CN105306301B - A kind of method and system monitoring credible counting device - Google Patents

A kind of method and system monitoring credible counting device Download PDF

Info

Publication number
CN105306301B
CN105306301B CN201510738331.XA CN201510738331A CN105306301B CN 105306301 B CN105306301 B CN 105306301B CN 201510738331 A CN201510738331 A CN 201510738331A CN 105306301 B CN105306301 B CN 105306301B
Authority
CN
China
Prior art keywords
counting device
credible
information
module
credible counting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510738331.XA
Other languages
Chinese (zh)
Other versions
CN105306301A (en
Inventor
史国振
娄嘉鹏
谢绒娜
李冬冬
苏铓
叶思水
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China news publishing research institute
BEIJING ELECTRONIC SCIENCE AND TECHNOLOGY INSTITUTE
Original Assignee
China news publishing research institute
BEIJING ELECTRONIC SCIENCE AND TECHNOLOGY INSTITUTE
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China news publishing research institute, BEIJING ELECTRONIC SCIENCE AND TECHNOLOGY INSTITUTE filed Critical China news publishing research institute
Priority to CN201510738331.XA priority Critical patent/CN105306301B/en
Publication of CN105306301A publication Critical patent/CN105306301A/en
Application granted granted Critical
Publication of CN105306301B publication Critical patent/CN105306301B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Debugging And Monitoring (AREA)

Abstract

The present invention relates to a kind of method and system for monitoring credible counting device, and wherein method is the following steps are included: carry out security initialization to credible counting device;Monitor the operating status of credible counting device in real time;Credible counting device is upgraded according to upgrade request.The beneficial effects of the present invention are: monitoring device security initialization can guarantee it is to issue unmodified by device to be started, license, and the configuration information that it is loaded is legal.The monitoring to the real-time status of device may be implemented in device operation monitoring and abnormal alarm function, when abnormal alarm occurs in device it is timely handled.Equipment safety upgrade function can guarantee that legal running gear can be carried out safe upgrading, i.e., not will cause illegal device and upgrade to legal device, unavailable after legal device will not be made to upgrade.

Description

A kind of method and system monitoring credible counting device
Technical field
The present invention relates to a kind of method and system for monitoring credible counting device.
Background technique
The high speed development of computer and network technologies makes internet be dissolved into each neck of social life more and more Domain, oneself becomes people's work, a part indispensable in studying and living to network, people indulge in luxuriousness to one's heart's desire network for we with Come it is convenient, efficient and shared while, also the moment suffers from full spectrum of threats brought by cyber-attack and destructive insident.In order to The safety of Logistics networks transaction, we devise credible counting device.But if credible counting device is inherently in uneasiness In the state of complete, then the Secure Transaction of counter guarantee is namely indulge in empty talk.If running program on counting device is to be modified It crosses, then the Transaction Information of the counter may be forged, it is possible to unreasonable exchange data occur, influence transaction The supervision effect that fairness and counting device are played;If counting device is in the work stopped and fills state, however does not go partially It was found that it, the progress then this normally trades serious shadow.These will be efficiently solved by designing a kind of counting device monitoring system Problem.
Patent: monitoring system (patent No.: CN101986704A) designs a kind of monitoring system, including monitoring module, client Terminal, remote control module, the monitoring module, client terminal and remote control module are connected with internet, institute Monitoring module is stated for obtaining monitoring information and by monitoring information transmission to internet, the client terminal can connect Receive the monitoring information and show the monitoring information, the remote control module can receive and store the monitoring information, And the monitoring information can be exported according to the demand of user.The beneficial effects of the invention are as follows because of client terminal and long-range control mould Block is connected with i nternet network, and the client terminal can receive the monitoring information and show the monitoring letter Breath, so by Internet network real-time Transmission monitored site instant video, realization is either in office building, in monitoring The heart still whenever and wherever possible supervises the current situation of monitored site far away from can be transferred through I nternet network all over the world Control.But it can only monitor the operation dress state of network entity, and make specific present.But it cannot be guaranteed that monitoring system is credible to reality , and online upgrading cannot be carried out to the object of monitoring.
There are some data liquidation center [Minimizing in domestic and international existing digital copyright protection system Retrieval Cost of Multi-Layer Content Distribution Systems,A portion-based content distribution strategy in streaming media content distribution Networks], for generating and distributing digital license, realize the financial transactions affairs such as user identity authentication, triggering payment.But In copyright process of exchange, retailer and provider do not set up believable third party as monitoring party, thus can not It solves the problems, such as the distrust due to both parties and generates dispute.
Summary of the invention
Achieve the purpose that effectively to supervise technical problem to be solved by the invention is to provide a kind of, introduces trusted third party's ginseng With realize the fair deal of both sides, and ensure that the method and system of the credible counting device of monitoring of non-repudiation.
The technical scheme to solve the above technical problems is that a kind of method for monitoring credible counting device, including Following steps:
Step 1: security initialization is carried out to credible counting device;
Step 2: monitoring the starting state and operating status of credible counting device in real time;
Step 3: safety upgrade is carried out to credible counting device according to upgrade request.
The beneficial effects of the present invention are: monitoring device security initialization can guarantee that by device to be started be to issue not It is modified, it licenses, and the configuration information that it is loaded is legal.Device operation monitoring and abnormal alarm function can To realize the monitoring to the real-time status of device, when abnormal alarm occurs in device it is timely handled.Device peace Full upgrade function can guarantee that legal running gear can be carried out safe upgrading, i.e., not will cause illegal device and upgrade to Legal device, it is unavailable after legal device will not be made to upgrade.
Based on the above technical solution, the present invention can also be improved as follows.
Further, a kind of method monitoring credible counting device according to claim 1, which is characterized in that described Step 1 specifically includes the following steps:
Step 1.1: distributing credible counting device to user according to user's request;
Step 1.2: configuration module receives the relevant information by encryption that credible counting device is sent, according to relevant information Obtain configuration information;
Step 1.3: judging whether credible counting device is legal with the configuration information, if so, executing step 2;Otherwise, Initialization failure information is sent, is terminated.
Beneficial effect using above-mentioned further scheme is, it is ensured that by device to be started be issue it is unmodified , it licenses, and the configuration information that it is loaded is legal.
Further, the step 2 specifically includes the following steps:
Step 2.1: it is whether legal in starting state information by the verifying judgment means to static information, if legal, Then device starting operation, executes step 2.2;If not conforming to rule stops starting, terminate;
Step 2.2: the running state information by encryption of credible counting device is obtained at interval of preset time;
Step 2.3: information judges whether credible counting device operation is normal according to the operation state, if so, executing Step 3;Otherwise, it sends and is operating abnormally alarm, terminate.
The static information includes one or more of information such as configuration information and software summary info in device.
Beneficial effect using above-mentioned further scheme is that may be implemented to the monitoring of the real-time status of device, works as device Abnormal alarm occur handles it timely.
Further, the step 3 specifically includes the following steps:
Step 3.1: judging whether to receive upgrade request, if so, executing step 3.2;Otherwise, continuing current operation can Believe counting device;
Step 3.2: the relevant information by encryption of credible counting device is obtained, it is current credible according to relevant information judgement Whether counting device can upgrade, if so, being upgraded, credible counting device after being upgraded, credible meter after operation upgrading Counting apparatus;Otherwise, upgrading failure, continuation currently run credible counting device.
Beneficial effect using above-mentioned further scheme is, it is ensured that legal running gear can be carried out safe liter Grade, i.e., not will cause illegal device and upgrade to legal device, unavailable after legal device will not be made to upgrade.
Further, the relevant information by encryption that the credible counting device is sent includes device version information, static state One or more of program digest information, dynamic memory summary info and configuration excerpt information etc..
The technical scheme to solve the above technical problems is that a kind of system for monitoring credible counting device, including Initialization module, monitoring module and upgraded module;
The initialization module is used to carry out security initialization to credible counting device;
The monitoring module is used to monitor in real time the starting state and operating status of credible counting device;
The upgraded module is used to carry out safety upgrade to credible counting device according to upgrade request.
The beneficial effects of the present invention are: monitoring device security initialization can guarantee that by device to be started be to issue not It is modified, it licenses, and the configuration information that it is loaded is legal.Device operation monitoring and abnormal alarm function can To realize the monitoring to the real-time status of device, when abnormal alarm occurs in device it is timely handled.Device peace Full upgrade function can guarantee that legal running gear can be carried out safe upgrading, i.e., not will cause illegal device and upgrade to Legal device, it is unavailable after legal device will not be made to upgrade.
Based on the above technical solution, the present invention can also be improved as follows.
Further, the initialization module includes distribution module, configuration module and first judgment module;
The distribution module is used to distribute credible counting device to user according to user's request;
The configuration module is used to receive the relevant information by encryption that credible counting device is sent, according to relevant information Obtain configuration information;
Whether the first judgment module is legal with the configuration information for judging credible counting device, if so, holding Row monitors the operating status of credible counting device in real time;Otherwise, initialization failure information is sent, is terminated.
Beneficial effect using above-mentioned further scheme is, it is ensured that by device to be started be issue it is unmodified , it licenses, and the configuration information that it is loaded is legal.
Further, the monitoring module includes starting judgment module, data obtaining module and the second judgment module;
Whether the starting judgment module by the verifying judgment means to static information in starting state information for being closed Method, if legal, device starting operation triggers data obtaining module;If not conforming to rule stops starting;
The data obtaining module is used to obtain the operation shape by encryption of credible counting device at interval of preset time State information, data obtaining module verify its dynamic memory information;
Second judgment module judges whether credible counting device operation is normal for information according to the operation state, If so, continuing to run credible counting device, credible counting device is upgraded according to upgrade request;Otherwise, operation is sent Abnormality alarming terminates.
The static information includes one or more of information such as configuration information and software summary info in device.
Beneficial effect using above-mentioned further scheme is that may be implemented to the monitoring of the real-time status of device, works as device Abnormal alarm occur handles it timely.
Further, the upgraded module includes third judgment module and upgrading judging module;
The third judgment module is for judging whether to receive upgrade request, if so, triggering upgrading judgment module;It is no Then, continue currently to run credible counting device;
The upgrading judging module is used to obtain the relevant information by encryption of credible counting device, according to relevant information Judge whether current credible counting device can upgrade, if so, being upgraded, credible counting device after being upgraded, runs Credible counting device after upgrading;Otherwise, upgrading failure, continuation currently run credible counting device.
Beneficial effect using above-mentioned further scheme is, it is ensured that legal running gear can be carried out safe liter Grade, i.e., not will cause illegal device and upgrade to legal device, unavailable after legal device will not be made to upgrade.
Further, the relevant information by encryption that the credible counting device is sent includes device version information, static state One or more of program digest information, dynamic memory summary info and configuration excerpt information etc..
Supervision of the invention is directed to digital content works, impacts for the piracy of digital content works, protects copyright Copyright reinforces copyright transaction supervision.In order to achieve the purpose that effectively to supervise, introduces trusted third party and participate in, realize double The fair deal of side, and ensure that non-repudiation.The function of the monitoring of credible counter device includes equipment safety initialization, Device operation monitoring and abnormal alarm and equipment safety upgrading etc..
Detailed description of the invention
Fig. 1 is a kind of method flow diagram for monitoring credible counting device of the present invention;
Fig. 2 is security initialization flow chart described in the embodiment of the present invention 1;
Fig. 3 is the starting state monitoring figure of the credible counting device of real time monitoring described in the embodiment of the present invention 1;
Fig. 4 is the operating status flow chart of the credible counting device of real time monitoring described in the embodiment of the present invention 1;
Fig. 5 is to carry out upgrading flow chart to credible counting device described in the embodiment of the present invention 1;
Fig. 6 is a kind of system structure diagram for monitoring credible counting device of the present invention.
In attached drawing, parts list represented by the reference numerals are as follows:
1, initialization module, 2, monitoring module, 3, upgraded module.
Specific embodiment
The principle and features of the present invention will be described below with reference to the accompanying drawings, and the given examples are served only to explain the present invention, and It is non-to be used to limit the scope of the invention.
As shown in Figure 1, being a kind of method for monitoring credible counting device of the present invention, comprising the following steps:
Step 1: security initialization is carried out to credible counting device;
Step 2: monitoring the starting state and operating status of credible counting device in real time;
Step 3: safety upgrade is carried out to credible counting device according to upgrade request.
As shown in Fig. 2, security initialization described in the embodiment of the present invention 1 specifically includes the following steps:
Registration and authorization server distribute credible counting to user according to user's request and fill to user's transmission registration information It sets;
Credible counting device sends to monitoring system and sends device version through identity ciphering, static routine abstract, dynamic The information such as memory abstract and configuration information digest value;
Monitoring system requests other use to registration and authorization server according to version information under the identity of credible counting device In the data of verifying;
The initialization information for verifying credible counter device, is such as verified, and sends the dress with authorization server to registration Set normal initialization result;Otherwise, the incorrect warning of device initialization information is sent with authorization server to registration.
As shown in figure 3, the starting state for the credible counting device of real time monitoring described in the embodiment of the present invention 1 includes following step It is rapid:
Credible counting device sends the device version encrypted through identity information to monitoring system, executes program and rig Manage the contents such as information;
Monitoring system requests other use to registration and authorization server according to version information under the identity of credible counting device In the data of verifying;
Whether verifying attachment operation is abnormal, if normally, normal credible counting device;Otherwise, it is sent to associated server The device starts abnormality warnings, sends abnormality alarming, terminates.
As shown in figure 4, the operating status for the credible counting device of real time monitoring described in the embodiment of the present invention 1 includes following step It is rapid:
Credible counting device sends the information such as the device version encrypted through identity information and operating status to monitoring system;
Monitoring system requests other use to registration and authorization server according to version information under the identity of credible counting device In the data of verifying;
Whether verifying attachment operation is abnormal, if normally, continuing to run credible counting device;Otherwise, to associated server It sends the device and is operating abnormally warning, send and be operating abnormally alarm, terminate.
As shown in figure 5, to be upgraded described in the embodiment of the present invention 1 to credible counting device specifically includes the following steps:
Judge whether to receive upgrade request, if so, performing the next step;Otherwise, continue currently to run credible counting dress It sets;
Monitoring system sends upgrading to device and requires;
Credible counting device sends present apparatus digest value, version information and configuration etc. through identity ciphering to monitoring system Information;
Monitoring system is used to verify present apparatus to registration according to device identity with authorization server request relevant information It is no scalable;If so, being upgraded, credible counting device after being upgraded, credible counting device after operation upgrading;Otherwise, Upgrading failure, continuation currently run credible counting device, send the device verification result with authorization server to registration.
Upgrading may be selected notice registration and carry out online upgrading with authorization server;Or notify relevant staff carry out from The upgrading of informant's work.
As shown in fig. 6, being a kind of system for monitoring credible counting device of the present invention, including initialization module 1, prison Control module 2 and upgraded module 3;
The initialization module 1 is used to carry out security initialization to credible counting device;
The monitoring module 2 is used to monitor in real time the starting state and operating status of credible counting device;
The upgraded module 3 is for upgrading credible counting device according to upgrade request.
Implementation example of the invention is as follows:
This programme can be used using identifying algorithms such as RSA, ID-based cryptosystem algorithms, carry out used here as RSA Algorithm Authentication and encryption, and issue related credentials to counting device and show each device identity, hash algorithm can be used SHA1 into The digest calculations of row relevant information.
1, equipment safety initializes
Device using RSA private key encryption software version information, all softwares digest value, be loaded into memory memory it is empty Between digest value and configuration information digest value, generate ciphertext to monitoring system send.
Monitoring system requests the soft of the device to pertinent registration and authorization server to the certificate of CA server request unit Part version, software and the digest value of configuration.Verify whether that device has carried out security initialization, if dangerous to registration and award It weighs server and sends warning message.
2, device operation monitoring and abnormal alarm
Device sends heartbeat message to monitoring server every 1s, it is device each section by RSA private key encryption Running state information.
Monitoring system is requesting the operation of the device just to registration and authorization server to the certificate of CA server request unit Constant value is compared with the status information of the device sended over, and if there is component is operating abnormally, then monitoring system issues report It warns and notifies registration and authorization server.
3, equipment safety upgrades
When and new version occur when, monitoring system to device send upgrading message.
Device sends current grant information, Current software digest value, configuration etc. according to monitoring system, these all pass through Rsa encryption.
Monitoring system is requested the device information to registration and authorization server, is tested to the certificate of CA server request unit Demonstrate,prove whether it can upgrade.If cannot upgrade, registration and authorization server are notified, and record in the local database.Such as Fruit can upgrade, and will find scalable information according to registration and authorization server and staff.Then according to most current cost, Decision is online upgrading or offline artificial upgrading.
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.

Claims (6)

1. a kind of method for monitoring credible counting device, which comprises the following steps:
Step 1: security initialization is carried out to credible counting device;
Step 2: monitoring the starting state and operating status of credible counting device in real time;
Step 3: safety upgrade is carried out to credible counting device according to upgrade request;
Wherein, the step 1 specifically includes the following steps:
Step 1.1: distributing credible counting device to user according to user's request;
Step 1.2: receiving the relevant information by encryption that credible counting device is sent, obtained according to relevant information and match confidence Breath;
Step 1.3: judging whether credible counting device is legal with the configuration information, if so, executing step 2;Otherwise, it sends Failure information is initialized, is terminated;
The step 2 specifically includes the following steps:
Step 2.1: whether the starting state information by the verifying judgment means to static information is legal, if legal, fills Starting operation is set, step 2.2 is executed;If not conforming to rule stops starting, terminate;
Step 2.2: the running state information by encryption of credible counting device is obtained at interval of preset time, and it is dynamic to verify it State memory information;
Step 2.3: information judges whether credible counting device operation is normal according to the operation state, if so, executing step 3;Otherwise, it sends and is operating abnormally alarm, terminate.
2. a kind of method for monitoring credible counting device according to claim 1, which is characterized in that the step 3 is specific The following steps are included:
Step 3.1: judging whether to receive upgrade request, if so, executing step 3.2;Otherwise, current credible meter is continued to run Counting apparatus;
Step 3.2: obtaining the relevant information by encryption of credible counting device, current credible counting is judged according to relevant information Whether device can upgrade, if so, being upgraded, credible counting device after being upgraded, credible counting dress after operation upgrading It sets;Otherwise, upgrading failure continues to run current credible counting device.
3. a kind of method for monitoring credible counting device according to claim 1 or 2, which is characterized in that the credible meter The relevant information by encryption that counting apparatus is sent includes device version information, static routine summary info, dynamic memory abstract One or more of information and configuration excerpt information.
4. a kind of system for monitoring credible counting device, which is characterized in that including initialization module, monitoring module and upgrading mould Block;
The initialization module is used to carry out security initialization to credible counting device;
The monitoring module is used to monitor in real time the starting state and operating status of credible counting device;
The upgraded module is used to carry out safety upgrade to credible counting device according to upgrade request;
Wherein, the initialization module includes distribution module, configuration module and first judgment module;
The distribution module is used to distribute credible counting device to user according to user's request;
The configuration module is used to receive the relevant information by encryption that credible counting device is sent, and is obtained according to relevant information Configuration information;
Whether the first judgment module is legal with the configuration information for judging credible counting device, if so, executing reality When monitor the operating status of credible counting device;Otherwise, initialization failure information is sent, is terminated;
The monitoring module includes starting judgment module, data obtaining module and the second judgment module;
Whether the starting judgment module is used for legal by the starting state information of the verifying judgment means to static information, such as Fruit is legal, then device starting operation, triggers data obtaining module;If not conforming to rule stops starting;
The operating status by encryption that the data obtaining module is used to obtain credible counting device at interval of preset time is believed Breath, data obtaining module verify its dynamic memory information;
Second judgment module judges whether credible counting device operation is normal for information according to the operation state, if It is to continue to run credible counting device, credible counting device is upgraded according to upgrade request;Otherwise, it sends and is operating abnormally Alarm terminates.
5. a kind of system for monitoring credible counting device according to claim 4, which is characterized in that the upgraded module packet Include third judgment module and upgrading judging module;
The third judgment module is for judging whether to receive upgrade request, if so, triggering upgrading judging module;Otherwise, Continue to run current credible counting device;
The upgrading judging module is used to obtain the relevant information by encryption of credible counting device, is judged according to relevant information Whether current credible counting device can upgrade, if so, being upgraded, credible counting device after being upgraded, operation upgrading Credible counting device afterwards;Otherwise, upgrading failure continues to run current credible counting device.
6. a kind of system for monitoring credible counting device according to claim 4 or 5, which is characterized in that the credible meter The relevant information by encryption that counting apparatus is sent includes device version information, static routine summary info, dynamic memory abstract One or more of information and configuration excerpt information.
CN201510738331.XA 2015-11-03 2015-11-03 A kind of method and system monitoring credible counting device Active CN105306301B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510738331.XA CN105306301B (en) 2015-11-03 2015-11-03 A kind of method and system monitoring credible counting device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510738331.XA CN105306301B (en) 2015-11-03 2015-11-03 A kind of method and system monitoring credible counting device

Publications (2)

Publication Number Publication Date
CN105306301A CN105306301A (en) 2016-02-03
CN105306301B true CN105306301B (en) 2019-03-01

Family

ID=55203081

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510738331.XA Active CN105306301B (en) 2015-11-03 2015-11-03 A kind of method and system monitoring credible counting device

Country Status (1)

Country Link
CN (1) CN105306301B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110096887B (en) 2019-03-22 2020-06-30 阿里巴巴集团控股有限公司 Trusted computing method and server

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102495979A (en) * 2011-11-11 2012-06-13 广州大学 System for realizing credible counting in digital resource transaction
CN104714815A (en) * 2013-12-13 2015-06-17 乐视网信息技术(北京)股份有限公司 Method for updating application software and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013048111A2 (en) * 2011-09-26 2013-04-04 인텔렉추얼디스커버리 주식회사 Method and apparatus for detecting an intrusion on a cloud computing service

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102495979A (en) * 2011-11-11 2012-06-13 广州大学 System for realizing credible counting in digital resource transaction
CN104714815A (en) * 2013-12-13 2015-06-17 乐视网信息技术(北京)股份有限公司 Method for updating application software and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《支持运行监控的可信软件体系结构设计方法》;文静等;《计算机学报》;20101231;第33卷(第12期);第3页-第4页

Also Published As

Publication number Publication date
CN105306301A (en) 2016-02-03

Similar Documents

Publication Publication Date Title
CN103747036B (en) Trusted security enhancement method in desktop virtualization environment
US20180352003A1 (en) Network Access Control with Compliance Policy Check
US9342683B2 (en) Stateless attestation system
CN102438013B (en) Hardware based credential distribution
EP2755162B1 (en) Identity controlled data center
CN105704139B (en) Streaming media service user authen method based on RTMP agreements
CN108111473B (en) Unified management method, device and system for hybrid cloud
CN102158367A (en) Active anti-plug-in online game system and anti-plug-in method thereof
CN113645229B (en) Authentication system and method based on credible confirmation
US9208350B2 (en) Certificate information verification system
CN113094730A (en) Medical data safety management platform based on internet
CN105471903A (en) Method for generating electronic lock activation information and related system, device and unlocking method
CN101296230B (en) Web service security control mechanism based on PKI and PMI
CN115987697B (en) Multi-level information data sharing method and system based on event subscription mechanism
CN114338201B (en) Data processing method and device, electronic equipment and storage medium
CN112581233A (en) Method, device, equipment and computer-readable storage medium for order offline operation
CN106209905A (en) A kind of network safety managing method and device
CN105306301B (en) A kind of method and system monitoring credible counting device
CN113872751B (en) Method, device and equipment for monitoring service data and storage medium
Alboghdady et al. C'mon: Monitoring the compliance of cloud services to contracted properties
CN108200450B (en) A kind of determination method, apparatus, electronic equipment and medium for paying close attention to legitimacy
CN117240625A (en) Tamper-resistant data processing method and device and electronic equipment
CN111641652A (en) Application security service platform based on cloud computing
CN107294945A (en) Computer program product and authorization code authentication method
CN110139163A (en) A kind of method and relevant apparatus obtaining barrage

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant