CN115065467A - Method and system for generating SM9 identification public key of intelligent device - Google Patents

Method and system for generating SM9 identification public key of intelligent device Download PDF

Info

Publication number
CN115065467A
CN115065467A CN202210747693.5A CN202210747693A CN115065467A CN 115065467 A CN115065467 A CN 115065467A CN 202210747693 A CN202210747693 A CN 202210747693A CN 115065467 A CN115065467 A CN 115065467A
Authority
CN
China
Prior art keywords
public key
identification
factory
string code
string
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210747693.5A
Other languages
Chinese (zh)
Inventor
赵奕捷
成国强
杨立扬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianyi Digital Life Technology Co Ltd
Original Assignee
Tianyi Digital Life Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianyi Digital Life Technology Co Ltd filed Critical Tianyi Digital Life Technology Co Ltd
Priority to CN202210747693.5A priority Critical patent/CN115065467A/en
Publication of CN115065467A publication Critical patent/CN115065467A/en
Priority to PCT/CN2022/132448 priority patent/WO2024000999A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Abstract

The invention provides a method and a system for generating a national secret SM9 identification public key of an intelligent device. The invention uses the SM9 identification public key as the unique identification of the binding relationship between the intelligent device and the binding user, and the identification public key is generated by the platform server in response to the request of the intelligent device or by the platform server based on the factory string code of the intelligent device and the binding user when the platform server is automatically upgraded/updated, thereby overcoming the potential defects brought by adopting the factory string code of the intelligent device to carry out device identification. The SM9 public key identification generation mode of the invention conforms to the original platform system rule to the maximum extent, and the transformation cost of the original platform server is reduced to the minimum extent. Because the file stored by the user on the platform server is bound to the national secret SM9 identification public key, when the same user binds the same device, it can be assigned the original national secret SM9 identification public key so that the file stored by the user on the platform server is not lost after resetting the device or rebinding.

Description

Method and system for generating SM9 identification public key of intelligent device
Technical Field
The invention relates to the field of intelligent device information security, in particular to a method and a system for generating a public key of a national secret SM9 identifier of an intelligent device.
Background
The development of video monitoring cameras is a digital era mainly based on the network video monitoring system which relies on the embedded technology, takes the network and communication technology as a platform and is characterized by intelligent image analysis, from an initial closed circuit television monitoring system, namely a first generation analog television monitoring system to a later half-digital era video monitoring system based on a PC card insertion type.
Nowadays, intelligent cameras are increasingly used in private and public fields such as home anti-theft scenes and public security scenes, and play a crucial role in the development of the field of video networking technology. For example, through application of the smart camera, a user can view, review or download video content captured by the smart camera in real time, non-real time, by logging in to a platform server (e.g., a cloud platform server, etc.) associated with the smart camera.
However, in some existing smart camera systems, when requesting video content associated with a smart camera and a bound user from a platform server, the smart camera is typically identified by its own factory string code (e.g., device SN code (product serial number)) and requested video content associated therewith. Therefore, if a manufacturer burns repeated factory serial codes into different smart cameras when the manufacturer leaves the factory, the situation that different users see videos in series may occur. For example, the user a and the user B have smart cameras installed in their homes, but the two smart cameras are burned with the same factory string code when they leave the factory. Therefore, when the user a requests the video content shot by the smart camera in the home from the platform server, the video content shot by the smart camera with the same factory string code in the home of the user B is likely to be seen. In addition, in some malicious intrusion scenes, the behavior of viewing the video content of other people by knowing the factory string code of other people's equipment may occur. Two kinds of above situations have produced very big harm to user privacy and public safety, consequently, need a safer mode to sign intelligent camera, prevent to appear the condition of seeing other people's intelligent camera video content by accident or intentionally.
The information security technology SM9 identifies cryptographic algorithms (hereinafter referred to as the "national secret SM9 standard"). Since the use of the signature cryptographic algorithm in the SM9 standard eliminates the cost of purchasing certificates for each device and the tasks of certificate verification and management, key backup and storage, etc., more and more smart devices and platform servers use the SM9 standard for communication. In the SM9 standard, the smart device needs to be identified using a public key (hereinafter referred to as the "SM 9 public key"), the uniqueness of each device identification being crucial. However, the SM9 standard does not specify how to ensure that a SM9 public key unique to each device is generated. Therefore, the invention provides a scheme for generating the SM9 public key for identifying the intelligent camera, so as to avoid potential video cross-viewing possibility.
Disclosure of Invention
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
According to an embodiment of the present invention, there is provided a public key distribution method for public key SM9 executed by a platform server, including: receiving a public key distribution request identified by a secret SM9 from a device, wherein the public key distribution request identified by the secret SM9 comprises user identity information of a user bound by a client of the device and a factory string code of the device; inquiring whether a national secret SM9 identification public key corresponding to the user identity information and the factory string code already exists in a national secret SM9 identification public key data table, wherein each entry in the national secret SM9 identification public key data table comprises the following information: the user identity information, the factory serial code and the national secret SM9 identify a public key; transmitting the SM9 identification public key to the device if a SM9 identification public key corresponding to the user identity information and the factory string code already exists in the SM9 identification public key data table; if no SM9 public key corresponding to the user identity information and the factory string code exists in the SM9 public key identification data table, generating a SM9 public key based on the factory string code included in the SM9 public key allocation request, wherein the SM9 public key has the following characteristics: the length of the generated SM9 identification public key is consistent with the length of the factory string code; the generated SM9 public identification key comprises a part of identification equipment information in the factory string code; the generated SM9 public key identifier comprises a number and letter combination which is increased progressively according to a preset rule; the generated SM9 public key identifies the last bit of the public key as the excluded character in the factory string code; storing the generated SM9 public identification key, the user identity information and the factory string code as an entry into the SM9 public identification key data table; and transmitting the generated secret SM9 identification public key to the device.
According to an embodiment of the present invention, there is provided a method for background update of a public key SM9 identification public key performed by a platform server, including: extracting user identity information of a user bound to a currently networked device to identify matching entries in an original identification information data table, wherein each entry in the original identification information data table comprises the following information: user identity information, identification information character string; judging whether the identification information character string is a factory string code or a national secret SM9 identification public key according to the last bit of the identification information character string in each identified matching entry; if the last bit of the identification information character string is not a character excluded from factory-leaving string codes, identifying the identification information character string as factory-leaving string codes; and updating the identification information character string identified as the factory string code into a national secret SM9 identification public key, wherein the updated national secret SM9 identification public key has the following characteristics: the length of the updated SM9 public key is consistent with the length of the factory string code; the updated SM9 public identification key comprises a part of the identification equipment information in the factory string code; the updated SM9 public key identifier comprises a number and letter combination which is increased according to a preset rule; the updated public key SM9 identifies that the last digit of the public key is an excluded character in the factory string code.
According to an embodiment of the present invention, there is provided a system for distributing public keys identified by a secret SM9, including: one or more devices; a platform server comprising a query module, a generation module, and an assignment module, wherein the query module is configured to: receiving a public key distribution request identified by a secret SM9 from the equipment, wherein the public key distribution request identified by the secret SM9 comprises user identity information of a user bound by a client of the equipment and a factory string code of the equipment; inquiring whether a public key of the SM9 identifier corresponding to the user identity information and the factory string code exists in a public key data table of the SM9 identifier, wherein each entry in the SM9 identifier public key data table comprises the following information: the user identity information, the factory serial code and the national secret SM9 identify a public key; if a national secret SM9 identification public key corresponding to the user identity information and the factory string code already exists in the national secret SM9 identification public key data table, informing the distribution module to transmit the national secret SM9 identification public key to the equipment; wherein the generation module is configured to: if no SM9 public key corresponding to the user identity information and the factory string code exists in the SM9 public key identification data table, generating a SM9 public key based on the factory string code included in the SM9 public key allocation request, wherein the SM9 public key has the following characteristics: the length of the generated SM9 identification public key is consistent with the length of the factory string code; the generated SM9 public identification key comprises a part of identification equipment information in the factory string code; the generated SM9 public key identifier comprises a number and letter combination which is increased progressively according to a preset rule; the generated SM9 public key identifies the last bit of the public key as the excluded character in the factory string code; storing the generated SM9 public identification key, the user identity information and the factory string code as an entry into the SM9 public identification key data table; and wherein the distribution module is configured to transmit the generated secret SM9 identification public key to the device.
According to an embodiment of the present invention, there is provided a system for distributing public keys identified by a secret SM9, including: one or more devices; a platform server comprising a background update module, wherein the background update module is configured to: extracting user identity information of a user bound to a currently networked device to identify matching entries in an original identification information data table, wherein each entry in the original identification information data table comprises the following information: user identity information, identification information character string; judging whether the identification information character string is a factory string code or a national secret SM9 identification public key according to the last bit of the identification information character string in each identified matching entry; if the last bit of the identification information character string is not a character excluded from the factory string code, identifying the identification information character string as the factory string code; and updating the identification information string identified as the factory string code to a national secret SM9 identification public key, wherein the updated national secret SM9 identification public key has the following characteristics: the length of the updated SM9 public key is consistent with the length of the factory string code; the updated SM9 public identification key comprises a part of the identification equipment information in the factory string code; the updated SM9 public key identifier comprises a number and letter combination which is increased according to a preset rule; the updated secret SM9 identifies that the last digit of the public key is an excluded character in the factory string code.
According to an embodiment of the present invention, there is provided a computing device including: a processor; a memory storing instructions that, when executed by the processor, are capable of performing the method as described above.
These and other features and advantages will become apparent upon reading the following detailed description and upon reference to the accompanying drawings. It is to be understood that both the foregoing general description and the following detailed description are explanatory only and are not restrictive of aspects as claimed.
Drawings
So that the manner in which the above recited features of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to embodiments, some of which are illustrated in the appended drawings. It is to be noted, however, that the appended drawings illustrate only some typical aspects of this invention and are therefore not to be considered limiting of its scope, for the description may admit to other equally effective aspects.
Fig. 1 shows a block diagram of a public key distribution system 100 identified by a public key SM9 according to one embodiment of the present invention.
Fig. 2 illustrates a flow diagram of a method 200 for public key SM9 identification public key distribution according to one embodiment of the invention.
Fig. 3 shows a flow diagram of a method 300 for background updating of the public key SM9 identification public key according to one embodiment of the invention.
FIG. 4 shows a block diagram of an exemplary computing device 400 according to an embodiment of the invention.
Detailed Description
The present invention will be described in detail below with reference to the attached drawings, and the features of the present invention will be further apparent from the following detailed description.
The following detailed description refers to the accompanying drawings that illustrate exemplary embodiments of the invention. The scope of the invention is not, however, limited to these embodiments, but is defined by the appended claims. Accordingly, embodiments other than those shown in the drawings, such as modified versions of the illustrated embodiments, are encompassed by the present invention.
References in the specification to "one embodiment," "an example embodiment," etc., indicate that the embodiment may include a particular feature, structure, or characteristic, but every embodiment may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is submitted that it is within the knowledge of one skilled in the relevant art to effect such feature, structure, or characteristic in connection with other embodiments whether or not explicitly described.
The invention provides a method and a system for generating a national secret SM9 identification public key of an intelligent device. The invention uses the SM9 identification public key as the unique identification of the binding relationship between the intelligent device and the binding user, and the identification public key is generated by the platform server in response to the request of the intelligent device or by the platform server based on the factory string code of the intelligent device and the binding user during the autonomous upgrade/update, thereby overcoming the potential defects caused by adopting the factory string code of the intelligent device to carry out the device identification. The SM9 public key identification generation mode of the invention conforms to the original platform system rule to the maximum extent, and the transformation cost of the original platform server is reduced to the minimum extent. Because the file stored by the user on the platform server is bound to the national secret SM9 identification public key, when the same user binds the same device, it can be assigned the original national secret SM9 identification public key so that the file stored by the user on the platform server is not lost after resetting the device or rebinding.
Fig. 1 shows a block diagram of a public key distribution system 100 identified by a secret SM9 according to one embodiment of the invention. As shown in fig. 1, in the smart scenario, a client 101 (e.g., an App on a mobile device, etc.), a user 102 using the client 101, a smart device 103, and a smart home platform server 104 are involved. Generally, in actual use, the client 101 needs to bind with the smart device 103, thereby requesting the platform server 104 for the content stored on the platform server 104 that is associated with the smart device 103 and the user 102 using the client 101.
Although the "background" of the present invention is only exemplified for the video-string-proof scenario, it is fully understood by those skilled in the art that the public key SM9 of the present invention identifies any smart device. Thus, in the context of the present invention, "smart device" 103 may refer to any smart device such as a smart camera, a smart doorbell, a smart television, a smart speaker, a smart refrigerator, and so forth. The invention also extends to other non-intelligent devices. Further, "platform server" 104 may refer to a server capable of interacting with smart devices/clients over a network, such as a remote platform server, a local platform server (such as a device acting as a platform server in a home/corporate intranet), a cloud platform server, and so forth.
According to one embodiment of the invention, the client 101 is configured to initiate a binding request to the smart device 103. For example, when the client 101 is first bound with the smart device 103 or when the client device 101 is newly bound with the smart device 103, the client 101 may provide identity information of the user 102 using the client 101 (e.g., a phone number of the user 102, an email of the user 102, other physical or virtual identification of the user 102, etc.) to associate the user 102 with the smart device 103, such that the client 101 may request content associated with both the smart device 103 and the user 102 from the platform server 104 after binding. The associated content may include, for example: video and/or audio recorded by the smart device 103, images taken by the smart device 103, usage history of the smart device 103, customized personalization information (e.g., playlists specified by the user 102, etc.) of the smart device 103, settings of the smart device 103, and so forth.
According to an embodiment of the invention, the smart device 103 is configured to initiate a public key allocation request to the platform server 104 for the public key SM9 to request the platform server 104 to allocate the public key of the public key SM9 identity to the smart device 103, based on the binding request received from the client 101. The secret SM9 identifies that the public key allocation request may include identity information of the user 102 of the client 101 to be bound and the factory string code of the smart device 103.
According to one embodiment of the invention, the smart device 103 is further configured to acknowledge and store the public key SM9 identification public key assigned by the platform server 104. The assigned secret SM9 identifies that the public key can uniquely identify the binding or association of the user 102 of the client 101 with the smart device 103. In other words, even if a plurality of smart devices 103 having the same factory string code are present, the bound different users of each smart device 103 of the plurality of smart devices 103 can be identified by the assigned public key SM9 identification public key, and the correct data can be returned to the bound users.
According to an embodiment of the present invention, the platform server 104 mainly includes a data table module 105, a query module 106, a generation module 107, a background update module 108, and a distribution module 109. It is fully understood by those skilled in the art that the above modules are illustrated herein for illustrative purposes only, and that the functionality of one or more of the above modules may be combined into a single module or split into multiple modules. Also, one or more of the above various modules may be implemented in software, hardware, or a combination thereof.
According to one embodiment of the invention, the data table module 105 is configured to manage the original identification information data table and the public key SM9 identification public key data table. This management may include, for example, adding, deleting, modifying, etc. data tables.
The original identification information data table is a data table originally used on the platform server to record the device identification information, that is, a data table used before the generation of the public key data table identified by the secret SM 9. For example, the original identification information data table may include the following fields: user identity information, identification information character string. In practice, the information recorded in the "identification information string" is the factory string code of the intelligent device. The original identification information data table may be used for background batch update/upgrade of the factory run string code type identification information character string performed by the platform server 104, so as to update/upgrade the factory run string code type identification information character string to the SM9 identification public key. This will be described in detail later.
The public key SM9 identification public key data table may include the following fields: the intelligent equipment comprises user identity information, a factory serial code of the intelligent equipment and a public key identified by a national secret SM 9. That is, compared with the original identification data table, the "country secret SM9 identification public key" field is actually added to the country secret SM9 identification public key data table for recording the newly generated country secret SM9 identification public key.
Of course, those skilled in the art will appreciate that the above two data tables may also include other fields, such as generation time, update time, and the like. Also, the above field designations are for illustrative purposes only and other designations may be used throughout.
According to an embodiment of the invention, the querying module 106 is configured to query in the public key data table of the public key SM9 stored by the data table module 105 whether the corresponding public key SM9 identification public key already exists, based on the identification information of the user 102 included in the public key allocation request identified by the public key SM9 from the smart device 103 and the factory string code of the smart device 103. If so, the notification distribution module 109 distributes the corresponding public SM9 identification public key to the smart device 103. If not, the secret SM9 identification public key allocation request from the smart device 103 is transmitted to the generation module 107 to generate the secret SM9 identification public key.
According to one embodiment of the invention, the generation module 107 is configured to generate the national secret SM9 identification public key based on a national secret SM9 identification public key allocation request initiated by the smart device 103. As described above, the secret SM9 identifies that the public key allocation request includes the identity information of the user 102 to which the client 101 is to be bound and the factory string code of the smart device 103.
In general, the factory string code of the smart device 103 is a character string having a fixed number of bits predefined by a manufacturer. According to the setting of a manufacturer, different parts in the factory string code can be marked with different information. In the specific example herein, it is assumed that the factory string code is a 15-bit string composed of a combination of letters and numbers, the first 10-bit character is used to identify device information related to manufacturers and smart devices themselves, such as manufacturers, models or factory lots, and the last 5-bit character is a randomly generated character. The factory-leaving string codes can be printed on intelligent equipment or a packaging box according to a two-dimensional code form or a character form. To facilitate human eye recognition, in practice, predetermined anti-aliasing rules may be applied to the factory string code to exclude predetermined characters in the factory string code, for example, "0" and "O" are excluded, "1" and "l" are excluded, or other specified characters (such as "-", ") are excluded from 15 characters that are not easily manually entered. It will be fully appreciated by those skilled in the art that the above examples are merely illustrative and that there may be a variety of factory strings of different lengths and/or different rules.
As described above, in the existing platform server (e.g., the skyward platform server of chinese telecommunications), the smart device is generally identified only by using the factory string code. In the present invention, the length of the SM9 public identifier generated by the generating module 107 is the same as the length of the factory string code and the data format is the same, so that the original identifier data table does not need to be adjusted greatly, and the influence on the original platform server is reduced. In addition, the generated SM9 identification public key still contains a part of the factory-leaving string code, so that the original platform server can still use the original rules to identify information such as the manufacturer, the model, the factory-leaving batch and the like of the intelligent device from the SM9 identification public key, and fault-removing processing can still be carried out when the intelligent device fails.
According to one embodiment of the invention, the public key SM9 identification generated by the generation module 107 may include three parts. The first portion includes a portion of the factory string of the smart device 103 that identifies device information such as manufacturer, model, or factory lot, for example, the first 10 characters of the factory string as described above.
The second part is the national secret SM9 that identifies the last character of the public key that includes the characters excluded from the factory string code, such as the characters specified in the anti-aliasing rules described above (such as "0" and "O", etc.).
The third part is positioned between the first part and the second part, has the length which is the length of the factory string code minus the length of the first part and the length of the second part, and comprises a number and a letter combination which are increased according to a preset rule. Specifically, the third section will use a combination of 0-9 and A-Z, each time incremented by the last allocation record noted in the public key data sheet as identified by the State secret SM 9. For example, starting with all 0 s each time a new allocation is made and incrementing is done according to the country secret SM9 identifying the character in the third part of the last generated country secret SM9 identifying the public key in the public key data table when the new country secret SM9 identifying the public key is generated. As described above, if the first part adopts the first 10-bit characters of the factory string code, the third part will include 4 (i.e., 15-10-1) bits of characters, so that the total length of the SM9 public identification key is the same as the length of the 15-bit factory string code type identification information character string stored in the original identification data table. For example, in the case where the third portion is 4 bits in length, the following incremental example may be generated: 0000. 0001, 0002, …, 9999, A001, A002, …, A999, B001, B002, …, B999, …, Z999, AA00, … and ZZ. Therefore, 167.96 different combinations can be generated by the 4-bit character in the third part, and the distribution requirement of a large number of intelligent devices can be fully met.
It is fully understood by those skilled in the art that the above-described length (e.g., 15 bits) of the factory string code, the character length and the position (e.g., the first 10 bits) of the factory string code describing the device information are illustrative. In practical operation, the secret SM9 may be changed to identify the lengths of the first part and the third part and the positions of the first part and the third part in the public key according to the length and the components of the factory string code actually used (for example, the third part may be before and the first part may be after), as long as the following conditions are satisfied: the SM9 public key identification length is consistent with the factory string code length; the SM9 public key includes the characters of the identification device information in the factory string code; the secret SM9 identifies that the public key includes a combination of numbers and letters that are incremented by a predetermined rule as described above. For example, if the factory string code is 16 bits in length (with the last 6 bits being random characters), then the third portion may comprise 5 (i.e., 16-10-1) bit characters, the following incremental example may be produced: 00000. 00001, 00002, …, 99999, a0001, a0002, …, a9999, B0001, B0002, …, B9999, …, Z9999, AA000, …, zzzzzzzzz. Thus, the 5-bit character in the third portion may result in 6046.62 ten thousand different combinations.
In addition, different from the conventional random number method, the generation method of increasing numbers and letters is adopted, the problem that random numbers are possibly repeated is avoided, and different users with the same factory string code can be distributed to different SM9 public identification keys.
According to an embodiment of the present invention, the generating module 107 is further configured to, after generating the public key SM9 identification corresponding to the identity information of the user 102 of the client 101 to be bound and the factory string of the smart device 103, add the identity information of the user 102, the factory string of the smart device 103, and the generated public key SM9 identification as a new entry ({ identity information, factory string, public key SM9 identification }) to the public key identification data table of the public key SM9 identification. At the same time, the generation module 107 is configured to inform the distribution module 109 to distribute the generated public key SM9 identification public key to the smart device 103.
According to an embodiment of the present invention, after the smart device 103 successfully confirms the generated SM9 public key, the generating module 107 is configured to further query the original identification information data table for whether an entry corresponding to the identity information of the user 102 and the factory string code of the smart device 103 exists. That is, if there is a public key (for example, if the user 102 re-binds the smart device 103 and the secret SM9 identifies that no corresponding entry exists in the public key data table, the original binding information entry is recorded in the original identification information data table), the information described in the "identification information string" field in the entry (i.e., the factory string code) is updated to the generated secret SM9 identifies the public key. As mentioned above, since the length and data format of the generated SM9 public key are consistent with the factory string code, the factory string code in the "identification information string" field can be updated to the generated SM9 public key without any modification to the original identification information data table.
According to an embodiment of the present invention, the background updating module 108 is configured to update or upgrade the "identification information string" recorded in the original identification information data table to the public key identified by the national secret SM 9. For example, in the case where some smart devices 103 do not have a user re-binding or reset due to being always networked, there may not be an opportunity for the newly built public key SM9 to identify the public key. To achieve system upgrades and achieve uniformity of system internal identification as quickly as possible, the platform server 104 may proactively update or upgrade the "identification information string" for these smart devices 103 to the "national secret SM9 identification public key" and synchronize the updated entries to the national secret SM9 identification public key data table. Therefore, even if the intelligent devices 103 are re-bound with the users 102 or reset later, the corresponding SM9 identification public key can be extracted from the SM9 identification public key data table, repeated generation of the SM9 identification public key is avoided, and the consistency of information such as user cloud storage videos matching with the SM9 identification is ensured.
Specifically, the background update module 108 may update the factory string code recorded in the "identification information string" corresponding to the user currently bound to the networked smart device in the original identification information data table to the public key of the identification SM9 in a batch manner at a specific time (e.g., at night, when the system load is small, etc.) or at a specific period (e.g., a specific number of entries are updated at one time), so as to implement system upgrade. For example, the background update module 108 may extract user identity information of the user 102 that is bound to the currently networked smart device to identify a corresponding entry in the original identification information data table. Then, whether the character string is a factory string code or a public key SM9 identification public key is discriminated from the last digit of the identification information character string recorded in the "identification information character string" field in the identified entry. If the last digit of the string is a factory string code excluded character, then the SM9, identified as the national secret, identifies the public key and does not need to be updated. If the last bit of the character string is not the character excluded by the factory string code, the character string is marked as the factory string code and needs to be updated. The updating method is as described above in connection with the generation module 107 generating the SM9 public identification key, and is not described herein again.
According to an embodiment of the present invention, before updating the identified factory string code, the background updating module 108 identifies the last generated national secret SM9 identification public key in the public key data table by the national secret SM9, so that when updating is performed in the original identification information data table, the third part of the last generated national secret SM9 identification public key is incremented.
According to an embodiment of the present invention, before updating the identified factory string, the background updating module 108 may further compare the entry where the identified factory string is located with the public key identification data table of the national secret SM9, so as to confirm that the user identity information and the factory string do not have the corresponding public key of the national secret SM9 in the public key identification data table of the national secret SM 9. If the user identity information and the factory string code do not have a corresponding country secret SM9 identification public key in a country secret SM9 identification public key data table, the user identity information and the factory string code are added to fields of 'user identity information' and 'factory string code' in a country secret SM9 identification public key data table as an entry, and after updating, the updated country secret SM9 identification public key is filled into a field of 'country secret SM9 identification public key' corresponding to the entry.
Therefore, as the factory string code type identification information character strings in the original identification information data table are all updated to be the identification public keys of the national secret SM9, the data in the original identification information data table are all synchronized to the identification public key data table of the national secret SM9, the identification public key data table of the national secret SM9 is used as an independent record table, only newly added with entries and does not delete or modify records, and is separately recorded with the original identification information data table, so that the original identification information data table is not subjected to architecture adjustment under the condition that the original identification information data table has data, the risk of data migration and loss caused by architecture adjustment is avoided, and the data upgrading is realized under the condition that the influence on users and platform servers is as small as possible.
According to one embodiment of the invention, the allocation module 109 is configured to transmit the public key of the identification SM9 corresponding to the identity information of the user 102 of the client 101 to be bound and the factory string code of the smart device 103 to the smart device 103 and, optionally, to receive an acknowledgement message from the smart device 103. According to another embodiment of the invention, if the allocation module 108 does not receive an acknowledgement message from the smart device 103 within a predetermined time or the allocation module 108 receives an error message from the smart device 103, the secret SM9 identification public key may be retransmitted up to a specified threshold number of times.
Therefore, the identification mechanism of the original system is fully considered, the unique virtual identification is distributed to the intelligent equipment based on the factory serial code and the user identity information of the original intelligent equipment, the disorder caused by a multi-identification system (for example, some manufacturers may specify a plurality of identifiers to identify the equipment) in the later management is avoided, and meanwhile, the convenience is brought to the safety authentication of the later equipment. Meanwhile, the record of the distributed country secret SM9 identification public key is stored in the platform server, and the same user and the same device are ensured to obtain the same country secret SM9 identification public key, so that the cloud storage file is ensured not to be lost when the user resets or binds the device again. The data table of the SM9 identification public key records correspondingly distributed through the factory equipment string codes and the user identity information can be used for inquiring whether to take out the original records or distribute new identifications during distribution, and meanwhile, the distributed SM9 identification public keys can be directly inquired in a database through the factory equipment string codes and the user identity information in later-stage troubleshooting.
Fig. 2 illustrates a flow diagram of a method 200 for public key SM9 identification public key distribution according to one embodiment of the invention. The method 200 is performed by the platform server 104.
In step 201, a public key SM9 identification public key allocation request is received from a smart device. According to one embodiment of the invention, the intelligent device initiates a public key distribution request of the SM9 identification to the platform server based on the received binding request from the client, so as to request the platform server to distribute the SM9 identification public key to the intelligent device. The public key SM9 identifies that the public key allocation request can include identity information of a user of the client to be bound with the smart device and a factory string code of the smart device.
At step 202, the SM9 public key identification data table is queried as to whether there already exists a SM9 public key identification corresponding to the user identity information and factory string included in the SM9 public key allocation request. If so, step 203 is entered, and if not, step 204 is entered. According to one embodiment of the invention, the SM9 public key identification data table records a plurality of entries, each entry including { user identity information, factory string code, SM9 public key identification }.
In step 203, the queried corresponding public SM9 identification public key is transmitted to the smart device.
At step 204, a national secret SM9 identifying public key is generated based on the factory string code included in the national secret SM9 identifying public key allocation request. According to one embodiment of the invention, the generated public key SM9 identifies that the public key has the following characteristics: the length of the SM9 public identification key is consistent with the length of the factory serial code; the SM9 public key includes the part of the factory serial code for identifying the equipment information; the SM9 public key identifier comprises a number and letter combination which is increased progressively according to a preset rule; the secret SM9 identifies the last digit of the public key as the excluded character in the factory string.
Specifically, as described above, the national secret SM9 identifies that the public key includes three parts. The first part includes a part of the factory string of the smart device 103 that identifies device information such as manufacturer, model, or factory lot. The second part is the national secret SM9 that identifies the last character of the public key, which includes the characters excluded from the factory string code. The third part is located between the first part and the second part, has a length which is the length of the factory string code minus the length of the first part and the length of the second part, and comprises a combination of numbers and letters which are increased according to a predetermined rule. Where the third part is incremented by the last allocation record recorded in the public key identification data table according to the country key SM 9.
According to one embodiment of the invention, the step of generating the third part of the public key SM9 identification comprises: the last assigned country secret SM9 identifying the public key is identified in the country secret SM9 identifying public key data table, the last letter of the string in the third part of the last assigned country secret SM9 identifying the public key is extracted, the letter part and the number part are separated. (1) In the absence of the alphabetical portion, if the numeric portion is not all 9, then 1 is added directly, if the numeric portion is all 9, then the first bit of the numeric portion is updated to the first order letter (i.e., a), and the last bit of the numeric portion is updated to 1, with the remainder being updated to 0 (e.g., from 9999 to a 001). (2) In the case where there is a letter part, 1 is directly added if the number part is not all 9, if the number part is all 9, it is determined whether there is a next letter in the last letter of the current letter part (for example, if the letter in the next letter after a is B, there is no next letter in the Z), and if there is a next letter in the last letter of the current letter part, the last letter of the letter part is updated to the next letter in the next letter, and the last letter of the number part is updated to 1, and the rest is updated to 0 (for example, B999 to C001 or AB999 to AC 001). If the last letter of the current letter part does not have the next sequential letter, the first digit of the number part is updated to the first sequential letter (i.e., A), the last digit of the number part (if any) is updated to 1, and the rest is updated to 0 (e.g., Z999 through AA 01). (3) In the absence of a numeric portion, the first letter in the letter portion, which has the next letter in the next rank as counted from left to right, is updated to the next rank letter, the last digit of the remaining letter portion is updated to 1, and the remaining portion is updated to 0 (e.g., from AZZZ to B001). By the above manner, the next letter (e.g., ZZZZ) is not present all until the letter portion is increased.
It is fully understood by those skilled in the art that the above is merely illustrative with 4-bit characters. Other predetermined incrementing rules, as well as other alphanumeric combinations of digits, may be employed to generate the third part of the public key identified by the national secret SM 9.
In step 205, the generated SM9 public key is stored as an entry in the SM9 public key data table, along with the user identity information and the factory string code of the smart device.
In step 206, the generated public key SM9 identification public key is transmitted to the smart device.
In step 207, based on the acknowledgement message received from the smart device, the factory string code in the entry corresponding to the user identity information and factory string code received in step 201 in the original identification information data table is updated to the generated SM9 public identification key.
Fig. 3 shows a flow diagram of a method 300 for background updating of the public key SM9 identification public key according to one embodiment of the invention. The method 300 is performed by the platform server 104. As described above, the method 300 may be performed by the platform server 104 at predetermined times or periodically.
In step 301, user identity information of a user bound to a currently networked smart device is extracted to identify a matching entry in an original identification information data table. According to one embodiment of the invention, each entry in the original identification information data table may include user identity information and an identification information string of the smart device. If the identity information of the binding user matches the user identity information of an entry, the entry is the identified matching entry. Also, a predetermined number of entries may be identified to enable batch updates.
At step 302, it is determined whether the string is a factory string code or a national secret SM9 identifies a public key based on the last digit of the identification information string in each identified entry. If the last digit of the string is a factory string code excluded character, then the SM9, identified as the national secret, identifies the public key and does not need to be updated. If the last bit of the character string is not the character excluded from the factory string code, the character string is identified as the factory string code, and needs to be updated, and the step 303 is entered.
At step 303, the identification information string identified as the factory string code is updated to identify the public key for the national secret SM 9. According to one embodiment of the invention, the updated secret SM9 identifies that the public key has the following characteristics: the length of the SM9 public identification key is consistent with the length of the factory serial code; the SM9 public key includes the part of the factory serial code for identifying the equipment information; the SM9 public key identifier comprises a number and letter combination which is increased progressively according to a preset rule; the secret SM9 identifies the last digit of the public key as the excluded character in the factory string.
At step 304, the updated entry in the original identification information data table is synchronized into the national secret SM9 identification data table.
Compared with the prior art, the invention has the main advantages that:
1. the method has the advantages that the unique virtual identification is distributed for the intelligent equipment, and confusion caused by a multi-identification system in later management is avoided;
2. when the SM9 public key is distributed, the identification mechanism of the original system is fully considered, and the identification and classification management of the original system on the equipment information are not influenced after the system is modified.
3. The record of the public key of the SM9 identifier is stored and distributed in the system, and the same equipment of the same user is ensured to obtain the public key of the SM9 identifier of the same national key, so that the cloud storage file of the equipment reset and rebinding by the user is ensured not to be lost;
4. in the aspect of distributing the new secret SM9 identification, the method is different from the conventional method of using the random number, adopts a method of increasing the number and the letter of partial fields, avoids the problem that the random number is possibly repeated, and ensures that different users with the same string code can be distributed to different public identification keys.
FIG. 4 shows a block diagram of an exemplary computing device 400, which is one example of a hardware device (e.g., smart device 103, platform server 104, a device on which client 101 runs, etc.) that may be applied to aspects of the present invention, according to one embodiment of the present invention.
With reference to FIG. 4, a computing device 400 will now be described, which is one example of a hardware device that may be applied to aspects of the present invention. Computing device 400 may be any machine that may be configured to implement processing and/or computing, and may be, but is not limited to, a workstation, a server, a smart device, a desktop computer, a laptop computer, a tablet computer, a personal digital assistant, a smart phone, an in-vehicle computer, or any combination thereof. The various methods/modules/servers/smart devices described above may be implemented in whole or at least in part by computing device 400 or similar devices or systems.
Computing device 400 may include components that may be connected or communicate via one or more interfaces and a bus 402. For example, computing device 500 may include a bus 402, one or more processors 404, one or more input devices 406, and one or more output devices 408. The one or more processors 404 may be any type of processor and may include, but are not limited to, one or more general purpose processors and/or one or more special purpose processors (e.g., dedicated processing chips). Input device 406 may be any type of device capable of inputting information to a computing device and may include, but is not limited to, a camera, a mouse, a keyboard, a touch screen, a microphone, and/or a remote control. Output devices 408 may be any type of device capable of presenting information and may include, but are not limited to, a display, speakers, a video/audio output terminal, a vibrator, and/or a printer. Computing device 400 may also include or be connected to non-transitory storage device 410, which may be any storage device that is non-transitory and that enables data storage, and which may include, but is not limited to, a disk drive, an optical storage device, a solid-state memory, a floppy disk, a flexible disk, a hard disk, a tape, or any other magnetic medium, an optical disk or any other optical medium, a ROM (read only memory), a RAM (random access memory), a cache memory, and/or any memory chip or cartridge, and/or any other medium from which a computer can read data, instructions, and/or code. Non-transitory storage device 410 may be detached from the interface. The non-transitory storage device 410 may have data/instructions/code for implementing the above-described methods and steps. Computing device 400 may also include a communication device 412. The communication device 412 may be any type of device or system capable of communicating with internal apparatus and/or with a network and may include, but is not limited to, a modem, a network card, an infrared communication device, a wireless communication device, and/or a chipset, such as a bluetooth device, an IEEE 1302.11 device, a WiFi device, a WiMax device, a cellular communication device, and/or the like.
The bus 402 may include, but is not limited to, an Industry Standard Architecture (ISA) bus, a Micro Channel Architecture (MCA) bus, an enhanced ISA (eisa) bus, a Video Electronics Standards Association (VESA) local bus, and a Peripheral Component Interconnect (PCI) bus.
Computing device 400 may also include a working memory 414, which working memory 414 may be any type of working memory capable of storing instructions and/or data that facilitate the operation of processor 404 and may include, but is not limited to, random access memory and/or read only memory devices.
Software components may be located in the working memory 414 including, but not limited to, an operating system 416, one or more application programs 418, drivers, and/or other data and code. Instructions for implementing the above-described methods and steps of the invention may be contained within the one or more applications 418, and the above-described methods 200 and 300 of the invention may be implemented by the processor 404 reading and executing the instructions of the one or more applications 418.
It should also be appreciated that variations may be made according to particular needs. For example, customized hardware might also be used, and/or particular components might be implemented in hardware, software, firmware, middleware, microcode, hardware description speech, or any combination thereof. In addition, connections to other computing devices, such as network input/output devices and the like, may be employed. For example, some or all of the disclosed methods and apparatus can be implemented with logic and algorithms in accordance with the present invention through programming hardware (e.g., programmable logic circuitry including Field Programmable Gate Arrays (FPGAs) and/or Programmable Logic Arrays (PLAs)) having assembly language or hardware programming languages (e.g., VERILOG, VHDL, C + +).
Although the various aspects of the present invention have been described thus far with reference to the accompanying drawings, the above-described methods, systems, and apparatuses are merely examples, and the scope of the present invention is not limited to these aspects but only by the appended claims and equivalents thereof. Various components may be omitted or may be replaced with equivalent components. In addition, the steps may also be performed in a different order than described in the present invention. Further, the various components may be combined in various ways. It is also important that as technology develops, many of the described components can be replaced by equivalent components appearing later.
The above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art will understand that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit and scope of the present disclosure, and the present disclosure should be construed as being covered by the claims and the specification.

Claims (10)

1. A national secret SM9 identity public key distribution method performed by a platform server, comprising:
receiving a public key distribution request of a national secret SM9 identifier from a device, wherein the public key distribution request of the national secret SM9 identifier comprises user identity information of a user bound to a client of the device and a factory string code of the device;
inquiring whether a national secret SM9 identification public key corresponding to the user identity information and the factory string code already exists in a national secret SM9 identification public key data table, wherein each entry in the national secret SM9 identification public key data table comprises the following information: the user identity information, the factory serial code and the national secret SM9 identify a public key;
transmitting the SM9 identification public key to the device if a SM9 identification public key corresponding to the user identity information and the factory string code already exists in the SM9 identification public key data table;
if no SM9 public key corresponding to the user identity information and the factory string code exists in the SM9 public key identification data table, generating a SM9 public key based on the factory string code included in the SM9 public key allocation request, wherein the SM9 public key has the following characteristics: the length of the generated SM9 identification public key is consistent with the length of the factory string code; the generated SM9 public identification key comprises a part of identification equipment information in the factory serial code; the generated SM9 public key identifier comprises a number and letter combination which is increased progressively according to a preset rule; the generated SM9 public key identifies the last bit of the public key as the excluded character in the factory string code;
storing the generated SM9 public identification key, the user identity information and the factory string code as an entry into the SM9 public identification key data table; and
transmitting the generated secret SM9 identification public key to the device.
2. The method of claim 1, wherein the method further comprises:
receiving acknowledgement information from the device identifying a public key to the generated secret SM 9;
updating the identification information character string in the entry corresponding to the user identity information and the factory-leaving string code in the original identification information data table to the generated SM9 identification public key when the acknowledgement information is received, wherein the identification information character string in the corresponding entry is the factory-leaving string code,
wherein the original identification information data table is a data table stored on the platform server and used for recording device identification information before the generation of the public key identification SM9 data table, and each entry in the original identification information data table comprises the following information: user identity information, identification information character string.
3. The method of claim 1, wherein the generated secret SM9 identifies that a public key comprises a first part, a second part, and a third part;
wherein the first part comprises a part of the factory string code used for identifying device information of the device;
wherein the second part identifies a last character of a public key for the generated SM9 secret, the last character including characters excluded from the factory string code;
wherein the third portion is located between the first portion and the second portion, the length of the third portion is the length of the factory string code minus the length of the first portion and the length of the second portion, and the third portion includes a combination of numbers and letters that are incremented according to a predetermined rule.
4. The method of claim 3, wherein the third portion is incremented in accordance with the State secret SM9 identifying the third portion of the public key identified by the last allocated State secret SM9 set forth in the public key data table.
5. A method of background update of a public key SM9 identification public key performed by a platform server, comprising:
extracting user identity information of a user bound to a currently networked device to identify matching entries in an original identification information data table, wherein each entry in the original identification information data table comprises the following information: user identity information, identification information character string;
judging whether the identification information character string is a factory string code or a national secret SM9 identification public key according to the last bit of the identification information character string in each identified matching entry;
if the last bit of the identification information character string is not a character excluded from the factory string code, identifying the identification information character string as the factory string code; and
updating the identification information character string identified as the factory string code to a national secret SM9 identification public key, wherein the updated national secret SM9 identification public key has the following characteristics: the length of the updated SM9 public key is consistent with the length of the factory string code; the updated SM9 public identification key comprises a part of the identification equipment information in the factory string code; the updated SM9 public key identifier comprises a number and letter combination which is increased according to a preset rule; the updated secret SM9 identifies that the last digit of the public key is an excluded character in the factory string code.
6. The method of claim 5, wherein the method is performed by the platform server at a specified time or periodically.
7. A public key distribution system for public keys SM9, comprising:
one or more devices;
a platform server, which comprises a query module, a generation module and a distribution module,
wherein the query module is configured to:
receiving a public key distribution request identified by a secret SM9 from the equipment, wherein the public key distribution request identified by the secret SM9 comprises user identity information of a user bound by a client of the equipment and a factory string code of the equipment;
inquiring whether a national secret SM9 identification public key corresponding to the user identity information and the factory string code already exists in a national secret SM9 identification public key data table, wherein each entry in the national secret SM9 identification public key data table comprises the following information: the user identity information, the factory serial code and the national secret SM9 identify a public key;
if a national secret SM9 identification public key corresponding to the user identity information and the factory string code already exists in the national secret SM9 identification public key data table, informing the distribution module to transmit the national secret SM9 identification public key to the equipment;
wherein the generation module is configured to:
if no SM9 public key corresponding to the user identity information and the factory string code exists in the SM9 public key identification data table, generating a SM9 public key based on the factory string code included in the SM9 public key allocation request, wherein the SM9 public key has the following characteristics: the length of the generated SM9 identification public key is consistent with the length of the factory string code; the generated SM9 public identification key comprises a part of identification equipment information in the factory string code; the generated SM9 public key identifier comprises a number and letter combination which is increased progressively according to a preset rule; the generated SM9 public key identifies the last bit of the public key as the excluded character in the factory string code;
storing the generated SM9 public identification key, the user identity information and the factory string code as an entry into the SM9 public identification key data table; and
wherein the distribution module is configured to transmit the generated secret SM9 identification public key to the device.
8. The system of claim 7, wherein the generated secret SM9 identifies that a public key comprises a first part, a second part, and a third part;
wherein the first part comprises a part of the factory string code used for identifying device information of the device;
wherein the second part identifies a last character of a public key for the generated SM9 secret, the last character including characters excluded from the factory string code;
wherein the third portion is located between the first portion and the second portion, the length of the third portion is the length of the factory string code minus the length of the first portion and the length of the second portion, and the third portion includes a combination of numbers and letters that are incremented according to a predetermined rule.
9. A public key distribution system for a public key SM9, comprising:
one or more devices;
a platform server including a background update module,
wherein the background update module is configured to:
extracting user identity information of a user bound to a currently networked device to identify matching entries in an original identification information data table, wherein each entry in the original identification information data table comprises the following information: user identity information, identification information character string;
judging whether the identification information character string is a factory string code or a national secret SM9 identification public key according to the last bit of the identification information character string in each identified matching entry;
if the last bit of the identification information character string is not a character excluded from the factory string code, identifying the identification information character string as the factory string code; and
updating the identification information character string identified as the factory string code to a national secret SM9 identification public key, wherein the updated national secret SM9 identification public key has the following characteristics: the length of the updated SM9 public key is consistent with the length of the factory string code; the updated SM9 public identification key comprises a part of the identification equipment information in the factory string code; the updated SM9 public key identifier comprises a number and letter combination which is increased according to a preset rule; the updated secret SM9 identifies that the last digit of the public key is an excluded character in the factory string code.
10. A computing device, comprising:
a processor;
a memory storing instructions that, when executed by the processor, are capable of performing the method of any of claims 1-5. .
CN202210747693.5A 2022-06-28 2022-06-28 Method and system for generating SM9 identification public key of intelligent device Pending CN115065467A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202210747693.5A CN115065467A (en) 2022-06-28 2022-06-28 Method and system for generating SM9 identification public key of intelligent device
PCT/CN2022/132448 WO2024000999A1 (en) 2022-06-28 2022-11-17 National secret sm9 identity public key generation method and system for intelligent device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210747693.5A CN115065467A (en) 2022-06-28 2022-06-28 Method and system for generating SM9 identification public key of intelligent device

Publications (1)

Publication Number Publication Date
CN115065467A true CN115065467A (en) 2022-09-16

Family

ID=83204446

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210747693.5A Pending CN115065467A (en) 2022-06-28 2022-06-28 Method and system for generating SM9 identification public key of intelligent device

Country Status (2)

Country Link
CN (1) CN115065467A (en)
WO (1) WO2024000999A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116896482A (en) * 2023-09-08 2023-10-17 联通在线信息科技有限公司 Household camera remote control method and device based on shielding privacy information
WO2024000999A1 (en) * 2022-06-28 2024-01-04 天翼数字生活科技有限公司 National secret sm9 identity public key generation method and system for intelligent device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9807086B2 (en) * 2015-04-15 2017-10-31 Citrix Systems, Inc. Authentication of a client device based on entropy from a server or other device
CN113872760A (en) * 2021-11-03 2021-12-31 中电科鹏跃电子科技有限公司 SM9 key infrastructure and security system
CN115065467A (en) * 2022-06-28 2022-09-16 天翼数字生活科技有限公司 Method and system for generating SM9 identification public key of intelligent device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024000999A1 (en) * 2022-06-28 2024-01-04 天翼数字生活科技有限公司 National secret sm9 identity public key generation method and system for intelligent device
CN116896482A (en) * 2023-09-08 2023-10-17 联通在线信息科技有限公司 Household camera remote control method and device based on shielding privacy information
CN116896482B (en) * 2023-09-08 2024-02-09 联通在线信息科技有限公司 Household camera remote control method and device based on shielding privacy information

Also Published As

Publication number Publication date
WO2024000999A1 (en) 2024-01-04

Similar Documents

Publication Publication Date Title
US9294550B2 (en) Efficient data transfer for cloud storage by centralized management of access tokens
CN115065467A (en) Method and system for generating SM9 identification public key of intelligent device
US20180270216A1 (en) Electronic device system, communication method and recording medium
US20130282857A1 (en) Cloud Based Storage Synchronization Device
CN107679819B (en) Financial data processing method and device, computer equipment and storage medium
CN110806883A (en) Method and device for safely upgrading firmware and computer readable medium
US20210058488A1 (en) Methods, systems, and media for pairing devices to complete a task using an application request
JP2016224849A (en) Information processing device and program
JP2006191384A (en) Mobile and content transmission method
CN109951318A (en) The function configuration method and device of application
US20150079968A1 (en) Information processing method and electronic device
US20150067124A1 (en) Application service management device and application service management method
US11775274B2 (en) Application software installation method, device, and server
CN111680101A (en) Intellectual property data protection, transaction and maintenance system and method based on block chain
CN110971589A (en) File management method
WO2019129271A1 (en) Method for electronic device authentication and firmware update, and electronic device
CN112347046B (en) Method for acquiring creation time of file in distributed system
CN112685064B (en) Processing method and device for equipment identification, storage medium and electronic device
CN114202840B (en) Authentication control method, device and medium
KR101633402B1 (en) Namecard management system
KR101313108B1 (en) User data management server and operating method thereof, user terminal and recording medium
CN111935271A (en) Data updating method, device and storage medium
CA2943714C (en) Information management updating system
US20140136702A1 (en) Method and apparatuses for sharing data in a data sharing system
CN104580478A (en) Internet-of-Things device off-line sharing access right control method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination