CN117176347A - Mobile application certificate verification method and system - Google Patents

Mobile application certificate verification method and system Download PDF

Info

Publication number
CN117176347A
CN117176347A CN202311443827.5A CN202311443827A CN117176347A CN 117176347 A CN117176347 A CN 117176347A CN 202311443827 A CN202311443827 A CN 202311443827A CN 117176347 A CN117176347 A CN 117176347A
Authority
CN
China
Prior art keywords
certificate
file
mobile terminal
application
application certificate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311443827.5A
Other languages
Chinese (zh)
Other versions
CN117176347B (en
Inventor
苏煦烽
邱雪雁
官轲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Qinlin Science & Technology Co ltd
Original Assignee
Shenzhen Qinlin Science & Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Qinlin Science & Technology Co ltd filed Critical Shenzhen Qinlin Science & Technology Co ltd
Priority to CN202311443827.5A priority Critical patent/CN117176347B/en
Publication of CN117176347A publication Critical patent/CN117176347A/en
Application granted granted Critical
Publication of CN117176347B publication Critical patent/CN117176347B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a mobile application certificate verification method, which belongs to the technical field of digital information transmission and comprises the following steps: s1, when a mobile terminal starts an application program, reading a local application certificate file cache and judging whether an application certificate file exists or not; wherein the application certificate file comprises a CA certificate and a public key certificate fingerprint; s2, judging whether the CA certificate is valid or not; if the request is valid, executing S3, and simultaneously, the mobile terminal performs an asynchronous request, and sends an update certificate request to the server terminal through a user-defined TCP encryption channel by loading an update interface; s3, judging whether the public key certificate fingerprint is valid or not; if the application program is valid, normally using the application program; if invalid, submitting error reporting feedback; s4, the server updates the new application certificate file into a local application certificate file cache of the mobile terminal. The invention prevents the interface failure and thus the application program failure caused by the failure of the local certificate through the self-defined TCP encryption channel, and improves the data transmission safety.

Description

Mobile application certificate verification method and system
Technical Field
The invention relates to the technical field of digital information transmission, in particular to a mobile application certificate verification method and a mobile application certificate verification system.
Background
The mobile terminal application uses HTTPS to carry out network transmission, and ensures the safety of communication through a safety protocol; the CA certificate plays an important role, but there are a plurality of scene problems surrounding the CA certificate, if the mobile terminal adopts the default CA certificate of the system, the mobile terminal cannot ensure that the service terminal communicating with the mobile terminal is safe, and the mobile terminal possibly encounters man-in-the-middle attack; for the server, if a default CA certificate verification manner is used, an illegal request may be suffered.
In the prior art, the mobile terminal is configured and used by adopting a specified CA certificate, and generally has two modes of fixed package certificates and online loading certificates, while the above-mentioned problems can be avoided, new problems are also caused:
if the certificate is fixedly packaged in the application installation package, because the appointed CA certificate has a certain validity period after the application is validated, all HTTPS requests can be invalidated after the validity period, so that for the mobile terminals with more uncertain factors of updating new versions and longer updating coverage period, most online users can face the serious problem of application invalidation, and meanwhile, the communication risk of the mobile terminals can be caused by the fingerprint leakage of the public key certificate of the server.
If the method of loading the certificate online is adopted, the application interface can cause the loading update interface to be invalid due to the expiration of the certificate, and the user can also face the serious problem of application invalidation.
Disclosure of Invention
The invention provides a mobile application certificate verification method for solving the technical problems in the prior art, which comprises the following steps:
s1: when the mobile terminal starts an application program, reading a local application certificate file cache and judging whether an application certificate file exists or not; if so, executing S2; if not, executing S201; the application certificate file comprises a CA certificate and a public key certificate fingerprint;
s2: judging whether the CA certificate is valid or not; if the request is valid, executing S3, simultaneously, carrying out asynchronous request by the mobile terminal, and executing S202 by sending an update certificate request to the server terminal through a self-defined TCP encryption channel through a loading update interface; if not, executing S201;
s3: judging whether the public key certificate fingerprint is valid or not; if so, normally using the application program; if not, submitting error reporting feedback;
s201: the mobile terminal sends a certificate loading request to the server terminal through a loading update interface by utilizing a custom TCP encryption channel, and S202 is executed;
s202: the server side judges whether a new application certificate file exists or not; if so, executing S4; if not, the server stores the application certificate file loaded in the step S201 into a local application certificate file cache of the mobile terminal;
s4: and the server updates the new application certificate file into a local application certificate file cache of the mobile terminal.
The method is further characterized in that the custom TCP encryption channel is an interface communication channel realized based on a TCP transmission protocol through custom transmission data structure protocol and encryption and decryption algorithm.
Further, the server in step S202 stores the application certificate file loaded in step S201 in a local application certificate file cache of the mobile terminal, specifically: the server hashes the CA certificate and the public key certificate fingerprint by a hash value mode to generate an encrypted file, and then sends the encrypted file to a local application certificate file cache of the mobile terminal;
the server in step S4 updates the new application certificate file to the local application certificate file cache of the mobile terminal, specifically: and the server hashes the key of the CA certificate and the public key certificate fingerprint in the new application certificate file in a hash value mode to generate an encrypted file.
Further, the key hash is performed in a hash value mode to generate a key of the encrypted file, and the key is generated by exchanging the character sequence of the first character string and the second character string by using an disorder algorithm and combining the character sequence;
the first character string is formed by splicing specific parameters of the current version of application certificate file through a specific sequence by a server side; the second character string is formed by splicing specific parameters of the mobile terminal hardware equipment in a specific sequence.
Further, the specific parameters of the mobile terminal hardware device are carried and sent to the server when the mobile terminal sends a certificate loading request and/or a certificate updating request.
The invention also provides a mobile application certificate verification system, which comprises:
the server side is used for sending the application certificate file to the mobile side; the application certificate file comprises a CA certificate and a public key certificate fingerprint;
a mobile terminal, comprising:
the cache module is used for storing the application certificate file;
the reading module is used for reading the application certificate file in the cache module;
the loading updating module is used for sending a certificate loading request or a certificate updating request to the server through the custom TCP encryption channel to acquire an application certificate file;
and the verification module is used for verifying the validity of the CA certificate and the public key fingerprint.
Further, the custom TCP encryption channel is an interface communication channel realized based on a TCP transmission protocol through a custom transmission data structure protocol and an encryption and decryption algorithm.
Further, the server performs key hashing on the CA certificate and the public key fingerprint verification data in a hash value mode to generate an encrypted file, and then sends the encrypted file to the mobile terminal.
Further, the key hash is performed in a hash value mode to generate a key of the encrypted file, and the key is generated by exchanging the character sequence of the first character string and the second character string by using an disorder algorithm and combining the character sequence;
the first character string is formed by splicing specific parameters of the application certificate file of the current version through a specific sequence; the second character string is formed by splicing specific parameters of the mobile terminal hardware equipment in a specific sequence.
Further, the specific parameters of the mobile terminal hardware device are carried and sent to the server when the mobile terminal sends a certificate loading request and/or a certificate updating request.
Compared with the prior art, the invention has the beneficial effects that: when a local certificate file is in a valid period and is close to invalidation, the mobile terminal performs asynchronous request to send a certificate updating request to the server terminal, caches a new certificate file, realizes dynamic updating, and avoids exception of other functional interface requests caused by incapability of loading the new certificate in time after the old certificate file is invalidated; the loading update interface is communicated with the server through a custom TCP channel, which is different from the traditional HTTPS request, so that the problem that the loading update interface is invalid after the old certificate file is invalid and further the application program is invalid is avoided, meanwhile, the custom TCP channel is packaged by adopting a custom standard, analysis is prevented, and the safety of data transmission is improved; the encryption file is generated by hashing the application certificate file by a hash value mode, so that the security of data transmission is further improved.
Drawings
FIG. 1 is a flow chart of a mobile application certificate verification method of the present invention;
fig. 2 is a block diagram of a mobile application certificate verification system according to the present invention.
Detailed Description
In order that the invention may be readily understood, a more complete description of the invention will be rendered by reference to the appended drawings. Preferred embodiments of the present invention are shown in the drawings. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used herein in the description of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. The term "and/or" as used herein includes any and all combinations of one or more of the associated listed items.
Referring to fig. 1, the method for verifying a mobile application certificate provided by the present invention includes the following steps:
s1: when the mobile terminal starts an application program, reading a local application certificate file cache and judging whether an application certificate file exists or not; if so, executing S2; if not, executing S201; the application certificate file comprises a CA certificate and a public key certificate fingerprint;
the mobile terminal starts the application program and then performs initialization configuration, reads the local application certificate file cache, and if the local application certificate file does not exist, sends a certificate loading request to the server.
S2: judging whether the CA certificate is valid or not; if the request is valid, executing S3, simultaneously, carrying out asynchronous request by the mobile terminal, and executing S202 by sending an update certificate request to the server terminal through a self-defined TCP encryption channel through a loading update interface; if not, executing S201;
when judging that the locally cached application certificate file is valid, the mobile terminal reads the locally cached application certificate file, simultaneously makes an asynchronous request, and sends a certificate updating request to the server terminal, so as to check whether a new application certificate needs to be updated or not, and the update is performed after the local application certificate is out of date and invalid.
In order to ensure that the new application certificate file has enough validity period, the mobile terminal judges the validity period of the local application certificate file when reading the local application certificate file, and if one or two days remain after the distance expires, an asynchronous request is carried out, and an update certificate request is sent to the server terminal to update the application certificate file.
S3: judging whether the public key fingerprint is valid or not; if so, normally using the application program; if not, submitting error reporting feedback;
s201: the mobile terminal sends a certificate loading request to the server terminal through a loading update interface by utilizing a custom TCP encryption channel, and S202 is executed;
the self-defined TCP encryption channel is a self-carried TCP encryption channel, is different from a common communication protocol, such as http, https, ftp, and is an interface communication channel realized based on the TCP transmission protocol through a self-defined transmission data structure protocol and a self-realized encryption and decryption algorithm.
S202: the server side judges whether a new application certificate file exists or not; if so, executing S4; if not, the server stores the application certificate file loaded in the step S201 into a local application certificate file cache of the mobile terminal;
the server stores the application certificate file loaded in S201 in a local application certificate file cache of the mobile terminal, specifically: and carrying out key hashing on the CA certificate and the public key fingerprint verification data in the application certificate file in a hash value mode to generate an encrypted file.
S4: the server updates the new application certificate file to a local application certificate file cache of the mobile terminal;
the server updates the new application certificate file to a local application certificate file cache of the mobile terminal, specifically, the server hashes the CA certificate and the public key fingerprint verification data in the new application certificate file by a hash value to generate an encrypted file.
The CA certificate file and the public key fingerprint verification data belong to important file data, and if the important file data are directly transmitted in the form of original file data in the transmission process, the risk of interception exists; furthermore, after the mobile terminal loads the file data, if the file data is cached in the mode of original file data, the file data can be easily obtained.
The two file data are mixed and spliced in a splicing mode, key hash generation is carried out in a hash value mode, and then the two file data are used for encrypting network transmission files; after the mobile terminal loads the encrypted file, the encrypted file is cached by using the security chip, and decryption setting is carried out when the encrypted file is used; the loading, encrypting and configuring of the mobile terminal uses logic codes, and the code confusion and reinforcement are used for further ensuring the safety of the codes.
In step S202 and step S4, the key hash is performed by hashing the key to generate the key of the encrypted file, and the first string and the second string are generated by changing the character sequence by using a disorder algorithm and combining the character sequence;
the first character string is formed by splicing specific parameters of the application certificate file of the current version through a specific sequence; the second character string is formed by splicing specific parameters of the mobile terminal hardware equipment in a specific sequence. The specific parameters of the current version of application certificate file are automatically selected by the server side, and the specific sequence is also automatically formulated by the server side. The specific parameters corresponding to the application certificate files of different versions are different, and the specific parameters of the application certificate files of the same version are constant; the specific parameters corresponding to different hardware devices are different, and the specific parameters in the same hardware device are constant.
The specific parameters of the mobile terminal hardware equipment are carried and sent to the server side when the mobile terminal sends a certificate loading request and/or a certificate updating request. The mobile terminal can generate a secret key by itself to decrypt the data of the encrypted file.
Referring to fig. 2, the present invention provides a mobile application certificate verification system, which includes:
the server side is used for sending the application certificate file to the mobile side; the application certificate file comprises a CA certificate and a public key certificate fingerprint;
a mobile terminal, comprising:
the cache module is used for storing the application certificate file;
the reading module is used for reading the application certificate file in the cache module;
the loading updating module is used for sending a certificate loading request or a certificate updating request to the server through the custom TCP encryption channel to acquire an application certificate file;
and the verification module is used for verifying the validity of the CA certificate and the public key fingerprint.
The verification module is also used for calculating the remaining effective time of the CA certificate, and if one or two days remain after the distance expires, the loading update module is informed to carry out asynchronous request, and the certificate update request is sent to the server.
The self-defined TCP encryption channel is an interface communication channel realized based on a TCP transmission protocol through self-defining transmission data structure protocol and encryption and decryption algorithm.
And the server hashes the CA certificate and the public key fingerprint verification data by a hash value mode to generate an encrypted file and then sends the encrypted file to the mobile terminal.
The key hash is carried out in a hash value mode to generate a key of the encrypted file, and the key is generated by exchanging the character sequence of the first character string and the second character string by using a disorder algorithm and combining the character sequence;
the first character string is formed by splicing specific parameters of the application certificate file of the current version through a specific sequence; the second character string is formed by splicing specific parameters of the mobile terminal hardware equipment in a specific sequence.
The specific parameters of the mobile terminal hardware equipment are carried and sent to the server side when the mobile terminal sends a certificate loading request and/or a certificate updating request.
The invention has the beneficial effects that: when a local certificate file is in a valid period and is close to invalidation, the mobile terminal performs asynchronous request to send a certificate updating request to the server terminal, caches a new certificate file, realizes dynamic updating, and avoids exception of other functional interface requests caused by incapability of loading the new certificate in time after the old certificate file is invalidated; the loading update interface is communicated with the server through a custom TCP channel, which is different from the traditional HTTPS request, so that the problem that the loading update interface is invalid after the old certificate file is invalid and further the application program is invalid is avoided, meanwhile, the custom TCP channel is packaged by adopting a custom standard, analysis is prevented, and the safety of data transmission is improved; the encryption file is generated by hashing the application certificate file by a hash value mode, so that the security of data transmission is further improved.
It will be apparent to those skilled in the art from this disclosure that various other changes and modifications can be made which are within the scope of the invention as defined in the appended claims.
The foregoing description is only illustrative of the present invention and is not intended to limit the scope of the invention, and all equivalent structures or equivalent processes or direct or indirect application in other related technical fields are included in the scope of the present invention.

Claims (10)

1. A method for verifying a certificate of a mobile application, comprising the steps of:
s1: when the mobile terminal starts an application program, reading a local application certificate file cache and judging whether an application certificate file exists or not; if so, executing S2; if not, executing S201; the application certificate file comprises a CA certificate and a public key certificate fingerprint;
s2: judging whether the CA certificate is valid or not; if the request is valid, executing S3, simultaneously, carrying out asynchronous request by the mobile terminal, and executing S202 by sending an update certificate request to the server terminal through a self-defined TCP encryption channel through a loading update interface; if not, executing S201;
s3: judging whether the public key certificate fingerprint is valid or not; if so, normally using the application program; if not, submitting error reporting feedback;
s201: the mobile terminal sends a certificate loading request to the server terminal through a loading update interface by utilizing a custom TCP encryption channel, and S202 is executed;
s202: the server side judges whether a new application certificate file exists or not; if so, executing S4; if not, the server stores the application certificate file loaded in the step S201 into a local application certificate file cache of the mobile terminal;
s4: and the server updates the new application certificate file into a local application certificate file cache of the mobile terminal.
2. The method for verifying the mobile application certificate according to claim 1, wherein the custom TCP encryption channel is an interface communication channel implemented by custom transmission data structure protocol and encryption and decryption algorithm based on TCP transmission protocol.
3. The mobile application certificate verification method according to claim 1, wherein the server in step S202 stores the application certificate file loaded in step S201 in a local application certificate file cache of the mobile terminal, specifically: the server hashes the CA certificate and the public key certificate fingerprint by a hash value mode to generate an encrypted file, and then sends the encrypted file to a local application certificate file cache of the mobile terminal;
the server in step S4 updates the new application certificate file to the local application certificate file cache of the mobile terminal, specifically: and the server hashes the key of the CA certificate and the public key certificate fingerprint in the new application certificate file in a hash value mode to generate an encrypted file.
4. A mobile application certificate verification method according to claim 3, wherein the key hashing by means of hash values to generate the key of the encrypted file is generated by permuting the first string and the second string in order of characters by an out-of-order algorithm and combining them;
the first character string is formed by splicing specific parameters of the current version of application certificate file through a specific sequence by a server side; the second character string is formed by splicing specific parameters of the mobile terminal hardware equipment in a specific sequence.
5. The method according to claim 4, wherein the specific parameters of the mobile terminal hardware device are carried by the mobile terminal when the mobile terminal sends a request for loading the certificate and/or a request for updating the certificate, and are sent to the server.
6. A mobile application certificate verification system, comprising:
the server side is used for sending the application certificate file to the mobile side; the application certificate file comprises a CA certificate and a public key certificate fingerprint;
a mobile terminal, comprising:
the cache module is used for storing the application certificate file;
the reading module is used for reading the application certificate file in the cache module;
the loading updating module is used for sending a certificate loading request or a certificate updating request to the server through the custom TCP encryption channel to acquire an application certificate file;
and the verification module is used for verifying the validity of the CA certificate and the public key fingerprint.
7. The mobile application certificate verification system according to claim 6, wherein the custom TCP encryption channel is an interface communication channel implemented by custom transmission data structure protocol and encryption and decryption algorithm based on TCP transmission protocol.
8. The mobile application certificate verification system according to claim 6, wherein the server hashes the CA certificate and the public key fingerprint verification data by means of a hash value to generate an encrypted file, and then sends the encrypted file to the mobile terminal.
9. The mobile application certificate verification system according to claim 8, wherein the key hashing by means of hash values to generate the key of the encrypted file is generated by permuting the first string and the second string in order of characters by an out-of-order algorithm and combining them;
the first character string is formed by splicing specific parameters of the application certificate file of the current version through a specific sequence; the second character string is formed by splicing specific parameters of the mobile terminal hardware equipment in a specific sequence.
10. The mobile application certificate verification system according to claim 9, wherein the specific parameters of the mobile terminal hardware device are carried by the mobile terminal when the mobile terminal sends a request for loading a certificate and/or a request for updating a certificate, and are sent to the server.
CN202311443827.5A 2023-11-02 2023-11-02 Mobile application certificate verification method and system Active CN117176347B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311443827.5A CN117176347B (en) 2023-11-02 2023-11-02 Mobile application certificate verification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311443827.5A CN117176347B (en) 2023-11-02 2023-11-02 Mobile application certificate verification method and system

Publications (2)

Publication Number Publication Date
CN117176347A true CN117176347A (en) 2023-12-05
CN117176347B CN117176347B (en) 2024-02-06

Family

ID=88939761

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311443827.5A Active CN117176347B (en) 2023-11-02 2023-11-02 Mobile application certificate verification method and system

Country Status (1)

Country Link
CN (1) CN117176347B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1585326A (en) * 2004-05-26 2005-02-23 华南理工大学 Digital certificate signing server schooling method and system
CN111510302A (en) * 2020-04-14 2020-08-07 北京信安世纪科技股份有限公司 Method and system for improving certificate verification efficiency in secure communication protocol
CN111711646A (en) * 2020-08-20 2020-09-25 飞天诚信科技股份有限公司 Method and equipment for ensuring communication security of block chain P2P network node
US20210006418A1 (en) * 2019-07-05 2021-01-07 Advanced New Technologies Co., Ltd. Certificate application operations
CN112865956A (en) * 2019-11-26 2021-05-28 华为技术有限公司 Certificate updating method and device, terminal equipment and server
US20210359911A1 (en) * 2020-05-15 2021-11-18 Microsoft Technology Licensing, Llc Configuring a device to have certificate(s) by ordering asynchronous work requests
CN113794564A (en) * 2021-07-26 2021-12-14 浪潮软件股份有限公司 Local SSL self-signed certificate upgrading strategy implementation method of mobile terminal
CN115442074A (en) * 2022-08-01 2022-12-06 银盛支付服务股份有限公司 Data interaction method for iOS mobile terminal and server back-end

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1585326A (en) * 2004-05-26 2005-02-23 华南理工大学 Digital certificate signing server schooling method and system
US20210006418A1 (en) * 2019-07-05 2021-01-07 Advanced New Technologies Co., Ltd. Certificate application operations
CN112865956A (en) * 2019-11-26 2021-05-28 华为技术有限公司 Certificate updating method and device, terminal equipment and server
CN111510302A (en) * 2020-04-14 2020-08-07 北京信安世纪科技股份有限公司 Method and system for improving certificate verification efficiency in secure communication protocol
US20210359911A1 (en) * 2020-05-15 2021-11-18 Microsoft Technology Licensing, Llc Configuring a device to have certificate(s) by ordering asynchronous work requests
CN111711646A (en) * 2020-08-20 2020-09-25 飞天诚信科技股份有限公司 Method and equipment for ensuring communication security of block chain P2P network node
CN113794564A (en) * 2021-07-26 2021-12-14 浪潮软件股份有限公司 Local SSL self-signed certificate upgrading strategy implementation method of mobile terminal
CN115442074A (en) * 2022-08-01 2022-12-06 银盛支付服务股份有限公司 Data interaction method for iOS mobile terminal and server back-end

Also Published As

Publication number Publication date
CN117176347B (en) 2024-02-06

Similar Documents

Publication Publication Date Title
US11882442B2 (en) Handset identifier verification
US9247424B2 (en) Methods and apparatus for large scale distribution of electronic access clients
US7373509B2 (en) Multi-authentication for a computing device connecting to a network
US9184913B2 (en) Authenticating a telecommunication terminal in a telecommunication network
CN110519753B (en) Access method, device, terminal and readable storage medium
EP1289326A1 (en) Method of verifying downloaded software and corresponding device
CN105207774A (en) Key negotiation method and device of verification information
EP0977396A2 (en) Method for establishing a key using over-the-air communication and password protocol
US20080065777A1 (en) Method and system for establishing a secure over-the-air (ota) device connection
US20020181701A1 (en) Method for cryptographing information
JP2007519308A (en) Application authentication method
JP2011515961A (en) Authentication storage method and authentication storage system for client side certificate authentication information
WO2020020008A1 (en) Authentication method and authentication system
US11811739B2 (en) Web encryption for web messages and application programming interfaces
CN110650478A (en) OTA method, system, device, SE module, program server and medium
CN115396121A (en) Security authentication method for security chip OTA data packet and security chip device
CN112765626A (en) Authorization signature method, device and system based on escrow key and storage medium
JP2005522937A (en) Method and system for changing security information in a computer network
EP3541106A1 (en) Methods and apparatus for euicc certificate management
KR100848966B1 (en) Method for authenticating and decrypting of short message based on public key
CN107171814A (en) A kind of digital certificate updating method and device
CN117176347B (en) Mobile application certificate verification method and system
KR20020083551A (en) Development and Operation Method of Multiagent Based Multipass User Authentication Systems
CN114143198B (en) Firmware upgrading method
CN115348578B (en) Method and device for tracking contacter

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant