[go: up one dir, main page]

CN119201246A - Wireless communication terminal management method, system, electronic device and storage medium - Google Patents

Wireless communication terminal management method, system, electronic device and storage medium Download PDF

Info

Publication number
CN119201246A
CN119201246A CN202411275271.8A CN202411275271A CN119201246A CN 119201246 A CN119201246 A CN 119201246A CN 202411275271 A CN202411275271 A CN 202411275271A CN 119201246 A CN119201246 A CN 119201246A
Authority
CN
China
Prior art keywords
information
wireless communication
communication terminal
integrity check
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202411275271.8A
Other languages
Chinese (zh)
Inventor
彭伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Deming Comm Shanghai Co ltd
Original Assignee
Deming Comm Shanghai Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Deming Comm Shanghai Co ltd filed Critical Deming Comm Shanghai Co ltd
Priority to CN202411275271.8A priority Critical patent/CN119201246A/en
Publication of CN119201246A publication Critical patent/CN119201246A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4411Configuring for operating with peripheral devices; Loading of device drivers
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a management method, a management system, electronic equipment and a storage medium of a wireless communication terminal. The method is used for managing a plurality of wireless communication terminals, each wireless communication terminal in the plurality of wireless communication terminals is provided with a background management system, the background management system is used for determining an operating system of the corresponding wireless communication terminal and calling a library function corresponding to the operating system according to the determined operating system so as to be compatible with the operating system, the method comprises the steps of sending request information to a target wireless communication terminal in the plurality of wireless communication terminals, using the target background management system to execute operation corresponding to the request information on the target wireless communication terminal, wherein the target background management system is the background management system configured by the target wireless communication terminal, receiving feedback information from the target wireless communication terminal, and displaying at least part of information in the feedback information. The method is helpful for improving the management efficiency of a plurality of wireless communication terminals.

Description

Management method and system of wireless communication terminal, electronic equipment and storage medium
Technical Field
The present application relates to the field of device management technologies, and in particular, to a method and a system for managing a wireless communication terminal, an electronic device, and a storage medium.
Background
With the rapid development of wireless communication technology, wireless communication terminals are widely visible, such as household wireless routers, roadside wireless street lamps, vehicle-mounted wireless communication terminals, wireless gateways for companies and units, wireless cameras and various industrial wireless routers, 5G/4G/3G high-speed cellular mobile communication equipment, CAT1/NB-IOT low-speed Internet of things terminal equipment and the like.
In the related art, each wireless communication terminal is self-organized and has a respective management system, so that when a user manages the wireless communication terminals, the user usually needs to operate by using the respective management system, the operation is complex, the operation efficiency of managing a plurality of wireless communication terminals by the user is greatly influenced, and the use experience of the user is reduced.
Disclosure of Invention
The present application has been made in view of the above-described problems. According to one aspect of the application, a management method of a wireless communication terminal is provided, and is used for managing a plurality of wireless communication terminals, each wireless communication terminal in the plurality of wireless communication terminals is provided with a background management system, the background management system is used for determining an operating system of the corresponding wireless communication terminal and calling a library function corresponding to the operating system according to the determined operating system so as to be compatible with the operating system, the method comprises the steps of sending request information to a target wireless communication terminal in the plurality of wireless communication terminals to execute operation corresponding to the request information on the target wireless communication terminal by utilizing a target background management system, wherein the target background management system is a background management system configured by the target wireless communication terminal, receiving feedback information from the target wireless communication terminal, and displaying at least part of the feedback information.
The method for sending the request information to the target wireless communication terminal in the plurality of wireless communication terminals comprises the steps of sending the request information to the target wireless communication terminal to obtain equipment information of the target wireless communication terminal by using a target background management system, wherein at least part of the information is the equipment information.
The method includes the steps of sending configuration request information to a target wireless communication terminal to configure parameters of the target wireless communication terminal by using a target background management system, wherein the target background management system configures the parameters of the target wireless communication terminal based on the configuration request information, and the at least part of information is configuration state information or device information of the target wireless communication terminal after configuration is completed.
The method further comprises the steps of responding to instructions of a user, generating initial instruction information, carrying out integrity check on the initial instruction information to generate first integrity check information, packaging the initial instruction information and the first integrity check information by using a first preset message head, and carrying out encryption processing on the packaged information to generate the request information.
The method further comprises the steps of decrypting the feedback information to obtain decrypted feedback information, judging whether the message header of the decrypted feedback information is a second preset message header or not, and carrying out integrity check on the feedback information to obtain an integrity check result, wherein at least part of information in the feedback information is displayed when the message header of the decrypted feedback information is the second preset message header, and the integrity check result is executed when the feedback information is complete, and the at least part of information comprises the return information.
Illustratively, the step of performing integrity check on the returned information to obtain an integrity check result is performed when the message header of the decrypted feedback information is the second preset message header.
The decrypted feedback information further comprises second integrity check information, the integrity check of the return information is carried out to obtain an integrity check result, the integrity check of the return information is carried out to generate third integrity check information, the third integrity check information is compared with the second integrity check information to obtain the integrity check result, and when the third integrity check information is the same as the second integrity check information, the integrity check result is that the return information is complete, otherwise, the integrity check result is that the return information is incomplete.
According to another aspect of the present application, there is provided a management system for a wireless communication terminal, including a control terminal and a plurality of wireless communication terminals, where the control terminal is connected to the plurality of wireless communication terminals by way of wireless communication, respectively, and the control terminal is configured to execute the method of any one of the foregoing embodiments.
According to a further aspect of the application there is provided an electronic device comprising a processor and a memory, the memory having stored therein a computer program, the processor being adapted to execute the computer program to implement the method as described above.
According to a further aspect of the application there is provided a computer readable storage medium storing a computer program/instruction which when executed by a processor performs the above method.
According to the technical scheme, the request information can be sent to the target wireless communication terminal in the plurality of wireless communication terminals, so that the target background management system is utilized to execute the operation corresponding to the request information on the target wireless communication terminal, and therefore, a user can realize unified management on different wireless communication terminals by sending the corresponding request information to each wireless communication terminal. Meanwhile, the background management system can be compatible with different wireless communication terminals by calling library functions corresponding to the operation systems through the background management system according to the determined operation systems, and the mode does not need to develop the management systems for each operation system, so that cost is saved, and unified management of different wireless communication terminals is realized. In a word, the method can realize unified management of various wireless communication terminals, is beneficial to reducing operation difficulty, improves management efficiency of users on the plurality of wireless communication terminals, and is beneficial to improving use experience of the users.
The foregoing description is only an overview of the present application, and is intended to be implemented in accordance with the teachings of the present application in order that the same may be more clearly understood and to make the same and other objects, features and advantages of the present application more readily apparent.
Drawings
The above and other objects, features and advantages of the present application will become more apparent from the following more particular description of embodiments of the present application, as illustrated in the accompanying drawings. The accompanying drawings are included to provide a further understanding of embodiments of the application and are incorporated in and constitute a part of this specification, illustrate the application and together with the embodiments of the application, and not constitute a limitation to the application. In the drawings, like reference numerals generally refer to like parts or steps.
Fig. 1 shows a schematic flow chart of a management method of a wireless communication terminal according to an embodiment of the present application;
Fig. 2 shows a schematic block diagram of an electronic device according to an embodiment of the application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, exemplary embodiments according to the present application will be described in detail with reference to the accompanying drawings. It should be apparent that the described embodiments are only some embodiments of the present application and not all embodiments of the present application, and it should be understood that the present application is not limited by the example embodiments described herein. Based on the embodiments of the application described in the present application, all other embodiments that a person skilled in the art would have without inventive effort shall fall within the scope of the application.
As described above, each wireless communication terminal is presently self-organizing, typically with a respective management system including, but not limited to Linux, android, vxWorks, ucOS/ucLinux, winCE, RTOS, NO OS, etc. Different management systems are different in use mode and management interfaces, some management systems of the wireless communication terminals are based on Linux development and require users to manage through WebUI user management interfaces of HTTP/HTTPS, some management systems of the wireless communication terminals are based on Android development and require users to manage through special APP, some management systems of the wireless communication terminals are embedded RTOS systems and require users to manage through UART serial ports, and some management systems of the wireless communication terminals require users to manage through special command lines CLI. The complexity of operation is increased due to the different operation modes, and even professional management staff can be bothered by the various management modes, so that the operation efficiency of the user for managing the plurality of wireless communication terminals is seriously affected, and the use experience of the user is reduced. In view of the above, the present application provides a method, a system, an electronic device, and a storage medium for managing a wireless communication terminal, where the method can implement unified management on multiple wireless communication terminals, and is helpful for reducing operation difficulty, improving management efficiency of a user on multiple wireless communication terminals, and further is helpful for improving use experience of the user. The method, system, electronic device and storage medium are described in detail below.
According to an aspect of an embodiment of the present application, there is provided a management method of a wireless communication terminal for managing a plurality of wireless communication terminals, each of the plurality of wireless communication terminals being configured with a background management system for determining an operating system of the corresponding wireless communication terminal and calling a library function corresponding to the operating system according to the determined operating system to be compatible with the operating system.
Herein, the wireless communication terminals include, but are not limited to, home wireless routers, roadside wireless street lamps, vehicle-mounted wireless communication terminals, wireless gateways for companies and units, wireless cameras and various industrial-grade wireless routers, 5G/4G/3G high-speed cellular mobile communication devices, CAT1/NB-IOT low-speed internet of things terminal devices, and the like. At least some of the plurality of wireless communication terminals have different operating systems.
In this example scheme, each wireless communication terminal is configured with a background management system. Those skilled in the art can understand the specific manner of configuring the background management system to each wireless communication terminal, for example, the development suite of the background management system may be provided to the development engineer of each wireless communication terminal, and after the Feature function macro configuration and the global dat data configuration, executable files are compiled and embedded into the wireless communication terminal to run in the background. Of course, other configurations may be adopted, and will not be described in detail.
In the solution of this example, the background management system may perform the operations of determining an operating system corresponding to the wireless communication terminal, and calling a library function corresponding to the operating system according to the determined operating system to be compatible with the operating system, where the steps may be performed after the background management is started. In a specific embodiment, the background management system may automatically detect the operating system information of the terminal software after being started. For example, whether the current OS is an operating system can be judged by determining whether the software operating system OS of the wireless communication terminal supports the MAC OS, linux, X86, RTOS, 32-bit, 64-bit and the like, and library functions corresponding to different operating system OS types can be respectively called according to lib library functions of the background management system after the operating system OS type is judged. Thus, the background management system can be compatible with the operating systems of different wireless communication terminals.
Alternatively, the background management system may be an SDK suite developed in the C language so as to be compatible with a platform system such as Linux/RTOS and many different wireless communication terminals.
In some embodiments, the background management system may monitor request information sent to the wireless communication terminal through the communication interface. For example, the background management system may initiate a communication interface detection process, the communication interface creates an ssl+tcp Socket interface, and binds the port 8899 (i.e., the port used by the wireless communication terminal to receive information).
Fig. 1 shows a schematic flow chart of a management method of a wireless communication terminal according to an embodiment of the present application. As shown in fig. 1, the method 100 may include the following steps S110, S120, and S130.
In step S110, request information is transmitted to a target wireless communication terminal of the plurality of wireless communication terminals, so as to perform an operation corresponding to the request information on the target wireless communication terminal by using a target background management system, wherein the target background management system is a background management system configured by the target wireless communication terminal.
Optionally, before transmitting the request information to the target wireless communication terminal among the plurality of wireless communication terminals, the method may further include determining the target wireless communication terminal among the plurality of wireless communication terminals in response to a selection operation of the user at step S110. In some embodiments, the apparatus for performing the method 100 has a display screen on which a name and/or ID number of each of the plurality of wireless communication terminals may be displayed on an interface (which may be referred to as a display interface) on which a user may select a target wireless communication terminal by clicking.
In the scheme of the present example, the request information may be transmitted to the target wireless communication terminal. The request information includes, but is not limited to, inquiry request information for inquiring device information of the target wireless communication terminal, and configuration request information for modifying parameters of the target wireless communication terminal.
In the solution of the present example, the target background management system may perform an operation corresponding to the request information on the target wireless communication terminal after receiving the request information. For example, the target background management system may perform a query operation when the request information is a query request information, and may perform a configuration operation when the request information is a configuration request information.
In step S120, feedback information from the target wireless communication terminal is received.
After the target background management system performs the operation corresponding to the request information, feedback information may be sent, where the feedback information is at least used to indicate the execution result of the operation. For example, when the request information is query request information, the feedback information may include a query result, and when the request information is configuration request information, the feedback information may include information indicating a result of configuration execution.
At step S130, at least part of the feedback information is displayed.
It will be appreciated that the feedback information may be encapsulated and/or encrypted, at least some of which is information in the feedback information corresponding to the request information. For example, when the request information is query request information, at least part of the information may be a query result (for example, device information described below).
After receiving the feedback information, at least part of the feedback information can be displayed, so that a user can know the operation execution condition in time or obtain information required by the user. In embodiments where the apparatus for performing the method 100 has a display screen, at least a portion of the information may be displayed on the display interface for viewing by a user.
According to the technical scheme, the request information can be sent to the target wireless communication terminal in the plurality of wireless communication terminals, so that the target background management system is utilized to execute the operation corresponding to the request information on the target wireless communication terminal, and therefore, a user can realize unified management on different wireless communication terminals by sending the corresponding request information to each wireless communication terminal. Meanwhile, the background management system can be compatible with different wireless communication terminals by calling library functions corresponding to the operation systems through the background management system according to the determined operation systems, and the mode does not need to develop the management systems for each operation system, so that cost is saved, and unified management of different wireless communication terminals is realized. In a word, the method can realize unified management of various wireless communication terminals, is beneficial to reducing operation difficulty, improves management efficiency of users on the plurality of wireless communication terminals, and is beneficial to improving use experience of the users.
The step S110 of sending the request information to the target wireless communication terminal in the plurality of wireless communication terminals to execute the operation corresponding to the request information on the target wireless communication terminal by using the target background management system may specifically include the steps of sending the query request information to the target wireless communication terminal to acquire the device information of the target wireless communication terminal by using the target background management system, wherein at least part of the information is the device information.
It is understood that the device information may include overall information of the target wireless communication terminal and information and configuration parameters of the respective hardware modules therein. Specifically, the device information may include operating system information, model, unique MAC address, unique Serial Number information, IMEI information of the target communication terminal, and basic information of each module in the target communication terminal, and for example, the basic information of each module may include basic information of hardware such as CPU, FLASH memory (FLASH) chip, DDR memory, etc., and may include, for example, model of CPU, usage rate of CPU, total capacity of FLASH memory, total capacity of memory, remaining memory capacity, remaining FLASH memory, etc. The information can help the user to know the basic condition of the target wireless communication terminal, so that the user can manage the target wireless communication terminal according to the actual condition.
In some embodiments, the target background management system may obtain device information of the target wireless communication terminal by traversing and reading hardware device information and interfaces in the target wireless communication terminal, starting the read hardware modules, such as WIFI/BLE/Modem, one by one, and reading Model number, unique MAC address, unique Serial Number information and IMEI information of the target wireless communication terminal.
The manner in which the target background management system obtains the device information is described below by means of a specific embodiment, it is to be understood that this embodiment is only for illustration, the device information is not limited to the description below, and the specific obtaining method may also be implemented by using a conventional technical means in the prior art, and is not repeated.
In one particular embodiment, the target background management system may detect hardware base information by:
For the CPU, when the operating system of the target wireless communication terminal is Linux/Android OS, the SDK code reading cpuinfo can be used for acquiring information such as multi-core multithreading, CPU model, main frequency and the like, and the example is as follows:
system type: MediaTek MT7621 ver:1 eco:3
machine: ATEL-ER100
processor: 4
cpu model: MIPS 1004Kc V2.15
BogoMIPS: 584.90
when the operating system of the target wireless communication terminal is an RTOS system, the CPU ID of the CPU register is read by using the SDK code to acquire the CPU model.
When the operating system of the TARGET wireless communication terminal is a commonly used MCU chip RTOS such as STM/ESP, CPU information can be read through a HAL library function customized by a chip vendor, for example, CONFIG_IDF_TARGET reads to value which is esp32C2 to represent the SOC CPU of Le Xin ESP 32-C2.
For Flash, when the operating system of the target wireless communication terminal is a Linux/Android OS, the SDK code is used for reading MTD DEVICE to obtain relevant information of Flash, or the relevant information of Flash is obtained through a Flash bottom layer driver, such as SPI-NAND: W25N512GWxxR/T is found in table, and when the operating system of the target wireless communication terminal is an RTOS system, relevant information of Flash is read through a read register or a HAL library function of a chip manufacturer.
For DDR memory, when the operating system of the target wireless communication terminal is Linux/Android OS, the DDR memory information can be obtained by utilizing SDK code reading meminfo, and the example is as follows:
MemTotal:123456 kB
MemFree:13220 kB
MemAvailable:59196 kB
When the operating system of the target wireless communication terminal is an RTOS system, a chip library function, such as espget_free_head_size (), is called to acquire DDR memory information.
For the WiFi device, when the operating system of the target wireless communication terminal is Linux/Android OS, detecting the WiFi device and the connection state, transmitting TX/RX messages, setting WiFi SSID/password/Channel/encryption modes, and the like by the following methods, so as to obtain information of the WiFi device module:
i. The general mainstream WIFI chip manufacturers mainly have high-pass and MediaTek, broadcom, realtek, ASR and the like through ioctl to call WiFi driven functions and methods, and library function methods of several mainstream chip manufacturers are directly integrated;
iw dev looks at WIFI devices;
iwconfig checks the connection state such as the WIFI transmission message;
iv i wwpriv stat/status to obtain or configure
v./proc/wlan0/stats, /proc/wlan0/sta_info
vi./proc/net/wireless
When the operating system of the target wireless communication terminal is an RTOS system, the information of the WiFi equipment module is obtained through library functions provided by a chip factory, such as espwifi set MODE (WIFI MODE AP) or espwifi set config (WIFI IF AP and WiFi config).
For BLE equipment, when the operating system of the target wireless communication terminal is a Linux OS, bluetooth adapter information is checked through hwinfor, SDK codes acquire Bluetooth equipment detailed information through hci_requirement, and when the operating system of the target wireless communication terminal is an RTOS system, bluetooth information reading and configuration, such as bt_controller_init(&bt_cfg),bluedroid_init(),ble_gap_start_advertising(&heart_rate_adv_params) and the like, are realized through common library functions.
For a 5G/4G/3G high-speed communication module, a USB/PCIE hardware interface is used to interface to obtain/dev/ttyUSB/ttyUSB 1/ttyUSB2 or/dev/ttyACM 0, or AT commands such as ATI may obtain information related to the cellular module, for example:
QuectelRG500QEARevision: RG500QEAAAR01A01M4G
Manufacturer: Altair Semiconductor
Model: ALT38XX
Revision: HN_02_01_08_00_63_LO
Manufacturer: Fibocom Wireless Inc.
Model: FG360-EAU
Revision: 81108.7000.00.08.01.14
SVN: 14
IMEI: 868866050216485
According to the technical scheme, the target background management system can be used for acquiring the equipment information of the target wireless communication terminal, and the equipment information of the target wireless communication terminal can help a user to know the basic condition of the target wireless communication terminal, so that the user can manage the target wireless communication terminal according to the actual condition. Meanwhile, the scheme is simple to operate, can facilitate the user to inquire the equipment information of different wireless communication terminal equipment, and is beneficial to improving the use experience of the user.
The step S110 of sending the request information to the target wireless communication terminal in the plurality of wireless communication terminals to execute the operation corresponding to the request information by using the target background management system may specifically include the steps of sending the configuration request information to the target wireless communication terminal to configure the parameters of the target wireless communication terminal by using the target background management system, wherein the target background management system configures the parameters of the target wireless communication terminal based on the configuration request information, and at least part of the information is configuration state information or device information of the target wireless communication terminal after the configuration is completed.
In the solution of this example, at least part of the information is configuration status information or device information of the target wireless communication terminal after completion of the configuration. The configuration status information may be used to indicate whether the configuration was successful.
As described above, the parameters of the target wireless communication terminal can be configured with the target background management system. Specifically, the target background management system may receive and process the configuration request information to implement parameter configuration for the target wireless communication terminal.
According to the technical scheme, the target background management system can be utilized to configure the parameters of the target wireless communication terminal, the configuration mode is simple to operate, the parameters of different wireless communication terminal equipment can be conveniently adjusted by a user, the management efficiency of the user on the wireless communication terminal equipment can be improved, and the use experience of the user can be improved.
Illustratively, before transmitting the request information to the target wireless communication terminal of the plurality of wireless communication terminals in step S110, the method may further include generating initial instruction information in response to an instruction of a user, performing integrity check on the initial instruction information to generate first integrity check information, encapsulating the initial instruction information and the first integrity check information with a first preset message header, and performing encryption processing on the encapsulated information to generate the request information.
In some embodiments, the initial instruction information may be first generated according to an instruction of the user. The initial quality information may include a message ID (MsgID) and a message content (MsgContent). The length of the message and the MD5 Checksum (MD 5 Checksum) may then be calculated to generate the first integrity check information. The initial instruction information and the first integrity check information may then be encapsulated with a first preset message header, which may be set as desired, for example, may be 0X7E. After the encapsulation is completed, the encapsulated information is encrypted to generate the request information. The manner of encryption may include, but is not limited to, encryption using a custom communication protocol and encryption using a particular encryption feature code.
In a specific embodiment, AES 256-bit encryption based on a unique feature code of the terminal device (i.e., the target wireless communication terminal) may be used to perform Key, so as to ensure the security of the transmission process. For example, based on the code of the AES-256-CBC-CTS encryption algorithm, the complementary bit string of PKCS5Padding is modified into a special string, and the first two offset characters of each block of 128bits are modified to become a nonstandard algorithm or a custom algorithm for encryption and decryption of front-end APP and background management software. For another example, the modified custom algorithm may be used for encryption and decryption based on a unique 32-bit hardware feature code HWID.
In another specific embodiment, SSL+TCP 8899 Port Socket communication can be also based, and custom Header 7 bytes and tail 1 checksum byte are added. This helps to further improve data transmission security.
In the scheme of the example, the target background management system can further execute the following operations before executing the operation corresponding to the request information, namely receiving the request information, decrypting the request information, carrying out integrity check on initial instruction information in the decrypted request information to determine the integrity of the initial instruction information, judging whether a message header in the decrypted request information is a first preset message header or not, wherein when the message header in the decrypted request information is the first preset message header and the initial instruction information is complete, the target background management system executes the operation corresponding to the request information.
In a specific embodiment, the target background management system can monitor the read request information through the communication interface, analyze specific request Data through the JSON library function after the APP request information is read, then execute corresponding operations according to the analysis MsgID and MsgContent after the user request Data is checked, generate return information after the operation is executed, and perform integrity check, encapsulation and encryption on the return information to obtain the feedback information. The specific process is similar to the process of carrying out integrity check, encapsulation and encryption on the initial instruction information, and is not repeated. In a specific embodiment, length may be calculated for MsgID and MsgContent of the return information, MD5 CHECKSUM is performed for the Length field and MsgID, msgContent to fill in the tail of the message, and 0X7E field is added to the head of the message, and the return information is obtained after encryption.
In the related art, when a wireless communication terminal is managed, data is generally transmitted in a plaintext transmission manner, so that security is poor, and privacy of a user may be revealed. According to the technical scheme, the initial instruction information is processed in the modes of integrity checking, packaging and encryption processing, so that the integrity of transmitted data can be guaranteed, the data is prevented from being tampered, the safety of data transmission is improved, and privacy leakage of users can be effectively prevented.
Optionally, before generating the initial instruction information in response to an instruction of the user, the method may further include establishing a communication link with the target wireless communication terminal. In a specific embodiment, an ssl+tcp Socket interface may be created and connected to the 8899 port of the target wireless communication terminal. A message handling function interface may also be created that may be used for encapsulation and integrity check operations in subsequent steps.
In some embodiments, after the communication link is established, a hash algorithm of Key can be made based on the unique feature code of the target wireless communication terminal, and an Authentication bidirectional access Authentication can be made by combining an SSL certificate, and the method specifically comprises the following steps:
1) Reading a unique feature code of the equipment terminal, namely attempting to read CPU CHIPID hardware feature codes, attempting to read DDR CHIPID hardware feature codes, attempting to read HARDWARE ID hardware feature codes, attempting to read hardware serial numbers, automatically generating a complement 32-bit random number if the hardware serial numbers are not read or are less than 32 bits, and storing the complement 32-bit random number in a ROM FLASH to serve as a hardware unique feature code HWID to generate encryption SSLKEY;
2) Bidirectional authentication when using self-contained X.509 certificates for access;
3) Receiving SSLKEY sent by the target wireless communication terminal after the two-way authentication negotiation is passed;
4) Utilizing a self-defined decryption algorithm to unlock SSLKEY, reading a unique hardware feature code HWID of an accurate equipment end, and encrypting the HWID again by utilizing the self-defined encryption algorithm to generate SSLKEY to be sent to a target wireless communication terminal;
5) And the target wireless communication terminal is disassembled SSLKEY to be compared with the own 32-bit HWID, and is accepted to be accessed after being consistent, otherwise, the target wireless communication terminal refuses to be accessed.
The method further includes decrypting the feedback information to obtain decrypted feedback information, the decrypted feedback information including the feedback information and a message header, determining whether the message header of the decrypted feedback information is a second preset message header, and performing integrity check on the feedback information to obtain an integrity check result, wherein at least part of the feedback information is displayed when the message header of the decrypted feedback information is the second preset message header and the integrity check result is that the feedback information is complete, and at least part of the feedback information includes the feedback information.
As described above, the target background management system may generate the return information after the operation is performed, and perform integrity check, encapsulation, and encryption on the return information to obtain the feedback information. In some embodiments, the target background management system may perform the operations of integrity checking the return information to generate second integrity check information, encapsulating the return information and the second integrity check information with a second preset message header, and encrypting the encapsulated information to generate feedback information.
Optionally, the step of determining whether the message header of the decrypted feedback information is the second preset message header and the step of performing integrity check on the feedback information may be performed simultaneously or sequentially, which is not limited in this example.
The technical scheme can accurately judge the integrity and the safety of the data through decryption processing, verification of the message header and integrity verification, in other words, the scheme is beneficial to improving the safety of data transmission and protecting the privacy of users.
Illustratively, the step of integrity checking the returned information to obtain an integrity check result is performed when the message header of the decrypted feedback information is a second predetermined message header.
In this exemplary scenario, it may be first determined whether the message header of the decrypted feedback information is a second preset message header, and then the integrity check is performed on the feedback information to obtain an integrity check result. Thus, redundant operation can be avoided, the operation efficiency is improved, and the management efficiency of the wireless communication terminal is further improved.
The decrypted feedback information further comprises second integrity check information, integrity check is conducted on the return information to obtain an integrity check result, the integrity check is conducted on the return information to generate third integrity check information, the third integrity check information is compared with the second integrity check information to obtain the integrity check result, and when the third integrity check information is identical with the second integrity check information, the integrity check result is that the return information is complete, otherwise, the integrity check result is that the return information is incomplete.
In the solution of this example, the two pieces of verification information may be compared to obtain an integrity verification result. The manner in which the second integrity check information is obtained is described in detail above and is not described in detail.
According to the technical scheme, the integrity check is respectively carried out when the data are sent and received, and the check information is compared, so that the data can be prevented from being lost or tampered, the data integrity is ensured, and the requirement of a user can be ensured to be accurately executed.
According to another aspect of the embodiment of the present application, there is provided a management system for a wireless communication terminal, where the management system includes a control terminal and a plurality of wireless communication terminals, the control terminal is connected to the plurality of wireless communication terminals by way of wireless communication, respectively, and the control terminal is configured to perform the method in any one of the foregoing embodiments.
In the related art, different wireless communication terminals are often managed by adopting different hardware interfaces, for example, some wireless communication terminals are connected to a computer end through a network Cable, a browser or a specially installed management tool is opened by the computer end to perform configuration, some wireless communication terminals are connected with a UART/CONSOL serial port through a plug-in pin type or an RJ45 network port type, a UART serial port driver is required to be installed on the computer, a serial port is opened through a serial port tool, commands are input in a mode of various command lines to obtain various desired technical bottom output results, some wireless communication terminals are connected with a small box and a Cable line through a special tool installed on the computer to perform management, some wireless communication terminals are connected with a USB port through a special tool installed on each chip manufacturer to perform management configuration, and a third party tool also has a License limit on the service time. In the solution of this example, the control end connects to the plurality of wireless communication terminals respectively by means of wireless communication, including but not limited to bluetooth, local area network, cellular network, etc. Thus, the unified management of the control end to a plurality of wireless communication terminals can be facilitated.
Optionally, the control end may be any device such as a desktop computer, a notebook computer, a tablet computer, a mobile phone, etc., and the front end APP may be installed in the device so as to perform the above method. The front-end APP can be developed by adopting the Google open-source application development framework Flutter language, a set of code library can be used for constructing exquisite multi-platform compatible applications, mobile phones, tablets and computers are supported, development is quick, flexible and efficient, modification is easy, and various scene applications can be met by matching with diversified plug-ins.
Alternatively, the control side may provide multilingual library support for use by different users.
It will be appreciated that the control end may have a display interface to enable the input of commands and the display of results.
Optionally, the background management system may include a hardware device management module, a software function management module, a communication interface API library, an identity authentication data encryption module, a general public function module, and a bottom hardware detection module, where the hardware detection includes WiFi, BLE, lora, GNSS, zigbee, MCU, 5G/4G/3G/Cat1/NB Modem, RS232/RS485, LCD, 9-Axis Sensor, and other common communication terminals, and the hardware detection module feeds back device information and status to the hardware management module, and then the software function management module disables and applies the hardware devices.
According to the technical scheme, the control end is connected with the plurality of wireless communication terminals, each wireless communication terminal is managed by the management method of the wireless communication terminal in the embodiment, the purpose of managing the plurality of wireless communication terminals by one device can be achieved, a user only needs to operate at one control end, management difficulty can be simplified, management efficiency is improved, and user experience is improved.
The following describes the operation of the management system of the wireless communication terminal, taking the target wireless communication terminal as a cellular module RG500Q as an example:
1) After the background management system SDK is started, the cellular module tries to detect, and discovers USB equipment with vendor=2c7c ProdID=0801 through looking at/sys/kernel/debug/USB/devices;
2) The background software sniffs the AT port communication, and finds out/dev/ttyUSB 2 to send an AT command and then obtains the OK accurate return;
3) The background software tries to acquire module information, sends an ATI command, and returns as follows:
QuectelRG500QEARevision: RG500QEAAAR01A01M4G
4) The background software tries to acquire a network interface, and views a wwan data port through an ifconfig;
5) The background hardware management module registers and stores the hardware information of the cellular module as follows:
a)Cellular Module: RG500QEA
b)Cellular Manufacture: Quectel
c)Cellular FW Revision:RG500QEAAAR01A01M4G
d)Cellular AT Interface: /dev/ttyUSB2
e)Cellular Data Interface: wwan0
6) The software management module acquires hardware module information and feeds the hardware module information back to the front-end APP through the communication interface, and the APP can display module manufacturers, models and software version numbers;
7) The software management module acquires other information of the cellular module through AT INTERFACE, such as networking state, networking mode (5G/4G/3G), operator name (CMCC/CMNET China Mobile, etc.), networking IP address/DNS address, networking Cell ID, frequency point, signal parameter RSRP/RSRQ/SINR/RSSI, etc., and feeds back to the user side APP through the communication interface for display and viewing;
8) The user terminal APP not ONLY can check module information and networking parameters, but also can set networking modes as 5G ONLY, networking Band, specific cell ID and the like, and the networking modes are set to the software management module through the communication interface, and after the software management module receives the information, the software management module sends a corresponding command to be set to the cellular module so as to enable the cellular module to work according to the user set parameters.
According to still another aspect of the embodiment of the present application, there is also provided an electronic device. Fig. 2 shows a schematic block diagram of an electronic device according to an embodiment of the application. As shown in fig. 2, the electronic device 200 includes a processor 210 and a memory 220. The memory 220 stores a computer program therein, and the processor 210 is configured to execute the computer program to implement the above-described method.
According to yet another aspect of an embodiment of the present application, there is also provided a computer-readable storage medium. The storage medium has stored therein a computer program/instruction which, when executed by a processor, performs the method described above. The storage medium may include, for example, read-only memory (ROM), erasable programmable read-only memory (EPROM), portable compact disc read-only memory (CD-ROM), USB memory, or any combination of the preceding. The computer-readable storage medium may be any combination of one or more computer-readable storage media.
The implementation structure, operating principle and advantageous effects of the management system, the electronic device and the computer-readable storage medium are easily understood by those of ordinary skill in the art by reading the above management method. For brevity, the description is omitted here.
Although the illustrative embodiments have been described herein with reference to the accompanying drawings, it is to be understood that the above illustrative embodiments are merely illustrative and are not intended to limit the scope of the present application thereto. Various changes and modifications may be made therein by one of ordinary skill in the art without departing from the scope and spirit of the application. All such changes and modifications are intended to be included within the scope of the present application as set forth in the appended claims.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the several embodiments provided by the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described device embodiments are merely illustrative, e.g., the division of elements is merely a logical function division, and there may be additional divisions of actual implementation, e.g., multiple elements or components may be combined or integrated into another device, or some features may be omitted, or not performed.
In the description provided herein, numerous specific details are set forth. However, it is understood that embodiments of the application may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in order to streamline the application and aid in understanding one or more of the various application aspects, various features of the application are sometimes grouped together in a single embodiment, figure, or description thereof in the description of exemplary embodiments of the application. This method of disclosure, however, is not to be interpreted as reflecting an intention that the claimed application requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this application.
It will be understood by those skilled in the art that all of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or units of any method or apparatus so disclosed, may be combined in any combination, except combinations where the features are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings), may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features but not others included in other embodiments, combinations of features of different embodiments are meant to be within the scope of the application and form different embodiments. For example, in the claims, any of the claimed embodiments may be used in any combination.
Various component embodiments of the application may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functionality of some of the modules in a management system, electronic device, according to embodiments of the application. The present application can also be implemented as an apparatus program (e.g., a computer program and a computer program product) for performing a portion or all of the methods described herein. Such a program embodying the present application may be stored on a computer readable medium, or may have the form of one or more signals. Such signals may be downloaded from an internet website, provided on a carrier signal, or provided in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the application, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The application may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The use of the words first, second, third, etc. do not denote any order. These words may be interpreted as names.
The foregoing description is merely illustrative of specific embodiments of the present application and the scope of the present application is not limited thereto, and any person skilled in the art can easily think about variations or substitutions within the scope of the present application. The protection scope of the application is subject to the protection scope of the claims.

Claims (10)

1.一种无线通信终端的管理方法,其特征在于,用于管理多个无线通信终端,所述多个无线通信终端中的每一无线通信终端均配置有后台管理系统,所述后台管理系统用于确定对应无线通信终端的操作系统,并根据所确定的操作系统调用与该操作系统对应的库函数,以兼容该操作系统;1. A method for managing a wireless communication terminal, characterized in that it is used to manage a plurality of wireless communication terminals, each of the plurality of wireless communication terminals is configured with a background management system, the background management system is used to determine an operating system of the corresponding wireless communication terminal, and call a library function corresponding to the operating system according to the determined operating system to be compatible with the operating system; 所述方法包括:The method comprises: 向所述多个无线通信终端中的目标无线通信终端发送请求信息,以利用目标后台管理系统对所述目标无线通信终端执行与所述请求信息对应的操作,其中,所述目标后台管理系统为所述目标无线通信终端所配置的后台管理系统;Sending request information to a target wireless communication terminal among the multiple wireless communication terminals, so as to use a target background management system to perform an operation corresponding to the request information on the target wireless communication terminal, wherein the target background management system is a background management system configured for the target wireless communication terminal; 接收来自于所述目标无线通信终端的反馈信息;receiving feedback information from the target wireless communication terminal; 显示所述反馈信息中的至少部分信息。At least part of the feedback information is displayed. 2.根据权利要求1所述的方法,其特征在于,所述请求信息为查询请求信息;2. The method according to claim 1, characterized in that the request information is query request information; 所述向所述多个无线通信终端中的目标无线通信终端发送请求信息,以利用目标后台管理系统对所述目标无线通信终端执行与所述请求信息对应的操作,包括:The sending of request information to a target wireless communication terminal among the plurality of wireless communication terminals so as to use a target background management system to perform an operation corresponding to the request information on the target wireless communication terminal includes: 向所述目标无线通信终端发送查询请求信息,以利用所述目标后台管理系统获取所述目标无线通信终端的设备信息;Sending query request information to the target wireless communication terminal to obtain device information of the target wireless communication terminal using the target background management system; 其中,所述至少部分信息为所述设备信息。Wherein, at least part of the information is the device information. 3.根据权利要求1所述的方法,其特征在于,所述请求信息为配置请求信息;3. The method according to claim 1, wherein the request information is configuration request information; 所述向所述多个无线通信终端中的目标无线通信终端发送请求信息,以利用目标后台管理系统对所述目标无线通信终端执行与所述请求信息对应的操作,包括:The sending of request information to a target wireless communication terminal among the plurality of wireless communication terminals so as to use a target background management system to perform an operation corresponding to the request information on the target wireless communication terminal includes: 向所述目标无线通信终端发送所述配置请求信息,以利用所述目标后台管理系统对所述目标无线通信终端的参数进行配置,其中,所述目标后台管理系统基于所述配置请求信息对所述目标无线通信终端的参数进行配置;Sending the configuration request information to the target wireless communication terminal, so as to configure the parameters of the target wireless communication terminal using the target background management system, wherein the target background management system configures the parameters of the target wireless communication terminal based on the configuration request information; 其中,所述至少部分信息为配置状态信息或经配置完成后所述目标无线通信终端的设备信息。Wherein, at least part of the information is configuration status information or device information of the target wireless communication terminal after configuration is completed. 4.根据权利要求1-3任一项所述的方法,其特征在于,在所述向所述多个无线通信终端中的目标无线通信终端发送请求信息之前,所述方法还包括:4. The method according to any one of claims 1 to 3, characterized in that before sending the request information to the target wireless communication terminal among the multiple wireless communication terminals, the method further comprises: 响应于用户的指令,生成初始指令信息;generating initial instruction information in response to an instruction from a user; 对所述初始指令信息进行完整性校验,以生成第一完整性校验信息;Performing an integrity check on the initial instruction information to generate first integrity check information; 利用第一预设消息头对所述初始指令信息和所述第一完整性校验信息进行封装;Encapsulating the initial instruction information and the first integrity check information by using a first preset message header; 对封装后的信息进行加密处理,以生成所述请求信息。The encapsulated information is encrypted to generate the request information. 5.根据权利要求1-3任一项所述的方法,其特征在于,在所述接收来自于所述目标无线通信终端的反馈信息之后,所述方法还包括:5. The method according to any one of claims 1 to 3, characterized in that after receiving the feedback information from the target wireless communication terminal, the method further comprises: 对所述反馈信息进行解密处理,以得到解密后的反馈信息,所述解密后的反馈信息包括返回信息和消息头;Decrypting the feedback information to obtain decrypted feedback information, wherein the decrypted feedback information includes return information and a message header; 判断经解密后的反馈信息的消息头是否为第二预设消息头;Determining whether the message header of the decrypted feedback information is a second preset message header; 对所述返回信息进行完整性校验,以获得完整性校验结果;Performing integrity check on the returned information to obtain an integrity check result; 其中,所述显示所述反馈信息中的至少部分信息在经解密后的反馈信息的消息头为第二预设消息头,且所述完整性校验结果为所述返回信息完整时执行,所述至少部分信息包括所述返回信息。The displaying of at least part of the feedback information is performed when the message header of the decrypted feedback information is a second preset message header and the integrity check result shows that the returned information is complete, and the at least part of the information includes the returned information. 6.根据权利要求5所述的方法,其特征在于,所述对所述返回信息进行完整性校验,以获得完整性校验结果的步骤在经解密后的反馈信息的消息头为所述第二预设消息头时执行。6. The method according to claim 5 is characterized in that the step of performing integrity check on the returned information to obtain an integrity check result is performed when the message header of the decrypted feedback information is the second preset message header. 7.根据权利要求5所述的方法,其特征在于,所述解密后的反馈信息还包括第二完整性校验信息;7. The method according to claim 5, characterized in that the decrypted feedback information also includes second integrity check information; 所述对所述返回信息进行完整性校验,以获得完整性校验结果,包括:The performing integrity check on the returned information to obtain an integrity check result includes: 对所述返回信息进行完整性校验,以生成第三完整性校验信息;Performing integrity check on the returned information to generate third integrity check information; 对比所述第三完整性校验信息和所述第二完整性校验信息,以获得所述完整性校验结果;Comparing the third integrity check information with the second integrity check information to obtain the integrity check result; 其中,在所述第三完整性校验信息和所述第二完整性校验信息相同时,所述完整性校验结果为所述返回信息完整,否则,所述完整性校验结果为所述返回信息不完整。When the third integrity check information is the same as the second integrity check information, the integrity check result is that the returned information is complete; otherwise, the integrity check result is that the returned information is incomplete. 8.一种无线通信终端的管理系统,其特征在于,包括控制端和多个无线通信终端,所述控制端通过无线通信的方式分别连接所述多个无线通信终端;所述控制端用于执行权利要求1-7任一项所述的方法。8. A management system for wireless communication terminals, characterized in that it comprises a control terminal and multiple wireless communication terminals, wherein the control terminal is connected to the multiple wireless communication terminals respectively through wireless communication; and the control terminal is used to execute the method described in any one of claims 1 to 7. 9.一种电子设备,其特征在于,包括处理器和存储器,所述存储器中存储有计算机程序,所述处理器用于执行所述计算机程序以实现如权利要求1-7任一项所述的方法。9. An electronic device, comprising a processor and a memory, wherein the memory stores a computer program, and the processor is used to execute the computer program to implement the method according to any one of claims 1 to 7. 10.一种计算机可读存储介质,其特征在于,存储有计算机程序/指令,所述计算机程序/指令被处理器执行时实现如权利要求1-7任一项所述的方法。10. A computer-readable storage medium, characterized in that a computer program/instruction is stored therein, and when the computer program/instruction is executed by a processor, the method according to any one of claims 1 to 7 is implemented.
CN202411275271.8A 2024-09-12 2024-09-12 Wireless communication terminal management method, system, electronic device and storage medium Pending CN119201246A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202411275271.8A CN119201246A (en) 2024-09-12 2024-09-12 Wireless communication terminal management method, system, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202411275271.8A CN119201246A (en) 2024-09-12 2024-09-12 Wireless communication terminal management method, system, electronic device and storage medium

Publications (1)

Publication Number Publication Date
CN119201246A true CN119201246A (en) 2024-12-27

Family

ID=94076827

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202411275271.8A Pending CN119201246A (en) 2024-09-12 2024-09-12 Wireless communication terminal management method, system, electronic device and storage medium

Country Status (1)

Country Link
CN (1) CN119201246A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101699905A (en) * 2009-10-30 2010-04-28 中兴通讯股份有限公司 Wireless intelligent terminal, webmaster platform and management method by webmaster platform
US20100278119A1 (en) * 2009-04-30 2010-11-04 Miodrag Potkonjak User profile-based wireless device system level management
CN102156648A (en) * 2011-01-30 2011-08-17 中兴通讯股份有限公司 Wireless communication terminal starting method and device
CN106033381A (en) * 2015-03-16 2016-10-19 阿里巴巴集团控股有限公司 Method, device, and system for managing wireless terminal based on Wi-Fi
CN108289110A (en) * 2017-01-09 2018-07-17 阿里巴巴集团控股有限公司 Equipment correlating method, device, terminal device and operating system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100278119A1 (en) * 2009-04-30 2010-11-04 Miodrag Potkonjak User profile-based wireless device system level management
CN102450037A (en) * 2009-04-30 2012-05-09 卡伦茨技术有限公司 User profile-based wireless device system level management
CN101699905A (en) * 2009-10-30 2010-04-28 中兴通讯股份有限公司 Wireless intelligent terminal, webmaster platform and management method by webmaster platform
CN102156648A (en) * 2011-01-30 2011-08-17 中兴通讯股份有限公司 Wireless communication terminal starting method and device
CN106033381A (en) * 2015-03-16 2016-10-19 阿里巴巴集团控股有限公司 Method, device, and system for managing wireless terminal based on Wi-Fi
CN108289110A (en) * 2017-01-09 2018-07-17 阿里巴巴集团控股有限公司 Equipment correlating method, device, terminal device and operating system

Similar Documents

Publication Publication Date Title
US9585088B2 (en) Wireless device registration, such as automatic registration of a Wi-Fi enabled device
CN107231627B (en) Bluetooth network and network distribution method
US9031050B2 (en) Using a mobile device to enable another device to connect to a wireless network
WO2017041675A1 (en) Method for sending and acquiring wifi networking information and corresponding apparatus
CN103945369B (en) A kind of length by checking WIFI packets realizes the Internet-surfing configuration method of WIFI equipment
CN103458057B (en) Resource acquiring method, device and server
US20060149858A1 (en) Establishing wireless universal serial bus (WUSB) connection via a trusted medium
KR20140068240A (en) Automatic configuration of a wireless device
CN109831775B (en) Processor, baseband chip and SIM card information transmission method
WO2020054478A1 (en) Communication device, communication device control method, and program
CN107948170A (en) Interface requests parameter encryption method, device, equipment and readable storage medium storing program for executing
JP2005229605A (en) Extensible wireless frame work
JP2005117458A (en) Radio connection system, radio connection control method, access point device and communication equipment
CN119201246A (en) Wireless communication terminal management method, system, electronic device and storage medium
JP4856700B2 (en) Establishing a wireless universal serial bus (WUSB) connection via a trusted medium
CN117750371A (en) Wireless network access method, system and terminal equipment
Kayayurt et al. End-to-end security implementation for mobile devices using TLS protocol
CN111786932A (en) Account login method and device, electronic equipment and computer storage medium
CN114727268A (en) A Bluetooth air interface data transmission method and system
CN114095221A (en) Security verification method, device, equipment and storage medium
JP2004297711A (en) Radio terminal, communication control program, and communication control method
WO2021208027A1 (en) Bidirectional authentication method and device for network access
Rönty Embedded Communication System for Crane Data Access
CN111163462A (en) Network distribution method and related product
CN113904969B (en) Performance testing methods for IoT devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination