CN102609650A - System and method for realizing software encrypting and downloading in electronic equipment - Google Patents

System and method for realizing software encrypting and downloading in electronic equipment Download PDF

Info

Publication number
CN102609650A
CN102609650A CN2012100251161A CN201210025116A CN102609650A CN 102609650 A CN102609650 A CN 102609650A CN 2012100251161 A CN2012100251161 A CN 2012100251161A CN 201210025116 A CN201210025116 A CN 201210025116A CN 102609650 A CN102609650 A CN 102609650A
Authority
CN
China
Prior art keywords
unit
software
electronic equipment
download
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012100251161A
Other languages
Chinese (zh)
Other versions
CN102609650B (en
Inventor
吴志恒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Unistrong Science & Technology Co., Ltd.
Original Assignee
Shanghai Yiluo Information Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Yiluo Information Science and Technology Co Ltd filed Critical Shanghai Yiluo Information Science and Technology Co Ltd
Priority to CN201210025116.1A priority Critical patent/CN102609650B/en
Publication of CN102609650A publication Critical patent/CN102609650A/en
Application granted granted Critical
Publication of CN102609650B publication Critical patent/CN102609650B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a system for realizing software encrypting and downloading in electronic equipment, which comprises a soft-dog unit, a software unit and a downloading unit, wherein the soft-dog unit and the software unit store original encrypting information; and the downloading unit is connected with the electronic equipment including an exclusive equipment number. The invention also relates to a method for realizing software encrypting and downloading in the electronic equipment by the system; the downloading unit combines the original encrypting information with the exclusive equipment number so as to form an exclusive encrypting equipment identification number; the exclusive encrypting equipment identification number is written in system software downloaded in the electronic equipment, thus, the electronic equipment can judge whether the software is copied illegally according to the exclusive encrypting equipment identification number and the exclusive equipment number so as to realize to both encrypt a software part and bind a hardware part; therefore, the invention effectively prevents equipment which has the same hardware and different software from being upgraded mutually and ensures the equipment not to be copied illegally; the system disclosed by the invention does not need extra hardware cost and is characterized by low cost; and the method disclosed by the invention is characterized by simple and convenient application method and relatively wide application range.

Description

Realize the system and method that software cryptography is downloaded in the electronic equipment
Technical field
The present invention relates to the software encryption technique field, particularly software cryptography download technology field specifically is meant a kind of system and method for realizing that software cryptography is downloaded in the electronic equipment.
Background technology
Electronic equipment appears in the daily life more and more now, such as mobile phone, navigating instrument, PAD etc.These electronic equipments all can be divided into hardware components and software section.These electronic equipments need be burnt to software in the hardware device when dispatching from the factory, and equipment can normally use.But there are some lawless persons to come to duplicate on a large scale hardware components through flight or other illegal measureses.Through fetch equipment software section is read, duplicated on a large scale then, do not need too many technology and fund input, the person drops into very big manpower, exploitation equipment for many years just can to obtain the equipment development, thus infringement equipment development person's intellecture property and interests.
In order to prevent lawless person's abuse, some encryption chips have appearred in the market.Design of electronic devices person can add these encryption chips in design hardware part, and each sheet of encryption chip is all unique and can't duplicate, and therefore can avoid hardware device by bootlegging.But its shortcoming is to add encryption chip significantly to have increased the production cost of equipment, thereby makes the application of this encryption technology of encryption chip receive serious restriction.
Summary of the invention
The objective of the invention is to have overcome above-mentioned shortcoming of the prior art; A kind of extra hardware that need not to increase is provided; Can realize to the encryption of software section and with the binding of hardware components, thereby prevent effectively that hardware is identical but equipment that software is different is upgraded each other, further can limit to each equipment through the equipment unique identifier of distinguishing each equipment; Thereby can effectively prevent bootlegging; Application mode is easy, and is with low cost, and range of application realizes the system and method that software cryptography is downloaded in the electronic equipment comparatively widely.
In order to realize above-mentioned purpose, the system that software cryptography is downloaded in the realization electronic equipment of the present invention has following formation:
It comprises softdog unit, software unit and download unit; Described softdog unit all is connected described download unit with software unit; Described download unit also connects an electronic equipment; Described softdog unit and software unit all store original encryption information, and described software unit also stores system software, and described electronic equipment has unique device number.
The method of utilizing described system to realize that software cryptography is downloaded in the electronic equipment comprises the operation of software cryptography download process, and this software cryptography download process operation may further comprise the steps:
(11) described download unit reads described original encryption information as the first original encryption information from described softdog unit;
(12) described download unit reads described original encryption information as the second original encryption information from described software unit;
(13) whether the more described first original encryption information of described download unit is consistent with the described second original encryption information, if consistent, then gets into step (15), if inconsistent, then gets into step (14);
(14) described download unit is pointed out error message and is withdrawed from this method;
(15) described download unit reads described unique device number from described electronic equipment;
(16) described download unit is combined into unique encryption device identifier with described original encryption information and described unique device number;
(17) described download unit reads described system software from described software unit;
(18) described download unit writes described unique encryption device identifier in the described system software;
(19) described download unit is with described system software and original encryption download of information to the described electronic equipment that has write unique encryption device identifier.
This realizes that described method also comprises the electronic equipment start-up operation in the method for software cryptography download in the electronic equipment, and described electronic equipment start-up operation may further comprise the steps:
(21) described electronic equipment reads described unique encryption device identifier as the first encryption device identifier from described system software;
(22) described electronic equipment is combined into an encryption device identifier as the second encryption device identifier with described original encryption information and described unique device number;
(23) described electronic equipment judges whether the described first encryption device identifier is consistent with the described second encryption device identifier, if consistent, then gets into step (24), if inconsistent, then gets into step (25);
(24) described electronic equipment starts;
(25) described electronic equipment shuts down or reports that this electronic equipment is an illegality equipment.
This is realized in the method for software cryptography download in the electronic equipment, before described software cryptography download process operation, also comprises the systemic presupposition operation, may further comprise the steps:
(01) according to user's operation described original encryption information is write described softdog unit;
(02) according to user's operation described original encryption information is write described software unit.
This realizes that it is further comprising the steps of afterwards that described systemic presupposition operates in described step (02) in the method for software cryptography download in the electronic equipment:
(03) according to user's operation, in described softdog unit, deposits preset encryption device quantity in.
This is realized in the method for software cryptography download in the electronic equipment, and is in the described software cryptography download process operation, further comprising the steps of before in described step (11):
(10) described download unit reads the encryption device quantity in the described softdog unit, and judges whether it is 0, if, then get into step (14), if not, then get into step (11);
In the described software cryptography download process operation, further comprising the steps of afterwards in described step (19):
(20) to reset the encryption device quantity in the described softdog unit be that former quantity subtracts 1 to described download unit.
Adopted the system and method that software cryptography is downloaded in the realization electronic equipment of this invention; Its system comprises softdog unit, software unit and download unit; Softdog unit and software unit all store original encryption information; Download unit connects an electronic equipment, and this electronic equipment has unique device number.In the method for the invention; Download unit is combined into unique encryption device identifier with described original encryption information and described unique device number; And it is write in the system software that downloads to electronic equipment, make electronic equipment can judge whether this system software is bootlegging according to described unique encryption device identifier and unique device number, realize to the encryption of software section and with the binding of hardware components; Prevent effectively that hardware is identical but equipment that software is different is upgraded each other; And assurance equipment can be by bootlegging, and the system and method that software cryptography is downloaded in the realization electronic equipment of this invention need not to increase extra hardware, and application mode is easy; With low cost, range of application is comparatively extensive.
Description of drawings
Fig. 1 is the flow chart of steps of software cryptography download process operation in the method that software cryptography is downloaded in the realization electronic equipment of the present invention.
Fig. 2 is the flow chart of steps of electronic equipment start-up operation in the method that software cryptography is downloaded in the realization electronic equipment of the present invention.
Fig. 3 is the encryption download process process flow diagram of method in practical application that software cryptography is downloaded in the realization electronic equipment of the present invention.
Fig. 4 is the device start process flow diagram of method in practical application that software cryptography is downloaded in the realization electronic equipment of the present invention.
Embodiment
In order more to be expressly understood technology contents of the present invention, the special following examples of lifting specify.
In one embodiment; The system that software cryptography is downloaded in the realization electronic equipment of the present invention comprises softdog unit, software unit and download unit; Described softdog unit all is connected described download unit with software unit, and described download unit also connects an electronic equipment, and described softdog unit and software unit all store original encryption information; Described software unit also stores system software, and described electronic equipment has unique device number.
The method of utilizing the described system of this embodiment to realize that software cryptography is downloaded in the electronic equipment comprises operation of software cryptography download process and electronic equipment start-up operation, and described software cryptography download process operation is as shown in Figure 1, may further comprise the steps:
(11) described download unit reads described original encryption information as the first original encryption information from described softdog unit;
(12) described download unit reads described original encryption information as the second original encryption information from described software unit;
(13) whether the more described first original encryption information of described download unit is consistent with the described second original encryption information, if consistent, then gets into step (15), if inconsistent, then gets into step (14);
(14) described download unit is pointed out error message and is withdrawed from this method;
(15) described download unit reads described unique device number from described electronic equipment;
(16) described download unit is combined into unique encryption device identifier with described original encryption information and described unique device number;
(17) described download unit reads described system software from described software unit;
(18) described download unit writes described unique encryption device identifier in the described system software;
(19) described download unit is with described system software and original encryption download of information to the described electronic equipment that has write unique encryption device identifier.
Described electronic equipment start-up operation, as shown in Figure 2, may further comprise the steps:
(21) described electronic equipment reads described unique encryption device identifier as the first encryption device identifier from described system software;
(22) described electronic equipment is combined into an encryption device identifier as the second encryption device identifier with described original encryption information and described unique device number;
(23) described electronic equipment judges whether the described first encryption device identifier is consistent with the described second encryption device identifier, if consistent, then gets into step (24), if inconsistent, then gets into step (25);
(24) described electronic equipment starts;
(25) described electronic equipment shuts down or reports that this electronic equipment is an illegality equipment.
In a kind of more preferably embodiment, also comprise the systemic presupposition operation in the described method before the operation of software cryptography download process, this systemic presupposition operation may further comprise the steps:
(01) according to user's operation described original encryption information is write described softdog unit;
(02) according to user's operation described original encryption information is write described software unit.
In a progress preferred embodiment, it is further comprising the steps of afterwards that described systemic presupposition operates in described step (02):
(03) according to user's operation, in described softdog unit, deposits preset encryption device quantity in.
In preferred embodiment, in the described software cryptography download process operation, further comprising the steps of before in described step (11):
(10) described download unit reads the encryption device quantity in the described softdog unit, and judges whether it is 0, if, then get into step (14), if not, then get into step (11);
In the described software cryptography download process operation, further comprising the steps of afterwards in described step (19):
(20) to reset the encryption device quantity in the described softdog unit be that former quantity subtracts 1 to described download unit.
In practical application, the system that software cryptography is downloaded in the realization electronic equipment of the present invention mainly comprises softdog unit, download unit, unit, software unit.Above-mentioned each unit comprises following characteristics:
1, the softdog unit has computing power, can calculate the number of devices of having encrypted;
2, the softdog unit has storage capacity, can store original encryption information;
3, comprise original encryption information in the software unit, and headspace storage encryption device identification number;
4, original encryption information in the download unit reading encrypted dog unit and the original encryption information in the software unit contrast, if unanimity then encrypt download;
5, the unique device number in the download unit fetch equipment unit becomes unique encryption device identifier through after the encryption, is stored in the headspace in the software unit;
6, the software unit that will handle of download unit downloads in the equipment, and notice softdog unit subtracts one with quantity wherein;
7, the software in the equipment can remove to read unique encryption device identifier in the headspace when starting; And the unique device number in the unit carried out comparing after the encryption; If it is unanimity then software startup, if inconsistent then explain that this unit is an illegality equipment, the inaccurate startup.
Wherein, the softdog unit can use the blank softdog of often seeing in the market, develops a cover software voluntarily and is stored in the softdog, and the equipment that also can use independent development is developed a cover software above that as the softdog unit.This cover software needs following function and interface at least:
1, can deposit original encryption information A 1 in;
2, can set the number of devices B1 that needs encryption;
3, can the number of devices of need encrypting be subtracted one automatically, if return error message when being zero.
It is following to encrypt the pre-treatment flow process of downloading:
1, in the softdog unit, deposits original encryption information A 1 in;
2, in the softdog unit, deposit the number of devices B1 that needs encryption in;
3, deposit original encryption information A 2 in the software unit in;
4, reserve the space of the unique encryption device identifier D1 of storage in the software unit.
Encrypt and download main treatment scheme, as shown in Figure 3, comprise the steps:
1, download unit reads the number of devices B1 that needs encryption from the softdog unit, if B1 is 0, then withdraws to encrypt and downloads;
2, download unit reads original encryption information A 1 from the softdog unit;
3, download unit reads original encryption information A 2 from software unit;
4, contrast A1 and A2, if identical then continue to download, if difference then withdraw from download;
5, fetch equipment unique identifier C1 in the download unit slave unit unit;
6, equipment unique identifier C1 and original encryption information A 1 are combined into unique encryption device identifier D1;
7, download unit reads in software unit;
8, deposit unique encryption device identifier D1 in reserve in the software unit space;
9, download unit notice softdog subtracts 1 with the number of devices B1 that needs in the softdog unit to encrypt;
The software unit that 10, will deposit D1 in downloads to unit.
11, accomplishing encryption downloads
Through encryption the device start flow process after downloading, as shown in Figure 4, comprise the steps:
1, software unit starts
2, software unit reads unique encryption device identifier D1;
3, software unit fetch equipment unique identifier C1;
4, software unit is combined into unique encryption device identifier D2 with equipment unique identifier C1 and original encryption information A 2;
5, relatively D1 and D2, if identical then continue to start, if difference then shut down or point out illegality equipment.
The equipment that this encryption method of process was handled; If there is the lawless person to take or copy unit through means such as flights; And read the software unit among some equipment E1 through reading software, then this software unit is burnt to unit on a large scale and forms illegality equipment.The software unit of this illegality equipment can read unique encryption device identifier D1 and equipment unique identifier C1, and equipment unique identifier C1 and original encryption information A 2 are combined into unique encryption device identifier D2 when starting.Because unique encryption device D1 is the unique encryption device D1 among some equipment E1, the unique encryption device D2 that calculates with this machine is also inequality, so software unit can normally not start, thus the use of having stopped illegality equipment.
In the unit downloaded software unit first time; Just be written to unique encryption device identifier in the unit; And unique encryption device identifier comprises the equipment unique identifier of the original encryption information of distinguishing unit type and each equipment of differentiation; Therefore download again after or the upgrade software unit time, just need not re-use the softdog unit, can make things convenient for after-sales service and customer upgrade.Simultaneously owing to contain the original encryption information of distinguishing unit type in unique encryption device identifier; Can prevent the identical device unit but the different equipment of software unit is upgraded each other; Even can accomplish to be directed against each equipment through the equipment unique identifier of distinguishing each equipment and limit, thereby make market sale that better dirigibility arranged.
Adopted the system and method that software cryptography is downloaded in the realization electronic equipment of this invention; Its system comprises softdog unit, software unit and download unit; Softdog unit and software unit all store original encryption information; Download unit connects an electronic equipment, and this electronic equipment has unique device number.In the method for the invention; Download unit is combined into unique encryption device identifier with described original encryption information and described unique device number; And it is write in the system software that downloads to electronic equipment, make electronic equipment can judge whether this system software is bootlegging according to described unique encryption device identifier and unique device number, realize to the encryption of software section and with the binding of hardware components; Prevent effectively that hardware is identical but equipment that software is different is upgraded each other; And assurance equipment can be by bootlegging, and the system and method that software cryptography is downloaded in the realization electronic equipment of this invention need not to increase extra hardware, and application mode is easy; With low cost, range of application is comparatively extensive.
In this instructions, the present invention is described with reference to its certain embodiments.But, still can make various modifications and conversion obviously and not deviate from the spirit and scope of the present invention.Therefore, instructions and accompanying drawing are regarded in an illustrative, rather than a restrictive.

Claims (6)

1. system that realizes that software cryptography in the electronic equipment is downloaded; It is characterized in that described system comprises softdog unit, software unit and download unit, described softdog unit all is connected described download unit with software unit; Described download unit also connects an electronic equipment; Described softdog unit and software unit all store original encryption information, and described software unit also stores system software, and described electronic equipment has unique device number.
2. one kind is utilized the described system of claim 1 to realize the method that software cryptography is downloaded in the electronic equipment, it is characterized in that described method comprises the operation of software cryptography download process, may further comprise the steps:
(11) described download unit reads described original encryption information as the first original encryption information from described softdog unit;
(12) described download unit reads described original encryption information as the second original encryption information from described software unit;
(13) whether the more described first original encryption information of described download unit is consistent with the described second original encryption information, if consistent, then gets into step (15), if inconsistent, then gets into step (14);
(14) described download unit is pointed out error message and is withdrawed from this method;
(15) described download unit reads described unique device number from described electronic equipment;
(16) described download unit is combined into unique encryption device identifier with described original encryption information and described unique device number;
(17) described download unit reads described system software from described software unit;
(18) described download unit writes described unique encryption device identifier in the described system software;
(19) described download unit is with described system software and original encryption download of information to the described electronic equipment that has write unique encryption device identifier.
3. the method that software cryptography is downloaded in the realization electronic equipment according to claim 2 is characterized in that described method also comprises the electronic equipment start-up operation, and described electronic equipment start-up operation may further comprise the steps:
(21) described electronic equipment reads described unique encryption device identifier as the first encryption device identifier from described system software;
(22) described electronic equipment is combined into an encryption device identifier as the second encryption device identifier with described original encryption information and described unique device number;
(23) described electronic equipment judges whether the described first encryption device identifier is consistent with the described second encryption device identifier, if consistent, then gets into step (24), if inconsistent, then gets into step (25);
(24) described electronic equipment starts;
(25) described electronic equipment shuts down or reports that this electronic equipment is an illegality equipment.
4. the method for downloading according to software cryptography in claim 2 or the 3 described realization electronic equipments is characterized in that, in the described method, before described software cryptography download process operation, also comprises the systemic presupposition operation, may further comprise the steps:
(01) according to user's operation described original encryption information is write described softdog unit;
(02) according to user's operation described original encryption information is write described software unit.
5. the method that software cryptography is downloaded in the realization electronic equipment according to claim 4 is characterized in that it is further comprising the steps of afterwards that described systemic presupposition operates in described step (02):
(03) according to user's operation, in described softdog unit, deposits preset encryption device quantity in.
6. the method that software cryptography is downloaded in the realization electronic equipment according to claim 4 is characterized in that, and is in the described software cryptography download process operation, further comprising the steps of before in described step (11):
(10) described download unit reads the encryption device quantity in the described softdog unit, and judges whether it is 0, if, then get into step (14), if not, then get into step (11);
In the described software cryptography download process operation, further comprising the steps of afterwards in described step (19):
(20) to reset the encryption device quantity in the described softdog unit be that former quantity subtracts 1 to described download unit.
CN201210025116.1A 2012-02-06 2012-02-06 Realize the system and method that in electronic equipment, software cryptography is downloaded Active CN102609650B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210025116.1A CN102609650B (en) 2012-02-06 2012-02-06 Realize the system and method that in electronic equipment, software cryptography is downloaded

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210025116.1A CN102609650B (en) 2012-02-06 2012-02-06 Realize the system and method that in electronic equipment, software cryptography is downloaded

Publications (2)

Publication Number Publication Date
CN102609650A true CN102609650A (en) 2012-07-25
CN102609650B CN102609650B (en) 2016-08-03

Family

ID=46527011

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210025116.1A Active CN102609650B (en) 2012-02-06 2012-02-06 Realize the system and method that in electronic equipment, software cryptography is downloaded

Country Status (1)

Country Link
CN (1) CN102609650B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103425910A (en) * 2013-07-31 2013-12-04 福建天晴数码有限公司 Method for detecting if function being illegally called in procedure
CN105975272A (en) * 2016-05-05 2016-09-28 北京元心科技有限公司 Method and system for generating unique device number of device
CN106650325A (en) * 2016-10-14 2017-05-10 杭州优稳自动化系统有限公司 Software platform management method based on softdog
CN107526947A (en) * 2017-09-26 2017-12-29 重庆市珞宾信息技术有限公司 A kind of embedded software active control method
CN107609415A (en) * 2017-09-26 2018-01-19 重庆市珞宾信息技术有限公司 A kind of equipment Serial Number write protection method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1595364A (en) * 2003-09-12 2005-03-16 联华电子股份有限公司 System and method for detecting illegal software loading by using hardware and used chips thereof
CN101082950A (en) * 2007-07-10 2007-12-05 侯同济 Software encrypting registration piracy-preventing method
CN101414263A (en) * 2007-10-17 2009-04-22 鸿富锦精密工业(深圳)有限公司 Storage medium, software installation method and anti-pirate module
CN101661545A (en) * 2009-09-22 2010-03-03 江汉大学 Anti-pirate method and device for software capable of unloading and reinstalling

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1595364A (en) * 2003-09-12 2005-03-16 联华电子股份有限公司 System and method for detecting illegal software loading by using hardware and used chips thereof
CN101082950A (en) * 2007-07-10 2007-12-05 侯同济 Software encrypting registration piracy-preventing method
CN101414263A (en) * 2007-10-17 2009-04-22 鸿富锦精密工业(深圳)有限公司 Storage medium, software installation method and anti-pirate module
CN101661545A (en) * 2009-09-22 2010-03-03 江汉大学 Anti-pirate method and device for software capable of unloading and reinstalling

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103425910A (en) * 2013-07-31 2013-12-04 福建天晴数码有限公司 Method for detecting if function being illegally called in procedure
CN103425910B (en) * 2013-07-31 2016-09-07 福建天晴数码有限公司 The detection method that in program, whether function is illegally called
CN105975272A (en) * 2016-05-05 2016-09-28 北京元心科技有限公司 Method and system for generating unique device number of device
CN106650325A (en) * 2016-10-14 2017-05-10 杭州优稳自动化系统有限公司 Software platform management method based on softdog
CN106650325B (en) * 2016-10-14 2019-07-05 杭州优稳自动化系统有限公司 A kind of software platform management method based on softdog
CN107526947A (en) * 2017-09-26 2017-12-29 重庆市珞宾信息技术有限公司 A kind of embedded software active control method
CN107609415A (en) * 2017-09-26 2018-01-19 重庆市珞宾信息技术有限公司 A kind of equipment Serial Number write protection method

Also Published As

Publication number Publication date
CN102609650B (en) 2016-08-03

Similar Documents

Publication Publication Date Title
US10936719B2 (en) Preserving trust data during operating system updates of a secure element of an electronic device
CN105900104B (en) Applet migration in safety element
CN105760716B (en) Digital certificates management
EP2988470B1 (en) Automatic purposed-application creation
EP1601214B1 (en) Information terminal device and content backup method
EP2628125B1 (en) Method and apparatus for downloading drm module
CN105993018B (en) Content item encryption in mobile device
CN106843978B (en) SDK access method and system
CN102609650A (en) System and method for realizing software encrypting and downloading in electronic equipment
CN105279684A (en) System and method for safely transferring electronic ticket through near field communication technology
CN103365682A (en) Information handling device and information handling method
CN107103211A (en) SDK is sent, using issue, using operation method and device
CN106020868B (en) A kind of smart card firmware update and system
JP2009237930A (en) Application transfer system, and application transfer method and program
EP3365822B1 (en) Managing application specific feature rights
CN107957887A (en) A kind of component loading method of equipment, device and Internet of things system
CN110046000A (en) Small routine operation method and device
US9124664B1 (en) Distributing multi-platform content
CN109361806A (en) Black number storage method, black number mark method, system and device
US9913080B2 (en) Method and apparatus for automatic wireless data transfer
CN107124446A (en) Application program method for down loading, server and terminal
CN104918234B (en) A kind of mobile phone wallet client and its application processing method and terminal device
CN107506386A (en) A kind of data aggregation method based on NAS, device, terminal device and storage medium
CN110399160B (en) Channel package packaging method, device, server and storage medium
JP2014219837A (en) Information processing system, information processing device, information processing program, and data providing method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C41 Transfer of patent application or patent right or utility model
CB03 Change of inventor or designer information

Inventor after: Wu Zhiheng

Inventor after: Liu Dan

Inventor before: Wu Zhiheng

COR Change of bibliographic data
TA01 Transfer of patent application right

Effective date of registration: 20160406

Address after: 100086 Beijing City, Haidian District Zhichun Road No. 118 building room 1501

Applicant after: Beijing Unistrong Science & Technology Co., Ltd.

Address before: 200233 Shanghai City, Xuhui District Road No. 159 12 Tianzhou unit 2 floor

Applicant before: Shanghai Yiluo Information Science and Technology Co., Ltd.

C14 Grant of patent or utility model
GR01 Patent grant