[go: up one dir, main page]

CN119766537A - Device operation method, device and electronic equipment - Google Patents

Device operation method, device and electronic equipment

Info

Publication number
CN119766537A
CN119766537A CN202411931931.3A CN202411931931A CN119766537A CN 119766537 A CN119766537 A CN 119766537A CN 202411931931 A CN202411931931 A CN 202411931931A CN 119766537 A CN119766537 A CN 119766537A
Authority
CN
China
Prior art keywords
equipment
serial number
authentication information
firewall
user terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202411931931.3A
Other languages
Chinese (zh)
Inventor
柴永富
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Security Technologies Co Ltd
Original Assignee
New H3C Security Technologies Co Ltd
Filing date
Publication date
Application filed by New H3C Security Technologies Co Ltd filed Critical New H3C Security Technologies Co Ltd
Publication of CN119766537A publication Critical patent/CN119766537A/en
Pending legal-status Critical Current

Links

Abstract

The application provides a device operation method and device and electronic equipment. The method comprises the steps of responding to a device operation request sent by a user terminal, obtaining first authentication information from a firewall device and obtaining second authentication information from the user terminal, authenticating the user terminal and the firewall device based on the first authentication information, and enabling the cloud platform to execute target operation on the firewall device according to the device operation request if and only if the cloud platform confirms that the user terminal has operation authority on the firewall device. Through the management mode, the cloud platform realizes the binding between the user and the firewall equipment, effectively avoids the firewall equipment from being stolen, and ensures the property safety of the firewall equipment user because other users cannot use the firewall equipment on the cloud platform even if the firewall equipment is stolen.

Description

Equipment operation method and device and electronic equipment
Technical Field
The present application relates to the field of communications technologies, and in particular, to a device operation method and apparatus, and an electronic device.
Background
The current firewall devices are increasingly widely used, and the current firewall devices generally support cloud management through a cloud platform. However, if the user purchases the firewall device and then loses the firewall device carelessly, other users can manage and use the firewall device in the cloud platform without hindrance after picking up the firewall device. That is, the current cloud platform lacks an efficient firewall device management scheme, resulting in firewall devices that are easily misappropriated by other users.
Disclosure of Invention
In order to overcome the problems in the related art, the application provides a device operation method and device and electronic equipment.
According to a first aspect of an embodiment of the present application, there is provided a device operation method, the method being applied to a cloud platform, the method including:
Responding to a device operation request sent by a user terminal, and acquiring first authentication information from firewall equipment;
Determining a first user account and a first equipment serial number according to the first authentication information; determining a second user account and a second equipment serial number according to second authentication information acquired from the user terminal;
judging whether the first user account number is the same as the second user account number to obtain a first judging result;
And if the first judging result and the second judging result are both yes, confirming that the user terminal has the operation authority to the firewall equipment, and executing target operation to the firewall equipment according to the equipment operation request.
According to a second aspect of an embodiment of the present application, there is provided an apparatus for operating a device, the apparatus being applied to a cloud platform, the apparatus comprising:
The acquiring module is used for responding to the equipment operation request sent by the user terminal and acquiring first authentication information from the firewall equipment;
the determining module is used for determining a first user account and a first equipment serial number according to the first authentication information;
the judging module is used for judging whether the first user account and the second user account are the same or not to obtain a first judging result;
And the operation module is used for confirming that the user terminal has the operation authority to the firewall equipment if the first judgment result and the second judgment result are both yes, and executing target operation to the firewall equipment according to the equipment operation request.
According to a third aspect of embodiments of the present application there is provided an electronic device comprising a memory, one or more processors, the memory being coupled to the processors, wherein the memory has stored therein computer program code comprising computer instructions which, when executed by the processors, perform the method as described above.
According to a fourth aspect of embodiments of the present application, there is provided a computer readable storage medium comprising computer instructions which, when run on an electronic device, cause the electronic device to perform the method as described above.
According to a fifth aspect of embodiments of the present application, there is provided a computer program product which, when run on a computer, causes the computer to perform the method as described above.
The technical scheme provided by the embodiment of the application can comprise the following beneficial effects:
In the embodiment of the application, when receiving the equipment operation request for the firewall equipment sent by the user terminal, the cloud platform authenticates the user terminal and the firewall equipment, and if and only if the cloud platform confirms that the user terminal has the operation authority for the firewall equipment, the cloud platform can execute target operation on the firewall equipment according to the equipment operation request. Through the management mode, the cloud platform realizes the binding between the user and the firewall equipment, effectively avoids the firewall equipment from being stolen, and ensures the property safety of the firewall equipment user because other users cannot use the firewall equipment on the cloud platform even if the firewall equipment is stolen.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application as claimed.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
FIG. 1 is a schematic flow chart of a method of operating a device according to an embodiment of the present application;
FIG. 2 is a flowchart of a first decryption method of an operation method of a device according to an embodiment of the present application;
FIG. 3 is a flowchart of a second decryption method of the device operation method according to an embodiment of the present application;
FIG. 4 is a flowchart of a third decryption method of the device operation method according to an embodiment of the present application;
fig. 5 is a schematic flow chart of a device activation process in a device operation method according to an embodiment of the present application;
fig. 6 is a schematic flow chart of a device handover procedure in the device operation method according to the embodiment of the present application;
FIG. 7 is a schematic diagram of a specific application of the method for operating a device according to an embodiment of the present application;
FIG. 8 is a schematic diagram of an apparatus operating device provided by an embodiment of the present application;
Fig. 9 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application are described below with reference to the accompanying drawings in the embodiments of the present application. In the description of embodiments of the application, the terminology used in the embodiments below is for the purpose of describing particular embodiments only and is not intended to be limiting of the application.
In the present application, "at least one" means one or more, and "a plurality" means two or more. "and/or" describes an association relationship of associated objects, meaning that there may be three relationships, e.g., A and/or B may mean that A alone exists, while A and B together exist, and B alone exists, where A, B may be singular or plural. The terms first, second, third and the like in the description and in the claims and drawings, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order.
In embodiments of the application, words such as "exemplary" or "such as" are used to mean serving as an example, instance, or illustration. Any embodiment or design described herein as "exemplary" or "e.g." in an embodiment should not be taken as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "exemplary" or "such as" is intended to present related concepts in a concrete fashion.
Under the condition that the user A loses the firewall equipment, the cloud platform confirms how to ensure that the firewall equipment belongs to the user A instead of the user B, namely, how to determine the use authority of the firewall equipment, so that the firewall equipment is prevented from being stolen by other people, and the property safety of the user of the firewall equipment is ensured, so that the technical problem to be solved in the field is urgent.
Aiming at the technical problems, a solution is provided at present, namely, an A user creates an account number and a password of a firewall device on a cloud platform, then when the user requests to use the firewall device, the cloud platform authenticates according to the account number and password, and only if the authentication passes, the user is allowed to use the firewall device. Because the user B cannot acquire the account number and the password set by the user A for the firewall equipment, the user B cannot use the firewall equipment through the cloud platform.
However, the solution has the following defects that firstly, the user B can obtain the use authority of the firewall equipment by resetting the firewall equipment, secondly, if the user A wants to modify the account number password of the firewall equipment, synchronous modification is needed on the cloud platform, and thirdly, the cloud platform in the solution needs to record the account number password set by the user A for the firewall equipment, namely sensitive information needs to be stored in the cloud platform, so that the problem of compliance exists.
In view of the above technical problems, the present application provides a device operation method, a device, an electronic device, a computer readable storage medium, and a computer program product.
The embodiments of the present application will be described in detail.
The embodiment of the application provides a device operation method, which is applied to a cloud platform, as shown in fig. 1, and can comprise the following steps:
step 110, responding to a device operation request sent by a user terminal, and acquiring first authentication information from a firewall device;
step 120, determining a first user account and a first equipment serial number according to the first authentication information, and determining a second user account and a second equipment serial number according to the second authentication information acquired from the user terminal;
Step 130, judging whether the first user account and the second user account are the same to obtain a first judgment result;
And 140, if the first judging result and the second judging result are both yes, confirming that the user terminal has the operation authority to the firewall equipment, and executing target operation to the firewall equipment according to the equipment operation request.
Specifically, whenever a user wants to perform operations such as using and managing the firewall device through the user terminal and the cloud platform, the cloud platform compares the first authentication information acquired from the firewall device with the second authentication information acquired from the user terminal, if and only if the first authentication information and the second authentication information are the same, the user terminal is determined to pass the authentication, and the user terminal is confirmed to have the operation authority on the firewall device.
And if and only if the cloud platform confirms that the user terminal has the operation authority to the firewall equipment, the cloud platform can execute target operation to the firewall equipment according to the equipment operation request. Through the management mode, the cloud platform prevents firewall equipment from being stolen.
The second authentication information may be obtained from the user terminal after the cloud platform receives the device operation request sent by the user terminal, or the device operation request carries the second authentication information, and the cloud platform determines the second authentication information according to the device operation request.
Specifically, the authentication information in this embodiment includes a user account and a device serial number, for example, the first authentication information includes a first user account and a first device serial number, and the second authentication information includes a second user account and a second device serial number. The user account can be account information such as an account ID, an account password and the like, and the equipment Serial Number refers to a Serial Number (SN) code of the equipment.
The first authentication information and the second authentication information are the same, and the method is specifically realized by determining a first user account number and a first equipment serial number according to the first authentication information, determining a second user account number and a second equipment serial number according to the second authentication information acquired from the user terminal, judging whether the first user account number and the second user account number are the same to obtain a first judgment result, judging whether the first equipment serial number and the second equipment serial number are the same to obtain a second judgment result, and judging that the first authentication information and the second authentication information are the same if the first judgment result and the second judgment result are both yes.
It may be appreciated that, to ensure the security a.a.r., the first authentication information of the cloud platform or the second authentication information sent to the cloud platform by the user terminal may be encrypted authentication information. In this embodiment, the encryption means of the authentication information is not limited, and as a specific implementation manner, encryption processing may be performed by using a public key and private key pair.
For example, a public key private key pair is generated on the firewall device and noted as a first public key and a first private key. And binding the device serial number of the firewall device and the first public key, and storing the device serial number and the first public key into the cloud platform. The firewall equipment specifically sends first authentication information encrypted by a first private key to the cloud platform, the cloud platform acquires a target equipment serial number from the firewall equipment after receiving the first authentication information, determines a first public key in target equipment serial number matching, and decrypts the first authentication information by using the first public key to obtain a first user account and the first equipment serial number.
For another example, a public key-private key pair is generated on the user terminal and denoted as a second public key and a second private key. Binding the user account of the user terminal and the second public key, and storing the user account and the second public key in the cloud platform. The user terminal specifically sends second authentication information encrypted by a second private key to the cloud platform, the cloud platform acquires a target user account from the user terminal after receiving the second authentication information, determines a second public key in target user account matching, and decrypts the second authentication information by using the second public key to obtain a second user account and a second equipment serial number.
The present embodiment does not limit the relationship between the encryption means of the first authentication information and the encryption means of the second authentication information, and the two may be the same or different.
In the case where both of them adopt the public key and private key pair encryption method to decrypt, the embodiment specifically provides the following three methods to implement the above step 120:
as shown in fig. 2, the above step 120 is specifically implemented by the following steps:
step 210, obtaining a target equipment serial number from the firewall equipment;
step 220, determining a first public key in the target equipment serial number matching;
Step 230, decrypting the first authentication information by using the first public key to obtain a first user account and a first equipment serial number;
Step 240, obtaining a target user account from the user terminal;
step 250, determining a second public key in the target user account matching;
And 260, decrypting the second authentication information acquired from the user terminal by using the second public key to obtain a second user account and a second equipment serial number.
As shown in fig. 3, the above step 120 is specifically implemented by the following steps:
Step 310, obtaining a target device serial number from the firewall device;
step 320, determining a first public key in the target device serial number matching;
step 330, decrypting the first authentication information by using the first public key to obtain a first user account and a first device serial number;
and step 340, decrypting the second authentication information acquired from the user terminal by using the first public key to obtain a second user account and a second equipment serial number.
As shown in fig. 4, the above step 120 is specifically implemented by the following steps:
Step 410, decrypting the second authentication information obtained from the user terminal by using the first public key to obtain a second user account and a second equipment serial number;
Step 420, determining a second public key in the target user account matching;
And 430, decrypting the second authentication information acquired from the user terminal by using the second public key to obtain a second user account and a second equipment serial number.
And step 440, decrypting the first authentication information by using the second public key to obtain the first user account and the first equipment serial number.
The cloud platform performs the authentication process between the user terminal and the firewall device each time the user wants to operate the firewall device through the user terminal and the cloud platform. The following describes a process that a user activates the firewall device at the cloud platform through the user terminal, and a process that the user hands over the firewall device to other users at the cloud platform through the user terminal.
As shown in fig. 5, the present embodiment activates the firewall device by:
step 510, in response to the device activation request sent by the user terminal, judging whether the device serial number of the firewall device to be activated is in the local activated device serial number list, if not, entering step 520;
step 520, determining a third equipment serial number according to third authentication information obtained from the user terminal, wherein the third authentication information is generated by the user terminal according to a third user account and the third equipment serial number;
step 530, judging whether the third equipment serial number is the same as the equipment serial number of the firewall equipment to be activated, if so, entering step 540;
step 540, storing the third authentication information to the firewall device to be activated, so as to implement device activation.
As shown in fig. 6, the present embodiment hands over the firewall device by the following steps after confirming that the user terminal has the operation authority to the firewall device:
Step 610, in response to a device handover request sent by the user terminal, replacing the first authentication information on the firewall device with fourth authentication information obtained from the user terminal, so as to implement handover of the operation authority of the firewall device from the first user account to the fourth user account.
The fourth authentication information is generated by the user terminal according to a fourth user account and a second equipment serial number.
The operation method of the apparatus of the present application will be described below with reference to fig. 7 by taking practical application as an example:
After the firewall equipment is sent to the user for the first time, the user can input a user account number and an equipment serial number through a mobile phone client (namely the user terminal) of the cloud platform, specifically, the user is prompted to input the user account number and the equipment serial number through a mobile phone client code scanning mode, and then the mobile phone client generates authentication information according to the user account number and the equipment serial number and stores the authentication information to the firewall equipment, so that the activation of the firewall equipment is realized. The authentication information here may specifically be authentication information encrypted by a private key of the user.
When a current user needs to operate firewall equipment through a mobile phone client and a cloud platform, the user needs to provide authentication information A for the cloud platform through the mobile phone client, and the cloud platform decrypts the authentication information A by using a user public key of the current user to obtain a user account A1 and an equipment serial number A2. The cloud platform also obtains authentication information B from the firewall equipment to be operated, and determines a user account B1 and an equipment serial number B2 according to the obtained authentication information B. If A1 and B1 are the same and A2 and B2 are the same, the user terminal is determined to have the operation authority to the firewall equipment. Otherwise, the user terminal is determined to not have the operation authority to the firewall equipment.
When a user needs to handover a firewall device on a cloud platform, the user may choose to delete authentication information on the firewall device and create new authentication information and store it to the firewall device.
According to the technical scheme, the embodiment of the application provides the equipment operation method, which is applied to the cloud platform, when the cloud platform receives the equipment operation request for the firewall equipment sent by the user terminal, the user terminal and the firewall equipment are authenticated, and if and only if the cloud platform confirms that the user terminal has the operation authority for the firewall equipment, the cloud platform can execute target operation for the firewall equipment according to the equipment operation request.
Through the management mode, the cloud platform realizes the binding between the user and the firewall equipment, effectively avoids the firewall equipment from being stolen, and ensures the property safety of the firewall equipment user because other users cannot use the firewall equipment on the cloud platform even if the firewall equipment is stolen.
In addition, the embodiment also realizes legal handover of the firewall equipment, and the user can transfer the operation authority of the firewall equipment on the cloud platform to a new user, so that equipment circulation is realized.
Based on the same inventive concept, the application also provides a device operation device, which is applied to the cloud platform, and the structural schematic diagram of the device is shown in fig. 8, and specifically comprises:
an obtaining module 810, configured to obtain first authentication information from a firewall device in response to a device operation request sent by a user terminal;
A determining module 820, configured to determine a first user account and a first device serial number according to the first authentication information;
the judging module 830 is configured to judge whether the first user account and the second user account are the same, to obtain a first judging result;
And an operation module 840, configured to confirm that the user terminal has the operation authority for the firewall device if the first determination result and the second determination result are both yes, and execute the target operation for the firewall device according to the device operation request.
As a specific embodiment, the apparatus further comprises:
the first judging module is used for responding to the equipment activating request sent by the user terminal and judging whether the equipment serial number of the firewall equipment to be activated is positioned in a local activated equipment serial number list;
The serial number determining module is used for determining a third equipment serial number according to third authentication information acquired from the user terminal if the judging result is negative, wherein the third authentication information is generated by the user terminal according to a third user account number and the third equipment serial number;
the second judging module is used for judging whether the third equipment serial number is the same as the equipment serial number of the firewall equipment to be activated;
and the activation module is used for storing the third authentication information to the firewall equipment to be activated if the judgment result is yes, so as to realize equipment activation.
As a specific embodiment, the apparatus further comprises:
And the replacing module is used for replacing the first authentication information on the firewall equipment with fourth authentication information acquired from the user terminal after confirming that the user terminal has the operation authority to the firewall equipment, wherein the fourth authentication information is generated by the user terminal according to the fourth user account and a second equipment serial number.
An embodiment of the application provides an electronic device that may include a memory and one or more processors. The memory is for storing computer program code, the computer program code comprising computer instructions. The electronic device, when executing computer instructions, can perform the functions or steps of the method embodiments described above. The structure of the electronic device may refer to the structure of the electronic device 100 shown in fig. 9.
The Processor may be a general-purpose Processor including a central processing unit (Central Processing Unit, CPU), a network Processor (Network Processor, NP), etc., or may be a digital signal Processor (DIGITAL SIGNAL Processor, DSP), application SPECIFIC INTEGRATED Circuit (ASIC), field-Programmable gate array (Field-Programmable GATE ARRAY, FPGA) or other Programmable logic device, discrete gate or transistor logic device, discrete hardware components.
Embodiments of the present application also provide a computer-readable storage medium comprising computer instructions which, when run on an electronic device, cause the electronic device to perform the functions or steps of the method embodiments described above.
The computer readable storage medium includes, but is not limited to, any of various media capable of storing program codes, such as a U disk, a removable hard disk, a read-only memory (ROM), a random access memory (random access memory, RAM), a magnetic disk, or an optical disk.
Embodiments of the present application also provide a computer program product which, when run on a computer, causes the computer to perform the functions or steps of the method embodiments described above.
The electronic device, the computer readable storage medium and the computer program product provided by the embodiment of the application are used for executing the corresponding methods provided above. Therefore, the advantages achieved by the method can be referred to as the advantages in the corresponding method provided above, and will not be described herein.
It will be apparent to those skilled in the art from this description that, for convenience and brevity of description, only the above-described division of the functional modules is illustrated, and in practical application, the above-described functional allocation may be performed by different functional modules according to needs, i.e. the internal structure of the apparatus is divided into different functional modules to perform all or part of the functions described above.
In the several embodiments provided in the present application, it should be understood that the disclosed method may be implemented in other manners. The device embodiments described above are merely illustrative. For example, the modules or units may be divided into only one logic function, and there may be other division manners in actual implementation, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. In addition, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interface, module or unit indirect coupling or communication connection, which may be electrical, mechanical or other form.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The foregoing is merely illustrative of specific embodiments of the present application, and the scope of the present application is not limited thereto, but any changes or substitutions within the technical scope of the present application should be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (13)

1. A method of device operation, the method being applied to a cloud platform, the method comprising:
Responding to a device operation request sent by a user terminal, and acquiring first authentication information from firewall equipment;
Determining a first user account and a first equipment serial number according to the first authentication information; determining a second user account and a second equipment serial number according to second authentication information acquired from the user terminal;
judging whether the first user account number is the same as the second user account number to obtain a first judging result;
And if the first judging result and the second judging result are both yes, confirming that the user terminal has the operation authority to the firewall equipment, and executing target operation to the firewall equipment according to the equipment operation request.
2. The method according to claim 1, wherein the method further comprises:
responding to an equipment activation request sent by a user terminal, and judging whether the equipment serial number of the firewall equipment to be activated is positioned in a local activated equipment serial number list;
If the judgment result is negative, determining a third equipment serial number according to third authentication information acquired from the user terminal, wherein the third authentication information is generated by the user terminal according to a third user account and the third equipment serial number;
judging whether the third equipment serial number is the same as the equipment serial number of the firewall equipment to be activated;
And if the judgment result is yes, storing the third authentication information into the firewall equipment to be activated so as to realize equipment activation.
3. The method of claim 1, wherein after confirming that the user terminal has the operation authority to the firewall device, the method further comprises:
And in response to a device handover request sent by the user terminal, replacing the first authentication information on the firewall device with fourth authentication information acquired from the user terminal so as to achieve handover of the operation authority of the firewall device from the first user account to a fourth user account, wherein the fourth authentication information is generated by the user terminal according to the fourth user account and a second device serial number.
4. The method according to claim 1, characterized in that the method determines the first user account number and the first device serial number in particular by:
obtaining a target equipment serial number from the firewall equipment;
determining a first public key in the target device serial number match;
and decrypting the first authentication information by using the first public key to obtain a first user account and a first equipment serial number.
5. The method according to claim 4, characterized in that the method determines the second user account and the second device serial number in particular by:
And decrypting the second authentication information acquired from the user terminal by using the first public key to obtain a second user account and a second equipment serial number.
6. The method according to claim 1, characterized in that the method determines the second user account and the second device serial number in particular by:
acquiring a target user account from the user terminal;
determining a second public key in the target user account matching;
and decrypting the second authentication information acquired from the user terminal by using the second public key to obtain a second user account and a second equipment serial number.
7. The method according to claim 6, characterized in that the method determines the first user account number and the first device serial number in particular by:
and decrypting the first authentication information by using the second public key to obtain a first user account and a first equipment serial number.
8. A device operating apparatus, the apparatus being applied to a cloud platform, the apparatus comprising:
The acquiring module is used for responding to the equipment operation request sent by the user terminal and acquiring first authentication information from the firewall equipment;
the determining module is used for determining a first user account and a first equipment serial number according to the first authentication information;
the judging module is used for judging whether the first user account and the second user account are the same or not to obtain a first judging result;
And the operation module is used for confirming that the user terminal has the operation authority to the firewall equipment if the first judgment result and the second judgment result are both yes, and executing target operation to the firewall equipment according to the equipment operation request.
9. The apparatus of claim 8, wherein the apparatus further comprises:
the first judging module is used for responding to the equipment activating request sent by the user terminal and judging whether the equipment serial number of the firewall equipment to be activated is positioned in a local activated equipment serial number list;
The serial number determining module is used for determining a third equipment serial number according to third authentication information acquired from the user terminal if the judging result is negative, wherein the third authentication information is generated by the user terminal according to a third user account number and the third equipment serial number;
the second judging module is used for judging whether the third equipment serial number is the same as the equipment serial number of the firewall equipment to be activated;
and the activation module is used for storing the third authentication information to the firewall equipment to be activated if the judgment result is yes, so as to realize equipment activation.
10. The apparatus of claim 8, wherein the apparatus further comprises:
And the replacing module is used for replacing the first authentication information on the firewall equipment with fourth authentication information acquired from the user terminal after confirming that the user terminal has the operation authority to the firewall equipment, wherein the fourth authentication information is generated by the user terminal according to the fourth user account and a second equipment serial number.
11. An electronic device comprising a memory, one or more processors, the memory coupled to the processors, wherein the memory has stored therein computer program code comprising computer instructions that, when executed by the processors, perform the method of any of claims 1-7.
12. A computer readable storage medium comprising computer instructions which, when run on an electronic device, cause the electronic device to perform the method of any of claims 1-7.
13. A computer program product, characterized in that the computer program product, when run on a computer, causes the computer to perform the method according to any of claims 1-7.
CN202411931931.3A 2024-12-25 Device operation method, device and electronic equipment Pending CN119766537A (en)

Publications (1)

Publication Number Publication Date
CN119766537A true CN119766537A (en) 2025-04-04

Family

ID=

Similar Documents

Publication Publication Date Title
EP3691215B1 (en) Access token management method, terminal and server
US10666642B2 (en) System and method for service assisted mobile pairing of password-less computer login
KR102424055B1 (en) Apparatus and Method for Providing API Authentication using Two API Tokens
US8606234B2 (en) Methods and apparatus for provisioning devices with secrets
US8196186B2 (en) Security architecture for peer-to-peer storage system
EP3570515A1 (en) Method, device, and system for invoking network function service
US9197420B2 (en) Using information in a digital certificate to authenticate a network of a wireless access point
US8719956B2 (en) Method and apparatus for sharing licenses between secure removable media
CN106341234B (en) Authorization method and device
US20090158033A1 (en) Method and apparatus for performing secure communication using one time password
KR101451359B1 (en) User account recovery
CN110278084B (en) eID establishing method, related device and system
CN115473655B (en) Terminal authentication method, device and storage medium for access network
CN110138765B (en) Data processing method, data processing device, computer equipment and computer readable storage medium
JP2005167412A (en) Communication system, communication terminal and server apparatus used in communication system, and connection authentication method used for communication system
CN105577619B (en) Client login method, client and system
WO2018099407A1 (en) Account authentication login method and device
US20110154436A1 (en) Provider Management Methods and Systems for a Portable Device Running Android Platform
JP7079528B2 (en) Service provision system and service provision method
CN105577606B (en) A kind of method and apparatus for realizing authenticator registration
CN109802927B (en) Security service providing method and device
CN113037736B (en) Authentication method, device, system and computer storage medium
JP5485452B1 (en) Key management system, key management method, user terminal, key generation management device, and program
CN116954693A (en) State coordination method, device, computer equipment and storage medium
WO2015151251A1 (en) Network service providing device, network service providing method, and program

Legal Events

Date Code Title Description
PB01 Publication