CN112770318B - Terminal registration method and device - Google Patents
Terminal registration method and device Download PDFInfo
- Publication number
- CN112770318B CN112770318B CN201911114770.8A CN201911114770A CN112770318B CN 112770318 B CN112770318 B CN 112770318B CN 201911114770 A CN201911114770 A CN 201911114770A CN 112770318 B CN112770318 B CN 112770318B
- Authority
- CN
- China
- Prior art keywords
- terminal
- digital signature
- registration
- encryption key
- powered
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
According to the terminal registration method and device provided by the embodiment of the invention, when the terminal is integrally powered on, a registration process of the terminal is started, and whether the terminal meets an authorization condition or not is judged; if and only if the terminal meets the authorization condition, registering the terminal, and storing the registered safety information in AON domain on the terminal; the terminal at least comprises AON domain; or terminals including AON domain and PD domain. Therefore, the terminal is registered after being powered on, and the registration must be authorized, so that the possibility of resetting data when the terminal is powered off is avoided, and the reliability of the terminal is improved; meanwhile, the security data is placed in the AON domain, so that other parts of the terminal are allowed to be powered off, the flexibility of the terminal is kept, and the security data is prevented from being randomly tampered.
Description
Technical Field
The embodiment of the invention relates to the field of the Internet of things, in particular to a terminal registration method and device.
Background
In some applications of the internet of things, such as environment monitoring and process monitoring, higher requirements are placed on credibility of data, so that the data provided by the terminal of the internet of things is reliable and reliable, and the condition of a monitored object is faithfully reflected. In order to improve the credibility of the data information, the credibility of the data acquisition equipment, namely the terminal, and the credibility of the output transmission process need to be ensured, and in the related art, the credibility protection on the terminal of the internet of things is lacked.
Disclosure of Invention
The terminal registration method and device provided by the embodiment of the invention mainly solve the technical problems that the reliability monitoring of the terminal of the Internet of things is weak and the data reliability is low in the related technology.
In order to solve the above technical problem, an embodiment of the present invention provides a terminal registration method, including:
when the terminal is integrally powered on, starting a registration process of the terminal, and judging whether the terminal meets an authorization condition;
if and only if the terminal meets the authorization condition, registering the terminal, and storing the registered safety information in an AON domain which is always kept in a power supply area on the terminal; the terminal at least comprises AON domain; or the terminal includes an AON domain and a powered-off area PD domain.
Optionally, the powering on the whole terminal includes:
the terminal is powered on for the first time; or the terminal is powered on again after the whole terminal is powered off.
Optionally, the method further includes:
and if the normal communication with the terminal is not realized within the preset time length, marking the terminal as being not credible.
Optionally, the security information includes registration feedback information, an encryption key, and a digital signature; when the terminal transmits the content data, the digital signature and the content data are transmitted together through encryption by the encryption key.
Alternatively, both parties of the communication use the same encryption key and digital signature.
Optionally, the digital signature is first specified in a process of registering the terminal.
Optionally, the method further includes: and recording the time of terminal registration and the used encryption key and digital signature.
Optionally, the method further includes:
and updating the encryption key and the digital signature of the terminal.
Optionally, the updating the encryption key and the digital signature of the terminal includes:
periodically updating an encryption key and a digital signature of the terminal at regular time; or
Updating an encryption key and a digital signature of the terminal after receiving the trigger data; or the like, or a combination thereof,
and randomly updating the encryption key and the digital signature of the terminal.
The present invention also provides a terminal registration apparatus, including:
the authorization detection module is used for starting a registration process of the terminal when the terminal is integrally powered on and judging whether the terminal meets an authorization condition;
the registration module is used for registering the terminal if and only if the terminal meets the authorization condition, and the registered security information is stored in AON domain on the terminal; the terminal at least comprises AON domain; or the terminal includes AON domain and PD domain.
The beneficial effects of the invention are:
according to the terminal registration method and the terminal registration device provided by the embodiment of the invention, when the terminal is integrally powered on, a registration process of the terminal is started, and whether the terminal meets an authorization condition is judged; if and only if the terminal meets the authorization condition, registering the terminal, and storing the registered safety information in AON domain on the terminal; the terminal at least comprises AON domain; or the terminal includes AON domain and PD domain. Therefore, the terminal is registered by setting power-on, and the registration must be authorized, so that the possibility of resetting data when the terminal is powered off is avoided, and the terminal needs to keep a power-on state to reflect the reliability of the terminal; meanwhile, the security data is placed in the AON domain, so that other parts of the terminal are allowed to be powered off, the flexibility of the terminal is kept, and the security data is prevented from being randomly tampered.
Additional features and corresponding advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
Fig. 1 is a flowchart of a terminal registration method according to an embodiment of the present invention;
fig. 2 is a schematic diagram illustrating a configuration of a terminal registration apparatus according to a second embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention are described in detail below with reference to the accompanying drawings. It should be understood that the specific embodiments described herein are merely illustrative of the invention and do not limit the invention.
The first embodiment is as follows:
the present embodiment provides a terminal registration method, please refer to fig. 1, which includes:
s101, when the terminal is integrally powered on, starting a registration process of the terminal, and judging whether the terminal meets an authorization condition;
s102, registering the terminal if and only if the terminal meets authorization conditions, and storing the registered safety information in an AON domain which is always kept in a power supply area on the terminal; the terminal at least comprises AON domain; or the terminal includes an AON domain and a powered-off area PD domain.
In this embodiment, the terminal may include two storage regions, i.e., a region AON domain that is always powered on after power-on, and a region PD domain that is powered off after power-on. Wherein AON domain is used to store some important data including but not limited to registration related security information; the PD domain may be used to place other functional units, such as encryption/decryption functional units, ROM, etc. Wherein AON domain is essential and PD domain is optional.
In this embodiment, in order to ensure the credibility of the terminal, once the terminal is integrally powered on, a registration procedure for the terminal is triggered, and the registration procedure must be authorized to be normally performed; in other words, if the terminal is powered on at this time, and after the registration process is automatically triggered, once the authorization is not passed, the terminal cannot be registered, so that any data sent by the subsequent terminal cannot be approved by the gateway, and the terminal loses credibility. The terminal triggers the registration process only under the condition of overall power supply, and because the terminal is provided with two areas, wherein the area AON domain for keeping power supply stores safety information, the terminal cannot be powered on as a whole under the condition of keeping power supply; the powering-off and powering-back of the PD domain is not the case of the overall power-on, but rather the wake-up. The wake-up does not trigger the registration process of the terminal, so the terminal can freely perform the power-off and power-on operations of the individual PD domains. Therefore, the possibility of resetting terminal data in a power-off mode can be avoided, because the interaction between the terminal and the gateway needs to be carried out through mutually known encryption keys and the like, if the terminal is powered off integrally, the gateway cannot know the state of the safety information corresponding to the terminal, and after the terminal is powered on again, the necessary registration process after the terminal is powered on integrally is carried out, the relation of the relevant information of the terminal in the previous registration process is cut off, and the safety of the system is improved.
The registration process needs to be authorized, which means that the terminal needs to be approved by the gateway and is prohibited from conducting a registration process privately under the condition that the gateway is not authenticated. The authorized action may be determined by the gateway itself or by human intervention. For example, some of the registration operations that are not controlled by the terminal after power-down may be authorized, such as a sudden power outage of the terminal, and registration may be allowed after recovery.
In some embodiments, the powering up of the terminal as a whole may include:
the terminal is powered on for the first time; or the terminal is powered on again after being powered off integrally. The first power-on is the first power-on connection of the terminal, the registration action is automatically triggered at the moment, and then after the authorization is passed, the registration is completed, and the interaction between the terminal and the gateway is started. Since the terminal is divided into two areas, namely, AON domain and PD domain, wherein AON domain is normally uninterruptible, in which the security information of the terminal is stored, and the terminal is entirely powered off, which means that both AON domain and PD domain are powered off, then for the gateway, although the terminal has been registered before, after the entire power off, the state of the terminal is unknown to the gateway, and therefore after powering on again, that is, after the terminal is powered off and restarted, the registration operation needs to be performed again, otherwise, the operation of the terminal is considered to be invalid.
In some embodiments, it may further include:
and if the terminal cannot normally communicate with the terminal within the preset time length, marking the terminal as being not credible. If the gateway does not receive the message sent by the terminal within a certain time period or the message sent to the terminal by the gateway does not normally respond, the terminal can be marked as being untrustworthy.
In some embodiments, the security information may include registration feedback information, encryption keys, and digital signatures; when the terminal transmits the content data, the digital signature and the content data are transmitted together through encryption by the encryption key. The security information represents information which can ensure the transmission security between the terminal and the gateway and can embody the reliability of the terminal, and the information comprises registration feedback information, an encryption key and a digital signature. The encryption key is used for encrypting data when the data is transmitted between the terminal and the gateway; the digital signature is a digital mark designated by the gateway after registration, and when the terminal sends the content data, the digital signature and the content data are transmitted together in an encrypted manner through the encryption key, that is, the digital signature and the content data are transmitted to the gateway after being encrypted through the encryption key. Wherein, both communication parties use the same encryption key and digital signature, that is, the same encryption key and digital signature are used between the gateway and the terminal.
Wherein the digital signature is first specified in the process of registering the terminal. In other words, before registration, the terminal has no digital signature, and after authorized registration, the terminal is assigned a digital signature by the gateway, in other words, if the terminal has not authorized registration, since the terminal has no digital signature assigned by the gateway, the content data transmitted by the terminal does not have a digital signature, and thus the terminal is considered as an untrusted terminal.
In some embodiments, it may further include: and recording the time of terminal registration and the used encryption key and digital signature.
In some embodiments, further comprising:
and updating the encryption key and the digital signature of the terminal. In order to ensure security, the encryption key and the digital signature may not be the same, and the gateway may update the encryption key and the digital signature on the terminal. The updating action is to maintain the real-time property of the encryption key and the digital signature, and of course, the gateway itself also updates the corresponding encryption key and digital signature accordingly.
In some embodiments, updating the encryption key and the digital signature of the terminal may include:
periodically updating an encryption key and a digital signature of the terminal at regular time; or
Updating an encryption key and a digital signature of the terminal after receiving the trigger data; or the like, or a combination thereof,
and randomly updating the encryption key and the digital signature of the terminal. The encryption key and the digital signature of the terminal can be updated, wherein the updating condition can be periodic timing updating, or updating after receiving the starting data according to a triggering condition, or updating the encryption key and the digital signature according to a random time.
The embodiment provides a terminal registration method, which is characterized in that when the terminal is integrally powered on, a registration process of the terminal is started, and whether the terminal meets an authorization condition is judged; if and only if the terminal meets the authorization condition, registering the terminal, and storing the registered safety information in the AON domain on the terminal; the terminal includes at least AON domain and PD domain. Therefore, the terminal is registered by setting power-on, and the registration must be authorized, so that the possibility of resetting data when the terminal is powered off is avoided, and the terminal needs to keep a power-on state to reflect the reliability of the terminal; meanwhile, the security data is placed in the AON domain, so that other parts of the terminal are allowed to be powered off, the flexibility of the terminal is kept, and the security data is prevented from being randomly tampered.
Example two
The present embodiment provides a terminal registration apparatus, please refer to fig. 2, including:
the authorization detection module 21 is configured to start a registration process for the terminal when the terminal is integrally powered on, and determine whether the terminal satisfies an authorization condition;
a registration module 22, configured to register the terminal if and only if the terminal meets the authorization condition, where the registered security information is stored in an AON domain on the terminal; the terminal at least comprises AON domain; or the terminal includes AON domain and PD domain.
In this embodiment, the terminal includes two storage areas, namely, an area AON domain that is always powered on after power-on, and an area PD domain that is powered off after power-on. Wherein AON domain is used to store some important data, including but not limited to registration related security information; the PD domain may be used to place other functional units, such as encryption/decryption functional units, ROM, etc.
In this embodiment, in order to ensure the credibility of the terminal, once the terminal is integrally powered on, a registration flow to the terminal is triggered, and the registration flow must be authorized to normally proceed; in other words, if the terminal is powered on at this time, and after the registration process is automatically triggered, once the authorization is not passed, the terminal cannot be registered, so that any data sent by the subsequent terminal cannot be approved by the gateway, and the terminal loses credibility. The terminal triggers the registration process only under the condition of integral power supply, and because the terminal is provided with two areas, wherein the area AON domain for keeping power supply stores safety information, the terminal cannot be integrally powered on under the condition of keeping power supply; the fact that the PD domain is powered off and then powered up again does not belong to the situation that the whole system is powered up, but the PD domain is waked up. The wake-up does not trigger the registration process of the terminal, so the terminal can freely perform the power-off and power-on operations of the individual PD domains. Therefore, the possibility of resetting terminal data in a power-off mode can be avoided, because the interaction between the terminal and the gateway needs to be carried out through mutually known encryption keys and the like, if the terminal is powered off integrally, the gateway cannot know the state of the safety information corresponding to the terminal, and after the terminal is powered on again, the necessary registration process after the terminal is powered on integrally is carried out, the relation of the relevant information of the terminal in the previous registration process is cut off, and the safety of the system is improved.
The registration process needs to be authorized, which means that the terminal needs to be authorized by the gateway and is prohibited from performing a private registration process under the condition that the gateway is not authenticated. The authorized action may be determined by the gateway itself or by human intervention. For example, some sudden registration operations after a power-down operation that is not controlled by the terminal may be authorized, for example, when the power of the terminal is suddenly cut off, and registration may be allowed after recovery.
In some embodiments, the powering up of the terminal as a whole may include:
the terminal is powered on for the first time; or the terminal is powered on again after being powered off integrally. The first power-on is the first power-on connection of the terminal, the registration action is automatically triggered at the moment, then after the authorization is passed, the registration is completed, and the interaction between the terminal and the gateway is started. The terminal is divided into two areas, namely an AON domain and a PD domain, wherein the AON domain is normally not powered off, the security information of the terminal is stored in the AON domain, and the terminal is powered off as a whole, which means that the AON domain and the PD domain are both powered off, so that for the gateway, although the terminal is registered before, the state of the terminal is unknown by the gateway after the power off as a whole, and therefore, after the terminal is powered on again, namely after the terminal is powered off and restarted, the registration action needs to be carried out again, otherwise, the action of the terminal is considered to be invalid.
In some embodiments, it may further include:
and if the terminal cannot normally communicate with the terminal within the preset time length, marking the terminal as unreliable. If the gateway does not receive the message sent by the terminal within a certain time period or the message sent to the terminal by the gateway does not normally respond, the terminal can be marked as being untrustworthy.
In some embodiments, the security information may include registration feedback information, encryption keys, and digital signatures; when the terminal transmits the content data, the digital signature and the content data are encrypted and transmitted together through the encryption key. The security information represents information that can ensure the transmission security between the terminal and the gateway and can embody the reliability of the terminal itself, and includes registration feedback information, an encryption key and a digital signature. The encryption key is used for encrypting data when the data are transmitted between the terminal and the gateway; the digital signature is a digital mark designated by the gateway after registration, and when the terminal sends the content data, the digital signature and the content data are transmitted together in an encrypted manner through the encryption key, that is, the digital signature and the content data are transmitted to the gateway after being encrypted through the encryption key. Wherein, both communication parties use the same encryption key and digital signature, that is, the same encryption key and digital signature are used between the gateway and the terminal.
Wherein the digital signature is first specified in the process of registering the terminal. In other words, before registration, the terminal has no digital signature, and after authorized registration, the terminal is assigned a digital signature by the gateway, in other words, if the terminal has not authorized registration, since the terminal has no digital signature assigned by the gateway, the content data transmitted by the terminal does not have a digital signature, and thus the terminal is considered as an untrusted terminal.
In some embodiments, it may further include: and recording the time of terminal registration and the used encryption key and digital signature.
In some embodiments, further comprising:
and updating the encryption key and the digital signature of the terminal. In order to ensure security, the encryption key and the digital signature may not be the same, and the gateway may update the encryption key and the digital signature on the terminal. The updating action is to maintain the real-time property of the encryption key and the digital signature, and of course, the gateway itself also updates the corresponding encryption key and digital signature accordingly.
In some embodiments, updating the encryption key and the digital signature of the terminal may include:
periodically updating an encryption key and a digital signature of the terminal at regular time; or
Updating an encryption key and a digital signature of the terminal after receiving the trigger data; or the like, or, alternatively,
and randomly updating the encryption key and the digital signature of the terminal. The encryption key and the digital signature of the terminal can be updated, wherein the updating condition can be periodic timing updating, or updating after receiving the starting data according to a triggering condition, or updating the encryption key and the digital signature according to a random time.
The embodiment provides a terminal registration device, which starts a registration process of a terminal when the terminal is integrally powered on, and judges whether the terminal meets an authorization condition; if and only if the terminal meets the authorization condition, registering the terminal, and storing the registered safety information in the AON domain on the terminal; the terminal includes at least AON domain and PD domain. Therefore, the terminal is registered by setting power-on, and the registration needs to be authorized, so that the possibility of resetting data when the terminal is powered off is avoided, and the terminal needs to keep a power-on state to reflect the reliability of the terminal; meanwhile, the security data is placed in the AON domain, so that other parts of the terminal are allowed to be powered off, the flexibility of the terminal is kept, and the security data is prevented from being randomly tampered.
The present embodiments also provide a computer-readable storage medium including volatile or non-volatile, removable or non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, computer program modules or other data. Computer-readable storage media include, but are not limited to, RAM (Random Access Memory), ROM (Read-Only Memory), EEPROM (Electrically Erasable Programmable Read-Only Memory), flash Memory or other Memory technology, CD-ROM (Compact disk Read-Only Memory), digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage terminals, or any other medium which can be used to store the desired information and which can be accessed by a computer.
The computer-readable storage medium in this embodiment may be used to store one or more computer programs, and the stored one or more computer programs may be executed by a processor to implement at least one step of the terminal registration method in each of the above embodiments.
The present embodiment also provides a computer program (or computer software), which can be distributed on a computer readable medium and executed by a computing terminal to implement at least one step of the terminal registration method in the above embodiments.
The present embodiments also provide a computer program product comprising a computer readable terminal having stored thereon a computer program as shown above. The computer-readable terminal in this embodiment may include a computer-readable storage medium as shown above.
It will be apparent to those skilled in the art that all or some of the steps of the methods disclosed above, the terminals, the functional modules/units in the terminals may be implemented as software (which may be implemented by computer program code executable by a computing terminal), firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed by several physical components in cooperation. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit.
In addition, communication media typically embodies computer readable instructions, data structures, computer program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as known to one of ordinary skill in the art. Thus, the present invention is not limited to any specific combination of hardware and software.
The foregoing is a more detailed description of the embodiments of the present invention, and the specific embodiments are not to be considered as limiting the invention. For those skilled in the art to which the invention pertains, several simple deductions or substitutions can be made without departing from the spirit of the invention, and all shall be considered as belonging to the protection scope of the invention.
Claims (10)
1. A terminal registration method, comprising:
when the terminal is integrally powered on, starting a registration process of the terminal, and judging whether the terminal meets an authorization condition;
if and only if the terminal meets the authorization condition, registering the terminal, and storing the registered safety information in an AON domain which is always kept in a power supply area on the terminal; the terminal at least comprises AON domain; or the terminal includes an AON domain and a powered-off area PD domain.
2. The terminal registration method of claim 1, wherein the powering up of the terminal as a whole comprises:
the terminal is powered on for the first time; or the terminal is powered on again after the whole terminal is powered off.
3. The terminal registration method according to claim 1 or 2, further comprising:
and if the normal communication with the terminal is not realized within the preset time length, marking the terminal as being not credible.
4. The terminal registration method according to claim 1 or 2, wherein the security information includes registration feedback information, an encryption key, and a digital signature; when the terminal transmits the content data, the digital signature and the content data are transmitted together through encryption by the encryption key.
5. The terminal registration method of claim 4, wherein both the communicating parties use the same encryption key and digital signature.
6. The terminal registration method of claim 4, wherein the digital signature is first designated during registration of the terminal.
7. The terminal registration method of claim 4, further comprising: and recording the time of terminal registration and the used encryption key and digital signature.
8. The terminal registration method of claim 4, further comprising:
and updating the encryption key and the digital signature of the terminal.
9. The terminal registration method of claim 8, wherein the updating the encryption key and the digital signature of the terminal comprises:
periodically updating an encryption key and a digital signature of the terminal at regular time; or
Updating an encryption key and a digital signature of the terminal after receiving the trigger data; or the like, or a combination thereof,
and randomly updating the encryption key and the digital signature of the terminal.
10. A terminal registration apparatus, comprising:
the authorization detection module is used for starting a registration process of the terminal when the terminal is integrally powered on and judging whether the terminal meets an authorization condition;
the registration module is used for registering the terminal if and only if the terminal meets the authorization condition, and the registered security information is stored in AON domain on the terminal; the terminal at least comprises AON domain; or the terminal includes AON domain and PD domain.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201911060197 | 2019-11-01 | ||
| CN2019110601977 | 2019-11-01 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN112770318A CN112770318A (en) | 2021-05-07 |
| CN112770318B true CN112770318B (en) | 2022-11-18 |
Family
ID=75692903
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201911114770.8A Active CN112770318B (en) | 2019-11-01 | 2019-11-14 | Terminal registration method and device |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN112770318B (en) |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107567015A (en) * | 2017-08-15 | 2018-01-09 | 上海展扬通信技术有限公司 | A kind of log-on message acquisition method and log-on message acquisition system based on intelligent terminal |
| WO2018231029A1 (en) * | 2017-06-17 | 2018-12-20 | 엘지전자(주) | Method for registering terminal in wireless communication system and apparatus therefor |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9436844B2 (en) * | 2013-08-29 | 2016-09-06 | Microsoft Technology Licensing, Llc | Access enablement security circuit |
| CN107342973B (en) * | 2016-05-03 | 2021-07-20 | 中兴通讯股份有限公司 | A passive optical network registration method, device and passive optical network system |
-
2019
- 2019-11-14 CN CN201911114770.8A patent/CN112770318B/en active Active
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2018231029A1 (en) * | 2017-06-17 | 2018-12-20 | 엘지전자(주) | Method for registering terminal in wireless communication system and apparatus therefor |
| CN107567015A (en) * | 2017-08-15 | 2018-01-09 | 上海展扬通信技术有限公司 | A kind of log-on message acquisition method and log-on message acquisition system based on intelligent terminal |
Also Published As
| Publication number | Publication date |
|---|---|
| CN112770318A (en) | 2021-05-07 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10719604B2 (en) | Baseboard management controller to perform security action based on digital signature comparison in response to trigger | |
| US9811682B2 (en) | Security policy for device data | |
| US7421589B2 (en) | System and method for lost data destruction of electronic data stored on a portable electronic device using a security interval | |
| US8185735B2 (en) | System and method for lost data destruction of electronic data stored on portable electronic devices | |
| CN102597960B (en) | data protection device | |
| US7540016B2 (en) | System and method for lost data destruction of electronic data stored on a portable electronic device which communicates with servers that are inside of and outside of a firewall | |
| US8327125B2 (en) | Content securing system | |
| JP6385842B2 (en) | Information processing terminal, information processing method, and information processing system | |
| US20210064734A1 (en) | Cross authentication method for computer system security | |
| US8510819B2 (en) | System and method for managing and securing mobile devices | |
| JP2003122588A (en) | Software processing device and software installation method | |
| CN114077395A (en) | Protection against undesirable content changes in DRAM during standby mode | |
| CN112770318B (en) | Terminal registration method and device | |
| US20200244461A1 (en) | Data Processing Method and Apparatus | |
| CN110866288B (en) | Data protection method, system and terminal based on block chain | |
| CN111858114B (en) | Device starting exception handling and device starting control method, device and system | |
| CN108228219B (en) | Method and device for verifying BIOS validity during in-band refreshing of BIOS | |
| JP2020135882A (en) | Electronic element, system including such electronic element, and method of monitoring processor | |
| CN114567668B (en) | Data tampering monitoring method based on iNotify real-time response | |
| US12430441B2 (en) | Data processing system capable of preventing system time from being tampered in off-line status | |
| US20250286712A1 (en) | Apparatus for secure storage of a cryptographic key, a non-transitory computer-readable medium and a method | |
| CN120316742A (en) | A method and device for detecting permissions of software products | |
| CN120475362A (en) | Device processing method, apparatus, device, computer readable medium, and program product |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |