CN110109846A - A kind of method for managing security, device, terminal and storage medium - Google Patents
A kind of method for managing security, device, terminal and storage medium Download PDFInfo
- Publication number
- CN110109846A CN110109846A CN201910151653.2A CN201910151653A CN110109846A CN 110109846 A CN110109846 A CN 110109846A CN 201910151653 A CN201910151653 A CN 201910151653A CN 110109846 A CN110109846 A CN 110109846A
- Authority
- CN
- China
- Prior art keywords
- control command
- data
- characteristic
- order data
- state
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1416—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Alarm Systems (AREA)
Abstract
The present embodiments relate to control technology fields, more particularly to a kind of method for managing security, device, terminal and storage medium, a kind of method for managing security, applied to internet of things field, wherein, it include: to read the characteristic and order data in the control command in the state of receiving externally input control command;Judge whether matching criteria data transmit the order data to control unit in the state that Yu Suoshu normal data matches the characteristic to the characteristic;Described control unit executes and the matched movement of the order data under the action of the order data.
Description
Technical field
The present embodiments relate to control technology field more particularly to a kind of method for managing security, device, terminal and storages
Medium.
Background technique
With the popularization of intelligent terminals, intelligent terminal safety also obtains higher attention, on existing intelligent terminal
Be provided with TEE system, TEE system is a separate storage region, the storage region of intelligent terminal mark one piece it is independent and
The higher storage region of visiting demand, the storage region is mainly to store verification normal data, such as finger print information, face figure
As information etc., once user needs to verify finger print information or facial image information, the school for being stored in the region is read
Normal data is tested, acquisition data are verified to form check results by verification normal data.It is determined by check results
Whether this operation is in secure and trusted environment.
Internet of Things is the important component of generation information technology, and the important development stage in " informationization " epoch.
The core of Internet of Things and basis are still internet, are the networks of extension based on the internet and extension;Its user terminal prolongs
It stretches and extends between any article and article, carry out information exchange and communication, that is, object-object mutually ceases.Internet of Things passes through
Intellisense, identification technology and general fit calculation etc. communicate cognition technology, are widely used in the fusion of network, are also therefore referred to as
The third wave that world information industry develops after computer, internet.Internet of Things is the application extension of internet, with it
Say that Internet of Things is network, not equal to Internet of Things is business and application.The technology of Internet of things that daily pursuits are connected to internet is fast
Develop fastly, is just stepping into family's epoch.Allow people at any time using smart phone and tablet computer, any place prison
Control.Existing Internet of Things is in building process, and the dress for usually treating addition Internet of Things centers a communication module, the communication mould
Block can be near-field communication module, or telecommunication module, by the communication module by the dress of Internet of Things to be added
It sets connection and enters Internet of Things, at this point, the device that addition Internet of Things can be treated by long-range cloud is operated, the school of data
Testing usually all is to complete beyond the clouds, and the operation of the device for Internet of Things is added can be in " running nakedly " state, without any peace
Whole school tests, this is to Internet of Things using there are biggish security risks.
Summary of the invention
The present invention provides a kind of method for managing security, device, terminal and storage medium, it is intended to by Internet of Things is added
Device carries out safety management, improves the safety that Internet of Things uses.
On the one hand, the present invention provides a kind of method for managing security, is applied to internet of things field, wherein include:
In the state of receiving externally input control command, the characteristic and order in the control command are read
Data;
Judge the characteristic whether matching criteria data, Yu Suoshu normal data matches the state of the characteristic
Under, the order data is transmitted to control unit;
Described control unit executes and the matched movement of the order data under the action of the order data.
Preferably, above-mentioned a kind of method for managing security, wherein in the state for receiving externally input control command
Under, before reading characteristic and the order data in the control command further include:
In being provided with a safety management region in a receiving unit.
Preferably, above-mentioned a kind of method for managing security, wherein in the state of receiving externally input control command,
The characteristic and order data read in the control command specifically includes:
The receiving unit receives externally input control command, reads the characteristic and order in the control command
Data;
Read the normal data in the safety management region and output.
Preferably, above-mentioned a kind of method for managing security, wherein further include:
And the implementing result of the movement is fed back into preset device.
On the other hand, the present invention provides a kind of security control apparatus again, is applied to internet of things field, wherein include:
Receiving unit, to read in the control command in the state of receiving externally input control command
Characteristic and order data;
Judging unit, to judge the characteristic whether matching criteria data, Yu Suoshu normal data matching described in
In the state of characteristic, the order data is transmitted to control unit;
Described control unit, to be executed and the matched movement of the order data under the action of the order data.
Preferably, above-mentioned a kind of security control apparatus, wherein further include:
Safety management region is integrated in the receiving unit.
Preferably, above-mentioned a kind of security control apparatus, wherein further include:
Feedback unit feeds back to preset device to and by the implementing result of the movement.
In another aspect, the present invention provides a kind of server again, wherein the server includes:
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processing
Device realizes any of the above-described method for managing security.
In another aspect, the present invention provides a kind of computer readable storage medium again, it is stored thereon with computer program,
In, the method for managing security as described in any of the above-described is realized when which is executed by processor.
Compared with prior art, the invention has the advantages that
In the present invention, in the state that the controlled device in Internet of Things receives external control command, the control is ordered
Order is verified, and is equivalent to and is provided on controlled device together " firewall ", is somebody's turn to do " firewall " and is carried out to the control command
Verification, in the state of control command verified failure, terminates the execution of the control command, in the verified success of control command
In the state of, the control command is executed, has ensured the safety of Internet of Things operation in this manner.
Detailed description of the invention
Fig. 1 is the flow chart of one of embodiment of the present invention method for managing security;
Fig. 2 is the structural schematic diagram of the server in the embodiment of the present invention.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched
The specific embodiment stated is used only for explaining the present invention rather than limiting the invention.It also should be noted that in order to just
Only the parts related to the present invention are shown in description, attached drawing rather than entire infrastructure.
Embodiment one
On the one hand, the present invention provides a kind of method for managing security, is applied to internet of things field, wherein include:
As shown in Figure 1, step S110, in the state of receiving externally input control command, read the control and order
Characteristic and order data in order;Externally input control command can receive acquisition by telecommunication module, can also be with
Acquisition is received by near-field communication module, is also possible to telecommunication module and near-field communication module cooperates and obtains,
For example, being only equipped with near-field communication module on controlled device, network side was installed in network environment locating for controlled device at that time
Telecommunication module and network side near-field communication module, at this point, cloud can be obtained by network side telecommunication module
Or long-range control command, it continues through network side near-field communication module and is transmitted to the control command on device closely
Communication module.
The control command can be formed by a message, and message includes at least characteristic and order data, characteristic
The head of message can be located at, the tail portion of message is may be alternatively located at, be not particularly limited herein.In addition, the data format of message can be certainly
Definition, is also not particularly limited herein.
Step S120, judge the characteristic whether matching criteria data, Yu Suoshu normal data matches the feature
In the state of data, the order data is transmitted to control unit;In the state of reading the characteristic, in memory block
Normal data is read in domain, corresponding checking treatment is done to the characteristic by the normal data, is passed through in verification
Determine that the characteristic matches the pre-stored normal data under state, is continuing command data to control at this time
Unit determines that the characteristic mismatches the pre-stored normal data in verifying, at this time may be used under unacceptable state
It is interpreted as the Internet of Things and is in abnormal operating state or the control command source in the presence of query.Such state is interrupted all
Operation, the order data are unable to reach control unit.
Step S130, described control unit executes matched dynamic with the order data under the action of the order data
Make.In the state that the normal data matches the characteristic, execute and the matched movement of the order data.
As further preferred embodiment, above-mentioned a kind of method for managing security, wherein step S110, in receiving
In the state of externally input control command, before reading characteristic and the order data in the control command further include:
Step S109, in being provided with a safety management region in a receiving unit.Wherein, receiving unit can be by controlled device
It is formed, safety management region can be formed by specific hardware, such as an independent hardware storage apparatus, can also be by storage region
An interior reading sector is formed, and is not particularly limited herein.
As further preferred embodiment, above-mentioned a kind of method for managing security, wherein step S110, receive outer
In the state of the control command of portion's input, the characteristic and order data read in the control command is specifically included:
Step S1101, the described receiving unit receives externally input control command, reads the feature in the control command
Data and order data;
Step S1102, normal data and the output in the safety management region are read.
As further preferred embodiment, a kind of above-mentioned method for managing security, wherein further include:
Step S140, and by the implementing result of the movement preset device is fed back to.
In the present invention, in the state that the controlled device in Internet of Things receives external control command, the control is ordered
Order is verified, and is equivalent to and is provided on controlled device together " firewall ", is somebody's turn to do " firewall " and is carried out to the control command
Verification, in the state of control command verified failure, terminates the execution of the control command, in the verified success of control command
In the state of, the control command is executed, has ensured the safety of Internet of Things operation in this manner.
Embodiment two
On the other hand, the present invention provides a kind of security control apparatus again, is applied to internet of things field, wherein include:
Receiving unit, to read in the control command in the state of receiving externally input control command
Characteristic and order data;Externally input control command can receive acquisition by telecommunication module, can also be by low coverage
Receive acquisition from communication module, is also possible to telecommunication module and near-field communication module cooperates and obtains, for example, by
Near-field communication module is only installed on control device, network side is installed in network environment locating for controlled device at that time and is led at a distance
Module and network side near-field communication module are interrogated, at this point, cloud or long-range can be obtained by network side telecommunication module
Control command continues through network side near-field communication module for the control command and is transmitted to Near Field Communication mould on device
Block.
The control command can be formed by a message, and message includes at least characteristic and order data, characteristic
The head of message can be located at, the tail portion of message is may be alternatively located at, be not particularly limited herein.In addition, the data format of message can be certainly
Definition, is also not particularly limited herein.
Judging unit, to judge the characteristic whether matching criteria data, Yu Suoshu normal data matching described in
In the state of characteristic, the order data is transmitted to control unit;In the state of reading the characteristic, Yu Cun
Storage area reads normal data in domain, does corresponding checking treatment to the characteristic by the normal data, logical in verification
Determine that the characteristic matches the pre-stored normal data in the state of crossing, is continuing command data extremely at this time
Control unit determines that the characteristic mismatches the pre-stored normal data in verifying under unacceptable state, this
When can be regarded as the Internet of Things and be in abnormal operating state or the control command source and exist to query.Such state is interrupted
All operations, the order data are unable to reach control unit.
Described control unit, to be executed and the matched movement of the order data under the action of the order data.
In the state that the normal data matches the characteristic, execute and the matched movement of the order data.
As further preferred embodiment, a kind of above-mentioned security control apparatus, wherein further include:
Safety management region is integrated in the receiving unit.Safety management region can be formed by specific hardware, such as
One independent hardware storage apparatus can also be formed by a reading sector in storage region, is not particularly limited herein.
As further preferred embodiment, a kind of above-mentioned security control apparatus, wherein further include:
Feedback unit feeds back to preset device to and by the implementing result of the movement.
In the present invention, in the state that the controlled device in Internet of Things receives external control command, the control is ordered
Order is verified, and is equivalent to and is provided on controlled device together " firewall ", is somebody's turn to do " firewall " and is carried out to the control command
Verification, in the state of control command verified failure, terminates the execution of the control command, in the verified success of control command
In the state of, the control command is executed, has ensured the safety of Internet of Things operation in this manner.
Embodiment three
Fig. 2 is the structural schematic diagram of the server in the embodiment of the present invention three.Fig. 2 shows be suitable for being used to realizing the present invention
The block diagram of the exemplary servers 212 of embodiment.The server 212 that Fig. 2 is shown is only an example, should not be to the present invention
The function and use scope of embodiment bring any restrictions.
As shown in Fig. 2, server 212 is showed in the form of universal computing device.The component of server 212 may include but
Be not limited to: one or more processor or processing unit 216, system storage 228, connect different system components (including
System storage 228 and processing unit 216) bus 218.
Bus 218 indicates one of a few class bus structures or a variety of, including memory bus or Memory Controller,
Peripheral bus, graphics acceleration port, processor or the local bus using any bus structures in a variety of bus structures.It lifts
For example, these architectures include but is not limited to industry standard architecture (ISA) bus, microchannel architecture (MAC)
Bus, enhanced isa bus, Video Electronics Standards Association (VESA) local bus and peripheral component interconnection (PCI) bus.
Server 212 typically comprises a variety of computer system readable media.These media can be it is any being capable of bedding and clothing
The usable medium that business device 212 accesses, including volatile and non-volatile media, moveable and immovable medium.
System storage 228 may include the computer system readable media of form of volatile memory, such as deposit at random
Access to memory (RAM) 230 and/or cache memory 322.Server 212 may further include it is other it is removable/can not
Mobile, volatile/non-volatile computer system storage medium.Only as an example, storage system 224 can be used for reading and writing not
Movably, non-volatile magnetic media (Fig. 2 do not show, commonly referred to as " hard disk drive ").It, can be with although being not shown in Fig. 2
The disc driver for reading and writing to removable non-volatile magnetic disk (such as " floppy disk ") is provided, and non-volatile to moving
The CD drive of CD (such as CD-ROM, DVD-ROM or other optical mediums) read-write.In these cases, each driving
Device can be connected by one or more data media interfaces with bus 218.Memory 228 may include at least one program
Product, the program product have one group of (for example, at least one) program module, these program modules are configured to perform the present invention
The function of each embodiment.
Program/utility 240 with one group of (at least one) program module 242, can store in such as memory
In 228, such program module 242 includes but is not limited to operating system, one or more application program, other program modules
And program data, it may include the realization of network environment in each of these examples or certain combination.Program module 242
Usually execute the function and/or method in embodiment described in the invention.
Server 212 can also be with one or more external equipments 214 (such as keyboard, sensing equipment, display 224 etc.)
Communication, can also be enabled a user to one or more equipment interact with the server 212 communicate, and/or with make the clothes
Any equipment (such as network interface card, modem etc.) that business device 212 can be communicated with one or more of the other calculating equipment
Communication.This communication can be carried out by input/output (I/O) interface 222.Also, server 212 can also be suitable by network
Orchestration 220 and one or more network (such as local area network (LAN), wide area network (WAN) and/or public network, such as because of spy
Net) communication.As shown, network adapter 220 is communicated by bus 218 with other modules of server 212.It should be understood that
Although being not shown in Fig. 2, other hardware and/or software module can be used in conjunction with server 212, including but not limited to: micro- generation
Code, device driver, redundant processing unit, external disk drive array, RAID system, tape drive and data backup are deposited
Storage system etc..
Processing unit 216 by the program that is stored in system storage 228 of operation, thereby executing various function application with
And data processing, such as realize method for managing security provided by the embodiment of the present invention, it is applied to internet of things field, specifically,
In the state of receiving externally input control command, the characteristic and order in the control command are read
Data;
Judge the characteristic whether matching criteria data, Yu Suoshu normal data matches the state of the characteristic
Under, the order data is transmitted to control unit;
Described control unit executes and the matched movement of the order data under the action of the order data.
Example IV
In another aspect, the present invention provides a kind of calculator storage medium again, it is stored thereon with computer program, the program quilt
The method for managing security as provided by the embodiment of the present invention is realized when processor executes, and is applied to internet of things field, is specifically included,
In the state of receiving externally input control command, the characteristic and order in the control command are read
Data;
Judge the characteristic whether matching criteria data, Yu Suoshu normal data matches the state of the characteristic
Under, the order data is transmitted to control unit;
Described control unit executes and the matched movement of the order data under the action of the order data.
The computer storage medium of the embodiment of the present invention, can be using any of one or more computer-readable media
Combination.Computer-readable medium can be computer-readable signal media or computer readable storage medium.It is computer-readable
Storage medium for example may be-but not limited to-the system of electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, device or
Device, or any above combination.The more specific example (non exhaustive list) of computer readable storage medium includes: tool
There are electrical connection, the portable computer diskette, hard disk, random access memory (RAM), read-only memory of one or more conducting wires
(ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-
ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.In this document, computer-readable storage
Medium can be any tangible medium for including or store program, which can be commanded execution system, device or device
Using or it is in connection.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal,
Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including but unlimited
In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can
Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for
By the use of instruction execution system, device or device or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including --- but it is unlimited
In wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
The computer for executing operation of the present invention can be write with one or more programming languages or combinations thereof
Program code, described program design language include object oriented program language-such as Java, Smalltalk, C++,
Further include conventional procedural programming language-such as " such as " language or similar programming language.Program code can be with
It fully executes, partly execute on the user computer on the user computer, being executed as an independent software package, portion
Divide and partially executes or executed on a remote computer or server completely on the remote computer on the user computer.?
Be related in the situation of remote computer, remote computer can pass through the network of any kind --- including local area network (LAN) or
The domain wide area network (WAN) is connected to subscriber computer, or, it may be connected to outer computer (such as mentioned using Internet service
It is connected for quotient by internet).
Note that the above is only a better embodiment of the present invention and the applied technical principle.It will be appreciated by those skilled in the art that
The invention is not limited to the specific embodiments described herein, be able to carry out for a person skilled in the art it is various it is apparent variation,
It readjusts and substitutes without departing from protection scope of the present invention.Therefore, although being carried out by above embodiments to the present invention
It is described in further detail, but the present invention is not limited to the above embodiments only, without departing from the inventive concept, also
It may include more other equivalent embodiments, and the scope of the invention is determined by the scope of the appended claims.
Claims (9)
1. a kind of method for managing security is applied to internet of things field characterized by comprising
In the state of receiving externally input control command, the characteristic and command number in the control command are read
According to;
Judge the characteristic whether matching criteria data, in the state that Yu Suoshu normal data matches the characteristic,
The order data is transmitted to control unit;
Described control unit executes and the matched movement of the order data under the action of the order data.
2. a kind of method for managing security according to claim 1, which is characterized in that ordered in receiving externally input control
In the state of order, before reading characteristic and the order data in the control command further include:
In being provided with a safety management region in a receiving unit.
3. a kind of method for managing security according to claim 2, which is characterized in that receive externally input control command
In the state of, the characteristic and order data read in the control command specifically includes:
The receiving unit receives externally input control command, reads the characteristic and command number in the control command
According to;
Read the normal data in the safety management region and output.
4. a kind of method for managing security according to claim 1, which is characterized in that further include:
And the implementing result of the movement is fed back into preset device.
5. a kind of security control apparatus is applied to internet of things field characterized by comprising
Receiving unit, to read the feature in the control command in the state of receiving externally input control command
Data and order data;
Judging unit, to judge the characteristic whether matching criteria data, Yu Suoshu normal data matches the feature
In the state of data, the order data is transmitted to control unit;
Described control unit, to be executed and the matched movement of the order data under the action of the order data.
6. a kind of security control apparatus according to claim 1, which is characterized in that further include:
Safety management region is integrated in the receiving unit.
7. a kind of method for managing security according to claim 1, which is characterized in that further include:
Feedback unit feeds back to preset device to and by the implementing result of the movement.
8. a kind of server, which is characterized in that the server includes:
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processors are real
The now method for managing security as described in any in claim 1-4.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor
The method for managing security as described in any in claim 1-4 is realized when row.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201910151653.2A CN110109846A (en) | 2019-02-28 | 2019-02-28 | A kind of method for managing security, device, terminal and storage medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201910151653.2A CN110109846A (en) | 2019-02-28 | 2019-02-28 | A kind of method for managing security, device, terminal and storage medium |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN110109846A true CN110109846A (en) | 2019-08-09 |
Family
ID=67484237
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201910151653.2A Pending CN110109846A (en) | 2019-02-28 | 2019-02-28 | A kind of method for managing security, device, terminal and storage medium |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN110109846A (en) |
Citations (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20060285772A1 (en) * | 2004-10-01 | 2006-12-21 | Hull Jonathan J | System and methods for creation and use of a mixed media environment |
| CN105094807A (en) * | 2015-06-25 | 2015-11-25 | 三星电子(中国)研发中心 | Method and device for implementing voice control |
| CN105807111A (en) * | 2014-12-31 | 2016-07-27 | 中国电信股份有限公司 | Electricity stealing load control method of electricity facility, intelligent electricity management device and system |
| CN108228064A (en) * | 2018-01-22 | 2018-06-29 | 西门子工厂自动化工程有限公司 | Data monitoring control method, device and computer storage media |
| CN108369620A (en) * | 2015-08-20 | 2018-08-03 | 艾佛伦美国公司 | Method and apparatus for the electronic security(ELSEC) management based on geographical location |
| CN108647047A (en) * | 2018-03-28 | 2018-10-12 | 上海与德科技有限公司 | A kind of awakening method and system based on mobile terminal |
| CN109002734A (en) * | 2018-06-29 | 2018-12-14 | 上海与德科技有限公司 | A kind of intelligent charging method, system, server and calculator storage medium |
| CN109145587A (en) * | 2018-07-26 | 2019-01-04 | 上海与德科技有限公司 | A kind of data Anti-theft method, apparatus, terminal and readable medium |
| CN109246281A (en) * | 2018-10-31 | 2019-01-18 | 上海与德科技有限公司 | A kind of incoming call sound method, system, server and storage medium |
| CN109275140A (en) * | 2018-09-28 | 2019-01-25 | 上海与德科技有限公司 | A kind of information processing method, system and server |
-
2019
- 2019-02-28 CN CN201910151653.2A patent/CN110109846A/en active Pending
Patent Citations (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20060285772A1 (en) * | 2004-10-01 | 2006-12-21 | Hull Jonathan J | System and methods for creation and use of a mixed media environment |
| CN105807111A (en) * | 2014-12-31 | 2016-07-27 | 中国电信股份有限公司 | Electricity stealing load control method of electricity facility, intelligent electricity management device and system |
| CN105094807A (en) * | 2015-06-25 | 2015-11-25 | 三星电子(中国)研发中心 | Method and device for implementing voice control |
| CN108369620A (en) * | 2015-08-20 | 2018-08-03 | 艾佛伦美国公司 | Method and apparatus for the electronic security(ELSEC) management based on geographical location |
| CN108228064A (en) * | 2018-01-22 | 2018-06-29 | 西门子工厂自动化工程有限公司 | Data monitoring control method, device and computer storage media |
| CN108647047A (en) * | 2018-03-28 | 2018-10-12 | 上海与德科技有限公司 | A kind of awakening method and system based on mobile terminal |
| CN109002734A (en) * | 2018-06-29 | 2018-12-14 | 上海与德科技有限公司 | A kind of intelligent charging method, system, server and calculator storage medium |
| CN109145587A (en) * | 2018-07-26 | 2019-01-04 | 上海与德科技有限公司 | A kind of data Anti-theft method, apparatus, terminal and readable medium |
| CN109275140A (en) * | 2018-09-28 | 2019-01-25 | 上海与德科技有限公司 | A kind of information processing method, system and server |
| CN109246281A (en) * | 2018-10-31 | 2019-01-18 | 上海与德科技有限公司 | A kind of incoming call sound method, system, server and storage medium |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN109598115A (en) | Authorize implementation method, device, equipment, system, platform and the medium logged in | |
| CN109271258A (en) | Implementation method, device, terminal and the storage medium that Read-Write Locks are reentried | |
| CN103516518A (en) | Safety verification method and device | |
| CN109034700A (en) | Express delivery allocator, device, server and storage medium | |
| US10719844B2 (en) | Service processing method, terminal and server | |
| CN109246225A (en) | Method is provided and got to a kind of resource allocation | |
| CN107872433A (en) | A kind of auth method and its equipment | |
| CN107423055A (en) | Method, apparatus, equipment and the storage medium of adaptive terminal device resolution | |
| CN110334144A (en) | Message methods of exhibiting, device, computer equipment and storage medium | |
| CN114297685A (en) | Product key burning method, system, device, terminal equipment and storage medium | |
| CN107689871A (en) | The Internet of Things mobile terminal veritified with identity and testimony of a witness unification checking method | |
| CN109388924A (en) | A kind of auth method, device, server and storage medium | |
| CN107633162A (en) | A kind of identity identifying method, device, system, equipment and storage medium | |
| CN109284714A (en) | A kind of virtual item distribution, distribution and collection method | |
| CN110134869A (en) | A kind of information-pushing method, device, equipment and storage medium | |
| CN110110236A (en) | A kind of information-pushing method, device, equipment and storage medium | |
| CN109522699A (en) | Safe verification method, device, terminal, server-side and storage medium | |
| CN109033456A (en) | A kind of condition query method, apparatus, electronic equipment and storage medium | |
| CN110109846A (en) | A kind of method for managing security, device, terminal and storage medium | |
| CN108399128A (en) | A kind of generation method of user data, device, server and storage medium | |
| CN109597662A (en) | The call method, device and electronic equipment in non-public library in mobile terminal | |
| CN115495727A (en) | Account login method, vehicle and readable storage medium | |
| CN107169760A (en) | Mapping card management method, data processing method and device based on multimedium | |
| CN117056252B (en) | Instant card issuing system and method compatible with multiple service systems | |
| TWM586390U (en) | A system for performing identity verification according to the service instruction to execute the corresponding service |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| WD01 | Invention patent application deemed withdrawn after publication | ||
| WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190809 |