CN105022970B - The method of the processing security service of computing device and computing device - Google Patents

The method of the processing security service of computing device and computing device Download PDF

Info

Publication number
CN105022970B
CN105022970B CN201410177686.1A CN201410177686A CN105022970B CN 105022970 B CN105022970 B CN 105022970B CN 201410177686 A CN201410177686 A CN 201410177686A CN 105022970 B CN105022970 B CN 105022970B
Authority
CN
China
Prior art keywords
core
safe mode
storage element
security service
order
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410177686.1A
Other languages
Chinese (zh)
Other versions
CN105022970A (en
Inventor
黄建兴
曾信雄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
MStar Semiconductor Inc Taiwan
Original Assignee
MStar Semiconductor Inc Taiwan
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by MStar Semiconductor Inc Taiwan filed Critical MStar Semiconductor Inc Taiwan
Priority to CN201410177686.1A priority Critical patent/CN105022970B/en
Publication of CN105022970A publication Critical patent/CN105022970A/en
Application granted granted Critical
Publication of CN105022970B publication Critical patent/CN105022970B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

Disclosed herein a kind of method for handling security service, applied to a processing unit of a computing device, for controlling the multiple security services of the processing unit processes, comprising:One storage element is provided;One first order is stored in the storage element, first order includes one first security service information;And a core of the processing unit is controlled to perform following steps under a safe mode:The storage element is accessed to obtain first order;One first security service related to the first security service information according to first command process;And the storage element is accessed to obtain one second order, second order includes one second security service information;Wherein, in control the core access the storage element with obtain this first with this second order during, control the core to stay in the safe mode.

Description

The method of the processing security service of computing device and computing device
Technical field
The present invention is the method on computing device and control computing device processing security service, is filled especially with respect to calculating The core for the processing unit put can handle multiple security services (secure service) based on patten transformation once Computing device and the method for control computing device processing security service.
Background technology
For the credible performing environment (trusted of core support of the security level of lifting system, now many processing units Execution environment, TEE, hereinafter referred to as safe mode) under operation, the ring relative with credible performing environment Border referred to as opening performing environment (rich execution environment, REE, or horn of plenty performing environment, hereinafter referred to as For general modfel).Under general modfel, the core of processing unit performs general operation system (normal operation System, normal OS), with the most of operation related to user's behavior of processing, such as browse webpage, broadcasting multimedia, Download application program etc.;In the secure mode, the core of processing unit performs SOS (secure operation System, secure OS), to handle the operation related to system and data safety, such as digital copyright protecting (digital Right management, DRM) or online transaction payment etc. security service.When security service produces, the core of processing unit will Safe mode is switched to from general modfel to handle the security service.In implementation, core is exhaled by a specific safe mode Instruction is cried, core is produced patten transformation, implies that from general modfel and enters safe mode, such as designed by peace scheme (ARM) company SMC (secure monitor call, security monitoring calling) instructions, or the SMX designed by Intel (Intel) company (safer mode extension, safe mode extension) instruction.One security service, which generally has to service corresponding to one, to be known Other information (service identification, service ID).Such as with SMC instruction notification core processing security services When, it is necessary to the service identification information of the security service is sent in the lump, core enters after safe mode to be identified according to the service again The information processing security service, and return general modfel after the completion of security service processing.
Referring to Fig. 1, the schematic diagram that the core that it is known processing unit is changed between general modfel and safe mode.When Core 130 learns first security service (service identification information in general modfel 110 when time T1:001) produce, just send out Go out SMC instructions (such as the SMC for being 001 with service identification information:001), first safety is handled to enter safe mode 120 Service, is returned after pending in general modfel 110;In time T2, core 130 learns second security service (clothes Business identification information:002) produce, just send SMC instructions (such as the SMC for being 002 with service identification information:002), with entrance Safe mode 120 handles second security service, is returned after pending in general modfel 110.This is designed with a limit System, core 130 can only handle a security service after safe mode is entered, even in the process for handling first security service In second security service produced, core 130 can only also be finished when first security service, return to general modfel Second SMC instruction could be sent after 110 again to handle second security service.This causes core performing safety operation system It is severely limited during system, influences the overall efficiency of processing unit or the computing device even with the processing unit.
The content of the invention
In view of the deficiency of prior art, a purpose of the invention is to provide at a kind of computing device and control computing device The method for managing security service, makes the core of processing unit have more preferably efficiency in safe mode.
Disclosed herein a kind of method for handling security service, applied to a processing unit of a computing device, it is used for The multiple security services of the processing unit processes are controlled, comprising:One storage element is provided;One first order is stored in the storage list Member, first order include one first security service information;And a core of the processing unit is controlled under a safe mode Perform following steps:The storage element is accessed to obtain first order;According to first command process and first safety clothes One first related security service of information of being engaged in;And the storage element is accessed to obtain one second order, second order includes One second security service information;Wherein, in control the core access the storage element with obtain this first with this second order Period, the core is controlled to stay in the safe mode.
The present invention separately discloses a kind of computing device, comprising:One processing unit is general in one comprising a core, the core Enter a safe mode according to a safe mode call instruction under pattern;And a storage element, the processing unit is coupled, is stored One first order, first order include one first security service information;Wherein the core accesses the storage under the safe mode For memory cell to obtain first order, related to the first security service information according to first command process one first is safe Service, and the storage element is accessed to obtain one second order, second order includes one second security service information, the core The heart in access the storage element with obtain this first with this second order during be to stay in the safe mode.
The computing device of the present invention and the method for control computing device processing security service can allow the core of processing unit In safe mode, general modfel is just returned to after handling multiple security services.Compared to known techniques, core of the invention is not required to To be limited for a long time by SOS, but multiple security services can be flexibly handled in safe mode, or even can With the mechanism of the design time segment (time slice) in SOS, SOS is set to possess multithreading (multi-thread) function, efficiency of the increase core in safe mode.
Feature, implementation and effect for the present invention, schema is hereby coordinated to make preferred embodiment detailed description as follows.
Brief description of the drawings
Fig. 1 is that the core of known processing unit is changed to handle the signal of security service between general modfel and safe mode Figure;
Fig. 2 is that the core of the computing device of the present invention is changed to handle security service between general modfel and safe mode The schematic diagram of one embodiment;
Fig. 3 is the schematic diagram of an embodiment of the method that present invention control computing device handles security service;
Fig. 4 is that the core of the computing device of the present invention is changed to handle security service between general modfel and safe mode The schematic diagram of another embodiment;And
Fig. 5 is the schematic diagram of another embodiment for the method that present invention control computing device handles security service.
Embodiment
The technical terms of following description refers to the idiom of the art, if this specification is to part term It is illustrated or defines, the explanation system of the part term is defined by the explanation of this specification or definition.
The method that the disclosure of the present invention includes computing device and controls computing device processing security service, can make core The heart handles multiple security services in safe mode.The apparatus and method can be applied to have setting for safe mode and general modfel The processing unit of meter, be embodied as it is possible under the premise of, the art tool usually intellectual being capable of taking off according to this specification Dew content selects equivalent component or step to realize the present invention, that is, the implementation of the present invention be not limited to after the implementation chatted Example.By the members that are included of computing device of the present invention it is independent for may be known tip assemblies, therefore do not influenceing this On the premise of the abundant exposure of device invention and exploitativeness, illustrate that for the details of known tip assemblies memorandum will be given below.This Outside, the method for control computing device processing security service of the invention can be come by the computing device of the present invention or its equivalent device Perform, on the premise of the abundant exposure of this method invention and exploitativeness is not influenceed, the explanation of following methods invention will focus on In step content and non-hardware.
Changed referring to Fig. 2, it is the core of the computing device of the present invention between general modfel and safe mode to handle The schematic diagram of one embodiment of security service.The computing device of the present invention can be consumer electronic product, such as TV, hand Machine, multimedia player etc. have a computing device of data processing and computing capability, these devices generally comprise processing unit with Storage element.Processing unit comprises at least a core 210, and it is operable in general modfel 110 and safe mode 120, and Can all it enter line access to storage element 220 under general modfel 110 and safe mode 120.Storage element 220 may, for example, be Some section of the system storage of computing device, or some hardware register.Please refer to Fig. 3, it is control of the present invention The schematic diagram of one embodiment of the method for computing device processing security service processed.(step after above-mentioned storage element 220 is provided S310), when security service produces, the core 210 that security service can handle triggering security service produces patten transformation (step Rapid S320).(it is represented by dotted lines before core 210 enters safe mode 120 in Fig. 2), first by the life related to security service (Cmd) 225 is made, such as includes the order of service identification information, is stored in storage element 220 (step S330), then produces peace Syntype call instruction (such as SMC instructions of An Mou companies design), core 210 just enters safe mode 120 according to this instruction (step S340).It note that compared to known techniques, safe mode call instruction herein is not required to the service of service safe to carry Identification information, because service identification information is stored into storage element 220 in step S330.Core 210 enters safe mode The reading order 225 from storage element 220 afterwards, and the peace related according to the service identification information processing included in order 225 Full service (step S350).In general, the more other services of the priority layer of security service are high, so when core 210 has been handled After current security service, if also there being other orders 225 in storage element 220, core 210 will enter safety at this In the time of pattern 120, it can be finished being handled together to 225 related security services of other orders in storage element 220, then return To general modfel 110.Enter safe mode 120 that is, working as core 210 and handle security service, return to general modfel Before 110, can first check whether there be other orders in storage element 220, for example, in a manner of poll (polling) every One preset time checks storage element 220, to be determined just to return to general mould without other pending security services, core 210 Formula 110.Those others order system be other orders for being related to security service, its can be handled in core 210 it is current Storage element 220 is stored into during security service, can also be before the current security service of the start to process of core 210 just It is stored into storage element 220.
Changed referring to Fig. 4, it is the core of the computing device of the present invention between general modfel and safe mode to handle The schematic diagram of another embodiment of security service.Become stronger day by day with the function of processing unit, its core number provided is also cured It is more.When processing unit has more than two cores, wherein at least one can be designed to security kernel (secure core), only There is security kernel to enter in safe mode and handle security service, remaining core then handles other clothes in general modfel Business.In embodiment as shown in Figure 4, the processing unit of computing device includes two cores, is core 410 and core 420 respectively, Core 410 is security kernel, and it can enter safe mode because of the triggering of safe mode call instruction, and core 420 is then Non-security core, or general core.But in other embodiments, the processing unit of computing device can include more multinuclear The heart, such as four cores, and security kernel is also not necessarily limited to one, such as the two of which that can be designed in four cores is safe kernel The heart.Please refer to Fig. 5, it is the signal of another embodiment of the method for present invention control computing device processing security service Figure.It is identical with previous embodiment, the storage element for being used for storing the order 225 comprising security service information is equally first provided 220 (step S510).When security service produces, security service produces patten transformation (step S520) by core 410 is triggered, so And this security service event is probably to be received by security kernel 410 or non-security core 420;Either received by whichever, all Can be by the order 225 related to security service, such as the order 225 of service identification information is included, it is stored in storage element 220 (step S530).Whether the core for next judging to receive security service event is security kernel (step S540).If Core 420 receives the security service event, because core 420 is not security kernel, the security service can not be handled, so must Beard and hair puts up a notice Notify to notify core 410 to handle the security service (step S550), and core 410 can be because this notice Notify and produce Exception handling (exception) (step S560), this Exception handling will make core 410 enter safe mode 120.But if above-mentioned security service event when producing is received by core 410, then step S540 will be judged as YES and It is directly entered step S570.In step S570, core 410 judges whether oneself is in safe mode 120, if non-be in Safe mode 120, then the generation safe mode call instruction of core 410 (step S580), core 410 just enter peace according to this instruction Syntype 120 to handle the security service (step S590), that is, the reading order 225 from storage element 220 of core 410, and The security service related according to the processing of order 225;And if step S570's is judged as YES, that is, core 410 is in Exception handling It is caused to be in safe mode 120 (representing that core 410 is handling other security services) at that time, then in current safety clothes Business can immediately treat the security service (step S590) after being disposed, and be not required to leave the re-enter of safe mode 120.
Above-mentioned storage element may, for example, be some section of the system storage of computing device, or computing unit Some hardware register, core all can enter line access under general modfel 110 and safe mode 120 to both.Step S550's Notify that Notify can be a software interrupt (software generated interrupt, SGI), or in a hardware It is disconnected.Hardware interrupts are, for example, that mailbox interrupts (mailbox interrupt) mechanism, positioned at general modfel 110 under this mechanism Core 420 will order 225 write-in hardware registers, and then sending in the hardware register of interrupt notification core 410 has new order Produce.
It is worth noting that, when core 410 handles security service in safe mode 120, if now there is new safety Service is produced, and this security service event will be received by core 420, and the order for being relevant to this security service is stored in by core 420 Storage element (step S530), and the Notify that gives notice is to notify core 410 (step S550 and S560).Core 410 according to Learn there is new order 225 to produce in storage element 220 according to the notice Notify of core 420, therefore handled current safety General modfel 110 will not be returned after service immediately, but accesses storage element 220 according to above-mentioned notice to obtain other orders 225, and handle the security service related to the order.In other words, under the framework of the present embodiment, will not as in known because Security kernel 410 handles security service just in safe mode 120 and causes next security service not send;Opposite, In the present invention, core 410 is after safe mode 120 is entered, the interruption that can be sent with processing core 420, therefore in safety The notice Notify corresponding to different security services, and continuous processing more than one security service can be still received in pattern 120. Such as core 420 continues new order 225 being stored in storage element 220 in safe mode 120 when core 410, then core 410 The security service of processing kainogenesis can be continued, that is, core 410 can be located during once safe mode 120 is entered More than one security service is managed, core 410 there are more elasticity when performing SOS.
In addition, the present invention can allow SOS to support the dispatcher of multithreading by timeslice off line system Make (scheduling).And when the design of having time segment mechanism, core 410 can be returned in advance at the end of time segment General modfel 110 is returned, even if security service is not disposed yet.For example, when core 410 is handling security service, need Will be by direct memory access (DMA) (direct memory access, DMA) unit mobile data, it makes directly in assigning instruction After memory access unit starts action, if the work of direct memory access (DMA) unit is still at the end of the time segment of this time When not completing, and not having other orders pending in storage element 220, now core 410 is in order to avoid in safe mode 120 Empty time-consuming, just first return in general modfel 110 and support to handle other services;When direct memory access (DMA) unit completes work Afterwards, that is, the core (core 410 or core 420) in general modfel 110 is notified.If core 410 is connected to the notice, then carry out Step S570~S590, if core 420 is connected to the notice, then step S550~S590 is carried out, core 410 is entered safety Pattern 120 handles the follow-up work of the security service.That is, core 410 can during security service is handled bullet Property in general modfel 110 with being changed in safe mode 120, will not make whole by computing resource waste during wait The running of processing unit is more efficiently.In a preferred embodiment, if the design of SOS having time segment, At the end of time segment, core 410 can first confirm storage element 220 in whether pending processing order, if so, then core 410 will continue to stay in safe mode 120 and handle security service, if storage element 220 is empty, return to general modfel 110.
In another embodiment, security kernel 410 is not that the notice of foundation core 420 enters peace from general modfel 110 Syntype 120, but a preset time (such as time segment) is set, when preset time reaches, core 410 is voluntarily sent Without the safe mode call instruction of service identification information, make oneself to enter safe mode 120, therefore core 410 can week Enter in safe mode 120 to phase property and check whether there is new security service generation.It is above-mentioned in a preferred embodiment Mode can be with notifying parallel, that is to say, that core 410 checks whether there is except that can periodically enter in safe mode 120 Outside security service produces, also it can enter in safe mode 120 via the notice of another core 420 and check whether there is safety clothes Business produces.
Because the art tool usually intellectual can understand by the disclosure that Fig. 2 and Fig. 4 device is invented The implementation detail of Fig. 3 and Fig. 5 method invention and change, therefore, will in the exposure for not influenceing this method invention to avoid superfluous text Ask and exploitativeness on the premise of, repeat explanation give memorandum herein.Taken off before note that in icon, the shape of component, chi Order of very little, ratio and step etc. is only to illustrate, and is to understand the present invention for the art tool usually intellectual to be used, non- To limit the present invention.In addition, the art personage can disclosure under this invention and the demand of itself it is optionally real The part or all of technical characteristic of any embodiment is applied, or optionally implements the part or all of technology spy of multiple embodiments The combination of sign, elasticity when thereby the increase present invention is implemented.
Although embodiments of the invention are as described above, but those embodiments are not to be used for limiting the present invention, this technology neck Domain tool usually intellectual can impose change according to the content expressed or implied of the present invention to the technical characteristic of the present invention, it is all this Many variations may belong to the patent protection category sought by the present invention, and in other words, scope of patent protection of the invention must regard The claim institute defender of this specification is defined.

Claims (17)

  1. A kind of 1. method for handling security service, applied to the processing unit of computing device, for controlling the processing unit processes Multiple security services, comprising:
    Storage element is provided;
    First order is stored in the storage element, first order includes the first security service information;And
    A core of the processing unit is controlled to perform following steps under safe mode:
    The storage element is accessed to obtain first order;
    First security service related to the first security service information according to first command process;
    And
    The storage element is accessed to obtain the second order, second order includes the second security service information;
    Wherein, in control the core to access the storage element with obtain first order to according to second command process and this During the second related security service of two security service information, the core is controlled to stay in the safe mode.
  2. 2. the method as described in claim 1, it is characterised in that the step of accessing the storage element to obtain second order is more Comprising:
    Second order is stored in the storage element;
    The core under the safe mode is given notice;And
    The core is controlled to access the storage element according to the notice to obtain second order.
  3. 3. method as claimed in claim 2, it is characterised in that the notice is one of software interrupt and hardware interrupts.
  4. 4. the method as described in claim 1, it is characterised in that should according to preset time access in the core of the safe mode Other orders in storage element.
  5. 5. the method as described in claim 1, it is characterised in that further include:
    The core is made to enter the safe mode after stopping preset time under general modfel.
  6. 6. the method as described in claim 1, it is characterised in that further include:
    The core is made to enter the safe mode by general modfel according to notice;
    Wherein, the notice system react this first order be stored in the storage element.
  7. 7. the method as described in claim 1, it is characterised in that further include:
    Produce safe mode call instruction;And
    The core is made to enter the safe mode by general modfel according to the safe mode call instruction;
    Wherein, the safe mode call instruction does not include the first security service information.
  8. 8. the method as described in claim 1, it is characterised in that the step of controlling the core to be performed under the safe mode is more wrapped Contain:
    Those orders in the storage element are scheduled, those orders are performed in a manner of using multithreading.
  9. 9. the method as described in claim 1, it is characterised in that further include:
    When the core stops preset time under the safe mode, and when in the storage element without order, the core is made to leave this Safe mode simultaneously enters general modfel.
  10. 10. a kind of computing device, comprising:
    Processing unit, comprising core, the core enters safe mode under general modfel according to safe mode call instruction;And
    Storage element, couples the processing unit, the order of storage first, and first order includes the first security service information;
    The wherein core accesses the storage element to obtain first order, according to first command process under the safe mode First security service related to the first security service information, and the storage element is accessed to obtain the second order, this Two orders include the second security service information, and the core first is ordered to the core foundation with obtaining this in accessing the storage element It is to stay in the safe mould during second command process, second security service related to the second security service information Formula.
  11. 11. computing device as claimed in claim 10, it is characterised in that the safe mode call instruction is not comprising first peace Full information on services.
  12. 12. computing device as claimed in claim 10, it is characterised in that the processing unit further includes another core, and this is another Second order is stored in the storage element under the general modfel and given notice by core, to notify the core to access the storage Memory cell with obtain this second order.
  13. 13. computing device as claimed in claim 12, it is characterised in that the core under the general modfel according to the notice by The general modfel enters the safe mode.
  14. 14. computing device as claimed in claim 10, it is characterised in that the core is under the safe mode according to preset time Access other orders in the storage element.
  15. 15. computing device as claimed in claim 10, it is characterised in that the core stops preset time under the general modfel Enter the safe mode afterwards.
  16. 16. computing device as claimed in claim 10, it is characterised in that the core those in the storage element are ordered into Row scheduling, performs those orders in a manner of using multithreading.
  17. 17. computing device as claimed in claim 10, it is characterised in that when the core stops under the safe mode to be preset Between, and the storage element in without order when, the core leave the safe mode and enter the general modfel.
CN201410177686.1A 2014-04-29 2014-04-29 The method of the processing security service of computing device and computing device Expired - Fee Related CN105022970B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410177686.1A CN105022970B (en) 2014-04-29 2014-04-29 The method of the processing security service of computing device and computing device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410177686.1A CN105022970B (en) 2014-04-29 2014-04-29 The method of the processing security service of computing device and computing device

Publications (2)

Publication Number Publication Date
CN105022970A CN105022970A (en) 2015-11-04
CN105022970B true CN105022970B (en) 2018-03-02

Family

ID=54412931

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410177686.1A Expired - Fee Related CN105022970B (en) 2014-04-29 2014-04-29 The method of the processing security service of computing device and computing device

Country Status (1)

Country Link
CN (1) CN105022970B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105791284B (en) 2016-02-29 2019-04-05 华为技术有限公司 A kind of data security transmission device and method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101165668A (en) * 2006-10-18 2008-04-23 松下电器产业株式会社 Storage medium control device and control method thereof
CN101379537A (en) * 2006-02-06 2009-03-04 松下电器产业株式会社 Secure processing device, method and program
CN101685391A (en) * 2002-01-04 2010-03-31 微软公司 Methods and system for managing computational resources of a coprocessor in a computing system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7409570B2 (en) * 2005-05-10 2008-08-05 Sony Computer Entertainment Inc. Multiprocessor system for decrypting and resuming execution of an executing program after transferring the program code between two processors via a shared main memory upon occurrence of predetermined condition

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101685391A (en) * 2002-01-04 2010-03-31 微软公司 Methods and system for managing computational resources of a coprocessor in a computing system
CN101379537A (en) * 2006-02-06 2009-03-04 松下电器产业株式会社 Secure processing device, method and program
CN101165668A (en) * 2006-10-18 2008-04-23 松下电器产业株式会社 Storage medium control device and control method thereof

Also Published As

Publication number Publication date
CN105022970A (en) 2015-11-04

Similar Documents

Publication Publication Date Title
CN106104555B (en) For protecting the behavioural analysis of peripheral equipment
JP2021089774A (en) Scan and pay method and device utilized in mobile device
US11137909B2 (en) Secure data entry via a virtual keyboard
CN106817480A (en) The system for carrying out management and control to mobile device access right based on the time and using white list mode
CN102779382B (en) Self-service issuing device for social security financial IC (integrated circuit) card and data processing method thereof
CN107870976A (en) Resume identification device, method and computer-readable recording medium
Women Gender equality: women’s rights in review 25 years after Beijing
CN106534572A (en) Information display method and device and terminal
CN103699777A (en) Medicine taking method for outpatient department and pharmacy system
CN110163473A (en) A kind of monitoring method and equipment of Task Progress
CN103493088A (en) Label privileges
CN107632889A (en) A kind of method, equipment and computer-readable recording medium for realizing service degradation
CN104067228B (en) Context induction in catechumen's application
US20110313938A1 (en) Time-slicing method and system for digital books
CN107944000A (en) Flight freight rate update method, device, electronic equipment, storage medium
CN107729755A (en) A kind of terminal safety management method, terminal and computer-readable recording medium
CN107766712A (en) Message prompt method, terminal and computer-readable medium
CN104091102B (en) A kind of multi-user management method and its device based on Android system
CN105022970B (en) The method of the processing security service of computing device and computing device
CN105659247B (en) The proactive Threat Management system of context-aware
CN110069174B (en) Message processing method and device
CN104903813B (en) System and method for the predictive power management in calculating center
CN112634090A (en) Home decoration information reporting management method, system, computer device and storage medium
US20160182933A1 (en) Method and System for Distributing and Playing Media
CN107463379A (en) Interface switching method and device, computer installation and computer-readable recording medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180302

Termination date: 20190429

CF01 Termination of patent right due to non-payment of annual fee