CN111383373A - Vault door authorization method - Google Patents

Vault door authorization method Download PDF

Info

Publication number
CN111383373A
CN111383373A CN202010193462.5A CN202010193462A CN111383373A CN 111383373 A CN111383373 A CN 111383373A CN 202010193462 A CN202010193462 A CN 202010193462A CN 111383373 A CN111383373 A CN 111383373A
Authority
CN
China
Prior art keywords
card
time point
detected
vault door
card function
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010193462.5A
Other languages
Chinese (zh)
Other versions
CN111383373B (en
Inventor
刘敬锋
朱世义
温浩源
黄伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Haoyun Technologies Co Ltd
Original Assignee
Haoyun Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Haoyun Technologies Co Ltd filed Critical Haoyun Technologies Co Ltd
Priority to CN202010193462.5A priority Critical patent/CN111383373B/en
Publication of CN111383373A publication Critical patent/CN111383373A/en
Application granted granted Critical
Publication of CN111383373B publication Critical patent/CN111383373B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The embodiment of the disclosure provides a vault door authorization method, a vault door authorization device, a readable storage medium and a computing device, which can improve the security of a vault door, and the method comprises the following steps: before the first time point, if the first card operation is detected, the first card function is not activated; after a first time point, if a first card operation is detected, activating a first card function; setting the vault door to be in a business state if the activation of the first card function is detected between the second time point and the third time point; after the fourth time point, if the first card operation is detected, closing the first card function, and setting the vault door to the end state; after a fifth time point corresponding to the first card function is closed, if the first card operation is detected, the first card function is not activated; wherein the first time point is earlier than the second time point, and the fourth time point is earlier than the third time point.

Description

Vault door authorization method
Technical Field
The present disclosure relates to the field of security technologies, and in particular, to a vault door authorization method and apparatus, a readable storage medium, and a computing device.
Background
The existing bank vault door opening method is that two different personnel can open the vault door after successfully verifying and obtaining the authorization of a management center, and the vault authorization mode has two problems: firstly, a field confirmation link is lacked; secondly, the door can be opened at any time; thereby having certain potential safety hazard.
Disclosure of Invention
To this end, the present disclosure provides a vault door authorization method, apparatus, readable storage medium, and computing device in an effort to solve or at least mitigate at least one of the problems identified above.
According to an aspect of an embodiment of the present disclosure, there is provided a vault door authorization method, including:
before the first time point, if the first card operation is detected, the first card function is not activated;
after a first time point, if a first card operation is detected, activating a first card function;
setting the vault door to be in a business state if the activation of the first card function is detected between the second time point and the third time point;
after the fourth time point, if the first card operation of the user is detected, closing the first card function, and setting the vault door to be in an end-of-business state;
after a fifth time point corresponding to the first card function is closed, if the first card operation is detected, the first card function is not activated;
wherein the first time point is earlier than the second time point, and the fourth time point is earlier than the third time point.
Optionally, the method further comprises:
after the fourth time point, if the first card operation of the user is not detected, the first card function is closed at a sixth time point, and the operation content is reported to the background.
Optionally, the method further comprises:
after the fourth time point, if the first card operation of the user is not detected and the first card operation of the user is detected at a seventh time point after the fourth time point, closing the first card function, and setting the vault door to the closing state.
Optionally, the method further comprises: and after the second time point and before the fourth time point, if the head card operation is detected, not closing the head card function.
Optionally, the method further comprises:
and between the second time point and the third time point, if the first card function is not detected to be activated, setting the vault door to be in a business state after the activation of the first card function is detected.
Optionally, the method further comprises:
the first card operation comprises verification operation of a first card and at least two second cards; and the number of the first and second groups,
the door opening operation of the safe in the business state comprises the verification operation of at least two second cards, or the door opening operation of the safe in the business state comprises the verification operation of the first card and at least one second card.
Optionally, the first card operation comprises:
orderly verifying the first card and the second card; alternatively, an out-of-order verification operation of the first card and the second card.
According to still another aspect of the embodiments of the present disclosure, there is provided a vault door authorization apparatus including:
the first head card closing module is used for not activating the head card function before the first time point if the head card operation is detected;
the first card activation module is used for activating the first card function after the first time point if the first card operation of the user is detected;
the operation module is used for setting the vault door to be in an operation state between the second time point and the third time point if the first card function is activated;
the operation ending module is used for closing the first card function and setting the vault door to be in an operation ending state after the fourth time point if the first card operation of the user is detected;
the second first card closing module is used for not activating the first card function after a fifth time point corresponding to the first card function is closed if the first card operation is detected;
wherein the first time point is earlier than the second time point, and the fourth time point is earlier than the third time point.
According to yet another aspect of the embodiments of the present disclosure, there is provided a readable storage medium having executable instructions thereon, which when executed, cause a computer to perform the operations involved in the above vault door authorization method.
According to yet another aspect of embodiments of the present disclosure, there is provided a computing device comprising:
one or more processors;
a memory; and
one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors to perform the operations included in the above-described vault door authorization method.
According to the embodiment of the disclosure, the vault door authorization method based on time management and first card verification is realized, so that the operation of the vault door is ensured to be subjected to field verification and strict time management, the security of the vault door is further ensured, and various risks can be avoided.
Drawings
The accompanying drawings, which are included to provide a further understanding of the disclosure and are incorporated in and constitute a part of this specification, illustrate exemplary embodiments of the disclosure and together with the description serve to explain the principles of the disclosure.
FIG. 1 is a block diagram of an exemplary computing device;
FIG. 2 is a flow chart of a vault door authorization method according to an embodiment of the present disclosure;
FIG. 3 is yet another flow chart of a vault door authorization method according to an embodiment of the disclosure
Fig. 4 is a structural diagram of a vault door authorization apparatus according to an embodiment of the present disclosure.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
Fig. 1 is a block diagram of an example computing device 100 arranged to implement a vault door authorization method according to the present disclosure. In a basic configuration 102, computing device 100 typically includes system memory 106 and one or more processors 104. A memory bus 108 may be used for communication between the processor 104 and the system memory 106.
Depending on the desired configuration, the processor 104 may be any type of processing, including but not limited to: the processor 104 may include one or more levels of cache, such as a level one cache 110 and a level two cache 112, a processor core 114, and registers 116. the example processor core 114 may include an Arithmetic Logic Unit (ALU), a Floating Point Unit (FPU), a digital signal processing core (DSP core), or any combination thereof.
Depending on the desired configuration, system memory 106 may be any type of memory, including but not limited to: volatile memory (such as RAM), non-volatile memory (such as ROM, flash memory, etc.), or any combination thereof. System memory 106 may include an operating system 120, one or more programs 122, and program data 124. In some implementations, the program 122 can be configured to execute instructions on an operating system by one or more processors 104 using program data 124.
Computing device 100 may also include an interface bus 140 that facilitates communication from various interface devices (e.g., output devices 142, peripheral interfaces 144, and communication devices 146) to the basic configuration 102 via the bus/interface controller 130. The example output device 142 includes a graphics processing unit 148 and an audio processing unit 150. They may be configured to facilitate communication with various external devices, such as a display terminal or speakers, via one or more a/V ports 152. Example peripheral interfaces 144 may include a serial interface controller 154 and a parallel interface controller 156, which may be configured to facilitate communication with external devices such as input devices (e.g., keyboard, mouse, pen, voice input device, touch input device) or other peripherals (e.g., printer, scanner, etc.) via one or more I/O ports 158. An example communication device 146 may include a network controller 160, which may be arranged to facilitate communications with one or more other computing devices 162 over a network communication link via one or more communication ports 164.
A network communication link may be one example of a communication medium. Communication media may typically be embodied by computer readable instructions, data structures, program modules, and may include any information delivery media, such as carrier waves or other transport mechanisms, in a modulated data signal. A "modulated data signal" may be a signal that has one or more of its data set or its changes made in such a manner as to encode information in the signal. By way of non-limiting example, communication media may include wired media such as a wired network or private-wired network, and various wireless media such as acoustic, Radio Frequency (RF), microwave, Infrared (IR), or other wireless media. The term computer readable media as used herein may include both storage media and communication media.
Computing device 100 may be implemented as a personal computer or server including both desktop and notebook computer configurations.
Among other things, one or more programs 122 of computing device 100 include instructions for performing a vault door authorization method according to the present disclosure.
Fig. 2 illustrates a flow chart of a vault door authorization method 200 according to one embodiment of the present disclosure, the vault door authorization method 200 starting at step S210.
S210, before the first time point, if the first card operation is detected, the first card function is not activated;
s220, after the first time point, if the first card operation is detected, activating the first card function;
s230, setting the vault door to be in a business state between the second time point and the third time point if the activation of the first card function is detected;
s240, after the fourth time point, if the first card operation of the user is detected, closing the first card function, and setting the vault door to be in an end-of-business state;
and S250, after the fifth time point corresponding to the first card function is closed, if the first card operation is detected, the first card function is not activated.
The first time point is earlier than the second time point, and the fourth time point is earlier than the third time point; the second time point and the third time point are respectively business starting time and business ending time; according to one embodiment of the present disclosure, the first time point is 30 minutes earlier than the second time point, and the fourth time point is 30 minutes earlier than the third time point.
The first card operation comprises card swiping operation of a first card and at least two second cards; for example, the first card may be a vault door leader card, the second card may be a custodian card, and the first card operation includes a vault door leader card and a no-order swipe validation of two custodian cards. And after the card swiping verification is successful, activating the first card function, wherein the activation of the first card function is one of the conditions for the vault door to enter the business state. And after the first card function is closed, the vault door enters an end-of-business state. The opening operation of the safe in the business state comprises a card swiping operation of a second card, the second card comprises at least two cards, for example, the opening operation of the safe comprises card swiping verification of two manager cards; alternatively, the opening operation of the open vault in the business state includes a card swiping operation of a first card and a second card, and the second card includes a card, for example, the opening operation of the vault includes a card swiping verification of a vault manager card and a card swiping verification of a leader card.
In step S210, before the first time point, if the first card operation is detected, the first card function is not activated, thereby solving the risk that the vault door is illegally opened before work.
Step S220-step S240 realize that the vault door can be opened only in business hours and after the first card is verified.
In step S250, after the fourth time point, if the first card operation of the user is detected, the first card function is closed, and the vault door is set to the end state, thereby solving the risk that the vault door is illegally opened after work.
Optionally, the method further comprises: after the fourth time point, if the first card operation of the user is not detected, the first card function is closed at a sixth time point, and the operation content is reported to the background. For example, the bank cannot manually close the head card for some reason, waits until the day 23:59:59, automatically closes, and reports an alarm time for the automatic closing of the head card to the control center.
Optionally, the method further comprises: after the fourth time point, if the first card operation of the user is not detected and the first card operation of the user is detected at a seventh time point after the fourth time point, the first card function is closed, and the vault door is set to the closing state. The embodiment realizes the processing of failing to close the head card operation in time due to overtime or special conditions.
Optionally, the method further comprises: after the second time point and before the fourth time point, if the first card operation is detected, the first card function is not closed. The problem that the warehouse door is illegally closed in business hours is avoided in the embodiment.
Optionally, the method further comprises: and between the second time point and the third time point, if the first card function is not detected to be activated, setting the vault door to be in a business state after the activation of the first card function is detected. The embodiment solves the problem that the first card operation cannot be completed in the first time and the second time due to reasons such as accidents, and the user can supplement the first card operation between the second time point and the third time point.
Optionally, the first card operation is an ordered verification operation, and the card swiping sequence of each card needs to meet the preset requirements; or the first card operation is an unordered verification operation, and the card swiping sequence of each card is not specified.
Fig. 3 illustrates yet another embodiment of the present disclosure, including the following:
1. the administrator can configure < business earliest time every day > and < business earliest time every day > on the central management software, and complete other work head card setting items;
2. before < business earliest time every day >, the system does not enter the business state after the first card verification of < exchequer director > + < librarian >;
3. after the first card verification of < exchequer owner > + < custodian > is completed after < business earliest time of day > and before < business earliest time of day >, the system becomes a business state;
4. after < earliest time of daily business > and before < earliest time of daily work out >, if the system is in a business state, after the verification of the first card of < exchequer of the exchequer > + < custodian > is completed again, the system is still in the business state;
5. after the first card verification of < exchequer owner > + < custodian > is completed after < earliest time of daily end of business >, the system enters an end of business state;
6. after < earliest time of daily end of business >, if the system is in the end of business state, the system is still in the end of business state after the first card verification of < exchequer owner > + < custodian > is completed again.
The buffering time shown in fig. 3 is used to restrict the period of mode switching by the head card, and the head card mode can be activated only when the first buffering time is entered; and if the first card function needs to be manually closed, the second buffer time is needed, and the first card can be manually closed.
The activation and the closing of the first card are respectively carried out by 1 exchequer principal and 2 vault managers without ordering the cards for verification. After the first card is activated, in the working hours, 2 vault managers can open the vault door only after respectively holding the cards; after the first card is closed, the access controller enters a standby state of the vault control, and at this time, any vault manager can not open the vault door after the technical verification is successful, and can not activate the first card of the vault door again, and only waits for the first buffer time of the next day.
In addition, the first card is automatically closed, if the bank cannot manually close the first card for some reason, the first card is automatically closed when the current day is 23:59:59, and an alarm time for automatically closing the first card is reported to the control center.
Referring to fig. 4, the present disclosure provides a vault door authorization apparatus comprising:
a first header closing module 410, configured to, before the first time point, not activate the header function if the header operation is detected;
a first card activation module 420, configured to activate a first card function after a first time point if a first card operation of a user is detected;
the business module 430 is used for setting the vault door to be in a business state between the second time point and the third time point if the first card function is activated;
an end-of-business module 440, configured to, after the fourth time point, close the first card function if the first card operation of the user is detected, and set the vault door to an end-of-business state;
the second first card closing module 450 is configured to, after a fifth time point corresponding to the closing of the first card function, if the first card operation is detected, not activate the first card function.
For specific limitations of the vault door authorization apparatus, reference may be made to the above limitations of the vault door authorization method, which are not described herein again.
It should be understood that the various techniques described herein may be implemented in connection with hardware or software or, alternatively, with a combination of both. Thus, the methods and apparatus of the present disclosure, or certain aspects or portions thereof, may take the form of program code (i.e., instructions) embodied in tangible media, such as floppy diskettes, CD-ROMs, hard drives, or any other machine-readable storage medium, wherein, when the program is loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for practicing the disclosure.
In the case of program code execution on programmable computers, the computing device will generally include a processor, a storage medium readable by the processor (including volatile and non-volatile memory and/or storage elements), at least one input device, and at least one output device. Wherein the memory is configured to store program code; the processor is configured to perform the various methods of the present disclosure according to instructions in the program code stored in the memory.
By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer-readable media includes both computer storage media and communication media. Computer storage media store information such as computer readable instructions, data structures, program modules or other data. Communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. Combinations of any of the above are also included within the scope of computer readable media.
It should be appreciated that in the foregoing description of exemplary embodiments of the disclosure, various features of the disclosure are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various disclosed aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that is, the claimed disclosure requires more features than are expressly recited in each claim. Rather, as the following claims reflect, disclosed aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this disclosure.
Those skilled in the art will appreciate that the modules or units or components of the devices in the examples disclosed herein may be arranged in a device as described in this embodiment or alternatively may be located in one or more devices different from the devices in this example. The modules in the foregoing examples may be combined into one module or may be further divided into multiple sub-modules.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Moreover, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the disclosure and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
Furthermore, some of the described embodiments are described herein as a method or combination of method elements that can be performed by a processor of a computer system or by other means of performing the described functions. A processor having the necessary instructions for carrying out the method or method elements thus forms a means for carrying out the method or method elements. Further, the elements of the apparatus embodiments described herein are examples of the following apparatus: the apparatus is used to implement the functions performed by the elements for the purposes of this disclosure.
As used herein, unless otherwise specified the use of the ordinal adjectives "first", "second", "third", etc., to describe a common object, merely indicate that different instances of like objects are being referred to, and are not intended to imply that the objects so described must be in a given sequence, either temporally, spatially, in ranking, or in any other manner.
While the disclosure has been described with respect to a limited number of embodiments, those skilled in the art, having benefit of this description, will appreciate that other embodiments can be devised which do not depart from the scope of the disclosure as described herein. Moreover, it should be noted that the language used in the specification has been principally selected for readability and instructional purposes, and may not have been selected to delineate or circumscribe the disclosed subject matter. Accordingly, many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the appended claims. The disclosure of the present disclosure is intended to be illustrative, but not limiting, of the scope of the disclosure, which is set forth in the following claims.

Claims (10)

1. A vault door authorization method, comprising:
before the first time point, if the first card operation is detected, the first card function is not activated;
after a first time point, if a first card operation is detected, activating a first card function;
setting the vault door to be in a business state if the activation of the first card function is detected between the second time point and the third time point;
after the fourth time point, if the first card operation is detected, closing the first card function, and setting the vault door to the end state;
after a fifth time point corresponding to the first card function is closed, if the first card operation is detected, the first card function is not activated;
wherein the first time point is earlier than the second time point, and the fourth time point is earlier than the third time point.
2. The method of claim 1, further comprising:
after the fourth time point, if the first card operation of the user is not detected, the first card function is closed at a sixth time point, and the operation content is reported to the background.
3. The method of claim 2, further comprising:
after the fourth time point, if the first card operation of the user is not detected and the first card operation of the user is detected at a seventh time point after the fourth time point, closing the first card function, and setting the vault door to the closing state.
4. The method of claim 1, further comprising: and after the second time point and before the fourth time point, if the head card operation is detected, not closing the head card function.
5. The method of claim 1, further comprising:
and between the second time point and the third time point, if the first card function is not detected to be activated, setting the vault door to be in a business state after the activation of the first card function is detected.
6. The method of claim 1, further comprising:
the first card operation comprises verification operation of a first card and at least two second cards; and the number of the first and second groups,
the door opening operation of the safe in the business state comprises the verification operation of the at least two second cards, or the door opening operation of the safe in the business state comprises the verification operation of the first card and the at least one second card.
7. The method of claim 6, wherein the header card operations comprise:
orderly verifying the first card and the second card; alternatively, an out-of-order verification operation of the first card and the second card.
8. A vault door authorization apparatus comprising:
the first head card closing module is used for not activating the head card function before the first time point if the head card operation is detected;
the first card activation module is used for activating the first card function after the first time point if the first card operation of the user is detected;
the operation module is used for setting the vault door to be in an operation state between the second time point and the third time point if the activation of the first card function is detected;
the operation establishment module is used for closing the first card function and setting the vault door to be in an operation establishment state if the first card operation is detected after the fourth time point;
the second first card closing module is used for not activating the first card function after a fifth time point corresponding to the first card function is closed if the first card operation is detected;
wherein the first time point is earlier than the second time point, and the fourth time point is earlier than the third time point.
9. A readable storage medium having executable instructions thereon that, when executed, cause a computer to perform the operations included in any of claims 1-7.
10. A computing device, comprising:
one or more processors;
a memory; and
one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors to perform operations included in any of claims 1-7.
CN202010193462.5A 2020-03-18 2020-03-18 Vault door authorization method Active CN111383373B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010193462.5A CN111383373B (en) 2020-03-18 2020-03-18 Vault door authorization method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010193462.5A CN111383373B (en) 2020-03-18 2020-03-18 Vault door authorization method

Publications (2)

Publication Number Publication Date
CN111383373A true CN111383373A (en) 2020-07-07
CN111383373B CN111383373B (en) 2021-10-19

Family

ID=71218748

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010193462.5A Active CN111383373B (en) 2020-03-18 2020-03-18 Vault door authorization method

Country Status (1)

Country Link
CN (1) CN111383373B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3878511A (en) * 1973-12-03 1975-04-15 Mosler Safe Co Vault protected wtih electronic time and combination lock
CN201054088Y (en) * 2007-07-19 2008-04-30 广州市安必信通信设备有限公司 Treasury monitoring and managing device
CN101835031A (en) * 2010-01-12 2010-09-15 湖南银宝科技发展有限公司 Different-place remote monitoring and safety precaution system equipment of treasure house
CN202018687U (en) * 2010-10-21 2011-10-26 广州市浩云安防科技工程有限公司 Unattended system for coffer
CN102568063A (en) * 2011-12-14 2012-07-11 深圳市中联创新自控系统有限公司 Door opening method for door control system, and door control system
CN103440691A (en) * 2013-08-14 2013-12-11 毛振刚 Bank exchequer long-distance defense management system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3878511A (en) * 1973-12-03 1975-04-15 Mosler Safe Co Vault protected wtih electronic time and combination lock
CN201054088Y (en) * 2007-07-19 2008-04-30 广州市安必信通信设备有限公司 Treasury monitoring and managing device
CN101835031A (en) * 2010-01-12 2010-09-15 湖南银宝科技发展有限公司 Different-place remote monitoring and safety precaution system equipment of treasure house
CN202018687U (en) * 2010-10-21 2011-10-26 广州市浩云安防科技工程有限公司 Unattended system for coffer
CN102568063A (en) * 2011-12-14 2012-07-11 深圳市中联创新自控系统有限公司 Door opening method for door control system, and door control system
CN103440691A (en) * 2013-08-14 2013-12-11 毛振刚 Bank exchequer long-distance defense management system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
包晗: "某银行分行金库门禁系统门禁系统设计方案", 《百度文库》 *
启程的男孩: "门禁功能大盘点!拿了我的卡,也别想开我的门", 《360DOC个人图书馆》 *

Also Published As

Publication number Publication date
CN111383373B (en) 2021-10-19

Similar Documents

Publication Publication Date Title
KR102622185B1 (en) Mobile payment devices and mobile payment systems
US10133637B2 (en) Systems and methods for secure recovery of host system code
US9672362B2 (en) Systems and methods for secure delivery of public keys for operating system drivers
CN101411163A (en) System and method for tracking the security enforcement in a grid system
WO2019127893A1 (en) Electronic signature method, electronic device, and computer readable storage medium
US10289419B2 (en) Method and apparatus for sorting elements in hardware structures
US10511594B2 (en) Verification information processing method and device
US20180295513A1 (en) Authentication system using nfc tags
CN109284845A (en) Reserve access method, system, computer equipment and storage medium
US20130318216A1 (en) Information processing apparatus and setting information management method
CN111383373B (en) Vault door authorization method
CN111930283A (en) Message display method and computing device
US20090094256A1 (en) Method and system for registering a device
US20160063421A1 (en) Systems and methods for service level agreement focused document workflow management
US11100238B2 (en) Systems and methods for generating policy coverage information for security-enhanced information handling systems
CN104021351A (en) Method and device for data resource access
US10042859B1 (en) Chronological based retention for objects archived through a web-based storage interface for ILM
CN115701607A (en) Rule updating method based on block chain, electronic equipment and storage medium
CN114510706A (en) Permission control method and device based on physical interface and computing equipment
CN111935716A (en) Authentication method, authentication system and computing device
US20150169469A1 (en) Methods, systems and computer-readable media for managing a local stack
EP3007092A1 (en) Mobile device-based authentication method and authentication apparatus
US20190068572A1 (en) Customizable secondary verification in a multi-tenant system
CN104318309A (en) One-Card realization system and method based on mobile terminal
CN109711177A (en) Data safety control method and terminal device based on biological information identification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant