CN114221814A - System, method, device, processor and computer readable storage medium for realizing terminal equipment safe opening of special service - Google Patents
System, method, device, processor and computer readable storage medium for realizing terminal equipment safe opening of special service Download PDFInfo
- Publication number
- CN114221814A CN114221814A CN202111541239.6A CN202111541239A CN114221814A CN 114221814 A CN114221814 A CN 114221814A CN 202111541239 A CN202111541239 A CN 202111541239A CN 114221814 A CN114221814 A CN 114221814A
- Authority
- CN
- China
- Prior art keywords
- message
- service
- request
- special service
- terminal equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 51
- 238000013507 mapping Methods 0.000 claims description 20
- 238000012545 processing Methods 0.000 claims description 7
- 238000004590 computer program Methods 0.000 claims description 6
- 230000005540 biological transmission Effects 0.000 claims description 5
- 230000006870 function Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/068—Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Small-Scale Networks (AREA)
Abstract
The invention relates to a system for realizing the safe starting of a special service by a terminal device, which comprises a PC end and the terminal device, wherein the PC end is communicated with the terminal device through a network, the PC end is used for encrypting a message and sending a request for starting the special service to the terminal device, the terminal device is used for receiving and analyzing the request, and if the request meets a corresponding rule, the terminal device starts the corresponding special service. The invention also relates to a method, a device, a processor and a computer readable storage medium for realizing the safe opening of the special service of the terminal equipment. By adopting the system, the method, the device, the processor and the computer readable storage medium for realizing the safe opening of the special service of the terminal equipment, the corresponding service can be safely opened, and the external network attack can be effectively prevented.
Description
Technical Field
The invention relates to the field of embedded communication, in particular to the field of security services, and specifically relates to a system, a method, a device, a processor and a computer readable storage medium for realizing the secure opening of a special service of a terminal device.
Background
The number of the current terminal devices is increasing, and the services required to be started may be different in different scenes. Therefore, a method for safely starting a service is needed for a device terminal to meet the requirements of different scenes.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a system, a method, a device, a processor and a computer readable storage medium thereof, which have the advantages of good safety, simple and convenient operation and wide application range and can realize the safe starting of special services of terminal equipment.
In order to achieve the above object, the system, method, apparatus, processor and computer readable storage medium for implementing secure special service opening of terminal device of the present invention are as follows:
the system for realizing the safe starting of the special service by the terminal equipment is mainly characterized by comprising a PC end and the terminal equipment, wherein the PC end is communicated with the terminal equipment through a network, the PC end is used for encrypting a message and sending a request for starting the special service to the terminal equipment, the terminal equipment is used for receiving and analyzing the request, and if the request meets the corresponding rule, the terminal equipment starts the corresponding special service.
Preferably, the rule is obtained according to an initial key, a format of the request message, a format of the rule, and a service rule mapping table, and the special service corresponds to different rules.
Preferably, the format of the rule includes the number of request messages and the time interval for sending each message.
Preferably, the PC and the terminal device share the initial password and the service rule mapping table, and the initial password and the service rule mapping table are updated periodically.
The method for realizing the safe starting of the special service by using the system is mainly characterized in that the method comprises the steps that a PC terminal encrypts a message and sends a request for starting the special service to the terminal equipment, and the method specifically comprises the following processing procedures:
(1-1) the PC searches for a corresponding rule in the service rule mapping table according to the service name, and searches for the number N of messages to be sent and a time interval T1;
(1-2) the PC encrypts and transmits a first message through an initial password;
(1-3) generating a random password, filling message contents, and starting a timer;
(1-4) after waiting for a time interval T1, updating the sending time stamp of the message, encrypting the message through the random password generated in the step (1-3), and sending out the message;
(1-5) judging whether the number N of the sent messages is not exceeded, if so, continuing the step (1-3); otherwise, the step is ended.
Preferably, the method includes a step of receiving, analyzing and starting a service request by a terminal device, and specifically includes the following processing procedures:
(2-1) starting to monitor the request message;
(2-2) receiving the request message, decrypting the message through the initial password, and continuing the step (2-3) if the decryption is successful; otherwise, continuing to decrypt;
(2-3) caching the message of the message, and storing the obtained random password, wherein the random password is used for decrypting the next message;
(2-4) judging whether the message is the first message or not, if so, setting overtime time T2, and searching a corresponding rule in a service rule mapping table according to the service name; otherwise, continuing the step (2-5);
(2-5) judging whether the timeout time T2 is exceeded, if so, continuing the step (2-8); otherwise, continuing the step (2-6);
(2-6) judging whether the received message meets the corresponding rule, if so, continuing the step (2-7); otherwise, continuing the step (2-1);
(2-7) the terminal starts the corresponding service;
and (2-8) clearing the cache information.
Preferably, the message content includes a request sequence number, a PC device MAC address, a terminal device MAC address, a service name, a key for next message decryption, and a transmission timestamp.
The device for realizing the safe opening of the special service of the terminal equipment is mainly characterized by comprising the following components:
a processor configured to execute computer-executable instructions;
and the memory stores one or more computer-executable instructions, and when the computer-executable instructions are executed by the processor, the steps of the method for realizing the safe opening of the special service of the terminal equipment are realized.
The processor for realizing the safe opening of the special service of the terminal equipment is mainly characterized in that the processor is configured to execute computer executable instructions, and when the computer executable instructions are executed by the processor, the steps of the method for realizing the safe opening of the special service of the terminal equipment are realized.
The computer-readable storage medium is mainly characterized in that a computer program is stored thereon, and the computer program can be executed by a processor to implement the steps of the method for realizing the safe opening of the special service of the terminal equipment.
By adopting the system, the method, the device, the processor and the computer readable storage medium for realizing the safe starting of the special service of the terminal equipment, the PC is responsible for sending a request for starting the special service to the terminal equipment through the network; the terminal device is responsible for receiving and parsing the request. If the request can meet the corresponding rule, the terminal equipment opens the corresponding service, otherwise, the terminal equipment refuses to open the service. The invention can safely open the corresponding service and effectively prevent external network attack.
Drawings
Fig. 1 is a flowchart of a PC sending request message for implementing a method for safely opening a special service by a terminal device according to the present invention.
Fig. 2 is a flowchart of the terminal device receiving and parsing the request message according to the method for implementing the terminal device to safely open the special service of the present invention.
Detailed Description
In order to more clearly describe the technical contents of the present invention, the following further description is given in conjunction with specific embodiments.
The system for realizing the safe starting of the special service by the terminal equipment comprises a PC end and the terminal equipment, wherein the PC end is communicated with the terminal equipment through a network, the PC end is used for encrypting a message and sending a request for starting the special service to the terminal equipment, the terminal equipment is used for receiving and analyzing the request, and if the request meets the corresponding rule, the terminal equipment starts the corresponding special service.
As a preferred embodiment of the present invention, the rule is obtained according to an initial key, a format of the request packet, a format of the rule, and a service rule mapping table, and the special service corresponds to different rules.
As a preferred embodiment of the present invention, the format of the rule includes the number of request messages and the time interval of sending each message.
As a preferred embodiment of the present invention, the PC and the terminal device share the initial password and the service rule mapping table, and the initial password and the service rule mapping table are updated periodically.
The method for realizing the safe starting of the special service by the terminal equipment by utilizing the system comprises the steps of encrypting a message by the PC end and sending a request for starting the special service to the terminal equipment, and specifically comprises the following processing procedures:
(1-1) the PC searches for a corresponding rule in the service rule mapping table according to the service name, and searches for the number N of messages to be sent and a time interval T1;
(1-2) the PC encrypts and transmits a first message through an initial password;
(1-3) generating a random password, filling message contents, and starting a timer;
(1-4) after waiting for a time interval T1, updating the sending time stamp of the message, encrypting the message through the random password generated in the step (1-3), and sending out the message;
(1-5) judging whether the number N of the sent messages is not exceeded, if so, continuing the step (1-3); otherwise, the step is ended.
The method comprises the steps that the terminal equipment receives, analyzes and starts a service request, and specifically comprises the following processing procedures:
(2-1) starting to monitor the request message;
(2-2) receiving the request message, decrypting the message through the initial password, and continuing the step (2-3) if the decryption is successful; otherwise, continuing to decrypt;
(2-3) caching the message of the message, and storing the obtained random password, wherein the random password is used for decrypting the next message;
(2-4) judging whether the message is the first message or not, if so, setting overtime time T2, and searching a corresponding rule in a service rule mapping table according to the service name; otherwise, continuing the step (2-5);
(2-5) judging whether the timeout time T2 is exceeded, if so, continuing the step (2-8); otherwise, continuing the step (2-6);
(2-6) judging whether the received message meets the corresponding rule, if so, continuing the step (2-7); otherwise, continuing the step (2-1);
(2-7) the terminal starts the corresponding service;
and (2-8) clearing the cache information.
As a preferred embodiment of the present invention, the message content includes a request serial number, a PC device MAC address, a terminal device MAC address, a service name, a key for next message decryption, and a transmission timestamp.
The invention relates to a device for realizing the safe opening of special services by terminal equipment, wherein the device comprises:
a processor configured to execute computer-executable instructions;
and the memory stores one or more computer-executable instructions, and when the computer-executable instructions are executed by the processor, the steps of the method for realizing the safe opening of the special service of the terminal equipment are realized.
The processor for realizing the safe opening of the special service of the terminal equipment is configured to execute computer executable instructions, and when the computer executable instructions are executed by the processor, the steps of the method for realizing the safe opening of the special service of the terminal equipment are realized.
The computer readable storage medium of the present invention has a computer program stored thereon, where the computer program is executable by a processor to implement the steps of the method for implementing secure switching on of a special service by a terminal device described above.
The invention discloses a method for safely starting special service by terminal equipment. The invention aims to ensure that the terminal equipment can safely start different services to meet the requirements of different scenes.
The technical scheme adopted by the invention for realizing the purpose of the invention is as follows: the method relates to a PC, a terminal device and a set of rules for judging whether a service starting request passes, wherein the PC and the terminal device can communicate through a network. The PC is responsible for sending a request for starting a special service to the terminal equipment through the network; the terminal device is responsible for receiving and parsing the request. If the request can meet the corresponding rule, the terminal equipment opens the corresponding service, otherwise, the terminal equipment refuses to open the service. The method can safely open the corresponding service and effectively prevent external network attack.
The rule for starting the special service request by the equipment terminal relates to an initial key, the format of a request message, the format of the rule and a service rule mapping table. Wherein:
the initial key is used to encrypt the request message.
The format of the request message includes the following: request sequence number, PC equipment MAC address, terminal equipment MAC address, service name, next message decryption key and sending timestamp.
The format of the rules includes the following: the number of request messages, the time interval for each message transmission.
Each service corresponds to a different rule, so the number of request messages and the time interval corresponding to each service are different.
As shown in fig. 1, the PC and the terminal device share an initial password and a service rule mapping table, which may be updated periodically.
The process of sending a service opening request by a PC is specifically as follows:
a1, PC according to the business name to find the corresponding rule in the business rule mapping table, to obtain the message quantity N and time interval T1 needed to be sent;
a2, PC uses the initial password to encrypt the first message, and sends out; simultaneously starting a timer and randomly generating a key for encrypting the next message;
a3, after the time interval T1, the sending time stamp of the message is updated, 1 is added to the request, the new message is encrypted by the key randomly generated in the previous step and then sent out; simultaneously randomly generating a key for encrypting the next message;
and A4, repeating the step A3 until the request process is finished after N request messages are sent.
As shown in fig. 2, the process of receiving, analyzing and opening the service request by the terminal device is specifically as follows:
b1, starting to monitor the request message; when a request message is received, firstly, decrypting the message by using an initial password; if the decryption is successful and the request serial number is 1, searching a corresponding rule in a service rule mapping table according to the service name, and storing the obtained random password for decrypting the next request message;
b2, setting overtime time T2 according to rules, if the time exceeds T2 and the request message is not received, judging that the request fails;
b3, continuing to receive the request message, and when receiving the next request message, decrypting the message by using the random password obtained last time, and simultaneously storing a new random password;
and B4, repeating the step B3, and when the number of the received request messages meets the corresponding rule requirements, checking the time stamp of each message and calculating the time interval. If the time interval, the MAC address and the request sequence number are all right and the time T2 is not exceeded, the request is successful, and the terminal opens the corresponding service.
When the terminal equipment judges whether a service needs to be started, a service rule mapping table needs to be searched; and each rule is composed of the number of request messages sent and the interval of sending messages.
The message sent by the PC needs to be encrypted, the encryption key of the subsequent message is different from that of the previous message, and the encryption keys of the subsequent message are randomly generated. The sending time interval of the front and back messages is obtained by subtracting the time stamps in the message contents.
For a specific implementation of this embodiment, reference may be made to the relevant description in the above embodiments, which is not described herein again.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that the terms "first," "second," and the like in the description of the present invention are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present invention, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by suitable instruction execution devices. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, and the corresponding program may be stored in a computer readable storage medium, and when executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a separate product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
By adopting the system, the method, the device, the processor and the computer readable storage medium for realizing the safe starting of the special service of the terminal equipment, the PC is responsible for sending a request for starting the special service to the terminal equipment through the network; the terminal device is responsible for receiving and parsing the request. If the request can meet the corresponding rule, the terminal equipment opens the corresponding service, otherwise, the terminal equipment refuses to open the service. The invention can safely open the corresponding service and effectively prevent external network attack.
In this specification, the invention has been described with reference to specific embodiments thereof. It will, however, be evident that various modifications and changes may be made thereto without departing from the broader spirit and scope of the invention. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.
Claims (10)
1. A system for realizing the safe starting of special service of terminal equipment is characterized in that the system comprises a PC end and the terminal equipment, wherein the PC end is communicated with the terminal equipment through a network, the PC end is used for encrypting messages and sending a request for starting the special service to the terminal equipment, the terminal equipment is used for receiving and analyzing the request, and if the request meets the corresponding rule, the terminal equipment starts the corresponding special service.
2. The system for implementing safe opening of a special service by a terminal device according to claim 1, wherein the rule is obtained according to an initial key, a format of a request message, a format of the rule and a service rule mapping table, and the special service corresponds to different rules.
3. The system according to claim 1, wherein the format of the rule includes the number of request messages and the time interval of each message transmission.
4. The system for realizing the secure opening of the special service by the terminal device according to claim 1, wherein the PC terminal and the terminal device share an initial password and a service rule mapping table, and the initial password and the service rule mapping table are updated periodically.
5. A method for implementing terminal equipment to safely open a special service based on the system of claim 1, wherein the method includes the steps of the PC end encrypting a message and sending a request for starting the special service to the terminal equipment, and specifically includes the following processing procedures:
(1-1) the PC searches for a corresponding rule in the service rule mapping table according to the service name, and searches for the number N of messages to be sent and a time interval T1;
(1-2) the PC encrypts and transmits a first message through an initial password;
(1-3) generating a random password, filling message contents, and starting a timer;
(1-4) after waiting for a time interval T1, updating the sending time stamp of the message, encrypting the message through the random password generated in the step (1-3), and sending out the message;
(1-5) judging whether the number N of the sent messages is not exceeded, if so, continuing the step (1-3); otherwise, the step is ended.
6. The method for implementing terminal equipment to safely open a special service according to claim 5, wherein the method includes a step of receiving, analyzing and opening a service request by the terminal equipment, and specifically includes the following processing procedures:
(2-1) starting to monitor the request message;
(2-2) receiving the request message, decrypting the message through the initial password, and continuing the step (2-3) if the decryption is successful; otherwise, continuing to decrypt;
(2-3) caching the message of the message, and storing the obtained random password, wherein the random password is used for decrypting the next message;
(2-4) judging whether the message is the first message or not, if so, setting overtime time T2, and searching a corresponding rule in a service rule mapping table according to the service name; otherwise, continuing the step (2-5);
(2-5) judging whether the timeout time T2 is exceeded, if so, continuing the step (2-8); otherwise, continuing the step (2-6);
(2-6) judging whether the received message meets the corresponding rule, if so, continuing the step (2-7); otherwise, continuing the step (2-1);
(2-7) the terminal starts the corresponding service;
and (2-8) clearing the cache information.
7. The method according to claim 5, wherein the message content includes a request sequence number, a PC device MAC address, a terminal device MAC address, a service name, a key for decrypting the next message, and a transmission timestamp.
8. An apparatus for implementing secure opening of a special service by a terminal device, the apparatus comprising:
a processor configured to execute computer-executable instructions;
a memory storing one or more computer-executable instructions which, when executed by the processor, implement the steps of the method for enabling a terminal device to securely open a special service according to any one of claims 5 to 7.
9. A processor for enabling a terminal device to securely open a special service, wherein the processor is configured to execute computer-executable instructions, and when the computer-executable instructions are executed by the processor, the processor implements the steps of the method for enabling a terminal device to securely open a special service according to any one of claims 5 to 7.
10. A computer-readable storage medium, on which a computer program is stored, the computer program being executable by a processor to implement the steps of the method for enabling a terminal device to securely open a special service according to any one of claims 5 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111541239.6A CN114221814B (en) | 2021-12-16 | 2021-12-16 | System, method, device, processor and computer readable storage medium for realizing terminal equipment safety starting special service |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111541239.6A CN114221814B (en) | 2021-12-16 | 2021-12-16 | System, method, device, processor and computer readable storage medium for realizing terminal equipment safety starting special service |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114221814A true CN114221814A (en) | 2022-03-22 |
CN114221814B CN114221814B (en) | 2023-10-27 |
Family
ID=80702979
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111541239.6A Active CN114221814B (en) | 2021-12-16 | 2021-12-16 | System, method, device, processor and computer readable storage medium for realizing terminal equipment safety starting special service |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114221814B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102822840A (en) * | 2011-03-28 | 2012-12-12 | 株式会社野村综合研究所 | Usage management system and usage management method |
CN105162675A (en) * | 2014-05-26 | 2015-12-16 | 杭州迪普科技有限公司 | Session recording and obtaining method and device |
CN105939401A (en) * | 2016-02-02 | 2016-09-14 | 杭州迪普科技有限公司 | Method and device for processing message |
CN106911632A (en) * | 2015-12-22 | 2017-06-30 | 中国移动通信集团辽宁有限公司 | A kind of method and system of call capability encapsulation |
CN109219138A (en) * | 2017-07-06 | 2019-01-15 | 普天信息技术有限公司 | Method, apparatus, electronic equipment and the storage medium of transmission process |
CN113079200A (en) * | 2021-03-19 | 2021-07-06 | 北京三快在线科技有限公司 | Data processing method, device and system |
CN113572746A (en) * | 2021-07-12 | 2021-10-29 | 腾讯科技(深圳)有限公司 | Data processing method and device, electronic equipment and storage medium |
-
2021
- 2021-12-16 CN CN202111541239.6A patent/CN114221814B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102822840A (en) * | 2011-03-28 | 2012-12-12 | 株式会社野村综合研究所 | Usage management system and usage management method |
CN105162675A (en) * | 2014-05-26 | 2015-12-16 | 杭州迪普科技有限公司 | Session recording and obtaining method and device |
CN106911632A (en) * | 2015-12-22 | 2017-06-30 | 中国移动通信集团辽宁有限公司 | A kind of method and system of call capability encapsulation |
CN105939401A (en) * | 2016-02-02 | 2016-09-14 | 杭州迪普科技有限公司 | Method and device for processing message |
CN109219138A (en) * | 2017-07-06 | 2019-01-15 | 普天信息技术有限公司 | Method, apparatus, electronic equipment and the storage medium of transmission process |
CN113079200A (en) * | 2021-03-19 | 2021-07-06 | 北京三快在线科技有限公司 | Data processing method, device and system |
CN113572746A (en) * | 2021-07-12 | 2021-10-29 | 腾讯科技(深圳)有限公司 | Data processing method and device, electronic equipment and storage medium |
Non-Patent Citations (1)
Title |
---|
徐小涛;: "WMN的网络安全威胁及路由安全策略研究", 计算机与网络, no. 14, pages 1 - 3 * |
Also Published As
Publication number | Publication date |
---|---|
CN114221814B (en) | 2023-10-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6401204B1 (en) | Process for cryptographic code management between a first computer unit and a second computer unit | |
US8948377B2 (en) | Encryption device, encryption system, encryption method, and encryption program | |
US20220276855A1 (en) | Method and apparatus for processing upgrade package of vehicle | |
CN106790223B (en) | Data transmission method, equipment and system | |
US20110197059A1 (en) | Securing out-of-band messages | |
CN112398651B (en) | Quantum secret communication method and device, electronic equipment and storage medium | |
US8370630B2 (en) | Client device, mail system, program, and recording medium | |
KR20040104724A (en) | Secure wireless local or metropolitan area network and related methods | |
CN108270739B (en) | Method and device for managing encryption information | |
US20160292440A1 (en) | Preventing content data leak on mobile devices | |
US20220272511A1 (en) | Subscription data management method and apparatus | |
CN108400953A (en) | Control terminal is surfed the Internet and the method for terminal online, router device and terminal | |
CN115665138A (en) | Automobile OTA (over the air) upgrading system and method | |
CN114257562B (en) | Instant messaging method, device, electronic equipment and computer readable storage medium | |
KR20190040443A (en) | Apparatus and method for creating secure session of smart meter | |
US7266201B1 (en) | Non-disruptive authentication administration | |
CN112350823B (en) | CAN FD communication method between vehicle-mounted controllers | |
CN106487761B (en) | Message transmission method and network equipment | |
CN114221814A (en) | System, method, device, processor and computer readable storage medium for realizing terminal equipment safe opening of special service | |
CN112566123A (en) | Method and device for determining abnormal network node | |
CN115834210A (en) | Quantum secure network data transmitting and receiving method and communication system | |
CN105792149A (en) | Short message processing system and initialization method thereof, short message storage method and reading method | |
CN111490880B (en) | File receiving method and device | |
WO2021082558A1 (en) | Access control method for network slice, apparatus, and storage medium | |
CN113489589A (en) | Data encryption and decryption method and device and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20240108 Address after: 215412 No.89 Jiangnan Road, Ludu Town, Taicang City, Suzhou City, Jiangsu Province Patentee after: TAICANG T&W ELECTRONICS Co.,Ltd. Address before: 200235 7th floor, Yuanzhong scientific research building, 1905 Hongmei Road, Xuhui District, Shanghai Patentee before: SHANGHAI GONGJIN COMMUNICATIONS TECHNOLOGY Co.,Ltd. |
|
TR01 | Transfer of patent right |