WO2018121394A1 - Terminal mobile, et procédé et dispositif d'acquisition et d'envoi d'informations d'alarme - Google Patents

Terminal mobile, et procédé et dispositif d'acquisition et d'envoi d'informations d'alarme Download PDF

Info

Publication number
WO2018121394A1
WO2018121394A1 PCT/CN2017/117661 CN2017117661W WO2018121394A1 WO 2018121394 A1 WO2018121394 A1 WO 2018121394A1 CN 2017117661 W CN2017117661 W CN 2017117661W WO 2018121394 A1 WO2018121394 A1 WO 2018121394A1
Authority
WO
WIPO (PCT)
Prior art keywords
alarm
user information
authentication
user
information
Prior art date
Application number
PCT/CN2017/117661
Other languages
English (en)
Chinese (zh)
Inventor
袁虎
李阿男
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2018121394A1 publication Critical patent/WO2018121394A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/28Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • Embodiments of the present invention relate to, but are not limited to, the field of data network communication, in particular, a mobile terminal, an alarm information acquisition, and an alarm information transmission method and apparatus.
  • the alarm needs to be sent to the maintenance personnel's mobile terminal device, such as a mobile phone or a tablet, so as to notify the maintenance personnel of the alarm.
  • a monitoring port is opened on the network management server as the server, and the mobile device acts as a listening port of the client connection server. After the connection is established, the network management system can send an alarm notification to the mobile device.
  • the general method requires the network management system to be on the public network (Internet) and has a legal IP address of the public network. This is in conflict with the requirement that the network management generally needs to be located on a private local area network to maintain the security of the network management system.
  • the listening port is vulnerable to attacks by illegal users. For example, a large number of data packets are frequently sent to the listening port, which affects the normal operation of the network management system.
  • the embodiment of the invention provides a mobile terminal, an alarm information acquisition method, and an alarm information transmission method and device.
  • a method for acquiring alarm information includes: receiving an alarm message; authenticating a user identity in the alarm message according to user information input by the user; and decrypting the alarm message if the authentication is passed Encrypted alarm information carried in.
  • the authenticating the user identity in the alarm message according to the user information input by the user includes: determining whether the user information exists in the unrestricted user information list; and determining that the result is yes Confirm that the certification is passed.
  • determining whether the user information exists in the unrestricted user information list comprises: encrypting the user information input by the user; determining whether the encrypted user information exists in the unrestricted user In the information list.
  • the encrypting the user information input by the user comprises: encrypting the user information by means of non-reversible encryption.
  • the alarm message includes an authentication mark, or a content mark, or an authentication mark and a content mark, and the authentication message or the content mark, or the authentication mark and the content mark are used to distinguish the carried in the alarm message.
  • the authentication flag includes a start tag of the unrestricted user information list and a length of the unrestricted user information list;
  • the content flag includes a start tag of the alert information and a length of the alert message.
  • the decrypting the encrypted alarm information carried in the alarm message includes: acquiring a secret key used to decrypt the alarm information; and decrypting, by using the secret key, the encrypted information carried in the alarm message Alarm information.
  • the user information includes: a username and a password corresponding to the username.
  • Embodiments of the present invention provide a computer readable storage medium storing computer executable instructions that, when executed, implement the above-described alarm information acquisition method.
  • a method for transmitting an alarm information includes: sending an alarm message, where the alarm message carries encrypted alarm information and user information for authenticating a user identity, the authentication The user information is a basis for judging whether the authentication is passed, and whether the authentication passes the basis for whether the alarm message can be decrypted.
  • the alert message carries an encrypted list of unrestricted user information, the alert message including an authentication mark, or a content mark, or an authentication mark and a content mark, the authentication message, or a content mark, or an authentication mark And the content identifier is used to distinguish the unrestricted user information list and the alarm information carried in the alarm message.
  • the recognition The certificate flag includes a start tag of the unrestricted user information list and a length of the unrestricted user information list; if the alert message includes the content flag, the content flag includes a start tag of the alert information and the The length of the alarm information.
  • Embodiments of the present invention provide a computer readable storage medium storing computer executable instructions that, when executed, implement the above-described alarm information transmitting method.
  • a mobile terminal including: a receiving module, configured to receive an alarm message; and an authentication module, configured to authenticate a user identity in the alarm message according to user information input by the user; The encrypted alarm information carried in the alarm message is decrypted in the case that the authentication is passed.
  • the authentication module includes a determining unit, configured to determine whether the user information exists in the unrestricted user information list; and if the determination result is yes, determine that the authentication is passed.
  • an apparatus for transmitting alarm information includes: a sending module, configured to send an alarm message, where the alarm message carries encrypted alarm information and a user for authenticating a user identity
  • the user information of the authentication is a basis for judging whether the authentication is passed, and whether the authentication passes the basis of whether the alarm message can be decrypted.
  • the invention adopts the technical solution of authenticating the identity of the user in the alarm message according to the user information, and decrypting the encrypted alarm information carried in the alarm message when the authentication is passed, and obtaining the network management alarm information more securely.
  • FIG. 1 is a flowchart of a method for acquiring alarm information according to an embodiment of the present invention
  • FIG. 2 is a schematic diagram of a method for transmitting alarm information according to another embodiment of the present invention.
  • FIG. 3 is a flowchart of a method for acquiring alarm information according to an embodiment of the present invention
  • FIG. 4 is a flowchart of a method for acquiring alarm information according to an embodiment of the present invention.
  • FIG. 5 is a structural block diagram of a mobile terminal according to an embodiment of the present invention.
  • FIG. 6 is a structural block diagram of a mobile terminal according to an embodiment of the present invention.
  • FIG. 7 is a structural block diagram of an alarm information transmitting apparatus according to another embodiment of the present invention.
  • FIG. 1 is a flowchart of a method for acquiring alarm information according to an embodiment of the present invention. As shown in FIG. 1, the method includes steps S102 to S106.
  • Step S102 receiving an alarm message
  • Step S104 Authenticate the user identity in the alarm message according to the user information input by the user;
  • step S106 if the authentication is passed, the encrypted alarm information carried in the alarm message is decrypted.
  • the embodiment of the invention relates to a method for acquiring alarm information, which can obtain network management alarm information more securely.
  • the execution entities of the above process steps include, but are not limited to, a network management system.
  • the user information includes a username and a password corresponding to the username.
  • the foregoing alarm message may be a short message of the operator, and the alarm information is sent to the maintenance personnel by sending a short message.
  • the mobile terminal number of the above maintenance personnel is recorded in advance on the network management.
  • the alarm message may carry multiple pieces of alarm information, and the alarm cost is reduced in a manner that sacrifices part of the alarm information in real time.
  • authentication There are many ways to implement authentication based on user information. For example, a non-restricted list can be used, and users in the list are trusted. This method is similar to the implementation of blacklist and whitelist. Of course, other methods can be used for authentication. No matter which method is used for authentication, the technical problem to be solved by the present application can be solved as long as the authentication function can be implemented.
  • the following steps may be implemented to implement the step of authenticating the user identity in the alarm message according to the user information input by the user:
  • Determining whether the user information exists in the unrestricted user information list determining that the user information exists in the unrestricted user information list, determining that the authentication is passed, and decrypting the encrypted alarm information carried in the alarm message.
  • an interface can also be provided to allow the content in the list to be modified.
  • the list is a whitelist or a blacklist, or the read permission, edit permission, etc. of the list. It is the use of an implementation such as a list that makes the above functions possible.
  • determining whether the user information exists in the unrestricted user information list includes at least the following manner:
  • the user information is encrypted by means of non-reversible encryption.
  • the irreversible encryption is opposite to the reversible encryption, and refers to the content that cannot be encrypted by using the algorithm or the original pre-encrypted content. More commonly used are MD5 (Message Digest Algorithm 5, Message Digest Algorithm Fifth Edition), SHA (Secure Hash Algorithm), and the like. Compared with the reversible encryption method, the irreversible encryption method is more secure and reliable because the original encrypted content cannot be pushed out through the encrypted content.
  • the alert message may include an authentication flag, may include a content flag, or may be a combination of an authentication flag and a content flag.
  • the authentication message and the content identifier are used to distinguish the unrestricted user information list and the alarm information carried in the alarm message.
  • the authentication flag may include a start tag of the unrestricted user information list and a length of the unrestricted user information list; the authentication flag A start tag of the unrestricted user information list and a termination tag of the unrestricted user information list may also be included.
  • the alarm message may include the content flag
  • the content flag includes a start tag of the alarm information and a length of the alarm information; the content flag may also include a start tag of the alarm information and the alarm The end tag of the message.
  • an alarm information sending method is as shown in FIG. 2, and the method includes the following steps:
  • Step S201 Send an alarm message, where the alarm message carries an encrypted alarm message.
  • the user information for authenticating the user identity is a basis for determining whether the authentication is passed, and whether the authentication passes the basis for whether the alarm message can be decrypted.
  • the alert message carries an encrypted list of unrestricted user information, the alert message including an authentication mark, or a content mark, or an authentication mark and a content mark, the authentication message, or a content mark, or an authentication mark And the content identifier is used to distinguish the unrestricted user information list and the alarm information carried in the alarm message.
  • the authentication flag may include a start tag of the unrestricted user information list and a length of the unrestricted user information list; the authentication flag A start tag of the unrestricted user information list and a termination tag of the unrestricted user information list may also be included.
  • the alarm message may include the content flag
  • the content flag includes a start tag of the alarm information and a length of the alarm information; the content flag may also include a start tag of the alarm information and the alarm The end tag of the message.
  • FIG. 3 is a flowchart of a method for acquiring alarm information according to an embodiment of the present invention. As shown in FIG. 3, the method includes steps S302-S308.
  • Step S302 recording the number of the mobile terminal of the maintenance personnel to the network management
  • Step S304 after the network management generates an alarm, encrypt the user name and password information having the reading authority as the file header AA by using the irreversible encryption algorithm A, and encrypt the alarm content as the file body BB by using the reversible encryption algorithm B and the encryption key K1. And combining the encrypted content to generate an alarm message.
  • the alarm message is also the alarm report file mentioned below.
  • the above list of users with read access is also the list of unrestricted users mentioned above.
  • the non-reversible encryption algorithm refers to that the original encrypted content cannot be calculated or inverted by using the content encrypted by the algorithm. Now more commonly used are MD5, SHA algorithm and so on.
  • the reversible encryption algorithm means that the original encrypted content can be calculated or inverted by using the content encrypted by the algorithm.
  • the more commonly used is the symmetric encryption algorithm, which is to set the secret key only known by the encryption end and the decryption end.
  • the encryption end uses the secret key to encrypt, and the decryption end can use the secret key to decrypt the encrypted content to obtain the original text, which is more commonly used now.
  • Step S306 the network management device sends the alarm message to the mobile terminal of the maintenance personnel in a short message manner. Since the network management is not required to be on the public network in this embodiment, the security of the network management is ensured.
  • Step S308 the mobile terminal installs a dedicated alarm reading program to read the received short message, and asks the maintenance personnel to input the user name and password. If the user name and password are calculated by the irreversible encryption algorithm A, the result can be reported in the alarm report file. Found in the AA section, the BB part of the alarm report file is decrypted using the reversible encryption algorithm B and the encryption key K1 to obtain the original text of the alarm information and displayed; if the user name and password are calculated by the non-reversible encryption algorithm A, the result is obtained. If the alarm report file cannot be found in the AA part, the user is prompted to fail authentication and the alarm information is not displayed. Because the user and the password are verified, and the checked content is stored in the short message, the user of the mobile terminal is not required to connect to the network management device to perform the permission check, thereby further ensuring the security of the alarm content of the network management.
  • the non-reversible encryption algorithm A, the reversible encryption algorithm B and the encryption key K1 are known only to the network management developer, and have been fixedly used in the development of installing a dedicated alarm reading program on the network management system and the mobile terminal. For security reasons, it cannot be known by other people, such as network management users.
  • the user and the password are verified, and the verified comparison content exists in the short message, and the user of the mobile terminal is not required to connect to the network management device to perform permission verification, thereby ensuring the security of the alarm content of the network management.
  • the user name and password are combined and encrypted together, and the user information of the network management is not obtained through the short message content, thereby ensuring the security of the network management user.
  • the method for acquiring an alarm information includes the steps S602 to S608.
  • Step S602 Record the mobile phone number of the mobile terminal of each maintenance personnel to the network management.
  • Step S604 After the network management generates an alarm, the non-reversible encryption algorithm A is used to encrypt all the user name and password information having the reading authority as the file header AA, and the reversible encryption algorithm B is used to encrypt the alarm content as the file body BB. And the above encrypted content is combined to generate an alarm report file.
  • the users U1, U2, U3, U4, and U5 have their own passwords for accessing the NMS, such as P1, P2, P3, P4, and P5.
  • users with alarm access rights are U1, U3, U5, and their username and password are combined and encrypted using the MD5 algorithm.
  • the combination method may use a delimiter such as ":" as a separator of the username and password to splicing the username and password, that is, "U1:P1", “ U3: P3", “U5: P5".
  • the three combinations are encrypted by the MD5 algorithm to generate the contents of the file header AA, assuming that the contents of the file header AA are:
  • a reversible encryption algorithm RC5 is used, which is a symmetric encryption algorithm that satisfies the requirements for encrypting alarm content.
  • the file header flag may be the start flag of the file header plus the length of the file header
  • the file body flag may be the start flag of the file body plus the length of the file body
  • Step S606 The network management system sends the alarm report file to the mobile terminal of the maintenance personnel in a short message manner.
  • the network management device sends the alarm report file generated in step 2 to the mobile terminal of the mobile phone numbers TEL1, TEL3, and TEL5 corresponding to the users U1, U3, and U5 having the alarm access authority by means of short messages.
  • Step S608 The mobile terminal installs a dedicated alarm reading program to read the received short message, and the maintenance personnel inputs the user name and password. If the user name and password are calculated by the irreversible encryption algorithm A, the result can be obtained in the alarm report file AA. Found in the section, the reversible encryption algorithm B is used to decrypt the BB part of the alarm report file to obtain the original text of the alarm information and display it; if the user name and password are calculated by the irreversible encryption algorithm A, the result is obtained in the AA part of the alarm report file. If it cannot be found, the user is prompted to fail authentication and the alarm information is not displayed.
  • the maintenance personnel U1 has an alarm reading program installed on the mobile phone. After receiving the short message of the alarm notification, the alarm reading program is used to read the short message, and the alarm reading program prompts the maintenance personnel U1 to input the password. If the maintenance personnel U1 enters the correct password P1, the alarm reader combines the username U1 and the password P1 and encrypts it using the MD5 algorithm. The result is necessarily
  • This content can be found in the file header AA of the alarm report file, and the alarm reading program decrypts the message body BB using the secret key K1, and the original text of the alarm can be obtained and displayed.
  • the alarm reader combines the username U2 and the password P2 and encrypts it using the MD5 algorithm. The result is necessarily
  • This content can not be found in the file header AA of the alarm report file, then the alarm reader will prompt the user to fail authentication and not display the alarm information.
  • Embodiments of the present invention provide a computer readable storage medium storing computer executable instructions that, when executed, implement the above-described alarm information acquisition method.
  • Embodiments of the present invention provide a computer readable storage medium storing computer executable instructions that, when executed, implement the above-described alarm information transmitting method.
  • FIG. 5 is a structural block diagram of a mobile terminal according to an embodiment of the present invention. As shown in FIG. 5, the mobile terminal includes:
  • the receiving module 32 is configured to receive an alarm message
  • the authentication module 34 is configured to authenticate the user identity in the alarm message according to the user information input by the user;
  • the decryption module 36 is configured to decrypt the encrypted alarm information carried in the alarm message when the authentication is passed.
  • FIG. 6 is a structural block diagram of a mobile terminal according to an embodiment of the present invention. As shown in FIG. 6, the authentication module 34 further includes:
  • the determining unit 42 is configured to determine whether the user information exists in the unrestricted user information list; and determine that the authentication is passed if it is determined that the user information exists in the unrestricted user information list.
  • an alarm information transmitting apparatus includes:
  • the sending module 56 is configured to send an alarm message, where the alarm message carries the encrypted alarm information and user information used for authenticating the user identity, and the authenticated user information is a judgment basis for whether the authentication passes, and the authentication Whether to pass the basis for whether the alarm message can be decrypted.
  • computer storage medium includes volatile and nonvolatile, implemented in any method or technology for storing information, such as computer readable instructions, data structures, program modules or other data. Sex, removable and non-removable media.
  • Computer storage media include, but are not limited to, Random Access Memory (RAM), Read-Only Memory (ROM), and Electrically Erasable Programmable Read-only Memory (EEPROM). Flash memory or other memory technology, compact disc read-only memory (CD-ROM), digital versatile disc (DVD) or other optical disc storage, magnetic cassette, magnetic tape, disk storage or other magnetic storage device, or Any other medium used to store the desired information and that can be accessed by the computer.
  • communication media typically includes computer readable instructions, data structures, program modules, or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and can include any information delivery media. .
  • the embodiment of the present invention provides a mobile terminal, an alarm information acquisition method, and an alarm information transmission method and device, which use the alarm information to authenticate the user identity according to the user information, and decrypt the information carried in the alarm message when the authentication is passed.
  • the technical solution of the encrypted alarm information is used to obtain the network management alarm information more securely.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

L'invention porte sur un terminal mobile, ainsi que sur un procédé et un dispositif d'acquisition et d'envoi d'informations d'alarme, le procédé consistant à : recevoir un message d'alarme ; authentifier une identité d'utilisateur dans le message d'alarme en fonction d'informations d'utilisateur entrées par l'utilisateur ; et déchiffrer des informations d'alarme chiffrées contenues dans le message d'alarme, sous réserve que l'utilisateur réussit l'authentification.
PCT/CN2017/117661 2016-12-30 2017-12-21 Terminal mobile, et procédé et dispositif d'acquisition et d'envoi d'informations d'alarme WO2018121394A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201611262148.8 2016-12-30
CN201611262148.8A CN108270601B (zh) 2016-12-30 2016-12-30 移动终端、告警信息获取、告警信息发送方法及装置

Publications (1)

Publication Number Publication Date
WO2018121394A1 true WO2018121394A1 (fr) 2018-07-05

Family

ID=62710832

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/117661 WO2018121394A1 (fr) 2016-12-30 2017-12-21 Terminal mobile, et procédé et dispositif d'acquisition et d'envoi d'informations d'alarme

Country Status (2)

Country Link
CN (1) CN108270601B (fr)
WO (1) WO2018121394A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114389939A (zh) * 2021-12-31 2022-04-22 烽火通信科技股份有限公司 一种基于随机告警信号计算倒换原因及状态的方法和装置

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111767529A (zh) * 2020-05-18 2020-10-13 广州视源电子科技股份有限公司 文件加密方法、文件解密方法、存储介质和电子设备

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102413456A (zh) * 2011-09-02 2012-04-11 中国电信股份有限公司 基于运营网络的用户终端防盗方法、装置和系统
CN102571347A (zh) * 2011-12-16 2012-07-11 华为技术有限公司 现场可更换单元的校验方法、装置和通信设备
CN205121847U (zh) * 2015-04-08 2016-03-30 鹰潭嘉坤云计算科技有限公司 一种消防报警信息的监控终端

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100388684C (zh) * 2005-01-26 2008-05-14 华为技术有限公司 宽带接入网络中防止点到点协议认证攻击的实现方法
CN101068164A (zh) * 2007-06-28 2007-11-07 华为技术有限公司 一种告警信息通知的方法、装置及系统
JP2009053807A (ja) * 2007-08-24 2009-03-12 Fuji Xerox Co Ltd 情報処理装置と認証情報管理方法およびプログラム
CN102149092A (zh) * 2011-01-28 2011-08-10 中国联合网络通信集团有限公司 用户非法接入的处理方法及装置
CN102195991A (zh) * 2011-06-28 2011-09-21 辽宁国兴科技有限公司 一种终端安全管理、认证方法及系统
US8639223B1 (en) * 2011-06-29 2014-01-28 Cellco Partnership Interest-based intelligent mobile messaging service alerts subscription model
CN104883234A (zh) * 2014-07-16 2015-09-02 北京华辰泽众信息科技有限公司 预警信息发布终端
CN105490839B (zh) * 2015-11-25 2018-11-27 山东中创软件商用中间件股份有限公司 一种网站数据安全的告警方法及装置
CN105610671A (zh) * 2016-01-11 2016-05-25 北京奇虎科技有限公司 一种终端数据保护的方法及装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102413456A (zh) * 2011-09-02 2012-04-11 中国电信股份有限公司 基于运营网络的用户终端防盗方法、装置和系统
CN102571347A (zh) * 2011-12-16 2012-07-11 华为技术有限公司 现场可更换单元的校验方法、装置和通信设备
CN205121847U (zh) * 2015-04-08 2016-03-30 鹰潭嘉坤云计算科技有限公司 一种消防报警信息的监控终端

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114389939A (zh) * 2021-12-31 2022-04-22 烽火通信科技股份有限公司 一种基于随机告警信号计算倒换原因及状态的方法和装置
CN114389939B (zh) * 2021-12-31 2023-05-16 烽火通信科技股份有限公司 一种基于随机告警信号计算倒换原因及状态的方法和装置

Also Published As

Publication number Publication date
CN108270601A (zh) 2018-07-10
CN108270601B (zh) 2023-04-25

Similar Documents

Publication Publication Date Title
CN108737430B (zh) 区块链节点的加密通信方法和系统
CN108768630B (zh) 区块链节点的加密通信方法和系统
US10554420B2 (en) Wireless connections to a wireless access point
JP5860815B2 (ja) コンピューターポリシーを施行するためのシステムおよび方法
US9847882B2 (en) Multiple factor authentication in an identity certificate service
CN110798315B (zh) 基于区块链的数据处理方法、装置及终端
CN105103119B (zh) 数据安全服务系统
US9542568B2 (en) Systems and methods for enforcing third party oversight of data anonymization
US9350536B2 (en) Cloud key management system
US9094823B2 (en) Data processing for securing local resources in a mobile device
KR101754308B1 (ko) 모바일 민감 데이터 관리 방법 및 이를 수행하는 위탁 서버
WO2020000786A1 (fr) Procédé et appareil de vote, et dispositif informatique et support de stockage lisible par ordinateur
US20120017095A1 (en) Software Service for Encrypting and Decrypting Data
US10333930B2 (en) System and method for transparent multi-factor authentication and security posture checking
CN113557703B (zh) 网络摄像机的认证方法和装置
US9215070B2 (en) Method for the cryptographic protection of an application
US20140351924A1 (en) Method and system for providing limited secure access to sensitive data
CN111274578A (zh) 一种视频监控系统的数据安全防护系统和方法
CN113868684A (zh) 一种签名方法、装置、服务端、介质以及签名系统
US20180357411A1 (en) Authentication Of A Device
CN108900595B (zh) 访问云存储服务器数据的方法、装置、设备及计算介质
WO2018121394A1 (fr) Terminal mobile, et procédé et dispositif d'acquisition et d'envoi d'informations d'alarme
CN113098899B (zh) 无形资产保护方法、装置及计算机可读介质
KR20110128371A (ko) 모바일 클라이언트 보안인증시스템과 중앙제어시스템 및 그 동작방법
US20210306306A1 (en) Method and system for secure communication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17886927

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17886927

Country of ref document: EP

Kind code of ref document: A1