CN112910700B - Offline strategy recovery code generation method and system - Google Patents

Offline strategy recovery code generation method and system Download PDF

Info

Publication number
CN112910700B
CN112910700B CN202110123184.0A CN202110123184A CN112910700B CN 112910700 B CN112910700 B CN 112910700B CN 202110123184 A CN202110123184 A CN 202110123184A CN 112910700 B CN112910700 B CN 112910700B
Authority
CN
China
Prior art keywords
information
strategy
recovery code
terminal
bytes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110123184.0A
Other languages
Chinese (zh)
Other versions
CN112910700A (en
Inventor
陈龙泉
郭鹏玉
韩金池
崔永飞
马盼盼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Xinda Jiean Information Technology Co Ltd
Original Assignee
Zhengzhou Xinda Jiean Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Xinda Jiean Information Technology Co Ltd filed Critical Zhengzhou Xinda Jiean Information Technology Co Ltd
Priority to CN202110123184.0A priority Critical patent/CN112910700B/en
Publication of CN112910700A publication Critical patent/CN112910700A/en
Application granted granted Critical
Publication of CN112910700B publication Critical patent/CN112910700B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides an off-line strategy recovery code generation method and system. The method comprises the following steps: acquiring terminal identification information of terminal equipment; combining and splicing the last N bytes of the terminal identification information and the last M bytes of the strategy recovery code generation time, performing summary operation on the combined and spliced information, and selecting a part of a summary result as S1 information; splitting the S1 information, specifically: recording the first R1 bytes of the S1 information as S2 information, and recording the other parts except the first R1 bytes as S3 information; combining and splicing the S2 information and the last M bytes of the strategy recovery code generation time, encrypting the combined and spliced information by adopting a preset key, and recording an encryption result as S4 information; and combining and splicing the S4 information and the S3 information, and processing the combined and spliced information by adopting base64 coding to generate a strategy recovery code of the terminal equipment.

Description

Offline strategy recovery code generation method and system
Technical Field
The invention relates to the technical field of mobile terminal control, in particular to a method and a system for generating an offline policy recovery code.
Background
With the rapid mobile internet technology in recent years, mobile office becomes a new trend of office development at present. Mobile office is widely used in many government and enterprise departments, especially in the fields of mobile government and mobile police. While mobile office offers people to work, there are also a number of security risks. In order to avoid the security risk to the maximum extent, a series of security policies are generally formulated on the mobile terminal, and the execution and monitoring of the security policies are realized through the control software of the terminal, so that the security of the mobile terminal is guaranteed.
When the terminal is used for the first time or the terminal strategy has a problem, the terminal cannot normally access important resources such as a network and the like because the terminal has no strategy or has a problem, so that the terminal cannot update the strategy from a background, and the terminal cannot recover to a normal terminal.
Disclosure of Invention
The invention provides an off-line strategy recovery code generation method and system for a terminal device to update a strategy by using a strategy recovery code, aiming at the problem that the strategy cannot be updated when the strategy is absent or the strategy is in problem.
In one aspect, the present invention provides an offline policy recovery code generating method, including:
step 1: acquiring terminal identification information of terminal equipment;
step 2: combining and splicing the last N bytes of the terminal identification information and the last M bytes of the strategy recovery code generation time, performing summary operation on the combined and spliced information, and selecting a part of a summary result as S1 information;
and step 3: splitting the S1 information, specifically: recording the first R1 bytes of the S1 information as S2 information, and recording the other parts except the first R1 bytes as S3 information;
and 4, step 4: combining and splicing the S2 information and the last M bytes of the strategy recovery code generation time, encrypting the combined and spliced information by adopting a preset key, and recording an encryption result as S4 information;
and 5: and combining and splicing the S4 information and the S3 information, and processing the combined and spliced information by adopting base64 coding to generate a strategy recovery code of the terminal equipment.
Further, the method further comprises:
step 6: sending the generated strategy recovery code to the terminal equipment so that the terminal equipment can verify the strategy recovery code;
the verification process of the terminal equipment to the strategy recovery code comprises the following steps:
step A1: inputting the strategy recovery code into a terminal strategy control application, restoring the strategy recovery code by the terminal strategy control application by adopting base64 decoding, and recording the restored information as S5 information;
step A2: the terminal policy control application splits the S5 information, specifically: recording the first (R1 + M + 1) byte of the S5 information as S6 information, and recording the other parts except the first (R1 + M + 1) byte as S7 information;
step A3: decrypting the S6 information by using the same preset key as in the step 4, and recording the decrypted result as S8 information;
step A4: splitting the S8 information, specifically: recording the first R1 bytes of the S8 information as S9 information, and recording the other parts except the first R1 bytes as S10 information;
step A5: combining and splicing the last N bytes of the terminal identification information of the terminal equipment with the S10 information, performing summary operation on the combined and spliced information, and selecting one part of a summary result as S11 information;
step A6: and combining and splicing the S9 information and the S5 information, comparing the combined and spliced information with the S11 information, and if the combined and spliced information is consistent with the S11 information, passing the verification, otherwise, failing to pass the verification.
Further, the method further comprises:
if the strategy recovery code passes the verification, the terminal strategy control application allows the terminal equipment to normally access the network, and the terminal equipment accesses the strategy server through the network to update the strategy.
Further, in step 1, terminal identification information of the terminal device is obtained through a telephone or short message mode.
Further, in step 6, the generated policy recovery code is sent to the terminal device by telephone or short message.
Further, the terminal identification information includes a digital certificate number.
Further, the method further comprises: and (4) carrying out abstract and hash operation on the digital certificate number of the terminal equipment, and taking the operation result as the preset key in the step (4).
Further, the policy recovery code generation time includes year, month, day, hour, minute, and second.
In another aspect, the present invention provides an offline policy recovery code generation system, including: a policy server and a terminal device;
the policy server is used for acquiring terminal identification information of the terminal equipment; combining and splicing the last N bytes of the terminal identification information and the last M bytes of the strategy recovery code generation time, performing summary operation on the combined and spliced information, and selecting a part of a summary result as S1 information; splitting the S1 information, specifically: recording the first R1 bytes of the S1 information as S2 information, and recording the other parts except the first R1 bytes as S3 information; combining and splicing the S2 information and the strategy recovery code generation time, encrypting the combined and spliced information by adopting a preset key, and recording an encryption result as S4 information; and combining and splicing the S4 information and the S3 information, and processing the combined and spliced information by adopting base64 coding to generate a strategy recovery code of the terminal equipment.
Further, the policy server is further configured to send the generated policy recovery code to the terminal device;
correspondingly, the terminal device is used for verifying the strategy recovery code; the method is specifically used for inputting the strategy recovery code into the terminal strategy control application, the terminal strategy control application adopts base64 decoding to restore the strategy recovery code, and the restored information is recorded as S5 information; the terminal policy control application splits the S5 information, specifically: recording the first (R1 + M + 1) byte of the S5 information as S6 information, and recording the other parts except the first (R1 + M + 1) byte as S7 information; decrypting the S6 information by using a preset key which is the same as that of the policy server, and recording the decrypted result as S8 information; splitting the S8 information, specifically: recording the first R1 bytes of the S8 information as S9 information, and recording the other parts except the first R1 bytes as S10 information; combining and splicing the last N bytes of the terminal identification information of the terminal equipment with the S10 information, performing summary operation on the combined and spliced information, and selecting one part of a summary result as S11 information; and combining and splicing the S9 information and the S5 information, comparing the combined and spliced information with the S11 information, and if the combined and spliced information is consistent with the S11 information, passing the verification, otherwise, failing to pass the verification.
The invention has the beneficial effects that:
according to the off-line strategy recovery code generation method and system provided by the invention, the strategy server generates the recovery code through the terminal identification information and the random information of the terminal equipment, the terminal equipment establishes communication between the terminal equipment and the strategy server through verifying the strategy recovery code information, and pulls the terminal strategy to the terminal equipment, so that the recovery and the use of the terminal strategy are realized.
Drawings
Fig. 1 is a schematic flowchart of an offline policy recovery code generation method according to an embodiment of the present invention;
fig. 2 is a second schematic flowchart of an offline policy recovery code generation method according to an embodiment of the present invention;
fig. 3 is a flowchart illustrating interaction between a policy server and a terminal device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly described below with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, an embodiment of the present invention provides an offline policy recovery code generation method, which is applied to a policy server, and includes the following steps:
s101: acquiring terminal identification information of terminal equipment;
specifically, the terminal device may report its own terminal identification information to the policy server by telephone or short message. The terminal identification information includes a digital certificate number, and may further include a user ID number, TMSI, and the like.
S102: combining and splicing the last N bytes of the terminal identification information and the last M (for example, M = 4) bytes of the strategy recovery code generation time, performing summary operation on the combined and spliced information, and selecting a part of a summary result (for example, the first R bytes of the summary result can be selected, and further, R = 7;) as S1 information;
it can be understood that when the terminal identification information is less than N bytes, content padding can be performed to make up for N bytes. The policy recovery code generation time includes year, month, day, hour, minute, and second, and may further include more detailed time information.
S103: splitting the S1 information, specifically: the first R1 byte (e.g., R1= 3) of the S1 information is denoted as S2 information, and the other parts (i.e., the last 4 bytes of the S1 information) except the first R1 byte are denoted as S3 information;
s104: combining and splicing the S2 information and the last M (for example, M = 4) bytes of the strategy recovery code generation time, encrypting the combined and spliced information by adopting a preset key, and recording an encryption result as S4 information;
specifically, when M =4, R =7, and R1=3, the information length after the combination concatenation of the S2 information and the policy recovery code generation time is 7 bytes, and the S4 information length is 8 bytes.
As an implementable manner, the preset key may be generated in the following manner: and performing abstract and hash operation on the digital certificate number of the terminal equipment, and taking an operation result as a preset key.
S105: and combining and splicing the S4 information and the S3 information, and processing the combined and spliced information by adopting base64 coding to generate a strategy recovery code of the terminal equipment.
Specifically, when M =4, R =7, and R1=3, the information length after the combination concatenation of the S4 information and the S3 information is 12 bytes, and the length of the generated policy recovery code is 16 bytes.
On the basis of the above embodiment, the embodiment of the present invention further includes:
s106: and sending the generated strategy recovery code to the terminal equipment so that the terminal equipment can verify the strategy recovery code.
Specifically, the policy server may send the policy recovery code to the terminal device by telephone or short message.
As an implementation manner, as shown in fig. 2, the verification process of the policy recovery code by the terminal device includes:
s201: inputting the strategy recovery code into a terminal strategy control application, restoring the strategy recovery code by the terminal strategy control application by adopting base64 decoding, and recording the restored information as S5 information;
specifically, still taking the data of the above-described embodiment (i.e., M =4, R =7, R1= 3) as an example, the S5 information length is 12 bytes.
S202: the terminal policy control application splits the S5 information, specifically: recording the first (R1 + M + 1) byte of the S5 information as S6 information, and recording the other parts except the first (R1 + M + 1) byte as S7 information;
specifically, when M =4, R =7, and R1=3, the first 8 bytes of S5 information are designated as S6 information, and the last 4 bytes of S5 information are designated as S7 information.
S203: decrypting the S6 information by using the same preset key as the preset key in the step S104, and recording the decrypted result as S8 information;
specifically, when M =4, R =7, R1=3, the S8 information length is 7 bytes.
S204: splitting the S8 information, specifically: recording the first R1 bytes of the S8 information as S9 information, and recording the other parts except the first R1 bytes as S10 information;
specifically, when M =4, R =7, and R1=3, the first 3 bytes of S8 information are designated as S9 information, and the last 4 bytes of S8 information are designated as S10 information.
S205: combining and splicing the last N bytes of the terminal identification information of the terminal equipment with the S10 information, performing summary operation on the combined and spliced information, and selecting one part of a summary result as S11 information;
specifically, it can be understood that the summary result is selected in the same manner as the policy recovery code is generated, that is, the first R2 bytes of the summary result can be selected, and further, R2= 7.
S206: and combining and splicing the S9 information and the S5 information, comparing the combined and spliced information with the S11 information, and if the combined and spliced information is consistent with the S11 information, passing the verification, otherwise, failing to pass the verification.
S207: if the strategy recovery code passes the verification, the terminal strategy control application allows the terminal equipment to normally access the network, and the terminal equipment accesses the strategy server through the network to update the strategy.
On the basis of the above embodiment, the embodiment of the present invention further provides an interaction process for policy update between a policy server and a terminal device, as shown in fig. 3, including the following steps:
s301: the terminal user reports the terminal identification information of the terminal equipment to the strategy server through other communication modes such as telephone, short message and the like;
s302: the strategy server generates a strategy recovery code according to the terminal identification information;
s303: the strategy server end transfers the strategy recovery code to the terminal user through other communication modes such as telephone, short message and the like;
s304: the terminal user inputs the strategy recovery code into the terminal strategy control application of the terminal equipment;
s305: the terminal equipment verifies the strategy recovery code through the terminal strategy control application;
s306: and after the terminal equipment verifies that the strategy recovery code passes, performing network strategy release on the terminal involved pen.
S307: the terminal equipment accesses the strategy server through the network to update the strategy.
The off-line strategy recovery code generation method provided by the invention has the advantages that the strategy server generates the recovery code through the terminal identification information and the random information of the terminal equipment, the terminal equipment establishes the communication between the terminal equipment and the strategy server through verifying the strategy recovery code information, and the terminal strategy is pulled to the terminal equipment, so that the recovery and the use of the terminal strategy are realized.
Corresponding to the above embodiments of the method, the present invention further provides an offline policy recovery code generating system, including: a policy server and a terminal device;
the policy server is used for acquiring terminal identification information of the terminal equipment; combining and splicing the last N bytes of the terminal identification information and the last M bytes of the strategy recovery code generation time, performing summary operation on the combined and spliced information, and selecting a part of a summary result as S1 information; splitting the S1 information, specifically: recording the first R1 bytes of the S1 information as S2 information, and recording the other parts except the first R1 bytes as S3 information; combining and splicing the S2 information and the strategy recovery code generation time, encrypting the combined and spliced information by adopting a preset key, and recording an encryption result as S4 information; combining and splicing the S4 information and the S3 information, and processing the combined and spliced information by adopting base64 coding to generate a strategy recovery code of the terminal equipment; sending the generated strategy recovery code to the terminal equipment;
the terminal device is used for verifying the strategy recovery code; the method is specifically used for inputting the strategy recovery code into the terminal strategy control application, the terminal strategy control application adopts base64 decoding to restore the strategy recovery code, and the restored information is recorded as S5 information; the terminal policy control application splits the S5 information, specifically: recording the first (R1 + M + 1) byte of the S5 information as S6 information, and recording the other parts except the first (R1 + M + 1) byte as S7 information; decrypting the S6 information by using a preset key which is the same as that of the policy server, and recording the decrypted result as S8 information; splitting the S8 information, specifically: recording the first R1 bytes of the S8 information as S9 information, and recording the other parts except the first R1 bytes as S10 information; combining and splicing the last N bytes of the terminal identification information of the terminal equipment with the S10 information, performing summary operation on the combined and spliced information, and selecting one part of a summary result as S11 information; and combining and splicing the S9 information and the S5 information, comparing the combined and spliced information with the S11 information, and if the combined and spliced information is consistent with the S11 information, passing the verification, otherwise, failing to pass the verification.
It should be noted that the system provided in the embodiment of the present invention is for implementing the above method embodiments, and the functions of the system may specifically refer to the above method embodiments, which are not described herein again.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (9)

1. An off-line policy recovery code generating method, comprising:
step 1: acquiring terminal identification information of terminal equipment;
step 2: combining and splicing the last N bytes of the terminal identification information and the last M bytes of the strategy recovery code generation time, performing summary operation on the combined and spliced information, and selecting a part of a summary result as S1 information;
and step 3: splitting the S1 information, specifically: recording the first R1 bytes of the S1 information as S2 information, and recording the other parts except the first R1 bytes as S3 information;
and 4, step 4: combining and splicing the S2 information and the last M bytes of the strategy recovery code generation time, encrypting the combined and spliced information by adopting a preset key, and recording an encryption result as S4 information;
and 5: combining and splicing the S4 information and the S3 information, and processing the combined and spliced information by adopting base64 coding to generate a strategy recovery code of the terminal equipment;
step 6: sending the generated strategy recovery code to the terminal equipment so that the terminal equipment can verify the strategy recovery code; if the strategy recovery code passes the verification, the terminal strategy control application allows the terminal equipment to normally access the network, and the terminal equipment accesses the strategy server through the network to update the strategy.
2. The method of claim 1, wherein the verification of the policy recovery code by the terminal device comprises:
step A1: inputting the strategy recovery code into a terminal strategy control application, restoring the strategy recovery code by the terminal strategy control application by adopting base64 decoding, and recording the restored information as S5 information;
step A2: the terminal policy control application splits the S5 information, specifically: recording the first (R1 + M + 1) byte of the S5 information as S6 information, and recording the other parts except the first (R1 + M + 1) byte as S7 information;
step A3: decrypting the S6 information by using the same preset key as in the step 4, and recording the decrypted result as S8 information;
step A4: splitting the S8 information, specifically: recording the first R1 bytes of the S8 information as S9 information, and recording the other parts except the first R1 bytes as S10 information;
step A5: combining and splicing the last N bytes of the terminal identification information of the terminal equipment with the S10 information, performing summary operation on the combined and spliced information, and selecting one part of a summary result as S11 information;
step A6: and combining and splicing the S9 information and the S5 information, comparing the combined and spliced information with the S11 information, and if the combined and spliced information is consistent with the S11 information, passing the verification, otherwise, failing to pass the verification.
3. The method according to claim 1, wherein in step 1, the terminal identification information of the terminal device is obtained by telephone or short message.
4. The method according to claim 1, wherein in step 6, the generated policy recovery code is sent to the terminal device by telephone or short message.
5. The method of claim 1, wherein the terminal identification information comprises a digital certificate number.
6. The method of claim 4, further comprising:
and (4) carrying out abstract and hash operation on the digital certificate number of the terminal equipment, and taking the operation result as the preset key in the step (4).
7. The method of claim 1, wherein the policy recovery code generation time comprises year, month, day, hour, minute, and second.
8. An offline policy recovery code generation system, comprising: a policy server and a terminal device;
the policy server is used for acquiring terminal identification information of the terminal equipment; combining and splicing the last N bytes of the terminal identification information and the last M bytes of the strategy recovery code generation time, performing summary operation on the combined and spliced information, and selecting a part of a summary result as S1 information; splitting the S1 information, specifically: recording the first R1 bytes of the S1 information as S2 information, and recording the other parts except the first R1 bytes as S3 information; combining and splicing the S2 information and the strategy recovery code generation time, encrypting the combined and spliced information by adopting a preset key, and recording an encryption result as S4 information; combining and splicing the S4 information and the S3 information, and processing the combined and spliced information by adopting base64 coding to generate a strategy recovery code of the terminal equipment; the terminal equipment is also used for sending the generated strategy recovery code to the terminal equipment so that the terminal equipment can verify the strategy recovery code; if the strategy recovery code passes the verification, the terminal strategy control application allows the terminal equipment to normally access the network, and the terminal equipment accesses the strategy server through the network to update the strategy.
9. The system of claim 8, wherein the terminal device is configured to verify the policy recovery code; the method is specifically used for inputting the strategy recovery code into the terminal strategy control application, the terminal strategy control application adopts base64 decoding to restore the strategy recovery code, and the restored information is recorded as S5 information; the terminal policy control application splits the S5 information, specifically: recording the first (R1 + M + 1) byte of the S5 information as S6 information, and recording the other parts except the first (R1 + M + 1) byte as S7 information; decrypting the S6 information by using a preset key which is the same as that of the policy server, and recording the decrypted result as S8 information; splitting the S8 information, specifically: recording the first R1 bytes of the S8 information as S9 information, and recording the other parts except the first R1 bytes as S10 information; combining and splicing the last N bytes of the terminal identification information of the terminal equipment with the S10 information, performing summary operation on the combined and spliced information, and selecting one part of a summary result as S11 information; and combining and splicing the S9 information and the S5 information, comparing the combined and spliced information with the S11 information, and if the combined and spliced information is consistent with the S11 information, passing the verification, otherwise, failing to pass the verification.
CN202110123184.0A 2021-01-29 2021-01-29 Offline strategy recovery code generation method and system Active CN112910700B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110123184.0A CN112910700B (en) 2021-01-29 2021-01-29 Offline strategy recovery code generation method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110123184.0A CN112910700B (en) 2021-01-29 2021-01-29 Offline strategy recovery code generation method and system

Publications (2)

Publication Number Publication Date
CN112910700A CN112910700A (en) 2021-06-04
CN112910700B true CN112910700B (en) 2022-03-25

Family

ID=76120117

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110123184.0A Active CN112910700B (en) 2021-01-29 2021-01-29 Offline strategy recovery code generation method and system

Country Status (1)

Country Link
CN (1) CN112910700B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI509460B (en) * 2014-09-05 2015-11-21 Trade Van Information Services Co Electronic verification system and its method
CN105898070A (en) * 2016-05-26 2016-08-24 宇龙计算机通信科技(深圳)有限公司 Application setting method and system, server and terminal
CN107590025A (en) * 2017-08-17 2018-01-16 深圳市优品壹电子有限公司 A kind of back-up restoring method and system
CN107592636A (en) * 2017-08-17 2018-01-16 深圳市诚壹科技有限公司 A kind of method of processing information, terminal and server
CN107818463A (en) * 2017-09-25 2018-03-20 九派天下支付有限公司 A kind of offline electronic payment method and system based on TOTP algorithms

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU750408B2 (en) * 1993-12-01 2002-07-18 Rpk New Zealand Limited A method of combining a serial keystream output with binary information
US8452963B2 (en) * 2009-01-27 2013-05-28 Cisco Technology, Inc. Generating protected access credentials

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI509460B (en) * 2014-09-05 2015-11-21 Trade Van Information Services Co Electronic verification system and its method
CN105898070A (en) * 2016-05-26 2016-08-24 宇龙计算机通信科技(深圳)有限公司 Application setting method and system, server and terminal
CN107590025A (en) * 2017-08-17 2018-01-16 深圳市优品壹电子有限公司 A kind of back-up restoring method and system
CN107592636A (en) * 2017-08-17 2018-01-16 深圳市诚壹科技有限公司 A kind of method of processing information, terminal and server
CN107818463A (en) * 2017-09-25 2018-03-20 九派天下支付有限公司 A kind of offline electronic payment method and system based on TOTP algorithms

Also Published As

Publication number Publication date
CN112910700A (en) 2021-06-04

Similar Documents

Publication Publication Date Title
CN110417750B (en) Block chain technology-based file reading and storing method, terminal device and storage medium
US8515081B2 (en) Approach for managing access to messages using encryption key management policies
CN111131278B (en) Data processing method and device, computer storage medium and electronic equipment
CN111786812B (en) Node management method, device, computer equipment and storage medium
CN111464315B (en) Digital signature processing method, device, computer equipment and storage medium
CN111669219A (en) Beidou short message data transmission method and device, electronic equipment and computer medium
CN109474616B (en) Multi-platform data sharing method and device and computer readable storage medium
CN112016104B (en) Encryption method, device and system for financial sensitive data
CN112765626A (en) Authorization signature method, device and system based on escrow key and storage medium
CN115964728A (en) File encryption method and device based on consensus algorithm
CN111181920A (en) Encryption and decryption method and device
CN112463454B (en) Data recovery method, server, terminal device and storage medium
CN114189337A (en) Firmware burning method, device, equipment and storage medium
CN112910700B (en) Offline strategy recovery code generation method and system
CN112333153A (en) Method for sending safety management and alarm mail of login code and related equipment
CN111382451A (en) Security level identification method and device, electronic equipment and storage medium
CN113992345B (en) Webpage sensitive data encryption and decryption method and device, electronic equipment and storage medium
CN115396206A (en) Message encryption method, message decryption method, device and program product
CN114418769A (en) Block chain transaction charging method and device and readable storage medium
CN115086428B (en) Network request sending method and device and electronic equipment
CN114553557A (en) Key calling method, key calling device, computer equipment and storage medium
CN114329559A (en) External important data protection system and protection method thereof
Bojanova et al. Cryptography classes in bugs framework (BF): Encryption bugs (ENC), verification bugs (VRF), and key management bugs (KMN)
CN113360924A (en) Data processing method, device, electronic equipment and medium
CN111859408A (en) File encryption and decryption method and device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant