CN114221814A - System, method, device, processor and computer readable storage medium for realizing terminal equipment safe opening of special service - Google Patents

System, method, device, processor and computer readable storage medium for realizing terminal equipment safe opening of special service Download PDF

Info

Publication number
CN114221814A
CN114221814A CN202111541239.6A CN202111541239A CN114221814A CN 114221814 A CN114221814 A CN 114221814A CN 202111541239 A CN202111541239 A CN 202111541239A CN 114221814 A CN114221814 A CN 114221814A
Authority
CN
China
Prior art keywords
message
service
request
special service
terminal equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111541239.6A
Other languages
Chinese (zh)
Other versions
CN114221814B (en
Inventor
李小国
朱洪臣
季鸣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taicang T&W Electronics Co Ltd
Original Assignee
Shanghai Gongjin Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Gongjin Communication Technology Co Ltd filed Critical Shanghai Gongjin Communication Technology Co Ltd
Priority to CN202111541239.6A priority Critical patent/CN114221814B/en
Publication of CN114221814A publication Critical patent/CN114221814A/en
Application granted granted Critical
Publication of CN114221814B publication Critical patent/CN114221814B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention relates to a system for realizing the safe starting of a special service by a terminal device, which comprises a PC end and the terminal device, wherein the PC end is communicated with the terminal device through a network, the PC end is used for encrypting a message and sending a request for starting the special service to the terminal device, the terminal device is used for receiving and analyzing the request, and if the request meets a corresponding rule, the terminal device starts the corresponding special service. The invention also relates to a method, a device, a processor and a computer readable storage medium for realizing the safe opening of the special service of the terminal equipment. By adopting the system, the method, the device, the processor and the computer readable storage medium for realizing the safe opening of the special service of the terminal equipment, the corresponding service can be safely opened, and the external network attack can be effectively prevented.

Description

System, method, device, processor and computer readable storage medium for realizing terminal equipment safe opening of special service
Technical Field
The invention relates to the field of embedded communication, in particular to the field of security services, and specifically relates to a system, a method, a device, a processor and a computer readable storage medium for realizing the secure opening of a special service of a terminal device.
Background
The number of the current terminal devices is increasing, and the services required to be started may be different in different scenes. Therefore, a method for safely starting a service is needed for a device terminal to meet the requirements of different scenes.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a system, a method, a device, a processor and a computer readable storage medium thereof, which have the advantages of good safety, simple and convenient operation and wide application range and can realize the safe starting of special services of terminal equipment.
In order to achieve the above object, the system, method, apparatus, processor and computer readable storage medium for implementing secure special service opening of terminal device of the present invention are as follows:
the system for realizing the safe starting of the special service by the terminal equipment is mainly characterized by comprising a PC end and the terminal equipment, wherein the PC end is communicated with the terminal equipment through a network, the PC end is used for encrypting a message and sending a request for starting the special service to the terminal equipment, the terminal equipment is used for receiving and analyzing the request, and if the request meets the corresponding rule, the terminal equipment starts the corresponding special service.
Preferably, the rule is obtained according to an initial key, a format of the request message, a format of the rule, and a service rule mapping table, and the special service corresponds to different rules.
Preferably, the format of the rule includes the number of request messages and the time interval for sending each message.
Preferably, the PC and the terminal device share the initial password and the service rule mapping table, and the initial password and the service rule mapping table are updated periodically.
The method for realizing the safe starting of the special service by using the system is mainly characterized in that the method comprises the steps that a PC terminal encrypts a message and sends a request for starting the special service to the terminal equipment, and the method specifically comprises the following processing procedures:
(1-1) the PC searches for a corresponding rule in the service rule mapping table according to the service name, and searches for the number N of messages to be sent and a time interval T1;
(1-2) the PC encrypts and transmits a first message through an initial password;
(1-3) generating a random password, filling message contents, and starting a timer;
(1-4) after waiting for a time interval T1, updating the sending time stamp of the message, encrypting the message through the random password generated in the step (1-3), and sending out the message;
(1-5) judging whether the number N of the sent messages is not exceeded, if so, continuing the step (1-3); otherwise, the step is ended.
Preferably, the method includes a step of receiving, analyzing and starting a service request by a terminal device, and specifically includes the following processing procedures:
(2-1) starting to monitor the request message;
(2-2) receiving the request message, decrypting the message through the initial password, and continuing the step (2-3) if the decryption is successful; otherwise, continuing to decrypt;
(2-3) caching the message of the message, and storing the obtained random password, wherein the random password is used for decrypting the next message;
(2-4) judging whether the message is the first message or not, if so, setting overtime time T2, and searching a corresponding rule in a service rule mapping table according to the service name; otherwise, continuing the step (2-5);
(2-5) judging whether the timeout time T2 is exceeded, if so, continuing the step (2-8); otherwise, continuing the step (2-6);
(2-6) judging whether the received message meets the corresponding rule, if so, continuing the step (2-7); otherwise, continuing the step (2-1);
(2-7) the terminal starts the corresponding service;
and (2-8) clearing the cache information.
Preferably, the message content includes a request sequence number, a PC device MAC address, a terminal device MAC address, a service name, a key for next message decryption, and a transmission timestamp.
The device for realizing the safe opening of the special service of the terminal equipment is mainly characterized by comprising the following components:
a processor configured to execute computer-executable instructions;
and the memory stores one or more computer-executable instructions, and when the computer-executable instructions are executed by the processor, the steps of the method for realizing the safe opening of the special service of the terminal equipment are realized.
The processor for realizing the safe opening of the special service of the terminal equipment is mainly characterized in that the processor is configured to execute computer executable instructions, and when the computer executable instructions are executed by the processor, the steps of the method for realizing the safe opening of the special service of the terminal equipment are realized.
The computer-readable storage medium is mainly characterized in that a computer program is stored thereon, and the computer program can be executed by a processor to implement the steps of the method for realizing the safe opening of the special service of the terminal equipment.
By adopting the system, the method, the device, the processor and the computer readable storage medium for realizing the safe starting of the special service of the terminal equipment, the PC is responsible for sending a request for starting the special service to the terminal equipment through the network; the terminal device is responsible for receiving and parsing the request. If the request can meet the corresponding rule, the terminal equipment opens the corresponding service, otherwise, the terminal equipment refuses to open the service. The invention can safely open the corresponding service and effectively prevent external network attack.
Drawings
Fig. 1 is a flowchart of a PC sending request message for implementing a method for safely opening a special service by a terminal device according to the present invention.
Fig. 2 is a flowchart of the terminal device receiving and parsing the request message according to the method for implementing the terminal device to safely open the special service of the present invention.
Detailed Description
In order to more clearly describe the technical contents of the present invention, the following further description is given in conjunction with specific embodiments.
The system for realizing the safe starting of the special service by the terminal equipment comprises a PC end and the terminal equipment, wherein the PC end is communicated with the terminal equipment through a network, the PC end is used for encrypting a message and sending a request for starting the special service to the terminal equipment, the terminal equipment is used for receiving and analyzing the request, and if the request meets the corresponding rule, the terminal equipment starts the corresponding special service.
As a preferred embodiment of the present invention, the rule is obtained according to an initial key, a format of the request packet, a format of the rule, and a service rule mapping table, and the special service corresponds to different rules.
As a preferred embodiment of the present invention, the format of the rule includes the number of request messages and the time interval of sending each message.
As a preferred embodiment of the present invention, the PC and the terminal device share the initial password and the service rule mapping table, and the initial password and the service rule mapping table are updated periodically.
The method for realizing the safe starting of the special service by the terminal equipment by utilizing the system comprises the steps of encrypting a message by the PC end and sending a request for starting the special service to the terminal equipment, and specifically comprises the following processing procedures:
(1-1) the PC searches for a corresponding rule in the service rule mapping table according to the service name, and searches for the number N of messages to be sent and a time interval T1;
(1-2) the PC encrypts and transmits a first message through an initial password;
(1-3) generating a random password, filling message contents, and starting a timer;
(1-4) after waiting for a time interval T1, updating the sending time stamp of the message, encrypting the message through the random password generated in the step (1-3), and sending out the message;
(1-5) judging whether the number N of the sent messages is not exceeded, if so, continuing the step (1-3); otherwise, the step is ended.
The method comprises the steps that the terminal equipment receives, analyzes and starts a service request, and specifically comprises the following processing procedures:
(2-1) starting to monitor the request message;
(2-2) receiving the request message, decrypting the message through the initial password, and continuing the step (2-3) if the decryption is successful; otherwise, continuing to decrypt;
(2-3) caching the message of the message, and storing the obtained random password, wherein the random password is used for decrypting the next message;
(2-4) judging whether the message is the first message or not, if so, setting overtime time T2, and searching a corresponding rule in a service rule mapping table according to the service name; otherwise, continuing the step (2-5);
(2-5) judging whether the timeout time T2 is exceeded, if so, continuing the step (2-8); otherwise, continuing the step (2-6);
(2-6) judging whether the received message meets the corresponding rule, if so, continuing the step (2-7); otherwise, continuing the step (2-1);
(2-7) the terminal starts the corresponding service;
and (2-8) clearing the cache information.
As a preferred embodiment of the present invention, the message content includes a request serial number, a PC device MAC address, a terminal device MAC address, a service name, a key for next message decryption, and a transmission timestamp.
The invention relates to a device for realizing the safe opening of special services by terminal equipment, wherein the device comprises:
a processor configured to execute computer-executable instructions;
and the memory stores one or more computer-executable instructions, and when the computer-executable instructions are executed by the processor, the steps of the method for realizing the safe opening of the special service of the terminal equipment are realized.
The processor for realizing the safe opening of the special service of the terminal equipment is configured to execute computer executable instructions, and when the computer executable instructions are executed by the processor, the steps of the method for realizing the safe opening of the special service of the terminal equipment are realized.
The computer readable storage medium of the present invention has a computer program stored thereon, where the computer program is executable by a processor to implement the steps of the method for implementing secure switching on of a special service by a terminal device described above.
The invention discloses a method for safely starting special service by terminal equipment. The invention aims to ensure that the terminal equipment can safely start different services to meet the requirements of different scenes.
The technical scheme adopted by the invention for realizing the purpose of the invention is as follows: the method relates to a PC, a terminal device and a set of rules for judging whether a service starting request passes, wherein the PC and the terminal device can communicate through a network. The PC is responsible for sending a request for starting a special service to the terminal equipment through the network; the terminal device is responsible for receiving and parsing the request. If the request can meet the corresponding rule, the terminal equipment opens the corresponding service, otherwise, the terminal equipment refuses to open the service. The method can safely open the corresponding service and effectively prevent external network attack.
The rule for starting the special service request by the equipment terminal relates to an initial key, the format of a request message, the format of the rule and a service rule mapping table. Wherein:
the initial key is used to encrypt the request message.
The format of the request message includes the following: request sequence number, PC equipment MAC address, terminal equipment MAC address, service name, next message decryption key and sending timestamp.
The format of the rules includes the following: the number of request messages, the time interval for each message transmission.
Each service corresponds to a different rule, so the number of request messages and the time interval corresponding to each service are different.
As shown in fig. 1, the PC and the terminal device share an initial password and a service rule mapping table, which may be updated periodically.
The process of sending a service opening request by a PC is specifically as follows:
a1, PC according to the business name to find the corresponding rule in the business rule mapping table, to obtain the message quantity N and time interval T1 needed to be sent;
a2, PC uses the initial password to encrypt the first message, and sends out; simultaneously starting a timer and randomly generating a key for encrypting the next message;
a3, after the time interval T1, the sending time stamp of the message is updated, 1 is added to the request, the new message is encrypted by the key randomly generated in the previous step and then sent out; simultaneously randomly generating a key for encrypting the next message;
and A4, repeating the step A3 until the request process is finished after N request messages are sent.
As shown in fig. 2, the process of receiving, analyzing and opening the service request by the terminal device is specifically as follows:
b1, starting to monitor the request message; when a request message is received, firstly, decrypting the message by using an initial password; if the decryption is successful and the request serial number is 1, searching a corresponding rule in a service rule mapping table according to the service name, and storing the obtained random password for decrypting the next request message;
b2, setting overtime time T2 according to rules, if the time exceeds T2 and the request message is not received, judging that the request fails;
b3, continuing to receive the request message, and when receiving the next request message, decrypting the message by using the random password obtained last time, and simultaneously storing a new random password;
and B4, repeating the step B3, and when the number of the received request messages meets the corresponding rule requirements, checking the time stamp of each message and calculating the time interval. If the time interval, the MAC address and the request sequence number are all right and the time T2 is not exceeded, the request is successful, and the terminal opens the corresponding service.
When the terminal equipment judges whether a service needs to be started, a service rule mapping table needs to be searched; and each rule is composed of the number of request messages sent and the interval of sending messages.
The message sent by the PC needs to be encrypted, the encryption key of the subsequent message is different from that of the previous message, and the encryption keys of the subsequent message are randomly generated. The sending time interval of the front and back messages is obtained by subtracting the time stamps in the message contents.
For a specific implementation of this embodiment, reference may be made to the relevant description in the above embodiments, which is not described herein again.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that the terms "first," "second," and the like in the description of the present invention are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present invention, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by suitable instruction execution devices. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, and the corresponding program may be stored in a computer readable storage medium, and when executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a separate product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
By adopting the system, the method, the device, the processor and the computer readable storage medium for realizing the safe starting of the special service of the terminal equipment, the PC is responsible for sending a request for starting the special service to the terminal equipment through the network; the terminal device is responsible for receiving and parsing the request. If the request can meet the corresponding rule, the terminal equipment opens the corresponding service, otherwise, the terminal equipment refuses to open the service. The invention can safely open the corresponding service and effectively prevent external network attack.
In this specification, the invention has been described with reference to specific embodiments thereof. It will, however, be evident that various modifications and changes may be made thereto without departing from the broader spirit and scope of the invention. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.

Claims (10)

1. A system for realizing the safe starting of special service of terminal equipment is characterized in that the system comprises a PC end and the terminal equipment, wherein the PC end is communicated with the terminal equipment through a network, the PC end is used for encrypting messages and sending a request for starting the special service to the terminal equipment, the terminal equipment is used for receiving and analyzing the request, and if the request meets the corresponding rule, the terminal equipment starts the corresponding special service.
2. The system for implementing safe opening of a special service by a terminal device according to claim 1, wherein the rule is obtained according to an initial key, a format of a request message, a format of the rule and a service rule mapping table, and the special service corresponds to different rules.
3. The system according to claim 1, wherein the format of the rule includes the number of request messages and the time interval of each message transmission.
4. The system for realizing the secure opening of the special service by the terminal device according to claim 1, wherein the PC terminal and the terminal device share an initial password and a service rule mapping table, and the initial password and the service rule mapping table are updated periodically.
5. A method for implementing terminal equipment to safely open a special service based on the system of claim 1, wherein the method includes the steps of the PC end encrypting a message and sending a request for starting the special service to the terminal equipment, and specifically includes the following processing procedures:
(1-1) the PC searches for a corresponding rule in the service rule mapping table according to the service name, and searches for the number N of messages to be sent and a time interval T1;
(1-2) the PC encrypts and transmits a first message through an initial password;
(1-3) generating a random password, filling message contents, and starting a timer;
(1-4) after waiting for a time interval T1, updating the sending time stamp of the message, encrypting the message through the random password generated in the step (1-3), and sending out the message;
(1-5) judging whether the number N of the sent messages is not exceeded, if so, continuing the step (1-3); otherwise, the step is ended.
6. The method for implementing terminal equipment to safely open a special service according to claim 5, wherein the method includes a step of receiving, analyzing and opening a service request by the terminal equipment, and specifically includes the following processing procedures:
(2-1) starting to monitor the request message;
(2-2) receiving the request message, decrypting the message through the initial password, and continuing the step (2-3) if the decryption is successful; otherwise, continuing to decrypt;
(2-3) caching the message of the message, and storing the obtained random password, wherein the random password is used for decrypting the next message;
(2-4) judging whether the message is the first message or not, if so, setting overtime time T2, and searching a corresponding rule in a service rule mapping table according to the service name; otherwise, continuing the step (2-5);
(2-5) judging whether the timeout time T2 is exceeded, if so, continuing the step (2-8); otherwise, continuing the step (2-6);
(2-6) judging whether the received message meets the corresponding rule, if so, continuing the step (2-7); otherwise, continuing the step (2-1);
(2-7) the terminal starts the corresponding service;
and (2-8) clearing the cache information.
7. The method according to claim 5, wherein the message content includes a request sequence number, a PC device MAC address, a terminal device MAC address, a service name, a key for decrypting the next message, and a transmission timestamp.
8. An apparatus for implementing secure opening of a special service by a terminal device, the apparatus comprising:
a processor configured to execute computer-executable instructions;
a memory storing one or more computer-executable instructions which, when executed by the processor, implement the steps of the method for enabling a terminal device to securely open a special service according to any one of claims 5 to 7.
9. A processor for enabling a terminal device to securely open a special service, wherein the processor is configured to execute computer-executable instructions, and when the computer-executable instructions are executed by the processor, the processor implements the steps of the method for enabling a terminal device to securely open a special service according to any one of claims 5 to 7.
10. A computer-readable storage medium, on which a computer program is stored, the computer program being executable by a processor to implement the steps of the method for enabling a terminal device to securely open a special service according to any one of claims 5 to 7.
CN202111541239.6A 2021-12-16 2021-12-16 System, method, device, processor and computer readable storage medium for realizing terminal equipment safety starting special service Active CN114221814B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111541239.6A CN114221814B (en) 2021-12-16 2021-12-16 System, method, device, processor and computer readable storage medium for realizing terminal equipment safety starting special service

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111541239.6A CN114221814B (en) 2021-12-16 2021-12-16 System, method, device, processor and computer readable storage medium for realizing terminal equipment safety starting special service

Publications (2)

Publication Number Publication Date
CN114221814A true CN114221814A (en) 2022-03-22
CN114221814B CN114221814B (en) 2023-10-27

Family

ID=80702979

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111541239.6A Active CN114221814B (en) 2021-12-16 2021-12-16 System, method, device, processor and computer readable storage medium for realizing terminal equipment safety starting special service

Country Status (1)

Country Link
CN (1) CN114221814B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102822840A (en) * 2011-03-28 2012-12-12 株式会社野村综合研究所 Usage management system and usage management method
CN105162675A (en) * 2014-05-26 2015-12-16 杭州迪普科技有限公司 Session recording and obtaining method and device
CN105939401A (en) * 2016-02-02 2016-09-14 杭州迪普科技有限公司 Method and device for processing message
CN106911632A (en) * 2015-12-22 2017-06-30 中国移动通信集团辽宁有限公司 A kind of method and system of call capability encapsulation
CN109219138A (en) * 2017-07-06 2019-01-15 普天信息技术有限公司 Method, apparatus, electronic equipment and the storage medium of transmission process
CN113079200A (en) * 2021-03-19 2021-07-06 北京三快在线科技有限公司 Data processing method, device and system
CN113572746A (en) * 2021-07-12 2021-10-29 腾讯科技(深圳)有限公司 Data processing method and device, electronic equipment and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102822840A (en) * 2011-03-28 2012-12-12 株式会社野村综合研究所 Usage management system and usage management method
CN105162675A (en) * 2014-05-26 2015-12-16 杭州迪普科技有限公司 Session recording and obtaining method and device
CN106911632A (en) * 2015-12-22 2017-06-30 中国移动通信集团辽宁有限公司 A kind of method and system of call capability encapsulation
CN105939401A (en) * 2016-02-02 2016-09-14 杭州迪普科技有限公司 Method and device for processing message
CN109219138A (en) * 2017-07-06 2019-01-15 普天信息技术有限公司 Method, apparatus, electronic equipment and the storage medium of transmission process
CN113079200A (en) * 2021-03-19 2021-07-06 北京三快在线科技有限公司 Data processing method, device and system
CN113572746A (en) * 2021-07-12 2021-10-29 腾讯科技(深圳)有限公司 Data processing method and device, electronic equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
徐小涛;: "WMN的网络安全威胁及路由安全策略研究", 计算机与网络, no. 14, pages 1 - 3 *

Also Published As

Publication number Publication date
CN114221814B (en) 2023-10-27

Similar Documents

Publication Publication Date Title
US6401204B1 (en) Process for cryptographic code management between a first computer unit and a second computer unit
US8948377B2 (en) Encryption device, encryption system, encryption method, and encryption program
US20220276855A1 (en) Method and apparatus for processing upgrade package of vehicle
CN106790223B (en) Data transmission method, equipment and system
US20110197059A1 (en) Securing out-of-band messages
CN112398651B (en) Quantum secret communication method and device, electronic equipment and storage medium
US8370630B2 (en) Client device, mail system, program, and recording medium
KR20040104724A (en) Secure wireless local or metropolitan area network and related methods
CN108270739B (en) Method and device for managing encryption information
US20160292440A1 (en) Preventing content data leak on mobile devices
US20220272511A1 (en) Subscription data management method and apparatus
CN108400953A (en) Control terminal is surfed the Internet and the method for terminal online, router device and terminal
CN115665138A (en) Automobile OTA (over the air) upgrading system and method
CN114257562B (en) Instant messaging method, device, electronic equipment and computer readable storage medium
KR20190040443A (en) Apparatus and method for creating secure session of smart meter
US7266201B1 (en) Non-disruptive authentication administration
CN112350823B (en) CAN FD communication method between vehicle-mounted controllers
CN106487761B (en) Message transmission method and network equipment
CN114221814A (en) System, method, device, processor and computer readable storage medium for realizing terminal equipment safe opening of special service
CN112566123A (en) Method and device for determining abnormal network node
CN115834210A (en) Quantum secure network data transmitting and receiving method and communication system
CN105792149A (en) Short message processing system and initialization method thereof, short message storage method and reading method
CN111490880B (en) File receiving method and device
WO2021082558A1 (en) Access control method for network slice, apparatus, and storage medium
CN113489589A (en) Data encryption and decryption method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20240108

Address after: 215412 No.89 Jiangnan Road, Ludu Town, Taicang City, Suzhou City, Jiangsu Province

Patentee after: TAICANG T&W ELECTRONICS Co.,Ltd.

Address before: 200235 7th floor, Yuanzhong scientific research building, 1905 Hongmei Road, Xuhui District, Shanghai

Patentee before: SHANGHAI GONGJIN COMMUNICATIONS TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right