CN113746856B - SSL selectable verification method and device, computer equipment and storage medium - Google Patents
SSL selectable verification method and device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN113746856B CN113746856B CN202111056874.5A CN202111056874A CN113746856B CN 113746856 B CN113746856 B CN 113746856B CN 202111056874 A CN202111056874 A CN 202111056874A CN 113746856 B CN113746856 B CN 113746856B
- Authority
- CN
- China
- Prior art keywords
- client
- certificate
- ssl
- server
- list
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 238000012795 verification Methods 0.000 title claims abstract description 15
- 230000006870 function Effects 0.000 claims description 30
- 238000012545 processing Methods 0.000 claims description 21
- 238000004590 computer program Methods 0.000 claims description 13
- 230000002457 bidirectional effect Effects 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 6
- 230000006399 behavior Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses an SSL optional verification method.A client adds a DN item list of a local certificate in an extension item of a sending access message. And the server side matches the locally configured certificate chain according to the extension item, and if the locally configured certificate chain is not matched, the server side does not send the certificate request. Also discloses an SSL optional verification device, computer equipment and storage medium for realizing the SSL optional verification method. When the SSL server is configured with optional authentication, the client with the certificate and the server perform bidirectional SSL handshake and authentication, and the client without the certificate can complete unidirectional SSL handshake with the server without interference.
Description
Technical Field
The invention relates to the technical field of computer network communication, in particular to an SSL selectable verification method, an SSL selectable verification device, computer equipment and a storage medium.
Background
The current TLS 1.0/1.2/1.3 protocol and the custom TLS protocol (GB/T38636-2020 Transport Layer Cipher Protocol (TLCP) standard) in China, whether to send a CertificateTeRequest is determined by a server, which brings about the problem that when the server is configured with optional verification, a client browser pops up a certificate selection box even if the client browser does not have a client certificate which can be selected, thereby causing troubles to users. On the contrary, if the server does not send the CertificateRequest, even the browser having the client certificate does not have an opportunity to submit the client certificate.
It is measured on the lower version IE that when the server configures the optional authentication, the browser pops up an empty certificate selection box, and the certificate selection box can click the "confirm" and "cancel" buttons, and the behaviors of the two buttons are also different. The flow diagram for clicking the "confirm" button is shown in fig. 1, and the flow diagram for clicking the "cancel" button is shown in fig. 2. Therefore, when the browser does not have the certificate capability, the certificate selection box is still popped up to enable the user to select the personal certificate, and the user can normally access the personal certificate by clicking the 'confirm' button or the 'cancel' button, but the situation causes a certain degree of trouble for the user.
Therefore, when configuring optional authentication for the SSL server, the behavior of the client popping up a blank certificate selection box must be improved. To this end, the applicant has sought, through useful research and research, a solution to the above-mentioned problems, in the context of which the technical solutions to be described below have been made.
Disclosure of Invention
One of the technical problems to be solved by the invention is as follows: aiming at the defects of the prior art, the SSL selectable verification method which can ensure the two-way SSL handshake and authentication and complete the one-way SSL handshake without interference is provided.
The second technical problem to be solved by the present invention is: an SSL optional authentication apparatus implementing the above SSL optional authentication method is provided.
The third technical problem to be solved by the invention is that: a computer device implementing the SSL selectable authentication method is provided.
The fourth technical problem to be solved by the invention is that: there is provided a computer readable storage medium implementing the SSL alternative authentication method described above.
An SSL alternative authentication method as a first aspect of the present invention includes the steps of:
before SSL handshake is established, whether a client has certificate capability is judged, and a local certificate list is pre-generated at the client;
setting a custom extension item of a client for processing callback;
when the client sends an access message to the server, triggering a callback function of the custom extension item through the client, and setting the value of the extension item in the callback function as a local certificate list pre-generated by the client;
when the server receives an access message sent by the client, matching the user-defined extension item set by the client through the server to judge whether a certificate list matched with the local certificate list exists or not; and
and if the matched certificate list exists, sending a certificate request to the client, and if the matched certificate list does not exist, not sending the certificate request to the client.
In a preferred embodiment of the present invention, the local certificate list pre-generated by the client is an X509_ NAME list.
In a preferred embodiment of the present invention, the client performs callback processing on the custom extension item by calling an SSL _ CTX _ add _ client _ custom _ ext function.
In a preferred embodiment of the present invention, the custom extension term is any of the values in the number fields 65282-65535.
In a preferred embodiment of the present invention, the server performs matching processing on the custom extension item set by the client by calling SSL _ CTX _ add _ server _ custom _ ext.
In a preferred embodiment of the present invention, the server obtains the certificate list through the SSL _ get _ client _ CA _ list function.
An SSL selectable authentication apparatus as a second aspect of the present invention for implementing the above SSL selectable authentication method includes:
the system comprises a certificate list generation module, a local certificate list generation module and a local certificate list generation module, wherein the certificate list generation module is used for judging whether a client has certificate capability before SSL handshake is established and pre-generating a local certificate list at the client;
the user-defined extension item setting module is used for setting a user-defined extension item of the client for processing callback;
the callback function triggering module is used for triggering the callback function of the custom extension item through the client when the client sends an access message to the server, and setting the value of the extension item in the callback function as a local certificate list pre-generated by the client;
the certificate list matching module is used for matching the user-defined expansion items set by the client through the server when the server receives the access message sent by the client so as to judge whether a certificate list matched with the local certificate list exists or not; and
and the matching result processing module is used for sending a certificate request to the client when the matched certificate list exists, and not sending the certificate request to the client when the matched certificate list does not exist.
A computer device as a third aspect of the present invention for implementing the SSL selectable authentication method described above includes a memory and a processor, where the memory stores a computer program, and the processor implements the following steps when executing the computer program:
before SSL handshake is established, whether a client has certificate capability is judged, and a local certificate list is pre-generated at the client;
setting a custom extension item of a client for processing callback;
when the client sends an access message to the server, triggering a callback function of the custom extension item through the client, and setting the value of the extension item in the callback function as a local certificate list pre-generated by the client;
when the server receives an access message sent by the client, matching the user-defined extension item set by the client through the server to judge whether a certificate list matched with the local certificate list exists or not; and
and if the matched certificate list exists, sending a certificate request to the client, and if the matched certificate list does not exist, not sending the certificate request to the client.
A computer-readable storage medium as a fourth aspect of the present invention for implementing the SSL alternative authentication method described above, has a computer program stored thereon, which when executed by a processor, implements the steps of:
before SSL handshake is established, whether a client has certificate capability is judged, and a local certificate list is pre-generated at the client;
setting a custom extension item of a client for processing callback;
when the client sends an access message to the server, triggering a callback function of the custom extension item through the client, and setting the value of the extension item in the callback function as a local certificate list pre-generated by the client;
when the server receives an access message sent by the client, matching the user-defined extension item set by the client through the server to judge whether a certificate list matched with the local certificate list exists or not; and
and if the matched certificate list exists, sending a certificate request to the client, and if the matched certificate list does not exist, not sending the certificate request to the client.
Due to the adoption of the technical scheme, the invention has the beneficial effects that: when the SSL server is configured with optional authentication, the client with the certificate and the server perform bidirectional SSL handshake and authentication, and the client without the certificate can complete unidirectional SSL handshake with the server without interference.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the prior art descriptions will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a simplified flowchart of a conventional browser clicking a "confirm" button when a certificate selection box is ejected.
Fig. 2 is a simplified flowchart of a conventional browser clicking a "cancel" button when popping up a certificate selection box.
Fig. 3 is a diagram of an application scenario of an embodiment of the SSL alternative authentication method of the present invention.
Fig. 4 is a flow chart of an SSL alternative authentication method of the present invention.
Fig. 5 is a schematic structural diagram of an embodiment of an SSL alternative authentication device according to the present invention.
Fig. 6 is an internal structural view of the computer device of the present invention.
Detailed Description
In order to make the technical means, the creation characteristics, the achievement purposes and the effects of the invention easy to understand, the invention is further explained below by combining the specific drawings.
The SSL optional verification method provided by the invention can be applied to the application environment shown in FIG. 3. Wherein, the client 101 communicates with the server 102 through a network. The client 101 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, and the server 102 may be implemented by an independent server or a server cluster formed by a plurality of servers. The client 101 adds a list of DN entries for the local certificate in the extension entry that sent the access message ClientHello. The server 102 matches the locally configured certificate chain according to the extension, and if the locally configured certificate chain is not matched, the certificate request CertificateRequest is not sent. When the SSL server is configured with optional authentication, the client with the certificate and the server perform bidirectional SSL handshake and authentication, and the client without the certificate can complete unidirectional SSL handshake with the server without interference.
Specifically, referring to fig. 4, an SSL alternative authentication method is shown, which includes the following steps:
and step S10, before SSL handshake is established, judging whether the client has certificate capability, and pre-generating a local certificate list at the client. In this embodiment, the local certificate list pre-generated by the client is an X509_ NAME list.
And S20, setting a custom extension item of the client for processing the callback. In this embodiment, the client performs callback processing on the custom extension item by calling an SSL _ CTX _ add _ client _ custom _ ext function. Where the custom extension is any of the number fields 65282-65535 reserved for private use, preferably 65290.
And step S30, when the client sends the access message to the server, triggering a callback function of the custom extension item through the client, and setting the value of the extension item in the callback function as a local certificate list pre-generated by the client.
And step S40, when the server receives the access message sent by the client, matching the user-defined extension item set by the client through the server to judge whether a certificate list matched with the local certificate list exists. In this embodiment, the server performs matching processing on the custom extension item set by the client by calling SSL _ CTX _ add _ server _ custom _ ext. The server acquires the certificate list through an SSL _ get _ client _ CA _ list function.
And step S50, if the matched certificate list exists, sending a certificate request to the client, and if the matched certificate list does not exist, not sending the certificate request to the client.
Referring to fig. 5, the SSL alternative verification apparatus implementing the above SSL alternative verification method includes a certificate list generation module 100, a custom extension setting module 200, a callback function triggering module 300, a certificate list matching module 400, and a matching result processing module 500.
The certificate list generation module 100 is configured to determine whether the client has certificate capability before establishing the SSL handshake, and pre-generate a local certificate list at the client. The custom extension setting module 200 is used for setting a custom extension of the client for processing callback. The callback function triggering module 300 is configured to trigger a callback function of the custom extension item through the client when the client sends an access message to the server, and set a value of an extension item in the callback function as a local certificate list pre-generated by the client. The certificate list matching module 400 is configured to, when the server receives an access message sent by the client, perform matching processing on a custom extension item set by the client through the server, to determine whether a certificate list matching the local certificate list exists. The matching result processing module 500 is configured to send a certificate request to the client when there is a matching certificate list, and not send a certificate request to the client when there is no matching certificate list.
The present invention also provides a computer device for implementing the SSL optional authentication method, where the computer device may be a server, and its internal structure diagram may be as shown in fig. 6. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operating system and the computer program to run on the non-volatile storage medium. The database of the computer device is used for storing user information, record information, files and other data. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement one of the above-described SSL-selectable authentication methods.
It will be appreciated by those skilled in the art that the configuration shown in fig. 6 is a block diagram of only a portion of the configuration associated with the present solution, and does not constitute a limitation on the computer apparatus to which the present solution applies, and that a particular computer apparatus may include more or less components than those shown in the drawings, or may combine certain components, or have a different arrangement of components.
Specifically, the computer device of the present invention includes a memory storing a computer program and a processor implementing the following steps when the processor executes the computer program:
before SSL handshake is established, whether a client has certificate capability is judged, and a local certificate list is pre-generated at the client;
setting a custom extension item of a client for processing callback;
when the client sends an access message to the server, triggering a callback function of the custom extension item through the client, and setting the value of the extension item in the callback function as a local certificate list pre-generated by the client;
when the server receives an access message sent by the client, matching the user-defined extension item set by the client through the server to judge whether a certificate list matched with the local certificate list exists or not; and
and if the matched certificate list exists, sending a certificate request to the client, and if the matched certificate list does not exist, not sending the certificate request to the client.
The present invention also provides a computer-readable storage medium for implementing the SSL selectable authentication method described above, having a computer program stored thereon, which when executed by a processor implements the steps of:
before SSL handshake is established, whether a client has certificate capability is judged, and a local certificate list is pre-generated at the client;
setting a custom extension item of a client for processing callback;
when the client sends an access message to the server, triggering a callback function of the custom extension item through the client, and setting the value of the extension item in the callback function as a local certificate list pre-generated by the client;
when the server receives an access message sent by the client, matching the user-defined extension item set by the client through the server to judge whether a certificate list matched with the local certificate list exists or not; and
and if the matched certificate list exists, sending a certificate request to the client, and if the matched certificate list does not exist, not sending the certificate request to the client.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), rambus (Rambus) direct RAM (RDRAM), direct Rambus Dynamic RAM (DRDRAM), and Rambus Dynamic RAM (RDRAM), among others.
The foregoing shows and describes the general principles and features of the present invention, together with the advantages thereof. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, which are given by way of illustration of the principles of the present invention, but that various changes and modifications may be made without departing from the spirit and scope of the invention, and such changes and modifications are within the scope of the invention as claimed. The scope of the invention is defined by the appended claims and equivalents thereof.
Claims (9)
1. An SSL selectable authentication method, comprising the steps of:
before SSL handshake is established, whether a client has certificate capability is judged, and a local certificate list is pre-generated at the client;
setting a custom extension item of a client for processing callback;
when the client sends an access message to the server, triggering a callback function of the custom extension item through the client, and setting the value of the extension item in the callback function as a local certificate list pre-generated by the client;
when the server receives an access message sent by the client, matching the user-defined extension item set by the client through the server to judge whether a certificate list matched with the local certificate list exists or not; and
and if the matched certificate list exists, sending a certificate request to the client, and if the matched certificate list does not exist, not sending the certificate request to the client.
2. The SSL selectable authentication method of claim 1, wherein the client pre-generated list of local certificates is an X509_ NAME list.
3. The SSL selectable verification method of claim 1, wherein the client performs callback processing on the custom extension item by calling an SSL _ CTX _ add _ client _ custom _ ext function.
4. The SSL selectable verification method of claim 1, wherein the custom extension term is any of the values in the number fields 65282-65535.
5. The SSL selectable verification method as claimed in claim 1, wherein the server performs matching processing on the custom extension set by the client by calling SSL _ CTX _ add _ server _ custom _ ext.
6. The SSL alternative authentication method of claim 1, wherein the server obtains the list of certificates through an SSL _ get _ client _ CA _ list function.
7. An SSL-selectable authentication apparatus, comprising:
the system comprises a certificate list generation module, a local certificate list generation module and a local certificate list generation module, wherein the certificate list generation module is used for judging whether a client has certificate capability before SSL handshake is established and pre-generating a local certificate list at the client;
the user-defined extension item setting module is used for setting a user-defined extension item of the client for processing callback;
the callback function triggering module is used for triggering the callback function of the custom extension item through the client when the client sends an access message to the server, and setting the value of the extension item in the callback function as a local certificate list pre-generated by the client;
the certificate list matching module is used for matching the user-defined expansion items set by the client through the server when the server receives the access message sent by the client so as to judge whether a certificate list matched with the local certificate list exists or not; and
and the matching result processing module is used for sending a certificate request to the client when the matched certificate list exists, and not sending the certificate request to the client when the matched certificate list does not exist.
8. A computer arrangement comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of any one of claims 1 to 6 when executing the computer program.
9. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111056874.5A CN113746856B (en) | 2021-09-09 | 2021-09-09 | SSL selectable verification method and device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111056874.5A CN113746856B (en) | 2021-09-09 | 2021-09-09 | SSL selectable verification method and device, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113746856A CN113746856A (en) | 2021-12-03 |
CN113746856B true CN113746856B (en) | 2023-04-07 |
Family
ID=78737599
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111056874.5A Active CN113746856B (en) | 2021-09-09 | 2021-09-09 | SSL selectable verification method and device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113746856B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115208617B (en) * | 2022-05-19 | 2024-04-05 | 上海格尔安全科技有限公司 | Web session detection method, device, computer equipment and storage medium |
CN115021932A (en) * | 2022-05-30 | 2022-09-06 | 支付宝(杭州)信息技术有限公司 | Authentication method for handshake process of TLCP protocol |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103685187A (en) * | 2012-09-14 | 2014-03-26 | 华耀(中国)科技有限公司 | Method for switching SSL (Secure Sockets Layer) authentication mode on demands to achieve resource access control |
CN103906050A (en) * | 2012-12-30 | 2014-07-02 | 航天信息股份有限公司 | WPKI security monitoring and control method and system based on mobile terminal |
CN104094554A (en) * | 2012-01-27 | 2014-10-08 | 微软公司 | Implicit SSL certificate management without server name indication (SNI) |
EP3425870A1 (en) * | 2017-07-06 | 2019-01-09 | Citrix Systems, Inc. | Method for optimization of the connection setup of an ssl proxy |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP7300347B2 (en) * | 2019-09-04 | 2023-06-29 | 株式会社日立製作所 | How to control connections with clients or servers |
-
2021
- 2021-09-09 CN CN202111056874.5A patent/CN113746856B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104094554A (en) * | 2012-01-27 | 2014-10-08 | 微软公司 | Implicit SSL certificate management without server name indication (SNI) |
CN103685187A (en) * | 2012-09-14 | 2014-03-26 | 华耀(中国)科技有限公司 | Method for switching SSL (Secure Sockets Layer) authentication mode on demands to achieve resource access control |
CN103906050A (en) * | 2012-12-30 | 2014-07-02 | 航天信息股份有限公司 | WPKI security monitoring and control method and system based on mobile terminal |
EP3425870A1 (en) * | 2017-07-06 | 2019-01-09 | Citrix Systems, Inc. | Method for optimization of the connection setup of an ssl proxy |
Non-Patent Citations (1)
Title |
---|
陈庆等.SSL 协议应用中安全技术问题探究.《信息网络安全》.2012,67-71. * |
Also Published As
Publication number | Publication date |
---|---|
CN113746856A (en) | 2021-12-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109743390B (en) | Task scheduling method and device, computer equipment and storage medium | |
CN113746856B (en) | SSL selectable verification method and device, computer equipment and storage medium | |
US11716390B2 (en) | Systems and methods for remote management of appliances | |
CN111143462B (en) | Method, apparatus, computer device and storage medium for data export | |
US20100100927A1 (en) | Systems and methods for protecting web based applications from cross site request forgery attacks | |
CN110602169B (en) | Service calling method and device, computer equipment and storage medium | |
CN112073405A (en) | Webpage data loading method and device, computer equipment and storage medium | |
CN110929202B (en) | Page request failure processing method and device and computer equipment | |
CN110213392B (en) | Data distribution method and device, computer equipment and storage medium | |
CN109413153B (en) | Data crawling method and device, computer equipment and storage medium | |
CN110708247B (en) | Message routing method, message routing device, computer equipment and storage medium | |
CN113259479A (en) | Data processing method and equipment | |
CN112685669A (en) | Page rendering method and system | |
CN111026988A (en) | Page loading method, device and system and computer equipment | |
CN113407498A (en) | Data synchronization method, device, cloud platform, system and storage medium | |
CN110648052B (en) | Wind control decision method and device, computer equipment and storage medium | |
CN114024745A (en) | Method and device for detecting secure transport layer protocol, computer equipment and storage medium | |
CN110098980B (en) | Network debugging method and device, computer equipment and storage medium | |
US11804986B2 (en) | Method for the remote management of a device connected to a residential gateway | |
CN111597240A (en) | Data export method, data export device, computer equipment and storage medium | |
CN110750511A (en) | Operation history restoration method and device, computer equipment and storage medium | |
TWI572170B (en) | Server with share link management and share link management method thereof | |
CN110224973B (en) | Multi-server parallel implementation method based on programming game, electronic equipment and medium | |
CN114338774A (en) | Management method and device of Internet of things equipment, computer equipment and storage medium | |
CN110072200B (en) | Short message sending control processing method and device and computer equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right |
Denomination of invention: SSL optional verification methods, devices, computer equipment, and storage media Granted publication date: 20230407 Pledgee: Chongming Sub branch of Shanghai Rural Commercial Bank Co.,Ltd. Pledgor: SHANGHAI KOAL SAFETY TECHNOLOGY CO.,LTD. Registration number: Y2024310000835 |