CN112086099A - Student-leaving teaching guidance management system and method - Google Patents

Student-leaving teaching guidance management system and method Download PDF

Info

Publication number
CN112086099A
CN112086099A CN201910517598.4A CN201910517598A CN112086099A CN 112086099 A CN112086099 A CN 112086099A CN 201910517598 A CN201910517598 A CN 201910517598A CN 112086099 A CN112086099 A CN 112086099A
Authority
CN
China
Prior art keywords
verification
student
module
encryption
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910517598.4A
Other languages
Chinese (zh)
Inventor
李博群
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Guanyi Education Technology Co ltd
Original Assignee
Shanghai Guanyi Education Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Guanyi Education Technology Co ltd filed Critical Shanghai Guanyi Education Technology Co ltd
Priority to CN201910517598.4A priority Critical patent/CN112086099A/en
Publication of CN112086099A publication Critical patent/CN112086099A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/22Interactive procedures; Man-machine interfaces
    • G10L17/24Interactive procedures; Man-machine interfaces the user being prompted to utter a password or a predefined phrase
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • Acoustics & Sound (AREA)
  • Health & Medical Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a student-leaving teaching guidance management system and method, and relates to the technical field of computers. The system comprises: leaving the student end and the management end; the communication device is used for communicating the student terminal with the management terminal; the student terminal comprises: the login verification module is used for verifying the login identity of the student, if the verification is passed, the student logs in the system, and if the verification is not passed, the verification is not passed; the information input module is used for providing information input for students; the information output module is used for outputting information; a database for storing information; the management terminal comprises: the management terminal verification module is used for verifying the login identity of the administrator; the administrator information input module is used for providing the administrator with input information; the administrator information output module is used for providing information output for an administrator; and the administrator database is used for storing information. The method has the advantages of simple operation, high intelligent degree and high safety.

Description

Student-leaving teaching guidance management system and method
Technical Field
The invention relates to the technical field of computers, in particular to a student-leaving teaching guidance management system and method.
Background
In schools, the work of managing foreign matters is a very important work. Previously, the operation was performed manually. With the increase of school scale, the management workload of the field is greatly increased. With the development of computer applications, the field workers urgently hope to send most of the tedious work to the computer for processing, so as to reduce the manual pressure and improve the work efficiency, and the popularization of the computer accelerates the generation of the field management system.
The existing foreign affair management solution is mainly equivalent to an information storage end and used for storing and calling information, and the information cannot be automatically sorted.
Disclosure of Invention
In order to solve the problem of complicated manual operation, the invention aims to provide a student-left teaching guidance management system and method, which have the advantages of simple operation, high intelligent degree and high safety.
In order to achieve the purpose, the invention adopts the following technical scheme:
a student-leaving teaching guidance management system, the system comprising: leaving the student end and the management end; the communication device is used for communicating the student terminal with the management terminal; the student terminal comprises:
the login verification module is used for verifying the login identity of the student, if the verification is passed, the student logs in the system, and if the verification is not passed, the verification is not passed;
the information input module is used for providing information input for students;
the information output module is used for outputting information;
a database for storing information;
the management terminal comprises:
the management terminal verification module is used for verifying the login identity of the administrator;
the administrator information input module is used for providing the administrator with input information;
the administrator information output module is used for providing information output for an administrator;
and the administrator database is used for storing information.
Further, the communication apparatus includes: the device comprises a first encryption and decryption module, a transmission device and a second encryption and decryption module; the first encryption and decryption module is respectively in signal connection with the reserved student terminal and the transmission device; and the second encryption and decryption module is respectively in signal connection with the transmission device and the management terminal.
Further, the login verification module comprises: the voice verification module and the image verification module; the voice verification module is used for performing voice verification on the logged-in user; and the image verification module is used for performing image verification on the logged-in user.
Further, the first encryption and decryption module and the second encryption and decryption module perform encryption and decryption in a reverse process.
Further, the first encryption and decryption module includes: the data encryption and decryption unit is used for carrying out encryption and decryption operation on data information transmitted by the communication device and generating an encryption and decryption power signal corresponding to the encryption and decryption operation; and the power generation unit is connected with the data encryption and decryption unit and generates a power signal according to the encryption and decryption power signal, and the power signal is used as a key for encryption and decryption operation.
A student-attending guidance teaching management method, said method performing the steps of:
step 1: when the student logs in, the student logging identity is verified, if the verification is passed, the student logs in to enter the system, and if the verification is not passed, the verification is not passed;
step 2: inputting information of students; the input information is sent to a management end through communication, and the input information is stored locally;
and step 3: when the administrator logs in, the login identity of the administrator is verified, if the verification is passed, the administrator logs in to enter the system, and if the verification is not passed, the administrator is prompted to fail the verification;
and 4, step 4: when the management end and the student end transmit information, the information in the transmission process is encrypted and decrypted.
Further, when the student stays at the login, the method for verifying the login identity of the student comprises the following steps:
step 1.1: carrying out voice signal verification on the student;
step 1.2: and carrying out image signal verification on the student.
Further, in step 1.1, the method for performing voice signal verification on students performs the following steps: acquiring voice data and identifying the voice data; when the voice data is identified to contain a preset voice password, intercepting the voice password data containing the preset voice password from the voice data; and extracting the voiceprint characteristics of the voice password data, matching the voiceprint characteristics with preset voiceprint characteristics, and if the voiceprint characteristics are successfully matched, passing the verification.
Compared with the prior art, the invention has the following beneficial effects: the high security of the system is realized by the login verification of the student terminal, the login verification of the administrator terminal and the encryption and decryption of data transmission. Meanwhile, high cost caused by manual management is avoided.
Drawings
The invention is described in further detail below with reference to the following figures and detailed description:
fig. 1 is a schematic system structure diagram of a student-attending teaching guidance management system disclosed in embodiment 1 of the present invention.
Detailed Description
The following description of the embodiments of the present invention is provided for illustrative purposes, and other advantages and effects of the present invention will become apparent to those skilled in the art from the present disclosure.
Please refer to fig. 1. It should be understood that the structures, ratios, sizes, and the like shown in the drawings and described in the specification are only used for matching with the disclosure of the specification, so as to be understood and read by those skilled in the art, and are not used to limit the conditions under which the present invention can be implemented, so that the present invention has no technical significance, and any structural modification, ratio relationship change, or size adjustment should still fall within the scope of the present invention without affecting the efficacy and the achievable purpose of the present invention. In addition, the terms "upper", "lower", "left", "right", "middle" and "one" used in the present specification are for clarity of description, and are not intended to limit the scope of the present invention, and the relative relationship between the terms and the terms is not to be construed as a scope of the present invention.
Example 1
As shown in fig. 1, a student-attending teaching guidance management system, the system comprising: leaving the student end and the management end; the communication device is used for communicating the student terminal with the management terminal; the student terminal comprises:
the login verification module is used for verifying the login identity of the student, if the verification is passed, the student logs in the system, and if the verification is not passed, the verification is not passed;
the information input module is used for providing information input for students;
the information output module is used for outputting information;
a database for storing information;
the management terminal comprises:
the management terminal verification module is used for verifying the login identity of the administrator;
the administrator information input module is used for providing the administrator with input information;
the administrator information output module is used for providing information output for an administrator;
and the administrator database is used for storing information.
Example 2
On the basis of the above embodiment, the communication apparatus includes: the encryption and decryption device comprises a first encryption and decryption module, a transmission device and a second encryption and decryption module; the first encryption and decryption module is respectively in signal connection with the reserved student terminal and the transmission device; and the second encryption and decryption module is respectively in signal connection with the transmission device and the management terminal.
Specifically, the encryption technique includes two elements: an algorithm and a key. An algorithm is a step of combining ordinary information or understandable information with a string of numbers (keys), which is an algorithm used to encode and decrypt data, to generate an unintelligible ciphertext. In security, information communication of a network can be secured by appropriate key encryption techniques and management mechanisms.
Encryption and decryption of software is an attractive field of research and can be closely combined with almost any computer technology, namely cryptography, programming languages, operating systems and data structures. For one reason or another, the level of interest in this area has been in a low temperature state. The snow-seeing technical forum believes that a road is opened up to the field for more friends who are eager for knowledge, and further the continuous development of the field is promoted.
Example 3
On the basis of the above embodiment, the login verification module includes: the voice verification module and the image verification module; the voice verification module is used for performing voice verification on the logged-in user; and the image verification module is used for performing image verification on the logged-in user.
Example 4
On the basis of the above embodiment, the first encryption and decryption module and the second encryption and decryption module perform encryption and decryption in inverse processes to each other.
Example 5
On the basis of the above embodiment, the first encryption and decryption module includes: the data encryption and decryption unit is used for carrying out encryption and decryption operation on data information transmitted by the communication device and generating an encryption and decryption power signal corresponding to the encryption and decryption operation; and the power generation unit is connected with the data encryption and decryption unit and generates a power signal according to the encryption and decryption power signal, and the power signal is used as a key for encryption and decryption operation.
Example 6
A student-leaving teaching guidance management method is characterized by comprising the following steps:
step 1: when the student logs in, the student logging identity is verified, if the verification is passed, the student logs in to enter the system, and if the verification is not passed, the verification is not passed;
step 2: inputting information of students; the input information is sent to a management end through communication, and the input information is stored locally;
and step 3: when the administrator logs in, the login identity of the administrator is verified, if the verification is passed, the administrator logs in to enter the system, and if the verification is not passed, the administrator is prompted to fail the verification;
and 4, step 4: when the management end and the student end transmit information, the information in the transmission process is encrypted and decrypted.
Example 7
On the basis of the previous embodiment, the method for verifying the login identity of the student who logs in comprises the following steps:
step 1.1: carrying out voice signal verification on the student;
step 1.2: and carrying out image signal verification on the student.
Example 8
On the basis of the previous embodiment, in step 1.1, the method for performing voice signal verification on an student performs the following steps: acquiring voice data and identifying the voice data; when the voice data is identified to contain a preset voice password, intercepting the voice password data containing the preset voice password from the voice data; and extracting the voiceprint characteristics of the voice password data, matching the voiceprint characteristics with preset voiceprint characteristics, and if the voiceprint characteristics are successfully matched, passing the verification.
Speech recognition is a cross discipline. In the last two decades, speech recognition technology has advanced significantly, starting to move from the laboratory to the market. It is expected that voice recognition technology will enter various fields such as industry, home appliances, communications, automotive electronics, medical care, home services, consumer electronics, etc. within the next 10 years. The application of speech recognition dictation machines in some fields is rated by the U.S. news community as one of ten major computer developments in 1997. Many experts consider the speech recognition technology to be one of the ten important technological development technologies in the information technology field between 2000 and 2010. The fields to which speech recognition technology relates include: signal processing, pattern recognition, probability and information theory, sound and hearing mechanisms, artificial intelligence, and the like.
The front-end processing means that the original voice is processed before feature extraction, and influences caused by noise and different speakers are partially eliminated, so that the processed signals can reflect essential features of the voice better. The most common front-end processes are endpoint detection and speech enhancement. The endpoint detection is to distinguish the speech signal from the non-speech signal in the speech signal to accurately determine the starting point of the speech signal. After the endpoint detection, the subsequent processing can be carried out on the voice signal only, which plays an important role in improving the accuracy of the model and the recognition accuracy. The main task of speech enhancement is to eliminate the effect of ambient noise on speech. At present, the general method adopts wiener filtering, and the method has better effect than other filters under the condition of larger noise.
The extraction and selection of acoustic features is an important link of speech recognition. The extraction of the acoustic features is a process of greatly compressing information and a signal deconvolution process, and aims to enable the mode divider to divide better. Due to the time-varying nature of speech signals, feature extraction must be performed on a small segment of the speech signal, i.e., a short analysis. This segment of the analysis, which is considered stationary, is called a frame, and the offset from frame to frame is typically 1/2 or 1/3 of the frame length. The signal is usually pre-emphasized to boost the high frequencies and windowed to avoid the short speech segment edges.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process and related description of the system described above may refer to the corresponding process in the foregoing method embodiments, and will not be described herein again.
It should be noted that, the system provided in the foregoing embodiment is only illustrated by dividing the functional modules, and in practical applications, the functions may be distributed by different functional modules according to needs, that is, the modules or steps in the embodiment of the present invention are further decomposed or combined, for example, the modules in the foregoing embodiment may be combined into one module, or may be further split into multiple sub-modules, so as to complete all or part of the functions described above. The names of the modules and steps involved in the embodiments of the present invention are only for distinguishing the modules or steps, and are not to be construed as unduly limiting the present invention.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes and related descriptions of the storage device and the processing device described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
Those of skill in the art would appreciate that the various illustrative modules, method steps, and modules described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that programs corresponding to the software modules, method steps may be located in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. To clearly illustrate this interchangeability of electronic hardware and software, various illustrative components and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as electronic hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The terms "first," "second," and the like are used for distinguishing between similar elements and not necessarily for describing or implying a particular order or sequence.
The terms "comprises," "comprising," or any other similar term are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
So far, the technical solutions of the present invention have been described in connection with the preferred embodiments shown in the drawings, but it is easily understood by those skilled in the art that the scope of the present invention is obviously not limited to these specific embodiments. Equivalent changes or substitutions of related technical features can be made by those skilled in the art without departing from the principle of the invention, and the technical scheme after the changes or substitutions can fall into the protection scope of the invention.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.
The foregoing embodiments are merely illustrative of the principles and utilities of the present invention and are not intended to limit the invention. Any person skilled in the art can modify or change the above-mentioned embodiments without departing from the spirit and scope of the present invention. Accordingly, it is intended that all equivalent modifications or changes which can be made by those skilled in the art without departing from the spirit and technical spirit of the present invention be covered by the claims of the present invention.

Claims (8)

1. A student-leaving teaching guidance management system, the system comprising: leaving the student end and the management end; the communication device is used for communicating the student terminal with the management terminal; the student terminal comprises:
the login verification module is used for verifying the login identity of the student, if the verification is passed, the student logs in the system, and if the verification is not passed, the verification is not passed;
the information input module is used for providing information input for students;
the information output module is used for outputting information;
a database for storing information;
the management terminal comprises:
the management terminal verification module is used for verifying the login identity of the administrator;
the administrator information input module is used for providing the administrator with input information;
the administrator information output module is used for providing information output for an administrator;
and the administrator database is used for storing information.
2. The system of claim 1, wherein the communication device comprises: the device comprises a first encryption and decryption module, a transmission device and a second encryption and decryption module; the first encryption and decryption module is respectively in signal connection with the reserved student terminal and the transmission device; and the second encryption and decryption module is respectively in signal connection with the transmission device and the management terminal.
3. The system of claim 1, wherein the login authentication module comprises: the voice verification module and the image verification module; the voice verification module is used for performing voice verification on the logged-in user; and the image verification module is used for performing image verification on the logged-in user.
4. The system of claim 2, wherein the first encryption and decryption module and the second encryption and decryption module perform encryption and decryption in reverse processes to each other.
5. The system of claim 2, wherein the first encryption/decryption module comprises: the data encryption and decryption unit is used for carrying out encryption and decryption operation on data information transmitted by the communication device and generating an encryption and decryption power signal corresponding to the encryption and decryption operation; the power generation unit is connected with the data encryption and decryption unit and generates a power signal according to the encryption and decryption power signal, and the power signal is used as a key for encryption and decryption operation.
6. A student-attending guidance teaching management method based on the system of any one of claims 1 to 5, characterized in that the method performs the steps of:
step 1: when the student logs in, the student logging identity is verified, if the verification is passed, the student logs in to enter the system, and if the verification is not passed, the verification is not passed;
step 2: inputting information of students; the input information is sent to a management end through communication, and the input information is stored locally;
and step 3: when the administrator logs in, the login identity of the administrator is verified, if the verification is passed, the administrator logs in to enter the system, and if the verification is not passed, the administrator is prompted to fail the verification;
and 4, step 4: when the management end and the student end transmit information, the information in the transmission process is encrypted and decrypted.
7. The method of claim 6, wherein the method of verifying the student entry identity at the time of student entry comprises:
step 1.1: carrying out voice signal verification on the student;
step 1.2: and carrying out image signal verification on the student.
8. The method of claim 7, wherein in step 1.1, the method of voice signal verification for student stays performs the steps of: acquiring voice data and identifying the voice data; when the voice data is identified to contain a preset voice password, intercepting the voice password data containing the preset voice password from the voice data; and extracting the voiceprint characteristics of the voice password data, matching the voiceprint characteristics with preset voiceprint characteristics, and if the voiceprint characteristics are successfully matched, passing the verification.
CN201910517598.4A 2019-06-14 2019-06-14 Student-leaving teaching guidance management system and method Pending CN112086099A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910517598.4A CN112086099A (en) 2019-06-14 2019-06-14 Student-leaving teaching guidance management system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910517598.4A CN112086099A (en) 2019-06-14 2019-06-14 Student-leaving teaching guidance management system and method

Publications (1)

Publication Number Publication Date
CN112086099A true CN112086099A (en) 2020-12-15

Family

ID=73734121

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910517598.4A Pending CN112086099A (en) 2019-06-14 2019-06-14 Student-leaving teaching guidance management system and method

Country Status (1)

Country Link
CN (1) CN112086099A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104348625A (en) * 2013-08-08 2015-02-11 新唐科技股份有限公司 Encryption and decryption device and encryption and decryption method thereof
WO2016001657A1 (en) * 2014-07-02 2016-01-07 Validsoft Uk Limited Biometric authentication method and server
CN105450658A (en) * 2015-11-26 2016-03-30 广州多益网络科技有限公司 System login method and device
CN105450665A (en) * 2015-12-30 2016-03-30 宇龙计算机通信科技(深圳)有限公司 Secure login method, secure login device and terminal
CN108076024A (en) * 2016-11-16 2018-05-25 北京京东尚科信息技术有限公司 Data safe processing systems, devices and methods
CN109408002A (en) * 2018-09-10 2019-03-01 上海力自高实业有限公司 A kind of Management System for Clients Information based on cloud storage
CN109784878A (en) * 2019-03-18 2019-05-21 重庆替比网络科技有限公司 A kind of with no paper network test system and method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104348625A (en) * 2013-08-08 2015-02-11 新唐科技股份有限公司 Encryption and decryption device and encryption and decryption method thereof
WO2016001657A1 (en) * 2014-07-02 2016-01-07 Validsoft Uk Limited Biometric authentication method and server
CN105450658A (en) * 2015-11-26 2016-03-30 广州多益网络科技有限公司 System login method and device
CN105450665A (en) * 2015-12-30 2016-03-30 宇龙计算机通信科技(深圳)有限公司 Secure login method, secure login device and terminal
CN108076024A (en) * 2016-11-16 2018-05-25 北京京东尚科信息技术有限公司 Data safe processing systems, devices and methods
CN109408002A (en) * 2018-09-10 2019-03-01 上海力自高实业有限公司 A kind of Management System for Clients Information based on cloud storage
CN109784878A (en) * 2019-03-18 2019-05-21 重庆替比网络科技有限公司 A kind of with no paper network test system and method

Similar Documents

Publication Publication Date Title
WO2018136804A1 (en) End-to-end secure operations from a natural language expression
CN104935429B (en) A kind of data processing method and its system using multi-enciphering
WO2022052630A1 (en) Method and apparatus for processing multimedia information, and electronic device and storage medium
US8959357B2 (en) Biometric encryption and key generation
JP2016511475A (en) Method and system for distinguishing humans from machines
CN110555321B (en) Data processing method and device in intelligent household system and storage medium
US9882719B2 (en) Methods and systems for multi-factor authentication
CN109101801B (en) Method, apparatus, device and computer readable storage medium for identity authentication
CN111883140A (en) Authentication method, device, equipment and medium based on knowledge graph and voiceprint recognition
CN103366745A (en) Method for protecting terminal equipment based on speech recognition and terminal equipment
WO2022116487A1 (en) Voice processing method and apparatus based on generative adversarial network, device, and medium
CN104517066A (en) Folder encrypting method
CN107492153A (en) Attendance checking system, method, work attendance server and attendance record terminal
WO2015196642A1 (en) Data encryption method, decryption method and device
CN113918977A (en) User information transmission device based on Internet of things and big data analysis
CN116110159B (en) User authentication method, device and medium based on CFCA authentication standard
CN108550368B (en) Voice data processing method
CN108416592B (en) High-speed voice recognition method
CN112086099A (en) Student-leaving teaching guidance management system and method
Wu et al. Understanding the tradeoffs in client-side privacy for downstream speech tasks
CN105787313A (en) Cryptosystem and electronic equipment with same
CN111292747B (en) Text automatic voice input system for telephone network
CN108447491B (en) Intelligent voice recognition method
CN112990481A (en) Automatic evaluation method for machine learning model based on block chain
CN111600901A (en) Application authentication method, device, equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20201215