CN115987691B - Mobile application management system and method based on cloud computing and pervasive computing - Google Patents

Mobile application management system and method based on cloud computing and pervasive computing Download PDF

Info

Publication number
CN115987691B
CN115987691B CN202310267478.XA CN202310267478A CN115987691B CN 115987691 B CN115987691 B CN 115987691B CN 202310267478 A CN202310267478 A CN 202310267478A CN 115987691 B CN115987691 B CN 115987691B
Authority
CN
China
Prior art keywords
data processing
equipment
processing end
secret key
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310267478.XA
Other languages
Chinese (zh)
Other versions
CN115987691A (en
Inventor
靳艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Lanse Huiyin Cultural Media Co ltd
Original Assignee
Chengdu Lanse Huiyin Cultural Media Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Lanse Huiyin Cultural Media Co ltd filed Critical Chengdu Lanse Huiyin Cultural Media Co ltd
Priority to CN202310267478.XA priority Critical patent/CN115987691B/en
Publication of CN115987691A publication Critical patent/CN115987691A/en
Application granted granted Critical
Publication of CN115987691B publication Critical patent/CN115987691B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a mobile application management system and a method based on cloud computing and pervasive computing, and belongs to the technical field of intelligent equipment management; the initial verification includes: the equipment end sends a first verification request to the data processing end; after the confirmation of the data processing end, the data processing end transmits at least one group of secret keys in the secret key library of the data processing end to the equipment end; the equipment end sends a signal of successful reception to the data processing end; the data processing end deletes the key which is already transmitted to the equipment end in the key library of the data processing end; the data processing end sends a signal of successful deletion to the equipment end; the equipment terminal selects at least one secret key to transmit to the data processing terminal; after the data processing end receives and stores the secret key transmitted by the equipment end, the initial verification is completed. The mobile application management method based on the universal computing of the cloud computing can effectively ensure the connection security between the follow-up equipment end and the data processing end.

Description

Mobile application management system and method based on cloud computing and pervasive computing
Technical Field
The invention belongs to the technical field of intelligent equipment management, and particularly relates to a mobile application management system and method based on cloud computing and pervasive computing.
Background
Pervasive computing (Ubiquitous computing (ubicomp), pervasive computing), also known as ubiquitous computing, generalized computing, pervasive computing, ubiquitous computing, is a computing concept that emphasizes and integrates with the environment, and the computer itself disappears from the line of sight of people. In the pervasive computing mode, people can acquire and process information at any time, any place and in any way.
Based on the general computing concept, the intelligent home has the advantages that the intelligent home is well developed, and everything is interconnected, so that people can obtain better intelligent life experience in life.
And when the intelligent home brings convenience to us, as the data transmission is greatly increased due to the interconnection of everything, the safety of the data transmission is particularly important, so that people experience intelligent life and are prevented from being invaded by bad molecules.
Disclosure of Invention
The invention provides a mobile application management system and a mobile application management method based on cloud computing and pervasive computing, which can perform good security verification on a data transmission process, improve the security of data transmission and avoid external network attack.
The invention is realized by the following technical scheme:
in one aspect, the invention provides a mobile application management method based on cloud computing and pervasive computing, which comprises initialization verification and connection verification; the initial verification includes: the equipment end sends a first verification request to the data processing end; the data processing end receives the first verification request, and after confirmation, the data processing end transmits at least one group of secret keys in the secret key library to the equipment end; after receiving the secret key transmitted by the data processing end, the equipment sends a signal which is successfully received to the data processing end; after the data processing end receives the successfully received signal, deleting the key which is already transmitted to the equipment end in the key library of the data processing end; after deleting the secret key, the data processing end sends a signal of successful deletion to the equipment end; after the equipment receives the signal of successful deletion, at least one secret key is selected to be transmitted to the data processing end; after the data processing end receives and stores the secret key transmitted by the equipment end, the initial verification is completed; the connection verification includes: the equipment end sends a second verification request to the data processing end; after the data processing end receives the second verification request, the latest received secret key is sent to the equipment end; after the equipment receives the secret key, the equipment judges that the received secret key is compared with the secret key sent by the equipment last time; if the comparison result is the same, the connection verification is judged to be successful.
In some embodiments, after the connection verification is successful, the method further comprises the steps of: the equipment end selects a key from the self key library and transmits the key to the data processing end; the data processing unit receives the secret key and stores the secret key in a secret key library.
In some embodiments, after the connection verification is successful, the key transmitted by the device side to the data processing side is different from the key received in the connection verification process.
In some embodiments, after the connection verification is successful, the method further comprises the steps of: the data processing end deletes the secret key which is transmitted to the equipment end for comparison in the connection verification process.
In some embodiments, in the process that the device side sends the first verification request to the data processing side, the device side also sends self ID data to the data processing side; the device end classifies and stores the secret keys transmitted by the device end according to the ID data of the device end in the subsequent process.
In some embodiments, in the process that the device side sends the second verification request to the data processing side, the device side also sends self ID data to the data processing side; after the data processing end receives the second verification request, before the last received key is sent to the device end, the method further comprises: based on the ID data of the equipment end, the data processing end searches the secret key under the ID data classification in the secret key library.
In some embodiments, based on the ID data of the device side, the data processing side searches the self-key library for the key under the ID data classification, and if the ID data is not found, restarts the initialization verification process.
On the other hand, the application provides a mobile application management system based on cloud computing and pervasive computing, which comprises a data processing end, a memory and a processor, wherein the data processing end is in communication connection with a device end, a plurality of groups of secret keys are arranged in the data processing end, and each group of secret keys comprises a plurality of secret keys; the memory stores a computer program, and the processor executes the computer program to implement the mobile application management method based on cloud computing and pervasive computing in any of the above embodiments.
Compared with the prior art, the invention has the following advantages:
in the mobile application management method based on the universal computing of the cloud computing, firstly, in the initialization verification process, a data processing module sends at least one group of keys in a self key library to a device end, deletes corresponding keys in the self key library, and then receives at least one key transmitted by the device end for subsequent connection verification; and then comparing the key received by the data processing end and the key transmitted by the equipment end last time in the subsequent connection verification process so as to realize the connection verification process, thereby ensuring the connection security between the subsequent equipment end and the data processing end.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the following description will briefly describe the drawings in the embodiments, it being understood that the following drawings only illustrate some embodiments of the present invention and should not be considered as limiting the scope, and that other related drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic flow chart of initialization verification in a mobile application management method based on pervasive computing of cloud computing according to some embodiments of the present invention;
fig. 2 is a schematic flow chart of connection verification in a mobile application management method based on pervasive computing of cloud computing according to some embodiments of the present invention;
fig. 3 is a schematic flow chart of connection verification in a mobile application management method based on pervasive computing of cloud computing according to other embodiments of the present invention;
fig. 4 is a schematic structural diagram of a mobile application management system based on pervasive computing of cloud computing according to a different embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments of the present invention.
In the description of the present invention, it should be noted that, as the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", etc., are used to indicate orientations or positional relationships based on those shown in the drawings, or those that are conventionally put in use in the product of the present invention, they are merely used to facilitate description of the present invention and simplify description, and do not indicate or imply that the apparatus or elements referred to must have a specific orientation, be configured and operated in a specific orientation, and thus should not be construed as limiting the present invention.
Furthermore, the terms "horizontal," "vertical," and the like in the description of the present invention, if any, do not denote absolute levels or overhangs, but rather may be slightly inclined. As "horizontal" merely means that its direction is more horizontal than "vertical", and does not mean that the structure must be perfectly horizontal, but may be slightly inclined.
In the description of the present invention, it should also be noted that, unless explicitly stated and limited otherwise, the terms "disposed," "mounted," "connected," and "connected" should be construed broadly, and may be, for example, fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communication between two elements. The specific meaning of the above terms in the present invention will be understood in specific cases by those of ordinary skill in the art.
The terms "comprising" and "having," and any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or modules is not limited to only those steps or modules but may include other steps or modules not expressly listed or inherent to such process, method, article, or apparatus.
The sequence of the different steps is not sequential, unless specifically stated.
Example 1:
the application provides a mobile application management method of pervasive computing based on cloud computing, which comprises initialization verification and connection verification, wherein the initialization verification is used for first connection between a device end and a data processing end, or the device end or the data processing end performs the latest connection authentication process after connection reset. And the connection verification is performed after the initialization verification, and the connection verification is performed again during data interaction, so as to ensure the security of data transmission. The data processing end processes the data mutually transmitted by the plurality of equipment ends and sends the processed data to the appointed equipment end again so as to realize the interaction process among the plurality of equipment ends.
Referring to fig. 1, the initialization verification specifically includes the following steps:
s10, the equipment end sends a first verification request to the data processing end. In S10, the device side sends data to the data processing side through the first authentication request, so as to implement matching between the device side and the data processing side, and implement a handshake action.
S20, the data processing end receives the first verification request, and after the data processing end performs the confirmation operation, the data processing end transmits at least one group of keys in the key library to the equipment end. At least one group of secret keys are stored in a storage module of the data processing end, in general, a plurality of groups of secret keys are stored in the storage module of the data processing end, and after handshake with the equipment end is completed, the data processing end transmits the at least one group of secret keys stored in the data processing end to the equipment end, so that in the subsequent connection verification process, the data processing end and the equipment end perform mutual authentication through the secret keys transmitted at this time. Each set of keys includes a plurality of keys, and in a specific example, for a specific device, the data processing end may send a set of keys to the device, and when there is another device to connect, the data processing end may transmit another set of keys to the other device.
And S30, after the equipment receives at least one group of secret keys transmitted by the data processing end, the secret keys are stored in a storage module of the equipment, and then the equipment sends a signal of successful reception to the data processing end, which indicates that the equipment has received the secret keys successfully.
And S40, after the data processing end receives the successfully received signal sent by the equipment end, deleting the key which is already transmitted to the equipment end in the key library of the data processing end. At this time, the data processing end gives at least one group of keys in the self-key library to the equipment end for use so as to facilitate the subsequent interaction between the data processing end and the equipment end.
S50, the data processing end sends a signal of successful deletion to the equipment end after deleting the secret key transmitted to the equipment end.
S60, after receiving the signal of successful deletion sent by the data processing end, the equipment end selects at least one secret key to transmit to the data processing end, and verification in the subsequent connection verification process is performed based on the secret key transmitted at this time. In a specific example, the device side typically selects one key to transmit to the data processing side each time authentication is performed. In other examples, to improve the security and diversity of the key, more than one key is selected, and multiple keys are used as one key set, so that the number of the key sets is more, and the cracking difficulty is higher.
And S70, after the data processing end receives and stores the secret key transmitted by the equipment end, the initial verification is completed.
After the initialization verification, the connection relation between the equipment end and the data processing end is determined, in the subsequent connection verification process, the security verification is carried out through the secret key transmitted from the equipment end to the data processing end in the S60 process, and after the connection verification is successful, the subsequent data transmission interaction is carried out.
Specifically, referring to fig. 2, the connection verification specifically includes the following steps:
and T10, the equipment end sends a second verification request to the data processing end. In T10, when the device side needs to complete interaction with other device sides or the processor, an interaction request is sent to the data processing side by sending a second verification request. The second authentication request may be of a different request type than the first authentication request, and may be provided in a different manner.
And T20, after receiving the second verification request, the data processing end sends the key which is received last time to the equipment end. In T20, the last received key refers to the last received key that is the shortest distance from the current time, and when the interaction request is first performed, the last received key refers to the key that the device side transmits to the data processing side in the process of S60, where the interaction request of the device side may be single or multiple.
And T30, after the equipment receives the key transmitted from the data processing end by the T20, the equipment judges, and compares the key with the key sent by the equipment last time.
And T40, if the judgment result in the T30 is the same, judging that the connection verification is successful, and carrying out subsequent data interaction.
In embodiment 1, firstly, in an initialization verification process, a data processing module sends at least one group of keys in a self key library to a device end, deletes corresponding keys in the self key library, and then accepts at least one key transmitted by the device end for subsequent connection verification; and then comparing the key received by the data processing end and the key transmitted by the equipment end last time in the subsequent connection verification process so as to realize the connection verification process, thereby ensuring the connection security between the subsequent equipment end and the data processing end.
Example 2:
the technical scheme in embodiment 2 is basically similar to that in embodiment 1, except that: in the connection verification process, after determining that the connection verification is successful, please refer to fig. 3, further comprising the following steps:
and T50, the equipment end selects a key from the self key library and transmits the key to the data processing end. In T50, the selected key may be any key or a set of keys.
And T60, after the data processing end receives the key transmitted from the equipment end by the T50, storing the key into a self-key library.
In embodiment 2, the key is retransmitted to the data processing end by the device end for the next connection verification process, so as to support the device interaction scenario in which the interaction request needs to be repeatedly sent.
Example 3:
the technical scheme in embodiment 2 is substantially similar to that in embodiment 2, except that: the key selected by the equipment end from the self key library in the T50 is different from the key sent in the step of the connection verification T60.
In embodiment 3, each time the device side and the data processing side perform connection verification, the verification keys used are different, so as to further improve the connection security between the device side and the data processing side.
Example 4:
the technical scheme in embodiment 4 is substantially similar to that in embodiment 2 or embodiment 3, except that: after determining that the connection verification is successful, still referring to fig. 3, the method further includes the steps of:
and T70, deleting the secret key which is transmitted to the equipment end for comparison in the connection verification process by the data processing end. T70 step and T50 step and T60 step do not conflict with each other, T70 may be performed prior to T50 and T60 steps, or may be performed after T50 and T60 steps.
In embodiment 4, the uniqueness of the key of the device side existing in the data processing side can be effectively ensured, and the security in the subsequent connection verification process can be further improved. On the other hand, the data processing end deletes the used secret key, so that the storage capacity of the self storage module can be reduced, and the processing performance of the self can be further improved.
Example 5:
the technical scheme in example 5 is basically similar to the technical scheme in examples 1, 2, 3 or 4, except that: in the process that the equipment end sends the first verification request to the data processing end, the equipment end also sends self ID data to the data processing end for expressing the identity of the self. Of course, the device side may also send the self ID data to the data processing side as the data of the first verification request; the data of the first verification request may be other data, which is different from the ID data. The device end classifies and stores the secret keys transmitted by the device end according to the ID data of the device end in the subsequent process. In the subsequent step of initialization verification and the step of connection verification, after the key transmitted by the equipment end is received, the keys are grouped according to the ID, and the key is stored.
In embodiment 5, in the intelligent device, there are more than one device terminals that need to interact as data processing terminals connected in between, so it is necessary to perform ID authentication and key grouping for each device terminal, respectively, and when the data processing terminal interacts with each device terminal that needs to interact, the verification process can be performed according to the initial verification step and the connection verification step.
Example 6:
the technical scheme in embodiment 6 is basically similar to the technical scheme in embodiment 5, except that: in the process that the equipment end sends the second verification request to the data processing end, the equipment end also sends self ID data to the data processing end so as to indicate self identity. After the data processing end receives the ID data sent by the equipment end, the data processing end searches the secret key under the classification of the ID data in the self secret key library based on the ID data, and then sends the searched secret key to the equipment end. Of course, when more than one key is found, the key transmitted by the device side corresponding to the ID received last time is selected and sent to the device side.
Example 7:
the technical solution in embodiment 7 is substantially similar to the technical solution in embodiment 6, except that: after the data processing end receives the ID data sent by the equipment end, based on the ID data, searching a secret key under the ID data classification in a self secret key library, if the data processing end does not find the ID information in a self storage module, the data processing end indicates that the equipment end which is currently connected and verified does not perform initialization verification with the data processing end, at the moment, the data processing end sends a signal to the equipment end, and the equipment end restarts to perform an initial verification process after receiving the data.
In embodiment 7, in many cases, the initial verification process needs to be performed again, and the device side and the data processing side do not perform initial verification, and at this time, the connection verification needs to be performed through the initial verification; or when the device side or the data processing side is reset, including automatic reset or accidental reset, the key or the ID data in the storage module of the device side and/or the data processing side is lost, and initialization verification needs to be carried out again.
Example 8:
the embodiment provides a mobile application management system based on cloud computing and pervasive computing, which comprises a data processing end, a memory and a processor, wherein the data processing end is in communication connection with a device end, a plurality of groups of secret keys are arranged in the data processing end, and each group of secret keys comprises a plurality of secret keys; a computer program is stored in the memory, and the processor executes the computer program to realize the mobile application management method based on cloud computing and pervasive computing of any one of embodiments 1 to 7.
In a specific example, referring to fig. 4, in the mobile application management system based on cloud computing and pervasive computing in this embodiment, a data processing end may process data that is mutually transmitted by multiple device ends, and then send the processed data to a designated device end again, so as to implement an interaction process between the multiple device ends.
Example 9:
the present embodiment provides a computer storage medium having stored thereon a computer program that is loaded by a processor to perform the cloud computing and pervasive computing-based mobile application management method of any one of embodiments 1 to 7.
The foregoing description is only a preferred embodiment of the present invention, and is not intended to limit the present invention in any way, and any simple modification, equivalent variation, etc. of the above embodiment according to the technical matter of the present invention fall within the scope of the present invention.

Claims (8)

1. A mobile application management method based on cloud computing and pervasive computing is characterized by comprising initialization verification and connection verification;
the initial validation includes:
the equipment end sends a first verification request to the data processing end;
the data processing end receives the first verification request, and after confirmation, the data processing end transmits at least one group of secret keys in a secret key library of the data processing end to the equipment end;
after the equipment receives the secret key transmitted by the data processing end, the equipment sends a signal which is successfully received to the data processing end;
after the data processing end receives the signal which is successfully received, deleting the secret key which is already transmitted to the equipment end in the secret key library of the data processing end;
after deleting the secret key, the data processing end sends a signal of successful deletion to the equipment end;
after the equipment receives the signal of successful deletion, at least one secret key is selected to be transmitted to the data processing end;
after the data processing end receives and stores the secret key transmitted by the equipment end, the initial verification is completed;
the connection verification includes:
the equipment end sends a second verification request to the data processing end;
after the data processing end receives the second verification request, the data processing end sends the key received last time to the equipment end;
after the equipment receives the secret key, the equipment judges that the received secret key is compared with the secret key sent by the equipment last time;
if the comparison result is the same, the connection verification is judged to be successful.
2. The mobile application management method based on cloud computing and pervasive computing according to claim 1, further comprising the steps of, after the connection verification is successful:
the equipment end selects a secret key from a secret key library of the equipment end and transmits the secret key to the data processing end;
the data processing end receives the secret key and stores the secret key in a secret key library.
3. The mobile application management method based on cloud computing and pervasive computing according to claim 1, wherein after the connection verification is successful, the key transmitted by the device side to the data processing side is different from the key received in the connection verification process.
4. A mobile application management method based on cloud computing and pervasive computing according to claim 2 or 3, wherein after the connection verification is successful, further comprising the steps of: and the data processing end deletes the secret key which is transmitted to the equipment end for comparison in the connection verification process.
5. A mobile application management method based on cloud computing and pervasive computing according to any one of claims 1 to 3, wherein in the process that the device side sends the first verification request to the data processing side, the device side also sends self ID data to the data processing side; and the equipment end stores the secret key transmitted by the equipment end in a classified manner according to the ID data of the equipment end in a subsequent process.
6. The mobile application management method based on cloud computing and pervasive computing according to claim 5, wherein in the process that the device side sends the second verification request to the data processing side, the device side also sends self ID data to the data processing side; after the data processing end receives the second verification request, before the last received key is sent to the device end, the method further includes: based on the ID data of the equipment end, the data processing end searches the secret key under the ID data classification in the self secret key library.
7. The mobile application management method based on cloud computing and pervasive computing according to claim 6, wherein the data processing end searches the secret key under the classification of the ID data in the self-secret key library based on the ID data of the device end, and if the ID data is not found, the initialization verification process is restarted.
8. The mobile application management system based on cloud computing and pervasive computing is characterized by comprising a data processing end, a memory and a processor, wherein the data processing end is in communication connection with a device end, a plurality of groups of secret keys are arranged in the data processing end, and each group of secret keys comprises a plurality of secret keys; the memory stores a computer program, and the processor executes the computer program to implement the mobile application management method based on cloud computing and pervasive computing according to any one of claims 1 to 7.
CN202310267478.XA 2023-03-20 2023-03-20 Mobile application management system and method based on cloud computing and pervasive computing Active CN115987691B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310267478.XA CN115987691B (en) 2023-03-20 2023-03-20 Mobile application management system and method based on cloud computing and pervasive computing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310267478.XA CN115987691B (en) 2023-03-20 2023-03-20 Mobile application management system and method based on cloud computing and pervasive computing

Publications (2)

Publication Number Publication Date
CN115987691A CN115987691A (en) 2023-04-18
CN115987691B true CN115987691B (en) 2023-06-16

Family

ID=85968587

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310267478.XA Active CN115987691B (en) 2023-03-20 2023-03-20 Mobile application management system and method based on cloud computing and pervasive computing

Country Status (1)

Country Link
CN (1) CN115987691B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005311527A (en) * 2004-04-19 2005-11-04 Hitachi Ltd Group communication system and control method thereof, information processor, and program
JP2009103968A (en) * 2007-10-24 2009-05-14 Kddi Corp Key generation device, terminal device, storage server, and computer program
CN106685969A (en) * 2016-12-29 2017-05-17 武汉华安科技股份有限公司 Hybrid-encrypted information transmission method and transmission system
CN109309564A (en) * 2017-07-28 2019-02-05 兰州世达电子工程技术有限公司 A kind of management method of the contribution type group code key by module exponent
CN110460436A (en) * 2019-07-12 2019-11-15 山东三未信安信息科技有限公司 Hardware device key management method, system, storage medium and computer equipment
CN112152978A (en) * 2019-06-28 2020-12-29 北京金山云网络技术有限公司 Key management method, device, equipment and storage medium
CN114124375A (en) * 2021-11-13 2022-03-01 北京工业大学 Multi-stage key negotiation method for Internet of things environment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005311527A (en) * 2004-04-19 2005-11-04 Hitachi Ltd Group communication system and control method thereof, information processor, and program
JP2009103968A (en) * 2007-10-24 2009-05-14 Kddi Corp Key generation device, terminal device, storage server, and computer program
CN106685969A (en) * 2016-12-29 2017-05-17 武汉华安科技股份有限公司 Hybrid-encrypted information transmission method and transmission system
CN109309564A (en) * 2017-07-28 2019-02-05 兰州世达电子工程技术有限公司 A kind of management method of the contribution type group code key by module exponent
CN112152978A (en) * 2019-06-28 2020-12-29 北京金山云网络技术有限公司 Key management method, device, equipment and storage medium
CN110460436A (en) * 2019-07-12 2019-11-15 山东三未信安信息科技有限公司 Hardware device key management method, system, storage medium and computer equipment
CN114124375A (en) * 2021-11-13 2022-03-01 北京工业大学 Multi-stage key negotiation method for Internet of things environment

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Khalid A.S.Al-Khateeb.A secure protocol using 6DP for quantum authentication and hash functions for key distribution (KDP-6DP).《International Conference on Computer and Communication Engineering (ICCCE'10)》.2010,全文. *
云计算中加密算法与秘钥管理问题研究;尹晓叶;;山西能源学院学报(01);全文 *
基于隐秘映射组合公钥的云计算密钥管理方案;宋宁宁;刘蕴络;姚倩燕;刘倩;;计算机应用研究(09);全文 *

Also Published As

Publication number Publication date
CN115987691A (en) 2023-04-18

Similar Documents

Publication Publication Date Title
JP5990275B2 (en) Method for transmitting data between terminals and terminal
US10171997B2 (en) Method and apparatus for interconnection between terminal device and gateway device
CN109005532B (en) Bluetooth connection method, Bluetooth master device and Bluetooth slave device
CN105472038B (en) File transmission control method, device and system
CN104135339A (en) Bluetooth low-power-consumption communication method, Bluetooth equipment and system
CN102404093A (en) Management method of data transmission modes and data transmission equipment
CN101807944A (en) Mobile terminal and data sharing method thereof
CN110380925B (en) Port selection method and system in network equipment detection
CN103108326A (en) Session relationship establishing method and device and system
CN107659980A (en) A kind of WIFI hot spot connection method and mobile terminal based on mobile terminal
CN104320863A (en) Wireless network access method applied to mobile terminal and mobile terminal
CN115987691B (en) Mobile application management system and method based on cloud computing and pervasive computing
CN105007561A (en) Bluetooth data transmission method, device and system, and mobile terminal
CN105009680A (en) Method, apparatus and system for establishing cooperative communication
CN108471612A (en) SIM card falls card restoration methods, device and terminal
CN113259918A (en) Equipment binding method and system
CN109151790B (en) Bluetooth device connection method and system based on network security
CN105704705A (en) Method for switching terminals with shared eSIM information, terminal and server
CN104079325A (en) Method of sharing information and electronic equipment
CN107222847B (en) Data transmission method, device and terminal
CN112469042B (en) System for locking bound equipment, module and subscriber identity module
CN111836322A (en) Communication method, device, equipment and medium for sharing equipment
CN115396985A (en) Access method and device, electronic equipment and computer readable storage medium
CN110740439A (en) Intelligent matching method of Zigbee equipment and Zigbee equipment
CN113676836B (en) Wireless communication method, wireless communication device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant