CN109918897A - A kind of password authentification test method and system based on AEP memory - Google Patents

A kind of password authentification test method and system based on AEP memory Download PDF

Info

Publication number
CN109918897A
CN109918897A CN201910147463.3A CN201910147463A CN109918897A CN 109918897 A CN109918897 A CN 109918897A CN 201910147463 A CN201910147463 A CN 201910147463A CN 109918897 A CN109918897 A CN 109918897A
Authority
CN
China
Prior art keywords
memory
aep
aep memory
server
test
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910147463.3A
Other languages
Chinese (zh)
Inventor
高莹
贠雄斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Wave Intelligent Technology Co Ltd
Original Assignee
Suzhou Wave Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Wave Intelligent Technology Co Ltd filed Critical Suzhou Wave Intelligent Technology Co Ltd
Priority to CN201910147463.3A priority Critical patent/CN109918897A/en
Publication of CN109918897A publication Critical patent/CN109918897A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of password authentification test method and system based on AEP memory, includes the following steps: that AEP memory configurations strategy is arranged;Internally deposit into capable encryption;It internally deposits to be decrypted after having encrypted after whether detection encryption is successful and to verifying AEP memory and environmental structure and the driving installation of AEP memory first is carried out to server, the test can be started after the installation is completed.Automatically it is memorymodel or mixed mode that AEP memory configurations strategy is arranged when test, and is encrypted to it;Test node is restarted after encryption, whether detection encryption releases after restarting into linux system.So far the entire test process of AEP memory password authentification is completed.After test, test result log can be checked and be analyzed, judges whether the AEP memory can be normally carried out encrypting and decrypting according to test result.Application of the invention substantially increases AEP memory security test, is conducive to the raising for entirely calculating environmental safety.

Description

A kind of password authentification test method and system based on AEP memory
Technical field
A kind of memory techniques field of the present invention, and in particular to password authentification test method and system based on AEP memory.
Background technique
With the cloud computing and big data etc. that the complexity of modem computer systems is higher and higher and recent years occurs Raising of the emerging technology to environmental safety requirement is calculated, industry generally have recognized the need to from the bottom hardware of computer system The encryption function of data is supported completely.
The mounting means of AEP memory is the same with common memory, is also mounted on memory slot position.But AEP memory can lead to Adjustment distribution Provisioning Policy is crossed, memorymodel (memory mode), hard disk mode (APD mode) or mixed mode (mix are become mode).It is similar with common memory when being set as 100% memorymodel (memory mode) for AEP Memory Allocation Strategy, tool There is memory, can be used when memory.When being set as 100% hard disk mode (APD mode) for AEP Memory Allocation Strategy, It can be used when hard disk, have the function of storage, but it is fast more than common hard disc read or write speed.In addition to this it is possible to real Mixed mode (mix mode) now is set by AEP Memory Allocation Strategy, same memory virtual is made to resolve into hard disk function area With memory function area, while there is memory function and hard disk function.
AEP memory in use, according to practical application scene, may often carry out memorymodel (memory Mode), the switch operating under hard disk mode (APD mode) and mixed mode (mix mode) Three models is needed for difference Memorymodel (memory mode) and mixed mode (mix mode) do the verifying of safety.
Summary of the invention
Aiming at the problem that different memorymodels needs to do the verifying of safety, the present invention provides a kind of based on AEP memory Password authentification test method and system.
In a first aspect, the present invention provides a kind of password authentification test method based on AEP memory, include the following steps:
AEP memory configurations strategy is set;
Internally deposit into capable encryption;
Encrypted AEP memory is decrypted after whether detection encryption is successful and to verifying.
Further, before AEP memory configurations strategy is set, comprising:
Environmental structure is carried out to server to be measured and the driving of AEP memory is installed.
Further, AEP memory configurations strategy is set, comprising:
Memorymodel or mixed mode are saved as in setting AEP.The mounting means of AEP memory is the same with common memory, and It is mounted in memory slot position.But AEP memory can become memorymodel (memory mode) by adjusting distribution Provisioning Policy Or mixed mode (mix mode);Mixed mode (mix mode) is set by AEP Memory Allocation Strategy, keeps same memory empty It is quasi- to resolve into hard disk function area and memory function area, while there is memory function and hard disk function.
Further, it after whether detection encryption is successful, is internally deposited after having been encrypted to verifying AEP memory in being decrypted, it is right The encryption of AEP memory is verified, and is first carried out environmental structure and the driving installation of AEP memory to server to be measured, is after the installation is completed It can start to test.Automatically it is memorymodel memory mode that AEP memory configurations strategy is arranged when test, and is encrypted to it; Test node is restarted after encryption, restarts that the step of whether detection encryption succeeds, verify encryption back specifically includes:
Password authentification request is sent to authentication server;
It receives the encrypted authentication information that authentication server returns and is stored;
The encrypted authentication information is decrypted when receiving to AEP memory predetermined registration operation to generate identifying code and incite somebody to action The identifying code of generation is transferred to authentication server;
When authentication server receives the identifying code and authentication server preset condition matches, verifying is encrypted to Function.
Further, after sending password authentification request to authentication server, further includes:
Authentication server generates random number according to the password authentification request received and stores the random number;
The random number of generation is encrypted by the encrypted public key that authentication server generates and generates encrypted authentication information.
Further, it is internally deposited after having been encrypted after whether detection encryption is successful and to verifying AEP memory after being decrypted, Further include:
Restart whether test node releases into detection encryption after linux system;
If so, the log that outputs test result, judges whether the AEP memory can be normally carried out encryption solution according to test result It is close.
On the other hand, also a kind of password authentification test macro based on AEP memory of the present invention, including set in server to be measured There is AEP memory;
Server to be measured further includes setup module, memory encrypting module and detection module;
Setup module, for AEP memory configurations strategy to be arranged;AEP memory in use, according to practical application field Scape may often carry out the switch operating of memorymodel (memory mode) and mixed mode (mix mode);
Memory encryption/decryption module is decrypted encrypted memory for internally depositing into capable encryption;
Detection module, for whether succeeding to detection encryption/decryption;Environmental structure and AEP first are carried out to server to be measured Memory driving installation, the test can be started after the installation is completed.Automatically it is memorymodel that AEP memory configurations strategy is arranged when test Memory mode, and it is encrypted;Test node is restarted after encryption, restarts whether detection encryption back succeeds,
Further, which further includes environmental structure module;
Environmental structure module installs AEP to the AEP memory of server to be measured for carrying out environmental structure to server to be measured Memory driving.
Further, which further includes authentication server, and the authentication server is communicated with server to be measured Connection;
Detection module, for sending the solicited message of password authentification to server to be measured;
The authentication server for receiving the password authentification solicited message of detection module transmission, and returns to encryption and tests Information is demonstrate,proved to server to be measured.
Further, server to be verified further includes identifying code generation module;
The identifying code generation module, for believing when receiving to AEP memory predetermined registration operation the encrypted authentication Breath is decrypted to generate identifying code and the identifying code of generation is transferred to authentication server;
Authentication server, for when receiving the identifying code and authentication server preset condition matches, return to be tested Card encrypts successful information to server to be verified.
The beneficial effects of the present invention are first carry out environmental structure and the driving installation of AEP memory to server, install The test can be started afterwards.Automatically it is memorymodel or mixed mode that AEP memory configurations strategy is arranged when test, and is carried out to it Encryption;Test node is restarted after encryption, restarts whether detection encryption back succeeds.It verifies after AEP memory has encrypted to memory It is decrypted, whether detection encryption releases after restarting into linux system.So far the password authentification of AEP memory is completed entirely to test Journey.After test, test result log can be checked and be analyzed, judges whether the AEP memory can be normal according to test result Carry out encrypting and decrypting.Application of the invention substantially increases AEP memory security test, is conducive to entirely calculate environmental safety Raising.
In addition, design principle of the present invention is reliable, structure is simple, has very extensive application prospect.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, for those of ordinary skill in the art Speech, without creative efforts, is also possible to obtain other drawings based on these drawings.
Fig. 1 is the schematic flow chart of the method for one embodiment of the invention.
Specific embodiment
Technical solution in order to enable those skilled in the art to better understand the present invention, below in conjunction with of the invention real The attached drawing in example is applied, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described implementation Example is only a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, this field is common Technical staff's every other embodiment obtained without making creative work, all should belong to protection of the present invention Range.
The Key Term occurred in the present invention is explained below.
Embodiment one
As shown in Figure 1, the present invention provides a kind of password authentification test method based on AEP memory, include the following steps:
S1: carrying out environmental structure to server to be measured and installs the driving of AEP memory;
Server to be measured is attached with authentication server, and it is logical to can be carried out server to be measured and authentication server Letter, the driving of installation AEP memory and test script;The mounting means of AEP memory is the same with common memory, is also mounted in memory slot On position,
Check whether the memory of server to be measured can be normally carried out the reading of information;
According to inspection result, if memory can be normally carried out information and read execution test script progress test process, another party Just, if reading memory information exception, test script and output error prompt information are not executed, tester is facilitated to examine It looks into.
S2: setting AEP memory configurations strategy;
AEP memory in use, according to practical application scene, may often carry out memorymodel (memory ) and the switch operating of mixed mode (mix mode) mode;In this step, first to server to be measured carry out environmental structure and The driving installation of AEP memory, the test can be started after the installation is completed, and it is memorymodel that memory configurations strategy, which is arranged, in when test automatically (memory mode) or mixed mode (mix mode), makes same memory virtual resolve into hard disk function area and memory function Area, while there is memory function and hard disk function.The step of encrypting to memory is executed after setting up AEP memory configurations strategy;
S3: it internally deposits into row and encrypts and test node is restarted;
Memory encrypting module internally deposits into the process of row encryption, and memory encrypting module first needs to check current service to be measured The processor state in which of device, if that is, current server to be measured processor it is busy, memory encrypting module needs exit To need to hang up the operating system of server to be measured, be exactly this field if the processor of server to be measured is in idle condition The operating system that technical staff often says does not receive the input-output operation of other operation processes, and processor is used to receive memory encryption The CIPHERING REQUEST that module is sent, and " return " key" more new command, to memory encrypting module, memory encrypting module receives key more New key is generated when new command, memory encrypting module is used after being decrypted to the page that each of memory is encrypted with old key The key that the heart generates re-starts encryption.
S4: whether detection encryption succeeds, if so, step S5 is executed, if it is not, executing step S3;In this step, if detection adds Close unsuccessful execution step S3, while exporting the unsuccessful test l og of testing encryption;
S5: AEP memory is decrypted and restarts test node after having encrypted to verifying;
S6: whether detection encryption releases;If so, step S7 is executed, if it is not, executing step S5;Test decryption is exported simultaneously Unsuccessful test log;
Environmental structure and the driving installation of AEP memory first are carried out to server, the test can be started after the installation is completed.When test Automatic setting AEP memory configurations strategy is memorymodel or mixed mode, and is encrypted to it;To test node after encryption Restart, restarts whether detection encryption back succeeds.Verifying AEP memory is internally deposited after having encrypted and is decrypted, and is restarted into Linux system Whether detection encryption releases after system.So far the entire test process of AEP memory password authentification is completed.
S7: output test result log, judges whether the AEP memory can be normally carried out encrypting and decrypting according to test result.
Embodiment two
The present invention provides a kind of password authentification test method based on AEP memory, includes the following steps:
S1: carrying out environmental structure to server to be measured and installs the driving of AEP memory;
Server to be measured is attached with authentication server, and it is logical to can be carried out server to be measured and authentication server Letter, the driving of installation AEP memory and test script;The mounting means of AEP memory is the same with common memory, is also mounted in memory slot On position,
Check whether the memory of server to be measured can be normally carried out the reading of information;
According to inspection result, if memory can be normally carried out information and read execution test script progress test process, another party Just, if reading memory information exception, test script and output error prompt information are not executed, tester is facilitated to examine It looks into.
S2: setting AEP memory configurations strategy;
AEP memory in use, according to practical application scene, may often carry out memorymodel (memory ) and the switch operating of mixed mode (mix mode) mode;In this step, first to server to be measured carry out environmental structure and The driving installation of AEP memory, the test can be started after the installation is completed, and it is memorymodel that memory configurations strategy, which is arranged, in when test automatically (memory mode) or mixed mode (mix mode), makes same memory virtual resolve into hard disk function area and memory function Area, while there is memory function and hard disk function.The step of encrypting to memory is executed after setting up AEP memory configurations strategy;
S3: it internally deposits into row and encrypts and test node is restarted;
Memory encrypting module internally deposits into the process of row encryption, and memory encrypting module first needs to check current service to be measured The processor state in which of device, if that is, current server to be measured processor it is busy, memory encrypting module needs exit To need to hang up the operating system of server to be measured, be exactly this field if the processor of server to be measured is in idle condition The operating system that technical staff often says does not receive the input-output operation of other operation processes, and processor is used to receive memory encryption The CIPHERING REQUEST that module is sent, and " return " key" more new command, to memory encrypting module, memory encrypting module receives key more New key is generated when new command, memory encrypting module is used after being decrypted to the page that each of memory is encrypted with old key The key that the heart generates re-starts encryption.
S4: whether detection encryption succeeds, if so, step S5 is executed, if it is not, executing step S3;
In this step, after whether detection encryption is successful, internally deposited after having been encrypted to verifying AEP memory in being decrypted, it is right The encryption of AEP memory is verified, and is first carried out environmental structure and the driving installation of AEP memory to server to be measured, is after the installation is completed It can start to test.Automatically it is memorymodel memory mode that AEP memory configurations strategy is arranged when test, and is encrypted to it; Test node is restarted after encryption, restarts that the step of whether detection encryption succeeds, verify encryption back specifically includes:
Password authentification request is sent to authentication server;
It receives the encrypted authentication information that authentication server returns and is stored;
The encrypted authentication information is decrypted when receiving to AEP memory predetermined registration operation to generate identifying code and incite somebody to action The identifying code of generation is transferred to authentication server;
When authentication server receives the identifying code and authentication server preset condition matches, verifying is encrypted to Function.
It should be noted that in this step, after sending password authentification request to authentication server, further includes:
Authentication server generates random number according to the password authentification request received and stores the random number;
The random number of generation is encrypted by the encrypted public key that authentication server generates and generates encrypted authentication information.
S5: AEP memory is decrypted and restarts to test node after having encrypted to verifying;
S6: whether detection encryption releases;If so, step S7 is executed, if it is not, executing step S5;Ring first is carried out to server Border is built to drive with AEP memory and be installed, and the test can be started after the installation is completed.AEP memory configurations strategy is set automatically when test For memorymodel or mixed mode, and it is encrypted;Test node is restarted after encryption, restarting detection encryption back is No success.Verifying AEP memory is internally deposited after having encrypted and is decrypted, and whether detection encryption releases after restarting into linux system.Extremely This completes the entire test process of AEP memory password authentification.
S7: output test result log, judges whether the AEP memory can be normally carried out encrypting and decrypting according to test result.
Embodiment three
Also a kind of password authentification test macro based on AEP memory of the present invention, including be equipped in AEP in server to be measured It deposits;
Server to be measured further includes setup module, memory encrypting module and detection module;
Setup module, for AEP memory configurations strategy to be arranged;
Memory encryption/decryption module is decrypted encrypted memory for internally depositing into capable encryption;
Detection module, for whether succeeding to detection encryption/decryption;
In the present embodiment, which further includes environmental structure module, environmental structure module, for carrying out to server to be measured Environmental structure, the AEP memory installation AEP memory driving to server to be measured.
The system further includes authentication server, and the authentication server is communicatively coupled with server to be measured;
Detection module, for sending the solicited message of password authentification to server to be measured;
The authentication server for receiving the password authentification solicited message of detection module transmission, and returns to encryption and tests Information is demonstrate,proved to server to be measured.
Explanation is needed further exist for, server to be verified further includes identifying code generation module;
The identifying code generation module, for believing when receiving to AEP memory predetermined registration operation the encrypted authentication Breath is decrypted to generate identifying code and the identifying code of generation is transferred to authentication server;
Authentication server, for when receiving the identifying code and authentication server preset condition matches, return to be tested Card encrypts successful information to server to be verified.
Environmental structure and the driving installation of AEP memory first are carried out to server, the test can be started after the installation is completed.When test Automatic setting AEP memory configurations strategy is memorymodel or mixed mode, and is encrypted to it;To test node after encryption Restart, restarts whether detection encryption back succeeds.Verifying AEP memory is internally deposited after having encrypted and is decrypted, and is restarted into Linux system Whether detection encryption releases after system.So far the entire test process of AEP memory password authentification is completed.After test, it can check And test result log is analyzed, judge whether the AEP memory can be normally carried out encrypting and decrypting according to test result.Of the invention answers With AEP memory security test is substantially increased, be conducive to the raising for entirely calculating environmental safety.
Although by reference to attached drawing and combining the mode of preferred embodiment to the present invention have been described in detail, the present invention It is not limited to this.Without departing from the spirit and substance of the premise in the present invention, those of ordinary skill in the art can be to the present invention Embodiment carry out various equivalent modifications or substitutions, and these modifications or substitutions all should in covering scope of the invention/appoint What those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, answer It is included within the scope of the present invention.Therefore, protection scope of the present invention is answered described is with scope of protection of the claims It is quasi-.

Claims (10)

1. a kind of password authentification test method based on AEP memory, which comprises the steps of:
AEP memory configurations strategy is set;
Internally deposit into capable encryption;
Encrypted AEP memory is decrypted after whether detection encryption is successful and to verifying.
2. a kind of password authentification test method based on AEP memory according to claim 1, which is characterized in that setting AEP Before memory configurations strategy, comprising:
Environmental structure is carried out to server to be measured and the driving of AEP memory is installed.
3. a kind of password authentification test method based on AEP memory according to claim 2, which is characterized in that setting AEP Memory configurations strategy, comprising:
Memorymodel or mixed mode are saved as in setting AEP.
4. a kind of password authentification test method based on AEP memory according to claim 3, which is characterized in that detection adds It is close whether it is successful after and verifying during encrypted AEP memory has been decrypted, is verified the encryption of AEP memory, it is specific to wrap It includes:
Password authentification request is sent to authentication server;
It receives the encrypted authentication information that authentication server returns and is stored;
The encrypted authentication information is decrypted when receiving to AEP memory predetermined registration operation to generate identifying code and will generate Identifying code be transferred to authentication server;
When authentication server receives the identifying code and authentication server preset condition matches, verifying is encrypted successfully.
5. a kind of password authentification test method based on AEP memory according to claim 4, which is characterized in that verifying Server is sent after password authentification request, further includes:
Authentication server generates random number according to the password authentification request received and stores the random number;
The random number of generation is encrypted by the encrypted public key that authentication server generates and generates encrypted authentication information.
6. a kind of password authentification test method based on AEP memory according to claim 3 or 5, which is characterized in that detection After whether encryption is successful and to verifying after encrypted AEP memory is decrypted, further includes:
Restart whether test node releases into detection encryption after linux system;
If so, the log that outputs test result, judges whether the AEP memory can be normally carried out encrypting and decrypting according to test result.
7. a kind of password authentification test macro based on AEP memory, which is characterized in that including being equipped in AEP in server to be measured It deposits;
Server to be measured further includes setup module, memory encrypting module and detection module;
Setup module, for AEP memory configurations strategy to be arranged;
Memory encryption/decryption module is decrypted encrypted memory for internally depositing into capable encryption;
Detection module, for whether succeeding to detection encryption/decryption.
8. a kind of password authentification test macro based on AEP memory according to claim 7, which is characterized in that the system It further include environmental structure module;
Environmental structure module installs AEP memory to the AEP memory of server to be measured for carrying out environmental structure to server to be measured Driving.
9. a kind of password authentification test macro based on AEP memory according to claim 8, which is characterized in that the system It further include authentication server, the authentication server is communicatively coupled with server to be measured;
Detection module, for sending the solicited message of password authentification to server to be measured;
The authentication server for receiving the password authentification solicited message of detection module transmission, and returns to encrypted authentication letter Cease server to be measured.
10. a kind of password authentification test macro based on AEP memory according to claim 9, which is characterized in that be verified Server further includes identifying code generation module;
The identifying code generation module, for when receiving to AEP memory predetermined registration operation to the encrypted authentication information into Row decryption is to generate identifying code and the identifying code of generation is transferred to authentication server;
Authentication server adds for when receiving the identifying code and authentication server preset condition matches, returning to verifying Close successful information is to server to be verified.
CN201910147463.3A 2019-02-27 2019-02-27 A kind of password authentification test method and system based on AEP memory Pending CN109918897A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910147463.3A CN109918897A (en) 2019-02-27 2019-02-27 A kind of password authentification test method and system based on AEP memory

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910147463.3A CN109918897A (en) 2019-02-27 2019-02-27 A kind of password authentification test method and system based on AEP memory

Publications (1)

Publication Number Publication Date
CN109918897A true CN109918897A (en) 2019-06-21

Family

ID=66962496

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910147463.3A Pending CN109918897A (en) 2019-02-27 2019-02-27 A kind of password authentification test method and system based on AEP memory

Country Status (1)

Country Link
CN (1) CN109918897A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111984496A (en) * 2020-07-16 2020-11-24 北京字节跳动网络技术有限公司 Method, device, medium and electronic equipment for monitoring stack memory leakage

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140245011A1 (en) * 2013-02-26 2014-08-28 Kabushiki Kaisha Toshiba Device and authentication method therefor
CN107563228A (en) * 2017-08-03 2018-01-09 致象尔微电子科技(上海)有限公司 A kind of method of internal storage data encryption and decryption
CN109033801A (en) * 2018-07-25 2018-12-18 努比亚技术有限公司 Method, mobile terminal and the storage medium of application program verification user identity
CN109240864A (en) * 2018-09-06 2019-01-18 郑州云海信息技术有限公司 A kind of AEP memory DC test method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140245011A1 (en) * 2013-02-26 2014-08-28 Kabushiki Kaisha Toshiba Device and authentication method therefor
CN107563228A (en) * 2017-08-03 2018-01-09 致象尔微电子科技(上海)有限公司 A kind of method of internal storage data encryption and decryption
CN109033801A (en) * 2018-07-25 2018-12-18 努比亚技术有限公司 Method, mobile terminal and the storage medium of application program verification user identity
CN109240864A (en) * 2018-09-06 2019-01-18 郑州云海信息技术有限公司 A kind of AEP memory DC test method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111984496A (en) * 2020-07-16 2020-11-24 北京字节跳动网络技术有限公司 Method, device, medium and electronic equipment for monitoring stack memory leakage
CN111984496B (en) * 2020-07-16 2024-04-16 北京字节跳动网络技术有限公司 Method, device, medium and electronic equipment for monitoring stack memory leakage

Similar Documents

Publication Publication Date Title
JP4410821B2 (en) Verifying the binding of the initial trusted device to the protected processing system
JP5522307B2 (en) System and method for remote maintenance of client systems in electronic networks using software testing with virtual machines
CN100499652C (en) Communication apparatus and authentication apparatus and method, and operation method
JPH10282884A (en) Data processing method and its system
US10102378B2 (en) Boot images for units under test
CN104104650B (en) data file access method and terminal device
US20130055228A1 (en) System and Method for Installing a Patch on a Computing System
CN110324315B (en) Off-line authentication system and method thereof
CN114513310A (en) Authentication method and device for vehicle diagnosis equipment, electronic equipment and medium
CN110990124A (en) Cloud host recovery method and device
CN108400875A (en) Authorization and authentication method, system, electronic equipment, storage medium based on key assignments
CN114244503B (en) Password equipment performance test method
CN109918897A (en) A kind of password authentification test method and system based on AEP memory
CN113821446A (en) Test verification method and device for transaction system
CN117032908A (en) Integrated computing device deployment operation method and system based on redundancy architecture
CN114884661B (en) Hybrid security service cryptographic system
US11706027B2 (en) Systems and methods for managing a compromised autonomous vehicle server
CN115618366A (en) Authentication method and device for server
CN102096777B (en) Secure programming of vehicle modules
JP5053756B2 (en) Certificate verification server, certificate verification method, and certificate verification program
CN109446785B (en) A kind of memory management method of smart card and its personal data
CN105808439B (en) Application program of intelligent card remote test system
CN109388474A (en) A kind of detection method and system of Qemu virtual credible root data integrity
CN113506107B (en) Method for realizing block chain link point virtualization and block chain node
CN117938405B (en) CDN service arrangement method, device, equipment and storage medium in multi-cloud environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190621