CN109740306B - Method and device for authorizing application software based on mixed scheme - Google Patents

Method and device for authorizing application software based on mixed scheme Download PDF

Info

Publication number
CN109740306B
CN109740306B CN201811613445.1A CN201811613445A CN109740306B CN 109740306 B CN109740306 B CN 109740306B CN 201811613445 A CN201811613445 A CN 201811613445A CN 109740306 B CN109740306 B CN 109740306B
Authority
CN
China
Prior art keywords
authorization
state
local
application software
authorization code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811613445.1A
Other languages
Chinese (zh)
Other versions
CN109740306A (en
Inventor
秦以南
杨涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sipic Technology Co Ltd
Original Assignee
AI Speech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by AI Speech Ltd filed Critical AI Speech Ltd
Priority to CN201811613445.1A priority Critical patent/CN109740306B/en
Publication of CN109740306A publication Critical patent/CN109740306A/en
Application granted granted Critical
Publication of CN109740306B publication Critical patent/CN109740306B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a method for authorizing application software based on a hybrid scheme, which comprises the following steps: when the application software is started, judging the authorization state; when the authorization state is judged to be unauthorized, detecting the local state, and acquiring an authorization code according to the local state; and performing authorization verification according to the acquired authorization code. The invention also discloses a device for authorization based on a mixed scheme, according to the device and the method disclosed by the invention, the authorization check of the application software in various states of wire and wireless can be realized, the defect that the authorization state of the application software can be intelligently detected and authorized only in a network environment in the prior art is overcome, and the effectiveness and the continuity of the equipment function are ensured.

Description

Method and device for authorizing application software based on mixed scheme
Technical Field
The invention relates to the technical field of authorization mechanisms, in particular to a method and a device for authorizing application software based on a hybrid scheme.
Background
With the development of science and technology, application software is more and more popular, generally, the application software needs to be authorized by a developer when being used, but the authorization realization cannot realize automation at present, the activation code is manually input for verification, the operation is very inconvenient, and the problems of input errors and the like are easily caused. In addition, because of being limited by the environment of the device, the authorization verification can be performed with some problems, for example, if the authorization verification is networked, the authorization cannot be successfully performed in most scenes without a network, and the use of the user is affected. And some actions of repeated installation can lead to the problem of repeated authentication and authorization, bring inconvenience, and have no practicality and low efficiency.
Disclosure of Invention
In view of the above problems, the inventor thinks of a technical scheme for automatically implementing authorization verification, which can implement automatic authorization verification on application software when the application software is started, and does not completely depend on a network state, so that user experience can be greatly improved, and the method is very convenient.
According to a first aspect of the present invention, there is provided a method for authorizing application software based on a hybrid scheme, comprising the steps of:
when the application software is started, judging the authorization state;
when the authorization state is judged to be unauthorized, detecting the local state, and acquiring an authorization code according to the local state;
and performing authorization verification according to the acquired authorization code.
According to a second aspect of the present invention, there is provided an apparatus for performing authorization based on a hybrid scheme, comprising
The authorization state acquisition module is used for judging the authorization state when the application software is started;
the authorization code acquisition module is used for acquiring an authorization code according to the authorization state and the detected local state;
and the authorization checking module is used for performing authorization verification according to the acquired authorization code.
According to a third aspect of the present invention, there is provided an electronic apparatus comprising: the computer-readable medium includes at least one processor, and a memory communicatively coupled to the at least one processor, wherein the memory stores instructions executable by the at least one processor, the instructions being executable by the at least one processor to enable the at least one processor to perform the steps of the above-described method.
According to a fourth aspect of the invention, a storage medium is provided, on which a computer program is stored which, when being executed by a processor, carries out the steps of the above-mentioned method.
According to the method and the device provided by the invention, the authorization check of the application software in various states of supporting wire and wireless can be realized by detecting the local state, the problem that the authorization state of the application software can be intelligently detected only in a network environment in the prior art is overcome, and the human resources are saved.
Drawings
FIG. 1 is a flow chart of a method for authorizing application software based on a hybrid scheme according to an embodiment of the present invention;
FIG. 2 is a schematic block diagram of an apparatus for authorizing application software based on a hybrid scheme according to an embodiment of the present invention;
fig. 3 is a block diagram of an electronic device according to an embodiment of the invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
The invention may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
As used in this disclosure, "module," "device," "system," and the like are intended to refer to a computer-related entity, either hardware, a combination of hardware and software, or software in execution. In particular, for example, an element may be, but is not limited to being, a process running on a processor, an object, an executable, a thread of execution, a program, and/or a computer. Also, an application or script running on a server, or a server, may be an element. One or more elements may be in a process and/or thread of execution and an element may be localized on one computer and/or distributed between two or more computers and may be operated by various computer-readable media. The elements may also communicate by way of local and/or remote processes based on a signal having one or more data packets, e.g., from a data packet interacting with another element in a local system, distributed system, and/or across a network in the internet with other systems by way of the signal.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The present invention will be described in further detail with reference to the accompanying drawings.
Fig. 1 schematically shows a flowchart of a method for authorizing application software based on a hybrid scheme according to an embodiment of the present invention, and as shown in fig. 1, this embodiment includes the following steps:
step S101: and when the application software is started, judging the authorization state. For example, if the application software is authorized, an authorization code is included in the application software, and the authorization status of the application software may be determined by determining whether the application software stores the authorization code. If the authorization status is determined to be unauthorized, the process proceeds to step S102.
Step S102: and when the authorization state is judged to be unauthorized, detecting the local state, and acquiring the authorization code according to the local state. Wherein the local state comprises a local network state and a local authorization file state,
the method comprises the steps that firstly, the state of a local authorization file is detected, when an application software is purchased by a service provider, an authorization file is generally generated in advance aiming at an scene without networking, the authorization file is provided for the service provider, and the service provider stores the authorization file on a device loaded with the application software to obtain the local authorization file. The authorization file can be obtained by calling a corresponding interface of the device loaded with the application software. The authorization file may be implemented as a key-value pair mapping file, an excel file, a pst file, and the like. And when the local authorization file is judged to exist, acquiring the authorization code from the authorization file. When the local authorization file does not exist, the state of the local network is detected through a network interface of calling equipment, and when the local network is in a networking state, a vehicle-mounted device number is obtained through a corresponding interface of the calling equipment (each device is reserved with a calling interface for obtaining a device serial number of the device), wherein the vehicle-mounted device number is the serial number of a vehicle-mounted device on a vehicle and is used for uniquely identifying one device. And then obtaining the authorization code from the cloud terminal through the in-vehicle device number, and sending the in-vehicle device number to the cloud terminal in real time, wherein the cloud terminal generates a unique verification code, namely the authorization code, by adopting a key generation algorithm according to the in-vehicle device number, and the unique verification code is returned, wherein the adopted key generation algorithm can be realized by referring to the prior art, for example, an md5 algorithm is adopted.
Step S103: and performing authorization verification according to the acquired authorization code. After obtaining the authorization code, authorization verification is performed on the authorization code according to an algorithm used when the authorization code is generated, for example, a reference md5 algorithm is used for verification. And when the verification is passed, the application software is successfully started, and if the verification fails, a reminder needing authorization is output.
In a preferred embodiment, when the authorization state is determined to be authorized, the stored authorization code is directly obtained for authorization verification. When the authorization is carried out, the authorization code does not need to be obtained from a local file or a cloud end, and the authorization code stored in the application software is directly read for authorization verification, so that the method is very quick and convenient.
In another preferred embodiment, when it is determined that the local authorization file exists, obtaining the authorization code from the authorization file may be further implemented by obtaining the in-vehicle device number, and obtaining the authorization code from the authorization file through the in-vehicle device number. The authorization code is obtained through the vehicle-mounted device number, so that one authorization code can be prevented from being used by multiple people, and the uniqueness and the safety of the authorization code are guaranteed.
According to the embodiment, the authorization check of the application software in various states of wired and wireless can be realized, the problem that the authorization state of the application software can be intelligently detected only in a network environment in the prior art is overcome, and human resources are saved.
Fig. 2 schematically shows a schematic block diagram of an apparatus for performing authorization based on a hybrid scheme according to an embodiment of the present invention, and as shown in fig. 2, the apparatus for performing authorization based on a hybrid scheme includes an authorization status obtaining module 201, an authorization code obtaining module 202, and an authorization checking module 203.
The authorization status obtaining module 201 is configured to perform authorization status determination when the application software is started, and the method for determining the authorization status may refer to the above method part.
The authorization code obtaining module 202 is configured to obtain an authorization code according to an authorization status and a detected local status.
The authorization checking module 203 is configured to perform authorization verification according to the obtained authorization code.
The implementation of each module can refer to the above method part, and is not described herein again.
In addition, the apparatus further stores a module 204 for storing the obtained authorization code.
As a specific preferred embodiment, the authorization code obtaining module 202 includes a first obtaining unit 3 and a second obtaining unit 4.
The first obtaining unit 3 is configured to detect a local state when the authorization state is determined as unauthorized, and obtain the authorization code according to the local state, where the local state includes a local network state and a local authorization file state.
The second obtaining unit 4 is configured to obtain the authorization code from the storage module 204 when the authorization status is determined to be authorized.
As a preferred embodiment, the first obtaining unit 3 includes a device number obtaining component 301, a status detecting component 302, a local obtaining component 303, and a cloud obtaining component 304.
The device number obtaining component 301 is configured to obtain a device number of a vehicle device (each device is reserved with a call interface for obtaining a device serial number), and is a serial number of a vehicle-mounted device on the vehicle device, and is configured to uniquely identify one device.
The state detection component 302 is configured to detect a state of a local authorization file, determine whether the local authorization file exists, call the following local acquisition component 303 when the local authorization file exists, and call the following cloud acquisition component 304 when the local authorization file does not exist and the detected local network state is a networking state, where the call mode may be called through a corresponding interface of a device in which the application software is installed.
The local obtaining component 303 is configured to obtain the authorization code from the authorization file; the cloud acquisition component 304 is configured to acquire the authorization code from the cloud via the in-vehicle device number.
In specific implementation, the modules, units and components can be freely combined according to requirements, and are not limited to the arrangement mode of the specific preferred embodiment.
The device according to the embodiment can not only verify whether the application software is authorized in a network connection mode, but also realize authorization verification in a non-network connection mode, so that human resources can be saved, and a method for realizing authorization and authorization verification more intelligently is realized.
In some embodiments, the present invention provides a non-transitory computer readable storage medium, in which one or more programs including execution instructions are stored, and the execution instructions can be read and executed by an electronic device (including but not limited to a computer, a server, or a network device, etc.) to perform any one of the above methods for authorizing application software based on a hybrid scheme of the present invention.
In some embodiments, the present invention further provides a computer program product, the computer program product includes a computer program stored on a non-volatile computer-readable storage medium, the computer program includes program instructions, when executed by a computer, cause the computer to execute any one of the above methods for authorizing application software based on a hybrid scheme.
In some embodiments, an embodiment of the present invention further provides an electronic device, which includes: the system comprises at least one processor and a memory communicatively coupled to the at least one processor, wherein the memory stores instructions executable by the at least one processor, the instructions being executable by the at least one processor to enable the at least one processor to perform a method of authorizing application software based on a hybrid scheme.
In some embodiments, the present invention further provides a storage medium having a computer program stored thereon, wherein the computer program is characterized by a method for authorizing application software based on a hybrid scheme when the computer program is executed by a processor.
The device for performing authorization based on a hybrid scheme according to the embodiment of the present invention may be configured to execute the method for performing authorization based on a hybrid scheme according to the embodiment of the present invention, and accordingly achieve the technical effect achieved by the method for performing authorization based on a hybrid scheme according to the embodiment of the present invention, which is not described herein again. In the embodiment of the present invention, the relevant functional module may be implemented by a hardware processor (hardware processor).
Fig. 3 is a schematic hardware structure diagram of an electronic device for executing a method for authorizing application software based on a hybrid scheme according to an embodiment of the present application, and as shown in fig. 3, the electronic device includes:
one or more processors 410 and a memory 420, with one processor 410 being an example in fig. 3.
The apparatus for performing the method of authorizing the application software based on the hybrid scheme may further include: an input device 430 and an output device 440. The processor 410, the memory 420, the input device 430, and the output device 440 may be connected by a bus or other means, such as the bus connection in fig. 3.
The memory 420, which is a non-volatile computer-readable storage medium, may be used for storing non-volatile software programs, non-volatile computer-executable programs, and modules, such as program instructions/modules corresponding to the method for authorizing application software based on a hybrid scheme in the embodiments of the present application. The processor 410 executes various functional applications of the server and data processing by executing nonvolatile software programs, instructions and modules stored in the memory 420, namely, the method for authorizing application software based on a hybrid scheme, which implements the above-described method embodiments.
The memory 420 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to use of a device authorized based on the mixing scheme, and the like. Further, the memory 420 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some embodiments, memory 420 may optionally include memory located remotely from processor 410, which may be connected over a network to devices that authorize based on a hybrid scheme. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input device 430 may receive input numeric or character information and generate signals related to user settings and function control of the device authorized based on the mixing scheme. The output device 440 may include a display device such as a display screen.
The one or more modules are stored in the memory 420 and when executed by the one or more processors 410, perform a method for authorizing application software based on a hybrid scheme in any of the method embodiments described above.
The product can execute the method provided by the embodiment of the application, and has the corresponding functional modules and beneficial effects of the execution method. For technical details that are not described in detail in this embodiment, reference may be made to the methods provided in the embodiments of the present application.
The electronic device of the embodiments of the present application exists in various forms, including but not limited to:
(1) mobile communication devices, which are characterized by mobile communication capabilities and are primarily targeted at providing voice and data communications. Such terminals include smart phones (e.g., iphones), multimedia phones, functional phones, and low-end phones, among others.
(2) The ultra-mobile personal computer equipment belongs to the category of personal computers, has calculation and processing functions and generally has the characteristic of mobile internet access. Such terminals include PDA, MID, and UMPC devices, such as ipads.
(3) Portable entertainment devices such devices may display and play multimedia content. Such devices include audio and video players (e.g., ipods), handheld game consoles, electronic books, as well as smart toys and portable car navigation devices.
(4) The server is similar to a general computer architecture, but has higher requirements on processing capability, stability, reliability, safety, expandability, manageability and the like because of the need of providing highly reliable services.
(5) And other electronic devices with data interaction functions.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a general hardware platform, and certainly can also be implemented by hardware. Based on such understanding, the above technical solutions substantially or contributing to the related art may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (7)

1. A method for authorizing application software based on a hybrid scheme, comprising:
when the application software is started, judging the authorization state, wherein the judgment is realized by judging whether the application software stores an authorization code or not when the application software is started, judging that the application software is authorized when the application software stores the authorization code, and judging that the application software is unauthorized when the application software does not store the authorization code;
when the authorization state is judged to be unauthorized, detecting a local state, and acquiring an authorization code according to the local state, wherein the local state comprises a local network state and a local authorization file state;
when the authorization state is judged to be authorized, acquiring the stored authorization code for authorization verification;
and performing authorization verification according to the acquired authorization code, and storing the acquired authorization code after performing the authorization verification.
2. The method of claim 1, wherein detecting the local status and obtaining the authorization code based on the local status comprises:
the state of the local authorization file is detected,
when judging that a local authorization file exists, acquiring an authorization code from the authorization file;
and when judging that the local authorization file does not exist and the local network state is detected to be the networking state, acquiring the vehicle equipment number, and acquiring the authorization code from the cloud end through the vehicle equipment number.
3. The method of claim 2, wherein obtaining the authorization code from the authorization file upon determining that a local authorization file exists comprises:
and acquiring the vehicle equipment number, and acquiring the authorization code from the authorization file through the vehicle equipment number.
4. An apparatus for performing authorization based on a hybrid scheme, comprising
The authorization state acquisition module is used for judging the authorization state when the application software is started, and specifically comprises the steps of judging whether an authorization code is stored in the application software when the application software is started, judging that the application software is authorized when the authorization code is stored, and judging that the application software is unauthorized when the application software is not stored;
the authorization code acquisition module is used for acquiring an authorization code according to an authorization state and a detected local state, wherein the local state comprises a local network state and a local authorization file state;
the authorization verification module is used for performing authorization verification according to the acquired authorization code and storing the acquired authorization code after the authorization verification is performed; and
the storage module is used for storing the acquired authorization codes;
wherein the authorization code acquisition module comprises
The first obtaining unit is used for detecting the local state when the authorization state is judged to be unauthorized, and obtaining the authorization code according to the local state;
and the second acquisition unit is used for acquiring the authorization code from the storage module when the authorization state is judged to be authorized.
5. The apparatus according to claim 4, wherein the first obtaining unit includes a device number obtaining component, configured to obtain a device number of the in-vehicle device;
the state detection component is used for detecting the state of the local authorization file, judging whether the local authorization file exists or not, calling the following local acquisition component when judging that the local authorization file exists, and calling the following cloud acquisition component when judging that the local authorization file does not exist and the detected local network state is the networking state;
a local acquisition component for acquiring an authorization code from the authorization file; and
and the cloud acquisition component is used for acquiring the authorization code from the cloud through the in-vehicle device number.
6. An electronic device, comprising: at least one processor, and a memory communicatively coupled to the at least one processor, wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the steps of the method of any one of claims 1-3.
7. Storage medium on which a computer program is stored which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 3.
CN201811613445.1A 2018-12-27 2018-12-27 Method and device for authorizing application software based on mixed scheme Active CN109740306B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811613445.1A CN109740306B (en) 2018-12-27 2018-12-27 Method and device for authorizing application software based on mixed scheme

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811613445.1A CN109740306B (en) 2018-12-27 2018-12-27 Method and device for authorizing application software based on mixed scheme

Publications (2)

Publication Number Publication Date
CN109740306A CN109740306A (en) 2019-05-10
CN109740306B true CN109740306B (en) 2021-03-16

Family

ID=66360194

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811613445.1A Active CN109740306B (en) 2018-12-27 2018-12-27 Method and device for authorizing application software based on mixed scheme

Country Status (1)

Country Link
CN (1) CN109740306B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111143832A (en) * 2019-12-30 2020-05-12 苏州思必驰信息科技有限公司 Mobile terminal SDK (software development kit) suitable for multiple scenes and hybrid authorization method thereof
CN111339523B (en) * 2020-02-21 2024-04-23 深圳英飞拓仁用信息有限公司 Authorization method and device for embedded equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103473487A (en) * 2013-09-23 2013-12-25 中标软件有限公司 Product software network verification encryption method and product software network verification encryption system
CN104539634A (en) * 2015-01-22 2015-04-22 北京成众志科技有限公司 Security-enhanced authorizing and authenticating method of mobile application
US9092823B2 (en) * 2007-06-01 2015-07-28 F-Secure Oyj Internet fraud prevention
CN106878234A (en) * 2015-12-11 2017-06-20 阿里巴巴集团控股有限公司 Authorization method and device, the generation method of authorization code and device
CN107743115A (en) * 2016-12-22 2018-02-27 腾讯科技(深圳)有限公司 A kind of identity identifying method of terminal applies, device and system
CN108810894A (en) * 2018-05-31 2018-11-13 康键信息技术(深圳)有限公司 Authorization terminal method, apparatus, computer equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9092823B2 (en) * 2007-06-01 2015-07-28 F-Secure Oyj Internet fraud prevention
CN103473487A (en) * 2013-09-23 2013-12-25 中标软件有限公司 Product software network verification encryption method and product software network verification encryption system
CN104539634A (en) * 2015-01-22 2015-04-22 北京成众志科技有限公司 Security-enhanced authorizing and authenticating method of mobile application
CN106878234A (en) * 2015-12-11 2017-06-20 阿里巴巴集团控股有限公司 Authorization method and device, the generation method of authorization code and device
CN107743115A (en) * 2016-12-22 2018-02-27 腾讯科技(深圳)有限公司 A kind of identity identifying method of terminal applies, device and system
CN108810894A (en) * 2018-05-31 2018-11-13 康键信息技术(深圳)有限公司 Authorization terminal method, apparatus, computer equipment and storage medium

Also Published As

Publication number Publication date
CN109740306A (en) 2019-05-10

Similar Documents

Publication Publication Date Title
CN110351269B (en) Method for logging in open platform through third-party server
CN111991813B (en) Method and device for logging in game, electronic equipment and storage medium
CN110048879B (en) Microservice registration method, microservice registration device, electronic equipment and computer-readable storage medium
CN106599680B (en) Method and device for setting application program permission and electronic equipment
CN107820702B (en) Management and control method, device and electronic equipment
CN110519280B (en) Crawler identification method and device, computer equipment and storage medium
CN109740306B (en) Method and device for authorizing application software based on mixed scheme
CN111130807A (en) Vehicle-mounted account management method based on voiceprint recognition
CN107182042B (en) Short message channel quality evaluation method, device, medium and system
CN111078266A (en) Client processing method and device for low-coupling incremental upgrading of voice software and server processing method
CN106203092B (en) Method and device for intercepting shutdown of malicious program and electronic equipment
CN110730236B (en) Business pushing method and device based on artificial intelligence and electronic equipment
CN106934272B (en) Application information verification method and device
CN110971617A (en) Voice equipment authorization method, authentication method and system
CN108011896B (en) Application program-based secure communication method and device and electronic equipment
CN111128139B (en) Non-invasive voice test method and device
CN110336840B (en) Third party account registration method and system for voice conversation platform
CN110830263A (en) Automatic login method and device for vehicle-mounted system
CN110674050A (en) Memory out-of-range detection method and device, electronic equipment and computer storage medium
CN115174575A (en) Service control method and device, electronic equipment and storage medium
CN105025482B (en) Communication information processing method and equipment thereof
CN111046367A (en) Voice equipment authentication method and system
CN111143832A (en) Mobile terminal SDK (software development kit) suitable for multiple scenes and hybrid authorization method thereof
CN114285621A (en) Network threat monitoring method and device and electronic equipment
CN114285619A (en) Network information display method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 215123 14 Tengfei Innovation Park, 388 Xinping street, Suzhou Industrial Park, Suzhou, Jiangsu.

Patentee after: Sipic Technology Co.,Ltd.

Address before: 215123 14 Tengfei Innovation Park, 388 Xinping street, Suzhou Industrial Park, Suzhou, Jiangsu.

Patentee before: AI SPEECH Ltd.