is encrypted once through a password module, and the GIS position information encrypted once is embedded in a KMD data frame format packet;
step 2: the KMD analyzes and decrypts the KMD data frame format packet to obtain the GIS position information; secondly, encrypting the GIS position information for the second time; then, packaging the secondarily encrypted GIS position information according to a protocol stack format to form a core network data frame format packet, and transmitting the core network data frame format packet back to the core network;
and step 3: the core network analyzes the returned core network data frame format packet to obtain secondary encrypted GIS position information; then, forwarding KMD forwarding information to a corresponding scheduling machine according to the number of the subscriber;
and 4, step 4: after the dispatching machine receives the KMD forwarding information, the KMD forwarding information is decrypted through a GIS cipher machine to obtain GIS position information; and sending the GIS position information to a corresponding dispatching desk, namely the subscriber according to the subscriber number.
2. The encryption method according to claim 1, wherein the cryptographic resource injection device obtains an encryption and decryption key of the cryptographic assurance management device, and performs the encryption and decryption key presetting on the GIS cryptographic machine, the cryptographic module and the KMD, wherein the GIS reporting terminal and the KMD preset an encryption and decryption key at a time; the GIS cipher machine and the KMD preset secondary encryption and decryption keys; the primary encryption key is different from the secondary encryption key, and the decryption keys corresponding to the primary encryption key and the secondary encryption key are also different.
3. The encryption method according to claim 1, characterized in that the protocol format between the core network and the KMD comprises at least protocol header number + information data + destination address; the KMD data frame format packet at least comprises a protocol header number, primary encrypted GIS position information and a destination address; the core network data frame format packet at least comprises a protocol head number, GIS position information of secondary encryption and a destination address; the protocol head number is the identification code of the reporting party, and the destination address is the number of the subscribing party.
4. The encryption method according to one of claims 1 to 3, wherein the KMD parses and decrypts the KMD data frame format packet to obtain the GIS location information, specifically, the KMD data frame format packet is parsed, and the GIS location information encrypted once is decrypted by a decryption key to obtain the GIS location information; the decryption key is a decryption key corresponding to the primary encryption key to form an encryption/decryption key pair.
5. The encryption method according to one of claims 1 to 3, wherein the decryption key of the twice-encrypted GIS location information is a decryption key forming a pair of encryption and decryption keys corresponding to the encryption key of the twice-encrypted GIS location information.
6. The encryption method according to claim 4, wherein the primary encrypted GIS location information is encrypted by a cryptographic module embedded in a GIS reporting terminal, and the primary encrypted GIS location information is reported by the GIS reporting terminal.
7. The encryption method according to claim 2 or 6, wherein said cryptographic module is a TF card crypto-engine; the TF card cipher machine is installed in a TF card slot inside the GIS reporting terminal in a compression joint mode, and encryption information interaction is carried out between the TF card cipher machine and the GIS reporting terminal through an SDIO serial interface, so that encryption and decryption processing of GIS position information services of the GIS reporting terminal is achieved.
8. The encryption method according to claim 6, wherein the KMD performs information interaction with the GIS report terminal through a core network via a network interface to realize online distribution and management of password resources in the trunking communication system.
9. An encryption apparatus based on the encryption method of claim 1, 2, 3, 5 or 6, characterized by comprising:
the core network is used for receiving the GIS position information encrypted once, embedding the GIS position information encrypted once in a KMD data frame format packet, and uploading the information to the KMD for decryption; analyzing the returned core network data frame format packet to obtain secondary encrypted GIS position information; then, forwarding KMD forwarding information to a corresponding scheduling machine according to the number of the subscriber; the KMD is used for analyzing and decrypting the KMD data frame format packet to obtain the GIS position information; secondly, encrypting the GIS position information for the second time; and then packaging the secondarily encrypted GIS position information according to a protocol stack format to form a core network data frame format packet, and transmitting the core network data frame format packet back to the core network.
CN201711421510.6A 2017-12-25 2017-12-25 GIS position information transmission encryption method and device in trunking communication Active CN108174344B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711421510.6A CN108174344B (en) 2017-12-25 2017-12-25 GIS position information transmission encryption method and device in trunking communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711421510.6A CN108174344B (en) 2017-12-25 2017-12-25 GIS position information transmission encryption method and device in trunking communication

Publications (2)

Publication Number Publication Date
CN108174344A CN108174344A (en) 2018-06-15
CN108174344B true CN108174344B (en) 2020-05-08

Family

ID=62520300

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711421510.6A Active CN108174344B (en) 2017-12-25 2017-12-25 GIS position information transmission encryption method and device in trunking communication

Country Status (1)

Country Link
CN (1) CN108174344B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111132035A (en) * 2018-11-01 2020-05-08 普天信息技术有限公司 Scheduling management method and device in cluster system
CN112511983A (en) * 2020-11-24 2021-03-16 周口师范学院 Privacy protection system and protection method based on position of Internet of vehicles

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101651944A (en) * 2009-06-16 2010-02-17 中兴通讯股份有限公司 Cluster system and encrypted communication method
CN103596169A (en) * 2012-08-16 2014-02-19 中兴通讯股份有限公司 Cluster system encryption terminal and encryption module communication method, system and terminal thereof
CN104602208A (en) * 2015-01-29 2015-05-06 成都三零瑞通移动通信有限公司 Short message encrypted communication method based on mobile network
CN105704681A (en) * 2014-11-25 2016-06-22 北京信威通信技术股份有限公司 Meticulous monitoring method of end-to-end encrypted call
CN106211091A (en) * 2016-09-08 2016-12-07 宇龙计算机通信科技(深圳)有限公司 A kind of method and system setting up trunking communication
CN106982419A (en) * 2016-01-18 2017-07-25 普天信息技术有限公司 A kind of broadband cluster system individual calling End to End Encryption method and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120155644A1 (en) * 2010-12-20 2012-06-21 Motorola, Inc. Method to maintain end-to-end encrypted calls through a tetra tmo-dmo gateway when using super groups

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101651944A (en) * 2009-06-16 2010-02-17 中兴通讯股份有限公司 Cluster system and encrypted communication method
CN103596169A (en) * 2012-08-16 2014-02-19 中兴通讯股份有限公司 Cluster system encryption terminal and encryption module communication method, system and terminal thereof
CN105704681A (en) * 2014-11-25 2016-06-22 北京信威通信技术股份有限公司 Meticulous monitoring method of end-to-end encrypted call
CN104602208A (en) * 2015-01-29 2015-05-06 成都三零瑞通移动通信有限公司 Short message encrypted communication method based on mobile network
CN106982419A (en) * 2016-01-18 2017-07-25 普天信息技术有限公司 A kind of broadband cluster system individual calling End to End Encryption method and system
CN106211091A (en) * 2016-09-08 2016-12-07 宇龙计算机通信科技(深圳)有限公司 A kind of method and system setting up trunking communication

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
TETRA调度台加密系统设计与实现;李凌 等;《计算机工程与应用》;20060511;全文 *

Also Published As

Publication number Publication date
CN108174344A (en) 2018-06-15

Similar Documents

Publication Publication Date Title
US20240064003A1 (en) Encryption Method, Decryption Method, and Related Apparatus
CN106973056B (en) Object-oriented security chip and encryption method thereof
CN105553951A (en) Data transmission method and data transmission device
CN103338437B (en) The encryption method of a kind of mobile instant message and system
CN103118363B (en) A kind of method of mutual biography secret information, system, terminal unit and platform device
CN102333093A (en) Data encryption transmission method and system
CN108259407B (en) Symmetric encryption method and system based on timestamp
CN105656941A (en) Identity authentication device and method
CN109714291A (en) A kind of data transmission method and device
KR20150079489A (en) Instant messaging method and system
CN101447841A (en) Hybrid network encrypt/decrypt scheme
CN104468126A (en) Safety communication system and method
WO2023160420A1 (en) Group message encryption method and apparatus, device and storage medium
CN105007163A (en) Pre-shared key (PSK) transmitting and acquiring methods and transmitting and acquiring devices
CN108174344B (en) GIS position information transmission encryption method and device in trunking communication
CN112911588A (en) Lightweight narrowband Internet of things secure transmission method and system
CN104270380A (en) End-to-end encryption method and system based on mobile network and communication client side
CN111224958A (en) Data transmission method and system
KR101213301B1 (en) Apparatus and method for re-authentication treatment of downloadable conditional access system
CN109462480B (en) Satellite communication system encryption method based on RSA and AES
CN101437228B (en) Method, apparatus and system for implementing wireless business based on smart card
CN111988777B (en) Method for processing one number double-terminal service, core network equipment and server
CN111800791B (en) Authentication method, core network equipment and terminal
CN114374550A (en) Electric power measurement platform that possesses high security
CN111885600A (en) Access method of dual-card terminal, terminal and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant