CN111246396B - Complete machine burning method and system based on UDP local area network - Google Patents

Complete machine burning method and system based on UDP local area network Download PDF

Info

Publication number
CN111246396B
CN111246396B CN202010011063.2A CN202010011063A CN111246396B CN 111246396 B CN111246396 B CN 111246396B CN 202010011063 A CN202010011063 A CN 202010011063A CN 111246396 B CN111246396 B CN 111246396B
Authority
CN
China
Prior art keywords
firmware
computer
information
burning
packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010011063.2A
Other languages
Chinese (zh)
Other versions
CN111246396A (en
Inventor
袁宏来
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Tuya Information Technology Co Ltd
Original Assignee
Hangzhou Tuya Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Tuya Information Technology Co Ltd filed Critical Hangzhou Tuya Information Technology Co Ltd
Priority to CN202010011063.2A priority Critical patent/CN111246396B/en
Publication of CN111246396A publication Critical patent/CN111246396A/en
Application granted granted Critical
Publication of CN111246396B publication Critical patent/CN111246396B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • G06F8/63Image based installation; Cloning; Build to order
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/164Adaptation or special uses of UDP protocol
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Abstract

The application discloses a complete machine burning method based on a UDP local area network, which comprises the following steps: the lower computer issues a broadcast packet to a specific port of the local area network; the upper computer enters an identity confirmation process after monitoring the broadcast packet; and entering a burning upgrading process after the identity is confirmed. Compared with the prior art, the method has the following beneficial effects: wireless communication can be used by adopting a UDP (user Datagram protocol) communication mode, and assembled finished products do not need to be damaged, so that the rework cost is saved, and the time is saved. Meanwhile, the broadcasting packet can be sent by electrifying the router in a local area network broadcasting packet sending mode, network port setting in a TCP mode is not needed, burning can be carried out by using a common router, and setting difficulty and equipment cost are saved.

Description

Complete machine burning method and system based on UDP local area network
Technical Field
The application relates to the field of Internet of things, in particular to a complete machine burning method based on a UDP local area network.
Background
The scheme is suitable for batch burning firmware work in the whole machine stage of WiFi intelligent products. During the production process of the WiFi product, the firmware may need to be re-burned for the assembled complete machine due to various reasons. Since the complete machine is assembled, the rework will increase the cost undoubtedly, resulting in waste of time and resources. By adopting the scheme, the firmware can be burned and upgraded in batch on the premise of not disassembling the installed complete machine. The waste of cost is reduced, and the batch mode is adopted, and the production speed is improved.
Disclosure of Invention
The main objective of the present application is to provide a complete machine burning method based on UDP local area network, which includes:
the lower computer issues a broadcast packet to a specific port of the local area network;
the upper computer enters an identity confirmation process after monitoring the broadcast packet;
and entering a burning upgrading process after the identity is confirmed.
Optionally, whether the upgrade is needed is determined according to the Mac address, the firmware version information, and the like of the broadcast packet, and if the upgrade is needed, an identity determination process is performed.
Optionally, the identity confirmation procedure is:
the upper computer exchanges information with the firmware information of the firmware to be burned according to account information provided by the cloud;
through a preset interaction flow, the firmware acquires necessary information returned by the cloud end through the upper computer;
and calculating and generating an encryption key according to the necessary information and the firmware information of the firmware.
Optionally, the preset interaction process is as follows:
sending the firmware information to the cloud;
the cloud returns a verification result and generates a key parameter;
after receiving the secret key parameters, the upper computer sends the secret key parameters to the lower computer in an encryption mode through a preset co-channel protocol;
the lower computer returns the cloud computing encryption key parameters for the cloud computing the encryption key;
the lower computer sends the parameters to the upper computer;
and the lower computer generates an encryption key according to the information obtained by identity confirmation, and at the moment, the upper computer and the lower computer both obtain the encryption key.
Optionally, the burn upgrading process includes:
the encryption key used in the burning upgrading process is the encryption key calculated by the lower computer in the identity confirmation process for encryption and decryption;
according to the firmware upgrading file acquired by the cloud, file verification information is sent to the lower computer in advance for subsequent verification of whether the file is correctly burnt or not;
when entering a state of being prepared for upgrading, the upper computer conducts sub-packet encryption on the firmware upgrading file and sends the firmware upgrading file to the lower computer packet by packet;
and after receiving the firmware upgrading file, the lower computer calculates the verification information and judges whether the burning file is successfully sent according to a verification result.
Optionally, the firmware upgrade file is sent to the lower computer packet by packet, and whether a data packet is sent correctly is checked, and if packet loss occurs, the data packet is retransmitted.
According to an aspect of the present application, a complete machine burning system based on the UDP local area network is further provided, which includes:
the lower computer is used for issuing a broadcast packet to a specific port of the local area network;
the upper computer is used for entering an identity confirmation process after monitoring the broadcast packet;
and the burning module is used for entering a burning upgrading process after the identity is confirmed.
The application also discloses a computer device, which comprises a memory, a processor and a computer program stored in the memory and capable of being executed by the processor, wherein the processor realizes the method of any one of the above items when executing the computer program.
The application also discloses a computer-readable storage medium, a non-volatile readable storage medium, having stored therein a computer program which, when executed by a processor, implements the method of any of the above.
The present application also discloses a computer program product comprising computer readable code which, when executed by a computer device, causes the computer device to perform the method of any of the above.
Compared with the prior art, the method has the following beneficial effects:
wireless communication can be used by adopting a UDP (user Datagram protocol) communication mode, and assembled finished products do not need to be damaged, so that the rework cost is saved, and the time is saved. Meanwhile, the broadcasting packet can be sent by electrifying the router in a local area network broadcasting packet sending mode, network port setting in a TCP mode is not needed, burning can be carried out by using a common router, and setting difficulty and equipment cost are saved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, serve to provide a further understanding of the application and to enable other features, objects, and advantages of the application to be more apparent. The drawings and their description illustrate the embodiments of the invention and do not limit it. In the drawings:
fig. 1-2 are schematic flow diagrams of a UDP local area network based complete machine burning method according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a system according to one embodiment of the present application;
FIG. 4 is a schematic diagram of a computer device according to one embodiment of the present application; and
FIG. 5 is a schematic diagram of a computer-readable storage medium according to one embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Referring to fig. 1-3, an embodiment of the present application provides a complete machine burning method based on a UDP local area network, including:
s2: the lower computer issues a broadcast packet to a specific port of the local area network;
s4: the upper computer enters an identity confirmation process after monitoring the broadcast packet;
s6: and entering a burning upgrading process after the identity is confirmed.
In an embodiment of the application, whether the updating is needed is determined according to the Mac address, the firmware version information and the like of the broadcast packet, and if the updating is needed, an identity determination process is performed.
In an embodiment of the present application, the identity verification process includes:
the upper computer exchanges information with the firmware information of the firmware to be burned according to account information provided by the cloud;
through a preset interaction flow, the firmware acquires necessary information returned by the cloud end through the upper computer;
and calculating and generating an encryption key according to the necessary information and the firmware information of the firmware.
In an embodiment of the present application, the preset interaction process is as follows:
sending the firmware information to the cloud;
the cloud returns a verification result and generates a key parameter;
after receiving the secret key parameters, the upper computer sends the secret key parameters to the lower computer in an encryption mode through a preset co-channel protocol;
the lower computer returns the cloud computing encryption key parameters for the cloud computing the encryption key;
the lower computer sends the parameters to the upper computer;
and the lower computer generates an encryption key according to the information obtained by identity confirmation, and at the moment, the upper computer and the lower computer both obtain the encryption key.
In an embodiment of the present application, the recording upgrade process includes:
the encryption key used in the burning upgrading process is the encryption key calculated by the lower computer in the identity confirmation process for encryption and decryption;
according to the firmware upgrading file acquired by the cloud, file verification information is sent to the lower computer in advance for subsequent verification of whether the file is correctly burnt or not;
when entering a state of being prepared for upgrading, the upper computer conducts sub-packet encryption on the firmware upgrading file and sends the firmware upgrading file to the lower computer packet by packet;
and after receiving the firmware upgrading file, the lower computer calculates the verification information and judges whether the burning file is successfully sent according to a verification result.
In an embodiment of the present application, the firmware upgrade file is sent to the lower computer packet by packet, and whether a data packet is sent correctly is checked, and if packet loss occurs, the data packet is retransmitted.
The present application further provides, comprising:
the lower computer is used for issuing a broadcast packet to a specific port of the local area network;
the upper computer is used for entering an identity confirmation process after monitoring the broadcast packet;
and the burning module is used for entering a burning upgrading process after the identity is confirmed.
The firmware batch burning scheme has the roles of finished equipment, upgrading software and a cloud end. The upgrading process is mainly divided into two parts of identity authentication and burning upgrading. Both parts need to encrypt the transmitted data to ensure safety.
First, the cloud part needs to configure firmware information required by firmware upgrade, such as firmware upgrade files, firmware version information, verification information, encryption keys and the like. Meanwhile, the cloud end needs to provide an identity authentication account number for the software. And the software terminal acquires and downloads the cloud information to the local according to the account login condition and enters an upgrade preparation state. The software stores the upgrade firmware file in the local computer and enters a burning process according to the uplink information of the hardware lower computer.
And the lower firmware computer, namely a finished product to be burned, automatically releases a broadcast packet to the specific port number of the local area network after being electrified, wherein the content of the broadcast packet comprises a local Mac address, firmware version information and the like. And the upper computer software enters an identity confirmation process after monitoring the broadcast packet, and the confirmation mode is that information exchange is carried out between the upper computer software and the firmware according to account information provided by the cloud. Through an interaction flow which is agreed in advance, the firmware acquires necessary information returned by the cloud end through the upper computer, and then an encryption key is calculated and generated under the comprehensive information of the cloud end and the firmware, wherein the generated encryption key is used for a subsequent burning and sending packet, and the key is not forwarded through software, so that the security of the key is ensured. In the identity authentication stage, the communication with the firmware lower computer adopts a CBC mode in an AES256 encryption mode, and a secret key needs to be agreed in advance.
And after the encryption key is obtained, the identity authentication process is ended, and a burning upgrading mode is entered. And the encryption key used in the burning upgrading mode is encrypted and decrypted by adopting the encryption key calculated by the firmware in the identity authentication stage. It is ensured that each packet of data is sent encrypted. The encryption mode used here is an AES256 CTR mode, which has a high encryption speed and can ensure the upgrading speed on the premise of ensuring the information security.
The main working contents and the flow of the upper computer of the software system are as follows:
in the identity verification stage, necessary burning information, such as an upgrade firmware file, firmware version information and the like, is acquired through an account number provided by a cloud. And meanwhile, receiving an identity authentication broadcast packet issued by a lower computer of the local area network broadcast data receiving firmware. And determining whether the updating is needed according to the Mac address, the firmware version information and the like of the broadcast packet, and entering an identity authentication process if the updating is needed. And sending the firmware information to the cloud end, and returning a verification result and generating a key parameter by the cloud end. After receiving the data, the software sends the information to the firmware in an encryption mode through a synchronous communication protocol agreed in advance. The firmware returns to the cloud computing encryption key parameters for the cloud computing encryption key, and meanwhile, the key is sent to the software upper computer for subsequent communication encryption. The firmware generates an encryption key according to the effective information obtained by the identity authentication, at the moment, the software upper computer and the firmware lower computer both obtain the effective encryption key, and meanwhile, the key is not transmitted between the software upper computer and the firmware lower computer, so that the safety of data is ensured.
And after the identity authentication stage is finished, entering a burning upgrading stage. In the burning upgrade stage, according to the firmware upgrade file acquired by the cloud, file check information, such as CRC32, is sent to the firmware in advance, so as to check whether the file is burned correctly in the subsequent process. And when entering a state of being prepared for upgrading, the software carries out sub-packet encryption on the firmware file data and sends the data to the firmware packet by packet. Meanwhile, whether the data packet is correctly transmitted needs to be checked, and if packet loss occurs, retransmission needs to be performed. And after the firmware receives all the data packets, calculating a CRC32 value, and considering that the burning file is successfully sent.
Compared with the prior art, the method has the following beneficial effects:
wireless communication can be used by adopting a UDP (user Datagram protocol) communication mode, and assembled finished products do not need to be damaged, so that the rework cost is saved, and the time is saved. Meanwhile, the broadcasting packet can be sent by electrifying the router in a local area network broadcasting packet sending mode, network port setting in a TCP mode is not needed, burning can be carried out by using a common router, and setting difficulty and equipment cost are saved.
Referring to fig. 4, the present application further provides a computer device including a memory, a processor, and a computer program stored in the memory and executable by the processor, wherein the processor implements the method of any one of the above methods when executing the computer program.
Referring to fig. 5, a computer-readable storage medium, a non-volatile readable storage medium, having stored therein a computer program which, when executed by a processor, implements any of the methods described above.
A computer program product comprising computer readable code which, when executed by a computer device, causes the computer device to perform the method of any of the above.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and they may alternatively be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, or fabricated separately as individual integrated circuit modules, or fabricated as a single integrated circuit module from multiple modules or steps. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (6)

1. A complete machine burning method based on a UDP local area network is characterized by comprising the following steps:
the lower computer issues a broadcast packet to a specific port of the local area network;
the upper computer enters an identity confirmation process after monitoring the broadcast packet;
entering a burning upgrading process after the identity is confirmed;
determining whether upgrading is needed according to the Mac address of the broadcast packet and the firmware version information, and entering an identity determination process if upgrading is needed;
the identity confirmation process comprises the following steps: the upper computer exchanges information with the firmware information of the firmware to be burned according to the account information provided by the cloud; through a preset interaction flow, the firmware acquires necessary information returned by the cloud end through the upper computer; calculating and generating an encryption key according to the necessary information and the firmware information of the firmware;
the preset interactive process comprises the following steps: sending the firmware information to the cloud; the cloud returns an identity verification result and a generated key parameter; after receiving the key parameters, the upper computer sends the key parameters to the lower computer in an encryption mode through a preset communication protocol; the lower computer returns the cloud computing encryption key parameters for the cloud computing the encryption key; the lower computer sends the parameters to the upper computer; and the lower computer generates an encryption key according to the burning information obtained by identity confirmation, and at the moment, the upper computer and the lower computer both obtain the encryption key.
2. The UDP local area network-based complete machine burning method according to claim 1, wherein the burning upgrading process comprises the following steps:
an encryption key used in the burning upgrading process is encrypted by the encryption key calculated by the lower computer in the identity confirmation process;
according to the firmware upgrading file acquired by the cloud, file verification information is sent to the lower computer in advance for subsequent verification of whether the file is correctly burnt or not;
when entering a state of being prepared for upgrading, the upper computer conducts sub-packet encryption on the firmware upgrading file and sends the firmware upgrading file to the lower computer packet by packet;
and after receiving the firmware upgrading file, the lower computer calculates the verification information and judges whether the burning file is successfully sent according to a verification result.
3. The UDP local area network-based complete machine burning method according to claim 2,
and sending the firmware upgrading file to the lower computer packet by packet, checking whether a data packet is sent correctly, and if packet loss occurs, retransmitting the data packet.
4. A complete machine burning system based on a UDP local area network is characterized by comprising:
the lower computer is used for issuing a broadcast packet to a specific port of the local area network;
the upper computer is used for entering an identity confirmation process after monitoring the broadcast packet;
the burning module is used for entering a burning upgrading process after the identity is confirmed;
determining whether upgrading is needed according to the Mac address of the broadcast packet and the firmware version information, and entering an identity determination process if upgrading is needed;
the identity confirmation process comprises the following steps: the upper computer exchanges information with the firmware information of the firmware to be burned according to the account information provided by the cloud; through a preset interaction flow, the firmware acquires necessary information returned by the cloud end through the upper computer; calculating and generating an encryption key according to the necessary information and the firmware information of the firmware;
the preset interactive process comprises the following steps: sending the firmware information to the cloud; the cloud returns an identity verification result and a generated key parameter; after receiving the key parameters, the upper computer sends the key parameters to the lower computer in an encryption mode through a preset communication protocol; the lower computer returns the cloud computing encryption key parameters for the cloud computing the encryption key; the lower computer sends the parameters to the upper computer; and the lower computer generates an encryption key according to the burning information obtained by identity confirmation, and at the moment, the upper computer and the lower computer both obtain the encryption key.
5. A computer device comprising a memory, a processor and a computer program stored in the memory and executable by the processor, wherein the processor implements the method of any one of claims 1-3 when executing the computer program.
6. A computer-readable storage medium, a non-transitory readable storage medium, having stored therein a computer program, characterized in that the computer program, when executed by a processor, implements the method according to any one of claims 1-3.
CN202010011063.2A 2020-01-06 2020-01-06 Complete machine burning method and system based on UDP local area network Active CN111246396B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010011063.2A CN111246396B (en) 2020-01-06 2020-01-06 Complete machine burning method and system based on UDP local area network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010011063.2A CN111246396B (en) 2020-01-06 2020-01-06 Complete machine burning method and system based on UDP local area network

Publications (2)

Publication Number Publication Date
CN111246396A CN111246396A (en) 2020-06-05
CN111246396B true CN111246396B (en) 2021-11-09

Family

ID=70879864

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010011063.2A Active CN111246396B (en) 2020-01-06 2020-01-06 Complete machine burning method and system based on UDP local area network

Country Status (1)

Country Link
CN (1) CN111246396B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112994893B (en) * 2021-02-08 2021-12-14 无锡众星微系统技术有限公司 Secret key burning method in chip production test stage
CN114390572B (en) * 2021-12-23 2024-01-23 上海庆科信息技术有限公司 Firmware detection method, device, storage medium, processor and equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201401098A (en) * 2012-06-18 2014-01-01 Hon Hai Prec Ind Co Ltd System and method for verificating firmware
CN103561125A (en) * 2013-10-31 2014-02-05 乐视致新电子科技(天津)有限公司 Burning method, device and system of MAC addresses
CN108418893A (en) * 2018-03-20 2018-08-17 深圳市闪联信息技术有限公司 A kind of method of smart machine firmware safety upgrade
CN109842523A (en) * 2019-02-14 2019-06-04 上海华测导航技术股份有限公司 A kind of firmware upgrade method, device, equipment and storage medium
CN110149370A (en) * 2019-04-23 2019-08-20 华为技术有限公司 A kind of upgrade file method for down loading and device
CN110515633A (en) * 2019-08-30 2019-11-29 深圳市汇顶科技股份有限公司 Burning device and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108156126B (en) * 2016-12-02 2020-12-08 阿里巴巴集团控股有限公司 Burning verification method and device and identity authentication method and device for Internet of things equipment
CN109922145A (en) * 2019-02-28 2019-06-21 深圳市盛弘电气股份有限公司 Charging pile method for upgrading software, charging pile and control equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201401098A (en) * 2012-06-18 2014-01-01 Hon Hai Prec Ind Co Ltd System and method for verificating firmware
CN103561125A (en) * 2013-10-31 2014-02-05 乐视致新电子科技(天津)有限公司 Burning method, device and system of MAC addresses
CN108418893A (en) * 2018-03-20 2018-08-17 深圳市闪联信息技术有限公司 A kind of method of smart machine firmware safety upgrade
CN109842523A (en) * 2019-02-14 2019-06-04 上海华测导航技术股份有限公司 A kind of firmware upgrade method, device, equipment and storage medium
CN110149370A (en) * 2019-04-23 2019-08-20 华为技术有限公司 A kind of upgrade file method for down loading and device
CN110515633A (en) * 2019-08-30 2019-11-29 深圳市汇顶科技股份有限公司 Burning device and system

Also Published As

Publication number Publication date
CN111246396A (en) 2020-06-05

Similar Documents

Publication Publication Date Title
US9766914B2 (en) System and methods for remote maintenance in an electronic network with multiple clients
CN105554098B (en) A kind of equipment configuration method, server and system
CN104811444B (en) A kind of safe cloud control method
CN106209726B (en) Mobile application single sign-on method and device
CN112565213B (en) Authentication method and device, storage medium, and electronic device
CN105050081A (en) Method, device and system for connecting network access device to wireless network access point
CN106341372A (en) Terminal authentication processing method and device, and terminal authentication method, device and system
CN110072236A (en) Equipment connection method, equipment and system
CN113099443A (en) Equipment authentication method, device, equipment and system
CN111246396B (en) Complete machine burning method and system based on UDP local area network
CN104104516A (en) Portal authentication method and device
CN110708164B (en) Control method and device for Internet of things equipment, storage medium and electronic device
CN106972974A (en) The Web network management systems and its terminal authentication method of a kind of electric power LTE wireless terminals
CN107181770A (en) Method of data synchronization and system
CN102143492B (en) Method for establishing virtual private network (VPN) connection, mobile terminal and server
CN112383557B (en) Safety access gateway and industrial equipment communication management method
CN105072132A (en) Validation method, validation system and communication device
CN108429820A (en) A kind of communication means of internet of things application layer, system and terminal device
CN110808991A (en) Method, system, electronic device and storage medium for secure communication connection
CN108989039A (en) Certificate acquisition method and device
CN106452763A (en) Method for employing cipher key through remote virtual USB device
CN114189863B (en) Binding method and device of intelligent door lock, storage medium and electronic device
CN106909826A (en) Password is for action and system
CN109409109A (en) Data processing method, device, processor and server in network service
CN107318100B (en) Method, device and system for binding mobile phone number

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant