CN102638444A - Network terminal type construction method and network terminal type construction system for application software - Google Patents

Network terminal type construction method and network terminal type construction system for application software Download PDF

Info

Publication number
CN102638444A
CN102638444A CN2011101662509A CN201110166250A CN102638444A CN 102638444 A CN102638444 A CN 102638444A CN 2011101662509 A CN2011101662509 A CN 2011101662509A CN 201110166250 A CN201110166250 A CN 201110166250A CN 102638444 A CN102638444 A CN 102638444A
Authority
CN
China
Prior art keywords
application software
software
msn
frame
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011101662509A
Other languages
Chinese (zh)
Inventor
吴东辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN2011101662509A priority Critical patent/CN102638444A/en
Publication of CN102638444A publication Critical patent/CN102638444A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)
  • Stored Programmes (AREA)

Abstract

The invention relates to the fields of software, software service modes, networks and the like, in particular to a network terminal type application service mode of the application software. The method and the system have the advantages that interaction among application software users can be realized so as to form a learning mechanism among users, a customer service system of the application software can also be formed, registered users and users in encryption lock can be interchanged or used simultaneously, and the application software can be charged according to time, times, service class or the like by means of network authorization. Simultaneously, the invention further provides a network authorization and encryption method for the application software. As traditional instant communication software at present does not have screen operating records and a transmission function, the invention further provides a screen capture operation process and a transmission method, so that small files can be generated to facilitate network transmission, and software use method can be effectively demonstrated.

Description

The network terminal formula building method and the system of application software
Technical field
The present invention relates to fields such as software, software service mode, network, particularly relate to the network terminal formula application service model of application software.
Background technology
Plurality of applications software is the standalone version pattern at present; Make software, building calculation amount software, construction budget software, building data software, engineering project software etc. like CAD software, image processing software, word processor, data processing software, webpage and website; Application software is divided again and is encrypted and cipher mode not; Cipher mode has hardware encipher and software cryptography; Hardware encipher generally uses encryption lock, is commonly called as softdog, and software cryptography is generally bound to calculate through sequence number, MAC (Media Access Control) address etc. and encrypted.Owing to these standalone version application software are the programs in order to realize that a certain function is worked out, no network communication function is so can't realize between the user exchanging.At present, application software does not have the encryption method on wide area network yet, and the present invention also provides the network authorization and the encryption method of application software simultaneously.Network instant communication software is ripe software and application; Be IM (Instant Messaging) technology, be based on the bitcom of TCP/UDP agreement, like QQ, MSN etc.; MSN can provide the interchange between the user, like dialogue, screenshotss, Long-distance Control etc.MSN has mode, FLASH mode of terminal type, embedded web page etc.In addition, present MSN does not all write down the transmitting function of recording of screen operator process, the method that the present invention also provides a kind of screen operator record simultaneously and transmits.
Ripe software that can logger computer screen operator process is arranged at present, generally generate the avi file, can other form of boil down to; Like forms such as MPEG, WMV, RM, the purpose of logger computer screen operator generally be for impart knowledge to students, screen supervision etc., there is the big shortcoming of recording capacity in this recording mode; Generally for the screen operator record, particularly impart knowledge to students, the beholder only is concerned about the crucial time point of operation; As click the mouse, operation such as input keyboard; To all the other most of screen displays and be indifferent to,, perhaps only grasp needed key frame and combine the analog mouse operation to express recording process so to propose with the screen operator be record and the method for transmission of screen operator of trigger condition in the present invention; Adopt ripe gif file form or Flash file format; Only generate screen operator useful information file, file size is very little, is fit to network and transmits.GIF (Graphics Interchange Format) file format is " graphic interchange format "; Being CompuServe company at the image file format of exploitation in 1987, is a kind of nondestructive compression type of the continuous tone based on lzw algorithm, and its compression ratio is generally about 50%; It does not belong to Any Application; Present nearly all related software is all supported it, and the public sphere has a large amount of software using the GIF image file, and the data of GIF image file are through overcompression; And be to have adopted compression algorithms such as variable-length; So the picture depth of GIF from 1bit to 8bit, also is the image that GIF supports 256 kinds of colors at most, another characteristics of GIF form are that it can deposit several coloured images in a gif file; If read and be shown on the screen by the width of cloth being stored in the multiple image data in the file, just can constitute the simplest a kind of animation.Above-mentioned gif file is a pixel image, and image expression power is not as Flash, and the Flash file format also is the mature technique scheme; Flash is a vector image; Utilize mathematical formulae to calculate, can quality not descend so image amplifies also, the Flash animation is " animation between shade+benefits+pursue frame animation "; Flash is specially adapted to create the content that provides through Internet, because its file is very little.The Flash file generates can utilize Flash generator or module, also can utilize the animation of generation of activex control or broadcast flash form, for example the mode of invoke script program.
Summary of the invention
For the application software user can be exchanged mutually; The network authorization method that also provides simultaneously a kind of software to use; The present invention provides a kind of network terminal formula building method and system of application software, makes between the application software user and can exchange mutually on the one hand, like dialogue, screenshotss, Long-distance Control etc.; Also can link up with the attendant of software supplier; Through the register account number use of obtaining the authorization, form another kind of registed authorization pattern and business model except that encryption lock on the other hand, perhaps the mode of encryption lock and number of registration use arranged side by side.The benefit of using encryption lock is that software can break away from the network use; It is a kind of mandate of online mode that network registry uses, and must will under the online situation of network, land the right to use that obtains application software through number of the account; As commercial application; Keep existing encryption lock and use the user, encryption lock uses the user to obtain network registry number automatically and uses the network communication function, and the network registry user can obtain encryption lock through paying and use to realize off-grid.
The technical scheme that the present invention adopts is: 1, application software connects MSN, promptly starts work simultaneously, and the instant messaging number is software user's identification number.2, instant messaging module embeds in the application software, and MSN is as part of an application software or application software part as MSN.3, connect application software and MSN through a control cooperative module; The control cooperative module is responsible for the exchanges data between application software and the MSN, can realize through interface and interface function that application software developer and MSN developer provide separately.4, realize connecting and service through third party's communicator, software vendor only is responsible for software provisioning, and communicator is responsible for instant communication function, through binding the instant messaging number, forms the applied environment that is connected with application software.In the such scheme, can directly use encryption lock number identification number as the software user for the situation that encryption lock is arranged.The MSN that the present invention connects can be terminal type also can be the form that is nested on the webpage.Application software of the present invention can be also can not encrypting of encrypting, and software user's identification number can be the IMU signal, or the pet name, or MAC Address, or the IP address, or binds number.The licensing process of application software is such: in the application software compilation process, pass point is set; Constantly send reading command during the application software operation; Reading command is sent to server through network, at server end the authorization control module is arranged, and the authorization control module calculates the corresponding to return data of the instruction of sending here with application software according to AES; Return data is sent to application software through network, and software is authorized to use.Communications protocol can be a Transmission Control Protocol, also can be udp protocol.Concrete AES is exemplified below: AES is unpredictable, irreversible, and AES can become an integer to a numeral or character transformation, and a house dog program generally is set in program; Such as there being such one in one section application program: A=Fx (3); Program will obtain the value of variables A according to constant 3, can rewrite original program like this: A=Fx (DogConvert (1)-12342) just constant 3 can not occur in the original program so; And get with DogConvert (1)-12342; Like this, the person knows that just the actual constant that calls is 3 to have only the software programming, and if can not get the server for encrypting algorithm; The DogConvert function just can not return correct result, and formula A=Fx (DogConvert (1)-12342) result certainly can be incorrect yet as a result.Concrete encryption method has following mode:
A: application software in the middle of the process of operation constantly through api function to server send instructions judge return instruction that the authorization privilege of application software, application software can not get server then authorization portions can not move.The algorithm factor or the formula of server control of authority module are set by the software developer.
B: with computer hardware fingerprint (CPU ID, hard disk ID, mainboard ID, MAC Address, BIOS sequence number etc.) upload server, calculate, realize unique binding of application software and computer through server for encrypting.When adopting this cipher mode, can in AES, add the limit subfactor of the time limit factor or access times, application software can use or use certain number of times by off-grid in certain time limit like this.
C: the table name of database, field name etc. are write server end, when realizing in the program code, show and field the protected data storehouse with the variable format performance to database table and field operations.
D: put into server end to a source code part and carry out, generally can not be too big, segmentation can not be too many, otherwise influence running software speed.
E: introducing time factor t, be provided with and encrypt formula A=Fx (t), is the function of time, in application software, implants and encrypts formula; When application software is moved, produce numerical value A with the regular hour, encrypt formula at server end also operation simultaneously, as long as time factor t is consistent, the numerical value A of generation is just consistent; Use the numerical value that produces from the numerical value of server and application software oneself to compare like this, if unanimity then application software are normally moved, here time t has certain error, can solve through the error adaptive technique; Be that error is followed the tracks of, promptly the each time error Δ t that takes place of record revises with time error delta t, certainly then; General selection minimum interval is 1 second, if select time is enough big at interval, as selects 1 minute; Or several minutes, or longer, then the time factor of occurrence of errors can be littler; Perhaps error disappears, and base carries out synchronously when particularly adopting a standard, and then the time error in some levels is zero.Further, be provided with encrypt formula A=Fx (t, n), n be user's sequence number, and user's sequence number also as the encryption factor, can be distinguished the user of different rights like this and come, and can encrypt separately, user's sequence number can number be bound with network registry.Further, (q), wherein q is the function privilege parameter, so not only can distinguish different users, and can carry out control of authority to different user for t, n encryption formula A=Fx to be set.In the same way, encrypt formula and can be set to A=Fx (t, parameter n), each parameter can be carried out permutation and combination.Use in order to satisfy off-grid; A kind of encryption lock of the special proposition of the present invention based on time factor, its principle such as above-mentioned scheme, just the enciphered data with encryption lock alternative server end produces; It is characterized in that: a hardware unit is arranged; Have at least data to produce the parts or the chip of condition in the hardware unit, data generation value is based on the time variation at least and produces, and data generation value connects like USB or wireless signal or infrared connection computer system through lead.
A kind of network terminal formula building method of application software and network authorization, the encryption method of system, it is characterized in that: client application software and server carry out exchanges data, and the operation of client application software depends on the result with the server swap data.Said method step is: in the application software compilation process, pass point is set, sends the instruction request data to server during running software to pass point, server returns corresponding data according to request instruction, and application software obtains the operation of return data continued.
A kind of network terminal formula building method and system of application software; It is characterized in that: application software is connected with MSN or module; Or MSN or module embedding application software; Or application software link MSN, or application software is connected through cooperative module with MSN.
The network terminal formula building method and the system of said application software is characterized in that: client application software and server carry out exchanges data, and the operation of client application software depends on the result with the server swap data.
The network terminal formula building method and the system of said application software is characterized in that: the instant messaging service is provided by the third party.
The network terminal formula building method and the system of said application software, it is characterized in that: application software is sent reading command, returns back to application software by the server response and with AES.
The network terminal formula building method and the system of said application software; Said method step is: in the application software compilation process, pass point is set; Send the instruction request data to server during running software to pass point; Server returns corresponding data according to request instruction, and these data calculate by AES, and application software obtains the operation of return data continued.
The network terminal formula building method and the system of said application software is characterized in that: MSN or module have the program of record screen operator process, and this program is intercepted and captured the images displayed sequence data from the bottom layer driving layer; Be frame data; Record is also preserved frame data, comprises the key frame sequence in the frame data, generates the picture file form with the key frame sequence; Or gif file form, or Flash file format.
The network terminal formula building method and the system of said application software is characterized in that: be provided with the operation note button in MSN or the module, the beginning back starts logging program, is sent to the other side after the end automatically.
The network terminal formula building method and the system of said application software is characterized in that: application software is architectural design software or product design software or building calculation amount software or construction budget software or building data software.
The method that the present invention also provides a kind of screen operator record simultaneously and transmits; The method of screen printing operating process just and transmission; In order to realize record to the computer screen operating process, give up irrelevant or unessential procedural information, generate smaller file so that transmit through network; Technical scheme of the present invention is: A, at first record frame; Form the frame sequence file, extract the operation of key frame (Key frame) then according to the action triggers of input equipment (mouse, keyboard etc.), form the key frame sequential file at last; Perhaps B, directly trigger the operation of catching present frame according to the action of input equipment (mouse, keyboard etc.), and with present frame as key frame, form the key frame sequential file at last; Perhaps C, stabilized screen arbitrary stabilizer frame in the time period in the leaching process successively; And these stabilizer frames as key frame, form the key frame sequence, obtain the mouse position coordinate information from the bottom mouse-driven simultaneously; And the coordinate information during record mouse; Make a virtual mouse sign image, when forming gif file or Flash file, the mouse coordinates position of virtual mouse sign image according to record is superimposed upon on the corresponding key frame picture, so just can represent the operating process of screen.Through the key frame sequential file of A or B or the formation of C method is handled, generate the compressed format picture, or animation file such as gif file form; Or Flash file format (suffix is called SWF), animation file can be used for the display operation process, also can carry out network to the file that generates and transmit; The demonstration that can be applicable to the MSN screen operator transmits; Specifically can in MSN, add an operation note button, the beginning back starts logging program, is sent to the other side after the end automatically.Operation to screen refers to utilize input equipment that computer is operated, input equipment such as mouse, keyboard, touch-screen, writing pen, camera or the like.
The present invention's screen operator record and the method that transmits is characterized in that: intercept and capture the images displayed sequence data from the bottom layer driving layer, record is also preserved frame data, generates the picture file form with frame data, or the gif file form, or the Flash file format.
Screen operator record and the method that transmits as stated, it is characterized in that: the action with input equipment in the record screen operator process is a trigger condition, extracts key frame or catches the step of present frame.
Screen operator record and the method that transmits as stated, it is characterized in that: the action with input equipment in the record screen operator process is a trigger condition, inserts the frame processed steps after extracting the key frame sequence or extracting key frame.
Screen operator record and the method that transmits as stated; It is characterized in that: extract sometime the section stabilizer frame as key frame; Write down mouse coordinates position during time point generation mouse action incident in this in latter stage one time period; In the key frame that is extracted, stack virtual mouse sign image on the mouse coordinates position when the mouse action incident takes place.
Screen operator record and the method that transmits as stated, it is characterized in that: input equipment is mouse and keyboard.
Screen operator record and the method that transmits as stated, it is characterized in that: said method and step application are provided with an operation note button in MSN in MSN, and link startup logging program in beginning back is sent to the other side automatically after the end.
The invention has the beneficial effects as follows: can exchange each other between the application software user; Form the study mechanism between the user; Also can form the customer service system of application software; Registered user and encryption lock user can exchange or use simultaneously, through the mode of network authorization, and can be to using software by the time charge or press the number of times charge or press service type charge etc.Simultaneously, the present invention also provides the network authorization and the encryption method of application software.Traditional MSN does not have screen operator record and transmitting function at present; The method that the present invention also provides a kind of screen printing operating process simultaneously and transmits; Smaller file can be generated so that transmit, so effectively the demoware method for using through network.Relatively difficulty is used in present numerous application software study; And in use need the help of software vendor, like architectural design software, product design software, building calculation amount software, construction budget software, building data software etc., the user presses for to grasp and uses; Traditional mode is to participate in training and learning; Professor's business personnel services etc. consume lot of manpower and material resources, adopt scheme of the present invention not only can concentrate customer service strength but also can make and learn each other between the user; Also can form the virtual teacher-student relationship between the user; And formulate commercial deduction scheme by Application Software Provider, and form business personnel's identity of user, combine website formation industry business platform.
Description of drawings
Fig. 1 connects MSN service mode sketch map for application software of the present invention.
Fig. 2 embeds the application software service pattern diagram for instant messaging module of the present invention.
Fig. 3 connects the application software service pattern diagram for MSN of the present invention through the control cooperative module.
Fig. 4 uses flow chart for client application software of the present invention.
Fig. 5 is a client application software encryption method sketch map of the present invention.
Fig. 6 connects the application software service pattern diagram for the present invention through third party's communicator.
Fig. 6 a is application software link third party MSN service mode sketch map of the present invention.
Fig. 7 passes through third party's communicator service mode client terminal start-up process sketch map for client application software of the present invention.
Fig. 8 transmits the method sketch map of enciphered data through third party's communicator for client application software of the present invention.
Fig. 9 passes through third party's communicator method of encrypting sketch map for client application software of the present invention.
Figure 10 is a kind of method outline flowchart of screen printing operating process.
Figure 11 is the extraction key frame sketch map of the method for screen printing operating process.
Figure 12 is the flow chart that the generation picture file of the method for screen printing operating process also transmits.
Figure 13 is the flow chart of generation gif file of the method for screen printing operating process.
Figure 14 is the flow chart of the nearly Flash file of generation of the method for screen printing operating process.
Figure 15 directly catches the flow chart that frame generates picture file and transmits for being triggered by input equipment of method of screen printing operating process.
Figure 16 directly catches the flow chart that frame generates gif file for being triggered by input equipment of method of screen printing operating process.
Figure 17 directly catches the flow chart that frame generates the Flash file for being triggered by input equipment of method of screen printing operating process.
Figure 18 is for the extraction stabilizer frame of the method for screen printing operating process and generate animation or the flow chart of picture.
Figure 19 is extraction stabilizer frame and record mouse and the flow chart of synthetic animation or picture of the method for screen printing operating process.
Embodiment
Below in conjunction with accompanying drawing and embodiment the present invention is further specified.
Fig. 1 connects MSN service mode sketch map for application software of the present invention.Client connects MSN by application software and forms; And connection internet; Server end is a core with instant messaging service IM service module; Connect registration management module, authority management module, upgrade service module, messenger service module, teaching service module, customer service module, marketing balance administration module, and connect corresponding site for service; The IM service module is responsible for the instant messaging service; The bottom communication is based on ICP/IP protocol; File transfer can be based on udp protocol, and message can be write with VC++, c, Delphi based on P2P technology (point-to-point) between the client; Can be mature technique and application also based on any platform and language; The registration management module is responsible for registration of client MSN and management; The control of authority module is responsible for controlling the rights of using of client application software, and generally the exchange through AES data between the server and client side realizes; The upgrade service module is responsible for the upgrade tip and upgrading download service of application software; The messenger service module is responsible for great adjustment, trade information, notice of software etc.; The teaching service module is responsible for the teaching of application software, like exemplary method of operation, industry teaching, books introduction etc.; Customer service module realizes that through MSN Application Software Provider technical staff and client directly link up, and answers the software operation problem in real time, accepts client bug feedback etc.; These functional modules can be related with site for service, and site for service is responsible for the realization of prior aries such as customer service, customer communication, forum, blog, microblogging, company's site, ecommerce and scheme; The marketing balance administration module is responsible for the marketing balance management, can adopt prior art schemes such as e-Bank payment, phone-payment, phonecard payment, the payment of some card, handset customization service payment, the payment of Q coin.With upper module and software can all be mature technique and application based on any platform and language.Technical characterictic of the present invention is: client connects MSN by application software and forms.
Fig. 2 embeds the application software service pattern diagram for instant messaging module of the present invention.Basic identical with service mode shown in Figure 1, different is that instant communication function is to adopt the instant messaging module is embedded application software, and advantage is that instant messaging module and application software can be carried out the data contact at bottom, and the function setting flexibility is big.Technical characterictic of the present invention is: the instant messaging module embeds application software and forms client.
Fig. 3 connects the application software service pattern diagram for MSN of the present invention through the control cooperative module.Basic identical with service mode shown in Figure 1; Different is that MSN is connected through a control cooperative module with application software; The control cooperative module is responsible for exchanging the exchanges data between MSN and the application software; Realize that registration login, the enciphered data of application software on server exchanges transmission, rights management etc.; Generally be applicable to the MSN that the third party develops, can realize data interchange through interface and interface function that application software developer and MSN developer provide separately.Technical characterictic of the present invention is: MSN and application software are connected through a control cooperative module, control interface that cooperative module provides through application software developer and MSN developer separately and interface function and call and transmit data.
Fig. 4 uses flow chart for client application software of the present invention.After client software starts, at first network is detected, if network is not online then encryption lock is detected, application software is normally moved if encryption lock exists, if detect less than encryption lock then the application software off-grid uses trial edition; The Connection Service device if network is online; In Connection Service device process, once more encryption lock is detected; Confirm the normal operation of application software if encryption lock exists and extract encryption lock number as the service of number of registration log-in instant communication; This number of registration is bound corresponding one number or numbering in the instant messaging service automatically, so this number of registration can be revised as the pet name arbitrarily by the user; If encryption lock does not exist, then step 1, with anonymous visitor's identity logon server, can online use trial edition, can watch corresponding network activity form, like chat content of chatroom etc.; Step 2, for the registered user; Then import account number cipher; Number of the account is instant messaging service registry number, if password authentification correctly then judge the application software rights of using by server end control of authority module, according to client's rights of using; Server end and client are carried out normal use or the authorization portions use that the AES exchanges data realizes client application software, and MSN or module get into user mode simultaneously; If authority is judged as registration but unauthorized user then get into step 3; Step 3, can online registration become the registered user, the registered user can online use trial edition and is used the function of MSN or module simultaneously; MSN or module have all functions of existing instant messaging service; Like chat, voice, video, build crowd, remote assistance etc.; Simultaneously all right associating web pages, blog etc.; The present invention provides a kind of method of screen operator screenshotss simultaneously in addition, and this is the existing unexistent function of MSN.Can set up the industry crowd through the MSN service, the chatroom is provided with virtual teacher-student relationship, and virtual service person's system is set, and sets up the deduction system, forms and sells business platform.Certainly, for the application software that does not adopt the encryption lock scheme, in above flow process, only need step 1, step 2, step 3.Characteristic of the present invention is to comprise following steps: after the client software operation step that detects network is arranged, the step that detects encryption lock is arranged, the step of extracting the encryption lock identification number is arranged, the step of Connection Service device is arranged, the step that starts MSN or module is arranged.
Fig. 5 is a client application software encryption method sketch map of the present invention.At the software vendor server end, the control of authority module has the authorize clients database, and general record client's sequence number, number of registration, the pet name, authorization code etc. generate authorization code based on these data, and authorization code carries out encryption by AES; After the client online, with number of registration or identification number logon server, at this moment unique number of registration of this client and server end or identification number are set up link; And generation exchanges data; Client application sends reading command, and server end is to commanded response, and returns the corresponding data of AES; At this moment application software can normally be moved, otherwise stops or prompting.Concrete encryption method has following mode:
A: application software in the middle of the process of operation constantly through api function to server send instructions judge return instruction that the authorization privilege of application software, application software can not get server then authorization portions can not move.The algorithm factor or the formula of server control of authority module are set by the software developer.It is characterized in that: in the application software running pass point is set, sends instruction through api function to server at pass point, return corresponding data behind the server response instruction, these data calculate by AES.
B: with computer hardware fingerprint (CPU ID, hard disk ID, mainboard ID, MAC Address, BIOS sequence number etc.) upload server, calculate, realize unique binding of application software and computer through server for encrypting.When adopting this cipher mode, can in AES, add the limit subfactor of the time limit factor or access times, application software can use or use certain number of times by off-grid in certain time limit like this.It is characterized in that: client has and reads the program module that the computer hardware fingerprint is an arrangement components information, and these information are reached the step of server, and server calculates these information, and result of calculation is passed to the step of client.
C: the table name of database, field name etc. are write server end, when realizing in the program code, show and field the protected data storehouse with the variable format performance to database table and field operations.It is characterized in that: database is arranged in the client application software; Database table and field show with variable format; The table name of database, field name etc. are write server end; When Application Software Program is operated database table or field, be to send instruction to server with variable format, the table name of invoking server end and field name.
D: put into server end to a source code part and carry out, generally can not be too big, segmentation can not be too many, otherwise influence running software speed.It is characterized in that: the Application Software Program code segmentation is placed on server end and client respectively, and these segmentations couple together and form complete Application Software Program.
E: introducing time factor t, be provided with and encrypt formula A=Fx (t), is the function of time, in application software, implants and encrypts formula; When application software is moved, produce numerical value A with the regular hour, encrypt formula at server end also operation simultaneously, as long as time factor t is consistent, the numerical value A of generation is just consistent; Use the numerical value that produces from the numerical value of server and application software oneself to compare like this, if unanimity then application software are normally moved, here time t has certain error, can solve through the error adaptive technique; Be that error is followed the tracks of, promptly the each time error Δ t that takes place of record revises with time error delta t, certainly then; General selection minimum interval is 1 second, if select time is enough big at interval, as selects 1 minute; Or several minutes, or longer, then the time factor of occurrence of errors can be littler; Perhaps error disappears, and base carries out synchronously when particularly adopting a standard, and then the time error in some levels is zero.Further, be provided with encrypt formula A=Fx (t, n), n be user's sequence number, and user's sequence number also as the encryption factor, can be distinguished the user of different rights like this and come, and can encrypt separately, user's sequence number can number be bound with network registry.Further, (q), wherein q is the function privilege parameter, so not only can distinguish different users, and can carry out control of authority to different user for t, n encryption formula A=Fx to be set.In the same way, encrypt formula and can be set to A=Fx (t, parameter n), each parameter can be carried out permutation and combination.It is characterized in that: client is constantly sent command request server response verification value, and this validation value is that server calculates by AES, and this validation value is based on the time variation at least and produces, and is the function of time.Use in order to satisfy off-grid; A kind of encryption lock of the special proposition of the present invention based on time factor, its principle such as above-mentioned scheme, just the enciphered data with encryption lock alternative server end produces; It is characterized in that: a hardware unit is arranged; Have at least data to produce the parts or the chip of condition in the hardware unit, data generation value is based on the time variation at least and produces, and data generation value connects like USB or wireless signal or infrared connection computer system through lead.
Fig. 6 connects the application software service pattern diagram for the present invention through third party's communicator.In this service mode; Application Software Provider need not provide the instant messaging service; The instant messaging service is given the communicator of specialty and is accomplished; Application Software Provider connects each functional module such as registration management module, control of authority module, upgrade service module, messenger service module, teaching module, customer service module, marketing balance module, webpage with operation maintenance center; Communicator increases the cooperation with service center except that original IM service module or system; So that carry out exchanges data with software vendor; Application Software Provider server side operation maintenance centre and contact of communicator cooperation with service center and swap data, these data comprise the binding of client's identifier and instant messaging service number, applied environment loading datas such as Application Software Provider customer service, exchange of technology crowd, chatroom, specific function.Here customer end adopted connects the mode of application software and MSN through a control cooperative module; So relatively help collaborative third party's communicator; The control cooperative module is responsible for the exchanges data between application software and the MSN, can realize through interface and interface function that application software developer and MSN developer provide separately.The pattern or the instant messaging module that can certainly adopt application software to connect MSN embed the pattern in the application software.Communicator also be responsible for to be transmitted the enciphered data of Application Software Provider and client contacts, i.e. routing function, and the forwarding of enciphered data can be based on Transmission Control Protocol, also can be based on udp protocol.Certainly enciphered data can not transmitted through communicator yet yet, and the enciphered data exchange is directly carried out between the Application Software Provider server and client side, and communicator only is responsible for the service of instant messaging aspect.It is characterized in that: client is connected to form through interface and interface function by application software and MSN, or client application software link MSN is formed client MSN login connection third party instant communication server.
Fig. 6 a is application software link third party MSN service mode sketch map of the present invention.In this service mode; Application Software Provider need not provide the instant messaging service; The instant messaging service is given the communicator of specialty and is accomplished; Application Software Provider connects registration management module, control of authority module, upgrade service module, messenger service module, teaching module, marketing balance module, webpage, client application environment with operation maintenance center, and the client application environment is meant the client environment software that can download that software vendor provides or parameter is set, and a kind of customization instant communication client software is provided; Purpose is for the online service that is fit to application software and the mandate cryptographic services of application software; The process that loads is actual to be exactly that former MSN is transformed or upgraded, and increases control or link, to reach the purpose at transformation MSN function and interface; Communicator increases the cooperation with service center except that original IM service module or system; So that carry out exchanges data with software vendor; Application Software Provider server side operation maintenance centre and contact of communicator cooperation with service center and swap data; These data comprise the binding of client's identifier and instant messaging service number, applied environment loading datas such as Application Software Provider customer service, exchange of technology crowd, chatroom, specific function.Customer service MSN 1~n is in charge of by Application Software Provider; Can realize through operation maintenance center and communicator cooperation with service center swap data; Also can management be set, also can provide the office terminal that management is set by communicator through the WEB page management mode that communicator provides.The mode of the MSN of customer end adopted application software link here; Be the LOGO or the title of placing MSN on the application software; Link with URL (Uniform.Resource Locator) mode, the customer service MSN can also link company's site or other service that can link.Communicator also be responsible for to be transmitted the enciphered data of Application Software Provider and client contacts, i.e. routing function, and the forwarding of enciphered data can be based on Transmission Control Protocol, also can be based on udp protocol.Certainly enciphered data can not transmitted through communicator yet yet, and the enciphered data exchange is directly carried out between the Application Software Provider server and client side, and communicator only is responsible for the service of instant messaging aspect.It is characterized in that: client is made up of application software link MSN; The login of client MSN connects third party's instant communication server; The customer service MSN is also logined and is connected third party's instant communication server; Customer service instant messaging number is managed by Application Software Provider, comprises access, generation number of the account, sends job number, period formulation, statistics, inside story to be sent.
Fig. 7 passes through third party's communicator service mode client terminal start-up process sketch map for client application software of the present invention.Start client software; Whether software inspection MSN moves; If move then get into and bind number detection; If not operation then start MSN or module, login third party instant communication server, input number of the account and password are verified; Checking gets into through the back and binds number detection; Then load and bind the number applied environment if bind number, bind customer service, customer service crowd, typical application crowd, relevant chatroom, virtual teacher-student relationship, virtual service person that the number applied environment is meant that the MSN terminal of binding number is provided with, all application modes such as button that continue to pay dues of paying the fees, for encryption software then also load authorization program or code simultaneously; Then do not get into application binding program for binding number; Application is bound successfully, and the back loads binding number initial application environment; Like customer service, customer service crowd, typical application crowd, relevant chatroom, virtual teacher-student relationship, virtual service person, all application mode initial condition or the default conditions such as button of continuing to pay dues of paying the fees; The applicant can carry out the selectivity setting to using environment, and applied environment confirms that back preservation on instant communication server is provided with the applied environment of success.The initial application environment can be online from instant communication server, also can be preset in advance in the instant communication terminal software installation kit.Applied environment is meant the client environment software that can download that software vendor provides or parameter is set; A kind of customization instant communication client software is provided; Purpose is for the online service that is fit to application software and the mandate cryptographic services of application software; The process that loads is actual to be exactly that former MSN is transformed or upgraded, and increases control or link, to reach the purpose at transformation MSN function and interface.It is characterized in that: client has the step of binding third party's MSN number, has to load the step of binding the number applied environment.
Fig. 8 transmits the method sketch map of enciphered data through third party's communicator for client application software of the present invention.Owing to introduce third party's communicator; And the application software enciphered data must be provided by software vendor; So the technical scheme that adopts is: application software is sent reading command and is transmitted or route to the communicator server through MSN; Instant communication server will instruct again to be transmitted or routes to the software vendor server, obtains corresponding AES return data at the software vendor server, and the client MSN is transmitted or routed to these data through instant communication server; MSN is forwarded to application software with this AES return data again, accomplishes the encryption and decryption process.A, b, c, d, e mode or other any ways that encryption method can adopt the front to describe.
Fig. 9 passes through third party's communicator method of encrypting sketch map for client application software of the present invention.This scheme principle is basic identical with the method that Fig. 8 describes; The physical location of different is application software mandate encryption system is placed on the communicator place; And software vendor is only controlled AES and is promptly encrypted formula; Perhaps cryptographic keys can be sent to the communicator place through network.For data security, can adopt in network transmission process that symmetric cryptography, asymmetric encryption and Hash encrypt etc., specifically like DES etc.
Figure 10 is a kind of method outline flowchart of screen printing operating process.At first to record, can intercept and capture the images displayed sequence data from the bottom layer driving layer to screen frame, i.e. frame data, a frame frame obtains on-screen data and preserves, and forms frame sequential data.Specifically, can directly catch, not receive the range upon range of influence of window from bottom like the glReadPixel function of OpenGL.Frame is recorded the back and is formed the frame sequence file, includes key frame in the frame sequence file, and the frame sequence file is handled, and obtains the key frame sequential file, the key frame sequential file is handled forming needed picture file or animation file.Processing mode can use the Flash generator to generate the Flash file; Perhaps generate picture file with the picture file generator; Perhaps generate gif file with the GIF generator, Flash generator, picture file generator, GIF generator are prior art, and for example the Flash file generates and can utilize Flash generator or module; Also can utilize the animation of generation of activex control or broadcast flash form, for example the mode of invoke script program.The present invention does not get rid of other file that is fit to of generation.
Figure 11 is the extraction key frame sketch map of the method for screen printing operating process.The frame sequence file is supposed time point t0-t10 from start to end; The input equipment incident has incidents such as mouse, keyboard, and mouse event has click event, double-click incident, mouse to pin not put (dragging) incident, and mouse is pinned not put with KeyEvent and handled as a kind of mode in the processing of the present invention; Correspond to the frame sequence file, frame pixel data amount changes with the frame file, is a stationary value when promptly screen does not change; In general, after input equipment triggered, screen will change; And frame pixel data amount is unsettled in change procedure; After a period of time, when screen was stablized, frame pixel data amount was also stablized constant.
The present invention provides 3 kinds of processing methods, and A. at first records frame, forms the frame sequence file, extracts the operation of key frame (Key frame) then according to the action triggers of input equipment (mouse, keyboard etc.), forms the key frame sequential file at last.Suppose that the mouse-click incident takes place the t1 time, the t0 time, corresponding frame 1101 was stable, extracted frame 1101 and as key frame; Suppose that t1-t2 time period frame is unstable, promptly screen is unstable, and frame pixel data amount also is a labile state; Point frame is stable when supposing t2, and corresponding frame 1103 is when t3 time point generation mouse-click incident; Extract frame 1103 and as key frame, suppose that t3-t4 time period frame is unstable, t4-t6 time period frame is stable; T6-t9 time period mouse is pinned and is not put (dragging) or KeyEvent, and t6-t9 time period frame is unsettled, and the frame 1105 that the t5 time point is corresponding is stable; The frame 1105 of extraction t5 time point correspondence extracts the corresponding frame 1109 of EO time point t9 as key frame as key frame, and the frame 1106 between the period t6-t9, frame 1107, frame 1108 can be used as key frame and also can be used as the processing of insertion frame; Until end, extract the corresponding stabilizer frame 1110 of t10 time point as key frame.The key frame that extracts is 1101,1103,1105,1106,1107,1108,1109,1110, the key frame sequence is handled obtaining needed file then.
Perhaps B. directly triggers the operation of catching present frame according to the action of input equipment (mouse, keyboard etc.), and with present frame as key frame, preserve these key frames, handle forming the key frame sequential file at last.Suppose t1 time point generation mouse-click incident, the frame 1102 that the t1 time point is corresponding, mouse event call frame are immediately caught function and are caught frame 1102; Mouse event also starts corresponding software operation operation simultaneously, and corresponding software operation operation back forms the result, on screen, shows; This process needs the regular hour to accomplish, that is to say, and be stable at t1 time point generation mouse-click incident time frame 1102; Be exactly the state of present frame, thus with the present frame of catching 1102 as key frame, in like manner; Catch the corresponding frame 1104 of t3 time point as key frame, t6-t9 time period mouse is pinned and is not put (dragging) or KeyEvent, and the frame-grab function is captured in real time frame 1106, frame 1107, frame 1108, frame 1109 also; Frame 1106, frame 1109 are as key frame; Frame 1107, frame 1108 can be used as key frame and also can be used as the processing of insertion frame, until end, catch the corresponding frame 1110 of t10 time point as key frame.Catch to such an extent that key frame is 1102,1104,1106,1107,1108,1109,1110, the key frame sequence is handled obtaining needed file then.
Perhaps C, stabilized screen arbitrary stabilizer frame in the time period in the leaching process for example extracts t0-t1 among Figure 11 successively; T2-t3, the arbitrary stabilizer frame of t4-t6 in each time period, and these stabilizer frames as key frame; Form the key frame sequence, because each time period stabilizer frame state is generally broken by mouse event or other input equipment incident, that is to say in latter stage stabilizer frame time period necessarily has mouse event to take place or other incoming event generation; Here be example with the mouse event, each key frame all can a corresponding mouse event like this, can obtain the mouse position coordinate information from the bottom mouse-driven simultaneously; The coordinate position of mouse was made a virtual mouse sign image when mouse event took place record, when forming gif file or Flash file, the mouse coordinates position of virtual mouse sign image according to record was superimposed upon on the corresponding key frame picture; So just can represent the operating process of screen; As long as its principle is: general screen change is the operation because of the input equipment trigger, and the result of program running is the stabilizer frame that is presented on the screen, so the arbitrary frame of record stabilized screen in the time period; Promptly as key frame; This time period, last time point was pressed mouse, and the mouse coordinates position is known when pressing mouse, so just can the virtual mouse sign image be superimposed upon on the key frame with this coordinate position.The characteristic of said process is: extract sometime the section stabilizer frame as key frame; Write down mouse coordinates position during time point generation mouse action incident in this in latter stage one time period; In the key frame that is extracted, stack virtual mouse sign image on the mouse coordinates position when the mouse action incident takes place.
Figure 12 is the flow chart that the generation picture file of the method for screen printing operating process also transmits.After program begins, start frame and record, generally can intercept and capture images displayed sequence data, i.e. frame sequential data from the bottom layer driving layer; Be the known technology method, save as the frame sequence file for established frame data file, this process lasts till that always incoming event takes place, if the mouse-click incident takes place; Then extract frame sequence file last frame as key frame 1, at this moment can delete the frame sequence file of when incoming event takes place, preserving, so that conserve storage; Continue to record the frame file afterwards, up to incoming event, for example mouse event take place; At this moment extract this section frame sequence file last frame as key frame 2, can delete the frame sequence file of when incoming event takes place, preserving equally, so that conserve storage; Continue to record the frame file afterwards, up to incoming event takes place, for example mouse is pinned and is not put or KeyEvent; At this moment extract the key frame sequence or extract start frame and end frame, intermediate frame can be used as and inserts the frame processing, extracts key frame n at last; Key frame 1~key frame n forms the key frame sequential file like this, can be packaged into picture file, transmits through the Internet; Can watch through Photo Browser at receiving terminal, and can be designed as mouse page turning control, so that show operating process.Also can not delete the frame sequence file of preservation during the course in the above step, but after finishing, delete.Can record frame and input equipment action record, the processing of after end, extracting key frame and key frame sequence from start to end all the time.The last frame that the step of extraction key frame also is not necessarily the frame sequence file can be an any suitable frame before as key frame.
Figure 13 is the flow chart of generation gif file of the method for screen printing operating process.Its step of extracting key frame and key frame sequence is the same with the said flow process of Figure 12, and different is: generate gif file by the GIF generation module, the mousebutton simulation drawing that can in animation file, superpose simultaneously is to increase the operation display effect.
Figure 14 is the flow chart of the nearly Flash file of generation of the method for screen printing operating process.Its step of extracting key frame and key frame sequence is the same with the said flow process of Figure 12; Different is: generate the Flash file by the Flash generation module; Can in animation file, superpose simultaneously mousebutton simulation drawing and mousebutton simulated sound are operated display effect with increase.
Figure 15 directly catches the flow chart that frame generates picture file and transmits for being triggered by input equipment of method of screen printing operating process.After logging program began, if the mouse-click incident takes place, at this moment application program was carried out corresponding operating, but operating result also is not presented on the screen; Certain delay is generally arranged, but can carry out immediately, catch present frame 1 based on the frame-grab program of bottom layer driving; In like manner catch present frame 2, when the continuous incident of incoming event takes place, pin like mouse and not put or KeyEvent; Then catch present frame continuously, or catch start frame and end frame as key frame, intermediate frame is handled as inserting frame; Until catching present frame n, catch and finish back formation key frame sequential file at last, can be packaged into picture file; Transmit through the Internet; Can watch through Photo Browser at receiving terminal, and can be designed as mouse page turning control, so that show operating process.It is characterized in that: when the input equipment incident takes place, catch present frame immediately, and with current frame as key frame.
Figure 16 directly catches the flow chart that frame generates gif file for being triggered by input equipment of method of screen printing operating process.Its step of catching key frame and key frame sequence is the same with the said flow process of Figure 15, and different is: generate gif file by the GIF generation module, the mousebutton simulation drawing that can in animation file, superpose simultaneously is to increase the operation display effect.
Figure 17 directly catches the flow chart that frame generates the Flash file for being triggered by input equipment of method of screen printing operating process.Its step of catching key frame and key frame sequence is the same with the said flow process of Figure 15; Different is: generate the Flash file by the Flash generation module; Can in animation file, superpose simultaneously mousebutton simulation drawing and mousebutton simulated sound are operated display effect with increase.
Figure 18 is for the extraction stabilizer frame of the method for screen printing operating process and generate animation or the flow chart of picture.After program begins, extract the frame pixel data amount p1 of current state, through certain delay Δ t, its numerical value can be adjusted according to application and requirement, and the mode of adjustment can be preset and be decided to be a certain numerical value, also can do the variable adjustment according to a function; Then extract frame pixel data amount p2, p1 and p2 numerical value compare judgement, like p1 ≠ p2, then return circulation extraction frame pixel data amount step; Like p1=p2, then carry out the operation of extracting stabilizer frame 1, promptly call frame is caught function and is caught stabilizer frame, and as key frame; In like manner extract stabilizer frame 2, and as key frame, until extraction stabilizer frame n, and as key frame; The key frame storage back of extracting forms the key frame sequential file, through corresponding program or resume module, generates animation or picture.The characteristic of above-mentioned steps is: extract the frame pixel data amount p1 of current state, through certain delay Δ t, extract frame pixel data amount p2; P1 and p2 numerical value compare judgement, like p1 ≠ p2, then return circulation extraction frame pixel data amount step; Like p1=p2; Then carry out the operation of extracting stabilizer frame, promptly call frame is caught function and is caught stabilizer frame, and as key frame.
Figure 19 is extraction stabilizer frame and record mouse and the flow chart of synthetic animation or picture of the method for screen printing operating process.Start input equipment action record program after program begins simultaneously, be generally mouse, be i.e. the coordinate position of record mouse and mouse; Suppose t1 time point generation mouse event 1, necessarily arranged one period stabilizer frame period in the past, can extract stabilizer frame 1 in this period at the t1 time point; (x1 y1) forms corresponding relation, in like manner for stabilizer frame 1 and mouse action and coordinate position; The action of t2 time point mouse event and coordinate position (x2 y2) forms corresponding relation with stabilizer frame 2, until; (xn yn) forms corresponding relation with stabilizer frame n, can make a virtual mouse sign image in order to show mouse sign (mouse images shows on the operating position) for the action of tn time point mouse event and coordinate position; In order to increase expression effect, can make a virtual mouse audio files, to cooperate the animation effect that generates; Like this, the mouse coordinates position during by key frame sequential file, mouse generation action cooperates with virtual mouse sign image and virtual mouse audio files; Synthetic animation file can be discerned by human eye as for the time interval between each key frame and to accept to set, and whether inserts frame processing etc. and all have existing known technology to handle.The technical characterictic of above-mentioned steps is: t1 time point generation mouse event 1; Coordinate position (the x1 of record mouse; Y1), necessarily there was one period stabilizer frame period in the past, accomplished the step of extracting stabilizer frame 1 in this period at the t1 time point; Stabilizer frame 1 and mouse action and coordinate position (x1, y1) formation corresponding relation (being associated).The step of extracting stabilizer frame is arranged, and with this stabilizer frame as key frame, the mouse action that record and this stabilizer frame be associated and the step of mouse coordinates position are arranged, have the virtual mouse sign image is superimposed upon the step on the key frame by said record position.
In above-mentioned all schemes, the time can be used as identification parameter and participates in the animation generation, also can remove the time marking attribute, only is concerned about the continuous process of operation, and the time interval between each key frame is set separately, and the principle of setting can be discerned by human eye and accept to set.
Above method and application system programming language can be existing any language forms, like VC++, and C, Delphi, FORTRAN, Pascal, FOXPRO, Clipper, EXE; WIN16:C, and C++ (Visual, C++Builder, Borland), Visual BASIC; WIN32:C, and C++ (Visual, Borland), FORTRAN (LAHEY, Visual), Java, Visual BASIC, VisualFoxpro, PowerBuilder, Delphi, JavaScript, VBScript installshield, VB.net, VC.net; Linux:C, C++, Java; Mobile phone operating system: Windows Mobile, Symbian, Android etc. also can adopt the control mode to use or the mode of invoke script program or to the server requests mode.Load mode is based on TCP/UDP agreement or other any network load mode.
Above application service system programming language can be existing any language form; System place physical location can be in any place any server, connected mode can be wired, like cable, optical cable, telephone wire etc.; Or wireless mode; Like point-to-point, 2G, 3G etc., communications protocol IEEE802.11, IEEE802.11a, IEEE802.11b, IEEE802.11g, IEEE802.11n etc. are in wide area network or local area network (LAN).In network transmission process, can adopt symmetric cryptography, asymmetric encryption and Hash to encrypt, like DES etc.

Claims (14)

1. the network terminal formula building method and the system of an application software; It is characterized in that: application software is connected with MSN or module; Or MSN or module embedding application software; Or application software link MSN, or application software is connected through cooperative module with MSN.
2. according to the network terminal formula building method and the system of the said application software of claim 1, it is characterized in that: client application software and server carry out exchanges data, and the operation of client application software depends on the result with the server swap data.
3. according to the network terminal formula building method and the system of the said application software of claim 2; It is characterized in that: application software is sent reading command; Return back to application software by the server response and with AES; Said method step is: in the application software compilation process, pass point is set, sends the instruction request data to server during running software to pass point, server returns corresponding data according to request instruction; These data calculate by AES, and application software obtains the operation of return data continued.
4. according to the network terminal formula building method and the system of the said application software of claim 2; It is characterized in that: client has and reads the program module that the computer hardware fingerprint is an arrangement components information; And these information are reached the step of server; Server calculates these information, and result of calculation is passed to the step of client.
5. according to the network terminal formula building method and the system of the said application software of claim 2; It is characterized in that: database is arranged in the client application software; Database table and field show with variable format, and table name, the field name of database write server end, when Application Software Program is operated database table or field; Be to send instruction to server with variable format, the table name of invoking server end and field name.
6. according to the network terminal formula building method and the system of the said application software of claim 2, it is characterized in that: the Application Software Program code segmentation is placed on server end and client respectively, and these segmentations couple together and form complete Application Software Program.
7. according to the network terminal formula building method and the system of the said application software of claim 2; It is characterized in that: client is constantly sent command request server response verification value; This validation value is that server calculates by AES; This validation value is based on the time variation at least and produces, and is the function of time.
8. according to the network terminal formula building method and the system of the said application software of claim 7; It is characterized in that: a hardware unit is arranged; Have at least data to produce the parts or the chip of condition in the hardware unit; Data generation value is based on the time variation at least and produces, and data generation value connects like USB or wireless signal or infrared connection computer system through lead.
9. according to the network terminal formula building method and the system of claim 1 or 2 said application software, it is characterized in that: the instant messaging service is provided by the third party, and the login of client MSN connects third party's instant communication server.
10. according to the network terminal formula building method and the system of the said application software of claim 9; It is characterized in that: it is characterized in that: client is made up of application software link MSN; The login of client MSN connects third party's instant communication server; The customer service MSN is also logined and is connected third party's instant communication server; Customer service instant messaging number is managed by Application Software Provider, comprises access, generation number of the account, sends job number, period formulation, statistics, inside story to be sent.
11. network terminal formula building method and system according to claim 1 or 2 said application software; It is characterized in that comprising following steps: after the client software operation step that detects network is arranged; The step that detects encryption lock is arranged; The step of extracting the encryption lock identification number is arranged, the step of Connection Service device is arranged, the step that starts MSN or module is arranged.
12. network terminal formula building method and system according to the said application software of claim 9 is characterized in that: client has the step of binding third party's MSN number, has to load the step of binding the number applied environment.
13. network terminal formula building method and system according to claim 1 or 2 said application software is characterized in that: MSN or module have the program of record screen operator process, and this program is intercepted and captured the images displayed sequence data from the bottom layer driving layer; Be frame data, record is also preserved frame data, comprises the key frame sequence in the frame data; Generate the picture file form with the key frame sequence; Or the gif file form, or the Flash file format, be provided with the operation note button in MSN or the module; The beginning back starts logging program, is sent to the other side after the end automatically.
14. network terminal formula building method and system according to claim 1 or 2 said application software is characterized in that: application software is architectural design software or product design software or building calculation amount software or construction budget software or building data software.
CN2011101662509A 2011-06-10 2011-06-10 Network terminal type construction method and network terminal type construction system for application software Pending CN102638444A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011101662509A CN102638444A (en) 2011-06-10 2011-06-10 Network terminal type construction method and network terminal type construction system for application software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011101662509A CN102638444A (en) 2011-06-10 2011-06-10 Network terminal type construction method and network terminal type construction system for application software

Publications (1)

Publication Number Publication Date
CN102638444A true CN102638444A (en) 2012-08-15

Family

ID=46622690

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011101662509A Pending CN102638444A (en) 2011-06-10 2011-06-10 Network terminal type construction method and network terminal type construction system for application software

Country Status (1)

Country Link
CN (1) CN102638444A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104504951A (en) * 2014-12-20 2015-04-08 天津威志新联盟教育信息咨询有限公司 Remote network training and checking system
CN104869133A (en) * 2014-02-21 2015-08-26 华为技术有限公司 Data recording method, system and access server
CN106797338A (en) * 2014-09-04 2017-05-31 微软技术许可有限责任公司 The scalability started to the APP of the message of existing messaging services
CN107798297A (en) * 2017-09-28 2018-03-13 成都大熊智能科技有限责任公司 A kind of method that stabilizer frame is automatically extracted based on inter-frame difference
CN108809920A (en) * 2017-05-04 2018-11-13 慧荣科技股份有限公司 Data center adopting encryption technology and data center operation method
CN108965988A (en) * 2018-06-28 2018-12-07 北京金山安全软件有限公司 Video generation method and device and electronic equipment
CN109343761A (en) * 2018-11-29 2019-02-15 广州视源电子科技股份有限公司 Data processing method and relevant device based on intelligent interaction device
CN111433775A (en) * 2017-12-07 2020-07-17 三星电子株式会社 Security enhancement method and electronic device thereof
CN111818382A (en) * 2020-07-01 2020-10-23 联想(北京)有限公司 Screen recording method and device and electronic equipment

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1595951A (en) * 2003-09-12 2005-03-16 广东融合通信有限责任公司 An information directory service system having realtime online communication function and construction method thereof
CN101350717A (en) * 2007-07-18 2009-01-21 中国移动通信集团公司 Method and system for logging on third party server through instant communication software
CN101394503A (en) * 2008-10-13 2009-03-25 深圳创维-Rgb电子有限公司 Network television capable of on-line chat through network
CN101420393A (en) * 2008-12-10 2009-04-29 腾讯科技(深圳)有限公司 Method for implementing expression edition based on instant messaging and terminal based on instant message
CN101729445A (en) * 2009-11-23 2010-06-09 江周平 Method for displaying interactive content based on MSN
CN101777159A (en) * 2009-04-28 2010-07-14 上海正辅信息技术有限公司 Method and system for optimizing management of store on basis of e-commerce platform
CN102035835A (en) * 2010-12-13 2011-04-27 山东科技大学 Interactive electronic whiteboard system based on cooperative work
CN102456113A (en) * 2011-10-31 2012-05-16 中标软件有限公司 Method for setting right over software package compiling platform for users
CN102467642A (en) * 2010-11-17 2012-05-23 北大方正集团有限公司 Permission control method and device for application software

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1595951A (en) * 2003-09-12 2005-03-16 广东融合通信有限责任公司 An information directory service system having realtime online communication function and construction method thereof
CN101350717A (en) * 2007-07-18 2009-01-21 中国移动通信集团公司 Method and system for logging on third party server through instant communication software
CN101394503A (en) * 2008-10-13 2009-03-25 深圳创维-Rgb电子有限公司 Network television capable of on-line chat through network
CN101420393A (en) * 2008-12-10 2009-04-29 腾讯科技(深圳)有限公司 Method for implementing expression edition based on instant messaging and terminal based on instant message
CN101777159A (en) * 2009-04-28 2010-07-14 上海正辅信息技术有限公司 Method and system for optimizing management of store on basis of e-commerce platform
CN101729445A (en) * 2009-11-23 2010-06-09 江周平 Method for displaying interactive content based on MSN
CN102467642A (en) * 2010-11-17 2012-05-23 北大方正集团有限公司 Permission control method and device for application software
CN102035835A (en) * 2010-12-13 2011-04-27 山东科技大学 Interactive electronic whiteboard system based on cooperative work
CN102456113A (en) * 2011-10-31 2012-05-16 中标软件有限公司 Method for setting right over software package compiling platform for users

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张钰: "基于加密锁的软件保护程序的设计与实现", 《中国优秀硕士学位论文全文数据库》, no. 3, 15 March 2011 (2011-03-15) *
梁胜彬: "基于SOA的协同软件体系架构研究", 《中国优秀硕士学位论文全文数据库》, no. 1, 15 January 2009 (2009-01-15) *

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104869133B (en) * 2014-02-21 2018-07-03 华为技术有限公司 A kind of method of data record, system and access server
CN104869133A (en) * 2014-02-21 2015-08-26 华为技术有限公司 Data recording method, system and access server
US10447621B2 (en) 2014-09-04 2019-10-15 Microsoft Technology Licensing, Llc App powered extensibility of messages on an existing messaging service
CN106797338A (en) * 2014-09-04 2017-05-31 微软技术许可有限责任公司 The scalability started to the APP of the message of existing messaging services
CN106797338B (en) * 2014-09-04 2020-06-05 微软技术许可有限责任公司 Extensibility of APP enablement of messages to existing messaging services
CN111683000A (en) * 2014-09-04 2020-09-18 微软技术许可有限责任公司 Extensibility of APP enablement of messages to existing messaging services
CN111683000B (en) * 2014-09-04 2022-11-11 微软技术许可有限责任公司 Communication device, memory and method for operating an instant messaging service
CN104504951A (en) * 2014-12-20 2015-04-08 天津威志新联盟教育信息咨询有限公司 Remote network training and checking system
CN108809920A (en) * 2017-05-04 2018-11-13 慧荣科技股份有限公司 Data center adopting encryption technology and data center operation method
CN107798297B (en) * 2017-09-28 2021-03-23 成都大熊智能科技有限责任公司 Method for automatically extracting stable frame based on inter-frame difference
CN107798297A (en) * 2017-09-28 2018-03-13 成都大熊智能科技有限责任公司 A kind of method that stabilizer frame is automatically extracted based on inter-frame difference
CN111433775B (en) * 2017-12-07 2023-07-07 三星电子株式会社 Security enhancement method and electronic device thereof
CN111433775A (en) * 2017-12-07 2020-07-17 三星电子株式会社 Security enhancement method and electronic device thereof
CN108965988A (en) * 2018-06-28 2018-12-07 北京金山安全软件有限公司 Video generation method and device and electronic equipment
CN109343761B (en) * 2018-11-29 2021-02-19 广州视源电子科技股份有限公司 Data processing method based on intelligent interaction equipment and related equipment
CN109343761A (en) * 2018-11-29 2019-02-15 广州视源电子科技股份有限公司 Data processing method and relevant device based on intelligent interaction device
CN111818382A (en) * 2020-07-01 2020-10-23 联想(北京)有限公司 Screen recording method and device and electronic equipment

Similar Documents

Publication Publication Date Title
CN102638444A (en) Network terminal type construction method and network terminal type construction system for application software
CN109844717A (en) The system and method that real time remote for mobile applications controls
CN106302502B (en) A kind of secure access authentication method, user terminal and server-side
CN105808056B (en) A kind of Media method and system based on two dimensional code
CN105378702A (en) Collaboration system including a spatial event map
CN110352595A (en) For providing the system and method for augmented reality superposition
CN107534672A (en) Lasting URL for the client application as network service(URL)
CN105872102A (en) File uploading and downloading method
JP2015509223A (en) Controlling public display with personal devices
CN109194651A (en) A kind of identity identifying method, device, equipment and storage medium
CN106164917A (en) User's application-specific for remote session activates
JP2013118612A (en) Screen capture method for mobile communication terminal
CN107517103A (en) The verification method of authority, device and system
CN110166457A (en) A kind of advertisement machine information issuing method and its device
CN107241431A (en) The method and system of virtual desktop are logged in based on the barcode scanning that Quick Response Code is realized
CN107342966A (en) Authority credentials distribution method and device
CN110025955A (en) Information processing method, terminal, computer readable storage medium and computer equipment
CN101309260A (en) Network authentication method on the basis of cryptoguard
CN103139179A (en) Multi-channel active type network identity verification system and network identity verification device
CN108768938B (en) A kind of web data encryption and decryption method and device
CN110601850B (en) Scenic spot information recording method, related equipment and storage medium
CN109075966A (en) communication security system and method
CN115242779B (en) File transmission method and system based on applet and electronic equipment
CN106022151A (en) Information transmission method and device
KR20150139972A (en) Method and system for third-party service platform login

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20120815