CN113746856B - SSL selectable verification method and device, computer equipment and storage medium - Google Patents

SSL selectable verification method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN113746856B
CN113746856B CN202111056874.5A CN202111056874A CN113746856B CN 113746856 B CN113746856 B CN 113746856B CN 202111056874 A CN202111056874 A CN 202111056874A CN 113746856 B CN113746856 B CN 113746856B
Authority
CN
China
Prior art keywords
client
certificate
ssl
server
list
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111056874.5A
Other languages
Chinese (zh)
Other versions
CN113746856A (en
Inventor
穆小庆
掌晓愚
张民航
范峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Koal Safety Technology Co ltd
Original Assignee
Shanghai Koal Safety Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Koal Safety Technology Co ltd filed Critical Shanghai Koal Safety Technology Co ltd
Priority to CN202111056874.5A priority Critical patent/CN113746856B/en
Publication of CN113746856A publication Critical patent/CN113746856A/en
Application granted granted Critical
Publication of CN113746856B publication Critical patent/CN113746856B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses an SSL optional verification method.A client adds a DN item list of a local certificate in an extension item of a sending access message. And the server side matches the locally configured certificate chain according to the extension item, and if the locally configured certificate chain is not matched, the server side does not send the certificate request. Also discloses an SSL optional verification device, computer equipment and storage medium for realizing the SSL optional verification method. When the SSL server is configured with optional authentication, the client with the certificate and the server perform bidirectional SSL handshake and authentication, and the client without the certificate can complete unidirectional SSL handshake with the server without interference.

Description

SSL selectable verification method, device, computer equipment and storage medium
Technical Field
The invention relates to the technical field of computer network communication, in particular to an SSL selectable verification method, an SSL selectable verification device, computer equipment and a storage medium.
Background
The current TLS 1.0/1.2/1.3 protocol and the custom TLS protocol (GB/T38636-2020 Transport Layer Cipher Protocol (TLCP) standard) in China, whether to send a CertificateTeRequest is determined by a server, which brings about the problem that when the server is configured with optional verification, a client browser pops up a certificate selection box even if the client browser does not have a client certificate which can be selected, thereby causing troubles to users. On the contrary, if the server does not send the CertificateRequest, even the browser having the client certificate does not have an opportunity to submit the client certificate.
It is measured on the lower version IE that when the server configures the optional authentication, the browser pops up an empty certificate selection box, and the certificate selection box can click the "confirm" and "cancel" buttons, and the behaviors of the two buttons are also different. The flow diagram for clicking the "confirm" button is shown in fig. 1, and the flow diagram for clicking the "cancel" button is shown in fig. 2. Therefore, when the browser does not have the certificate capability, the certificate selection box is still popped up to enable the user to select the personal certificate, and the user can normally access the personal certificate by clicking the 'confirm' button or the 'cancel' button, but the situation causes a certain degree of trouble for the user.
Therefore, when configuring optional authentication for the SSL server, the behavior of the client popping up a blank certificate selection box must be improved. To this end, the applicant has sought, through useful research and research, a solution to the above-mentioned problems, in the context of which the technical solutions to be described below have been made.
Disclosure of Invention
One of the technical problems to be solved by the invention is as follows: aiming at the defects of the prior art, the SSL selectable verification method which can ensure the two-way SSL handshake and authentication and complete the one-way SSL handshake without interference is provided.
The second technical problem to be solved by the present invention is: an SSL optional authentication apparatus implementing the above SSL optional authentication method is provided.
The third technical problem to be solved by the invention is that: a computer device implementing the SSL selectable authentication method is provided.
The fourth technical problem to be solved by the invention is that: there is provided a computer readable storage medium implementing the SSL alternative authentication method described above.
An SSL alternative authentication method as a first aspect of the present invention includes the steps of:
before SSL handshake is established, whether a client has certificate capability is judged, and a local certificate list is pre-generated at the client;
setting a custom extension item of a client for processing callback;
when the client sends an access message to the server, triggering a callback function of the custom extension item through the client, and setting the value of the extension item in the callback function as a local certificate list pre-generated by the client;
when the server receives an access message sent by the client, matching the user-defined extension item set by the client through the server to judge whether a certificate list matched with the local certificate list exists or not; and
and if the matched certificate list exists, sending a certificate request to the client, and if the matched certificate list does not exist, not sending the certificate request to the client.
In a preferred embodiment of the present invention, the local certificate list pre-generated by the client is an X509_ NAME list.
In a preferred embodiment of the present invention, the client performs callback processing on the custom extension item by calling an SSL _ CTX _ add _ client _ custom _ ext function.
In a preferred embodiment of the present invention, the custom extension term is any of the values in the number fields 65282-65535.
In a preferred embodiment of the present invention, the server performs matching processing on the custom extension item set by the client by calling SSL _ CTX _ add _ server _ custom _ ext.
In a preferred embodiment of the present invention, the server obtains the certificate list through the SSL _ get _ client _ CA _ list function.
An SSL selectable authentication apparatus as a second aspect of the present invention for implementing the above SSL selectable authentication method includes:
the system comprises a certificate list generation module, a local certificate list generation module and a local certificate list generation module, wherein the certificate list generation module is used for judging whether a client has certificate capability before SSL handshake is established and pre-generating a local certificate list at the client;
the user-defined extension item setting module is used for setting a user-defined extension item of the client for processing callback;
the callback function triggering module is used for triggering the callback function of the custom extension item through the client when the client sends an access message to the server, and setting the value of the extension item in the callback function as a local certificate list pre-generated by the client;
the certificate list matching module is used for matching the user-defined expansion items set by the client through the server when the server receives the access message sent by the client so as to judge whether a certificate list matched with the local certificate list exists or not; and
and the matching result processing module is used for sending a certificate request to the client when the matched certificate list exists, and not sending the certificate request to the client when the matched certificate list does not exist.
A computer device as a third aspect of the present invention for implementing the SSL selectable authentication method described above includes a memory and a processor, where the memory stores a computer program, and the processor implements the following steps when executing the computer program:
before SSL handshake is established, whether a client has certificate capability is judged, and a local certificate list is pre-generated at the client;
setting a custom extension item of a client for processing callback;
when the client sends an access message to the server, triggering a callback function of the custom extension item through the client, and setting the value of the extension item in the callback function as a local certificate list pre-generated by the client;
when the server receives an access message sent by the client, matching the user-defined extension item set by the client through the server to judge whether a certificate list matched with the local certificate list exists or not; and
and if the matched certificate list exists, sending a certificate request to the client, and if the matched certificate list does not exist, not sending the certificate request to the client.
A computer-readable storage medium as a fourth aspect of the present invention for implementing the SSL alternative authentication method described above, has a computer program stored thereon, which when executed by a processor, implements the steps of:
before SSL handshake is established, whether a client has certificate capability is judged, and a local certificate list is pre-generated at the client;
setting a custom extension item of a client for processing callback;
when the client sends an access message to the server, triggering a callback function of the custom extension item through the client, and setting the value of the extension item in the callback function as a local certificate list pre-generated by the client;
when the server receives an access message sent by the client, matching the user-defined extension item set by the client through the server to judge whether a certificate list matched with the local certificate list exists or not; and
and if the matched certificate list exists, sending a certificate request to the client, and if the matched certificate list does not exist, not sending the certificate request to the client.
Due to the adoption of the technical scheme, the invention has the beneficial effects that: when the SSL server is configured with optional authentication, the client with the certificate and the server perform bidirectional SSL handshake and authentication, and the client without the certificate can complete unidirectional SSL handshake with the server without interference.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the prior art descriptions will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a simplified flowchart of a conventional browser clicking a "confirm" button when a certificate selection box is ejected.
Fig. 2 is a simplified flowchart of a conventional browser clicking a "cancel" button when popping up a certificate selection box.
Fig. 3 is a diagram of an application scenario of an embodiment of the SSL alternative authentication method of the present invention.
Fig. 4 is a flow chart of an SSL alternative authentication method of the present invention.
Fig. 5 is a schematic structural diagram of an embodiment of an SSL alternative authentication device according to the present invention.
Fig. 6 is an internal structural view of the computer device of the present invention.
Detailed Description
In order to make the technical means, the creation characteristics, the achievement purposes and the effects of the invention easy to understand, the invention is further explained below by combining the specific drawings.
The SSL optional verification method provided by the invention can be applied to the application environment shown in FIG. 3. Wherein, the client 101 communicates with the server 102 through a network. The client 101 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, and the server 102 may be implemented by an independent server or a server cluster formed by a plurality of servers. The client 101 adds a list of DN entries for the local certificate in the extension entry that sent the access message ClientHello. The server 102 matches the locally configured certificate chain according to the extension, and if the locally configured certificate chain is not matched, the certificate request CertificateRequest is not sent. When the SSL server is configured with optional authentication, the client with the certificate and the server perform bidirectional SSL handshake and authentication, and the client without the certificate can complete unidirectional SSL handshake with the server without interference.
Specifically, referring to fig. 4, an SSL alternative authentication method is shown, which includes the following steps:
and step S10, before SSL handshake is established, judging whether the client has certificate capability, and pre-generating a local certificate list at the client. In this embodiment, the local certificate list pre-generated by the client is an X509_ NAME list.
And S20, setting a custom extension item of the client for processing the callback. In this embodiment, the client performs callback processing on the custom extension item by calling an SSL _ CTX _ add _ client _ custom _ ext function. Where the custom extension is any of the number fields 65282-65535 reserved for private use, preferably 65290.
And step S30, when the client sends the access message to the server, triggering a callback function of the custom extension item through the client, and setting the value of the extension item in the callback function as a local certificate list pre-generated by the client.
And step S40, when the server receives the access message sent by the client, matching the user-defined extension item set by the client through the server to judge whether a certificate list matched with the local certificate list exists. In this embodiment, the server performs matching processing on the custom extension item set by the client by calling SSL _ CTX _ add _ server _ custom _ ext. The server acquires the certificate list through an SSL _ get _ client _ CA _ list function.
And step S50, if the matched certificate list exists, sending a certificate request to the client, and if the matched certificate list does not exist, not sending the certificate request to the client.
Referring to fig. 5, the SSL alternative verification apparatus implementing the above SSL alternative verification method includes a certificate list generation module 100, a custom extension setting module 200, a callback function triggering module 300, a certificate list matching module 400, and a matching result processing module 500.
The certificate list generation module 100 is configured to determine whether the client has certificate capability before establishing the SSL handshake, and pre-generate a local certificate list at the client. The custom extension setting module 200 is used for setting a custom extension of the client for processing callback. The callback function triggering module 300 is configured to trigger a callback function of the custom extension item through the client when the client sends an access message to the server, and set a value of an extension item in the callback function as a local certificate list pre-generated by the client. The certificate list matching module 400 is configured to, when the server receives an access message sent by the client, perform matching processing on a custom extension item set by the client through the server, to determine whether a certificate list matching the local certificate list exists. The matching result processing module 500 is configured to send a certificate request to the client when there is a matching certificate list, and not send a certificate request to the client when there is no matching certificate list.
The present invention also provides a computer device for implementing the SSL optional authentication method, where the computer device may be a server, and its internal structure diagram may be as shown in fig. 6. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operating system and the computer program to run on the non-volatile storage medium. The database of the computer device is used for storing user information, record information, files and other data. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement one of the above-described SSL-selectable authentication methods.
It will be appreciated by those skilled in the art that the configuration shown in fig. 6 is a block diagram of only a portion of the configuration associated with the present solution, and does not constitute a limitation on the computer apparatus to which the present solution applies, and that a particular computer apparatus may include more or less components than those shown in the drawings, or may combine certain components, or have a different arrangement of components.
Specifically, the computer device of the present invention includes a memory storing a computer program and a processor implementing the following steps when the processor executes the computer program:
before SSL handshake is established, whether a client has certificate capability is judged, and a local certificate list is pre-generated at the client;
setting a custom extension item of a client for processing callback;
when the client sends an access message to the server, triggering a callback function of the custom extension item through the client, and setting the value of the extension item in the callback function as a local certificate list pre-generated by the client;
when the server receives an access message sent by the client, matching the user-defined extension item set by the client through the server to judge whether a certificate list matched with the local certificate list exists or not; and
and if the matched certificate list exists, sending a certificate request to the client, and if the matched certificate list does not exist, not sending the certificate request to the client.
The present invention also provides a computer-readable storage medium for implementing the SSL selectable authentication method described above, having a computer program stored thereon, which when executed by a processor implements the steps of:
before SSL handshake is established, whether a client has certificate capability is judged, and a local certificate list is pre-generated at the client;
setting a custom extension item of a client for processing callback;
when the client sends an access message to the server, triggering a callback function of the custom extension item through the client, and setting the value of the extension item in the callback function as a local certificate list pre-generated by the client;
when the server receives an access message sent by the client, matching the user-defined extension item set by the client through the server to judge whether a certificate list matched with the local certificate list exists or not; and
and if the matched certificate list exists, sending a certificate request to the client, and if the matched certificate list does not exist, not sending the certificate request to the client.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), rambus (Rambus) direct RAM (RDRAM), direct Rambus Dynamic RAM (DRDRAM), and Rambus Dynamic RAM (RDRAM), among others.
The foregoing shows and describes the general principles and features of the present invention, together with the advantages thereof. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, which are given by way of illustration of the principles of the present invention, but that various changes and modifications may be made without departing from the spirit and scope of the invention, and such changes and modifications are within the scope of the invention as claimed. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (9)

1. An SSL selectable authentication method, comprising the steps of:
before SSL handshake is established, whether a client has certificate capability is judged, and a local certificate list is pre-generated at the client;
setting a custom extension item of a client for processing callback;
when the client sends an access message to the server, triggering a callback function of the custom extension item through the client, and setting the value of the extension item in the callback function as a local certificate list pre-generated by the client;
when the server receives an access message sent by the client, matching the user-defined extension item set by the client through the server to judge whether a certificate list matched with the local certificate list exists or not; and
and if the matched certificate list exists, sending a certificate request to the client, and if the matched certificate list does not exist, not sending the certificate request to the client.
2. The SSL selectable authentication method of claim 1, wherein the client pre-generated list of local certificates is an X509_ NAME list.
3. The SSL selectable verification method of claim 1, wherein the client performs callback processing on the custom extension item by calling an SSL _ CTX _ add _ client _ custom _ ext function.
4. The SSL selectable verification method of claim 1, wherein the custom extension term is any of the values in the number fields 65282-65535.
5. The SSL selectable verification method as claimed in claim 1, wherein the server performs matching processing on the custom extension set by the client by calling SSL _ CTX _ add _ server _ custom _ ext.
6. The SSL alternative authentication method of claim 1, wherein the server obtains the list of certificates through an SSL _ get _ client _ CA _ list function.
7. An SSL-selectable authentication apparatus, comprising:
the system comprises a certificate list generation module, a local certificate list generation module and a local certificate list generation module, wherein the certificate list generation module is used for judging whether a client has certificate capability before SSL handshake is established and pre-generating a local certificate list at the client;
the user-defined extension item setting module is used for setting a user-defined extension item of the client for processing callback;
the callback function triggering module is used for triggering the callback function of the custom extension item through the client when the client sends an access message to the server, and setting the value of the extension item in the callback function as a local certificate list pre-generated by the client;
the certificate list matching module is used for matching the user-defined expansion items set by the client through the server when the server receives the access message sent by the client so as to judge whether a certificate list matched with the local certificate list exists or not; and
and the matching result processing module is used for sending a certificate request to the client when the matched certificate list exists, and not sending the certificate request to the client when the matched certificate list does not exist.
8. A computer arrangement comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of any one of claims 1 to 6 when executing the computer program.
9. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of any one of claims 1 to 6.
CN202111056874.5A 2021-09-09 2021-09-09 SSL selectable verification method and device, computer equipment and storage medium Active CN113746856B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111056874.5A CN113746856B (en) 2021-09-09 2021-09-09 SSL selectable verification method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111056874.5A CN113746856B (en) 2021-09-09 2021-09-09 SSL selectable verification method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113746856A CN113746856A (en) 2021-12-03
CN113746856B true CN113746856B (en) 2023-04-07

Family

ID=78737599

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111056874.5A Active CN113746856B (en) 2021-09-09 2021-09-09 SSL selectable verification method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113746856B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115208617B (en) * 2022-05-19 2024-04-05 上海格尔安全科技有限公司 Web session detection method, device, computer equipment and storage medium
CN115021932A (en) * 2022-05-30 2022-09-06 支付宝(杭州)信息技术有限公司 Authentication method for handshake process of TLCP protocol

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103685187A (en) * 2012-09-14 2014-03-26 华耀(中国)科技有限公司 Method for switching SSL (Secure Sockets Layer) authentication mode on demands to achieve resource access control
CN103906050A (en) * 2012-12-30 2014-07-02 航天信息股份有限公司 WPKI security monitoring and control method and system based on mobile terminal
CN104094554A (en) * 2012-01-27 2014-10-08 微软公司 Implicit SSL certificate management without server name indication (SNI)
EP3425870A1 (en) * 2017-07-06 2019-01-09 Citrix Systems, Inc. Method for optimization of the connection setup of an ssl proxy

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP7300347B2 (en) * 2019-09-04 2023-06-29 株式会社日立製作所 How to control connections with clients or servers

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104094554A (en) * 2012-01-27 2014-10-08 微软公司 Implicit SSL certificate management without server name indication (SNI)
CN103685187A (en) * 2012-09-14 2014-03-26 华耀(中国)科技有限公司 Method for switching SSL (Secure Sockets Layer) authentication mode on demands to achieve resource access control
CN103906050A (en) * 2012-12-30 2014-07-02 航天信息股份有限公司 WPKI security monitoring and control method and system based on mobile terminal
EP3425870A1 (en) * 2017-07-06 2019-01-09 Citrix Systems, Inc. Method for optimization of the connection setup of an ssl proxy

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈庆等.SSL 协议应用中安全技术问题探究.《信息网络安全》.2012,67-71. *

Also Published As

Publication number Publication date
CN113746856A (en) 2021-12-03

Similar Documents

Publication Publication Date Title
CN109743390B (en) Task scheduling method and device, computer equipment and storage medium
CN113746856B (en) SSL selectable verification method and device, computer equipment and storage medium
US11716390B2 (en) Systems and methods for remote management of appliances
CN111143462B (en) Method, apparatus, computer device and storage medium for data export
US20100100927A1 (en) Systems and methods for protecting web based applications from cross site request forgery attacks
CN110602169B (en) Service calling method and device, computer equipment and storage medium
CN112073405A (en) Webpage data loading method and device, computer equipment and storage medium
CN110929202B (en) Page request failure processing method and device and computer equipment
CN110213392B (en) Data distribution method and device, computer equipment and storage medium
CN109413153B (en) Data crawling method and device, computer equipment and storage medium
CN110708247B (en) Message routing method, message routing device, computer equipment and storage medium
CN113259479A (en) Data processing method and equipment
CN112685669A (en) Page rendering method and system
CN111026988A (en) Page loading method, device and system and computer equipment
CN113407498A (en) Data synchronization method, device, cloud platform, system and storage medium
CN110648052B (en) Wind control decision method and device, computer equipment and storage medium
CN114024745A (en) Method and device for detecting secure transport layer protocol, computer equipment and storage medium
CN110098980B (en) Network debugging method and device, computer equipment and storage medium
US11804986B2 (en) Method for the remote management of a device connected to a residential gateway
CN111597240A (en) Data export method, data export device, computer equipment and storage medium
CN110750511A (en) Operation history restoration method and device, computer equipment and storage medium
TWI572170B (en) Server with share link management and share link management method thereof
CN110224973B (en) Multi-server parallel implementation method based on programming game, electronic equipment and medium
CN114338774A (en) Management method and device of Internet of things equipment, computer equipment and storage medium
CN110072200B (en) Short message sending control processing method and device and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: SSL optional verification methods, devices, computer equipment, and storage media

Granted publication date: 20230407

Pledgee: Chongming Sub branch of Shanghai Rural Commercial Bank Co.,Ltd.

Pledgor: SHANGHAI KOAL SAFETY TECHNOLOGY CO.,LTD.

Registration number: Y2024310000835