CN117176347A - Mobile application certificate verification method and system - Google Patents
Mobile application certificate verification method and system Download PDFInfo
- Publication number
- CN117176347A CN117176347A CN202311443827.5A CN202311443827A CN117176347A CN 117176347 A CN117176347 A CN 117176347A CN 202311443827 A CN202311443827 A CN 202311443827A CN 117176347 A CN117176347 A CN 117176347A
- Authority
- CN
- China
- Prior art keywords
- certificate
- file
- mobile terminal
- application
- application certificate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000012795 verification Methods 0.000 title claims abstract description 28
- 238000000034 method Methods 0.000 title claims abstract description 15
- 230000005540 biological transmission Effects 0.000 claims abstract description 22
- 238000004891 communication Methods 0.000 claims description 9
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000002787 reinforcement Effects 0.000 description 1
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a mobile application certificate verification method, which belongs to the technical field of digital information transmission and comprises the following steps: s1, when a mobile terminal starts an application program, reading a local application certificate file cache and judging whether an application certificate file exists or not; wherein the application certificate file comprises a CA certificate and a public key certificate fingerprint; s2, judging whether the CA certificate is valid or not; if the request is valid, executing S3, and simultaneously, the mobile terminal performs an asynchronous request, and sends an update certificate request to the server terminal through a user-defined TCP encryption channel by loading an update interface; s3, judging whether the public key certificate fingerprint is valid or not; if the application program is valid, normally using the application program; if invalid, submitting error reporting feedback; s4, the server updates the new application certificate file into a local application certificate file cache of the mobile terminal. The invention prevents the interface failure and thus the application program failure caused by the failure of the local certificate through the self-defined TCP encryption channel, and improves the data transmission safety.
Description
Technical Field
The invention relates to the technical field of digital information transmission, in particular to a mobile application certificate verification method and a mobile application certificate verification system.
Background
The mobile terminal application uses HTTPS to carry out network transmission, and ensures the safety of communication through a safety protocol; the CA certificate plays an important role, but there are a plurality of scene problems surrounding the CA certificate, if the mobile terminal adopts the default CA certificate of the system, the mobile terminal cannot ensure that the service terminal communicating with the mobile terminal is safe, and the mobile terminal possibly encounters man-in-the-middle attack; for the server, if a default CA certificate verification manner is used, an illegal request may be suffered.
In the prior art, the mobile terminal is configured and used by adopting a specified CA certificate, and generally has two modes of fixed package certificates and online loading certificates, while the above-mentioned problems can be avoided, new problems are also caused:
if the certificate is fixedly packaged in the application installation package, because the appointed CA certificate has a certain validity period after the application is validated, all HTTPS requests can be invalidated after the validity period, so that for the mobile terminals with more uncertain factors of updating new versions and longer updating coverage period, most online users can face the serious problem of application invalidation, and meanwhile, the communication risk of the mobile terminals can be caused by the fingerprint leakage of the public key certificate of the server.
If the method of loading the certificate online is adopted, the application interface can cause the loading update interface to be invalid due to the expiration of the certificate, and the user can also face the serious problem of application invalidation.
Disclosure of Invention
The invention provides a mobile application certificate verification method for solving the technical problems in the prior art, which comprises the following steps:
s1: when the mobile terminal starts an application program, reading a local application certificate file cache and judging whether an application certificate file exists or not; if so, executing S2; if not, executing S201; the application certificate file comprises a CA certificate and a public key certificate fingerprint;
s2: judging whether the CA certificate is valid or not; if the request is valid, executing S3, simultaneously, carrying out asynchronous request by the mobile terminal, and executing S202 by sending an update certificate request to the server terminal through a self-defined TCP encryption channel through a loading update interface; if not, executing S201;
s3: judging whether the public key certificate fingerprint is valid or not; if so, normally using the application program; if not, submitting error reporting feedback;
s201: the mobile terminal sends a certificate loading request to the server terminal through a loading update interface by utilizing a custom TCP encryption channel, and S202 is executed;
s202: the server side judges whether a new application certificate file exists or not; if so, executing S4; if not, the server stores the application certificate file loaded in the step S201 into a local application certificate file cache of the mobile terminal;
s4: and the server updates the new application certificate file into a local application certificate file cache of the mobile terminal.
The method is further characterized in that the custom TCP encryption channel is an interface communication channel realized based on a TCP transmission protocol through custom transmission data structure protocol and encryption and decryption algorithm.
Further, the server in step S202 stores the application certificate file loaded in step S201 in a local application certificate file cache of the mobile terminal, specifically: the server hashes the CA certificate and the public key certificate fingerprint by a hash value mode to generate an encrypted file, and then sends the encrypted file to a local application certificate file cache of the mobile terminal;
the server in step S4 updates the new application certificate file to the local application certificate file cache of the mobile terminal, specifically: and the server hashes the key of the CA certificate and the public key certificate fingerprint in the new application certificate file in a hash value mode to generate an encrypted file.
Further, the key hash is performed in a hash value mode to generate a key of the encrypted file, and the key is generated by exchanging the character sequence of the first character string and the second character string by using an disorder algorithm and combining the character sequence;
the first character string is formed by splicing specific parameters of the current version of application certificate file through a specific sequence by a server side; the second character string is formed by splicing specific parameters of the mobile terminal hardware equipment in a specific sequence.
Further, the specific parameters of the mobile terminal hardware device are carried and sent to the server when the mobile terminal sends a certificate loading request and/or a certificate updating request.
The invention also provides a mobile application certificate verification system, which comprises:
the server side is used for sending the application certificate file to the mobile side; the application certificate file comprises a CA certificate and a public key certificate fingerprint;
a mobile terminal, comprising:
the cache module is used for storing the application certificate file;
the reading module is used for reading the application certificate file in the cache module;
the loading updating module is used for sending a certificate loading request or a certificate updating request to the server through the custom TCP encryption channel to acquire an application certificate file;
and the verification module is used for verifying the validity of the CA certificate and the public key fingerprint.
Further, the custom TCP encryption channel is an interface communication channel realized based on a TCP transmission protocol through a custom transmission data structure protocol and an encryption and decryption algorithm.
Further, the server performs key hashing on the CA certificate and the public key fingerprint verification data in a hash value mode to generate an encrypted file, and then sends the encrypted file to the mobile terminal.
Further, the key hash is performed in a hash value mode to generate a key of the encrypted file, and the key is generated by exchanging the character sequence of the first character string and the second character string by using an disorder algorithm and combining the character sequence;
the first character string is formed by splicing specific parameters of the application certificate file of the current version through a specific sequence; the second character string is formed by splicing specific parameters of the mobile terminal hardware equipment in a specific sequence.
Further, the specific parameters of the mobile terminal hardware device are carried and sent to the server when the mobile terminal sends a certificate loading request and/or a certificate updating request.
Compared with the prior art, the invention has the beneficial effects that: when a local certificate file is in a valid period and is close to invalidation, the mobile terminal performs asynchronous request to send a certificate updating request to the server terminal, caches a new certificate file, realizes dynamic updating, and avoids exception of other functional interface requests caused by incapability of loading the new certificate in time after the old certificate file is invalidated; the loading update interface is communicated with the server through a custom TCP channel, which is different from the traditional HTTPS request, so that the problem that the loading update interface is invalid after the old certificate file is invalid and further the application program is invalid is avoided, meanwhile, the custom TCP channel is packaged by adopting a custom standard, analysis is prevented, and the safety of data transmission is improved; the encryption file is generated by hashing the application certificate file by a hash value mode, so that the security of data transmission is further improved.
Drawings
FIG. 1 is a flow chart of a mobile application certificate verification method of the present invention;
fig. 2 is a block diagram of a mobile application certificate verification system according to the present invention.
Detailed Description
In order that the invention may be readily understood, a more complete description of the invention will be rendered by reference to the appended drawings. Preferred embodiments of the present invention are shown in the drawings. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used herein in the description of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. The term "and/or" as used herein includes any and all combinations of one or more of the associated listed items.
Referring to fig. 1, the method for verifying a mobile application certificate provided by the present invention includes the following steps:
s1: when the mobile terminal starts an application program, reading a local application certificate file cache and judging whether an application certificate file exists or not; if so, executing S2; if not, executing S201; the application certificate file comprises a CA certificate and a public key certificate fingerprint;
the mobile terminal starts the application program and then performs initialization configuration, reads the local application certificate file cache, and if the local application certificate file does not exist, sends a certificate loading request to the server.
S2: judging whether the CA certificate is valid or not; if the request is valid, executing S3, simultaneously, carrying out asynchronous request by the mobile terminal, and executing S202 by sending an update certificate request to the server terminal through a self-defined TCP encryption channel through a loading update interface; if not, executing S201;
when judging that the locally cached application certificate file is valid, the mobile terminal reads the locally cached application certificate file, simultaneously makes an asynchronous request, and sends a certificate updating request to the server terminal, so as to check whether a new application certificate needs to be updated or not, and the update is performed after the local application certificate is out of date and invalid.
In order to ensure that the new application certificate file has enough validity period, the mobile terminal judges the validity period of the local application certificate file when reading the local application certificate file, and if one or two days remain after the distance expires, an asynchronous request is carried out, and an update certificate request is sent to the server terminal to update the application certificate file.
S3: judging whether the public key fingerprint is valid or not; if so, normally using the application program; if not, submitting error reporting feedback;
s201: the mobile terminal sends a certificate loading request to the server terminal through a loading update interface by utilizing a custom TCP encryption channel, and S202 is executed;
the self-defined TCP encryption channel is a self-carried TCP encryption channel, is different from a common communication protocol, such as http, https, ftp, and is an interface communication channel realized based on the TCP transmission protocol through a self-defined transmission data structure protocol and a self-realized encryption and decryption algorithm.
S202: the server side judges whether a new application certificate file exists or not; if so, executing S4; if not, the server stores the application certificate file loaded in the step S201 into a local application certificate file cache of the mobile terminal;
the server stores the application certificate file loaded in S201 in a local application certificate file cache of the mobile terminal, specifically: and carrying out key hashing on the CA certificate and the public key fingerprint verification data in the application certificate file in a hash value mode to generate an encrypted file.
S4: the server updates the new application certificate file to a local application certificate file cache of the mobile terminal;
the server updates the new application certificate file to a local application certificate file cache of the mobile terminal, specifically, the server hashes the CA certificate and the public key fingerprint verification data in the new application certificate file by a hash value to generate an encrypted file.
The CA certificate file and the public key fingerprint verification data belong to important file data, and if the important file data are directly transmitted in the form of original file data in the transmission process, the risk of interception exists; furthermore, after the mobile terminal loads the file data, if the file data is cached in the mode of original file data, the file data can be easily obtained.
The two file data are mixed and spliced in a splicing mode, key hash generation is carried out in a hash value mode, and then the two file data are used for encrypting network transmission files; after the mobile terminal loads the encrypted file, the encrypted file is cached by using the security chip, and decryption setting is carried out when the encrypted file is used; the loading, encrypting and configuring of the mobile terminal uses logic codes, and the code confusion and reinforcement are used for further ensuring the safety of the codes.
In step S202 and step S4, the key hash is performed by hashing the key to generate the key of the encrypted file, and the first string and the second string are generated by changing the character sequence by using a disorder algorithm and combining the character sequence;
the first character string is formed by splicing specific parameters of the application certificate file of the current version through a specific sequence; the second character string is formed by splicing specific parameters of the mobile terminal hardware equipment in a specific sequence. The specific parameters of the current version of application certificate file are automatically selected by the server side, and the specific sequence is also automatically formulated by the server side. The specific parameters corresponding to the application certificate files of different versions are different, and the specific parameters of the application certificate files of the same version are constant; the specific parameters corresponding to different hardware devices are different, and the specific parameters in the same hardware device are constant.
The specific parameters of the mobile terminal hardware equipment are carried and sent to the server side when the mobile terminal sends a certificate loading request and/or a certificate updating request. The mobile terminal can generate a secret key by itself to decrypt the data of the encrypted file.
Referring to fig. 2, the present invention provides a mobile application certificate verification system, which includes:
the server side is used for sending the application certificate file to the mobile side; the application certificate file comprises a CA certificate and a public key certificate fingerprint;
a mobile terminal, comprising:
the cache module is used for storing the application certificate file;
the reading module is used for reading the application certificate file in the cache module;
the loading updating module is used for sending a certificate loading request or a certificate updating request to the server through the custom TCP encryption channel to acquire an application certificate file;
and the verification module is used for verifying the validity of the CA certificate and the public key fingerprint.
The verification module is also used for calculating the remaining effective time of the CA certificate, and if one or two days remain after the distance expires, the loading update module is informed to carry out asynchronous request, and the certificate update request is sent to the server.
The self-defined TCP encryption channel is an interface communication channel realized based on a TCP transmission protocol through self-defining transmission data structure protocol and encryption and decryption algorithm.
And the server hashes the CA certificate and the public key fingerprint verification data by a hash value mode to generate an encrypted file and then sends the encrypted file to the mobile terminal.
The key hash is carried out in a hash value mode to generate a key of the encrypted file, and the key is generated by exchanging the character sequence of the first character string and the second character string by using a disorder algorithm and combining the character sequence;
the first character string is formed by splicing specific parameters of the application certificate file of the current version through a specific sequence; the second character string is formed by splicing specific parameters of the mobile terminal hardware equipment in a specific sequence.
The specific parameters of the mobile terminal hardware equipment are carried and sent to the server side when the mobile terminal sends a certificate loading request and/or a certificate updating request.
The invention has the beneficial effects that: when a local certificate file is in a valid period and is close to invalidation, the mobile terminal performs asynchronous request to send a certificate updating request to the server terminal, caches a new certificate file, realizes dynamic updating, and avoids exception of other functional interface requests caused by incapability of loading the new certificate in time after the old certificate file is invalidated; the loading update interface is communicated with the server through a custom TCP channel, which is different from the traditional HTTPS request, so that the problem that the loading update interface is invalid after the old certificate file is invalid and further the application program is invalid is avoided, meanwhile, the custom TCP channel is packaged by adopting a custom standard, analysis is prevented, and the safety of data transmission is improved; the encryption file is generated by hashing the application certificate file by a hash value mode, so that the security of data transmission is further improved.
It will be apparent to those skilled in the art from this disclosure that various other changes and modifications can be made which are within the scope of the invention as defined in the appended claims.
The foregoing description is only illustrative of the present invention and is not intended to limit the scope of the invention, and all equivalent structures or equivalent processes or direct or indirect application in other related technical fields are included in the scope of the present invention.
Claims (10)
1. A method for verifying a certificate of a mobile application, comprising the steps of:
s1: when the mobile terminal starts an application program, reading a local application certificate file cache and judging whether an application certificate file exists or not; if so, executing S2; if not, executing S201; the application certificate file comprises a CA certificate and a public key certificate fingerprint;
s2: judging whether the CA certificate is valid or not; if the request is valid, executing S3, simultaneously, carrying out asynchronous request by the mobile terminal, and executing S202 by sending an update certificate request to the server terminal through a self-defined TCP encryption channel through a loading update interface; if not, executing S201;
s3: judging whether the public key certificate fingerprint is valid or not; if so, normally using the application program; if not, submitting error reporting feedback;
s201: the mobile terminal sends a certificate loading request to the server terminal through a loading update interface by utilizing a custom TCP encryption channel, and S202 is executed;
s202: the server side judges whether a new application certificate file exists or not; if so, executing S4; if not, the server stores the application certificate file loaded in the step S201 into a local application certificate file cache of the mobile terminal;
s4: and the server updates the new application certificate file into a local application certificate file cache of the mobile terminal.
2. The method for verifying the mobile application certificate according to claim 1, wherein the custom TCP encryption channel is an interface communication channel implemented by custom transmission data structure protocol and encryption and decryption algorithm based on TCP transmission protocol.
3. The mobile application certificate verification method according to claim 1, wherein the server in step S202 stores the application certificate file loaded in step S201 in a local application certificate file cache of the mobile terminal, specifically: the server hashes the CA certificate and the public key certificate fingerprint by a hash value mode to generate an encrypted file, and then sends the encrypted file to a local application certificate file cache of the mobile terminal;
the server in step S4 updates the new application certificate file to the local application certificate file cache of the mobile terminal, specifically: and the server hashes the key of the CA certificate and the public key certificate fingerprint in the new application certificate file in a hash value mode to generate an encrypted file.
4. A mobile application certificate verification method according to claim 3, wherein the key hashing by means of hash values to generate the key of the encrypted file is generated by permuting the first string and the second string in order of characters by an out-of-order algorithm and combining them;
the first character string is formed by splicing specific parameters of the current version of application certificate file through a specific sequence by a server side; the second character string is formed by splicing specific parameters of the mobile terminal hardware equipment in a specific sequence.
5. The method according to claim 4, wherein the specific parameters of the mobile terminal hardware device are carried by the mobile terminal when the mobile terminal sends a request for loading the certificate and/or a request for updating the certificate, and are sent to the server.
6. A mobile application certificate verification system, comprising:
the server side is used for sending the application certificate file to the mobile side; the application certificate file comprises a CA certificate and a public key certificate fingerprint;
a mobile terminal, comprising:
the cache module is used for storing the application certificate file;
the reading module is used for reading the application certificate file in the cache module;
the loading updating module is used for sending a certificate loading request or a certificate updating request to the server through the custom TCP encryption channel to acquire an application certificate file;
and the verification module is used for verifying the validity of the CA certificate and the public key fingerprint.
7. The mobile application certificate verification system according to claim 6, wherein the custom TCP encryption channel is an interface communication channel implemented by custom transmission data structure protocol and encryption and decryption algorithm based on TCP transmission protocol.
8. The mobile application certificate verification system according to claim 6, wherein the server hashes the CA certificate and the public key fingerprint verification data by means of a hash value to generate an encrypted file, and then sends the encrypted file to the mobile terminal.
9. The mobile application certificate verification system according to claim 8, wherein the key hashing by means of hash values to generate the key of the encrypted file is generated by permuting the first string and the second string in order of characters by an out-of-order algorithm and combining them;
the first character string is formed by splicing specific parameters of the application certificate file of the current version through a specific sequence; the second character string is formed by splicing specific parameters of the mobile terminal hardware equipment in a specific sequence.
10. The mobile application certificate verification system according to claim 9, wherein the specific parameters of the mobile terminal hardware device are carried by the mobile terminal when the mobile terminal sends a request for loading a certificate and/or a request for updating a certificate, and are sent to the server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311443827.5A CN117176347B (en) | 2023-11-02 | 2023-11-02 | Mobile application certificate verification method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311443827.5A CN117176347B (en) | 2023-11-02 | 2023-11-02 | Mobile application certificate verification method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN117176347A true CN117176347A (en) | 2023-12-05 |
CN117176347B CN117176347B (en) | 2024-02-06 |
Family
ID=88939761
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311443827.5A Active CN117176347B (en) | 2023-11-02 | 2023-11-02 | Mobile application certificate verification method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117176347B (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1585326A (en) * | 2004-05-26 | 2005-02-23 | 华南理工大学 | Digital certificate signing server schooling method and system |
CN111510302A (en) * | 2020-04-14 | 2020-08-07 | 北京信安世纪科技股份有限公司 | Method and system for improving certificate verification efficiency in secure communication protocol |
CN111711646A (en) * | 2020-08-20 | 2020-09-25 | 飞天诚信科技股份有限公司 | Method and equipment for ensuring communication security of block chain P2P network node |
US20210006418A1 (en) * | 2019-07-05 | 2021-01-07 | Advanced New Technologies Co., Ltd. | Certificate application operations |
CN112865956A (en) * | 2019-11-26 | 2021-05-28 | 华为技术有限公司 | Certificate updating method and device, terminal equipment and server |
US20210359911A1 (en) * | 2020-05-15 | 2021-11-18 | Microsoft Technology Licensing, Llc | Configuring a device to have certificate(s) by ordering asynchronous work requests |
CN113794564A (en) * | 2021-07-26 | 2021-12-14 | 浪潮软件股份有限公司 | Local SSL self-signed certificate upgrading strategy implementation method of mobile terminal |
CN115442074A (en) * | 2022-08-01 | 2022-12-06 | 银盛支付服务股份有限公司 | Data interaction method for iOS mobile terminal and server back-end |
-
2023
- 2023-11-02 CN CN202311443827.5A patent/CN117176347B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1585326A (en) * | 2004-05-26 | 2005-02-23 | 华南理工大学 | Digital certificate signing server schooling method and system |
US20210006418A1 (en) * | 2019-07-05 | 2021-01-07 | Advanced New Technologies Co., Ltd. | Certificate application operations |
CN112865956A (en) * | 2019-11-26 | 2021-05-28 | 华为技术有限公司 | Certificate updating method and device, terminal equipment and server |
CN111510302A (en) * | 2020-04-14 | 2020-08-07 | 北京信安世纪科技股份有限公司 | Method and system for improving certificate verification efficiency in secure communication protocol |
US20210359911A1 (en) * | 2020-05-15 | 2021-11-18 | Microsoft Technology Licensing, Llc | Configuring a device to have certificate(s) by ordering asynchronous work requests |
CN111711646A (en) * | 2020-08-20 | 2020-09-25 | 飞天诚信科技股份有限公司 | Method and equipment for ensuring communication security of block chain P2P network node |
CN113794564A (en) * | 2021-07-26 | 2021-12-14 | 浪潮软件股份有限公司 | Local SSL self-signed certificate upgrading strategy implementation method of mobile terminal |
CN115442074A (en) * | 2022-08-01 | 2022-12-06 | 银盛支付服务股份有限公司 | Data interaction method for iOS mobile terminal and server back-end |
Also Published As
Publication number | Publication date |
---|---|
CN117176347B (en) | 2024-02-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11882442B2 (en) | Handset identifier verification | |
US9247424B2 (en) | Methods and apparatus for large scale distribution of electronic access clients | |
US7373509B2 (en) | Multi-authentication for a computing device connecting to a network | |
US9184913B2 (en) | Authenticating a telecommunication terminal in a telecommunication network | |
CN110519753B (en) | Access method, device, terminal and readable storage medium | |
EP1289326A1 (en) | Method of verifying downloaded software and corresponding device | |
CN105207774A (en) | Key negotiation method and device of verification information | |
EP0977396A2 (en) | Method for establishing a key using over-the-air communication and password protocol | |
US20080065777A1 (en) | Method and system for establishing a secure over-the-air (ota) device connection | |
US20020181701A1 (en) | Method for cryptographing information | |
JP2007519308A (en) | Application authentication method | |
JP2011515961A (en) | Authentication storage method and authentication storage system for client side certificate authentication information | |
WO2020020008A1 (en) | Authentication method and authentication system | |
US11811739B2 (en) | Web encryption for web messages and application programming interfaces | |
CN110650478A (en) | OTA method, system, device, SE module, program server and medium | |
CN115396121A (en) | Security authentication method for security chip OTA data packet and security chip device | |
CN112765626A (en) | Authorization signature method, device and system based on escrow key and storage medium | |
JP2005522937A (en) | Method and system for changing security information in a computer network | |
EP3541106A1 (en) | Methods and apparatus for euicc certificate management | |
KR100848966B1 (en) | Method for authenticating and decrypting of short message based on public key | |
CN107171814A (en) | A kind of digital certificate updating method and device | |
CN117176347B (en) | Mobile application certificate verification method and system | |
KR20020083551A (en) | Development and Operation Method of Multiagent Based Multipass User Authentication Systems | |
CN114143198B (en) | Firmware upgrading method | |
CN115348578B (en) | Method and device for tracking contacter |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |