[go: up one dir, main page]

CN110109846A - A kind of method for managing security, device, terminal and storage medium - Google Patents

A kind of method for managing security, device, terminal and storage medium Download PDF

Info

Publication number
CN110109846A
CN110109846A CN201910151653.2A CN201910151653A CN110109846A CN 110109846 A CN110109846 A CN 110109846A CN 201910151653 A CN201910151653 A CN 201910151653A CN 110109846 A CN110109846 A CN 110109846A
Authority
CN
China
Prior art keywords
control command
data
characteristic
order data
state
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910151653.2A
Other languages
Chinese (zh)
Inventor
李承敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Loy Intelligent Technology Co Ltd
Original Assignee
Shanghai Loy Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Loy Intelligent Technology Co Ltd filed Critical Shanghai Loy Intelligent Technology Co Ltd
Priority to CN201910151653.2A priority Critical patent/CN110109846A/en
Publication of CN110109846A publication Critical patent/CN110109846A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1416Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)

Abstract

The present embodiments relate to control technology fields, more particularly to a kind of method for managing security, device, terminal and storage medium, a kind of method for managing security, applied to internet of things field, wherein, it include: to read the characteristic and order data in the control command in the state of receiving externally input control command;Judge whether matching criteria data transmit the order data to control unit in the state that Yu Suoshu normal data matches the characteristic to the characteristic;Described control unit executes and the matched movement of the order data under the action of the order data.

Description

A kind of method for managing security, device, terminal and storage medium
Technical field
The present embodiments relate to control technology field more particularly to a kind of method for managing security, device, terminal and storages Medium.
Background technique
With the popularization of intelligent terminals, intelligent terminal safety also obtains higher attention, on existing intelligent terminal Be provided with TEE system, TEE system is a separate storage region, the storage region of intelligent terminal mark one piece it is independent and The higher storage region of visiting demand, the storage region is mainly to store verification normal data, such as finger print information, face figure As information etc., once user needs to verify finger print information or facial image information, the school for being stored in the region is read Normal data is tested, acquisition data are verified to form check results by verification normal data.It is determined by check results Whether this operation is in secure and trusted environment.
Internet of Things is the important component of generation information technology, and the important development stage in " informationization " epoch. The core of Internet of Things and basis are still internet, are the networks of extension based on the internet and extension;Its user terminal prolongs It stretches and extends between any article and article, carry out information exchange and communication, that is, object-object mutually ceases.Internet of Things passes through Intellisense, identification technology and general fit calculation etc. communicate cognition technology, are widely used in the fusion of network, are also therefore referred to as The third wave that world information industry develops after computer, internet.Internet of Things is the application extension of internet, with it Say that Internet of Things is network, not equal to Internet of Things is business and application.The technology of Internet of things that daily pursuits are connected to internet is fast Develop fastly, is just stepping into family's epoch.Allow people at any time using smart phone and tablet computer, any place prison Control.Existing Internet of Things is in building process, and the dress for usually treating addition Internet of Things centers a communication module, the communication mould Block can be near-field communication module, or telecommunication module, by the communication module by the dress of Internet of Things to be added It sets connection and enters Internet of Things, at this point, the device that addition Internet of Things can be treated by long-range cloud is operated, the school of data Testing usually all is to complete beyond the clouds, and the operation of the device for Internet of Things is added can be in " running nakedly " state, without any peace Whole school tests, this is to Internet of Things using there are biggish security risks.
Summary of the invention
The present invention provides a kind of method for managing security, device, terminal and storage medium, it is intended to by Internet of Things is added Device carries out safety management, improves the safety that Internet of Things uses.
On the one hand, the present invention provides a kind of method for managing security, is applied to internet of things field, wherein include:
In the state of receiving externally input control command, the characteristic and order in the control command are read Data;
Judge the characteristic whether matching criteria data, Yu Suoshu normal data matches the state of the characteristic Under, the order data is transmitted to control unit;
Described control unit executes and the matched movement of the order data under the action of the order data.
Preferably, above-mentioned a kind of method for managing security, wherein in the state for receiving externally input control command Under, before reading characteristic and the order data in the control command further include:
In being provided with a safety management region in a receiving unit.
Preferably, above-mentioned a kind of method for managing security, wherein in the state of receiving externally input control command, The characteristic and order data read in the control command specifically includes:
The receiving unit receives externally input control command, reads the characteristic and order in the control command Data;
Read the normal data in the safety management region and output.
Preferably, above-mentioned a kind of method for managing security, wherein further include:
And the implementing result of the movement is fed back into preset device.
On the other hand, the present invention provides a kind of security control apparatus again, is applied to internet of things field, wherein include:
Receiving unit, to read in the control command in the state of receiving externally input control command Characteristic and order data;
Judging unit, to judge the characteristic whether matching criteria data, Yu Suoshu normal data matching described in In the state of characteristic, the order data is transmitted to control unit;
Described control unit, to be executed and the matched movement of the order data under the action of the order data.
Preferably, above-mentioned a kind of security control apparatus, wherein further include:
Safety management region is integrated in the receiving unit.
Preferably, above-mentioned a kind of security control apparatus, wherein further include:
Feedback unit feeds back to preset device to and by the implementing result of the movement.
In another aspect, the present invention provides a kind of server again, wherein the server includes:
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processing Device realizes any of the above-described method for managing security.
In another aspect, the present invention provides a kind of computer readable storage medium again, it is stored thereon with computer program, In, the method for managing security as described in any of the above-described is realized when which is executed by processor.
Compared with prior art, the invention has the advantages that
In the present invention, in the state that the controlled device in Internet of Things receives external control command, the control is ordered Order is verified, and is equivalent to and is provided on controlled device together " firewall ", is somebody's turn to do " firewall " and is carried out to the control command Verification, in the state of control command verified failure, terminates the execution of the control command, in the verified success of control command In the state of, the control command is executed, has ensured the safety of Internet of Things operation in this manner.
Detailed description of the invention
Fig. 1 is the flow chart of one of embodiment of the present invention method for managing security;
Fig. 2 is the structural schematic diagram of the server in the embodiment of the present invention.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining the present invention rather than limiting the invention.It also should be noted that in order to just Only the parts related to the present invention are shown in description, attached drawing rather than entire infrastructure.
Embodiment one
On the one hand, the present invention provides a kind of method for managing security, is applied to internet of things field, wherein include:
As shown in Figure 1, step S110, in the state of receiving externally input control command, read the control and order Characteristic and order data in order;Externally input control command can receive acquisition by telecommunication module, can also be with Acquisition is received by near-field communication module, is also possible to telecommunication module and near-field communication module cooperates and obtains, For example, being only equipped with near-field communication module on controlled device, network side was installed in network environment locating for controlled device at that time Telecommunication module and network side near-field communication module, at this point, cloud can be obtained by network side telecommunication module Or long-range control command, it continues through network side near-field communication module and is transmitted to the control command on device closely Communication module.
The control command can be formed by a message, and message includes at least characteristic and order data, characteristic The head of message can be located at, the tail portion of message is may be alternatively located at, be not particularly limited herein.In addition, the data format of message can be certainly Definition, is also not particularly limited herein.
Step S120, judge the characteristic whether matching criteria data, Yu Suoshu normal data matches the feature In the state of data, the order data is transmitted to control unit;In the state of reading the characteristic, in memory block Normal data is read in domain, corresponding checking treatment is done to the characteristic by the normal data, is passed through in verification Determine that the characteristic matches the pre-stored normal data under state, is continuing command data to control at this time Unit determines that the characteristic mismatches the pre-stored normal data in verifying, at this time may be used under unacceptable state It is interpreted as the Internet of Things and is in abnormal operating state or the control command source in the presence of query.Such state is interrupted all Operation, the order data are unable to reach control unit.
Step S130, described control unit executes matched dynamic with the order data under the action of the order data Make.In the state that the normal data matches the characteristic, execute and the matched movement of the order data.
As further preferred embodiment, above-mentioned a kind of method for managing security, wherein step S110, in receiving In the state of externally input control command, before reading characteristic and the order data in the control command further include:
Step S109, in being provided with a safety management region in a receiving unit.Wherein, receiving unit can be by controlled device It is formed, safety management region can be formed by specific hardware, such as an independent hardware storage apparatus, can also be by storage region An interior reading sector is formed, and is not particularly limited herein.
As further preferred embodiment, above-mentioned a kind of method for managing security, wherein step S110, receive outer In the state of the control command of portion's input, the characteristic and order data read in the control command is specifically included:
Step S1101, the described receiving unit receives externally input control command, reads the feature in the control command Data and order data;
Step S1102, normal data and the output in the safety management region are read.
As further preferred embodiment, a kind of above-mentioned method for managing security, wherein further include:
Step S140, and by the implementing result of the movement preset device is fed back to.
In the present invention, in the state that the controlled device in Internet of Things receives external control command, the control is ordered Order is verified, and is equivalent to and is provided on controlled device together " firewall ", is somebody's turn to do " firewall " and is carried out to the control command Verification, in the state of control command verified failure, terminates the execution of the control command, in the verified success of control command In the state of, the control command is executed, has ensured the safety of Internet of Things operation in this manner.
Embodiment two
On the other hand, the present invention provides a kind of security control apparatus again, is applied to internet of things field, wherein include:
Receiving unit, to read in the control command in the state of receiving externally input control command Characteristic and order data;Externally input control command can receive acquisition by telecommunication module, can also be by low coverage Receive acquisition from communication module, is also possible to telecommunication module and near-field communication module cooperates and obtains, for example, by Near-field communication module is only installed on control device, network side is installed in network environment locating for controlled device at that time and is led at a distance Module and network side near-field communication module are interrogated, at this point, cloud or long-range can be obtained by network side telecommunication module Control command continues through network side near-field communication module for the control command and is transmitted to Near Field Communication mould on device Block.
The control command can be formed by a message, and message includes at least characteristic and order data, characteristic The head of message can be located at, the tail portion of message is may be alternatively located at, be not particularly limited herein.In addition, the data format of message can be certainly Definition, is also not particularly limited herein.
Judging unit, to judge the characteristic whether matching criteria data, Yu Suoshu normal data matching described in In the state of characteristic, the order data is transmitted to control unit;In the state of reading the characteristic, Yu Cun Storage area reads normal data in domain, does corresponding checking treatment to the characteristic by the normal data, logical in verification Determine that the characteristic matches the pre-stored normal data in the state of crossing, is continuing command data extremely at this time Control unit determines that the characteristic mismatches the pre-stored normal data in verifying under unacceptable state, this When can be regarded as the Internet of Things and be in abnormal operating state or the control command source and exist to query.Such state is interrupted All operations, the order data are unable to reach control unit.
Described control unit, to be executed and the matched movement of the order data under the action of the order data. In the state that the normal data matches the characteristic, execute and the matched movement of the order data.
As further preferred embodiment, a kind of above-mentioned security control apparatus, wherein further include:
Safety management region is integrated in the receiving unit.Safety management region can be formed by specific hardware, such as One independent hardware storage apparatus can also be formed by a reading sector in storage region, is not particularly limited herein.
As further preferred embodiment, a kind of above-mentioned security control apparatus, wherein further include:
Feedback unit feeds back to preset device to and by the implementing result of the movement.
In the present invention, in the state that the controlled device in Internet of Things receives external control command, the control is ordered Order is verified, and is equivalent to and is provided on controlled device together " firewall ", is somebody's turn to do " firewall " and is carried out to the control command Verification, in the state of control command verified failure, terminates the execution of the control command, in the verified success of control command In the state of, the control command is executed, has ensured the safety of Internet of Things operation in this manner.
Embodiment three
Fig. 2 is the structural schematic diagram of the server in the embodiment of the present invention three.Fig. 2 shows be suitable for being used to realizing the present invention The block diagram of the exemplary servers 212 of embodiment.The server 212 that Fig. 2 is shown is only an example, should not be to the present invention The function and use scope of embodiment bring any restrictions.
As shown in Fig. 2, server 212 is showed in the form of universal computing device.The component of server 212 may include but Be not limited to: one or more processor or processing unit 216, system storage 228, connect different system components (including System storage 228 and processing unit 216) bus 218.
Bus 218 indicates one of a few class bus structures or a variety of, including memory bus or Memory Controller, Peripheral bus, graphics acceleration port, processor or the local bus using any bus structures in a variety of bus structures.It lifts For example, these architectures include but is not limited to industry standard architecture (ISA) bus, microchannel architecture (MAC) Bus, enhanced isa bus, Video Electronics Standards Association (VESA) local bus and peripheral component interconnection (PCI) bus.
Server 212 typically comprises a variety of computer system readable media.These media can be it is any being capable of bedding and clothing The usable medium that business device 212 accesses, including volatile and non-volatile media, moveable and immovable medium.
System storage 228 may include the computer system readable media of form of volatile memory, such as deposit at random Access to memory (RAM) 230 and/or cache memory 322.Server 212 may further include it is other it is removable/can not Mobile, volatile/non-volatile computer system storage medium.Only as an example, storage system 224 can be used for reading and writing not Movably, non-volatile magnetic media (Fig. 2 do not show, commonly referred to as " hard disk drive ").It, can be with although being not shown in Fig. 2 The disc driver for reading and writing to removable non-volatile magnetic disk (such as " floppy disk ") is provided, and non-volatile to moving The CD drive of CD (such as CD-ROM, DVD-ROM or other optical mediums) read-write.In these cases, each driving Device can be connected by one or more data media interfaces with bus 218.Memory 228 may include at least one program Product, the program product have one group of (for example, at least one) program module, these program modules are configured to perform the present invention The function of each embodiment.
Program/utility 240 with one group of (at least one) program module 242, can store in such as memory In 228, such program module 242 includes but is not limited to operating system, one or more application program, other program modules And program data, it may include the realization of network environment in each of these examples or certain combination.Program module 242 Usually execute the function and/or method in embodiment described in the invention.
Server 212 can also be with one or more external equipments 214 (such as keyboard, sensing equipment, display 224 etc.) Communication, can also be enabled a user to one or more equipment interact with the server 212 communicate, and/or with make the clothes Any equipment (such as network interface card, modem etc.) that business device 212 can be communicated with one or more of the other calculating equipment Communication.This communication can be carried out by input/output (I/O) interface 222.Also, server 212 can also be suitable by network Orchestration 220 and one or more network (such as local area network (LAN), wide area network (WAN) and/or public network, such as because of spy Net) communication.As shown, network adapter 220 is communicated by bus 218 with other modules of server 212.It should be understood that Although being not shown in Fig. 2, other hardware and/or software module can be used in conjunction with server 212, including but not limited to: micro- generation Code, device driver, redundant processing unit, external disk drive array, RAID system, tape drive and data backup are deposited Storage system etc..
Processing unit 216 by the program that is stored in system storage 228 of operation, thereby executing various function application with And data processing, such as realize method for managing security provided by the embodiment of the present invention, it is applied to internet of things field, specifically,
In the state of receiving externally input control command, the characteristic and order in the control command are read Data;
Judge the characteristic whether matching criteria data, Yu Suoshu normal data matches the state of the characteristic Under, the order data is transmitted to control unit;
Described control unit executes and the matched movement of the order data under the action of the order data.
Example IV
In another aspect, the present invention provides a kind of calculator storage medium again, it is stored thereon with computer program, the program quilt The method for managing security as provided by the embodiment of the present invention is realized when processor executes, and is applied to internet of things field, is specifically included,
In the state of receiving externally input control command, the characteristic and order in the control command are read Data;
Judge the characteristic whether matching criteria data, Yu Suoshu normal data matches the state of the characteristic Under, the order data is transmitted to control unit;
Described control unit executes and the matched movement of the order data under the action of the order data.
The computer storage medium of the embodiment of the present invention, can be using any of one or more computer-readable media Combination.Computer-readable medium can be computer-readable signal media or computer readable storage medium.It is computer-readable Storage medium for example may be-but not limited to-the system of electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, device or Device, or any above combination.The more specific example (non exhaustive list) of computer readable storage medium includes: tool There are electrical connection, the portable computer diskette, hard disk, random access memory (RAM), read-only memory of one or more conducting wires (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD- ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.In this document, computer-readable storage Medium can be any tangible medium for including or store program, which can be commanded execution system, device or device Using or it is in connection.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal, Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including but unlimited In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for By the use of instruction execution system, device or device or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including --- but it is unlimited In wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
The computer for executing operation of the present invention can be write with one or more programming languages or combinations thereof Program code, described program design language include object oriented program language-such as Java, Smalltalk, C++, Further include conventional procedural programming language-such as " such as " language or similar programming language.Program code can be with It fully executes, partly execute on the user computer on the user computer, being executed as an independent software package, portion Divide and partially executes or executed on a remote computer or server completely on the remote computer on the user computer.? Be related in the situation of remote computer, remote computer can pass through the network of any kind --- including local area network (LAN) or The domain wide area network (WAN) is connected to subscriber computer, or, it may be connected to outer computer (such as mentioned using Internet service It is connected for quotient by internet).
Note that the above is only a better embodiment of the present invention and the applied technical principle.It will be appreciated by those skilled in the art that The invention is not limited to the specific embodiments described herein, be able to carry out for a person skilled in the art it is various it is apparent variation, It readjusts and substitutes without departing from protection scope of the present invention.Therefore, although being carried out by above embodiments to the present invention It is described in further detail, but the present invention is not limited to the above embodiments only, without departing from the inventive concept, also It may include more other equivalent embodiments, and the scope of the invention is determined by the scope of the appended claims.

Claims (9)

1. a kind of method for managing security is applied to internet of things field characterized by comprising
In the state of receiving externally input control command, the characteristic and command number in the control command are read According to;
Judge the characteristic whether matching criteria data, in the state that Yu Suoshu normal data matches the characteristic, The order data is transmitted to control unit;
Described control unit executes and the matched movement of the order data under the action of the order data.
2. a kind of method for managing security according to claim 1, which is characterized in that ordered in receiving externally input control In the state of order, before reading characteristic and the order data in the control command further include:
In being provided with a safety management region in a receiving unit.
3. a kind of method for managing security according to claim 2, which is characterized in that receive externally input control command In the state of, the characteristic and order data read in the control command specifically includes:
The receiving unit receives externally input control command, reads the characteristic and command number in the control command According to;
Read the normal data in the safety management region and output.
4. a kind of method for managing security according to claim 1, which is characterized in that further include:
And the implementing result of the movement is fed back into preset device.
5. a kind of security control apparatus is applied to internet of things field characterized by comprising
Receiving unit, to read the feature in the control command in the state of receiving externally input control command Data and order data;
Judging unit, to judge the characteristic whether matching criteria data, Yu Suoshu normal data matches the feature In the state of data, the order data is transmitted to control unit;
Described control unit, to be executed and the matched movement of the order data under the action of the order data.
6. a kind of security control apparatus according to claim 1, which is characterized in that further include:
Safety management region is integrated in the receiving unit.
7. a kind of method for managing security according to claim 1, which is characterized in that further include:
Feedback unit feeds back to preset device to and by the implementing result of the movement.
8. a kind of server, which is characterized in that the server includes:
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processors are real The now method for managing security as described in any in claim 1-4.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor The method for managing security as described in any in claim 1-4 is realized when row.
CN201910151653.2A 2019-02-28 2019-02-28 A kind of method for managing security, device, terminal and storage medium Pending CN110109846A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910151653.2A CN110109846A (en) 2019-02-28 2019-02-28 A kind of method for managing security, device, terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910151653.2A CN110109846A (en) 2019-02-28 2019-02-28 A kind of method for managing security, device, terminal and storage medium

Publications (1)

Publication Number Publication Date
CN110109846A true CN110109846A (en) 2019-08-09

Family

ID=67484237

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910151653.2A Pending CN110109846A (en) 2019-02-28 2019-02-28 A kind of method for managing security, device, terminal and storage medium

Country Status (1)

Country Link
CN (1) CN110109846A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060285772A1 (en) * 2004-10-01 2006-12-21 Hull Jonathan J System and methods for creation and use of a mixed media environment
CN105094807A (en) * 2015-06-25 2015-11-25 三星电子(中国)研发中心 Method and device for implementing voice control
CN105807111A (en) * 2014-12-31 2016-07-27 中国电信股份有限公司 Electricity stealing load control method of electricity facility, intelligent electricity management device and system
CN108228064A (en) * 2018-01-22 2018-06-29 西门子工厂自动化工程有限公司 Data monitoring control method, device and computer storage media
CN108369620A (en) * 2015-08-20 2018-08-03 艾佛伦美国公司 Method and apparatus for the electronic security(ELSEC) management based on geographical location
CN108647047A (en) * 2018-03-28 2018-10-12 上海与德科技有限公司 A kind of awakening method and system based on mobile terminal
CN109002734A (en) * 2018-06-29 2018-12-14 上海与德科技有限公司 A kind of intelligent charging method, system, server and calculator storage medium
CN109145587A (en) * 2018-07-26 2019-01-04 上海与德科技有限公司 A kind of data Anti-theft method, apparatus, terminal and readable medium
CN109246281A (en) * 2018-10-31 2019-01-18 上海与德科技有限公司 A kind of incoming call sound method, system, server and storage medium
CN109275140A (en) * 2018-09-28 2019-01-25 上海与德科技有限公司 A kind of information processing method, system and server

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060285772A1 (en) * 2004-10-01 2006-12-21 Hull Jonathan J System and methods for creation and use of a mixed media environment
CN105807111A (en) * 2014-12-31 2016-07-27 中国电信股份有限公司 Electricity stealing load control method of electricity facility, intelligent electricity management device and system
CN105094807A (en) * 2015-06-25 2015-11-25 三星电子(中国)研发中心 Method and device for implementing voice control
CN108369620A (en) * 2015-08-20 2018-08-03 艾佛伦美国公司 Method and apparatus for the electronic security(ELSEC) management based on geographical location
CN108228064A (en) * 2018-01-22 2018-06-29 西门子工厂自动化工程有限公司 Data monitoring control method, device and computer storage media
CN108647047A (en) * 2018-03-28 2018-10-12 上海与德科技有限公司 A kind of awakening method and system based on mobile terminal
CN109002734A (en) * 2018-06-29 2018-12-14 上海与德科技有限公司 A kind of intelligent charging method, system, server and calculator storage medium
CN109145587A (en) * 2018-07-26 2019-01-04 上海与德科技有限公司 A kind of data Anti-theft method, apparatus, terminal and readable medium
CN109275140A (en) * 2018-09-28 2019-01-25 上海与德科技有限公司 A kind of information processing method, system and server
CN109246281A (en) * 2018-10-31 2019-01-18 上海与德科技有限公司 A kind of incoming call sound method, system, server and storage medium

Similar Documents

Publication Publication Date Title
CN109598115A (en) Authorize implementation method, device, equipment, system, platform and the medium logged in
CN109271258A (en) Implementation method, device, terminal and the storage medium that Read-Write Locks are reentried
CN103516518A (en) Safety verification method and device
CN109034700A (en) Express delivery allocator, device, server and storage medium
US10719844B2 (en) Service processing method, terminal and server
CN109246225A (en) Method is provided and got to a kind of resource allocation
CN107872433A (en) A kind of auth method and its equipment
CN107423055A (en) Method, apparatus, equipment and the storage medium of adaptive terminal device resolution
CN110334144A (en) Message methods of exhibiting, device, computer equipment and storage medium
CN114297685A (en) Product key burning method, system, device, terminal equipment and storage medium
CN107689871A (en) The Internet of Things mobile terminal veritified with identity and testimony of a witness unification checking method
CN109388924A (en) A kind of auth method, device, server and storage medium
CN107633162A (en) A kind of identity identifying method, device, system, equipment and storage medium
CN109284714A (en) A kind of virtual item distribution, distribution and collection method
CN110134869A (en) A kind of information-pushing method, device, equipment and storage medium
CN110110236A (en) A kind of information-pushing method, device, equipment and storage medium
CN109522699A (en) Safe verification method, device, terminal, server-side and storage medium
CN109033456A (en) A kind of condition query method, apparatus, electronic equipment and storage medium
CN110109846A (en) A kind of method for managing security, device, terminal and storage medium
CN108399128A (en) A kind of generation method of user data, device, server and storage medium
CN109597662A (en) The call method, device and electronic equipment in non-public library in mobile terminal
CN115495727A (en) Account login method, vehicle and readable storage medium
CN107169760A (en) Mapping card management method, data processing method and device based on multimedium
CN117056252B (en) Instant card issuing system and method compatible with multiple service systems
TWM586390U (en) A system for performing identity verification according to the service instruction to execute the corresponding service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190809