[go: up one dir, main page]

CN112770318B - Terminal registration method and device - Google Patents

Terminal registration method and device Download PDF

Info

Publication number
CN112770318B
CN112770318B CN201911114770.8A CN201911114770A CN112770318B CN 112770318 B CN112770318 B CN 112770318B CN 201911114770 A CN201911114770 A CN 201911114770A CN 112770318 B CN112770318 B CN 112770318B
Authority
CN
China
Prior art keywords
terminal
digital signature
registration
encryption key
powered
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911114770.8A
Other languages
Chinese (zh)
Other versions
CN112770318A (en
Inventor
蔡春建
李立华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Kilometer Electronic Technology Co ltd
Original Assignee
Suzhou Kilometer Electronic Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Kilometer Electronic Technology Co ltd filed Critical Suzhou Kilometer Electronic Technology Co ltd
Publication of CN112770318A publication Critical patent/CN112770318A/en
Application granted granted Critical
Publication of CN112770318B publication Critical patent/CN112770318B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

According to the terminal registration method and device provided by the embodiment of the invention, when the terminal is integrally powered on, a registration process of the terminal is started, and whether the terminal meets an authorization condition or not is judged; if and only if the terminal meets the authorization condition, registering the terminal, and storing the registered safety information in AON domain on the terminal; the terminal at least comprises AON domain; or terminals including AON domain and PD domain. Therefore, the terminal is registered after being powered on, and the registration must be authorized, so that the possibility of resetting data when the terminal is powered off is avoided, and the reliability of the terminal is improved; meanwhile, the security data is placed in the AON domain, so that other parts of the terminal are allowed to be powered off, the flexibility of the terminal is kept, and the security data is prevented from being randomly tampered.

Description

Terminal registration method and device
Technical Field
The embodiment of the invention relates to the field of the Internet of things, in particular to a terminal registration method and device.
Background
In some applications of the internet of things, such as environment monitoring and process monitoring, higher requirements are placed on credibility of data, so that the data provided by the terminal of the internet of things is reliable and reliable, and the condition of a monitored object is faithfully reflected. In order to improve the credibility of the data information, the credibility of the data acquisition equipment, namely the terminal, and the credibility of the output transmission process need to be ensured, and in the related art, the credibility protection on the terminal of the internet of things is lacked.
Disclosure of Invention
The terminal registration method and device provided by the embodiment of the invention mainly solve the technical problems that the reliability monitoring of the terminal of the Internet of things is weak and the data reliability is low in the related technology.
In order to solve the above technical problem, an embodiment of the present invention provides a terminal registration method, including:
when the terminal is integrally powered on, starting a registration process of the terminal, and judging whether the terminal meets an authorization condition;
if and only if the terminal meets the authorization condition, registering the terminal, and storing the registered safety information in an AON domain which is always kept in a power supply area on the terminal; the terminal at least comprises AON domain; or the terminal includes an AON domain and a powered-off area PD domain.
Optionally, the powering on the whole terminal includes:
the terminal is powered on for the first time; or the terminal is powered on again after the whole terminal is powered off.
Optionally, the method further includes:
and if the normal communication with the terminal is not realized within the preset time length, marking the terminal as being not credible.
Optionally, the security information includes registration feedback information, an encryption key, and a digital signature; when the terminal transmits the content data, the digital signature and the content data are transmitted together through encryption by the encryption key.
Alternatively, both parties of the communication use the same encryption key and digital signature.
Optionally, the digital signature is first specified in a process of registering the terminal.
Optionally, the method further includes: and recording the time of terminal registration and the used encryption key and digital signature.
Optionally, the method further includes:
and updating the encryption key and the digital signature of the terminal.
Optionally, the updating the encryption key and the digital signature of the terminal includes:
periodically updating an encryption key and a digital signature of the terminal at regular time; or
Updating an encryption key and a digital signature of the terminal after receiving the trigger data; or the like, or a combination thereof,
and randomly updating the encryption key and the digital signature of the terminal.
The present invention also provides a terminal registration apparatus, including:
the authorization detection module is used for starting a registration process of the terminal when the terminal is integrally powered on and judging whether the terminal meets an authorization condition;
the registration module is used for registering the terminal if and only if the terminal meets the authorization condition, and the registered security information is stored in AON domain on the terminal; the terminal at least comprises AON domain; or the terminal includes AON domain and PD domain.
The beneficial effects of the invention are:
according to the terminal registration method and the terminal registration device provided by the embodiment of the invention, when the terminal is integrally powered on, a registration process of the terminal is started, and whether the terminal meets an authorization condition is judged; if and only if the terminal meets the authorization condition, registering the terminal, and storing the registered safety information in AON domain on the terminal; the terminal at least comprises AON domain; or the terminal includes AON domain and PD domain. Therefore, the terminal is registered by setting power-on, and the registration must be authorized, so that the possibility of resetting data when the terminal is powered off is avoided, and the terminal needs to keep a power-on state to reflect the reliability of the terminal; meanwhile, the security data is placed in the AON domain, so that other parts of the terminal are allowed to be powered off, the flexibility of the terminal is kept, and the security data is prevented from being randomly tampered.
Additional features and corresponding advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
Fig. 1 is a flowchart of a terminal registration method according to an embodiment of the present invention;
fig. 2 is a schematic diagram illustrating a configuration of a terminal registration apparatus according to a second embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention are described in detail below with reference to the accompanying drawings. It should be understood that the specific embodiments described herein are merely illustrative of the invention and do not limit the invention.
The first embodiment is as follows:
the present embodiment provides a terminal registration method, please refer to fig. 1, which includes:
s101, when the terminal is integrally powered on, starting a registration process of the terminal, and judging whether the terminal meets an authorization condition;
s102, registering the terminal if and only if the terminal meets authorization conditions, and storing the registered safety information in an AON domain which is always kept in a power supply area on the terminal; the terminal at least comprises AON domain; or the terminal includes an AON domain and a powered-off area PD domain.
In this embodiment, the terminal may include two storage regions, i.e., a region AON domain that is always powered on after power-on, and a region PD domain that is powered off after power-on. Wherein AON domain is used to store some important data including but not limited to registration related security information; the PD domain may be used to place other functional units, such as encryption/decryption functional units, ROM, etc. Wherein AON domain is essential and PD domain is optional.
In this embodiment, in order to ensure the credibility of the terminal, once the terminal is integrally powered on, a registration procedure for the terminal is triggered, and the registration procedure must be authorized to be normally performed; in other words, if the terminal is powered on at this time, and after the registration process is automatically triggered, once the authorization is not passed, the terminal cannot be registered, so that any data sent by the subsequent terminal cannot be approved by the gateway, and the terminal loses credibility. The terminal triggers the registration process only under the condition of overall power supply, and because the terminal is provided with two areas, wherein the area AON domain for keeping power supply stores safety information, the terminal cannot be powered on as a whole under the condition of keeping power supply; the powering-off and powering-back of the PD domain is not the case of the overall power-on, but rather the wake-up. The wake-up does not trigger the registration process of the terminal, so the terminal can freely perform the power-off and power-on operations of the individual PD domains. Therefore, the possibility of resetting terminal data in a power-off mode can be avoided, because the interaction between the terminal and the gateway needs to be carried out through mutually known encryption keys and the like, if the terminal is powered off integrally, the gateway cannot know the state of the safety information corresponding to the terminal, and after the terminal is powered on again, the necessary registration process after the terminal is powered on integrally is carried out, the relation of the relevant information of the terminal in the previous registration process is cut off, and the safety of the system is improved.
The registration process needs to be authorized, which means that the terminal needs to be approved by the gateway and is prohibited from conducting a registration process privately under the condition that the gateway is not authenticated. The authorized action may be determined by the gateway itself or by human intervention. For example, some of the registration operations that are not controlled by the terminal after power-down may be authorized, such as a sudden power outage of the terminal, and registration may be allowed after recovery.
In some embodiments, the powering up of the terminal as a whole may include:
the terminal is powered on for the first time; or the terminal is powered on again after being powered off integrally. The first power-on is the first power-on connection of the terminal, the registration action is automatically triggered at the moment, and then after the authorization is passed, the registration is completed, and the interaction between the terminal and the gateway is started. Since the terminal is divided into two areas, namely, AON domain and PD domain, wherein AON domain is normally uninterruptible, in which the security information of the terminal is stored, and the terminal is entirely powered off, which means that both AON domain and PD domain are powered off, then for the gateway, although the terminal has been registered before, after the entire power off, the state of the terminal is unknown to the gateway, and therefore after powering on again, that is, after the terminal is powered off and restarted, the registration operation needs to be performed again, otherwise, the operation of the terminal is considered to be invalid.
In some embodiments, it may further include:
and if the terminal cannot normally communicate with the terminal within the preset time length, marking the terminal as being not credible. If the gateway does not receive the message sent by the terminal within a certain time period or the message sent to the terminal by the gateway does not normally respond, the terminal can be marked as being untrustworthy.
In some embodiments, the security information may include registration feedback information, encryption keys, and digital signatures; when the terminal transmits the content data, the digital signature and the content data are transmitted together through encryption by the encryption key. The security information represents information which can ensure the transmission security between the terminal and the gateway and can embody the reliability of the terminal, and the information comprises registration feedback information, an encryption key and a digital signature. The encryption key is used for encrypting data when the data is transmitted between the terminal and the gateway; the digital signature is a digital mark designated by the gateway after registration, and when the terminal sends the content data, the digital signature and the content data are transmitted together in an encrypted manner through the encryption key, that is, the digital signature and the content data are transmitted to the gateway after being encrypted through the encryption key. Wherein, both communication parties use the same encryption key and digital signature, that is, the same encryption key and digital signature are used between the gateway and the terminal.
Wherein the digital signature is first specified in the process of registering the terminal. In other words, before registration, the terminal has no digital signature, and after authorized registration, the terminal is assigned a digital signature by the gateway, in other words, if the terminal has not authorized registration, since the terminal has no digital signature assigned by the gateway, the content data transmitted by the terminal does not have a digital signature, and thus the terminal is considered as an untrusted terminal.
In some embodiments, it may further include: and recording the time of terminal registration and the used encryption key and digital signature.
In some embodiments, further comprising:
and updating the encryption key and the digital signature of the terminal. In order to ensure security, the encryption key and the digital signature may not be the same, and the gateway may update the encryption key and the digital signature on the terminal. The updating action is to maintain the real-time property of the encryption key and the digital signature, and of course, the gateway itself also updates the corresponding encryption key and digital signature accordingly.
In some embodiments, updating the encryption key and the digital signature of the terminal may include:
periodically updating an encryption key and a digital signature of the terminal at regular time; or
Updating an encryption key and a digital signature of the terminal after receiving the trigger data; or the like, or a combination thereof,
and randomly updating the encryption key and the digital signature of the terminal. The encryption key and the digital signature of the terminal can be updated, wherein the updating condition can be periodic timing updating, or updating after receiving the starting data according to a triggering condition, or updating the encryption key and the digital signature according to a random time.
The embodiment provides a terminal registration method, which is characterized in that when the terminal is integrally powered on, a registration process of the terminal is started, and whether the terminal meets an authorization condition is judged; if and only if the terminal meets the authorization condition, registering the terminal, and storing the registered safety information in the AON domain on the terminal; the terminal includes at least AON domain and PD domain. Therefore, the terminal is registered by setting power-on, and the registration must be authorized, so that the possibility of resetting data when the terminal is powered off is avoided, and the terminal needs to keep a power-on state to reflect the reliability of the terminal; meanwhile, the security data is placed in the AON domain, so that other parts of the terminal are allowed to be powered off, the flexibility of the terminal is kept, and the security data is prevented from being randomly tampered.
Example two
The present embodiment provides a terminal registration apparatus, please refer to fig. 2, including:
the authorization detection module 21 is configured to start a registration process for the terminal when the terminal is integrally powered on, and determine whether the terminal satisfies an authorization condition;
a registration module 22, configured to register the terminal if and only if the terminal meets the authorization condition, where the registered security information is stored in an AON domain on the terminal; the terminal at least comprises AON domain; or the terminal includes AON domain and PD domain.
In this embodiment, the terminal includes two storage areas, namely, an area AON domain that is always powered on after power-on, and an area PD domain that is powered off after power-on. Wherein AON domain is used to store some important data, including but not limited to registration related security information; the PD domain may be used to place other functional units, such as encryption/decryption functional units, ROM, etc.
In this embodiment, in order to ensure the credibility of the terminal, once the terminal is integrally powered on, a registration flow to the terminal is triggered, and the registration flow must be authorized to normally proceed; in other words, if the terminal is powered on at this time, and after the registration process is automatically triggered, once the authorization is not passed, the terminal cannot be registered, so that any data sent by the subsequent terminal cannot be approved by the gateway, and the terminal loses credibility. The terminal triggers the registration process only under the condition of integral power supply, and because the terminal is provided with two areas, wherein the area AON domain for keeping power supply stores safety information, the terminal cannot be integrally powered on under the condition of keeping power supply; the fact that the PD domain is powered off and then powered up again does not belong to the situation that the whole system is powered up, but the PD domain is waked up. The wake-up does not trigger the registration process of the terminal, so the terminal can freely perform the power-off and power-on operations of the individual PD domains. Therefore, the possibility of resetting terminal data in a power-off mode can be avoided, because the interaction between the terminal and the gateway needs to be carried out through mutually known encryption keys and the like, if the terminal is powered off integrally, the gateway cannot know the state of the safety information corresponding to the terminal, and after the terminal is powered on again, the necessary registration process after the terminal is powered on integrally is carried out, the relation of the relevant information of the terminal in the previous registration process is cut off, and the safety of the system is improved.
The registration process needs to be authorized, which means that the terminal needs to be authorized by the gateway and is prohibited from performing a private registration process under the condition that the gateway is not authenticated. The authorized action may be determined by the gateway itself or by human intervention. For example, some sudden registration operations after a power-down operation that is not controlled by the terminal may be authorized, for example, when the power of the terminal is suddenly cut off, and registration may be allowed after recovery.
In some embodiments, the powering up of the terminal as a whole may include:
the terminal is powered on for the first time; or the terminal is powered on again after being powered off integrally. The first power-on is the first power-on connection of the terminal, the registration action is automatically triggered at the moment, then after the authorization is passed, the registration is completed, and the interaction between the terminal and the gateway is started. The terminal is divided into two areas, namely an AON domain and a PD domain, wherein the AON domain is normally not powered off, the security information of the terminal is stored in the AON domain, and the terminal is powered off as a whole, which means that the AON domain and the PD domain are both powered off, so that for the gateway, although the terminal is registered before, the state of the terminal is unknown by the gateway after the power off as a whole, and therefore, after the terminal is powered on again, namely after the terminal is powered off and restarted, the registration action needs to be carried out again, otherwise, the action of the terminal is considered to be invalid.
In some embodiments, it may further include:
and if the terminal cannot normally communicate with the terminal within the preset time length, marking the terminal as unreliable. If the gateway does not receive the message sent by the terminal within a certain time period or the message sent to the terminal by the gateway does not normally respond, the terminal can be marked as being untrustworthy.
In some embodiments, the security information may include registration feedback information, encryption keys, and digital signatures; when the terminal transmits the content data, the digital signature and the content data are encrypted and transmitted together through the encryption key. The security information represents information that can ensure the transmission security between the terminal and the gateway and can embody the reliability of the terminal itself, and includes registration feedback information, an encryption key and a digital signature. The encryption key is used for encrypting data when the data are transmitted between the terminal and the gateway; the digital signature is a digital mark designated by the gateway after registration, and when the terminal sends the content data, the digital signature and the content data are transmitted together in an encrypted manner through the encryption key, that is, the digital signature and the content data are transmitted to the gateway after being encrypted through the encryption key. Wherein, both communication parties use the same encryption key and digital signature, that is, the same encryption key and digital signature are used between the gateway and the terminal.
Wherein the digital signature is first specified in the process of registering the terminal. In other words, before registration, the terminal has no digital signature, and after authorized registration, the terminal is assigned a digital signature by the gateway, in other words, if the terminal has not authorized registration, since the terminal has no digital signature assigned by the gateway, the content data transmitted by the terminal does not have a digital signature, and thus the terminal is considered as an untrusted terminal.
In some embodiments, it may further include: and recording the time of terminal registration and the used encryption key and digital signature.
In some embodiments, further comprising:
and updating the encryption key and the digital signature of the terminal. In order to ensure security, the encryption key and the digital signature may not be the same, and the gateway may update the encryption key and the digital signature on the terminal. The updating action is to maintain the real-time property of the encryption key and the digital signature, and of course, the gateway itself also updates the corresponding encryption key and digital signature accordingly.
In some embodiments, updating the encryption key and the digital signature of the terminal may include:
periodically updating an encryption key and a digital signature of the terminal at regular time; or
Updating an encryption key and a digital signature of the terminal after receiving the trigger data; or the like, or, alternatively,
and randomly updating the encryption key and the digital signature of the terminal. The encryption key and the digital signature of the terminal can be updated, wherein the updating condition can be periodic timing updating, or updating after receiving the starting data according to a triggering condition, or updating the encryption key and the digital signature according to a random time.
The embodiment provides a terminal registration device, which starts a registration process of a terminal when the terminal is integrally powered on, and judges whether the terminal meets an authorization condition; if and only if the terminal meets the authorization condition, registering the terminal, and storing the registered safety information in the AON domain on the terminal; the terminal includes at least AON domain and PD domain. Therefore, the terminal is registered by setting power-on, and the registration needs to be authorized, so that the possibility of resetting data when the terminal is powered off is avoided, and the terminal needs to keep a power-on state to reflect the reliability of the terminal; meanwhile, the security data is placed in the AON domain, so that other parts of the terminal are allowed to be powered off, the flexibility of the terminal is kept, and the security data is prevented from being randomly tampered.
The present embodiments also provide a computer-readable storage medium including volatile or non-volatile, removable or non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, computer program modules or other data. Computer-readable storage media include, but are not limited to, RAM (Random Access Memory), ROM (Read-Only Memory), EEPROM (Electrically Erasable Programmable Read-Only Memory), flash Memory or other Memory technology, CD-ROM (Compact disk Read-Only Memory), digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage terminals, or any other medium which can be used to store the desired information and which can be accessed by a computer.
The computer-readable storage medium in this embodiment may be used to store one or more computer programs, and the stored one or more computer programs may be executed by a processor to implement at least one step of the terminal registration method in each of the above embodiments.
The present embodiment also provides a computer program (or computer software), which can be distributed on a computer readable medium and executed by a computing terminal to implement at least one step of the terminal registration method in the above embodiments.
The present embodiments also provide a computer program product comprising a computer readable terminal having stored thereon a computer program as shown above. The computer-readable terminal in this embodiment may include a computer-readable storage medium as shown above.
It will be apparent to those skilled in the art that all or some of the steps of the methods disclosed above, the terminals, the functional modules/units in the terminals may be implemented as software (which may be implemented by computer program code executable by a computing terminal), firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed by several physical components in cooperation. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit.
In addition, communication media typically embodies computer readable instructions, data structures, computer program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as known to one of ordinary skill in the art. Thus, the present invention is not limited to any specific combination of hardware and software.
The foregoing is a more detailed description of the embodiments of the present invention, and the specific embodiments are not to be considered as limiting the invention. For those skilled in the art to which the invention pertains, several simple deductions or substitutions can be made without departing from the spirit of the invention, and all shall be considered as belonging to the protection scope of the invention.

Claims (10)

1. A terminal registration method, comprising:
when the terminal is integrally powered on, starting a registration process of the terminal, and judging whether the terminal meets an authorization condition;
if and only if the terminal meets the authorization condition, registering the terminal, and storing the registered safety information in an AON domain which is always kept in a power supply area on the terminal; the terminal at least comprises AON domain; or the terminal includes an AON domain and a powered-off area PD domain.
2. The terminal registration method of claim 1, wherein the powering up of the terminal as a whole comprises:
the terminal is powered on for the first time; or the terminal is powered on again after the whole terminal is powered off.
3. The terminal registration method according to claim 1 or 2, further comprising:
and if the normal communication with the terminal is not realized within the preset time length, marking the terminal as being not credible.
4. The terminal registration method according to claim 1 or 2, wherein the security information includes registration feedback information, an encryption key, and a digital signature; when the terminal transmits the content data, the digital signature and the content data are transmitted together through encryption by the encryption key.
5. The terminal registration method of claim 4, wherein both the communicating parties use the same encryption key and digital signature.
6. The terminal registration method of claim 4, wherein the digital signature is first designated during registration of the terminal.
7. The terminal registration method of claim 4, further comprising: and recording the time of terminal registration and the used encryption key and digital signature.
8. The terminal registration method of claim 4, further comprising:
and updating the encryption key and the digital signature of the terminal.
9. The terminal registration method of claim 8, wherein the updating the encryption key and the digital signature of the terminal comprises:
periodically updating an encryption key and a digital signature of the terminal at regular time; or
Updating an encryption key and a digital signature of the terminal after receiving the trigger data; or the like, or a combination thereof,
and randomly updating the encryption key and the digital signature of the terminal.
10. A terminal registration apparatus, comprising:
the authorization detection module is used for starting a registration process of the terminal when the terminal is integrally powered on and judging whether the terminal meets an authorization condition;
the registration module is used for registering the terminal if and only if the terminal meets the authorization condition, and the registered security information is stored in AON domain on the terminal; the terminal at least comprises AON domain; or the terminal includes AON domain and PD domain.
CN201911114770.8A 2019-11-01 2019-11-14 Terminal registration method and device Active CN112770318B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201911060197 2019-11-01
CN2019110601977 2019-11-01

Publications (2)

Publication Number Publication Date
CN112770318A CN112770318A (en) 2021-05-07
CN112770318B true CN112770318B (en) 2022-11-18

Family

ID=75692903

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911114770.8A Active CN112770318B (en) 2019-11-01 2019-11-14 Terminal registration method and device

Country Status (1)

Country Link
CN (1) CN112770318B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107567015A (en) * 2017-08-15 2018-01-09 上海展扬通信技术有限公司 A kind of log-on message acquisition method and log-on message acquisition system based on intelligent terminal
WO2018231029A1 (en) * 2017-06-17 2018-12-20 엘지전자(주) Method for registering terminal in wireless communication system and apparatus therefor

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9436844B2 (en) * 2013-08-29 2016-09-06 Microsoft Technology Licensing, Llc Access enablement security circuit
CN107342973B (en) * 2016-05-03 2021-07-20 中兴通讯股份有限公司 A passive optical network registration method, device and passive optical network system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018231029A1 (en) * 2017-06-17 2018-12-20 엘지전자(주) Method for registering terminal in wireless communication system and apparatus therefor
CN107567015A (en) * 2017-08-15 2018-01-09 上海展扬通信技术有限公司 A kind of log-on message acquisition method and log-on message acquisition system based on intelligent terminal

Also Published As

Publication number Publication date
CN112770318A (en) 2021-05-07

Similar Documents

Publication Publication Date Title
US10719604B2 (en) Baseboard management controller to perform security action based on digital signature comparison in response to trigger
US9811682B2 (en) Security policy for device data
US7421589B2 (en) System and method for lost data destruction of electronic data stored on a portable electronic device using a security interval
US8185735B2 (en) System and method for lost data destruction of electronic data stored on portable electronic devices
CN102597960B (en) data protection device
US7540016B2 (en) System and method for lost data destruction of electronic data stored on a portable electronic device which communicates with servers that are inside of and outside of a firewall
US8327125B2 (en) Content securing system
JP6385842B2 (en) Information processing terminal, information processing method, and information processing system
US20210064734A1 (en) Cross authentication method for computer system security
US8510819B2 (en) System and method for managing and securing mobile devices
JP2003122588A (en) Software processing device and software installation method
CN114077395A (en) Protection against undesirable content changes in DRAM during standby mode
CN112770318B (en) Terminal registration method and device
US20200244461A1 (en) Data Processing Method and Apparatus
CN110866288B (en) Data protection method, system and terminal based on block chain
CN111858114B (en) Device starting exception handling and device starting control method, device and system
CN108228219B (en) Method and device for verifying BIOS validity during in-band refreshing of BIOS
JP2020135882A (en) Electronic element, system including such electronic element, and method of monitoring processor
CN114567668B (en) Data tampering monitoring method based on iNotify real-time response
US12430441B2 (en) Data processing system capable of preventing system time from being tampered in off-line status
US20250286712A1 (en) Apparatus for secure storage of a cryptographic key, a non-transitory computer-readable medium and a method
CN120316742A (en) A method and device for detecting permissions of software products
CN120475362A (en) Device processing method, apparatus, device, computer readable medium, and program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant