CN109586901A - A kind of key updating method and equipment - Google Patents
A kind of key updating method and equipment Download PDFInfo
- Publication number
- CN109586901A CN109586901A CN201811481082.0A CN201811481082A CN109586901A CN 109586901 A CN109586901 A CN 109586901A CN 201811481082 A CN201811481082 A CN 201811481082A CN 109586901 A CN109586901 A CN 109586901A
- Authority
- CN
- China
- Prior art keywords
- mobile network
- network service
- service device
- internet
- things equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
Abstract
The embodiment of the invention discloses a kind of key updating method and equipment, it is related to the communications field, it solves when carrying out identification authentication to internet of things equipment, since the problem of leakage causes the data of internet of things equipment to be stolen occurs for the number of internet of things equipment and the corresponding relationship of authentication key.The specific scheme is that mobile network service device receives the new key that certificate server is sent, the new key is converted into data SMS, data SMS is sent to internet of things equipment, the successful message of key updating that internet of things equipment is sent is received, and sends the successful message of the key updating to certificate server.During the embodiment of the present invention is used for internet of things equipment identification authentication.
Description
Technical field
The present embodiments relate to the communications field more particularly to a kind of key updating methods and equipment.
Background technique
Currently, internet of things equipment when being mass-produced, has prestored authentication key, which can be unification
, it is also possible to corresponding with each internet of things equipment.
If the authentication key of each internet of things equipment is different, the business men of internet of things equipment needs to safeguard authentication key and object
Corresponding relationship between the number of networked devices.In this way, the identification authentication process of internet of things equipment are as follows: platform authentication module is from object
The number of the internet of things equipment is obtained at networked devices, and sends random number to internet of things equipment, and internet of things equipment is using authentication
Algorithm encrypts random number and authentication key, and sends ciphertext data to platform authentication module, and platform authentication module receives
It, can be using authentication arithmetic to the corresponding with number of the random number and storage for being sent to internet of things equipment to after ciphertext data
Authentication key is encrypted, if the ciphertext data that encryption obtains are identical as the ciphertext data received, is returned to internet of things equipment
Return the successful result of authentication.
But due to authentication key be internet of things equipment production when be preset at it is therein, if business men maintenance Internet of Things
The number of net equipment and the corresponding relationship of authentication key leak, then may cause the data that user uses the internet of things equipment
It is stolen.
Summary of the invention
The present invention provides a kind of key updating method and equipment, solves when carrying out identification authentication to internet of things equipment,
Since the number of internet of things equipment and the corresponding relationship of authentication key occur to leak what the data for leading to internet of things equipment were stolen
Problem.
In order to achieve the above objectives, the present invention adopts the following technical scheme:
In a first aspect, the present invention provides a kind of key updating method, this method may include: that mobile network service device receives
The new key that certificate server is sent;New key is converted to data SMS by mobile network service device, and is sent out to internet of things equipment
Send data SMS;Mobile network service device receives the successful message of key updating that internet of things equipment is sent, and to cert services
Device sends the message.
Second aspect, the present invention provide a kind of mobile network service device, which may include: to receive list
Member, converting unit and transmission unit.Receiving unit, for receiving the new key of certificate server transmission.Converting unit, being used for will
New key is converted to data SMS.Transmission unit, for sending data SMS to internet of things equipment.Receiving unit is also used to connect
Receive the successful message of key updating that internet of things equipment is sent.Transmission unit is also used to send key updating to certificate server
Successful message.
Concrete implementation mode can be with reference to the key that the possible implementation of first aspect or first aspect provides more
The behavioral function of mobile network service device in new method.
The third aspect provides a kind of mobile network service device, the mobile network service device include: at least one processor,
Memory, communication interface and communication bus.Processor is connect with memory, communication interface by communication bus, and memory is used for
Computer executed instructions are stored, when the operation of mobile network service device, the computer execution that processor executes memory storage refers to
It enables, so that mobile network service device executes the key such as any one of the possible implementation of first aspect or first aspect
Update method.
Fourth aspect provides a kind of computer storage medium, is stored thereon with computer executed instructions, when computer executes
Instruction on mobile network service device when running, so that mobile network service device executes the possibility such as first aspect or first aspect
Any one of implementation key updating method.
Key updating method provided by the invention, it is short that the new key received is converted to data by mobile network service device
Letter, and sends the data SMS to internet of things equipment, internet of things equipment after obtaining new key, by mobile network service device to
Certificate server sends the successful message of key updating, so that certificate server carries out identity to internet of things equipment using new key
Authentication.In this way, having carried out the update of key by mobile network service device, pass through after being converted into data SMS due to new key
Dedicated network channel issues, it is ensured that the safety of new key is stolen so as to avoid the data of internet of things equipment.
Detailed description of the invention
Fig. 1 is that one kind provided in an embodiment of the present invention can simplify signal using the system architecture of the embodiment of the present invention
Figure;
Fig. 2 is a kind of composition schematic diagram of mobile network service device provided in an embodiment of the present invention;
Fig. 3 is a kind of flow chart of key updating method provided in an embodiment of the present invention;
Fig. 4 is the composition schematic diagram of another mobile network service device provided in an embodiment of the present invention;
Fig. 5 is the composition schematic diagram of another mobile network service device provided in an embodiment of the present invention;
Fig. 6 is the composition schematic diagram of another mobile network service device provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Fig. 1 is that one kind provided in an embodiment of the present invention can simplify signal using the system architecture of the embodiment of the present invention
Figure, as shown in Figure 1, the system architecture may include: internet of things equipment 11, mobile network service device 12 and certificate server 13.
Wherein, internet of things equipment 11 carries out the transmission of data with certificate server 13 by mobile network service device 12.
Internet of things equipment 11 may include subscriber identification card (Subscriber Identity Module, SIM) card
And cipher key storage block.SIM card, the data SMS received for identification obtain new key, cipher key storage block, for depositing
The number and authentication key of storing networked devices 11.
Mobile network service device 12 is provided by operator, can establish wireless data channel between internet of things equipment 11.
Certificate server 13, for storing the number and corresponding authentication key of internet of things equipment 11.
Fig. 2 is a kind of composition schematic diagram of mobile network service device provided in an embodiment of the present invention, as shown in Fig. 2, the shifting
Dynamic network server may include: at least one processor 21, memory 22, communication interface 23 and communication bus 24.
It is specifically introduced below with reference to each component parts of the Fig. 2 to mobile network service device:
Wherein, processor 21 is the control centre of mobile network service device, can be a processor, is also possible to multiple
The general designation of processing element.For example, processor 21 is a central processing unit (Central Processing Unit, CPU),
It can be specific integrated circuit (Application Specific Integrated Circuit, ASIC), or be configured
At the one or more integrated circuits for implementing the embodiment of the present invention, such as: one or more digital signal processor (Digital
Signal Processor, DSP), or, one or more field programmable gate array (Field Programmable Gate
Array, FPGA).
In concrete implementation, as one embodiment, processor 21 may include one or more CPU, such as in Fig. 2
Shown in CPU0 and CPU1.And as one embodiment, mobile network service device may include multiple processors, such as in Fig. 2
Shown in processor 21 and processor 25.Each of these processors can be a single core processor (Single-
CPU), it is also possible to a multi-core processor (Multi-CPU).Here processor can refer to one or more equipment, circuit,
And/or the processing core for handling data (such as computer program instructions).
Memory 22 can be read-only memory (Read-Only Memory, ROM) or can store static information and instruction
Other kinds of static storage device, random access memory (Random Access Memory, RAM) or letter can be stored
The other kinds of dynamic memory of breath and instruction, is also possible to Electrically Erasable Programmable Read-Only Memory (Electrically
Erasable Programmable Read-Only Memory, EEPROM), CD-ROM (Compact Disc Read-
Only Memory, CD-ROM) or other optical disc storages, optical disc storage (including compression optical disc, laser disc, optical disc, digital universal
Optical disc, Blu-ray Disc etc.), magnetic disk storage medium or other magnetic storage apparatus or can be used in carrying or store to have referring to
Enable or data structure form desired program code and can by any other medium of computer access, but not limited to this.
Memory 22, which can be, to be individually present, and is connected by communication bus 24 with processor 21.Memory 22 can also and processor
21 integrate.
In concrete implementation, memory 22, for storing the data in the present invention and executing software program of the invention.
Processor 21 can be by running or execute the software program being stored in memory 22, and calls and be stored in memory 22
Data, execute mobile network service device various functions.
Communication interface 23, using the device of any transceiver one kind, for other equipment or communication, such as nothing
Line access (Radio Access Network, RAN), WLAN (Wireless Local Area Networks,
WLAN), internet of things equipment, certificate server etc..Communication interface 23 may include that receiving unit realizes receive capabilities, and sends
Unit realizes sending function.
Communication bus 24 can be industry standard architecture (Industry Standard Architecture, ISA)
Bus, external equipment interconnection (Peripheral Component Interconnect, PCI) bus or extension industrial standard body
Architecture (Extended Industry Standard Architecture, EISA) bus etc..The bus can be divided into address
Bus, data/address bus, control bus etc..Only to be indicated with a thick line in Fig. 2, it is not intended that only one convenient for indicating
Bus or a type of bus.
In order to solve when carrying out identification authentication to internet of things equipment, due to the number and authentication key of internet of things equipment
The problem of leakage causes the data of internet of things equipment to be stolen, occurs for corresponding relationship, and the embodiment of the invention provides a kind of keys more
New method, as shown in figure 3, this method may include:
301, mobile network service device establishes the wireless data channel between internet of things equipment.
Wherein, after being inserted into SIM card in internet of things equipment, mobile network service device can carry out wireless network to SIM card
Authentication, and the wireless data channel after authenticating successfully between foundation and internet of things equipment.
302, certificate server sends new key to mobile network service device.
Wherein, before using internet of things equipment, the number of the available internet of things equipment of certificate server, and use
The authentication key prestored carries out identification authentication for the first time to internet of things equipment, sends newly after authenticating successfully to mobile network service device
Key.
303, mobile network service device receives the new key that certificate server is sent.
304, new key is converted to data SMS by mobile network service device.
305, mobile network service device sends data SMS to internet of things equipment.
Wherein, mobile network service device can be established after new key is converted into data SMS by step 301
Wireless data channel sends the data SMS to internet of things equipment using predetermined manner.Wherein, predetermined manner can be block mode
In (Block Mode), Text Mode (Text Mode), protocol Data Unit (Protocol Data Unit, PDU) mode
Any one.
It should be noted that in embodiments of the present invention, when predetermined manner is PDU mode, data SMS is using PDU
The short message of format, the data SMS may include data coding scheme (Data Coding Scheme, DCS) field, user
Data (User Data, UD) field etc..First bit and the 0th bit that DCS field includes are " 10 ", and UD field is usual
For binary data, being used to indicate new key is non-display text.
306, internet of things equipment receives the data SMS that mobile network service device is sent.
307, internet of things equipment sends the successful message of key updating to mobile network service device.
Wherein, the SIM card of internet of things equipment can incite somebody to action after the data SMS for receiving the transmission of mobile network service device
The data SMS resolves to key, and the key after parsing is sent to the cipher key storage block of internet of things equipment by serial ports,
Cipher key storage block can replace original authentication key with the key after parsing.After the completion of update, internet of things equipment can be with
By wireless data channel, the successful message of key updating is sent to mobile network service device.
308, mobile network service device receives the successful message of key updating that internet of things equipment is sent.
309, mobile network service device sends the successful message of key updating to certificate server.
310, certificate server receives the successful message of key updating that mobile network service device is sent.
Wherein, certificate server, can after the successful message of key updating for receiving the transmission of mobile network service device
To carry out identification authentication to internet of things equipment using new key.Specifically, certificate server can to internet of things equipment send with
Machine number, internet of things equipment can encrypt new key and the random number received using the authentication arithmetic that prestores, and to card
Book server sends ciphertext data.Certificate server, can be using the authentication arithmetic prestored to new after receiving ciphertext data
Key and the random number for being sent to internet of things equipment are encrypted, if obtained ciphertext data and the ciphertext data phase received
Together, then it is sent to internet of things equipment and authenticates successful result.
Key updating method provided by the invention, it is short that the new key received is converted to data by mobile network service device
Letter, and sends the data SMS to internet of things equipment, internet of things equipment after obtaining new key, by mobile network service device to
Certificate server sends the successful message of key updating, so that certificate server carries out identity to internet of things equipment using new key
Authentication.In this way, having carried out the update of key by mobile network service device, pass through after being converted into data SMS due to new key
Dedicated network channel issues, it is ensured that the safety of new key is stolen so as to avoid the data of internet of things equipment.
It is above-mentioned that mainly scheme provided in an embodiment of the present invention is described from the angle of each equipment interaction.It can manage
Solution, each equipment, in order to realize the above functions such as mobile network service device, it comprises executing, each function is hard accordingly
Part structure and/or software module.Those skilled in the art should be readily appreciated that, retouch in conjunction with the embodiments described herein
Each exemplary algorithm steps for stating, the present invention can be realized with the combining form of hardware or hardware and computer software.Some
Function is executed in a manner of hardware or computer software driving hardware actually, depending on technical solution specific application and set
Count constraint condition.Professional technician can use different methods to achieve the described function each specific application,
But such implementation should not be considered as beyond the scope of the present invention.
The embodiment of the present invention can carry out the division of functional module, example according to above method example to mobile network service device
Such as, each functional module of each function division can be corresponded to, two or more functions can also be integrated at one
It manages in module.Above-mentioned integrated module both can take the form of hardware realization, can also use the form of software function module
It realizes.It should be noted that being schematical, only a kind of logic function stroke to the division of module in the embodiment of the present invention
Point, there may be another division manner in actual implementation.
In the case where each function division of use correspondence each functional module, Fig. 4 is shown involved in above-described embodiment
Mobile network service device alternatively possible composition schematic diagram, as shown in figure 4, the mobile network service device may include:
Receiving unit 41, converting unit 42 and transmission unit 43.
Wherein, receiving unit 41, for supporting mobile network service device to execute the step in key updating method shown in Fig. 3
Rapid 303, step 308.
Converting unit 42, for supporting mobile network service device to execute the step in key updating method shown in Fig. 3
304。
Transmission unit 43, for supporting mobile network service device to execute the step in key updating method shown in Fig. 3
305, step 309.
It should be noted that all related contents for each step that above method embodiment is related to can quote correspondence
The function of functional module describes, and details are not described herein.
Mobile network service device provided in an embodiment of the present invention for executing above-mentioned key updating method, therefore can reach
To effect identical with above-mentioned key updating method.
Further, in embodiments of the present invention, as shown in figure 5, mobile network service device can also include: to establish unit
44。
Unit 44 is established, for supporting mobile network service device to execute the step in key updating method shown in Fig. 3
301。
Using integrated unit, Fig. 6 shows mobile network service device involved in above-described embodiment
Alternatively possible composition schematic diagram.As shown in fig. 6, the mobile network service device includes: processing module 51, communication module 52
With memory module 53.
Processing module 51 is for carrying out control management to the movement of mobile network service device, for example, processing module 51 is used for
Mobile network service device is supported to execute step 301, step 304 in Fig. 3, and/or for the other of techniques described herein
Process.Communication module 52 is for supporting mobile network service device and other network entities, such as internet of things equipment, certificate server
Communication.For example, communication module 52, for supporting mobile network service device to execute the step 303 in Fig. 3, step 305, step
308, step 309.Memory module 53, for storing the program code and data of mobile network service device.
Wherein, processing module 51 can be the processor in Fig. 2.It, which may be implemented or executes, combines the disclosure of invention
Described various illustrative logic blocks, module and circuit.Processor is also possible to realize the combination of computing function, such as
It is combined comprising one or more microprocessors, DSP and the combination of microprocessor etc..Communication module 52 can be logical in Fig. 2
Believe interface.Memory module 53 can be the memory in Fig. 2.
Through the above description of the embodiments, it is apparent to those skilled in the art that, for description
It is convenienct and succinct, only the example of the division of the above functional modules, in practical application, can according to need and will be upper
It states function distribution to be completed by different functional modules, i.e., the internal structure of device is divided into different functional modules, to complete
All or part of function described above.
In several embodiments provided by the present invention, it should be understood that disclosed device and method can pass through it
Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the module or unit
It divides, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components
It may be combined or can be integrated into another device, or some features can be ignored or not executed.Another point, it is shown or
The mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, the indirect coupling of device or unit
It closes or communicates to connect, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown can be a physical unit or multiple physical units, it can and it is in one place, or may be distributed over
Multiple and different places.Some or all of unit therein can be selected to realize this embodiment scheme according to the actual needs
Purpose.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can store in a read/write memory medium.Based on this understanding, the technical solution of the embodiment of the present invention is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that an equipment (can be list
Piece machine, chip etc.) or processor (processor) perform all or part of the steps of the method described in the various embodiments of the present invention.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, ROM, RAM, magnetic or disk etc. are various can store program code
Medium.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Change or replacement in the technical scope disclosed by the present invention, should be covered by the protection scope of the present invention.Therefore, this hair
Bright protection scope should be based on the protection scope of the described claims.
Claims (10)
1. a kind of key updating method, which is characterized in that the described method includes:
Mobile network service device receives the new key that certificate server is sent;
The new key is converted to data SMS by the mobile network service device, and short to the internet of things equipment transmission data
Letter;
The mobile network service device receives the successful message of key updating that the internet of things equipment is sent, and to the certificate
Server sends the message.
2. key updating method according to claim 1, which is characterized in that send the number to internet of things equipment described
Before short message, further includes:
The mobile network service device establishes the wireless data channel between the internet of things equipment.
3. key updating method according to claim 2, which is characterized in that the mobile network service device is to the Internet of Things
Net equipment sends the data SMS, comprising:
The mobile network service device sends institute to the internet of things equipment by the wireless data channel, using predetermined manner
State data SMS;Wherein, the predetermined manner are as follows: block mode, Text Mode, any one in protocol Data Unit PDU mode
Kind.
4. key updating method according to claim 3, which is characterized in that when the predetermined manner is the PDU mode,
The data SMS is the short message using PDU format;The user data UD field that the data SMS includes is used to indicate institute
Stating new key is non-required display text.
5. a kind of mobile network service device, which is characterized in that the mobile network service device includes: receiving unit, converting unit
And transmission unit;
The receiving unit, for receiving the new key of certificate server transmission;
The converting unit, for the new key to be converted to data SMS;
The transmission unit, for sending the data SMS to internet of things equipment;
The receiving unit is also used to receive the successful message of key updating that the internet of things equipment is sent;
The transmission unit is also used to send the message to the certificate server.
6. mobile network service device according to claim 5, which is characterized in that the mobile network service device further include:
Establish unit;
Described to establish unit, for establishing between the internet of things equipment the wireless data channel.
7. mobile network service device according to claim 6, which is characterized in that the transmission unit is specifically used for:
By the wireless data channel, the data SMS is sent to the internet of things equipment using predetermined manner;Wherein, institute
State predetermined manner are as follows: block mode, Text Mode, any one in protocol Data Unit PDU mode.
8. mobile network service device according to claim 7, which is characterized in that the predetermined manner is the PDU mode
When, the data SMS is the short message using PDU format;The user data UD field that the data SMS includes is used to indicate
The new key is non-required display text.
9. a kind of mobile network service device, which is characterized in that the mobile network service device includes: processor, memory, communication
Interface and communication bus;
The processor is connect with the memory, the communication interface by the communication bus, and the memory is for depositing
Computer executed instructions are stored up, when mobile network service device operation, the processor executes the institute of the memory storage
Computer executed instructions are stated, so that the mobile network service device is executed such as key of any of claims 1-4 more
New method.
10. a kind of computer storage medium, which is characterized in that the computer storage medium includes computer executed instructions, when
The computer executed instructions on mobile network service device when running, so that the mobile network service device is executed as right is wanted
Seek key updating method described in any one of 1-4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811481082.0A CN109586901A (en) | 2018-12-05 | 2018-12-05 | A kind of key updating method and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811481082.0A CN109586901A (en) | 2018-12-05 | 2018-12-05 | A kind of key updating method and equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109586901A true CN109586901A (en) | 2019-04-05 |
Family
ID=65926087
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811481082.0A Pending CN109586901A (en) | 2018-12-05 | 2018-12-05 | A kind of key updating method and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109586901A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112738773A (en) * | 2020-12-29 | 2021-04-30 | 深圳杰睿联科技有限公司 | NB-IoT secret communication key updating method based on authorization server |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1901447A (en) * | 2005-06-30 | 2007-01-24 | 兄弟工业株式会社 | Communication system, certificate update device, and communication device |
CN101335927A (en) * | 2008-07-31 | 2008-12-31 | 中兴通讯股份有限公司 | Method and system for notifying terminal to acquire service cipher key |
CN102215488A (en) * | 2011-05-27 | 2011-10-12 | 中国联合网络通信集团有限公司 | Smart phone digital certificate application method and system |
CN103684783A (en) * | 2013-12-06 | 2014-03-26 | 青岛海信电子设备股份有限公司 | Communication encryption method based on communication network |
US20180343284A1 (en) * | 2016-02-29 | 2018-11-29 | Red Hat, Inc. | Secure performance monitoring of remote application servers |
-
2018
- 2018-12-05 CN CN201811481082.0A patent/CN109586901A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1901447A (en) * | 2005-06-30 | 2007-01-24 | 兄弟工业株式会社 | Communication system, certificate update device, and communication device |
CN101335927A (en) * | 2008-07-31 | 2008-12-31 | 中兴通讯股份有限公司 | Method and system for notifying terminal to acquire service cipher key |
CN102215488A (en) * | 2011-05-27 | 2011-10-12 | 中国联合网络通信集团有限公司 | Smart phone digital certificate application method and system |
CN103684783A (en) * | 2013-12-06 | 2014-03-26 | 青岛海信电子设备股份有限公司 | Communication encryption method based on communication network |
US20180343284A1 (en) * | 2016-02-29 | 2018-11-29 | Red Hat, Inc. | Secure performance monitoring of remote application servers |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112738773A (en) * | 2020-12-29 | 2021-04-30 | 深圳杰睿联科技有限公司 | NB-IoT secret communication key updating method based on authorization server |
CN112738773B (en) * | 2020-12-29 | 2021-08-17 | 深圳杰睿联科技有限公司 | NB-IoT secret communication key updating method based on authorization server |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109845303B (en) | Management method and management unit for network slices | |
CN109168156B (en) | Method, system, medium, computer program product and server for implementing virtual SIM card | |
CN111865872B (en) | Method and equipment for realizing terminal security policy in network slice | |
CN110086755B (en) | Method for realizing service of Internet of things, application server, Internet of things equipment and medium | |
CN108702296A (en) | Cellular device certification | |
CN107454590A (en) | A kind of data ciphering method, decryption method and wireless router | |
CN109005032B (en) | Routing method and device | |
KR20230078706A (en) | Certificate-based security using post-quantum cryptography | |
CN115174267B (en) | TLS protocol negotiation method, equipment and medium | |
CN104935435A (en) | Login methods, terminal and application server | |
CN111163052B (en) | Method, device, medium and electronic equipment for connecting Internet of things platform | |
CN109600769B (en) | Communication method and device | |
CN109495874A (en) | The method and apparatus of Profile downloading | |
CN109413084A (en) | A kind of password update method, apparatus and system | |
CN112035859A (en) | Calling method and device of password service, storage medium and electronic device | |
CN110266653B (en) | Authentication method, system and terminal equipment | |
CN111427860B (en) | Distributed storage system and data processing method thereof | |
CN111414640A (en) | Key access control method and device | |
CN113038463B (en) | Communication encryption authentication experimental device | |
CN114095277A (en) | Power distribution network secure communication method, secure access device and readable storage medium | |
KR102114431B1 (en) | How to load a subscription to the built-in security element of the mobile terminal | |
CN109586901A (en) | A kind of key updating method and equipment | |
CN103873245B (en) | Dummy machine system data ciphering method and equipment | |
CN108322464B (en) | Key verification method and device | |
CN110636491A (en) | Service-oriented trusted execution module and communication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190405 |